Alan Siegel
New York University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Alan Siegel.
SIAM Journal on Discrete Mathematics | 1995
Jeanette P. Schmidt; Alan Siegel; Aravind Srinivasan
Chernoff-Hoeffding (CH) bounds are fundamental tools used in bounding the tail probabilities of the sums of bounded and independent random variables (r.v.s). We present a simple technique that gives slightly better bounds than these and that more importantly requires only limited independence among the random variables, thereby importing a variety of standard results to the case of limited independence for free. Additional methods are also presented, and the aggregate results are sharp and provide a better understanding of the proof techniques behind these bounds. These results also yield improved bounds for various tail probability distributions and enable improved approximation algorithms for jobshop scheduling. The limited independence result implies that a reduced amount and weaker sources of randomness are sufficient for randomized algorithms whose analyses use the CH bounds, e.g., the analysis of randomized algorithms for random sampling and oblivious packet routing.
SIAM Journal on Computing | 1990
Jeanette P. Schmidt; Alan Siegel
The problem of constructing a dense static hash-based lookup table T for a set of n elements belonging to a universe
foundations of computer science | 1989
Alan Siegel
U = \{ 0, 1, 2,\cdots , m -1 \}
SIAM Journal on Computing | 2004
Alan Siegel
is considered. Nearly tight bounds on the spatial complexity of oblivious
symposium on the theory of computing | 1981
Danny Dolev; Kevin Karplus; Alan Siegel; Alex Strong; Jeffrey D. Ullman
O(1)
SIAM Journal on Computing | 2000
Richard Cole; Bud Mishra; Jeanette P. Schmidt; Alan Siegel
-probe hash functions, which are defined to depend solely on their search key argument, are provided. This establishes a significant gap between oblivious and nonoblivious search. In particular, the results include the following: • A lower bound showing that oblivious k-probe hash functions require a program size of
Archive | 1981
Alan Siegel; Danny Dolev
\Omega(({n / k}^{2})e^{-k}+\log \log m)
symposium on the theory of computing | 1990
Jeanette P. Schmidt; Alan Siegel
bits, on average. • A probabilistic construction of a family of oblivious k-probe hash functions that can be specified in
Journal of the ACM | 1992
Amos Fiat; Moni Naor; Jeanette P. Schmidt; Alan Siegel
O(n e^{-k} +\log \log m)
symposium on the theory of computing | 1988
Amos Fiat; Moni Naor; Jeanette P. Schmidt; Alan Siegel
bits, which nearly matches the above lower bound. • A variation of an explicit