STOC A*

80 papers

YearTitle / Authors
20093-query locally decodable codes of subexponential length.
Klim Efremenko
2009A competitive algorithm for minimizing weighted flow time on unrelatedmachines with speed augmentation.
Jivitej S. Chadha, Naveen Garg, Amit Kumar, V. N. Muralidhara
2009A constant-factor approximation for stochastic Steiner forest.
Anupam Gupta, Amit Kumar
2009A constructive proof of the Lovász local lemma.
Robin A. Moser
2009A deterministic reduction for the gap minimum distance problem: [extended abstract].
Qi Cheng, Daqing Wan
2009A fast and efficient algorithm for low-rank approximation of a matrix.
Nam H. Nguyen, Thong T. Do, Trac D. Tran
2009A nearly optimal oracle for avoiding failed vertices and edges.
Aaron Bernstein, David R. Karger
2009A new approach to auctions and resilient mechanism design.
Jing Chen, Silvio Micali
2009A new line of attack on the dichotomy conjecture.
Gábor Kun, Mario Szegedy
2009A unified framework for concurrent security: universal composability from stand-alone non-malleability.
Huijia Lin, Rafael Pass, Muthuramakrishnan Venkitasubramaniam
2009Affiliation networks.
Silvio Lattanzi, D. Sivakumar
2009Affine dispersers from subspace polynomials.
Eli Ben-Sasson, Swastik Kopparty
2009An axiomatic approach to algebrization.
Russell Impagliazzo, Valentine Kabanets, Antonina Kolokolova
2009An efficient algorithm for partial order production.
Jean Cardinal, Samuel Fiorini, Gwenaël Joret, Raphaël M. Jungers, J. Ian Munro
2009An improved constant-time approximation algorithm for maximum matchings.
Yuichi Yoshida, Masaki Yamamoto, Hiro Ito
2009Approximating edit distance in near-linear time.
Alexandr Andoni, Krzysztof Onak
2009Artin automorphisms, cyclotomic function fields, and folded list-decodable codes.
Venkatesan Guruswami
2009Athena lecture: Controlling Access to Programs?
Shafi Goldwasser
2009Bit-probe lower bounds for succinct data structures.
Emanuele Viola
2009CSP gaps and reductions in the lasserre hierarchy.
Madhur Tulsiani
2009Conditional hardness for satisfiable 3-CSPs.
Ryan O'Donnell, Yi Wu
2009Differential privacy and robust statistics.
Cynthia Dwork, Jing Lei
2009Distributed (delta+1)-coloring in linear (in delta) time.
Leonid Barenboim, Michael Elkin
2009Efficient discrete-time simulations of continuous-time quantum query algorithms.
Richard Cleve, Daniel Gottesman, Michele Mosca, Rolando D. Somma, David L. Yonge-Mallo
2009Every planar graph is the intersection graph of segments in the plane: extended abstract.
Jérémie Chalopin, Daniel Gonçalves
2009Exact learning of random DNF over the uniform distribution.
Linda Sellie
2009Explicit construction of a small epsilon-net for linear threshold functions.
Yuval Rabani, Amir Shpilka
2009Fault-tolerant spanners for general graphs.
Shiri Chechik, Michael Langberg, David Peleg, Liam Roditty
2009Finding sparse cuts locally using evolving sets.
Reid Andersen, Yuval Peres
2009Finding, minimizing, and counting weighted subgraphs.
Virginia Vassilevska, Ryan Williams
2009Fully homomorphic encryption using ideal lattices.
Craig Gentry
2009Green's conjecture and testing linear-invariant properties.
Asaf Shapira
2009Hadwiger's conjecture is decidable.
Ken-ichi Kawarabayashi, Bruce A. Reed
2009Holant problems and counting CSP.
Jin-Yi Cai, Pinyan Lu, Mingji Xia
2009Homology flows, cohomology cuts.
Erin W. Chambers, Jeff Erickson, Amir Nayyeri
2009How long does it take to catch a wild kangaroo?
Ravi Montenegro, Prasad Tetali
2009Inaccessible entropy.
Iftach Haitner, Omer Reingold, Salil P. Vadhan, Hoeteck Wee
2009Integrality gaps for Sherali-Adams relaxations.
Moses Charikar, Konstantin Makarychev, Yury Makarychev
2009Intrinsic robustness of the price of anarchy.
Tim Roughgarden
2009Linear time approximation schemes for the Gale-Berlekamp game and related minimization problems.
Marek Karpinski, Warren Schudy
2009List decoding tensor products and interleaved codes.
Parikshit Gopalan, Venkatesan Guruswami, Prasad Raghavendra
2009Max cut and the smallest eigenvalue.
Luca Trevisan
2009MaxMin allocation via degree lower-bounded arborescences.
MohammadHossein Bateni, Moses Charikar, Venkatesan Guruswami
2009Message passing algorithms and improved LP decoding.
Sanjeev Arora, Constantinos Daskalakis, David Steurer
2009Mixing time for the solid-on-solid model.
Fabio Martinelli, Alistair Sinclair
2009Multiple intents re-ranking.
Yossi Azar, Iftah Gamzu, Xiaoxin Yin
2009Multiplicative updates outperform generic no-regret learning in congestion games: extended abstract.
Robert Kleinberg, Georgios Piliouras, Éva Tardos
2009Near-perfect load balancing by randomized rounding.
Tobias Friedrich, Thomas Sauerwald
2009New direct-product testers and 2-query PCPs.
Russell Impagliazzo, Valentine Kabanets, Avi Wigderson
2009Non-malleability amplification.
Huijia Lin, Rafael Pass
2009Non-malleable extractors and symmetric key cryptography from weak secrets.
Yevgeniy Dodis, Daniel Wichs
2009Non-monotone submodular maximization under matroid and knapsack constraints.
Jon Lee, Vahab S. Mirrokni, Viswanath Nagarajan, Maxim Sviridenko
2009Numerical linear algebra in the streaming model.
Kenneth L. Clarkson, David P. Woodruff
2009On cryptography with auxiliary input.
Yevgeniy Dodis, Yael Tauman Kalai, Shachar Lovett
2009On oblivious PTAS's for nash equilibrium.
Constantinos Daskalakis, Christos H. Papadimitriou
2009On proximity oblivious testing.
Oded Goldreich, Dana Ron
2009On the complexity of communication complexity.
Eyal Kushilevitz, Enav Weinreb
2009On the complexity of differentially private data release: efficient algorithms and hardness results.
Cynthia Dwork, Moni Naor, Omer Reingold, Guy N. Rothblum, Salil P. Vadhan
2009On the convergence of regret minimization dynamics in concave games.
Eyal Even-Dar, Yishay Mansour, Uri Nadav
2009On the geometry of graphs with a forbidden minor.
James R. Lee, Anastasios Sidiropoulos
2009Online and stochastic survivable network design.
Anupam Gupta, Ravishankar Krishnaswamy, R. Ravi
2009Polynomial-time theory of matrix groups.
László Babai, Robert Beals, Ákos Seress
2009Private coresets.
Dan Feldman, Amos Fiat, Haim Kaplan, Kobbi Nissim
2009Proceedings of the 41st Annual ACM Symposium on Theory of Computing, STOC 2009, Bethesda, MD, USA, May 31 - June 2, 2009
Michael Mitzenmacher
2009Public-key cryptosystems from the worst-case shortest vector problem: extended abstract.
Chris Peikert
2009Quantum algorithms using the curvelet transform.
Yi-Kai Liu
2009Random graphs and the parity quantifier.
Phokion G. Kolaitis, Swastik Kopparty
2009Random walks on polytopes and an affine interior point method for linear programming.
Ravi Kannan, Hariharan Narayanan
2009Randomly supported independence and resistance.
Per Austrin, Johan Håstad
2009Reconstruction for the Potts model.
Allan Sly
2009Sherali-adams relaxations of the matching polytope.
Claire Mathieu, Alistair Sinclair
2009Short seed extractors against quantum storage.
Amnon Ta-Shma
2009Small-size epsilon-nets for axis-parallel rectangles and boxes.
Boris Aronov, Esther Ezra, Micha Sharir
2009Testing juntas nearly optimally.
Eric Blais
2009The detectability lemma and quantum gap amplification.
Dorit Aharonov, Itai Arad, Zeph Landau, Umesh V. Vazirani
2009The extended BG-simulation and the characterization of t-resiliency.
Eli Gafni
2009The work of Leslie Valiant.
Avi Wigderson
2009Tight lower bounds for greedy routing in uniform small world rings.
Martin Dietzfelbinger, Philipp Woelfel
2009Twice-ramanujan sparsifiers.
Joshua D. Batson, Daniel A. Spielman, Nikhil Srivastava
2009Universally utility-maximizing privacy mechanisms.
Arpita Ghosh, Tim Roughgarden, Mukund Sundararajan