-
1
-
-
0000156664
-
Derandomization, witnesses for Boolean matrix multiplication and construction of perfect hash functions
-
N. Alon and M. Naor, Derandomization, witnesses for Boolean matrix multiplication and construction of perfect hash functions, Algorithmica 16 (1996), 434-449.
-
(1996)
Algorithmica
, vol.16
, pp. 434-449
-
-
Alon, N.1
Naor, M.2
-
2
-
-
0032142026
-
Sorting in linear time?
-
doi: 10.1006/jcss.1998.1580
-
A. Andersson, T. Hagerup, S. Nilsson, and R. Raman, Sorting in linear time? J. Comput. System Sci. 57 (1998), 74-93, doi: 10.1006/jcss.1998.1580.
-
(1998)
J. Comput. System Sci.
, vol.57
, pp. 74-93
-
-
Andersson, A.1
Hagerup, T.2
Nilsson, S.3
Raman, R.4
-
3
-
-
0030393772
-
0 RAMs: Query time Θ(√log n/ log log n) is necessary and sufficient
-
IEEE Comput. Soc., Los Alamitos, CA
-
0 RAMs: Query time Θ(√log n/ log log n) is necessary and sufficient, in "Proceedings of the 37th Annual Symposium on Foundations of Computer Science (FOCS '96)," pp. 441-450, IEEE Comput. Soc., Los Alamitos, CA, 1996.
-
(1996)
Proceedings of the 37th Annual Symposium on Foundations of Computer Science (FOCS '96)
, pp. 441-450
-
-
Andersson, A.1
Miltersen, P.B.2
Riis, S.3
Thorup, M.4
-
4
-
-
0033691875
-
Tight(er) worst-case bounds on dynamic searching and priority queues
-
Assoc. Comput. Mach., New York
-
A. Andersson and M. Thorup, Tight(er) worst-case bounds on dynamic searching and priority queues, in "Proceedings of the 32nd Annual ACM Symposium on Theory of Computing (STOC '00)," pp. 335-342, Assoc. Comput. Mach., New York, 2000.
-
(2000)
Proceedings of the 32nd Annual ACM Symposium on Theory of Computing (STOC '00)
, pp. 335-342
-
-
Andersson, A.1
Thorup, M.2
-
5
-
-
0032633728
-
Optimal bounds for the predecessor problem
-
Assoc. Comput. Mach., New York
-
P. Beame and F. E. Fich, Optimal bounds for the predecessor problem, in "Proceedings of the 31st Annual ACM Symposium on Theory of Computing (STOC '99)," pp. 295-304, Assoc. Comput. Mach., New York, 1999.
-
(1999)
Proceedings of the 31st Annual ACM Symposium on Theory of Computing (STOC '99)
, pp. 295-304
-
-
Beame, P.1
Fich, F.E.2
-
6
-
-
84947938418
-
Trans-dichotomous algorithms without multiplication - Some upper and lower bounds
-
Proceedings of the 5th International Workshop on Algorithms and Data Structures (WADS '97), Springer-Verlag, Berlin
-
A. Brodnik, P. B. Miltersen, and J. I. Munro. Trans-dichotomous algorithms without multiplication - Some upper and lower bounds, in "Proceedings of the 5th International Workshop on Algorithms and Data Structures (WADS '97)," Lecture Notes in Computer Science, Vol. 1272, pp. 426-439, Springer-Verlag, Berlin, 1997.
-
(1997)
Lecture Notes in Computer Science
, vol.1272
, pp. 426-439
-
-
Brodnik, A.1
Miltersen, P.B.2
Munro, J.I.3
-
8
-
-
84941339354
-
Universal hashing and k-wise independent random variables via integer arithmetic without primes
-
Proceedings of the 13th Annual Symposium on Theoretical Aspects of Computer Science (STACS '96), Springer-Verlag, Berlin
-
M. Dietzfelbinger, Universal hashing and k-wise independent random variables via integer arithmetic without primes, in "Proceedings of the 13th Annual Symposium on Theoretical Aspects of Computer Science (STACS '96)," Lecture Notes in Computer Science, Vol. 1046, pp. 569-580, Springer-Verlag, Berlin, 1996.
-
(1996)
Lecture Notes in Computer Science
, vol.1046
, pp. 569-580
-
-
Dietzfelbinger, M.1
-
9
-
-
84860839700
-
Polynomial hash functions are reliable
-
Proceedings of the 19th International Colloquium on Automata, Languages and Programming (ICALP '92), Springer-Verlag, Berlin
-
M. Dietzfelbinger, J. Gil, Y. Matias, and N. Pippenger, Polynomial hash functions are reliable (extended abstract), in "Proceedings of the 19th International Colloquium on Automata, Languages and Programming (ICALP '92)," Lecture Notes in Computer Science, Vol. 623, pp. 235-246, Springer-Verlag, Berlin, 1992.
-
(1992)
Lecture Notes in Computer Science
, vol.623
, pp. 235-246
-
-
Dietzfelbinger, M.1
Gil, J.2
Matias, Y.3
Pippenger, N.4
-
10
-
-
0028483725
-
Dynamic perfect hashing: Upper and lower bounds
-
M. Dietzfelbinger, A. Karlin, K. Mehlhorn, F. Meyer auf der Heide, H. Rohnert, and R. E. Tarjan, Dynamic perfect hashing: Upper and lower bounds, SIAM J. Comput. 23 (1994), 738-761.
-
(1994)
SIAM J. Comput.
, vol.23
, pp. 738-761
-
-
Dietzfelbinger, M.1
Karlin, A.2
Mehlhorn, K.3
Meyer Auf Der Heide, F.4
Rohnert, H.5
Tarjan, R.E.6
-
11
-
-
0021467937
-
Storing a sparse table with O(1) worst case access time
-
M. L. Fredman, J. Komlós, and E. Szemerédi, Storing a sparse table with O(1) worst case access time, J. Assoc. Comput. Mach. 31 (1984), 538-544.
-
(1984)
J. Assoc. Comput. Mach.
, vol.31
, pp. 538-544
-
-
Fredman, M.L.1
Komlós, J.2
Szemerédi, E.3
-
12
-
-
0000743608
-
Surpassing the information theoretic bound with fusion trees
-
M. L. Fredman and D. E. Willard, Surpassing the information theoretic bound with fusion trees, J. Comput. System Sci. 47 (1993), 424-436.
-
(1993)
J. Comput. System Sci.
, vol.47
, pp. 424-436
-
-
Fredman, M.L.1
Willard, D.E.2
-
13
-
-
78649841467
-
Sorting and searching on the word RAM
-
Proceedings of the 15th Annual Symposium on Theoretical Aspects of Computer Science (STACS '98), Springer-Verlag, Berlin
-
T. Hagerup, Sorting and searching on the word RAM, in "Proceedings of the 15th Annual Symposium on Theoretical Aspects of Computer Science (STACS '98)," Lecture Notes in Computer Science, Vol. 1373, pp. 366-398, Springer-Verlag, Berlin, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1373
, pp. 366-398
-
-
Hagerup, T.1
-
14
-
-
22044433265
-
0 RAM
-
Proceedings of the 25th International Colloquium on Automata, Languages and Programming (ICALP '98), Springer-Verlag, Berlin
-
0 RAM, in "Proceedings of the 25th International Colloquium on Automata, Languages and Programming (ICALP '98)," Lecture Notes in Computer Science, Vol. 1443, pp. 79-90, Springer-Verlag, Berlin, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1443
, pp. 79-90
-
-
Hagerup, T.1
-
16
-
-
0003657590
-
-
Addison-Wesley Series in Computer Science and Information Processing, Addison-Wesley, Reading, MA
-
D. E. Knuth, "The Art of Computer Programming, Vol. 3. Sorting and Searching," Addison-Wesley Series in Computer Science and Information Processing, Addison-Wesley, Reading, MA, 1973.
-
(1973)
The Art of Computer Programming, Vol. 3. Sorting and Searching
, vol.3
-
-
Knuth, D.E.1
-
17
-
-
0003525990
-
-
North-Holland Mathematical Library, North-Holland, Amsterdam
-
F. J. MacWilliams and N. J. A. Sloane, "The Theory of Error-Correcting Codes," Vol. 16, North-Holland Mathematical Library, North-Holland, Amsterdam, 1977.
-
(1977)
The Theory of Error-Correcting Codes
, vol.16
-
-
MacWilliams, F.J.1
Sloane, N.J.A.2
-
18
-
-
0021522108
-
Randomized and deterministic simulations of PRAMs by parallel machines with restricted granularity of parallel memories
-
K. Mehlhorn and U. Vishkin, Randomized and deterministic simulations of PRAMs by parallel machines with restricted granularity of parallel memories, Acta Inform. 21 (1984), 339-374.
-
(1984)
Acta Inform.
, vol.21
, pp. 339-374
-
-
Mehlhorn, K.1
Vishkin, U.2
-
19
-
-
0032266122
-
Error correcting codes, perfect hashing circuits, and deterministic dynamic dictionaries
-
Assoc. Comput. Mach., New York
-
P. B. Miltersen, Error correcting codes, perfect hashing circuits, and deterministic dynamic dictionaries, in "Proceedings of the 9th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA '98)," pp. 556-563, Assoc. Comput. Mach., New York, 1998.
-
(1998)
Proceedings of the 9th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA '98)
, pp. 556-563
-
-
Miltersen, P.B.1
-
20
-
-
0042008956
-
Worst-case optimal insertion and deletion methods for decomposable searching problems
-
M. H. Overmars and J. van Leeuwen, Worst-case optimal insertion and deletion methods for decomposable searching problems, Inform. Process. Lett. 12 (1981), 168-173.
-
(1981)
Inform. Process. Lett.
, vol.12
, pp. 168-173
-
-
Overmars, M.H.1
Van Leeuwen, J.2
-
22
-
-
0346934444
-
A trade-off for worst-case efficient dictionaries
-
R. Pagh, A trade-off for worst-case efficient dictionaries, Nordic J. Comput. 7 (2000), 151-163.
-
(2000)
Nordic J. Comput.
, vol.7
, pp. 151-163
-
-
Pagh, R.1
-
23
-
-
84958047776
-
Priority queues: Small, monotone and trans-dichotomous
-
Proceedings of the 4th Annual European Symposium on Algorithms (ESA '96), Springer-Verlag, Berlin
-
R. Raman, Priority queues: Small, monotone and trans-dichotomous, in "Proceedings of the 4th Annual European Symposium on Algorithms (ESA '96)," Lecture Notes in Computer Science, Vol. 1136, pp. 121-137, Springer-Verlag, Berlin, 1996.
-
(1996)
Lecture Notes in Computer Science
, vol.1136
, pp. 121-137
-
-
Raman, R.1
-
26
-
-
0019572642
-
New hash functions and their use in authentication and set equality
-
M. N. Wegman and J. L. Carter, New hash functions and their use in authentication and set equality, J. Comput. System Sci. 22 (1981), 265-279.
-
(1981)
J. Comput. System Sci.
, vol.22
, pp. 265-279
-
-
Wegman, M.N.1
Carter, J.L.2
|