We study how to release summary statistics on a data stream subject to t...
We introduce efficient (1+ε)-approximation algorithms for the
binary mat...
We study dynamic algorithms robust to adaptive input generated from sour...
Radial basis function neural networks (RBFNN) are well-known for
their c...
In the online learning with experts problem, an algorithm must make a
pr...
Selective experience replay is a popular strategy for integrating lifelo...
The data management of large companies often prioritize more recent data...
We study the space complexity of the two related fields of differential
...
Kernel matrices, as well as weighted graphs represented by them, are
ubi...
We study fundamental problems in linear algebra, such as finding a maxim...
We study L_p polynomial regression. Given query access to a function
f:[...
We develop a framework for efficiently transforming certain approximatio...
Semidefinite programming (SDP) is a unifying framework that generalizes ...
We introduce data structures for solving robust regression through stoch...
We explore algorithms and limitations for sparse optimization problems s...
Online learning with expert advice is a fundamental problem of sequentia...
We study streaming algorithms in the white-box adversarial model, where ...
We study the ℓ_p regression problem, which requires finding
𝐱∈ℝ^d that m...
(j,k)-projective clustering is the natural generalization of the family ...
k-means clustering is a well-studied problem due to its wide applicabili...
The Wasserstein barycenter is a geometric construct which captures the n...
The sliding window model generalizes the standard streaming model and of...
In the G-sampling problem, the goal is to output an index i of a vector
...
The Boolean Hidden Matching (BHM) problem, introduced in a seminal paper...
In this paper, we introduce adversarially robust streaming algorithms fo...
We consider the problem of learning a latent k-vertex simplex
K⊂ℝ^d, giv...
We study the classical problem of moment estimation of an underlying vec...
We introduce difference estimators for data stream computation, which pr...
We consider the sensitivity of algorithms for the maximum matching probl...
Model compression is crucial for deployment of neural networks on device...
We present three provably accurate, polynomial time, approximation algor...
A proof of sequential work allows a prover to convince a resource-bounde...
We develop an economic model of an offline password cracker which allows...
Adaptive sampling is a useful algorithmic tool for data summarization
pr...
Network performance problems are notoriously difficult to diagnose. Prio...
Memory hard functions (MHFs) are an important cryptographic primitive th...
A function f : F_2^n →R is s-sparse if it has at
most s non-zero Fourier...
The problem of selecting a small-size representative summary of a large
...
Constructions of locally decodable codes (LDCs) have one of two undesira...
In the time-decay model for data streams, elements of an underlying data...
Model compression provides a means to efficiently deploy deep neural net...
We study the problem of constructing a linear sketch of minimum dimensio...
We propose the first adversarially robust algorithm for monotone submodu...
The cumulative pebbling complexity of a directed acyclic graph G is defi...
We initiate the study of numerical linear algebra in the sliding window
...
We study the distinct elements and ℓ_p-heavy hitters problems in the
sli...
Error-correcting codes that admit local decoding and correcting algorith...
We investigate the problem of detecting periodic trends within a string ...
Analyzing patterns in data streams generated by network traffic, sensor
...
We present linear-time algorithms for partitioning a path or a tree with...