-
1Report
المؤلفون: Horel, Thibaut, Singer, Yaron
المصدر: Advances in Neural Information Processing Systems 29, NeurIPS 2016, pp. 3045-3053
مصطلحات موضوعية: Computer Science - Data Structures and Algorithms, Computer Science - Computational Complexity
URL الوصول: http://arxiv.org/abs/2411.10949
-
2
-
3Report
المؤلفون: Rui, Maryann, Horel, Thibaut, Dahleh, Munther
المصدر: 62nd IEEE Conference on Decision and Control, 2023
مصطلحات موضوعية: Computer Science - Machine Learning, Mathematics - Statistics Theory
URL الوصول: http://arxiv.org/abs/2310.02864
-
4
-
5Report
المؤلفون: Bonatti, Alessandro, Dahleh, Munther, Horel, Thibaut, Nouripour, Amir
المصدر: Journal of Economic Theory, vol. 216, March 2024, 105779
مصطلحات موضوعية: Computer Science - Computer Science and Game Theory
URL الوصول: http://arxiv.org/abs/2202.08780
-
6Report
المؤلفون: Fageot, Julien, Fallah, Alireza, Horel, Thibaut
المصدر: IEEE Transactions on Information Theory, 68 (8), 2022, pp. 4949-4963
مصطلحات موضوعية: Mathematics - Probability, Computer Science - Information Theory, 60E07, 94A17, 60G18
URL الوصول: http://arxiv.org/abs/2009.10753
-
7Report
المؤلفون: Agrawal, Rohit, Horel, Thibaut
المصدر: J. Mach. Learn. Res. 22(128):1-59, 2021
مصطلحات موضوعية: Mathematics - Statistics Theory, Computer Science - Information Theory, Computer Science - Machine Learning, Mathematics - Optimization and Control, 62B10 (Primary) 94A17, 52A40, 46N10 (Secondary)
URL الوصول: http://arxiv.org/abs/2006.05973
-
8Report
المؤلفون: Agarwal, Anish, Dahleh, Munther, Horel, Thibaut, Rui, Maryann
المصدر: Games and Economic Behavior, vol. 148 (Nov. 2024), pp. 323-356
مصطلحات موضوعية: Computer Science - Computer Science and Game Theory
URL الوصول: http://arxiv.org/abs/2003.08345
-
9Report
المصدر: Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing, 2020, pp. 294-307
مصطلحات موضوعية: Computer Science - Data Structures and Algorithms, Computer Science - Cryptography and Security
URL الوصول: http://arxiv.org/abs/1907.08355
-
10Report
المؤلفون: Agrawal, Rohit, Chen, Yi-Hsiu, Horel, Thibaut, Vadhan, Salil
المصدر: Advances in Cryptology - Crypto 2019, Lecture Notes in Computer Science 11693, 2019, pp. 831-858
مصطلحات موضوعية: Computer Science - Cryptography and Security, Computer Science - Computational Complexity
URL الوصول: http://arxiv.org/abs/1902.11202
-
11Report
المؤلفون: Horel, Thibaut, Park, Sunoo, Richelson, Silas, Vaikuntanathan, Vinod
المصدر: 10th Innovations in Theoretical Computer Science Conference (ITCS 2019)
مصطلحات موضوعية: Computer Science - Cryptography and Security
URL الوصول: http://arxiv.org/abs/1802.07381
-
12Report
المؤلفون: Toulis, Panos, Horel, Thibaut, Airoldi, Edoardo M.
المصدر: Journal of the Royal Statistical Society Series B, vol. 83(1), Feb. 2021, pp. 188-212
مصطلحات موضوعية: Mathematics - Statistics Theory, Statistics - Computation, Statistics - Methodology, Statistics - Machine Learning
URL الوصول: http://arxiv.org/abs/1510.00967
-
13Report
المؤلفون: Pouget-Abadie, Jean, Horel, Thibaut
المصدر: Proceedings of the 32nd International Conference on Machine Learning, 2015, pp. 977-986
مصطلحات موضوعية: Computer Science - Social and Information Networks, Computer Science - Machine Learning, Statistics - Machine Learning
URL الوصول: http://arxiv.org/abs/1505.05663
-
14Report
المؤلفون: Horel, Thibaut, Singer, Yaron
المصدر: Proceedings of the 24th International Conference on World Wide Web, 2015, pp. 441-451
URL الوصول: http://arxiv.org/abs/1503.01438
-
15Report
المؤلفون: Horel, Thibaut, Ioannidis, Stratis, Muthukrishnan, S.
المصدر: LATIN 2014: Theoretical Informatics. Lecture Notes in Computer Science Volume 8392, 2014, pp 719-730
مصطلحات موضوعية: Computer Science - Computer Science and Game Theory
URL الوصول: http://arxiv.org/abs/1302.5724
-
16Academic Journal
المساهمون: Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science
المصدر: arXiv
وصف الملف: application/octet-stream
Relation: Proceedings of the Annual ACM Symposium on Theory of Computing; https://hdl.handle.net/1721.1/137337.2; 2021. "Data structures meet cryptography: 3SUM with preprocessing." Proceedings of the Annual ACM Symposium on Theory of Computing.
-
17Academic Journal
المؤلفون: Horel, Thibaut, Park, Sunoo, Richelson, Silas, Vaikuntanathan, Vinod
المساهمون: Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science
المصدر: DROPS
وصف الملف: application/octet-stream
Relation: Leibniz International Proceedings in Informatics, LIPIcs; https://hdl.handle.net/1721.1/137343.2; 2019. "How to subvert backdoored encryption: Security against adversaries that decrypt all ciphertexts." Leibniz International Proceedings in Informatics, LIPIcs, 124.
-
18Academic Journal
المصدر: SSRN Electronic Journal ; ISSN 1556-5068
-
19Electronic Resource
المؤلفون: Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science, Horel, Thibaut, Park, Sunoo, Richelson, Silas, Vaikuntanathan, Vinod
المصدر: DROPS
مصطلحات الفهرس: Article, http://purl.org/eprint/type/ConferencePaper
URL:
https://hdl.handle.net/1721.1/137343.2
10.4230/LIPIcs.ITCS.2019.42
Leibniz International Proceedings in Informatics, LIPIcs -
20Academic Journal
المؤلفون: Fageot, Julien, Fallah, Alireza, Horel, Thibaut
المصدر: IEEE Transactions on Information Theory; Aug2022, Vol. 68 Issue 8, p4949-4963, 15p
مصطلحات موضوعية: LEVY processes, POISSON processes, SELF-similar processes, CENTRAL limit theorem, WIENER processes