Hashing is a common technique used in data processing, with a strong imp...
The Sparse Johnson-Lindenstrauss Transform of Kane and Nelson (SODA
2012...
We revisit Nisan's classical pseudorandom generator (PRG) for space-boun...
Given a simple n-vertex, m-edge graph G undergoing edge insertions and
d...
Sketching is an important tool for dealing with high-dimensional vectors...
Simple tabulation hashing dates back to Zobrist in 1970 and is defined a...
We present a dynamic algorithm for maintaining the connected and
2-edge-...
We consider the numerical taxonomy problem of fitting a positive distanc...
We consider the problems of sampling and counting edges from a graph on ...
In dynamic load balancing, we wish to distribute balls into bins in an
e...
The classic way of computing a k-universal hash function is to use a ran...
To get estimators that work within a certain error bound with high
proba...
Each vertex of an arbitrary simple graph on n vertices chooses k random
...
The three-in-a-tree problem is to determine if a simple undirected graph...
We say that a simple, closed curve γ in the plane has bounded convex
cur...
We provide a simple new randomized contraction approach to the global mi...
Consider collections A and B of red and blue sets,
respectively. Bichrom...
Previous work on tabulation hashing of Pǎtraşcu and Thorup from
STOC'11 ...
Locality-sensitive hashing (LSH), introduced by Indyk and Motwani in STO...
We consider the hashing of a set X⊆ U with |X|=m using a simple
tabulati...
Recently, Kawarabayashi and Thorup presented the first deterministic
edg...
When deciding where to place access points in a wireless network, it is
...
Suppose that we are to place m balls into n bins sequentially using the
...
We consider very natural "fence enclosure" problems studied by Capoyleas...
Hashing is a basic tool for dimensionality reduction employed in several...
For high volume data streams and large data warehouses, sampling is used...