Entity usage

From MaRDI portal

This page lists pages that use the given entity (e.g. Q42). The list is sorted by descending page ID, so that newer pages are listed first.

List of pages that use a given entity

Showing below up to 50 results in range #1 to #50.

View (previous 50 | ) (20 | 50 | 100 | 250 | 500)

  1. A new line of attack on the dichotomy conjecture: Label: en
  2. Holant problems and counting CSP: Label: en
  3. Random graphs and the parity quantifier: Label: en
  4. An axiomatic approach to algebrization: Label: en
  5. Online and stochastic survivable network design: Label: en
  6. A competitive algorithm for minimizing weighted flow time on unrelatedmachines with speed augmentation: Label: en
  7. Multiple intents re-ranking: Label: en
  8. A constant-factor approximation for stochastic Steiner forest: Label: en
  9. Explicit construction of a small epsilon-net for linear threshold functions: Label: en
  10. Small-size ε-nets for axis-parallel rectangles and boxes: Label: en
  11. Every planar graph is the intersection graph of segments in the plane: Label: en
  12. On cryptography with auxiliary input: Label: en
  13. Inaccessible entropy: Label: en
  14. Non-malleable extractors and symmetric key cryptography from weak secrets: Label: en
  15. Tight lower bounds for greedy routing in uniform small world rings: Label: en
  16. Reconstruction for the Potts model: Label: en
  17. Mixing time for the solid-on-solid model: Label: en
  18. Random walks on polytopes and an affine interior point method for linear programming: Label: en
  19. How long does it take to catch a wild kangaroo?: Label: en
  20. MaxMin allocation via degree lower-bounded arborescences: Label: en
  21. Multiplicative updates outperform generic no-regret learning in congestion games: Label: en
  22. On the convergence of regret minimization dynamics in concave games: Label: en
  23. Intrinsic robustness of the price of anarchy: Label: en
  24. A new approach to auctions and resilient mechanism design: Label: en
  25. Conditional hardness for satisfiable 3-CSPs: Label: en
  26. Randomly supported independence and resistance: Label: en
  27. Bit-probe lower bounds for succinct data structures: Label: en
  28. On the complexity of communication complexity: Label: en
  29. Finding, minimizing, and counting weighted subgraphs: Label: en
  30. Hadwiger's conjecture is decidable: Label: en
  31. Fault-tolerant spanners for general graphs: Label: en
  32. Affiliation networks: Label: en
  33. The detectability lemma and quantum gap amplification: Label: en
  34. Efficient discrete-time simulations of continuous-time quantum query algorithms: Label: en
  35. Short seed extractors against quantum storage: Label: en
  36. Quantum algorithms using the curvelet transform: Label: en
  37. On the complexity of differentially private data release: Label: en
  38. Differential privacy and robust statistics: Label: en
  39. Private coresets: Label: en
  40. Universally utility-maximizing privacy mechanisms: Label: en
  41. A constructive proof of the Lovász local lemma: Label: en
  42. Public-key cryptosystems from the worst-case shortest vector problem: Label: en
  43. Non-monotone submodular maximization under matroid and knapsack constraints: Label: en
  44. Linear time approximation schemes for the Gale-Berlekamp game and related minimization problems: Label: en
  45. CSP gaps and reductions in the lasserre hierarchy: Label: en
  46. Sherali-adams relaxations of the matching polytope: Label: en
  47. Integrality gaps for Sherali-Adams relaxations: Label: en
  48. Homology flows, cohomology cuts: Label: en
  49. Max cut and the smallest eigenvalue: Label: en
  50. Twice-ramanujan sparsifiers: Label: en

View (previous 50 | ) (20 | 50 | 100 | 250 | 500)