Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
SIAM Journal on Computing
Society for Industrial and Applied Mathematics
 
   
 
Options:
 
  1-10 of 323 reviews Date Reviewed 
  Playing games with approximation algorithms
Kakade S., Kalai A., Ligett K. SIAM Journal on Computing 39(3): 1088-1106, 2009.  Type: Article

Suppose a delivery truck visits the same customers every day, but traffic conditions are unknown and vary. What is the best route for the truck to take? This is one (briefly mentioned) example of the kind of problem addressed by this p...

Jun 16 2010
  Optimal power-down strategies
Augustine J., Irani S., Swamy C. SIAM Journal on Computing 37(5): 1499-1516, 2008.  Type: Article

Electronic devices usually offer many functions; most of them, though critical for the correct operation of the device, are hidden from the user. Each function has its own power requirements; all functions are active at the same time, ...

Oct 9 2008
  Identity-based encryption from the Weil pairing
Boneh D., Franklin M. SIAM Journal on Computing 32(3): 586-615, 2003.  Type: Article

An identity-based cryptosystem is a public key cryptosystem that allows arbitrary public keys; this paper presents a complete description of one. The encryption and decryption are reminiscent of the Diffie-Hellman and El Gamal systems,...

Jun 7 2007
  Reconstructing chromosomal evolution
Wang L., Warnow T. SIAM Journal on Computing 36(1): 99-131, 2006.  Type: Article

Wang and Warnow introduce two polynomial time algorithms, EXACT-IEBP and Approx-IEBP, for estimating the actual number of rearrangements that have taken place in the evolutionary history between two chromosomes. They employ inversions,...

Apr 4 2007
  Online scheduling of precedence constrained tasks
Huo Y., Leung J. SIAM Journal on Computing 34(3): 743-762, 2005.  Type: Article

Scheduling theory has received a lot of attention in the last few years. Basic scheduling theory deals with the problem of scheduling n tasks, with precedence constraints, on m machines. Each task ...

Feb 6 2007
  The computational complexity of Tutte invariants for planar graphs
Vertigan D. SIAM Journal on Computing 35(3): 690-712, 2005.  Type: Article

The Tutte polynomial for a graph (or matroid) is a two-variable polynomial that summarizes many of the graph’s invariants. The values of these invariants can be obtained by evaluating the Tutte polynomial at an appropriat...

Jan 16 2007
  Bounds on the efficiency of generic cryptographic constructions
Gennaro R., Gertner Y., Katz J., Trevisan L. SIAM Journal on Computing 35(1): 217-246, 2005.  Type: Article

This paper studies the possibility of improving the efficiency of cryptographic protocols when they are based on general assumptions. The overall result obtained is that the efficiency of many of the known constructions based on genera...

Mar 30 2006
  SRT division algorithms as dynamical systems
McCann M., Pippenger N. SIAM Journal on Computing 34(6): 1279-1301, 2005.  Type: Article

This paper investigates a family of division algorithms (referred to as Sweeney-Robertson-Tocher (SRT)) as examples of dynamical systems. Although the main result of the paper can be understood without recourse to the dynamical systems...

Feb 23 2006
  The difficulty of testing for isomorphism against a graph that is given in advance
Fischer E. SIAM Journal on Computing 34(5): 1147-1158, 2005.  Type: Article

Consider graphs G and H. This paper investigates how many queries are required to test the input graph G for the property of being isomorphic to H. A formal de...

Feb 10 2006
  Pseudorandom generators in propositional proof complexity
Alekhnovich M., Ben-Sasson E., Razborov A., Wigderson A. SIAM Journal on Computing 34(1): 67-88, 2005.  Type: Article

This paper studies the complexity of the inconsistent statement for a system of Boolean functions (S): g1(x1,...,xn)=...

Aug 4 2005
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy