Realizing flexible broadcast encryption: How to broadcast to a public-key directory
Suppose a user wants to broadcast an encrypted message to K recipients. With public-key
encryption, the sender would construct K different ciphertexts, one for each recipient. The …
encryption, the sender would construct K different ciphertexts, one for each recipient. The …
Approximation algorithms in combinatorial scientific computing
We survey recent work on approximation algorithms for computing degree-constrained
subgraphs in graphs and their applications in combinatorial scientific computing. The …
subgraphs in graphs and their applications in combinatorial scientific computing. The …
Design, implementation, and analysis of maximum transversal algorithms
We report on careful implementations of seven algorithms for solving the problem of finding
a maximum transversal of a sparse matrix. We analyze the algorithms and discuss the …
a maximum transversal of a sparse matrix. We analyze the algorithms and discuss the …
SicHash-small irregular cuckoo tables for perfect hashing
A Perfect Hash Function (PHF) is a hash function that has no collisions on a given input set.
PHFs can be used for space efficient storage of data in an array, or for determining a …
PHFs can be used for space efficient storage of data in an array, or for determining a …
Parallel sparse polynomial interpolation over finite fields
SMM Javadi, M Monagan - … of the 4th International Workshop on Parallel …, 2010 - dl.acm.org
We present a probabilistic algorithm to interpolate a sparse multivariate polynomial over a
finite field, represented with a black box. Our algorithm modifies the algorithm of Ben-Or and …
finite field, represented with a black box. Our algorithm modifies the algorithm of Ben-Or and …
A near Pareto optimal approach to student–supervisor allocation with two sided preferences and workload balance
The problem of allocating students to supervisors for the development of a personal project
or a dissertation is a crucial activity in the higher education environment, as it enables …
or a dissertation is a crucial activity in the higher education environment, as it enables …
Optimal relative pose with unknown correspondences
Previous work on estimating the epipolar geometry of two views relies on being able to
reliably match feature points based on appearance. In this paper, we go one step further and …
reliably match feature points based on appearance. In this paper, we go one step further and …
Worst-case to expander-case reductions
A Abboud, N Wallheimer - arxiv preprint arxiv:2211.12833, 2022 - arxiv.org
In recent years, the expander decomposition method was used to develop many graph
algorithms, resulting in major improvements to longstanding complexity barriers. This …
algorithms, resulting in major improvements to longstanding complexity barriers. This …
Computing maximum cardinality matchings in parallel on bipartite graphs via tree-grafting
It is difficult to obtain high performance when computing matchings on parallel processors
because matching algorithms explicitly or implicitly search for paths in the graph, and when …
because matching algorithms explicitly or implicitly search for paths in the graph, and when …
An evaluation of network architectures for next generation supercomputers
D Chen, P Heidelberger, C Stunkel… - … and Simulation of …, 2016 - ieeexplore.ieee.org
We survey network topologies, in particular networks with full all-to-all bandwidth scaling.
For more detailed study, we select several recently introduced, promising networks that are …
For more detailed study, we select several recently introduced, promising networks that are …