Lane A. Hemaspaandra  RSS Feed

Total Publications : 130
Total Downloads : 37746
Latest Submission:

Bypassing Combinatorial Protections: Po...
Author

Published: 2013-10-14 11:49:28.766
Most Downloaded:

 Bypassing Combinatorial Protections: Po...
 Author

Downloads: 1354

Viewing: 1 - 25 of 130

1   2   3   4   5   6   Next >              Last
Title Submission Date VersionPublished UnderContributionDownloads
Advice for Semifeasible Sets and the Complexity-Theoretic Cost(lessness) of Algebraic Properties 2004-10-19 15:25:05.01Lane A. Hemaspaandra Author471
Algebraic Properties for Deterministic Selectivit 2004-08-04 15:04:13.01Lane A. Hemaspaandra Author65
Algebraic Properties for Selector Functions 2004-08-04 13:55:40.01Lane A. Hemaspaandra Author117
Algorithms from Complexity Theory: Polynomical-Time Operations for Complex Sets 2008-02-28 21:17:50.01Lane A. Hemachandra Author218
All Superlinear Inverse Schemes are coNP-Hard 2004-10-19 16:02:09.01Lane A. Hemaspaandra Author542
Almost-Everywhere Superiority for Quantum Polynomial Time 2004-08-06 16:43:15.01Lane A. Hemaspaandra Author69
Almost-Everywhere Superiority for Quantum Polynomial-Time Languages 2004-08-04 15:20:23.01Lane A. Hemaspaandra Author126
Anyone but Him: The Complexity of Precluding an Alternative 2005-10-27 15:21:54.01Lane A. Hemaspaandra Author546
Attacking and defending popular election systems 2013-05-20 15:09:06.5061Lane A. Hemaspaandra Thesis Advisor1163
An Atypical Survey of Typical-Case Heuristic Algorithms 2012-11-08 10:32:58.4191Lane A. Hemaspaandra Author240
Banishing Robust Turing Completeness 2008-02-07 21:19:26.01Lane A. Hemachandra Author555
Barbosa, Uniform Polynomial Time Bounds, and Promises 2011-06-06 16:24:07.0991Lane A. Hemaspaandra Author293
Bypassing Combinatorial Protections: Polynomial-Time Algorithms for Single-Peaked Electorates 2010-04-27 14:32:04.1061Lane A. Hemaspaandra Author1109
Bypassing Combinatorial Protections: Polynomial-Time Algorithms for Single-Peaked Electorates 2013-10-14 11:49:28.7661Lane A. Hemaspaandra Author1354
Bypassing Combinatorial Protections: Polynomial-Time Algortihms for Single-Peaked Electorates 2010-06-11 10:56:53.5411Lane A. Hemaspaandra Author1109
Cluster Computing and the Power of Edge Recognition 2005-10-07 13:50:38.01Lane A. Hemaspaandra Author442
Collapsing Degrees via Strong Computation 2008-01-31 19:29:03.01Lane A. Hemachandra Author895
Competing Provers Yield Improved Karp-Lipton Collapse Results 2004-08-06 13:32:05.01Lane A. Hemaspaandra Author86
The Complexity of Computing the Size of an Interval 2005-02-15 16:57:34.01Lane A. Hemaspaandra Author243
The Complexity of Finding Top-Toda-Equivalence-Class Members 2004-08-04 20:57:05.01Lane A. Hemaspaandra Author111
The Complexity of Kings 2005-06-15 15:04:41.01Lane A. Hemaspaandra Author125
The Complexity of Manipulative Attacks in Nearly Single-Peaked Electorates 2011-05-31 14:22:33.5611Lane A. Hemaspaandra Author391
The Complexity of Online Manipulation of Sequential Elections 2012-03-23 10:05:48.5641Lane A. Hemaspaandra Author941
The Complexity of Online Manipulation of Sequential Elections 2012-10-24 09:29:22.2271Lane A. Hemaspaandra Author1165
The Complexity of Power-Index Comparison 2008-03-03 20:35:34.01Lane Hemaspaandra Author580
1   2   3   4   5   6   Next >              Last