Rivest, Ronald L.
Overview
Works:  122 works in 435 publications in 8 languages and 4,376 library holdings 

Genres:  Conference papers and proceedings 
Roles:  Editor, Author, Other 
Classifications:  QA76.6, 005.1 
Publication Timeline
.
Most widely held works about
Ronald L Rivest
 Classifying the complexity of the RSA algorithm : the state of the art by Leonor Charmaine Bosman( )
Most widely held works by
Ronald L Rivest
Introduction to algorithms by
Thomas H Cormen(
Book
)
132 editions published between 1989 and 2017 in 6 languages and held by 2,006 WorldCat member libraries worldwide
Some books on algorithms are rigorous but incomplete; others cover masses of material but lack rigor. Introduction to Algorithms uniquely combines rigor and comprehensiveness. The book covers a broad range of algorithms in depth, yet makes their design and analysis accessible to all levels of readers. Each chapter is relatively selfcontained and can be used as a unit of study. The algorithms are described in English and in a pseudocode designed to be readable by anyone who has done a little programming. The explanations have been kept elementary without sacrificing depth of coverage or mathematical rigor.  The first edition became a widely used text in universities worldwide as well as the standard reference for professionals. The second edition featured new chapters on the role of algorithms, probabilistic analysis and randomized algorithms, and linear programming. The third edition has been revised and updated throughout. It includes two completely new chapters, on van Emde Boas trees and multithreaded algorithms, and substantial additions to the chapter on recurrences (now called "DivideandConquer"). It features improved treatment of dynamic programming and greedy algorithms and a new notion of edgebased flow in the material on flow networks. Many new exercises and problems have been added for this edition
132 editions published between 1989 and 2017 in 6 languages and held by 2,006 WorldCat member libraries worldwide
Some books on algorithms are rigorous but incomplete; others cover masses of material but lack rigor. Introduction to Algorithms uniquely combines rigor and comprehensiveness. The book covers a broad range of algorithms in depth, yet makes their design and analysis accessible to all levels of readers. Each chapter is relatively selfcontained and can be used as a unit of study. The algorithms are described in English and in a pseudocode designed to be readable by anyone who has done a little programming. The explanations have been kept elementary without sacrificing depth of coverage or mathematical rigor.  The first edition became a widely used text in universities worldwide as well as the standard reference for professionals. The second edition featured new chapters on the role of algorithms, probabilistic analysis and randomized algorithms, and linear programming. The third edition has been revised and updated throughout. It includes two completely new chapters, on van Emde Boas trees and multithreaded algorithms, and substantial additions to the chapter on recurrences (now called "DivideandConquer"). It features improved treatment of dynamic programming and greedy algorithms and a new notion of edgebased flow in the material on flow networks. Many new exercises and problems have been added for this edition
Machine learning : from theory to applications : cooperative research at Siemens and MIT by
Stephen José Hanson(
Book
)
15 editions published in 1993 in English and German and held by 516 WorldCat member libraries worldwide
"This volume includes some of the key research papers in the area of machine learning produced at MIT and Siemens during a threeyear joint research effort. It includes papers on many different styles of machine learning, organized into three parts. Part I, theory, includes three papers on theoretical aspects of machine learning. The first two use the theory of computational complexity to derive some fundamental limits on what isefficiently learnable. The third provides an efficient algorithm for identifying finite automata. Part II, artificial intelligence and symbolic learning methods, includes five papers giving an overview of the state of the art and future developments in the field of machine learning, a subfield of artificial intelligence dealing with automated knowledge acquisition and knowledge revision. Part III, neural and collective computation, includes five papers sampling the theoretical diversity and trends in the vigorous new research field of neural networks: massively parallel symbolic induction, task decomposition through competition, phoneme discrimination, behaviorbased learning, and selfrepairing neural networks."PUBLISHER'S WEBSITE
15 editions published in 1993 in English and German and held by 516 WorldCat member libraries worldwide
"This volume includes some of the key research papers in the area of machine learning produced at MIT and Siemens during a threeyear joint research effort. It includes papers on many different styles of machine learning, organized into three parts. Part I, theory, includes three papers on theoretical aspects of machine learning. The first two use the theory of computational complexity to derive some fundamental limits on what isefficiently learnable. The third provides an efficient algorithm for identifying finite automata. Part II, artificial intelligence and symbolic learning methods, includes five papers giving an overview of the state of the art and future developments in the field of machine learning, a subfield of artificial intelligence dealing with automated knowledge acquisition and knowledge revision. Part III, neural and collective computation, includes five papers sampling the theoretical diversity and trends in the vigorous new research field of neural networks: massively parallel symbolic induction, task decomposition through competition, phoneme discrimination, behaviorbased learning, and selfrepairing neural networks."PUBLISHER'S WEBSITE
Advances in cryptology, ASIACRYPT '91 : International Conference on the Theory and Application of Cryptology, Fujiyoshida,
Japan, November 1114, 1991 : proceedings by
Hideki Imai(
Book
)
14 editions published in 1993 in English and held by 357 WorldCat member libraries worldwide
This volume contains the proceedings of ASIACRYPT '91, the first international conference on the theory and application of cryptology to be held in the Asian area. It was held at Fujiyoshida, near Mount Fuji in Japan, in November 1991. The conference was modeled after the very successful CRYTO and EUROCRYPT series of conferences sponsored by the International Association for Cryptologic Research (IACR). The IACR and the Institute of Electronics, Information and Communication Engineers were sponsors for ASIACRYPT '91. The papers from the conference were improved and corrected for inclusion in this volume. The papers are grouped into parts on: differential cryptanalysis and DESlike cryptosystems; hashing and signature schemes; secret sharing, threshold, and authenticationcodes; block ciphers  foundations and analysis; cryptanalysis and new ciphers; proof systems and interactive protocols; public key ciphers  foundations and analysis. Also included are four invited lectures and impromptu talks from the rump session
14 editions published in 1993 in English and held by 357 WorldCat member libraries worldwide
This volume contains the proceedings of ASIACRYPT '91, the first international conference on the theory and application of cryptology to be held in the Asian area. It was held at Fujiyoshida, near Mount Fuji in Japan, in November 1991. The conference was modeled after the very successful CRYTO and EUROCRYPT series of conferences sponsored by the International Association for Cryptologic Research (IACR). The IACR and the Institute of Electronics, Information and Communication Engineers were sponsors for ASIACRYPT '91. The papers from the conference were improved and corrected for inclusion in this volume. The papers are grouped into parts on: differential cryptanalysis and DESlike cryptosystems; hashing and signature schemes; secret sharing, threshold, and authenticationcodes; block ciphers  foundations and analysis; cryptanalysis and new ciphers; proof systems and interactive protocols; public key ciphers  foundations and analysis. Also included are four invited lectures and impromptu talks from the rump session
Computational learning theory and natural learning systems by
Stephen José Hanson(
Book
)
11 editions published between 1994 and 1997 in English and held by 340 WorldCat member libraries worldwide
As with Volume I, this second volume represents a synthesis of issues in three historically distinct areas of learning research: computational learning theory, neural network research, and symbolic machine learning. While the first volume provided a forum for building a science of computational learning across fields, this volume attempts to define plausible areas of joint research: the contributions are concerned with finding constraints for theory while at the same time interpreting theoretic results in the context of experiments with actual learning systems. Subsequent volumes will focus on areas identified as research opportunities. Computational learning theory, neural networks, and AI machine learning appear to be disparate fields; in fact they have the same goal: to build a machine or program that can learn from its environment. Accordingly, many of the papers in this volume deal with the problem of learning from examples. In particular, they are intended to encourage discussion between those trying to build learning algorithms (for instance, algorithms addressed by learning theoretic analyses are quite different from those used by neural network or machinelearning researchers) and those trying to analyze them. The first section provides theoretical explanations for the learning systems addressed, the second section focuses on issues in model selection and inductive bias, the third section presents new learning algorithms, the fourth section explores the dynamics of learning in feedforward neural networks, and the final section focuses on the application of learning algorithms. A Bradford Book
11 editions published between 1994 and 1997 in English and held by 340 WorldCat member libraries worldwide
As with Volume I, this second volume represents a synthesis of issues in three historically distinct areas of learning research: computational learning theory, neural network research, and symbolic machine learning. While the first volume provided a forum for building a science of computational learning across fields, this volume attempts to define plausible areas of joint research: the contributions are concerned with finding constraints for theory while at the same time interpreting theoretic results in the context of experiments with actual learning systems. Subsequent volumes will focus on areas identified as research opportunities. Computational learning theory, neural networks, and AI machine learning appear to be disparate fields; in fact they have the same goal: to build a machine or program that can learn from its environment. Accordingly, many of the papers in this volume deal with the problem of learning from examples. In particular, they are intended to encourage discussion between those trying to build learning algorithms (for instance, algorithms addressed by learning theoretic analyses are quite different from those used by neural network or machinelearning researchers) and those trying to analyze them. The first section provides theoretical explanations for the learning systems addressed, the second section focuses on issues in model selection and inductive bias, the third section presents new learning algorithms, the fourth section explores the dynamics of learning in feedforward neural networks, and the final section focuses on the application of learning algorithms. A Bradford Book
Advances in cryptology : proceedings of CRYPTO 82 by
David Chaum(
Book
)
10 editions published between 1982 and 1983 in English and held by 248 WorldCat member libraries worldwide
10 editions published between 1982 and 1983 in English and held by 248 WorldCat member libraries worldwide
Proceedings of the second annual workshop on Computational learning theory by
Ronald L Rivest(
)
14 editions published in 1989 in English and held by 186 WorldCat member libraries worldwide
14 editions published in 1989 in English and held by 186 WorldCat member libraries worldwide
Introduction à l'algorithmique by
Thomas H Cormen(
Book
)
7 editions published between 1994 and 2000 in French and held by 152 WorldCat member libraries worldwide
7 editions published between 1994 and 2000 in French and held by 152 WorldCat member libraries worldwide
Proceedings of the Second Workshop on Computational Learning Theory by Workshop on Computational Learning Theory(
Book
)
4 editions published in 1989 in English and held by 133 WorldCat member libraries worldwide
4 editions published in 1989 in English and held by 133 WorldCat member libraries worldwide
Computational learning theory and natural learning systems by
Stephen José Hanson(
)
6 editions published in 1994 in English and held by 36 WorldCat member libraries worldwide
Annotation
6 editions published in 1994 in English and held by 36 WorldCat member libraries worldwide
Annotation
Advances in Cryptology  ASIACRYPT '91 International Conference on the Theory and Application of Cryptology Fujiyosida, Japan,
November 1991 Proceedings by
Hideki Imai(
)
1 edition published in 1993 in English and held by 31 WorldCat member libraries worldwide
1 edition published in 1993 in English and held by 31 WorldCat member libraries worldwide
Towards Trustworthy Elections New Directions in Electronic Voting by
David Chaum(
)
2 editions published in 2010 in English and held by 27 WorldCat member libraries worldwide
2 editions published in 2010 in English and held by 27 WorldCat member libraries worldwide
Introduzione agli algoritmi by
Thomas H Cormen(
Book
)
7 editions published between 1994 and 2003 in Italian and English and held by 23 WorldCat member libraries worldwide
7 editions published between 1994 and 2003 in Italian and English and held by 23 WorldCat member libraries worldwide
Analysis of associative retrieval algorithms by
Ronald L Rivest(
Book
)
13 editions published between 1974 and 1981 in English and held by 19 WorldCat member libraries worldwide
13 editions published between 1974 and 1981 in English and held by 19 WorldCat member libraries worldwide
Frontiers of electronic voting Dagstuhl seminar 07311 ; executive summary(
)
1 edition published in 2008 in English and held by 16 WorldCat member libraries worldwide
1 edition published in 2008 in English and held by 16 WorldCat member libraries worldwide
Frontiers of electronic voting 07311 abstracts collection ; Dagstuhl seminar(
)
1 edition published in 2008 in English and held by 16 WorldCat member libraries worldwide
1 edition published in 2008 in English and held by 16 WorldCat member libraries worldwide
Wprowadzenie do algorytmów by
Thomas H Cormen(
Book
)
10 editions published between 1997 and 2018 in Polish and held by 14 WorldCat member libraries worldwide
10 editions published between 1997 and 2018 in Polish and held by 14 WorldCat member libraries worldwide
Research directions in computer science : an MIT perspective by Symposium on Research Direction in Computer Science(
Book
)
3 editions published in 1991 in English and held by 9 WorldCat member libraries worldwide
3 editions published in 1991 in English and held by 9 WorldCat member libraries worldwide
A method for obtaining digital signatures and publickey cryptosystems by
Ronald L Rivest(
Book
)
4 editions published in 1977 in English and held by 8 WorldCat member libraries worldwide
4 editions published in 1977 in English and held by 8 WorldCat member libraries worldwide
Mental poker by
Adi Shamir(
Book
)
5 editions published in 1979 in English and Undetermined and held by 8 WorldCat member libraries worldwide
Is it possible to play a fair game of 'Mental Poker'. We will give a complete (but paradoxical) answer to this question. We will first prove that the problem is intrinsically insoluble, and then describe a fair method of playing 'Mental Poker'. (Author)
5 editions published in 1979 in English and Undetermined and held by 8 WorldCat member libraries worldwide
Is it possible to play a fair game of 'Mental Poker'. We will give a complete (but paradoxical) answer to this question. We will first prove that the problem is intrinsically insoluble, and then describe a fair method of playing 'Mental Poker'. (Author)
Towards trustworthy elections : new directions in electronic voting by
David Chaum(
)
4 editions published in 2010 in English and held by 8 WorldCat member libraries worldwide
Annotation
4 editions published in 2010 in English and held by 8 WorldCat member libraries worldwide
Annotation
more
fewer
Audience Level
0 

1  
Kids  General  Special 
Related Identities
 Leiserson, Charles Eric
 Cormen, Thomas H. Author
 Hanson, Stephen José Other Author Editor
 Stein, Clifford 1965
 Remmele, Werner Other Editor
 Imai, Hideki 1943 Author Editor
 Matsumoto, Tsutomu Author Editor
 Drastal, George A. Author Editor
 Chaum, David Other Author Editor
 Warmuth, Manfred Editor
Useful Links
Associated Subjects
Adleman, Leonard M Algorithms Artificial intelligence Chemistry Coding theory Combinatorial analysis Computational learning theory Computer algorithms Computer programming Computer programmingAbility testing ComputersAccess control ComputersAccess controlPasswords Computer science Computer scienceResearch Computer security Computer software Cryptography Data encryption (Computer science) Data protection Data structures (Computer science) Electronic voting File organization (Computer science) Hashing (Computer science) Information storage and retrieval systems Internet voting Machine learning Massachusetts Massachusetts Institute of Technology Neural networks (Computer science) Operating systems (Computers) Physical organic chemistry Poker Rivest, Ronald L Shamir, Adi United States Votingmachines
Covers
Alternative Names
Rivest, R. 1947
Rivest, R. L.
Rivest, R. L. 1947
Rivest, R. L. (Ronald L.)
Rivest, R. L. (Ronald L.), 1947
Rivest, Ron
Rivest, Ronald
Rivest, Ronald 1947
Rivest, Ronald L.
Rivest, Ronald L. 1947
Ron Rivest Amerikaans wiskundige
Ronald L. Rivest
Ronald L. Rivest amerikanischer Mathematiker und Kryptologe
Ronald RIVEST
Ronald Rivest crittografo statunitense
Ronald Rivest cryptologue américain d'origine canadiennefrançaise
Ronald Rivest usona matematikisto
Ривест, Р.
Ривест, Рональд Линн
Рон Ривест
Роналд Лин Ривест
Рональд Рівест
רונלד ריבסט
ריבסט, רונלד ל.
رونالد ريفست
رونالد ریوست
রন রিভেস্ট
로널드 라이베스트
リベスト, R. L.
ロナルド・リベスト
罗纳德·李维斯特 Cryptographer
罗纳德·李维斯特 美国密码学家
Languages