Realizing flexible broadcast encryption: How to broadcast to a public-key directory

R Garg, G Lu, B Waters, DJ Wu - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
Suppose a user wants to broadcast an encrypted message to K recipients. With public-key
encryption, the sender would construct K different ciphertexts, one for each recipient. The …

Approximation algorithms in combinatorial scientific computing

A Pothen, SM Ferdous, F Manne - Acta Numerica, 2019 - cambridge.org
We survey recent work on approximation algorithms for computing degree-constrained
subgraphs in graphs and their applications in combinatorial scientific computing. The …

Design, implementation, and analysis of maximum transversal algorithms

IS Duff, K Kaya, B Uçcar - ACM Transactions on Mathematical Software …, 2012 - dl.acm.org
We report on careful implementations of seven algorithms for solving the problem of finding
a maximum transversal of a sparse matrix. We analyze the algorithms and discuss the …

SicHash-small irregular cuckoo tables for perfect hashing

HP Lehmann, P Sanders, S Walzer - 2023 Proceedings of the Symposium on …, 2023 - SIAM
A Perfect Hash Function (PHF) is a hash function that has no collisions on a given input set.
PHFs can be used for space efficient storage of data in an array, or for determining a …

Parallel sparse polynomial interpolation over finite fields

SMM Javadi, M Monagan - … of the 4th International Workshop on Parallel …, 2010 - dl.acm.org
We present a probabilistic algorithm to interpolate a sparse multivariate polynomial over a
finite field, represented with a black box. Our algorithm modifies the algorithm of Ben-Or and …

A near Pareto optimal approach to student–supervisor allocation with two sided preferences and workload balance

V Sanchez-Anguix, R Chalumuri, R Aydoğan… - Applied Soft …, 2019 - Elsevier
The problem of allocating students to supervisors for the development of a personal project
or a dissertation is a crucial activity in the higher education environment, as it enables …

Optimal relative pose with unknown correspondences

J Fredriksson, V Larsson… - Proceedings of the …, 2016 - openaccess.thecvf.com
Previous work on estimating the epipolar geometry of two views relies on being able to
reliably match feature points based on appearance. In this paper, we go one step further and …

Worst-case to expander-case reductions

A Abboud, N Wallheimer - arxiv preprint arxiv:2211.12833, 2022 - arxiv.org
In recent years, the expander decomposition method was used to develop many graph
algorithms, resulting in major improvements to longstanding complexity barriers. This …

Computing maximum cardinality matchings in parallel on bipartite graphs via tree-grafting

A Azad, A Buluç, A Pothen - IEEE Transactions on Parallel and …, 2016 - ieeexplore.ieee.org
It is difficult to obtain high performance when computing matchings on parallel processors
because matching algorithms explicitly or implicitly search for paths in the graph, and when …

An evaluation of network architectures for next generation supercomputers

D Chen, P Heidelberger, C Stunkel… - … and Simulation of …, 2016 - ieeexplore.ieee.org
We survey network topologies, in particular networks with full all-to-all bandwidth scaling.
For more detailed study, we select several recently introduced, promising networks that are …