Theory
| A | B | C
| D | E | F | G
| H | I | J |
K | L | M | N |
O | P | Q | R
| S | T | U | V
| W | X | Y | Z
|
A
- Lightweight Signatures and Encryption
for Email
Ben Adida, David Chau, Susan
Hohenberger & Ronald L. Rivest
- Dynamic Processor Allocation
for Adaptively Parallel Jobs
Kunal Agrawal, Yu Xiong He
& Charles E. Leiserson
- On Basing One-Way Functions on NP-Hardness
Adi Akavia, Oded Goldreich,
Shafi Goldwasser & Dana Moshkovitz
- XJava: Java Support for Transactions Everywhere
C. Scott Ananian, Bradley
C. Kuszmaul, Charles E. Leiserson, Gideon Stupp & Jim Sukha
- Approximate Algorithms for High-Dimensional
Geometric Problems
Alex Andoni, Nicole Immorlica,
Piotr Indyk, Vahab Mirrokni & Nitin Thaper
B
- Embeddings into Low-Dimensional Spaces
Mihai Badoi, Julia Chuzhoy,
Erik Demaine, MohammadTaghi Hajiaghayi, Piotr Indyk, Javed Samuel &
Anastasios Sidiropoulos
- Probabilistic Checking of Proofs
Eli Ben-Sasson, Prahladh
Harsha & Madhu Sudan
- Concurrent Cache-Oblivious B-Trees
Michael A. Bender, Jeremy
T. Fineman, Seth Gilbert & Bradley C. Kuszmaul
- Cache-Oblivious Algorithms for Finite
Element Matrix and N-body Simulation
Michael A. Bender, Bradley
C. Kuszmaul, Shanghua Teng & Kebin Wang
- Optimal Paths under Uncertainty:
The Case of Non-linear Objective
Matthew Brand, David Karger
& Evdokia Nikolova
C
- Compact E-Cash
Jan Camenisch, Susan Hohenberger
& Anna Lysyanskaya
- Using Probabilistic I/O Automata to
Analyze an Oblivious Transfer Protocol
Ran Canetti, Ling Cheung,
Dilsun Kaynar, Moses Liskov, Nancy Lynch, Olivier Pereira, Roberto Segala
& Frits Vaandrager
- Distributed Cooperative Computing
and Adversity
Bogdan Chlebus, Chryssis
Georgiou, Darek Kowalski, Alexander Russell & Alex A. Shvartsman
- Fault-Tolerant, Collision-Aware Applications
for Sensor Networks
Gregory Chockler, Murat Demirbas,
Seth Gilbert, Calvin Newport & Tina Nolte
- Rambo: Reconfigurable Atomic Memory
for Basic Objects
Gregory Chockler, Seth Gilbert,
Vincent Gramoli, Nancy Lynch, Peter Musial & Alex Shvartsman
- A Unified Framework for Specifying
and Proving Atomicity
Gregory Chockler, Nancy Lynch,
Sayan Mitra & Joshua Tauber
- The TIOA Simulator
Fivos Constantinou, Dilsun
Kaynar & Panayiotis Mavrommatis
D
- SENSORIO: Verified Code
Generation for Sensor Network Applications
Murat Demirbas, Nancy Lynch
& Dilsun K. Kaynar
- Virtual Nodes: Abstractions for Mobile
Ad Hoc Networks
Shlomi Dolev, Seth Gilbert,
Limor Lahiani, Nancy Lynch, Sayan Mitra, Tina Nolte, Elad Schiller,
Alex Shvartsman & Jennifer Welch
- Bounds for Error-Correcting Codes
Ilya Dumer, Madhu Sudan &
Sergey Yekhanin
F
G
H
- Deterministic Network Coding by Matrix
Completion
Nicholas J.A. Harvey, David
R. Karger & Kazuo Murota
- The Capacity of Information Networks
Nick Harvey, Robert Kleinberg
& April Rasala Lehman
- How To Securely Outsource Cryptographic
Computations
Susan Hohenberger & Anna
Lysyanskaya
I
- First-Price Path Auctions
Nicole Immorlica, David Karger,
Evdokia Nikolova & Rahul Sami
- List Decoding
Piotr Indyk & Madhu Sudan
- Algorithms for Data Streams / Sublinear-space
Computation
Piotr Indyk & David Woodruff
J
L
M
- Duplicate Detection in Semi-Structured
Data|
Nicholas E. Matsakis &
David Karger
- Comparative Modeling of Mainly-Beta Proteins
by Profile Wrapping
Andrew V. McDonnell, Matthew
Menke, Nathan Palmer, Jonathan King, Lenore Cowen & Bonnie Berger
- Cryptography and Coding Theory
Silvio Micali, Chris Peikert,
Adam Smith, Madhu Sudan & David Wilson
- Verifying Average Dwell Time of Hybrid
Systems
Sayan Mitra, Daniel Liberzon
& Nancy Lynch
N
- Self-Stabilizing Hierarchical Tracking
Tina Nolte, Murat Demirbas,
Nancy Lynch & Anish Arora
R
- RFID Privacy and Security
Ronald L. Rivest, Simson
Garfinkel & Stephen A. Weis
S
T
V
- Distributed Computing
with Imperfect Randomness
Vinod Vaikuntanathan, Shafi
Goldwasser & Madhu Sudan
W
|