-
1
-
-
0003415652
-
-
Addison-Wesley, Reading, MA
-
A.V. AHO, J.E. HOPCROFT, AND J.D. ULLMAN, The Design and Analysis of Computer Algorithms, Addison-Wesley, Reading, MA, 1974.
-
(1974)
The Design and Analysis of Computer Algorithms
-
-
Aho, A.V.1
Hopcroft, J.E.2
Ullman, J.D.3
-
3
-
-
0026626314
-
Experimental quantum cryptography
-
C.H. BENNETT, F. BESSETTE, G. BRASSARD, L. SALVAIL, AND J. SMOLIN, Experimental quantum cryptography, J. Cryptology, 5 (1992), pp. 3-28.
-
(1992)
J. Cryptology
, vol.5
, pp. 3-28
-
-
Bennett, C.H.1
Bessette, F.2
Brassard, G.3
Salvail, L.4
Smolin, J.5
-
4
-
-
0036041924
-
Randomness conductors and constant-degree expansion beyond the degree/2 barrier
-
M. CAPALBO, O. REINGOLD, S. VADHAN, AND A. WIGDERSON, Randomness conductors and constant-degree expansion beyond the degree/2 barrier, in Proceedings of the 34th Annual ACM Symposium on Theory of Computing, 2002, pp. 659-668.
-
(2002)
Proceedings of the 34th Annual ACM Symposium on Theory of Computing
, pp. 659-668
-
-
Capalbo, M.1
Reingold, O.2
Vadhan, S.3
Wigderson, A.4
-
5
-
-
0018456171
-
Universal classes of hash functions
-
J.L. CARTER AND M.N. WEGMAN, Universal classes of hash functions, J. Comput. System Sci., 18 (1979), pp. 143-154.
-
(1979)
J. Comput. System Sci.
, vol.18
, pp. 143-154
-
-
Carter, J.L.1
Wegman, M.N.2
-
6
-
-
0028483923
-
Locality-preserving hash functions for general purpose, parallel computation
-
A. CHIN, Locality-preserving hash functions for general purpose, parallel computation, Algorithmica, 12 (1994), pp. 170-181.
-
(1994)
Algorithmica
, vol.12
, pp. 170-181
-
-
Chin, A.1
-
7
-
-
0028483725
-
Dynamic perfect hashing: Upper and lower bounds
-
M. DIETZFELBINGER, A. KARLIN, K. MEHLHORN, F. MEYER AUF DER HEIDE, H. ROHNERT, AND R.E. TARJAN, Dynamic perfect hashing: Upper and lower bounds, SIAM J. Comput., 23 (1994), pp. 738-761.
-
(1994)
SIAM J. Comput.
, vol.23
, pp. 738-761
-
-
Dietzfelbinger, M.1
Karlin, A.2
Mehlhorn, K.3
Auf Der Heide, F.M.4
Rohnert, H.5
Tarjan, R.E.6
-
8
-
-
0021467937
-
Storing a sparse table with O(1) worst case access time
-
M.L. FREDMAN, J. KOMLÓS, AND E. SZEMERÉDI, Storing a sparse table with O(1) worst case access time, J. ACM, 31 (1984), pp. 538-544.
-
(1984)
J. ACM
, vol.31
, pp. 538-544
-
-
Fredman, M.L.1
Komlós, J.2
Szemerédi, E.3
-
9
-
-
0032620565
-
An optical simulation of shared memory
-
L.A. GOLDBERO, Y. MATIAS, AND S. RAO, An optical simulation of shared memory, SIAM J. Comput., 28 (1999), pp. 1829-1847.
-
(1999)
SIAM J. Comput.
, vol.28
, pp. 1829-1847
-
-
Goldbero, L.A.1
Matias, Y.2
Rao, S.3
-
10
-
-
0024091390
-
Parallel hashing: An efficient implementation of shared memory
-
A. KARLIN AND E. UPFAL, Parallel hashing: An efficient implementation of shared memory, J. ACM, 35 (1988), pp. 876-892.
-
(1988)
J. ACM
, vol.35
, pp. 876-892
-
-
Karlin, A.1
Upfal, E.2
-
11
-
-
0001171279
-
Efficient PRAM simulation on a distributed memory machine
-
R. KARP, M. LUBY, AND F. MEYER AUF DER HEIDE, Efficient PRAM simulation on a distributed memory machine, Algorithmica, 16 (1996), pp. 517-542.
-
(1996)
Algorithmica
, vol.16
, pp. 517-542
-
-
Karp, R.1
Luby, M.2
Meyer Auf Der Heide, F.3
-
12
-
-
0003657590
-
-
Addison-Wesley, Reading, MA
-
D.E. KNUTH, The Art of Computer Programming, Vol. 3: Sorting and Searching, 2nd ed., Addison-Wesley, Reading, MA, 1998.
-
(1998)
The Art of Computer Programming, Vol. 3: Sorting and Searching, 2nd Ed.
-
-
Knuth, D.E.1
-
13
-
-
0025234213
-
A complexity theory of efficient parallel algorithms
-
C.P. KRUSKAL, L. RUDOLPH, AND M. SNIR, A complexity theory of efficient parallel algorithms, Theoret. Comput. Sci., 71 (1990), pp. 95-132.
-
(1990)
Theoret. Comput. Sci.
, vol.71
, pp. 95-132
-
-
Kruskal, C.P.1
Rudolph, L.2
Snir, M.3
-
14
-
-
0038446831
-
Extractors: Optimal up to constant factors
-
C.-J. Lu, O. REINGOLD, S. VADHANM, AND A. WIGDERSON, Extractors: Optimal up to constant factors, in Proceedings of the 35th Annual ACM Symposium on Theory of Computing, 2003, pp. 602-611.
-
(2003)
Proceedings of the 35th Annual ACM Symposium on Theory of Computing
, pp. 602-611
-
-
Lu, C.-J.1
Reingold, O.2
Vadhanm, S.3
Wigderson, A.4
-
15
-
-
0003672894
-
More analysis of double hashing
-
G.S. LUEKER AND M. MOLODOWITCH, More analysis of double hashing, Combinatorica, 13 (1993), pp. 83-96.
-
(1993)
Combinatorica
, vol.13
, pp. 83-96
-
-
Lueker, G.S.1
Molodowitch, M.2
-
16
-
-
0006241649
-
Fast, efficient mutual and self simulations for shared memory and reconfigurable mesh
-
Y. MATIAS AND A. SCHUSTER, Fast, efficient mutual and self simulations for shared memory and reconfigurable mesh, Parallel Algorithms Appl., Special Issue on Algorithms for Enhanced Mesh Architectures, 8 (1996), pp. 195-221.
-
(1996)
Parallel Algorithms Appl., Special Issue on Algorithms for Enhanced Mesh Architectures
, vol.8
, pp. 195-221
-
-
Matias, Y.1
Schuster, A.2
-
18
-
-
0021522108
-
Randomized and deterministic simulations of PRAMs by parallel machines with restricted granularity of parallel memories
-
K. MEHLHORN AND U. VISHKIN, Randomized and deterministic simulations of PRAMs by parallel machines with restricted granularity of parallel memories, Acta Inform., 21 (1984), pp. 339-374.
-
(1984)
Acta Inform.
, vol.21
, pp. 339-374
-
-
Mehlhorn, K.1
Vishkin, U.2
-
20
-
-
0026170376
-
How to emulate shared memory
-
A.G. RANADE, How to emulate shared memory, J. Comput. System Sci., 42 (1991), pp. 307-326.
-
(1991)
J. Comput. System Sci.
, vol.42
, pp. 307-326
-
-
Ranade, A.G.1
-
21
-
-
0036000527
-
Entropy waves, the zig-zag graph product, and new constant-degree expanders
-
O. REINGOLD, S. VADHAN, AND A. WIGDERSON, Entropy waves, the zig-zag graph product, and new constant-degree expanders, Ann. of Math. (2), 155 (2002), pp. 157-187.
-
(2002)
Ann. of Math. (2)
, vol.155
, pp. 157-187
-
-
Reingold, O.1
Vadhan, S.2
Wigderson, A.3
-
23
-
-
3142670825
-
Double hashing is computable and randomizable with universal hash functions
-
submitted
-
J.P. SCHMIDT AND A. SIEGEL, Double Hashing Is Computable and Randomizable with Universal Hash Functions, SIAM J. Comput., submitted.
-
SIAM J. Comput.
-
-
Schmidt, J.P.1
Siegel, A.2
-
24
-
-
0001595705
-
Chernoff bounds for applications with limited independence
-
J.P. SCHMIDT, A. SIEGEL, AND A. SRINIVASAN, Chernoff-Hoeffding bounds for applications with limited independence, SIAM J. Discr. Math., 8 (1995), pp. 223-250.
-
(1995)
SIAM J. Discr. Math.
, vol.8
, pp. 223-250
-
-
Schmidt, J.P.1
Siegel, A.2
Srinivasan, A.3
-
25
-
-
3142763385
-
Closed hashing is computable and optimally randomizable with universal hash functions
-
submitted
-
A. SIEGEL AND J.P. SCHMIDT, Closed Hashing Is Computable and Optimally Randomizable with Universal Hash Functions, SIAM J. Comput., submitted.
-
SIAM J. Comput.
-
-
Siegel, A.1
Schmidt, J.P.2
-
26
-
-
0024768554
-
On universal classes of fast high performance hash functions, their time-space tradeoff, and their applications
-
A. SIEGEL, On universal classes of fast high performance hash functions, their time-space tradeoff, and their applications, in Proceedings of the 30th Annual IEEE Symposium on Foundations of Computer Science, 1989, pp. 20-25.
-
(1989)
Proceedings of the 30th Annual IEEE Symposium on Foundations of Computer Science
, pp. 20-25
-
-
Siegel, A.1
-
27
-
-
0346492027
-
Median bounds and their application
-
A. SIEGEL, Median bounds and their application, J. Algorithms, 38 (2001), pp. 184-236.
-
(2001)
J. Algorithms
, vol.38
, pp. 184-236
-
-
Siegel, A.1
-
29
-
-
0346736475
-
Ten lectures on the probabilistic method, 2nd ed.
-
SIAM, Philadelphia
-
J. SPENCER, Ten Lectures on the Probabilistic Method, 2nd ed., CBMS-NSF Regional Conf. Ser. in Appl. Math. 64, SIAM, Philadelphia, 1994.
-
(1994)
CBMS-NSF Regional Conf. Ser. in Appl. Math.
, vol.64
-
-
Spencer, J.1
-
30
-
-
0021465184
-
Efficient schemes for parallel computation
-
E. UPFAL, Efficient schemes for parallel computation, J. ACM, 31 (1984), pp. 507-517.
-
(1984)
J. ACM
, vol.31
, pp. 507-517
-
-
Upfal, E.1
-
31
-
-
85034736985
-
A Probabilistic relation between desirable and feasible models of parallel computation
-
E. UPFAL, A probabilistic relation between desirable and feasible models of parallel computation, in Proceedings of the 16th Annual ACM Symposium on Theory of Computing, 1984, pp. 258-265.
-
(1984)
Proceedings of the 16th Annual ACM Symposium on Theory of Computing
, pp. 258-265
-
-
Upfal, E.1
-
32
-
-
0023266822
-
How to share memory in a distributed system
-
E. UPFAL AND A. WIGDERSON, How to share memory in a distributed system, J. ACM, 34 (1987), pp. 116-127.
-
(1987)
J. ACM
, vol.34
, pp. 116-127
-
-
Upfal, E.1
Wigderson, A.2
-
35
-
-
0002655387
-
General purpose parallel architectures
-
J. van Leeuwen, ed., Elsevier, Amsterdam
-
L.G. VALIANT, General purpose parallel architectures, in Handbook of Theoretical Computer Science, Vol. A, J. van Leeuwen, ed., Elsevier, Amsterdam, 1990, pp. 943-972.
-
(1990)
Handbook of Theoretical Computer Science
, vol.A
, pp. 943-972
-
-
Valiant, L.G.1
-
36
-
-
0019572642
-
New hash functions and their use in authentication and set equality
-
M.N. WEGMAN AND J.L. CARTER, New hash functions and their use in authentication and set equality, J. Comput. System Sci., 22 (1981), pp. 265-279.
-
(1981)
J. Comput. System Sci.
, vol.22
, pp. 265-279
-
-
Wegman, M.N.1
Carter, J.L.2
-
37
-
-
0022092527
-
Uniform hashing is optimal
-
A.C. YAO, Uniform hashing is optimal, J. ACM, 32 (1985), pp. 687-693.
-
(1985)
J. ACM
, vol.32
, pp. 687-693
-
-
Yao, A.C.1
|