[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Volume 65, Issue 4August 2018Distributed Computing, Cryptography, Distributed Computing, Cryptography, Coding Theory, Automata Theory, Complexity Theory, Programming Languages, Algorithms, Invited Paper Foreword and Databases
Reflects downloads up to 09 Jan 2025Bibliometrics
Skip Table Of Content Section
SECTION: Distributed Computing
research-article
Rumor Spreading and Conductance
Article No.: 17, Pages 1–21https://doi.org/10.1145/3173043

In this article, we study the completion time of the PUSH-PULL variant of rumor spreading, also known as randomized broadcast. We show that if a network has n nodes and conductance ϕ then, with high probability, PUSH-PULL will deliver the message to all ...

SECTION: Cryptography
research-article
Path ORAM: An Extremely Simple Oblivious RAM Protocol
Article No.: 18, Pages 1–26https://doi.org/10.1145/3177872

We present Path ORAM, an extremely simple Oblivious RAM protocol with a small amount of client storage. Partly due to its simplicity, Path ORAM is the most practical ORAM scheme known to date with small client storage. We formally prove that Path ORAM ...

SECTION: Distributed Computing
research-article
Public Access
Distributed (Δ +1)-Coloring in Sublogarithmic Rounds
Article No.: 19, Pages 1–21https://doi.org/10.1145/3178120

We give a new randomized distributed algorithm for (Δ +1)-coloring in the LOCAL model, running in O(√ log Δ)+ 2O(√log log n) rounds in a graph of maximum degree Δ. This implies that the (Δ +1)-coloring problem is easier than the maximal independent set ...

SECTION: Cryptography, Coding Theory
research-article
Public Access
Non-Malleable Codes
Article No.: 20, Pages 1–32https://doi.org/10.1145/3178432

We introduce the notion of “non-malleable codes” which relaxes the notion of error correction and error detection. Informally, a code is non-malleable if the message contained in a modified codeword is either the original message, or a completely ...

SECTION: Automata Theory
research-article
Equivalence of Deterministic Top-Down Tree-to-String Transducers Is Decidable
Article No.: 21, Pages 1–30https://doi.org/10.1145/3182653

We prove that equivalence of deterministic top-down tree-to-string transducers is decidable, thus solving a long-standing open problem in formal language theory. We also present efficient algorithms for subclasses: for linear transducers or total ...

SECTION: Complexity Theory
research-article
Public Access
Threesomes, Degenerates, and Love Triangles
Article No.: 22, Pages 1–25https://doi.org/10.1145/3185378

The 3SUM problem is to decide, given a set of n real numbers, whether any three sum to zero. It is widely conjectured that a trivial O(n2)-time algorithm is optimal on the Real RAM, and optimal even in the nonuniform linear decision tree model. Over the ...

SECTION: Programming Languages
research-article
Full Abstraction for Probabilistic PCF
Article No.: 23, Pages 1–44https://doi.org/10.1145/3164540

We present a probabilistic version of PCF, a well-known simply typed universal functional language. The type hierarchy is based on a single ground type of natural numbers. Even if the language is globally call-by-name, we allow a call-by-value ...

SECTION: Algorithms
research-article
Open Access
Optimal Multi-Way Number Partitioning
Article No.: 24, Pages 1–61https://doi.org/10.1145/3184400

The NP-hard number-partitioning problem is to separate a multiset S of n positive integers into k subsets such that the largest sum of the integers assigned to any subset is minimized. The classic application is scheduling a set of n jobs with different ...

SECTION: Invited Paper Foreword
editorial
Free
Invited Article Foreword
Article No.: 25, Pages 1–61https://doi.org/10.1145/3231052
SECTION: Databases
research-article
Minimization of Tree Patterns
Article No.: 26, Pages 1–46https://doi.org/10.1145/3180281

Many of today’s graph query languages are based on graph pattern matching. We investigate optimization of tree-shaped patterns that have transitive closure operators. Such patterns not only appear in the context of graph databases but also were ...

Subjects

Comments

Please enable JavaScript to view thecomments powered by Disqus.