-
1
-
-
33748093542
-
Private approximation of search problems
-
A. Beimel, P. Carmi, K. Nissim, and E. Weinreb. Private approximation of search problems. In Proc. of the 38th STOC, pages 119-128, 2006.
-
(2006)
Proc. of the 38th STOC
, pp. 119-128
-
-
Beimel, A.1
Carmi, P.2
Nissim, K.3
Weinreb, E.4
-
2
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computations
-
M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness theorems for non-cryptographic fault-tolerant distributed computations. In Proc. of the 20th STOC pages 1-10, 1988.
-
(1988)
Proc. of the 20th STOC
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
3
-
-
0001388818
-
On isomorphisms and density of NP and other complete sets
-
L. Berman and J. Hartmanis. On isomorphisms and density of NP and other complete sets. SICOMP, 6:305-322, 1977.
-
(1977)
SICOMP
, vol.6
, pp. 305-322
-
-
Berman, L.1
Hartmanis, J.2
-
4
-
-
33244468835
-
Practical privacy: The SuLQ framework
-
A. Blum, C. Dwork, F. McSherry, and K. Nissim. Practical privacy: the SuLQ framework. In Proc. of the 24th PODS, pages 128-138, 2005.
-
(2005)
Proc. of the 24th PODS
, pp. 128-138
-
-
Blum, A.1
Dwork, C.2
McSherry, F.3
Nissim, K.4
-
5
-
-
84937424609
-
On the hardness of approximating NP witnesses
-
3rd APPROX, of
-
U. Feige, M. Langberg, and K. Nissim. On the hardness of approximating NP witnesses. In 3rd APPROX, volume 1913 of LNCS, pages 120-131. 2000.
-
(2000)
LNCS
, vol.1913
, pp. 120-131
-
-
Feige, U.1
Langberg, M.2
Nissim, K.3
-
6
-
-
33748996753
-
Secure multiparty computation of approximations
-
J. Feigenbaum, Y. Ishai, T. Malkin, K. Nissim, M. J. Strauss, and R. N. Wright. Secure multiparty computation of approximations. TALG, 2(3):435-472, 2006.
-
(2006)
TALG
, vol.2
, Issue.3
, pp. 435-472
-
-
Feigenbaum, J.1
Ishai, Y.2
Malkin, T.3
Nissim, K.4
Strauss, M.J.5
Wright, R.N.6
-
7
-
-
35048820609
-
Efficient private matching and set intersection
-
EUROCRYPT 2004, of
-
M. J. Freedman, K. Nissim, and B. Pinkas. Efficient private matching and set intersection. In EUROCRYPT 2004, volume 3027 of LNCS, pages 1-19. 2004.
-
(2004)
LNCS
, vol.3027
, pp. 1-19
-
-
Freedman, M.J.1
Nissim, K.2
Pinkas, B.3
-
9
-
-
0021938963
-
Clustering to minimize the maximum inter-cluster distance
-
T. F. Gonzalez. Clustering to minimize the maximum inter-cluster distance. TCS, 38:293-306, 1985.
-
(1985)
TCS
, vol.38
, pp. 293-306
-
-
Gonzalez, T.F.1
-
10
-
-
0034832945
-
Private approximation of NP-hard functions
-
S. Halevi, R. Krauthgamer, E. Kushilevitz, and K. Nissim. Private approximation of NP-hard functions. In Proc. of the 33th STOC, pages 550-559, 2001.
-
(2001)
Proc. of the 33th STOC
, pp. 550-559
-
-
Halevi, S.1
Krauthgamer, R.2
Kushilevitz, E.3
Nissim, K.4
-
11
-
-
38049049510
-
A unified approach to approximation algorithms for bottleneck problems
-
D. S. Hochbaum and D. B. Shmoys. A unified approach to approximation algorithms for bottleneck problems. JACM, 533-550:33, 1986.
-
(1986)
JACM
, vol.533-550
, pp. 33
-
-
Hochbaum, D.S.1
Shmoys, D.B.2
-
12
-
-
0018542104
-
Easy and hard bottleneck location problems
-
W. L. Hsu and G. L. Nemhauser. Easy and hard bottleneck location problems. DAM, 1:209-216, 1979.
-
(1979)
DAM
, vol.1
, pp. 209-216
-
-
Hsu, W.L.1
Nemhauser, G.L.2
-
13
-
-
33745565439
-
Polylogarithmic private approximations and efficient matching
-
TCC 2006, of
-
P. Indyk and D. Woodruff. Polylogarithmic private approximations and efficient matching. In TCC 2006, volume 3876 of LNCS, pages 245-264. 2006.
-
(2006)
LNCS
, vol.3876
, pp. 245-264
-
-
Indyk, P.1
Woodruff, D.2
-
14
-
-
0018683792
-
An algorithmic approach to network location problems, part I: The p-centers
-
O. Kariv and S. L. Hakimi. An algorithmic approach to network location problems, part I: the p-centers. SIAM J. Appl. Math, 37:513-538, 1979.
-
(1979)
SIAM J. Appl. Math
, vol.37
, pp. 513-538
-
-
Kariv, O.1
Hakimi, S.L.2
-
15
-
-
24144477856
-
Secure computation of the mean and related statistics
-
TCC 2005, of
-
E. Kiltz, G. Leander, and J. Malone-Lee. Secure computation of the mean and related statistics. In , TCC 2005, volume 3378 of LNCS, pages 283-302. 2005.
-
(2005)
LNCS
, vol.3378
, pp. 283-302
-
-
Kiltz, E.1
Leander, G.2
Malone-Lee, J.3
-
16
-
-
0032644512
-
-
R. Kumar and D. Sivakumar. Proofs, codes, and polynomial-time reducibilities. In Proc. of the 14th CCC, pages 46-53, 1999.
-
R. Kumar and D. Sivakumar. Proofs, codes, and polynomial-time reducibilities. In Proc. of the 14th CCC, pages 46-53, 1999.
-
-
-
-
18
-
-
4544347793
-
On the computational complexity of centers locating in a graph
-
J. Plesnik. On the computational complexity of centers locating in a graph. Aplikace Matematiky, 25:445-452, 1980.
-
(1980)
Aplikace Matematiky
, vol.25
, pp. 445-452
-
-
Plesnik, J.1
-
19
-
-
85012790637
-
On the difference between one and many
-
Proc. of the 4th ICALP, of
-
J. Simon. On the difference between one and many. In Proc. of the 4th ICALP, volume 52 of LNCS, pages 480-491. 1977.
-
(1977)
LNCS
, vol.52
, pp. 480-491
-
-
Simon, J.1
-
21
-
-
0022911518
-
NP is as easy as detecting unique solutions
-
L. G. Valiant and V. V. Vazirani. NP is as easy as detecting unique solutions. TCS, 47:85-93, 1986.
-
(1986)
TCS
, vol.47
, pp. 85-93
-
-
Valiant, L.G.1
Vazirani, V.V.2
-
22
-
-
0020312165
-
Protocols for secure computations
-
A. C. Yao. Protocols for secure computations. In Proc. of the 23th FOCS, pages 160-164, 1982.
-
(1982)
Proc. of the 23th FOCS
, pp. 160-164
-
-
Yao, A.C.1
|