Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleMay 2014
Analyze gauss: optimal bounds for privacy-preserving principal component analysis
STOC '14: Proceedings of the forty-sixth annual ACM symposium on Theory of computingPages 11–20https://doi.org/10.1145/2591796.2591883We consider the problem of privately releasing a low dimensional approximation to a set of data records, represented as a matrix A in which each row corresponds to an individual and each column to an attribute. Our goal is to compute a subspace that ...
- research-articleMay 2014
Optimal error rates for interactive coding I: adaptivity and other settings
STOC '14: Proceedings of the forty-sixth annual ACM symposium on Theory of computingPages 794–803https://doi.org/10.1145/2591796.2591872We consider the task of interactive communication in the presence of adversarial errors and present tight bounds on the tolerable error-rates in a number of different settings.
Most significantly, we explore adaptive interactive communication where the ...
- research-articleMay 2014
Breaking the minsky-papert barrier for constant-depth circuits
STOC '14: Proceedings of the forty-sixth annual ACM symposium on Theory of computingPages 223–232https://doi.org/10.1145/2591796.2591871The threshold degree of a Boolean function f is the minimum degree of a real polynomial p that represents f in sign: f(x) ≡ sgn p(x). In a seminal 1969 monograph, Minsky and Papert constructed a polynomial-size constant-depth {∧, ∨)-circuit in n ...
- research-articleMay 2014
New algorithms and lower bounds for circuits with linear threshold gates
STOC '14: Proceedings of the forty-sixth annual ACM symposium on Theory of computingPages 194–202https://doi.org/10.1145/2591796.2591858Let ACC o THR be the class of constant-depth circuits comprised of AND, OR, and MODm gates (for some constant m > 1), with a bottom layer of gates computing arbitrary linear threshold functions. This class of circuits can be seen as a "midpoint" between ...
- research-articleMay 2014
Communication lower bounds via critical block sensitivity
STOC '14: Proceedings of the forty-sixth annual ACM symposium on Theory of computingPages 847–856https://doi.org/10.1145/2591796.2591838We use critical block sensitivity, a new complexity measure introduced by Huynh and Nordström (STOC 2012), to study the communication complexity of search problems. To begin, we give a simple new proof of the following central result of Huynh and ...
- research-articleMay 2014
Zig-zag sort: a simple deterministic data-oblivious sorting algorithm running in O(n log n) time
STOC '14: Proceedings of the forty-sixth annual ACM symposium on Theory of computingPages 684–693https://doi.org/10.1145/2591796.2591830We describe Zig-zag Sort---a deterministic data-oblivious sorting algorithm running in O(n log n) time that is arguably simpler than previously known algorithms with similar properties, which are based on the AKS sorting network. Because it is data-...
- research-articleMay 2014
Formulas vs. circuits for small distance connectivity
STOC '14: Proceedings of the forty-sixth annual ACM symposium on Theory of computingPages 203–212https://doi.org/10.1145/2591796.2591828We give the first super-polynomial separation in the power of bounded-depth boolean formulas vs. circuits. Specifically, we consider the problem Distance k(n) Connectivity, which asks whether two specified nodes in a graph of size n are connected by a ...
- research-articleMay 2014
How to use indistinguishability obfuscation: deniable encryption, and more
STOC '14: Proceedings of the forty-sixth annual ACM symposium on Theory of computingPages 475–484https://doi.org/10.1145/2591796.2591825We introduce a new technique, that we call punctured programs, to apply indistinguishability obfuscation towards cryptographic problems. We use this technique to carry out a systematic study of the applicability of indistinguishability obfuscation to a ...
- research-articleMay 2014
On derandomizing algorithms that err extremely rarely
STOC '14: Proceedings of the forty-sixth annual ACM symposium on Theory of computingPages 109–118https://doi.org/10.1145/2591796.2591808Does derandomization of probabilistic algorithms become easier when the number of "bad" random inputs is extremely small?
In relation to the above question, we put forward the following quantified derandomization challenge: For a class of circuits C (...