Homin K. Lee

According to our database1, Homin K. Lee authored at least 20 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
FlipHash: A Constant-Time Consistent Range-Hashing Algorithm.
CoRR, 2024

Sampling Space-Saving Set Sketches.
CoRR, 2024

2019
DDSketch: A Fast and Fully-Mergeable Quantile Sketch with Relative-Error Guarantees.
Proc. VLDB Endow., 2019

2011
What Can We Learn Privately?
SIAM J. Comput., 2011

The Efficient Dual Receiver Cryptosystem and Its Applications.
Int. J. Netw. Secur., 2011

Submodular Functions Are Noise Stable.
Electron. Colloquium Comput. Complex., 2011

Learning random monotone DNF.
Discret. Appl. Math., 2011

Efficiently Testing Sparse <i>GF</i>(2) Polynomials.
Algorithmica, 2011

2010
Decision Trees and Influence: an Inductive Proof of the OSSS Inequality.
Theory Comput., 2010

Mansour's Conjecture is True for Random DNF Formulas.
Electron. Colloquium Comput. Complex., 2010

Lower Bounds and Hardness Amplification for Learning Shallow Monotone Formulas.
Electron. Colloquium Comput. Complex., 2010

Learning Talagrand DNF Formulas.
Proceedings of the COLT 2010, 2010

2009
Optimal Cryptographic Hardness of Learning Monotone Functions.
Theory Comput., 2009

2008
Efficiently Testing Sparse GF(2) Polynomials.
Proceedings of the Automata, Languages and Programming, 35th International Colloquium, 2008

2007
DNF are teachable in the average case.
Mach. Learn., 2007

Separating Models of Learning from Correlated and Uncorrelated Data.
J. Mach. Learn. Res., 2007

Testing for Concise Representations.
Electron. Colloquium Comput. Complex., 2007

Cryptographic strength of ssl/tls servers: current and recent practices.
Proceedings of the 7th ACM SIGCOMM Internet Measurement Conference, 2007

2005
ErmineJ: Tool for functional analysis of gene expression data sets.
BMC Bioinform., 2005

2004
The dual receiver cryptosystem and its applications.
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004


  Loading...