Periklis A. Papakonstantinou

Affiliations:
  • Tsinghua University, Beijing, China


According to our database1, Periklis A. Papakonstantinou authored at least 37 papers between 2006 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Identifying Anomalies While Preserving Privacy.
IEEE Trans. Knowl. Data Eng., December, 2023

2022
Intelligent Pandemic Surveillance via Privacy-Preserving Crowdsensing.
IEEE Intell. Syst., 2022

Deep Neural Networks: The Missing Complexity Parameter.
Electron. Colloquium Comput. Complex., 2022

Hide and Seek: Scaling Machine Learning for Combinatorial Optimization via the Probabilistic Method.
CoRR, 2022

2021
Accurately and Privately Reporting Crowdsensed COVID-19 Data.
Proceedings of the AMIA 2021, American Medical Informatics Association Annual Symposium, San Diego, CA, USA, October 30, 2021, 2021

2019
How to Accurately and Privately Identify Anomalies.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2016
Correlation lower bounds from correlation upper bounds.
Inf. Process. Lett., 2016

Depth-reduction for composites.
Electron. Colloquium Comput. Complex., 2016

On the Power and Limits of Distance-Based Learning.
Proceedings of the 33nd International Conference on Machine Learning, 2016

Local Search for Hard SAT Formulas: The Strength of the Polynomial Law.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

2014
Width-Parametrized SAT: Time--Space Tradeoffs.
Theory Comput., 2014

The Depth Irreducibility Hypothesis.
Electron. Colloquium Comput. Complex., 2014

Tradeoff lower lounds for stack machines.
Comput. Complex., 2014

Cryptography with Streaming Algorithms.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

Overlays and Limited Memory Communication.
Proceedings of the IEEE 29th Conference on Computational Complexity, 2014

Bagging by Design (on the Suboptimality of Bagging).
Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence, 2014

2013
Overlays and Limited Memory Communication Mode(l)s.
Electron. Colloquium Comput. Complex., 2013

Space-bounded communication complexity.
Proceedings of the Innovations in Theoretical Computer Science, 2013

2012
A remark on one-wayness versus pseudorandomness.
Electron. Colloquium Comput. Complex., 2012

How powerful are the DDH hard groups?
Electron. Colloquium Comput. Complex., 2012

Time-space tradeoffs for width-parameterized SAT: Algorithms and lower bounds.
Electron. Colloquium Comput. Complex., 2012

Pseudorandomness for Linear Length Branching Programs and Stack Machines.
Proceedings of the Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, 2012

2011
How strong is Nisanʼs pseudo-random generator?
Inf. Process. Lett., 2011

Pseudorandomness for read-once formulas.
Electron. Colloquium Comput. Complex., 2011

Width-parameterized SAT: Time-Space Tradeoffs
CoRR, 2011

Limits on the Stretch of Non-adaptive Constructions of Pseudo-Random Generators.
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011

Computationally Limited Randomness.
Proceedings of the Innovations in Computer Science, 2011

2010
Constructions, Lower Bounds, and New Directions in Cryptography and Computational Complexity.
PhD thesis, 2010

Characterizing sets of jobs that admit optimal greedy-like algorithms.
J. Sched., 2010

Trade-Off Lower Bounds for Stack Machines.
Proceedings of the 25th Annual IEEE Conference on Computational Complexity, 2010

2009
A note on width-parameterized SAT: An exact machine-model characterization.
Inf. Process. Lett., 2009

Polynomial Time with Restricted Use of Randomness.
Electron. Colloquium Comput. Complex., 2009

On the complexity of constructing Golomb Rulers.
Discret. Appl. Math., 2009

On the Structure of Optimal Greedy Computation (for Job Scheduling).
Proceedings of the Mathematical Foundations of Computer Science 2009, 2009

2008
Complexity and Algorithms for Well-Structured k-SAT Instances.
Proceedings of the Theory and Applications of Satisfiability Testing, 2008

On the Impossibility of Basing Identity Based Encryption on Trapdoor Permutations.
Proceedings of the 49th Annual IEEE Symposium on Foundations of Computer Science, 2008

2006
Hierarchies for classes of priority algorithms for Job Scheduling.
Theor. Comput. Sci., 2006


  Loading...