STOC '14- Proceedings of the 46th Annual ACM Symposium on Theory of Computing

Full Citation in the ACM Digital Library

Fingerprinting codes and the price of approximate differential privacy

Analyze gauss: optimal bounds for privacy-preserving principal component analysis

Private matchings and allocations

Rounding sum-of-squares relaxations

Constant factor approximation for balanced cut in the PIE model

Entropy, optimization and counting

Polynomial bounds for the grid-minor theorem

An excluded half-integral grid theorem for digraphs and the directed disjoint paths problem

Cops, robbers, and threatening skeletons: padded decomposition for minor-free graphs

Deciding first-order properties of nowhere dense graphs

Pseudorandom generators with optimal seed length for non-boolean poly-size circuits

On derandomizing algorithms that err extremely rarely

Super-polynomial lower bounds for depth-4 homogeneous arithmetic formulas

Lower bounds for depth 4 formulas computing iterated matrix multiplication

The limits of depth reduction for arithmetic formulas: it's all about the top fan-in

A super-polynomial lower bound for regular arithmetic formulas

A characterization of locally testable affine-invariant properties via decomposition theorems

Lp-testing

Turnstile streaming algorithms might as well be linear sketches

Linear time construction of compressed text indices in compact space

New algorithms and lower bounds for circuits with linear threshold gates

Formulas vs. circuits for small distance connectivity

Toward better formula lower bounds: an information complexity approach to the KRW composition conjecture

Breaking the minsky-papert barrier for constant-depth circuits

Economic efficiency requires interaction

The sample complexity of revenue maximization

Optimal competitive auctions

The matching polytope has exponential extension complexity

Homological product codes

Exponential improvement in precision for simulating sparse Hamiltonians

A quantum algorithm for computing the unit group of an arbitrary degree number field

Primal beats dual on online packing LPs in the random-order model

Competitive algorithms from competitive equilibria: non-clairvoyant scheduling under polyhedral constraints

Minimum bisection is fixed parameter tractable

An efficient parallel solver for SDD linear systems

Solving SDD linear systems in nearly mlog1/2n time

Optimal CUR matrix decompositions

From hierarchical partitions to hierarchical covers: optimal fault-tolerant spanners for doubling metrics

Shortest paths on polyhedral surfaces and terrains

Embedding and canonizing graphs of bounded genus in logspace

Testing surface area with arbitrary accuracy

Coin flipping of any constant bias implies one-way functions

An almost-optimally fair three-party coin-flipping protocol

Robust protocols for securely expanding randomness and distributing keys using untrusted quantum devices

Infinite randomness expansion with a constant number of devices

The average sensitivity of an intersection of half spaces

From average case complexity to improper learning complexity

The power of localization for efficiently learning linear separators with noise

Bandits with switching costs: T2/3 regret

Online local learning via semidefinite programming

How to use indistinguishability obfuscation: deniable encryption, and more

How to delegate computations: the power of no-signaling proofs

Circuits resilient to additive attacks with applications to secure computation

On the existence of extractable one-way functions

Black-box non-black-box zero knowledge

Dichotomies in equilibrium computation, and complementary pivot algorithms for a new class of non-separable utility functions

Query complexity of approximate nash equilibria

Constant rank bimatrix games are PPAD-hard

Approximation algorithms for bipartite matching with metric and geometric costs

Distributed approximation algorithms for weighted shortest paths

Parallel algorithms for geometric graph problems

Fourier PCA and robust tensor decomposition

Smoothed analysis of tensor decompositions

Efficient density estimation via piecewise polynomial approximation

Super-polylogarithmic hypergraph coloring hardness via low-degree long codes

Analytical approach to parallel repetition

A characterization of strong approximation resistance

A strongly polynomial algorithm for generalized flow maximization

Approximate distance oracles with constant query time

Faster all-pairs shortest paths via circuit complexity

Sublinear-time decremental algorithms for single-source reachability and shortest paths on directed graphs

Zig-zag sort: a simple deterministic data-oblivious sorting algorithm running in O(n log n) time

Community detection thresholds and the weak Ramanujan property

Distributed computability in Byzantine asynchronous systems

Are lock-free concurrent algorithms practically wait-free?

Multiway cut, pairwise realizable distributions, and descending thresholds

Cluster before you hallucinate: approximating node-capacitated network design and energy efficient routing

Approximation algorithms for regret-bounded vehicle routing and applications to distance-constrained vehicle routing

Improved approximation algorithms for degree-bounded network design problems with node connectivity requirements

Every list-decodable code for high noise has abundant near-optimal rate puncturings

Non-malleable codes from additive combinatorics

Breaking the quadratic barrier for 3-LCC's over the reals

Optimal error rates for interactive coding I: adaptivity and other settings

The asymptotic k-SAT threshold

Satisfiability threshold for random regular NAE-SAT

Inapproximability for antiferromagnetic spin systems in the tree non-uniqueness region

Efficient deterministic approximate counting for low-degree polynomial threshold functions

Communication is bounded by root of rank

Communication lower bounds via critical block sensitivity

Computing with a full memory: catalytic space

Hitting sets for multilinear read-once algebraic branching programs, in any order