Name
Affiliation
Papers
LEONARD J. SCHULMAN
Department of Mathematics, Massachusetts Institute of Technology
96
Collaborators
Citations 
PageRank 
95
1328
136.88
Referers 
Referees 
References 
1777
1107
1046
Search Limit
1001000
Title
Citations
PageRank
Year
Convergence of incentive-driven dynamics in Fisher markets00.342022
Hadamard Extensions and the Identification of Mixtures of Product Distributions00.342022
Source Identification for Mixtures of Product Distributions.00.342021
Condition number bounds for causal inference.00.342021
Edge Expansion and Spectral Gap of Nonnegative Matrices.00.342020
Explicit Binary Tree Codes with Polylogarithmic Size Alphabet.00.342018
Learning Dynamics and the Co-Evolution of Competing Sexual Species.20.402018
Quasi-regular sequences and optimal schedules for security games.00.342018
The duality gap for two-team zero-sum games10.362017
Online codes for analog signals.00.342017
Convergence of Incentive-Driven Dynamics in Fisher Markets.10.352017
Market Dynamics of Best-Response with Lookahead.00.342016
Extractors for Near Logarithmic Min-Entropy80.452016
Stability of Causal Inference.10.352016
The Adversarial Noise Threshold for Distributed Protocols.20.372016
Analysis of a Classical Matrix Preconditioning Algorithm.30.562015
Learning Arbitrary Statistical Mixtures of Discrete Distributions.30.502015
Symbolic Integration and the Complexity of Computing Averages00.342015
Tree codes and a conjecture on exponential sums140.732014
Achieving Target Equilibria in Network Routing Games without Knowing the Latency Functions80.842014
Network improvement for equilibrium routing20.422014
Special Section on the Forty-Second Annual ACM Symposium on Theory of Computing (STOC 2010).00.342013
A Two-Round Variant of EM for Gaussian Mixtures567.752013
Clustering affine subspaces: hardness and algorithms00.342013
The Network Improvement Problem for Equilibrium Routing.20.392013
An MQ/Code Cryptosystem Proposal.00.342013
Optimal Coding for Streaming Authentication and Interactive Communication210.972013
Cryptography from tensor problems.00.342012
Data reduction for weighted and outlier-resistant clustering150.772012
The effectiveness of lloyd-type methods for the k-means problem968.632012
Learning mixtures of arbitrary distributions over large discrete domains70.512012
Allocation of Divisible Goods Under Lexicographic Preferences.130.942012
The Quantifier Semigroup for Bipartite Graphs.00.342011
Dimensionality reduction: beyond the Johnson-Lindenstrauss bound110.522011
Clustering lines in high-dimensional space: Classification of incomplete data10.352010
Volume in General Metric Spaces20.412010
Proceedings of the 42nd ACM Symposium on Theory of Computing, STOC 2010, Cambridge, Massachusetts, USA, 5-8 June 2010453.912010
Error-correcting codes for automatic control241.222009
Universal Immersion Spaces for Edge-Colored Graphs and Nearest-Neighbor Metrics00.342009
Contraction and Expansion of Convex Sets20.392009
Solvency Games10.392008
On a capacitated multivehicle routing problem00.342008
The Symmetric Group Defies Strong Fourier Sampling251.152008
Analysis of incomplete data and an intrinsic-dimension Helly theorem40.432008
On partitioning graphs via single commodity flows281.422008
Approximation algorithms for labeling hierarchical taxonomies10.362008
The Power of Strong Fourier Sampling: Quantum Algorithms for Affine Groups and Hidden Shifts120.642007
Physical Limits of Heat-Bath Algorithmic Cooling63.262007
A Probabilistic Analysis of EM for Mixtures of Separated, Spherical Gaussians482.672007
Quantum Algorithms for Hidden Nonlinear Structures301.312007
  • 1
  • 2