#### Filter Results:

- Full text PDF available (68)

#### Publication Year

1991

2017

- This year (1)
- Last 5 years (24)
- Last 10 years (41)

#### Publication Type

#### Co-author

#### Journals and Conferences

#### Key Phrases

Learn More

- Yonatan Aumann, Yuval Rabani
- SIAM J. Comput.
- 1998

It is shown that the minimum cut ratio is within a factor of O(log k) of the maximum concurrent flow for k-commodity flow instances with arbitrary capacities and demands. This improves upon the previously best-known bound of O(log k) and is existentially tight, up to a constant factor. An algorithm for finding a cut with ratio within a factor of O(log k) of… (More)

- Yonatan Aumann, Yehuda Lindell
- Journal of Cryptology
- 2007

In the setting of secure multiparty computation, a set of mutually distrustful parties wish to securely compute some joint function of their private inputs. The computation should be carried out in a secure way, meaning that no coalition of corrupted parties should be able to learn more than specified or somehow cause the result to be “incorrect.”… (More)

- Yonatan Aumann, Yehuda Lindell
- Journal of Intelligent Information Systems
- 1999

Association rules are a key data-mining tool and as such have been well researched. So far, this research has focused predominantly on databases containing categorical data only. However, many real-world databases contain quantitative attributes and current solutions for this case are so far inadequate. In this paper we introduce a new definition of… (More)

- Yonatan Aumann, Yuval Rabani
- SODA
- 1995

We consider the ploying all optica P roblem of routing in networks emrouting technology. In these networks, messages travel in optical form and switchin is f! erformed directly on the optical signal. By using %. iferent uravelengths, several messages may use the same edge concurrently, Howeve!, messages assigned the same wavelength must use disjoznt paths,… (More)

In electronic communications and in access to systems, the issue of authentication of the Sender S of a message M , as well as of the message itself, is of paramount importance. Recently S. Goldwasser has raised the additional issue of Deniable Authentication where the sender S authenticates the message M to the Receiver’s (R) satisfaction, but can later… (More)

- Doron Lipson, Yonatan Aumann, Amir Ben-Dor, Nathan Linial, Zohar Yakhini
- Journal of Computational Biology
- 2005

DNA amplifications and deletions characterize cancer genome and are often related to disease evolution. Microarray-based techniques for measuring these DNA copy-number changes use fluorescence ratios at arrayed DNA elements (BACs, cDNA, or oligonucleotides) to provide signals at high resolution, in terms of genomic locations. These data are then further… (More)

- Amihood Amir, Yonatan Aumann, Gad M. Landau, Moshe Lewenstein, Noa Lewenstein
- J. Algorithms
- 1997

1 A preliminary version of this paper appeared in FOCS 97. Let a text string T of n symbols and a pattern string P of m symbols from alphabet be given. A swapped version T of T is a length n string derived from T by a series of local swaps (i.e., t ← t +1 and t +1 ← t), where each element can participate in no more than one swap. The pattern matching with… (More)

- Yonatan Aumann, Michael A. Bender
- FOCS
- 1996

We consider the tolerance of data structures to memory faults. We observe that many pointer-based data structures (e.g. linked lists, trees, etc.) are highly nonresilient to faults. A single fault in a linked list or tree may result in the loss of the entire set of data. In this paper we present a formal framework for studying the fault tolerance properties… (More)

- Yonatan Aumann, Yan Zong Ding, Michael O. Rabin
- IEEE Trans. Information Theory
- 2002

- Yonatan Aumann
- PODC
- 1997

Asynchronous Consensus with the Weak Adversary Yonatan Aumann” Scheduler For those of us who like to work with the We consider the problem of asynchronous consensus with a wealt dynamic adversary scheduler. We pr~ videthe first algorithm toobtain ~(n) total work inthe weak adversary model using only single-write r registers. For the mtdti-uwder setting we… (More)