Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 49, Issue 5
Publisher:
  • Society for Industrial and Applied Mathematics
  • 3600 University City Science Center Philadelphia, PA
  • United States
ISSN:0097-5397
Bibliometrics
Skip Table Of Content Section
research-article
Strong Connectivity in Directed Graphs under Failures, with Applications

In this paper, we investigate some basic connectivity problems in directed graphs (digraphs). Let $G$ be a digraph with $m$ edges and $n$ vertices, and let $G\setminus e$ (resp., $G\setminus v$) be the digraph obtained after deleting edge $e$ (resp., vertex ...

research-article
Tight Revenue Gaps Among Simple Mechanisms

We consider a fundamental problem in microeconomics: selling a single item to a number of potential buyers, whose values are drawn from known independent and regular (not necessarily identical) distributions. There are four widely used and widely studied ...

research-article
Amplification and Derandomization without Slowdown

We present techniques for decreasing the error probability of randomized algorithms and for converting randomized algorithms to deterministic (nonuniform) algorithms. Unlike most existing techniques that involve repetition of the randomized algorithm and ...

research-article
Nonmalleable Extractors and Codes, with Their Many Tampered Extensions

Randomness extractors and error correcting codes are fundamental objects in computer science. Recently, there have been several natural generalizations of these objects, in the context and study of tamper-resilient cryptography. These are seeded ...

research-article
Round Compression for Parallel Matching Algorithms
Pages STOC18-1–STOC18-44https://doi.org/10.1137/18M1197655

For over a decade now we have been witnessing the success of massive parallel computation frameworks, such as MapReduce, Hadoop, Dryad, or Spark. Compared to the classic distributed algorithms or PRAM models, these frameworks allow for much more local ...

research-article
Smooth Heaps and a Dual View of Self-Adjusting Data Structures
Pages STOC18-45–STOC18-93https://doi.org/10.1137/18M1195188

We present a new connection between self-adjusting binary search trees (BSTs) and heaps, two fundamental, extensively studied, and practically relevant families of data structures [B. Allen and I. Munro, J. ACM, 25 (1978), pp. 526--535; D. D. Sleator and R. ...

research-article
Collusion Resistant Traitor Tracing from Learning with Errors
Pages STOC18-94–STOC18-241https://doi.org/10.1137/18M1197825

In this work we provide a traitor tracing construction with ciphertexts that grow polynomially in $\log(n)$, where $n$ is the number of users, and prove it secure under the learning with errors (LWE) assumption. This is the first traitor tracing scheme ...

research-article
Pseudorandom Pseudo-distributions with Near-Optimal Error for Read-Once Branching Programs
Pages STOC18-242–STOC18-299https://doi.org/10.1137/18M1197734

Nisan [Combinatorica, 12 (1992), pp. 449--461] constructed a pseudorandom generator for length $n$, width $n$ read-once branching programs (ROBPs) with error $\varepsilon$ and seed length $O(\log^2{n} + \log{n} \cdot \log(1/\varepsilon))$. A major goal in ...

research-article
Circuit Lower Bounds for Nondeterministic Quasi-polytime from a New Easy Witness Lemma
Pages STOC18-300–STOC18-322https://doi.org/10.1137/18M1195887

We prove that if every problem in ${NP}$ has $n^k$-size circuits for a fixed constant $k$, then for every ${NP}$-verifier and every yes-instance $x$ of length $n$ for that verifier, the verifier's search space has an $n^{O(k^3)}$-size witness circuit: A ...

research-article
Crossing the Logarithmic Barrier for Dynamic Boolean Data Structure Lower Bounds
Pages STOC18-323–STOC18-367https://doi.org/10.1137/18M1198429

This paper proves the first superlogarithmic lower bounds on the cell probe complexity of dynamic Boolean (also known as decision) data structure problems, a long-standing milestone in data structure lower bounds. We introduce a new method for proving ...

research-article
Shadow Tomography of Quantum States
Pages STOC18-368–STOC18-394https://doi.org/10.1137/18M120275X

We introduce the problem of shadow tomography: given an unknown $D$-dimensional quantum mixed state $\rho$, as well as known two-outcome measurements $E_{1},\ldots,E_{M}$, estimate the probability that $E_{i}$ accepts $\rho$, to within additive error $\...

research-article
Inapproximability of the Independent Set Polynomial in the Complex Plane
Pages STOC18-395–STOC18-448https://doi.org/10.1137/18M1184485

We study the complexity of approximating the value of the independent set polynomial $Z_G(\lambda)$ of a graph $G$ with maximum degree $\Delta$ when the activity $\lambda$ is a complex number. When $\lambda$ is real, the complexity picture is well ...

research-article
A Friendly Smoothed Analysis of the Simplex Method
Pages STOC18-449–STOC18-499https://doi.org/10.1137/18M1197205

Explaining the excellent practical performance of the simplex method for linear programming has been a major topic of research for over 50 years. One of the most successful frameworks for understanding the simplex method was given by Spielman and Teng [J. ...

research-article
Nearly Work-Efficient Parallel Algorithm for Digraph Reachability
Pages STOC18-500–STOC18-539https://doi.org/10.1137/18M1197850

One of the simplest problems on directed graphs is that of identifying the set of vertices reachable from a designated source vertex. This problem can be solved easily sequentially by performing a graph search, but efficient parallel algorithms have eluded ...

research-article
Special Section on the Fiftieth Annual ACM Symposium on Theory of Computing (STOC 2018)
Pages STOC18-i–STOC18-iihttps://doi.org/10.1137/20N975154

This issue of SICOMP contains 10 specially selected papers from the Fiftieth Annual ACM Symposium on Theory of Computing, otherwise known as STOC 2018, held June 25 to 29 in Los Angeles, California. The papers here were chosen to represent both the ...

    Comments