Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,376,788 papers from all fields of science
Search
Sign In
Create Free Account
Polylogarithmic function
Known as:
Polylogarithmic
A polylogarithmic function in n is a polynomial in the logarithm of n, In computer science, polylogarithmic functions occur as the order of memory…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
7 relations
Algorithm
Approximate max-flow min-cut theorem
Computer science
Kinetic data structure
Expand
Broader (1)
Analysis of algorithms
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
Approximately Counting Triangles in Sublinear Time
T. Eden
,
Amit Levi
,
D. Ron
,
C. Seshadhri
IEEE Annual Symposium on Foundations of Computer…
2015
Corpus ID: 2036793
We consider the problem of estimating the number of triangles in a graph. This problem has been extensively studied in both…
Expand
Highly Cited
2013
Highly Cited
2013
Dynamic Proofs of Retrievability Via Oblivious RAM
David Cash
,
Alptekin Küpçü
,
Daniel Wichs
Journal of Cryptology
2013
Corpus ID: 791841
Proofs of retrievability allow a client to store her data on a remote server (e.g., “in the cloud”) and periodically execute an…
Expand
Highly Cited
2012
Highly Cited
2012
Compressive principal component pursuit
John Wright
,
Arvind Ganesh
,
Kerui Min
,
Yi Ma
IEEE International Symposium on Information…
2012
Corpus ID: 2920384
We consider the problem of recovering a target matrix that is a superposition of low-rank and sparse components, from a small set…
Expand
Highly Cited
2012
Highly Cited
2012
Single round access privacy on outsourced storage
P. Williams
,
R. Sion
Conference on Computer and Communications…
2012
Corpus ID: 3433824
We present SR-ORAM1, the first single-round-trip polylogarithmic time Oblivious RAM that requires only logarithmic client storage…
Expand
Highly Cited
2010
Highly Cited
2010
Privacy-Preserving Access of Outsourced Data via Oblivious RAM Simulation
M. Goodrich
,
M. Mitzenmacher
International Colloquium on Automata, Languages…
2010
Corpus ID: 5576209
We describe schemes for the oblivious RAM simulation problem with a small logarithmic or polylogarithmic amortized increase in…
Expand
Highly Cited
2008
Highly Cited
2008
Fully compressed suffix trees
L. Russo
,
G. Navarro
,
Arlindo L. Oliveira
TALG
2008
Corpus ID: 3174169
Suffix trees are by far the most important data structure in stringology, with a myriad of applications in fields like…
Expand
Highly Cited
2005
Highly Cited
2005
An algebraic theory for primal and dual substructuring methods by constraints
J. Mandel
,
C. Dohrmann
,
R. Tezaur
2005
Corpus ID: 14041575
Highly Cited
2001
Highly Cited
2001
Sequential and parallel algorithms for mixed packing and covering
N. Young
Proceedings IEEE International Conference on…
2001
Corpus ID: 15465261
We describe sequential and parallel algorithms that approximately solve linear programs with no negative coefficients (aka mixed…
Expand
Highly Cited
1995
Highly Cited
1995
Online tracking of mobile users
B. Awerbuch
,
D. Peleg
JACM
1995
Corpus ID: 2726260
This paper deals with the problem of maintaining a distributed directory server, that enables us to keep track of mobile users in…
Expand
Highly Cited
1984
Highly Cited
1984
Polymorphic Arrays: A Novel VLSI Layout for Systolic Computers
A. Fiat
,
Adi Shamir
Journal of computer and system sciences (Print)
1984
Corpus ID: 8927584
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE