279 results on '"T-H. Hubert Chan"'
Search Results
2. Advanced Composition Theorems for Differential Obliviousness.
3. Fully Dynamic Algorithms for Euclidean Steiner Tree.
4. Privacy Amplification by Iteration for ADMM with (Strongly) Convex Objective Functions.
5. Finding Subgraphs with Maximum Total Density and Limited Overlap in Weighted Hypergraphs.
6. Fully Dynamic k-Center Clustering with Outliers.
7. Game-Theoretically Secure Protocols for the Ordinal Random Assignment Problem.
8. Clustering Social Media Data for Bitcoin Price Prediction with Transformer Model.
9. Generalized Sorting with Predictions Revisited.
10. Max-Min Greedy Matching Problem: Hardness for the Adversary and Fractional Variant.
11. A Theory of Composition for Differential Obliviousness.
12. Game-Theoretically Secure Distributed Protocols for Fair Allocation in Coalitional Games.
13. Symmetric Splendor: Unraveling Universally Closest Refinements and Fisher Market Equilibrium through Density-Friendly Decomposition.
14. Mechanism Design for Automated Market Makers.
15. Communication complexity of byzantine agreement, revisited.
16. A feedforward unitary equivariant neural network.
17. Locally Differentially Private Sparse Vector Aggregation.
18. Fully Dynamic k-Center Clustering with Outliers.
19. Max-min greedy matching problem: Hardness for the adversary and fractional variant.
20. Opinion Dynamics Optimization by Varying Susceptibility to Persuasion via Non-Convex Local Search.
21. Fully Dynamic $k$k-Center Clustering With Improved Memory Efficiency.
22. Foundations of Differentially Oblivious Algorithms.
23. Privacy Amplification by Iteration for ADMM with (Strongly) Convex Objective Functions.
24. Fully Dynamic Algorithms for Euclidean Steiner Tree.
25. Perfectly Oblivious (Parallel) RAM Revisited, and Improved Constructions.
26. Differentially Oblivious Database Joins: Overcoming the Worst-Case Curse of Fully Oblivious Algorithms.
27. On the Hardness of Opinion Dynamics Optimization with L1-Budget on Varying Susceptibility to Persuasion.
28. Game-Theoretic Fairness Meets Multi-party Protocols: The Case of Leader Election.
29. Maximizing the Expected Influence in Face of the Non-progressive Adversary.
30. Influence Maximization Under the Non-progressive Linear Threshold Model.
31. MPC for MPC: Secure Computation on a Massively Parallel Computing Architecture.
32. Sublinear-Round Byzantine Agreement Under Corrupt Majority.
33. Small Memory Robust Simulation of Client-Server Interactive Protocols over Oblivious Noisy Channels.
34. Bucket Oblivious Sort: An Extremely Simple Oblivious Sort.
35. Distributed approximate k-core decomposition and min-max edge orientation: Breaking the diameter barrier.
36. A Feedforward Unitary Equivariant Neural Network.
37. Advanced Composition Theorems for Differential Obliviousness.
38. Advanced Composition Theorems for Differential Obliviousness
39. Distributed Approximate k-Core Decomposition and Min-Max Edge Orientation: Breaking the Diameter Barrier.
40. Communication Complexity of Byzantine Agreement, Revisited.
41. Revisiting Opinion Dynamics with Varying Susceptibility to Persuasion via Non-Convex Local Search.
42. Locality-Preserving Oblivious RAM.
43. Consensus Through Herding.
44. Foundations of Differentially Oblivious Algorithms.
45. Fully Dynamic Approximate k-Core Decomposition in Hypergraphs.
46. A Unified PTAS for Prize Collecting TSP and Steiner Tree Problem in Doubling Metrics.
47. KClist++: A Simple Algorithm for Finding k-Clique Densest Subgraphs in Large Graphs.
48. Re-Revisiting Learning on Hypergraphs: Confidence Interval, Subgradient Method, and Extension to Multiclass.
49. Generalizing the hypergraph Laplacian via a diffusion process with mediators.
50. Optimizing Social Welfare for Network Bargaining Games in the Face of Instability, Greed and Idealism.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.