Dorit Dor

Dorit Dor

Tel Aviv District, Israel
9K‏ עוקבים מעל 500 קשרים

פעילות

הצטרפו עכשיו כדי לראות את כל פעילות

ניסיון בהתנדבות

פרסומים

  • All-Pairs Almost Shortest Paths

    SIAM J. Comput., 29(5), 1740–1759

    כות בים נוספים
    • Shay Halperin
    • Uri Zwick
    ראו פרסום
  • SOKOBAN and other motion planning problems

    Computational Geometry, 13(4), 215–228

    We consider a natural family of motion planning problems with movable obstacles and obtain hardness results for them. Some members of the family are shown to be PSPACE-complete thus improving and extending (and also simplifying) a previous NP-hardness result of Wilfong. The family considered includes a motion planning problem which forms the basis of a popular computer game called SOKOBAN. The decision problem corresponding to SOKOBAN is shown to be NP-hard. The motion planning problems…

    We consider a natural family of motion planning problems with movable obstacles and obtain hardness results for them. Some members of the family are shown to be PSPACE-complete thus improving and extending (and also simplifying) a previous NP-hardness result of Wilfong. The family considered includes a motion planning problem which forms the basis of a popular computer game called SOKOBAN. The decision problem corresponding to SOKOBAN is shown to be NP-hard. The motion planning problems considered are related to the “warehouseman's problem” considered by Hopcroft, Schwartz and Sharir, and to geometric versions of the motion planning problem on graphs considered by Papadimitriou, Raghavan, Sudan and Tamaki.

    כות בים נוספים
    • Uri Zwick
    ראו פרסום
  • Geometric Pattern Matching in d -Dimensional Space

    Discrete & Computational Geometry, 21(2), 257-274

    כות בים נוספים
    • L. P. Chew
    • A. Efrat
    • K. Kedem
    ראו פרסום
  • Selecting the Median

    SIAM J. Comput., 28(5), 1722–1758

    כות בים נוספים
    • Uri Zwick
    ראו פרסום
  • Graph Decomposition is NP-Complete: A Complete Proof of Holyer's Conjecture

    SIAM J. Comput., 26(4), 1166–1187

    An H-decomposition of a graph G=(V,E) is a partition of E into subgraphs isomorphic to H. Given a fixed graph H, the H-decomposition problem is to determine whether an input graph G admits an H-decomposition.

    In 1980, Holyer conjectured that H-decomposition is NP-complete whenever H is connected and has three edges or more. Some partial results have been obtained since then. A complete proof of Holyer's conjecture is the content of this paper. The characterization problem of all graphs H…

    An H-decomposition of a graph G=(V,E) is a partition of E into subgraphs isomorphic to H. Given a fixed graph H, the H-decomposition problem is to determine whether an input graph G admits an H-decomposition.

    In 1980, Holyer conjectured that H-decomposition is NP-complete whenever H is connected and has three edges or more. Some partial results have been obtained since then. A complete proof of Holyer's conjecture is the content of this paper. The characterization problem of all graphs H for which H-decomposition is NP-complete is hence reduced to graphs where every connected component contains at most two edges.

    כות בים נוספים
    • Michael Tarsi
    ראו פרסום
  • Finding the αn-th largest element

    Combinatorica, 16(1), 41-58

    We describe an algorithm for selecting the αn-th largest element (where 0<α<1), from a totally ordered set of n elements, using at most (1+(1+o(1))H(α))·n comparisons where H(α) is the binary entropy function and the o(1) stands for a function that tends to 0 as α tends to 0. For small values of α this is almost the best possible as there is a lower bound of about (1+H(α))·n comparisons. The algorithm obtained beats the global 3n upper bound of Schönhage, Paterson and Pippenger for…

    We describe an algorithm for selecting the αn-th largest element (where 0<α<1), from a totally ordered set of n elements, using at most (1+(1+o(1))H(α))·n comparisons where H(α) is the binary entropy function and the o(1) stands for a function that tends to 0 as α tends to 0. For small values of α this is almost the best possible as there is a lower bound of about (1+H(α))·n comparisons. The algorithm obtained beats the global 3n upper bound of Schönhage, Paterson and Pippenger for α<1/3.

    כות בים נוספים
    • Uri Zwick
    ראו פרסום
  • A simple algorithm to construct a consistent extension of a partially oriented graph

    Tel-Aviv University

    A Partially directed acyclic graph, (pdag), is a graph which contains both directed
    and undirected edges, with no directed cycle in its directed subgraph. An oriented
    extension of a pdag G is a fully directed acyclic graph (dag) on the same underlying
    set of edges, with the same orientation on the directed subgraph of G and the same set of
    vee-structures. A vee-structure is formed by two edges, directed toward a common head,
    while their tails are nonadjacent. A simple…

    A Partially directed acyclic graph, (pdag), is a graph which contains both directed
    and undirected edges, with no directed cycle in its directed subgraph. An oriented
    extension of a pdag G is a fully directed acyclic graph (dag) on the same underlying
    set of edges, with the same orientation on the directed subgraph of G and the same set of
    vee-structures. A vee-structure is formed by two edges, directed toward a common head,
    while their tails are nonadjacent. A simple polynomial-time algorithm is presented,
    to solve the following problem: Given a pdag, does it admit an oriented extension?
    The problem was stated by Verma and Pearl, while studying the existence of causal
    explanation to a given set of observed independencies.

    כות בים נוספים
    • Michael Tarsi
    ראו פרסום

פטנטים

  • Penalty box for mitigation of denial-of-service attacks

    שהונפקו US US 8844019 B2

    A security gateway of a computer network receives incoming packets at one or more network interfaces. One or more security functions are applied to the packets. Reports of security function violations are recorded. The reports include the source addresses of the packets, the times that the packets were received, and descriptions of the violations. The descriptions include weights, and if the sum of the weights, for packets of a common source address that are received within a first time…

    A security gateway of a computer network receives incoming packets at one or more network interfaces. One or more security functions are applied to the packets. Reports of security function violations are recorded. The reports include the source addresses of the packets, the times that the packets were received, and descriptions of the violations. The descriptions include weights, and if the sum of the weights, for packets of a common source address that are received within a first time interval, exceeds a threshold, subsequent packets from that source address are dropped. Alternatively, in a “monitor only” mode, the common source address is logged but packets are not dropped. Optionally, encrypted packets and/or packets received at some network interfaces but not at other network interfaces are not dropped.

    ממציאים נוספים
    • Ofer Barkai
    • Tamir Zegman
    ראו פטנט

המלצות התקבל

עוד פעילות על ידי Dorit

הצג Dorit את הפרופיל המלא

  • ראה את מי שאתה מכיר במשותף
  • הכירו
  • צור קשר Dorit ישירות
הצטרפו נוף הפרופיל המלא

הוסף כישורים חדשים עם קורסים אלה