ITCS A

49 papers

YearTitle / Authors
2014Adversarial hypothesis testing and a quantum stein's lemma for restricted measurements.
Fernando G. S. L. Brandão, Aram W. Harrow, James R. Lee, Yuval Peres
2014An efficient algorithm for finding the ground state of 1D gapped local hamiltonians.
Zeph Landau, Umesh V. Vazirani, Thomas Vidick
2014Approximation schemes via Sherali-Adams hierarchy for dense constraint satisfaction problems and assignment problems.
Yuichi Yoshida, Yuan Zhou
2014Attribute-efficient evolvability of linear functions.
Elaine Angelino, Varun Kanade
2014Black-box obfuscation for d-CNFs.
Zvika Brakerski, Guy N. Rothblum
2014Building one-time memories from isolated qubits: (extended abstract).
Yi-Kai Liu
2014Candidate weak pseudorandom functions in AC
Adi Akavia, Andrej Bogdanov, Siyao Guo, Akshay Kamath, Alon Rosen
2014Capacity of non-malleable codes.
Mahdi Cheraghchi, Venkatesan Guruswami
2014Complexity of approximating CSP with balance / hard constraints.
Venkatesan Guruswami, Euiwoong Lee
2014Coordination mechanisms from (almost) all scheduling policies.
Sayan Bhattacharya, Sungjin Im, Janardhan Kulkarni, Kamesh Munagala
2014Cryptogenography.
Joshua Brody, Sune K. Jakobsen, Dominik Scheder, Peter Winkler
2014Decision trees, protocols and the entropy-influence conjecture.
Andrew Wan, John Wright, Chenggang Wu
2014Decompositions of triangle-dense graphs.
Rishi Gupta, Tim Roughgarden, C. Seshadhri
2014Deterministic compression with uncertain priors.
Elad Haramaty, Madhu Sudan
2014Direct sum fails for zero error average communication.
Gillat Kol, Shay Moran, Amir Shpilka, Amir Yehudayoff
2014Energy-efficient circuit design.
Antonios Antoniadis, Neal Barcelo, Michael Nugent, Kirk Pruhs, Michele Scquizzato
2014Expanders with respect to Hadamard spaces and random graphs: extended abstract.
Manor Mendel, Assaf Naor
2014Faster private release of marginals on small databases.
Karthekeyan Chandrasekaran, Justin Thaler, Jonathan R. Ullman, Andrew Wan
2014High dimensional expanders and property testing.
Tali Kaufman, Alexander Lubotzky
2014Innovations in Theoretical Computer Science, ITCS'14, Princeton, NJ, USA, January 12-14, 2014
Moni Naor
2014Integer feasibility of random polytopes: random integer programs.
Karthekeyan Chandrasekaran, Santosh S. Vempala
2014Invitation games and the price of stability.
Uriel Feige, Moshe Tennenholtz
2014Iterated group products and leakage resilience against NC1.
Eric Miles
2014Lattice-based FHE as secure as PKE.
Zvika Brakerski, Vinod Vaikuntanathan
2014Learning mixtures of arbitrary distributions over large discrete domains.
Yuval Rabani, Leonard J. Schulman, Chaitanya Swamy
2014Limits of local algorithms over sparse random graphs.
David Gamarnik, Madhu Sudan
2014Limits of random oracles in secure computation.
Mohammad Mahmoody, Hemanta K. Maji, Manoj Prabhakaran
2014Linear-time encodable codes meeting the gilbert-varshamov bound and their cryptographic applications.
Erez Druk, Yuval Ishai
2014Locally testable codes and cayley graphs.
Parikshit Gopalan, Salil P. Vadhan, Yuan Zhou
2014Mechanism design in large games: incentives and privacy.
Michael J. Kearns, Mallesh M. Pai, Aaron Roth, Jonathan R. Ullman
2014Multireference alignment using semidefinite programming.
Afonso S. Bandeira, Moses Charikar, Amit Singer, Andy Zhu
2014Non-commutative arithmetic circuits with division.
Pavel Hrubes, Avi Wigderson
2014On the automorphism groups of strongly regular graphs I.
László Babai
2014On the structure of boolean functions with small spectral norm.
Amir Shpilka, Avishay Tal, Ben Lee Volk
2014Optimal provision-after-wait in healthcare.
Mark Braverman, Jing Chen, Sampath Kannan
2014Parameterized testability.
Kazuo Iwama, Yuichi Yoshida
2014Partial tests, universal tests and decomposability.
Eldar Fischer, Yonatan Goldhirsh, Oded Lachish
2014Private interactive communication across an adversarial channel.
Ran Gelles, Amit Sahai, Akshay Wadia
2014Rate-independent computation in continuous chemical reaction networks.
Ho-Lin Chen, David Doty, David Soloveichik
2014Rational arguments: single round delegation with sublinear verification.
Siyao Guo, Pavel Hubácek, Alon Rosen, Margarita Vald
2014Redrawing the boundaries on purchasing data from privacy-sensitive individuals.
Kobbi Nissim, Salil P. Vadhan, David Xiao
2014Robust device independent quantum key distribution.
Umesh V. Vazirani, Thomas Vidick
2014Sequential decision making with vector outcomes.
Yossi Azar, Uriel Feige, Michal Feldman, Moshe Tennenholtz
2014Testers and their applications.
Nader H. Bshouty
2014The computational hardness of pricing compound options.
Mark Braverman, Kanika Pasricha
2014The truth behind the myth of the folk theorem.
Joseph Y. Halpern, Rafael Pass, Lior Seeman
2014Tree codes and a conjecture on exponential sums.
Cristopher Moore, Leonard J. Schulman
2014Welfare maximization and truthfulness in mechanism design with ordinal preferences.
Deeparnab Chakrabarty, Chaitanya Swamy
2014Why do simple algorithms for triangle enumeration work in the real world?
Jonathan W. Berry, Luke K. Fostvedt, Daniel J. Nordman, Cynthia A. Phillips, C. Seshadhri, Alyson G. Wilson