Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Unique games on expanding constraint graphs are easy: extended abstract., , , , , and . STOC, page 21-28. ACM, (2008)Subgraph sparsification and nearly optimal ultrasparsifiers., , , and . STOC, page 57-66. ACM, (2010)Making Classical Honest Verifier Zero Knowledge Protocols Secure against Quantum Attacks., , , and . ICALP (2), volume 5126 of Lecture Notes in Computer Science, page 592-603. Springer, (2008)Optimal Lower Bounds for Sketching Graph Cuts., , , and . SODA, page 2565-2569. SIAM, (2019)Spectral Algorithms for Unique Games.. Comput. Complex., 20 (2): 177-206 (2011)Computational thresholds for the fixed-magnetization Ising model., , , and . STOC, page 1459-1472. ACM, (2022)Statistical Physics Approaches to Unique Games., , , , and . CCC, volume 169 of LIPIcs, page 13:1-13:27. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2020)Measuring throughput of data center network topologies., , , and . SIGMETRICS, page 597-598. ACM, (2014)Algorithms for the ferromagnetic Potts model on expanders., , , , , and . FOCS, page 344-355. IEEE, (2022)Spectral Algorithms for Unique Games.. CCC, page 122-130. IEEE Computer Society, (2010)