-
1
-
-
0020946257
-
An O(n log n) sorting network
-
M. Ajtai, J. Koml'os, E. Szemerédi, An O (n log n ) sorting network, in: Proc 15 STOC, 1983, pp. 1-9
-
(1983)
Proc 15 STOC
, pp. 1-9
-
-
Ajtai, M.1
Koml'Os, J.2
Szemerédi, E.3
-
2
-
-
27644569710
-
Better simulation of exponential threshold weights by polynomial weights
-
Electronic Colloquium on Computational Complexity
-
K. Amano, A. Maruoka, Better simulation of exponential threshold weights by polynomial weights, Technical Report TR04-090, Electronic Colloquium on Computational Complexity, 2005
-
(2005)
Technical Report
, vol.TR04-090
-
-
Amano, K.1
Maruoka, A.2
-
3
-
-
24144494482
-
Characterizing ideal weighted threshold secret sharing
-
Proc. Second Theory of Cryptography Conf., Springer Berlin
-
A. Beimel, T. Tassa, and E. Weinreb Characterizing ideal weighted threshold secret sharing Proc. Second Theory of Cryptography Conf. Lecture Notes in Comput. Sci. vol. 3378 2005 Springer Berlin 600 619
-
(2005)
Lecture Notes in Comput. Sci.
, vol.3378
, pp. 600-619
-
-
Beimel, A.1
Tassa, T.2
Weinreb, E.3
-
4
-
-
85027202957
-
Generalized secret sharing and monotone functions
-
CRYPTO'88, Springer Berlin
-
J. Benaloh, and J. Leichter Generalized secret sharing and monotone functions CRYPTO'88 Lecture Notes in Comput. Sci. vol. 403 1990 Springer Berlin 27 35
-
(1990)
Lecture Notes in Comput. Sci.
, vol.403
, pp. 27-35
-
-
Benaloh, J.1
Leichter, J.2
-
6
-
-
0013416929
-
Simulating threshold circuits by majority circuits
-
M. Goldmann, and M. Karpinski Simulating threshold circuits by majority circuits SIAM J. Comput. 27 1998 230 246
-
(1998)
SIAM J. Comput.
, vol.27
, pp. 230-246
-
-
Goldmann, M.1
Karpinski, M.2
-
7
-
-
0000420294
-
On the size of weights for threshold gates
-
J. Håstad On the size of weights for threshold gates SIAM J. Discrete Math. 7 3 1994 484 492
-
(1994)
SIAM J. Discrete Math.
, vol.7
, Issue.3
, pp. 484-492
-
-
Håstad, J.1
-
8
-
-
34250091945
-
Learning when irrelevant attributes abound: A new linear-threshold algorithm
-
N. Littlestone Learning when irrelevant attributes abound: A new linear-threshold algorithm Mach. Learning 2 1988 285 318
-
(1988)
Mach. Learning
, vol.2
, pp. 285-318
-
-
Littlestone, N.1
-
10
-
-
0033591581
-
Weighted threshold secret sharing schemes
-
P. Morillo, C. Padró, G. Sáez, and J.L. Villar Weighted threshold secret sharing schemes Inform. Process. Lett. 70 5 1999 211 216
-
(1999)
Inform. Process. Lett.
, vol.70
, Issue.5
, pp. 211-216
-
-
Morillo, P.1
Padró, C.2
Sáez, G.3
Villar, J.L.4
-
12
-
-
0003173491
-
On the algorithmic complexity of discrete functions
-
Y. Ofman On the algorithmic complexity of discrete functions Sov. Phys. Dokl. 7 1963 589 591 (English translation)
-
(1963)
Sov. Phys. Dokl.
, vol.7
, pp. 589-591
-
-
Ofman, Y.1
-
13
-
-
0024019151
-
Parallel computation with threshold functions
-
I. Parberry, and G. Schnitger Parallel computation with threshold functions J. Comput. System Sci. 36 3 1988 278 302
-
(1988)
J. Comput. System Sci.
, vol.36
, Issue.3
, pp. 278-302
-
-
Parberry, I.1
Schnitger, G.2
-
15
-
-
3142639211
-
Monotone Boolean formulas can approximate monotone linear threshold functions
-
R. Servedio Monotone Boolean formulas can approximate monotone linear threshold functions Discrete Appl. Math. 142 1-3 2004 181 187
-
(2004)
Discrete Appl. Math.
, vol.142
, Issue.1-3
, pp. 181-187
-
-
Servedio, R.1
-
16
-
-
0018545449
-
How to share a secret
-
A. Shamir How to share a secret Comm. ACM 22 1979 612 613
-
(1979)
Comm. ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
17
-
-
0004021233
-
On time hardware tradeoffs for Boolean functions
-
P.M. Spira, On time hardware tradeoffs for Boolean functions, in: Proc. 4th Hawaii Symp. on System Sci., 1971, pp. 525-527
-
(1971)
Proc. 4th Hawaii Symp. on System Sci.
, pp. 525-527
-
-
Spira, P.M.1
-
18
-
-
0000378392
-
Short monotone formulae for the majority function
-
L.G. Valiant Short monotone formulae for the majority function J. Algorithms 5 3 1984 363 366
-
(1984)
J. Algorithms
, vol.5
, Issue.3
, pp. 363-366
-
-
Valiant, L.G.1
-
19
-
-
0346895377
-
On the power of computational secret sharing
-
Proc. Indocrypt
-
V. Vinod, A. Narayanan, K. Srinathan, C. Pandu Rangan, and K. Kim On the power of computational secret sharing Proc. Indocrypt Lecture Notes in Comput. Sci. vol. 2904 2003 162 176
-
(2003)
Lecture Notes in Comput. Sci.
, vol.2904
, pp. 162-176
-
-
Vinod, V.1
Narayanan, A.2
Srinathan, K.3
Pandu Rangan, C.4
Kim, K.5
-
20
-
-
84937739956
-
A suggestion for a fast multiplier
-
C.S. Wallace A suggestion for a fast multiplier IEEE Trans. Comput. 13 1964 14 17
-
(1964)
IEEE Trans. Comput.
, vol.13
, pp. 14-17
-
-
Wallace, C.S.1
-
21
-
-
1542275758
-
Relating monotone formula size and monotone depth of Boolean functions
-
I. Wegener Relating monotone formula size and monotone depth of Boolean functions Inform. Process. Lett. 16 1 1983 41 42
-
(1983)
Inform. Process. Lett.
, vol.16
, Issue.1
, pp. 41-42
-
-
Wegener, I.1
|