#### Filter Results:

#### Publication Year

1997

2012

#### Co-author

#### Key Phrase

#### Publication Venue

Learn More

For several NP-complete problems, there have been a progression of better but still exponential algorithms. In this paper, we address the relative likelihood of sub-exponential algorithms for these problems. We introduce a generalized reduction that we call Sub-exponential Reduction Family (SERF) that preserves sub-exponential complexity. We show that… (More)

— Ternary Content-Addressable Memories (TCAMs) are becoming very popular for designing high-throughput forwarding engines on routers: they are fast, cost-effective and simple to manage. However, a major drawback of TCAMs is their high power consumption. This paper presents architectures and algorithms for making TCAM-based routing tables more power… (More)

We propose and analyze a simple new randomized algorithm, called ResolveSat, for nding satisfying assignments of Boolean formulas in conjunctive normal form. The algorithm consists of two stages: a preprocessing stage in which resolution is applied to enlarge the set of clauses of the formula, followed by a search stage that uses a simple randomized greedy… (More)

We present and analyze two simple algorithms for finding satisfying assignments of k-CNFs (Boolean formu-lae in conjunctive normal form with at most k liter-als per clause). The first is a randomized algorithm which, with probability approaching 1, finds a satisfying assignment of a satisfiable k-CNF formula F in time O(n2 IF12"-"lk). The second algorithm… (More)

The Optical Transpose Interconnection System (OTIS) proposed by Marsden et al. makes use of free-space optical interconnects to augment an electronic system by adding non-local interconnections. In this paper, we show how these connections can be used to implement a large-scale system with a given network topology using small copies of a similar topology.… (More)

In this paper, we examine algorithms and data structures for the longest prefix match operation required for routing IP packets. Previous work, aimed at hardware implementations, has focused on quantifying worst case lookup time and memory usage. With the advent of fast programmable platforms, whether network processor or PC-based, metrics which look… (More)

A projection is a subset of {0, 1} n given by equations of the form x i = x j , x i = ¯ x j , x i = 0, and x i = 1, where for 1 ≤ i ≤ n, x i are Boolean variables and ¯ x i are their complements. We study monochromatic projections in 2-colorings of an n-dimensional Boolean cube. We also study the dimension of the largest projection contained in a set… (More)

— We consider the problem of client assignment in a distributed system of content servers. We present a system called Webmapper for clustering IP addresses and assigning each cluster to an optimal content server. The system is passive in that the only information it uses comes from monitoring the TCP connections between the clients and the servers. It is… (More)

In a recent paper, Ajtai et al. [1] give a streaming algorithm to count the number of inversions in a stream <i>L</i>ε[<i>m</i>]<sup>n</sup> using two passes and <i>O</i>(ε<sup>−1</sup>-√<i>n</i> log <i>n</i>(log <i>m</i> + log <i>n</i>)) space. Here, we present a simple randomized streaming algorithm for the same problem that uses one… (More)