Abstract is missing.
- Spectral methods for matrices and tensorsRavindran Kannan. 1-12 [doi]
- Are many small sets explicitly small?Michel Talagrand. 13-36 [doi]
- Perfect matchings in o(::::n:::: log ::::n::::) time in regular bipartite graphsAshish Goel, Michael Kapralov, Sanjeev Khanna. 39-46 [doi]
- Extensions and limits to vertex sparsificationFrank Thomson Leighton, Ankur Moitra. 47-56 [doi]
- Subgraph sparsification and nearly optimal ultrasparsifiersAlexandra Kolla, Yury Makarychev, Amin Saberi, Shang-Hua Teng. 57-66 [doi]
- How to compress interactive communicationBoaz Barak, Mark Braverman, Xi Chen, Anup Rao. 67-76 [doi]
- Hardness amplification in proof complexityPaul Beame, Trinh Huynh, Toniann Pitassi. 87-96 [doi]
- Load balancing and orientability thresholds for random hypergraphsPu Gao, Nicholas C. Wormald. 97-104 [doi]
- Combinatorial approach to the interpolation method and scaling limits in sparse random graphsMohsen Bayati, David Gamarnik, Prasad Tetali. 105-114 [doi]
- The maximum multiflow problems with bounded fractionalityHiroshi Hirai. 115-120 [doi]
- Faster approximation schemes for fractional multicommodity flow problems via dynamic graph algorithmsAleksander Madry. 121-130 [doi]
- A full characterization of quantum adviceScott Aaronson, Andrew Drucker. 131-140 [doi]
- A quantum lovász local lemmaAndris Ambainis, Julia Kempe, Or Sattath. 151-160 [doi]
- Near-optimal extractors against quantum storageAnindya De, Thomas Vidick. 161-170 [doi]
- Public-key cryptography from different assumptionsBenny Applebaum, Boaz Barak, Avi Wigderson. 171-180 [doi]
- Oblivious RAMs without cryptogrpahic assumptionsMiklós Ajtai. 181-190 [doi]
- On the round complexity of covert computationVipul Goyal, Abhishek Jain 0002. 191-200 [doi]
- Detecting high log-densities: an ::::O::::(::::n:::::::1/4:::) approximation for densest ::::k::::-subgraphAditya Bhaskara, Moses Charikar, Eden Chlamtac, Uriel Feige, Aravindan Vijayaraghavan. 201-210 [doi]
- Approximation schemes for steiner forest on planar graphs and graphs of bounded treewidthMohammadHossein Bateni, MohammadTaghi Hajiaghayi, Dániel Marx. 211-220 [doi]
- Optimal homologous cycles, total unimodularity, and linear programmingTamal K. Dey, Anil N. Hirani, Bala Krishnamoorthy. 221-230 [doi]
- Improving exhaustive search implies superpolynomial lower boundsRyan Williams. 231-240 [doi]
- On the complexity of circuit satisfiabilityRamamohan Paturi, Pavel Pudlák. 241-250 [doi]
- Satisfiability allows no nontrivial sparsification unless the polynomial-time hierarchy collapsesHolger Dell, Dieter van Melkebeek. 251-260 [doi]
- Recognizing well-parenthesized expressions in the streaming modelFrédéric Magniez, Claire Mathieu, Ashwin Nayak. 261-270 [doi]
- Measuring independence of datasetsVladimir Braverman, Rafail Ostrovsky. 271-280 [doi]
- Zero-one frequency lawsVladimir Braverman, Rafail Ostrovsky. 281-290 [doi]
- Improved algorithms for computing fisher s market clearing prices: computing fisher s market clearing pricesJames B. Orlin. 291-300 [doi]
- Bayesian algorithmic mechanism designJason D. Hartline, Brendan Lucier. 301-310 [doi]
- Multi-parameter mechanism design and sequential posted pricingShuchi Chawla, Jason D. Hartline, David L. Malec, Balasubramanian Sivan. 311-320 [doi]
- Saving space by algebraizationDaniel Lokshtanov, Jesper Nederlof. 321-330 [doi]
- On the structure of cubic and quartic polynomialsElad Haramaty, Amir Shpilka. 331-340 [doi]
- A sparse Johnson: Lindenstrauss transformAnirban Dasgupta, Ravi Kumar, Tamás Sarlós. 341-350 [doi]
- A deterministic single exponential time algorithm for most lattice problems based on voronoi cell computationsDaniele Micciancio, Panagiotis Voulgaris. 351-358 [doi]
- Sorting under partial information (without the ellipsoid algorithm)Jean Cardinal, Samuel Fiorini, Gwenaël Joret, Raphaël M. Jungers, J. Ian Munro. 359-368 [doi]
- Matroid matching: the power of local searchJon Lee, Maxim Sviridenko, Jan Vondrák. 369-378 [doi]
- Budget constrained auctions with heterogeneous itemsSayan Bhattacharya, Gagan Goel, Sreenivas Gollapudi, Kamesh Munagala. 379-388 [doi]
- On the searchability of small-world networks with arbitrary underlying structurePierre Fraigniaud, George Giakkoupis. 389-398 [doi]
- Almost tight bounds for rumour spreading with conductanceFlavio Chierichetti, Silvio Lattanzi, Alessandro Panconesi. 399-408 [doi]
- On the list-decodability of random linear codesVenkatesan Guruswami, Johan Håstad, Swastik Kopparty. 409-416 [doi]
- Local list-decoding and testing of random linear codes from high errorSwastik Kopparty, Shubhangi Saraf. 417-426 [doi]
- Pseudorandom generators for polynomial threshold functionsRaghu Meka, David Zuckerman. 427-436 [doi]
- Efficiency improvements in constructing pseudorandom generators from one-way functionsIftach Haitner, Omer Reingold, Salil P. Vadhan. 437-446 [doi]
- The limits of buffering: a tight lower bound for dynamic membership in the external memory modelElad Verbin, Qin Zhang. 447-456 [doi]
- Maintaining a large matching and a small vertex coverKrzysztof Onak, Ronitt Rubinfeld. 457-464 [doi]
- Connectivity oracles for failure prone graphsRan Duan, Seth Pettie. 465-474 [doi]
- Approximate sparse recovery: optimizing time and measurementsAnna C. Gilbert, Yi Li, Ely Porat, Martin J. Strauss. 475-484 [doi]
- The HOM problem is decidableGuillem Godoy, Omer Giménez, Lander Ramos, Carme Àlvarez. 485-494 [doi]
- Complexity theory for operators in analysisAkitoshi Kawamura, Stephen Cook. 495-502 [doi]
- Solving polynomial equations in smoothed polynomial time and a near solution to smale s 17th problemPeter Bürgisser, Felipe Cucker. 503-512 [doi]
- Distributed computation in dynamic networksFabian Kuhn, Nancy A. Lynch, Rotem Oshman. 513-522 [doi]
- Bounding the average sensitivity and noise sensitivity of polynomial threshold functionsIlias Diakonikolas, Prahladh Harsha, Adam Klivans, Raghu Meka, Prasad Raghavendra, Rocco A. Servedio, Li-Yang Tan. 533-542 [doi]
- An invariance principle for polytopesPrahladh Harsha, Adam Klivans, Raghu Meka. 543-552 [doi]
- Efficiently learning mixtures of two GaussiansAdam Tauman Kalai, Ankur Moitra, Gregory Valiant. 553-562 [doi]
- Augmenting undirected node-connectivity by oneLászló A. Végh. 563-572 [doi]
- QIP = PSPACERahul Jain, Zhengfeng Ji, Sarvagya Upadhyay, John Watrous. 573-582 [doi]
- An improved LP-based approximation for steiner treeJaroslaw Byrka, Fabrizio Grandoni, Thomas Rothvoß, Laura Sanità. 583-592 [doi]
- Changing base without losing spaceYevgeniy Dodis, Mihai Patrascu, Mikkel Thorup. 593-602 [doi]
- Towards polynomial lower bounds for dynamic problemsMihai Patrascu. 603-610 [doi]
- An optimal ancestry scheme and small universal posetsPierre Fraigniaud, Amos Korman. 611-620 [doi]
- Bilipschitz snowflakes and metrics of negative typeJames R. Lee, Mohammad Moharrami. 621-630 [doi]
- Approximations for the isoperimetric and spectral profile of graphs and related parametersPrasad Raghavendra, David Steurer, Prasad Tetali. 631-640 [doi]
- Weighted geometric set cover via quasi-uniform samplingKasturi Varadarajan. 641-648 [doi]
- Deterministic identity testing of depth-4 multilinear circuits with bounded top fan-inZohar Shay Karnin, Partha Mukhopadhyay, Amir Shpilka, Ilya Volkovich. 649-658 [doi]
- Non-commutative circuits and the sum-of-squares problemPavel Hrubes, Avi Wigderson, Amir Yehudayoff. 667-676 [doi]
- On the hardness of the noncommutative determinantVikraman Arvind, Srikanth Srinivasan. 677-686 [doi]
- A shorter proof of the graph minor algorithm: the unique linkage theoremKen-ichi Kawarabayashi, Paul Wollan. 687-694 [doi]
- Odd cycle packingKen-ichi Kawarabayashi, Bruce A. Reed. 695-704 [doi]
- On the geometry of differential privacyMoritz Hardt, Kunal Talwar. 705-714 [doi]
- Differential privacy under continual observationCynthia Dwork, Moni Naor, Toniann Pitassi, Guy N. Rothblum. 715-724 [doi]
- On the complexity of #CSPMartin E. Dyer, David Richerby. 725-734 [doi]
- Tractable hypergraph properties for constraint satisfaction and conjunctive queriesDániel Marx. 735-744 [doi]
- Conditional hardness of precedence constrained scheduling on identical machinesOla Svensson. 745-754 [doi]
- Graph expansion and the unique games conjecturePrasad Raghavendra, David Steurer. 755-764 [doi]
- Interactive privacy via the median mechanismAaron Roth, Tim Roughgarden. 765-774 [doi]
- The price of privately releasing contingency tables and the spectra of random matrices with correlated rowsShiva Prasad Kasiviswanathan, Mark Rudelson, Adam Smith, Jonathan Ullman. 775-784 [doi]
- Privacy amplification with asymptotically optimal entropy lossNishanth Chandran, Bhavana Kanukurthi, Rafail Ostrovsky, Leonid Reyzin. 785-794 [doi]
- Erratum for: on basing one-way functions on NP-hardnessAdi Akavia, Oded Goldreich, Shafi Goldwasser, Dana Moshkovitz. 795-796 [doi]