Back to Results
First PageMeta Content
Probabilistic complexity theory / Randomized algorithm / Graph / Expander graph / Connectivity / Probabilistic method / Neighbourhood / Extractor / Pseudoforest / Graph theory / Mathematics / Analysis of algorithms


Computational Complexity and Information Asymmetry in Election Audits with Low-Entropy Randomness Nadia Heninger Princeton University [removed]
Add to Reading List

Document Date: 2010-06-24 00:55:06


Open Document

File Size: 138,19 KB

Share Result on Facebook

City

New York / /

Company

Cambridge University Press / Ge / RAND Corporation / /

Country

United States / /

/

Facility

Boalt Hall / Public Policy Clinic / Joseph Lorenzo Hall / University of California / University School / /

IndustryTerm

financial products / good election audit / software implementations / similar tools / real time / polynomial-time algorithm / baroque algorithm / subexponential time approximation algorithm / computing / numerical algorithm / /

Organization

Cambridge University / National Science Foundation / New York University School of Law and The Samuelson Law / Princeton University / Brennan Center for Justice / University of California / Berkeley School of Law / /

Person

Edward W. Felten / J. Alex Halderman / Aravindan Vijayaraghavan / Richard T. Carback III / Moses Charikar / Nathan Linial / Benny Applebaum / Aditya Bhaskara / Eden Chlamtac / Ronald L. Rivest / Rajeev Motwani / Subhash Khot / Elaine Ginnold / Joseph A. Calandrino / Amy Lehmkuhl / Prasad Raghavendra / David Jefferson / Lawrence Norden / Jeremy Clark / Eric Rescorla / Alexandra Kolla / Margaret Chen / Kim Alexander / Uriel Feige / Avi Wigderson / Shlomo Hoory / Stefan Popoveniuc / Philip B. Stark / Boaz Barak / Markus Brunnermeier / Kathleen Midstokke / Arel Cordero / David Dill / Sanjeev Arora / Prabhakar Raghavan / David Steurer / Rong Ge / Alex Halderman / Aleks Esseks / Henry Cohn / David Wagner / /

Position

randomness extractor / auditor / Secretary of State / analytic model for such auditing schemes / conservative model for the attacker / representative / /

ProvinceOrState

New York / California / /

Technology

good algorithm / randomized algorithm / subexponential time approximation algorithm / involved algorithm / Subexponential algorithms / cryptography / polynomial-time algorithm / numerical algorithm / baroque algorithm / /

SocialTag