scispace - formally typeset
T

Tom Leighton

Researcher at Massachusetts Institute of Technology

Publications -  119
Citations -  10845

Tom Leighton is an academic researcher from Massachusetts Institute of Technology. The author has contributed to research in topics: Upper and lower bounds & Sorting. The author has an hindex of 48, co-authored 119 publications receiving 10457 citations. Previous affiliations of Tom Leighton include Akamai Technologies & Princeton University.

Papers
More filters
Proceedings ArticleDOI

The value of knowing a demand curve: bounds on regret for online posted-price auctions

TL;DR: This work considers price-setting algorithms for a simple market in which a seller has an unlimited supply of identical copies of some good, and interacts sequentially with a pool of n buyers, each of whom wants at most one copy of the good.
Proceedings ArticleDOI

Fast approximation algorithms for multicommodity flow problems

TL;DR: It is proved that a (simple) k-commodity flow problem can be approximately solved by approximately solving O(k log2n) single-comodity minimum-cost flow problems, and the first polynomial-time combinatorial algorithms for approximately solving the multicommodation flow problem are described.
Proceedings ArticleDOI

Tight bounds on the complexity of parallel sorting

TL;DR: Tight upper and lower bounds are proved on the number of processors, information transfer, wire area, and time needed to sort N numbers in a bounded-degree fixed-connection network.
Proceedings ArticleDOI

Resource discovery in distributed networks

TL;DR: This paper proposes a very simple algorithm called Name-Dropper whereby all machines learn about each other within O(log’ n) rounds with high probability, where n is the number of machines in the network.
Journal ArticleDOI

Universal-stability results and performance bounds for greedy contention-resolution protocols

TL;DR: This paper analyzes the behavior of packet-switched communication networks in which packets arrive dynamically at the nodes and are routed in discrete time steps across the edges, and provides the first examples of a protocol that is stable for all networks, and a Protocol that is not stable forall networks.