We formalize a potentially rich new streaming model, the semi-streaming model, that we believe is necessary for the fruitful study of efficient algorithms for solving problems on massive graphs whose edge sets cannot be stored in memory.Expand

On Labor Day weekend, the highway patrol sets up spot-checks at random points on the freeways with the intention of deterring a large fraction of motorists from driving incorrectly. We explore a very… Expand

In this paper we study the relationships among some of the most fundamental primitives and protocols in cryptography: public-key encryption (which is equivalent to general secure multi-party computation), key agreement and trapdoor permutations.Expand

This paper contains two main results. First, we revisit the well-known visibility-based pursuit-evasion problem, and show that in contrast to deterministic strategies, a single pursuer can locate an… Expand