Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
SuLQ - MaRDI portal

SuLQ

From MaRDI portal
Software:23301



swMATH11355MaRDI QIDQ23301


No author found.





Related Items (only showing first 100 items - show all)

Differentially-private learning of low dimensional manifoldsUnnamed ItemUnnamed ItemAnalytical approach to parallel repetitionA characterization of strong approximation resistanceA strongly polynomial algorithm for generalized flow maximizationApproximate distance oracles with constant query timeFaster all-pairs shortest paths via circuit complexitySublinear-time decremental algorithms for single-source reachability and shortest paths on directed graphsZig-zag sortCommunity detection thresholds and the weak Ramanujan propertyDistributed computability in Byzantine asynchronous systemsMultiway cut, pairwise realizable distributions, and descending thresholdsCluster before you hallucinateApproximation algorithms for regret-bounded vehicle routing and applications to distance-constrained vehicle routingImproved approximation algorithms for degree-bounded network design problems with node connectivity requirementsEvery list-decodable code for high noise has abundant near-optimal rate puncturingsNon-malleable codes from additive combinatoricsBreaking the quadratic barrier for 3-LCC's over the realsOptimal error rates for interactive coding IThe asymptotic k-SAT thresholdSatisfiability threshold for random regular NAE-SATCommunication lower bounds via critical block sensitivityComputing with a full memoryHitting sets for multilinear read-once algebraic branching programs, in any orderOn the Complexity of Random Satisfiability Problems with Planted SolutionsSample Complexity Bounds on Differentially Private Learning via Communication ComplexityInapproximability for Antiferromagnetic Spin Systems in the Tree Nonuniqueness RegionCommunication is Bounded by Root of RankAre Lock-Free Concurrent Algorithms Practically Wait-Free?Robust Protocols for Securely Expanding Randomness and Distributing Keys Using Untrusted Quantum DevicesThe Power of Localization for Efficiently Learning Linear Separators with NoiseStrong Hardness of Privacy from Weak Traitor TracingFingerprinting Codes and the Price of Approximate Differential PrivacyUnnamed ItemFinite Sample Differentially Private Confidence IntervalsOur Data, Ourselves: Privacy Via Distributed Noise GenerationStatistical Query Algorithms for Mean Vector Estimation and Stochastic Convex OptimizationComputing payoff allocations in the approximate core of linear programming games in a privacy-preserving mannerEstimation of Wasserstein distances in the spiked transport modelOblivious sampling with applications to two-party \(k\)-means clusteringDifferential Privacy: A Survey of ResultsSuper-Polylogarithmic Hypergraph Coloring Hardness via Low-Degree Long CodesAn Almost-Optimally Fair Three-Party Coin-Flipping ProtocolOptimal CUR Matrix DecompositionsData confidentiality: a review of methods for statistical disclosure limitation and methods for assessing privacyEXPONENTIAL IMPROVEMENT IN PRECISION FOR SIMULATING SPARSE HAMILTONIANSThe average sensitivity of an intersection of half spacesA complete characterization of statistical query learning with applications to evolvabilityPCPs and the hardness of generating synthetic dataLearning privately with labeled and unlabeled examplesA Generalized Approach for Social Network Integration and Analysis with Privacy PreservationNew algorithms and lower bounds for circuits with linear threshold gatesLarge Margin Multiclass Gaussian Classification with Differential PrivacyA distributed protocol for privacy preserving aggregation with non-permanent participantsOptimal data-independent noise for differential privacyDeciding First-Order Properties of Nowhere Dense GraphsThe Matching Polytope has Exponential Extension ComplexityGeneralized bucketization scheme for flexible privacy settingsBounds on the sample complexity for private learning and private data releaseEconomic efficiency requires interactionOrder-Revealing Encryption and the Hardness of Private LearningPrincipal component analysis in the local differential privacy modelAnswering $n^2+o(1)$ Counting Queries with Differential Privacy is HardAsymptotically Optimal and Private Statistical EstimationBounds on the Sample Complexity for Private Learning and Private Data ReleaseUnnamed ItemFingerprinting codes and the price of approximate differential privacyAnalyze gaussPrivate matchings and allocationsRounding sum-of-squares relaxationsConstant factor approximation for balanced cut in the PIE modelEntropy, optimization and countingPolynomial bounds for the grid-minor theoremAn excluded half-integral grid theorem for digraphs and the directed disjoint paths problemCops, robbers, and threatening skeletonsPseudorandom generators with optimal seed length for non-boolean poly-size circuitsOn derandomizing algorithms that err extremely rarelySuper-polynomial lower bounds for depth-4 homogeneous arithmetic formulasLower bounds for depth 4 formulas computing iterated matrix multiplicationThe limits of depth reduction for arithmetic formulasA super-polynomial lower bound for regular arithmetic formulasA characterization of locally testable affine-invariant properties via decomposition theoremsL p -testingTurnstile streaming algorithms might as well be linear sketchesLinear time construction of compressed text indices in compact spaceFormulas vs. circuits for small distance connectivityToward better formula lower boundsBreaking the minsky-papert barrier for constant-depth circuitsThe sample complexity of revenue maximizationOptimal competitive auctionsHomological product codesA quantum algorithm for computing the unit group of an arbitrary degree number fieldPrimal beats dual on online packing LPs in the random-order modelCompetitive algorithms from competitive equilibriaMinimum bisection is fixed parameter tractableAn efficient parallel solver for SDD linear systemsSolving SDD linear systems in nearly m log 1/2 n timeFrom hierarchical partitions to hierarchical coversShortest paths on polyhedral surfaces and terrains


This page was built for software: SuLQ