Rivest, Ronald L.Overview
Publication Timeline
Most widely held works about
Ronald L Rivest
Most widely held works by
Ronald L Rivest
Introduction to algorithms
by Thomas H Cormen
(
Book
)
89 editions published between 1989 and 2011 in 4 languages and held by 1,344 WorldCat member libraries worldwide Some books on algorithms are rigorous but incomplete; others cover masses of material but lack rigor. Introduction to Algorithms uniquely combines rigor and comprehensiveness. The book covers a broad range of algorithms in depth, yet makes their design and analysis accessible to all levels of readers. Each chapter is relatively selfcontained and can be used as a unit of study. The algorithms are described in English and in a pseudocode designed to be readable by anyone who has done a little programming. The explanations have been kept elementary without sacrificing depth of coverage or mathematical rigor.  The first edition became a widely used text in universities worldwide as well as the standard reference for professionals. The second edition featured new chapters on the role of algorithms, probabilistic analysis and randomized algorithms, and linear programming. The third edition has been revised and updated throughout. It includes two completely new chapters, on van Emde Boas trees and multithreaded algorithms, and substantial additions to the chapter on recurrences (now called "DivideandConquer"). It features improved treatment of dynamic programming and greedy algorithms and a new notion of edgebased flow in the material on flow networks. Many new exercises and problems have been added for this edition
Machine learning : from theory to applications : cooperative research at Siemens and MIT
by Stephen José Hanson
(
Book
)
11 editions published in 1993 in English and held by 364 WorldCat member libraries worldwide "This volume includes some of the key research papers in the area of machine learning produced at MIT and Siemens during a threeyear joint research effort. It includes papers on many different styles of machine learning, organized into three parts. Part I, theory, includes three papers on theoretical aspects of machine learning. The first two use the theory of computational complexity to derive some fundamental limits on what isefficiently learnable. The third provides an efficient algorithm for identifying finite automata. Part II, artificial intelligence and symbolic learning methods, includes five papers giving an overview of the state of the art and future developments in the field of machine learning, a subfield of artificial intelligence dealing with automated knowledge acquisition and knowledge revision. Part III, neural and collective computation, includes five papers sampling the theoretical diversity and trends in the vigorous new research field of neural networks: massively parallel symbolic induction, task decomposition through competition, phoneme discrimination, behaviorbased learning, and selfrepairing neural networks."PUBLISHER'S WEBSITE
Computational learning theory and natural learning systems
(
Book
)
7 editions published in 1994 in English and held by 321 WorldCat member libraries worldwide
Advances in cryptology, ASIACRYPT '91 : International Conference on the Theory and Application of Cryptology, Fujiyoshida, Japan, November 1114, 1991 : proceedings
by Hideki Imai
(
Book
)
11 editions published in 1993 in English and held by 239 WorldCat member libraries worldwide
Advances in cryptology : proceedings of CRYPTO 82
by David Chaum
(
Book
)
5 editions published in 1983 in English and held by 194 WorldCat member libraries worldwide
Proceedings of the Second Workshop on Computational Learning Theory
by Workshop on computational learning theory
(
Book
)
4 editions published in 1989 in English and held by 137 WorldCat member libraries worldwide
Towards trustworthy elections new directions in electronic voting
by David Chaum
(
)
3 editions published in 2010 in English and held by 29 WorldCat member libraries worldwide Annotation
Advances in Cryptology  ASIACRYPT '91 International Conference on the Theory and Application of Cryptology Fujiyosida, Japan, November 1991 Proceedings
by Hideki Imai
(
)
3 editions published in 1993 in English and held by 29 WorldCat member libraries worldwide This volume contains the proceedings of ASIACRYPT '91, the first international conference on the theory and application of cryptology to be held in the Asian area. It was held at Fujiyoshida, near Mount Fuji in Japan, in November 1991. The conference was modeled after the very successful CRYTO and EUROCRYPT series of conferences sponsored by the International Association for Cryptologic Research (IACR). The IACR and the Institute of Electronics, Information and Communication Engineers were sponsors for ASIACRYPT '91. The papers from the conference were improved and corrected for inclusion in this volume. The papers are grouped into parts on: differential cryptanalysis and DESlike cryptosystems; hashing and signature schemes; secret sharing, threshold, and authenticationcodes; block ciphers  foundations and analysis; cryptanalysis and new ciphers; proof systems and interactive protocols; public key ciphers  foundations and analysis. Also included are four invited lectures and impromptu talks from the rump session
Computational learning theory and natural learning systems
(
)
2 editions published in 1994 in English and held by 26 WorldCat member libraries worldwide
Introduzione agli algoritmi e strutture dati
by Thomas H Cormen
(
Book
)
5 editions published between 1994 and 2010 in Italian and English and held by 20 WorldCat member libraries worldwide
Frontiers of electronic voting 07311 abstracts collection ; Dagstuhl seminar
(
)
2 editions published in 2008 in English and held by 17 WorldCat member libraries worldwide
Frontiers of electronic voting Dagstuhl seminar 07311 ; executive summary
(
)
2 editions published in 2008 in English and held by 17 WorldCat member libraries worldwide
Analysis of associative retrieval algorithms
by Ronald L Rivest
(
Book
)
9 editions published in 1974 in English and held by 14 WorldCat member libraries worldwide
K+1 heads are better than K
by Andrew ChiChih Yao
(
Book
)
2 editions published in 1976 in English and held by 8 WorldCat member libraries worldwide There are languages which can be recognized by a deterministic (k+1)headed oneway finite automaton but which cannot be recognized by a kheaded oneway (deterministic or nondeterministic) finite automaton. Furthermore, there is a language accepted by a kheaded nondeterministic finite automaton which is accepted by no kheaded deterministic finite automaton. (Author)
Inferring decision trees using the minimum description length principle
by J. R Quinlan
(
Book
)
3 editions published between 1987 and 1988 in English and Undetermined and held by 8 WorldCat member libraries worldwide
Learning binary relations and total orders
by Sally A Goldman
(
Book
)
3 editions published in 1990 in English and held by 8 WorldCat member libraries worldwide Learning a binary relation between two sets of objects or between a set and itself represents a binary relation between a set of size n and a set of size m as an n x m matrix of bits, whose (i, j) entry is 1 if and only if the relation holds between the corresponding elements of the two sets. Polynomial prediction algorithms for learning binary relations are present in an extended online learning model, where the examples are drawn by the learner, by a helpful teacher, by an adversary, or according to a uniform probability distribution on the instance space. Results are presented for the case that the matrix of the relation has at most k row types with upper and lower bounds on the number of prediction mistakes any prediction algorithm makes when learning such a matrix under the extended online learning model. A technique is described that simplifies the proof of expected mistake bounds against a randomly chosen query sequence. Keywords: Binary relations, Total orders, Computational learning theory, Machine learning, Mistake bounded learning, Online learning, Polynomial randomized approximation schemes. (JHD)
On digital signatures and publickey cryptosystems
by Ronald L Rivest
(
Book
)
2 editions published in 1977 in English and held by 8 WorldCat member libraries worldwide It is shown that the single operation of raising a number to a fixed power modulo a composite modulus is sufficient to implement digital signatures: a way of creating for a (digitized) document a recognizable, unforgeable, documentdependent digitized signature whose authenticity the signer can not later deny. An electronic funds transfer system or electronic mail system clearly could use such a scheme, since the messages must be digitized in order to be transmitted
Randomized encryption techniques
by Ronald L Rivest
(
Book
)
1 edition published in 1983 in English and held by 8 WorldCat member libraries worldwide
Research directions in computer science : an MIT perspective
by Symposium on Research Direction in Computer Science
(
Book
)
3 editions published in 1991 in English and held by 8 WorldCat member libraries worldwide
Mental poker
by Adi Shamir
(
Book
)
3 editions published in 1979 in English and Undetermined and held by 8 WorldCat member libraries worldwide Is it possible to play a fair game of 'Mental Poker'. We will give a complete (but paradoxical) answer to this question. We will first prove that the problem is intrinsically insoluble, and then describe a fair method of playing 'Mental Poker'. (Author) more
fewer
Audience Level
Related Identities
Associated Subjects
Adleman, Leonard M Algorithms Approximation theory Artificial intelligence Binary principle (Linguistics) Chemistry Coding theory Combinatorial analysis Computational learning theory Computer algorithms Computer programming ComputersAccess control Computer science Computer scienceResearch Computer security Computer software Cryptography Data encryption (Computer science) Data structures (Computer science) Decision makingData processing Electronic funds transfers Electronic voting File organization (Computer science) Hashing (Computer science) Information storage and retrieval systems Internet voting Machine learning Machine theory Massachusetts Neural networks (Computer science) Operating systems (Computers) Physical organic chemistry Poker Privacy, Right of Programming languages (Electronic computers) Rivest, Ronald L Robots Shamir, Adi Votingmachines

Alternative Names
Rivest, R. L.
Rivest, R. L. (Ronald L.)
Rivest, Ronald
Rivest, Ronald L.
Ривест, Р.
リベスト, R. L.
Languages
Covers
