-
2
-
-
0041089975
-
On hiding information from an oracle
-
M. Abadi, J. Feigenbaum, and J. Kilian, "On hiding information from an oracle," Journal of Computer and System Sciences, vol. 39, no. 1, pp. 21-50, 1989.
-
(1989)
Journal of Computer and System Sciences
, vol.39
, Issue.1
, pp. 21-50
-
-
Abadi, M.1
Feigenbaum, J.2
Kilian, J.3
-
3
-
-
85068530809
-
Two theorems on random polynomial time
-
Long Beach, California
-
L. Adleman, "Two theorems on random polynomial time," in Annual Symposium on Foundations of Computer Science (Ann Arbor, Mich., 1978), pp. 75-83, Long Beach, California, 1978.
-
(1978)
Annual Symposium on Foundations of Computer Science (Ann Arbor, Mich., 1978)
, pp. 75-83
-
-
Adleman, L.1
-
5
-
-
15944413051
-
Primality and identity testing via Chinese remaindering
-
DOI 10.1145/792538.792540
-
M. Agrawal and S. Biswas, "Primality and identity testing via Chinese remaindering," Journal of the ACM, vol. 50, no. 4, pp. 429-443, 2003. (Pubitemid 43906332)
-
(2003)
Journal of the ACM
, vol.50
, Issue.4
, pp. 429-443
-
-
Agrawal, M.1
Biswas, S.2
-
6
-
-
15944367466
-
PRIMES is in P
-
M. Agrawal, N. Kayal, and N. Saxena, "PRIMES is in P," Annals of Mathematics. Second Series, vol. 160, no. 2, pp. 781-793, 2004. (Pubitemid 40447851)
-
(2004)
Annals of Mathematics
, vol.160
, Issue.2
, pp. 781-793
-
-
Agrawal, M.1
Kayal, N.2
Saxena, N.3
-
7
-
-
58049118510
-
Arithmetic circuits: A chasm at depth four
-
M. Agrawal and V. Vinay, "Arithmetic circuits: A chasm at depth four," in FOCS, pp. 67-75, 2008
-
(2008)
FOCS
, pp. 67-75
-
-
Agrawal, M.1
Vinay, V.2
-
9
-
-
0038309370
-
Construction of a thin set with small Fourier coefficients
-
M. Ajtai, H. Iwaniec, J. Komlós, J. Pintz, and E. Szemerédi, "Construction of a thin set with small Fourier coefficients," Bulletin of the London Mathematical Society, vol. 22, no. 6, pp. 583-590, 1990.
-
(1990)
Bulletin of the London Mathematical Society
, vol.22
, Issue.6
, pp. 583-590
-
-
Ajtai, M.1
Iwaniec, H.2
Komlós, J.3
Pintz, J.4
Szemerédi, E.5
-
10
-
-
51249184131
-
Sorting in c logn parallel steps
-
M. Ajtai, J. Komlós, and E. Szemerédi, "Sorting in c logn parallel steps," Combinatorica, vol. 3, no. 1, pp. 1-19, 1983.
-
(1983)
Combinatorica
, vol.3
, Issue.1
, pp. 1-19
-
-
Ajtai, M.1
Komlós, J.2
Szemerédi, E.3
-
11
-
-
0023548546
-
Deterministic simulation in LOGSPACE
-
New York City, 25-27 May
-
M. Ajtai, J. Komlós, and E. Szemerédi, "Deterministic Simulation in LOGSPACE," in Annual ACM Symposium on Theory of Computing, pp. 132-140, New York City, 25-27 May 1987.
-
(1987)
Annual ACM Symposium on Theory of Computing
, pp. 132-140
-
-
Ajtai, M.1
Komlós, J.2
Szemerédi, E.3
-
12
-
-
35048821800
-
Deterministic simulation of probabilistic constant depth circuits
-
of Advances in Computing Research, (F. P. Preparata and S. Micali, eds.)
-
M. Ajtai and A. Wigderson, "Deterministic simulation of probabilistic constant depth circuits," in Randomness and Computation, vol. 5 of Advances in Computing Research, (F. P. Preparata and S. Micali, eds.), pp. 199-223, 1989.
-
(1989)
Randomness and Computation
, vol.5
, pp. 199-223
-
-
Ajtai, M.1
Wigderson, A.2
-
13
-
-
85045415700
-
Random walks, universal traversal sequences, and the complexity of maze problems
-
New York
-
R. Aleliunas, R. M. Karp, R. J. Lipton, L. Lovász, and C. Rackoff, "Random walks, universal traversal sequences, and the complexity of maze problems," in Annual Symposium on Foundations of Computer Science (San Juan, Puerto Rico, 1979), pp. 218-223, New York, 1979.
-
(1979)
Annual Symposium on Foundations of Computer Science (San Juan, Puerto Rico, 1979)
, pp. 218-223
-
-
Aleliunas, R.1
Karp, R.M.2
Lipton, R.J.3
Lovász, L.4
Rackoff, C.5
-
14
-
-
33845570500
-
Power from random strings
-
DOI 10.1137/050628994
-
E. Allender, H. Buhrman, M. Koucký, D. van Melkebeek, and D. Ronneburger, "Power from random strings," SIAM Journal on Computing, vol. 35, no. 6, pp. 1467-1493, 2006. (Pubitemid 44935686)
-
(2006)
SIAM Journal on Computing
, vol.35
, Issue.6
, pp. 1467-1493
-
-
Allender, E.1
Buhrman, H.2
Koucky, M.3
Van Melkebeek, D.4
Ronneburger, D.5
-
15
-
-
51249173340
-
Eigenvalues and expanders
-
N. Alon, "Eigenvalues and expanders," Combinatorica, vol. 6, no. 2, pp. 83-96, 1986.
-
(1986)
Combinatorica
, vol.6
, Issue.2
, pp. 83-96
-
-
Alon, N.1
-
16
-
-
51249178048
-
Eigenvalues, geometric expanders, sorting in rounds, and Ramsey theory
-
N. Alon, "Eigenvalues, geometric expanders, sorting in rounds, and Ramsey theory," Combinatorica, vol. 6, no. 3, pp. 207-219, 1986.
-
(1986)
Combinatorica
, vol.6
, Issue.3
, pp. 207-219
-
-
Alon, N.1
-
17
-
-
0036957866
-
Explicit unique-neighbor expanders
-
N. Alon and M. R. Capalbo, "Explicit unique-neighbor expanders," in Symposium on Foundations of Computer Science (Vancouver, BC, 2002), pp. 73-79, 2002
-
(2002)
Symposium on Foundations of Computer Science (Vancouver, BC, 2002)
, pp. 73-79
-
-
Alon, N.1
Capalbo, M.R.2
-
18
-
-
38249028223
-
Explicit construction of linear sized tolerant networks
-
N. Alon and F. R. K. Chung, "Explicit construction of linear sized tolerant networks," Discrete Mathematics, vol. 72, no. 1-3, pp. 15-19, 1988.
-
(1988)
Discrete Mathematics
, vol.72
, Issue.1-3
, pp. 15-19
-
-
Alon, N.1
Chung, F.R.K.2
-
19
-
-
84990678058
-
Simple constructions of almost k-wise independent random variables
-
(See also addendum in issue 4(1), 1993, 199-120)
-
N. Alon, O. Goldreich, J. Håstad, and R. Peralta, "Simple constructions of almost k-wise independent random variables," Random Structures & Algorithms, vol. 3, no. 3, pp. 289-304, 1992. (See also addendum in issue 4(1), 1993, pp. 199-120).
-
(1992)
Random Structures & Algorithms
, vol.3
, Issue.3
, pp. 289-304
-
-
Alon, N.1
Goldreich, O.2
Håstad, J.3
Peralta, R.4
-
20
-
-
36448962041
-
Guessing secrets efficiently via list decoding
-
Art, 16
-
N. Alon, V. Guruswami, T. Kaufman, and M. Sudan, "Guessing secrets efficiently via list decoding," ACM Transactions on Algorithms, vol. 3, no. 4, pp. Art 42, 16, 2007.
-
(2007)
ACM Transactions on Algorithms
, vol.3
, Issue.4
, pp. 42
-
-
Alon, N.1
Guruswami, V.2
Kaufman, T.3
Sudan, M.4
-
21
-
-
0029326046
-
∈-discrepancy sets and their application for interpolation of sparse polynomials
-
N. Alon and Y. Mansour, "∈-discrepancy sets and their application for interpolation of sparse polynomials," Information Processing Letters, vol. 54, no. 6, pp. 337-342, 1995.
-
(1995)
Information Processing Letters
, vol.54
, Issue.6
, pp. 337-342
-
-
Alon, N.1
Mansour, Y.2
-
22
-
-
0033077324
-
The space complexity of approximating the frequency moments
-
N. Alon, Y. Matias, and M. Szegedy, "The space complexity of approximating the frequency moments," Journal of Computer and System Sciences, vol. 58, no. 1, pp. 137-147, (Part 2) 1999.
-
(1999)
Journal of Computer and System Sciences
, vol.58
, Issue.1 PART 2
, pp. 137-147
-
-
Alon, N.1
Matias, Y.2
Szegedy, M.3
-
23
-
-
0021542316
-
Eigenvalues, expanders and superconcentrators
-
N. Alon and V. D. Milman, "Eigenvalues, expanders and superconcentrators (Extended Abstract)," in Annual Symposium on Foundations of Computer Science, pp. 320-322, Singer Island, Florida, 24-26 October 1984. (Pubitemid 16526263)
-
(1984)
Annual Symposium on Foundations of Computer Science (Proceedings)
, pp. 320-322
-
-
Alon Noga1
Milman, V.D.2
-
24
-
-
84990704735
-
Random Cayley graphs and expanders
-
N. Alon and Y. Roichman, "Random Cayley graphs and expanders," Random Structures and Algorithms, vol. 5, no. 2, pp. 271-284, 1994.
-
(1994)
Random Structures and Algorithms
, vol.5
, Issue.2
, pp. 271-284
-
-
Alon, N.1
Roichman, Y.2
-
26
-
-
0034380791
-
Bipartite subgraphs and the smallest eigenvalue
-
N. Alon and B. Sudakov, "Bipartite subgraphs and the smallest eigenvalue," Combinatorics, Probability and Computing, vol. 9, no. 1, pp. 1-12, 2000.
-
(2000)
Combinatorics, Probability and Computing
, vol.9
, Issue.1
, pp. 1-12
-
-
Alon, N.1
Sudakov, B.2
-
27
-
-
84951167484
-
Worst-Case Hardness Suffices for Derandomization: A New Method for Hardness-Randomness Trade-offs
-
Automata, Languages and Programming: 24th International Colloquium, ICALP '97
-
A. E. Andreev, A. E. F. Clementi, and J. D. P. Rolim, "Worst-case hardness suffices for derandomization: A new method for hardness-randomness trade-offs," in Automata, Languages and Programming, 24th International Colloquium, vol. 1256 of Lecture Notes in Computer Science, (P. Degano, R. Gorrieri, and A. Marchetti-Spaccamela, eds.), pp. 177-187, Bologna, Italy: Springer-Verlag, 7-11 July 1997. (Pubitemid 127097735)
-
(1997)
Lecture Notes in Computer Science
, Issue.1256
, pp. 177-187
-
-
Andreev, A.A.1
Clementi, A.E.F.2
Rolim, J.D.P.3
-
28
-
-
0033341167
-
Weak random sources, hitting sets, and BPP simulations
-
A. E. Andreev, A. E. F. Clementi, J. D. P. Rolim, and L. Trevisan, "Weak random sources, hitting sets, and BPP simulations," SIAM Journal on Computing, vol. 28, no. 6, pp. 2103-2116, (electronic) 1999. (Pubitemid 30530993)
-
(1999)
SIAM Journal on Computing
, vol.28
, Issue.6
, pp. 2103-2116
-
-
Andreev, A.E.1
Clementi, A.E.F.2
Rolim, J.D.P.3
Trevisan, L.4
-
29
-
-
0011208228
-
Provable security of cryptosystems: A survey
-
Yale University, Department of Computer Science
-
D. Angluin and D. Lichtenstein, "Provable security of cryptosystems: A survey," Technical Report YALEU/DCS/TR-288, Yale University, Department of Computer Science, 1983.
-
(1983)
Technical Report YALEU/DCS/TR-288
-
-
Angluin, D.1
Lichtenstein, D.2
-
30
-
-
0032107942
-
Reconstructing algebraic functions from mixed data
-
S. Ar, R. J. Lipton, R. Rubinfeld, and M. Sudan, "Reconstructing algebraic functions from mixed data," SIAM Journal on Computing, vol. 28, no. 2, pp. 487-510, 1999.
-
(1999)
SIAM Journal on Computing
, vol.28
, Issue.2
, pp. 487-510
-
-
Ar, S.1
Lipton, R.J.2
Rubinfeld, R.3
Sudan, M.4
-
31
-
-
0030402040
-
Discrepancy sets and pseudorandom generators for combinatorial rectangles
-
Los Alamitos, CA
-
R. Armoni, M. Saks, A. Wigderson, and S. Zhou, "Discrepancy sets and pseudorandom generators for combinatorial rectangles," in Annual Symposium on Foundations of Computer Science (Burlington, VT, 1996), pp. 412-421, Los Alamitos, CA, 1996.
-
(1996)
Annual Symposium on Foundations of Computer Science (Burlington, VT, 1996)
, pp. 412-421
-
-
Armoni, R.1
Saks, M.2
Wigderson, A.3
Zhou, S.4
-
32
-
-
80355146603
-
-
Cambridge: Cambridge University Press, (A modern approach)
-
S. Arora and B. Barak, Computational complexity. Cambridge: Cambridge University Press, 2009. (A modern approach).
-
(2009)
Computational Complexity
-
-
Arora, S.1
Barak, B.2
-
33
-
-
0032058198
-
Proof Verification and the Hardness of Approximation Problems
-
S. Arora, C. Lund, R. Motwani, M. Sudan, and M. Szegedy, "Proof verification and the hardness of approximation problems," Journal of the ACM, vol. 45, pp. 501-555, May 1998. (Pubitemid 128506634)
-
(1998)
Journal of the ACM
, vol.45
, Issue.3
, pp. 501-555
-
-
Arora, S.1
Lund, C.2
Motwani, R.3
Sudan, M.4
Szegedy, M.5
-
34
-
-
0031651077
-
Probabilistic checking of proofs: A new characterization of NP
-
S. Arora and S. Safra, "Probabilistic checking of proofs: A new characterization of NP," Journal of the ACM, vol. 45, pp. 70-122, January 1998. (Pubitemid 128615465)
-
(1998)
Journal of the ACM
, vol.45
, Issue.1
, pp. 70-122
-
-
Arora, S.1
Safra, S.2
-
35
-
-
0030645273
-
Improved low degree testing and its applications
-
El Paso, Texas, 4-6 May
-
S. Arora and M. Sudan, "Improved low degree testing and its applications," in Proceedings of the Annual ACM Symposium on Theory of Computing, pp. 485-495, El Paso, Texas, 4-6 May 1997.
-
(1997)
Proceedings of the Annual ACM Symposium on Theory of Computing
, pp. 485-495
-
-
Arora, S.1
Sudan, M.2
-
36
-
-
0003956968
-
-
Englewood Cliffs, NJ: Prentice Hall Inc
-
M. Artin, Algebra. Englewood Cliffs, NJ: Prentice Hall Inc., 1991.
-
(1991)
Algebra
-
-
Artin, M.1
-
37
-
-
0034909808
-
On pseudorandomness and resource-bounded measure
-
DOI 10.1016/S0304-3975(99)00164-4, PII S0304397599001644
-
V. Arvind and J. Köbler, "On pseudorandomness and resource-bounded measure," Theoretical Computer Science, vol. 255, no. 1-2, pp. 205-221, 2001. (Pubitemid 32680449)
-
(2001)
Theoretical Computer Science
, vol.255
, Issue.1-2
, pp. 205-221
-
-
Arvind, V.1
Kobler, J.2
-
38
-
-
79960561408
-
Derandomizing Arthur-Merlin games and approximate counting implies exponential-size lower bounds
-
B. Aydinliõglu, D. Gutfreund, J. M. Hitchcock, and A. Kawachi, "Derandomizing Arthur-Merlin games and approximate counting implies exponential-size lower bounds," Computational Complexity, vol. 20, no. 2, pp. 329-366, 2011.
-
(2011)
Computational Complexity
, vol.20
, Issue.2
, pp. 329-366
-
-
Aydinliõglu, B.1
Gutfreund, D.2
Hitchcock, J.M.3
Kawachi, A.4
-
40
-
-
0040350285
-
Approximating probability distributions using small sample spaces
-
Y. Azar, R. Motwani, and J. Naor, "Approximating probability distributions using small sample spaces," Combinatorica, vol. 18, no. 2, pp. 151-171, 1998. (Pubitemid 128341488)
-
(1998)
Combinatorica
, vol.18
, Issue.2
, pp. 151-171
-
-
Azar, Y.1
Motwani, R.2
Naor, J.3
-
41
-
-
85028539051
-
Checking computations in polylogarithmic time
-
(C. Koutsougeras and J. S. Vitter, eds.), ACM
-
L. Babai, L. Fortnow, L. A. Levin, and M. Szegedy, "Checking computations in polylogarithmic time," in STOC, (C. Koutsougeras and J. S. Vitter, eds.), pp. 21-31, ACM, 1991.
-
(1991)
STOC
, pp. 21-31
-
-
Babai, L.1
Fortnow, L.2
Levin, L.A.3
Szegedy, M.4
-
42
-
-
0002771903
-
Nondeterministic exponential time has two-prover interactive protocols
-
L. Babai, L. Fortnow, and C. Lund, "Nondeterministic exponential time has two-prover interactive protocols," Computational Complexity, vol. 1, no. 1, pp. 3-40, 1991.
-
(1991)
Computational Complexity
, vol.1
, Issue.1
, pp. 3-40
-
-
Babai, L.1
Fortnow, L.2
Lund, C.3
-
43
-
-
0001338853
-
BPP has subexponential time simulations unless EXPTIME has publishable proofs
-
L. Babai, L. Fortnow, N. Nisan, and A. Wigderson, "BPP has subexponential time simulations unless EXPTIME has publishable proofs," Computational Complexity, vol. 3, no. 4, pp. 307-318, 1993.
-
(1993)
Computational Complexity
, vol.3
, Issue.4
, pp. 307-318
-
-
Babai, L.1
Fortnow, L.2
Nisan, N.3
Wigderson, A.4
-
44
-
-
0023995534
-
Arthur-merlin games: A randomized proof system, and a hierarchy of complexity classes
-
DOI 10.1016/0022-0000(88)90028-1
-
L. Babai and S. Moran, "Arthur-Merlin games: A randomized proof system, and a hierarchy of complexity classes," Journal of Computer and System Sciences, vol. 36, no. 2, pp. 254-276, 1988. (Pubitemid 18623335)
-
(1988)
Journal of Computer and System Sciences
, vol.36
, Issue.2
, pp. 254-276
-
-
Babai Laszlo1
-
45
-
-
70349161954
-
The uniform hardcore lemma via approximate Bregman projections
-
Philadelphia, PA
-
B. Barak, M. Hardt, and S. Kale, "The uniform hardcore lemma via approximate Bregman projections," in Proceedings of the Annual ACM-SIAM Symposium on Discrete Algorithms, pp. 1193-1200, Philadelphia, PA, 2009.
-
(2009)
Proceedings of the Annual ACM-SIAM Symposium on Discrete Algorithms
, pp. 1193-1200
-
-
Barak, B.1
Hardt, M.2
Kale, S.3
-
46
-
-
34247566037
-
Extracting randomness using few independent sources
-
DOI 10.1137/S0097539705447141
-
B. Barak, R. Impagliazzo, and A. Wigderson, "Extracting randomness using few independent sources," SIAM Journal on Computing, vol. 36, no. 4, pp. 1095-1118, 2006. (Pubitemid 47246878)
-
(2006)
SIAM Journal on Computing
, vol.36
, Issue.4
, pp. 1095-1118
-
-
Barak, B.1
Impagliazzo, R.2
Wigderson, A.3
-
47
-
-
77952022169
-
Simulating independence: New constructions of condensers, Ramsey graphs, dispersers, and extractors
-
4, Art, 52
-
B. Barak, G. Kindler, R. Shaltiel, B. Sudakov, and A. Wigderson, "Simulating independence: New constructions of condensers, Ramsey graphs, dispersers, and extractors," Journal of the ACM, vol. 57, no. 4, no. 4, pp. Art 20, 52, 2010.
-
(2010)
Journal of the ACM
, vol.57
, Issue.4
, pp. 20
-
-
Barak, B.1
Kindler, G.2
Shaltiel, R.3
Sudakov, B.4
Wigderson, A.5
-
48
-
-
84872472857
-
2-source dispersers for no(1) entropy and Ramsey graphs beating the Frankl-Wilson construction
-
(To appear. Preliminary version in STOC '06)
-
B. Barak, A. Rao, R. Shaltiel, and A. Wigderson, "2-source dispersers for no(1) entropy and Ramsey graphs beating the Frankl-Wilson construction," Annals of Mathematics, 2012. (To appear. Preliminary version in STOC '06).
-
(2012)
Annals of Mathematics
-
-
Barak, B.1
Rao, A.2
Shaltiel, R.3
Wigderson, A.4
-
49
-
-
35248890430
-
Computational analogues of entropy
-
of Lecture Notes in Computer Science, Berlin: Springer
-
B. Barak, R. Shaltiel, and A. Wigderson, "Computational analogues of entropy," in Approximation, randomization, and combinatorial optimization, vol. 2764 of Lecture Notes in Computer Science, pp. 200-215, Berlin: Springer, 2003.
-
(2003)
Approximation, Randomization, and Combinatorial Optimization
, vol.2764
, pp. 200-215
-
-
Barak, B.1
Shaltiel, R.2
Wigderson, A.3
-
51
-
-
34548241582
-
-
Special Publication 800-90A, National Institute of Standards and Technology, U.S. Department of Commerce, January
-
E. Barker and J. Kelsey, "Recommendation for random number generation using deterministic random bit generators," Special Publication 800-90A, National Institute of Standards and Technology, U.S. Department of Commerce, January 2012.
-
(2012)
Recommendation for Random Number Generation Using Deterministic Random Bit Generators
-
-
Barker, E.1
Kelsey, J.2
-
52
-
-
0000816264
-
Asymptotically optimal switching circuits
-
L. A. Bassalygo, "Asymptotically optimal switching circuits," Problems of Information Transmission, vol. 17, no. 3, pp. 206-211, 1981.
-
(1981)
Problems of Information Transmission
, vol.17
, Issue.3
, pp. 206-211
-
-
Bassalygo, L.A.1
-
53
-
-
70350682021
-
Twice-ramanujan sparsifiers
-
J. D. Batson, D. A. Spielman, and N. Srivastava, "Twice-ramanujan sparsifiers," in Annual ACM Symposium on Theory of Computing (Bethesda, MD), pp. 255-262, 2009
-
(2009)
Annual ACM Symposium on Theory of Computing (Bethesda, MD)
, pp. 255-262
-
-
Batson, J.D.1
Spielman, D.A.2
Srivastava, N.3
-
54
-
-
33745511846
-
Hiding instances in multioracle queries (Extended Abstract)
-
of Lecture Notes in Computer Science, Berlin: Springer
-
D. Beaver and J. Feigenbaum, "Hiding instances in multioracle queries (Extended Abstract)," in STACS 90 (Rouen, 1990), vol. 415 of Lecture Notes in Computer Science, pp. 37-48, Berlin: Springer, 1990.
-
(1990)
STACS 90 (Rouen, 1990)
, vol.415
, pp. 37-48
-
-
Beaver, D.1
Feigenbaum, J.2
-
55
-
-
0040713388
-
Randomness in interactive proofs
-
M. Bellare, O. Goldreich, and S. Goldwasser, "Randomness in interactive proofs," Computational Complexity, vol. 3, no. 4, pp. 319-354, 1993.
-
(1993)
Computational Complexity
, vol.3
, Issue.4
, pp. 319-354
-
-
Bellare, M.1
Goldreich, O.2
Goldwasser, S.3
-
56
-
-
84958656559
-
"Pseudo-Random" number generation within cryptographic algorithms: The DSS case
-
Advances in Cryptology - CRYPTO '97
-
M. Bellare, S. Goldwasser, and D. Micciancio, ""Pseudo- Random" number generation within cryptographic algorithms: The DDS case," in CRYPTO, vol. 1294 of Lecture Notes in Computer Science, (B. S. K. Jr., ed.), pp. 277-291, Springer, 1997. (Pubitemid 127112559)
-
(1997)
Lecture Notes In Computer Science
, Issue.1294
, pp. 277-291
-
-
Bellare, M.1
Goldwasser, S.2
Micciancio, D.3
-
57
-
-
33749228136
-
Randomness-efficient oblivious sampling
-
Santa Fe, New Mexico, 20-22 November
-
M. Bellare and J. Rompel, "Randomness-efficient oblivious sampling," in Annual Symposium on Foundations of Computer Science, pp. 276-287, Santa Fe, New Mexico, 20-22 November 1994.
-
(1994)
Annual Symposium on Foundations of Computer Science
, pp. 276-287
-
-
Bellare, M.1
Rompel, J.2
-
59
-
-
34547829716
-
Robust PCPs of proximity, shorter PCPs, and applications to coding
-
DOI 10.1137/S0097539705446810
-
E. Ben-Sasson, O. Goldreich, P. Harsha, M. Sudan, and S. Vadhan, "Robust PCPs of proximity, shorter PCPs and applications to coding," SIAM Journal on Computing, vol. 36, no. 4, pp. 889-974, 2006. (Pubitemid 47246874)
-
(2006)
SIAM Journal on Computing
, vol.36
, Issue.4
, pp. 889-974
-
-
Ben-Sasson, E.L.I.1
Goldreich, O.2
Harsha, P.3
Sudan, M.4
Vadhan, S.5
-
61
-
-
0038784507
-
Randomnessefficient low degree tests and short PCPs via epsilon-biased sets
-
New York
-
E. Ben-Sasson, M. Sudan, S. Vadhan, and A. Wigderson, "Randomnessefficient low degree tests and short PCPs via epsilon-biased sets," in Proceedings of the Annual ACM Symposium on Theory of Computing, pp. 612-621, New York, 2003.
-
(2003)
Proceedings of the Annual ACM Symposium on Theory of Computing
, pp. 612-621
-
-
Ben-Sasson, E.1
Sudan, M.2
Vadhan, S.3
Wigderson, A.4
-
62
-
-
79959733663
-
From affine to two-source extractors via approximate duality
-
(L. Fortnow and S. P. Vadhan, eds.), ACM
-
E. Ben-Sasson and N. Zewi, "From affine to two-source extractors via approximate duality," in STOC, (L. Fortnow and S. P. Vadhan, eds.), pp. 177-186, ACM, 2011.
-
(2011)
STOC
, pp. 177-186
-
-
Ben-Sasson, E.1
Zewi, N.2
-
63
-
-
0023985539
-
Privacy amplification by public discussion
-
Special issue on cryptography
-
C. H. Bennett, G. Brassard, and J.-M. Robert, "Privacy amplification by public discussion," SIAM Journal on Computing, vol. 17, no. 2, pp. 210-229, 1988. Special issue on cryptography.
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 210-229
-
-
Bennett, C.H.1
Brassard, G.2
Robert, J.-M.3
-
64
-
-
0021388907
-
On computing the determinant in small parallel time using a small number of processors
-
S. J. Berkowitz, "On computing the determinant in small parallel time using a small number of processors," Information Processing Letters, vol. 18, no. 3, pp. 147-150, 1984.
-
(1984)
Information Processing Letters
, vol.18
, Issue.3
, pp. 147-150
-
-
Berkowitz, S.J.1
-
66
-
-
84968518238
-
Factoring polynomials over large finite fields
-
E. R. Berlekamp, "Factoring polynomials over large finite fields," Mathematics of Computation, vol. 24, pp. 713-735, 1970.
-
(1970)
Mathematics of Computation
, vol.24
, pp. 713-735
-
-
Berlekamp, E.R.1
-
67
-
-
84974696785
-
On families of hash functions via geometric codes and concatenation
-
of Lecture Notes in Computer Science, Berlin: Springer
-
J. Bierbrauer, T. Johansson, G. Kabatianskii, and B. Smeets, "On families of hash functions via geometric codes and concatenation," in Advances in cryptology - CRYPTO '93 (Santa Barbara, CA, 1993), vol. 773 of Lecture Notes in Computer Science, pp. 331-342, Berlin: Springer, 1994.
-
(1994)
Advances in Cryptology - CRYPTO '93 (Santa Barbara, CA, 1993)
, vol.773
, pp. 331-342
-
-
Bierbrauer, J.1
Johansson, T.2
Kabatianskii, G.3
Smeets, B.4
-
68
-
-
33847367664
-
Lifts, discrepancy and nearly optimal spectral gap
-
Y. Bilu and N. Linial, "Lifts, discrepancy and nearly optimal spectral gap," Combinatorica, vol. 26, no. 5, pp. 495-519, 2006.
-
(2006)
Combinatorica
, vol.26
, Issue.5
, pp. 495-519
-
-
Bilu, Y.1
Linial, N.2
-
69
-
-
51249178917
-
Independent unbiased coin flips from a correlated biased source - A finite state Markov chain
-
Theory of computing (Singer Island, Fla., 1984)
-
M. Blum, "Independent unbiased coin flips from a correlated biased source - a finite state Markov chain," Combinatorica, vol. 6, no. 2, pp. 97-108, 1986. Theory of computing (Singer Island, Fla., 1984).
-
(1986)
Combinatorica
, vol.6
, Issue.2
, pp. 97-108
-
-
Blum, M.1
-
70
-
-
0029214558
-
Designing programs that check their work
-
M. Blum and S. Kannan, "Designing programs that check their work," Journal of the ACM, vol. 42, no. 1, pp. 269-291, 1995.
-
(1995)
Journal of the ACM
, vol.42
, Issue.1
, pp. 269-291
-
-
Blum, M.1
Kannan, S.2
-
71
-
-
0000619172
-
Self-testing/correcting with applications to numerical problems
-
M. Blum, M. Luby, and R. Rubinfeld, "Self-testing/correcting with applications to numerical problems," Journal of Computer and System Sciences, vol. 47, no. 3, pp. 549-595, 1993.
-
(1993)
Journal of Computer and System Sciences
, vol.47
, Issue.3
, pp. 549-595
-
-
Blum, M.1
Luby, M.2
Rubinfeld, R.3
-
72
-
-
0021522644
-
How to generate cryptographically strong sequences of pseudo-random bits
-
M. Blum and S. Micali, "How to generate cryptographically strong sequences of pseudorandom bits," SIAM Journal on Computing, vol. 13, no. 4, pp. 850-864, 1984. (Pubitemid 15510668)
-
(1984)
SIAM Journal on Computing
, vol.13
, Issue.4
, pp. 850-864
-
-
Blum Manuel1
Micali Silvio2
-
73
-
-
78751515390
-
Pseudorandomness for width 2 branching programs
-
A. Bogdanov, Z. Dvir, E. Verbin, and A. Yehudayoff, " Pseudorandomness for Width 2 Branching Programs," Electronic Colloquium on Computational Complexity (ECCC), vol. 16, p. 70, 2009.
-
(2009)
Electronic Colloquium on Computational Complexity (ECCC)
, vol.16
, pp. 70
-
-
Bogdanov, A.1
Dvir, Z.2
Verbin, E.3
Yehudayoff, A.4
-
74
-
-
34047176921
-
Average-case complexity
-
DOI 10.1561/0400000004
-
A. Bogdanov and L. Trevisan, "Average-case complexity," Foundations and Trends in Theoretical Computer Science, vol. 2, no. 1, pp. 1-106, 2006. (Pubitemid 46510727)
-
(2006)
Foundations and Trends in Theoretical Computer Science
, vol.2
, Issue.1
, pp. 1-106
-
-
Bogdanov, A.1
Trevisan, L.2
-
75
-
-
77952257894
-
Pseudorandom bits for polynomials
-
A. Bogdanov and E. Viola, "Pseudorandom bits for polynomials," SIAM Journal on Computing, vol. 39, no. 6, pp. 2464-2486, 2010.
-
(2010)
SIAM Journal on Computing
, vol.39
, Issue.6
, pp. 2464-2486
-
-
Bogdanov, A.1
Viola, E.2
-
76
-
-
0020097420
-
Fast parallel matrix and gcd computations
-
A. Borodin, J. von zur Gathen, and J. Hopcroft, "Fast parallel matrix and GCD computations," Information and Control, vol. 52, no. 3, pp. 241-256, 1982. (Pubitemid 14484052)
-
(1982)
Information and control
, vol.52
, Issue.3
, pp. 241-256
-
-
Borodin Allan1
Von Zur Gathen, J.2
Hopcroft John3
-
77
-
-
38049035373
-
Does privacy require true randomness?
-
of Lecture Notes in Computer Science, Berlin: Springer
-
C. Bosley and Y. Dodis, "Does privacy require true randomness?," in Theory of cryptography, vol. 4392 of Lecture Notes in Computer Science, pp. 1-20, Berlin: Springer, 2007.
-
(2007)
Theory of Cryptography
, vol.4392
, pp. 1-20
-
-
Bosley, C.1
Dodis, Y.2
-
78
-
-
34247619858
-
On the construction of affine extractors
-
J. Bourgain, "On the construction of affine extractors," Geometric and Functional Analysis, vol. 17, no. 1, pp. 33-57, 2007.
-
(2007)
Geometric and Functional Analysis
, vol.17
, Issue.1
, pp. 33-57
-
-
Bourgain, J.1
-
79
-
-
2442427378
-
A sum-product estimate in finite fields, and applications
-
DOI 10.1007/s00039-004-0451-1
-
J. Bourgain, N. Katz, and T. Tao, "A sum-product estimate in finite fields, and applications," Geometric and Functional Analysis, vol. 14, no. 1, pp. 27-57, 2004. (Pubitemid 38640645)
-
(2004)
Geometric and Functional Analysis
, vol.14
, Issue.1
, pp. 27-57
-
-
Bourgain, J.1
Katz, N.2
Tao, T.3
-
80
-
-
0024303956
-
Inferring sequences produced by pseudo-random number generators
-
J. Boyar, "Inferring sequences produced by pseudo-random number generators," Journal of the Association for Computing Machinery, vol. 36, no. 1, pp. 129-141, 1989.
-
(1989)
Journal of the Association for Computing Machinery
, vol.36
, Issue.1
, pp. 129-141
-
-
Boyar, J.1
-
81
-
-
77954011327
-
Polylogarithmic independence fools AC0 circuits
-
Art, 10
-
M. Braverman, "Polylogarithmic independence fools AC0 circuits," Journal of the ACM, vol. 57, no. 5, pp. Art 28, 10, 2010.
-
(2010)
Journal of the ACM
, vol.57
, Issue.5
, pp. 28
-
-
Braverman, M.1
-
82
-
-
78751520954
-
Pseudorandom generators for regular branching programs
-
IEEE Computer Society
-
M. Braverman, A. Rao, R. Raz, and A. Yehudayoff, "Pseudorandom generators for regular branching programs," in FOCS, pp. 40-47, IEEE Computer Society, 2010.
-
(2010)
FOCS
, pp. 40-47
-
-
Braverman, M.1
Rao, A.2
Raz, R.3
Yehudayoff, A.4
-
84
-
-
78751533313
-
The coin problem and pseudorandomness for branching programs
-
IEEE Computer Society
-
J. Brody and E. Verbin, "The coin problem and pseudorandomness for branching programs," in FOCS, pp. 30-39, IEEE Computer Society, 2010.
-
(2010)
FOCS
, pp. 30-39
-
-
Brody, J.1
Verbin, E.2
-
85
-
-
84874144431
-
One-sided two-sided error in probabilistic computation
-
of Lecture Notes in Computer Science, Berlin: Springer
-
H. Buhrman and L. Fortnow, "One-sided two-sided error in probabilistic computation," in STACS 99 (Trier), vol. 1563 of Lecture Notes in Computer Science, pp. 100-109, Berlin: Springer, 1999.
-
(1999)
STACS 99 (Trier)
, vol.1563
, pp. 100-109
-
-
Buhrman, H.1
Fortnow, L.2
-
86
-
-
84870737568
-
Nonrelativizing separations
-
Los Alamitos, CA
-
H. Buhrman, L. Fortnow, and T. Thierauf, "Nonrelativizing separations," in Annual IEEE Conference on Computational Complexity (Buffalo, NY, 1998), pp. 8-12, Los Alamitos, CA, 1998.
-
(1998)
Annual IEEE Conference on Computational Complexity (Buffalo, NY, 1998)
, pp. 8-12
-
-
Buhrman, H.1
Fortnow, L.2
Thierauf, T.3
-
87
-
-
0036766882
-
Are bitvectors optimal?
-
H. Buhrman, P. B. Miltersen, J. Radhakrishnan, and S. Venkatesh, "Are bitvectors optimal?," SIAM Journal on Computing, vol. 31, no. 6, pp. 1723-1744, 2002.
-
(2002)
SIAM Journal on Computing
, vol.31
, Issue.6
, pp. 1723-1744
-
-
Buhrman, H.1
Miltersen, P.B.2
Radhakrishnan, J.3
Venkatesh, S.4
-
88
-
-
84865626008
-
Uniform hardness amplification in NP via monotone codes
-
J. Buresh-Oppenheim, V. Kabanets, and R. Santhanam, "Uniform hardness amplification in NP via monotone codes," Electronic Colloquium on Computational Complexity (ECCC), vol. 13, no. 154, 2006.
-
(2006)
Electronic Colloquium on Computational Complexity (ECCC)
, vol.13
, Issue.154
-
-
Buresh-Oppenheim, J.1
Kabanets, V.2
Santhanam, R.3
-
89
-
-
0039324528
-
-
of Grundlehren der Mathematischen Wissenschaften [Fundamental Principles of Mathematical Sciences]. Berlin: Springer-Verlag, (With the collaboration of Thomas Lickteig)
-
P. Bürgisser, M. Clausen, and M. A. Shokrollahi, Algebraic Complexity Theory, volume 315 of Grundlehren der Mathematischen Wissenschaften [Fundamental Principles of Mathematical Sciences]. Berlin: Springer-Verlag, 1997. (With the collaboration of Thomas Lickteig).
-
(1997)
Algebraic Complexity Theory
, vol.315
-
-
Bürgisser, P.1
Clausen, M.2
Shokrollahi, M.A.3
-
90
-
-
84948973494
-
Exposureresilient functions and all-or-nothing transforms
-
(B. Preneel, ed.), Springer-Verlag, 14-18 May
-
R. Canetti, Y. Dodis, S. Halevi, E. Kushilevitz, and A. Sahai, "Exposureresilient functions and all-or-nothing transforms," in Advances in Cryptology - EUROCRYPT 00, Lecture Notes in Computer Science, (B. Preneel, ed.), Springer-Verlag, 14-18 May 2000.
-
(2000)
Advances in Cryptology - EUROCRYPT 00, Lecture Notes in Computer Science
-
-
Canetti, R.1
Dodis, Y.2
Halevi, S.3
Kushilevitz, E.4
Sahai, A.5
-
91
-
-
0029220110
-
Lower bounds for sampling algorithms for estimating the average
-
R. Canetti, G. Even, and O. Goldreich, "Lower bounds for sampling algorithms for estimating the average," Information Processing Letters, vol. 53, no. 1, pp. 17-25, 1995.
-
(1995)
Information Processing Letters
, vol.53
, Issue.1
, pp. 17-25
-
-
Canetti, R.1
Even, G.2
Goldreich, O.3
-
92
-
-
0036041924
-
Randomness conductors and constant-degree lossless expanders
-
M. Capalbo, O. Reingold, S. Vadhan, and A. Wigderson, "Randomness conductors and constant-degree lossless expanders," in Annual ACM Symposium on Theory of Computing (STOC '02), pp. 659-668, Montréal, CA, May 2002. (Joint session with CCC '02). (Pubitemid 35009428)
-
(2002)
Conference Proceedings of the Annual ACM Symposium on Theory of Computing
, pp. 659-668
-
-
Capalbo, M.1
Reingold, O.2
Vadhan, S.3
Wigderson, A.4
-
93
-
-
0018456171
-
Universal classes of hash functions
-
J. L. Carter and M. N. Wegman, "Universal classes of hash functions," Journal of Computer and System Sciences, vol. 18, no. 2, pp. 143-154, 1979.
-
(1979)
Journal of Computer and System Sciences
, vol.18
, Issue.2
, pp. 143-154
-
-
Carter, J.L.1
Wegman, M.N.2
-
94
-
-
20344362744
-
A lower bound for the smallest eigenvalue of the Laplacian
-
Princeton, NJ: Princeton Univ. Press
-
J. Cheeger, "A lower bound for the smallest eigenvalue of the Laplacian," in Problems in analysis (Papers dedicated to Salomon Bochner, 1969), pp. 195-199, Princeton, NJ: Princeton Univ. Press, 1970.
-
(1970)
Problems in Analysis (Papers Dedicated to Salomon Bochner, 1969)
, pp. 195-199
-
-
Cheeger, J.1
-
95
-
-
0000182415
-
A measure of asymptotic efficiency for tests of a hypothesis based on the sum of observations
-
H. Chernoff, "A measure of asymptotic efficiency for tests of a hypothesis based on the sum of observations," Annals of Mathematical Statistics, vol. 23, pp. 493-507, 1952.
-
(1952)
Annals of Mathematical Statistics
, vol.23
, pp. 493-507
-
-
Chernoff, H.1
-
96
-
-
0023985259
-
Unbiased bits from sources of weak randomness and probabilistic communication complexity
-
April
-
B. Chor and O. Goldreich, "Unbiased bits from sources of weak randomness and probabilistic communication complexity," SIAM Journal on Computing, vol. 17, pp. 230-261, April 1988.
-
(1988)
SIAM Journal on Computing
, vol.17
, pp. 230-261
-
-
Chor, B.1
Goldreich, O.2
-
97
-
-
0002739272
-
On the power of two-point based sampling
-
B. Chor and O. Goldreich, "On the power of two-point based sampling," Journal of Complexity, vol. 5, no. 1, pp. 96-106, 1989.
-
(1989)
Journal of Complexity
, vol.5
, Issue.1
, pp. 96-106
-
-
Chor, B.1
Goldreich, O.2
-
98
-
-
0022198802
-
Bit extraction problem or t-resilient functions
-
B. Chor, O. Goldreich, J. Håstad, J. Friedman, S. Rudich, and R. Smolensky, "The bit extraction problem of t-resilient functions (Preliminary Version)," in FOCS, pp. 396-407, IEEE, 1985. (Pubitemid 16541438)
-
(1985)
Annual Symposium on Foundations of Computer Science (Proceedings)
, pp. 396-407
-
-
Chor Benny1
Goldreich Oded2
Hastad Johan3
-
99
-
-
0032201622
-
Private information retrieval
-
B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan, "Private information retrieval," Journal of the ACM, vol. 45, no. 6, pp. 965-982, 1998.
-
(1998)
Journal of the ACM
, vol.45
, Issue.6
, pp. 965-982
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
100
-
-
0036332631
-
Sparse quasi-random graphs
-
(Special issue: Paul Erdo{double acute}s and his mathematics)
-
F. Chung and R. Graham, "Sparse quasi-random graphs," Combinatorica, vol. 22, no. 2, pp. 217-244, 2002. (Special issue: Paul Erdo{double acute}s and his mathematics).
-
(2002)
Combinatorica
, vol.22
, Issue.2
, pp. 217-244
-
-
Chung, F.1
Graham, R.2
-
101
-
-
38049129887
-
Quasi-random graphs with given degree sequences
-
F. Chung and R. Graham, "Quasi-random graphs with given degree sequences," Random Structures and Algorithms, vol. 32, no. 1, pp. 1-19, 2008.
-
(2008)
Random Structures and Algorithms
, vol.32
, Issue.1
, pp. 1-19
-
-
Chung, F.1
Graham, R.2
-
102
-
-
0038384378
-
Guessing secrets
-
(electronic), Research Paper 13
-
F. Chung, R. Graham, and T. Leighton, "Guessing secrets," Electronic Journal of Combinatorics, vol. 8, no. 1, p. 25 (electronic), 2001. Research Paper 13.
-
(2001)
Electronic Journal of Combinatorics
, vol.8
, Issue.1
, pp. 25
-
-
Chung, F.1
Graham, R.2
Leighton, T.3
-
103
-
-
84968468352
-
Diameters and eigenvalues
-
F. R. K. Chung, "Diameters and eigenvalues," Journal of the American Mathematical Society, vol. 2, no. 2, pp. 187-196, 1989.
-
(1989)
Journal of the American Mathematical Society
, vol.2
, Issue.2
, pp. 187-196
-
-
Chung, F.R.K.1
-
104
-
-
0001597303
-
Quasi-random graphs
-
F. R. K. Chung, R. L. Graham, and R. M. Wilson, "Quasi-random graphs," Combinatorica, vol. 9, no. 4, pp. 345-362, 1989.
-
(1989)
Combinatorica
, vol.9
, Issue.4
, pp. 345-362
-
-
Chung, F.R.K.1
Graham, R.L.2
Wilson, R.M.3
-
106
-
-
80051994919
-
Memory delegation
-
of Lecture Notes in Computer Science, Heidelberg: Springer
-
K.-M. Chung, Y. T. Kalai, F.-H. Liu, and R. Raz, "Memory delegation," in Advances in Cryptology - CRYPTO 2011, vol. 6841 of Lecture Notes in Computer Science, pp. 151-168, Heidelberg: Springer, 2011.
-
(2011)
Advances in Cryptology - CRYPTO 2011
, vol.6841
, pp. 151-168
-
-
Chung, K.-M.1
Kalai, Y.T.2
Liu, F.-H.3
Raz, R.4
-
107
-
-
0024766880
-
Dispersers, deterministic amplification, and weak random sources
-
A. Cohen and A. Wigderson, "Dispersers, deterministic amplification, and weak random sources (extended abstract)," in Annual Symposium on Foundations of Computer Science (Research Triangle Park, North Carolina), pp. 14-19, 1989 (Pubitemid 20725918)
-
(1989)
Annual Symposium on Foundations of Computer Science (Proceedings)
, pp. 14-19
-
-
Cohen Aviad1
Wigderson Avi2
-
108
-
-
85023205150
-
Matrix multiplication via arithmetic progressions
-
D. Coppersmith and S. Winograd, "Matrix multiplication via arithmetic progressions," Journal of Symbolic Computation, vol. 9, no. 3, pp. 251-280, 1990.
-
(1990)
Journal of Symbolic Computation
, vol.9
, Issue.3
, pp. 251-280
-
-
Coppersmith, D.1
Winograd, S.2
-
109
-
-
0004116989
-
-
Cambridge, MA: MIT Press, Second Edition
-
T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein, Introduction to Algorithms. Cambridge, MA: MIT Press, Second Edition, 2001.
-
(2001)
Introduction to Algorithms
-
-
Cormen, T.H.1
Leiserson, C.E.2
Rivest, R.L.3
Stein, C.4
-
110
-
-
84889281816
-
-
Wiley Series in Telecommunications: John Wiley & Sons, Inc., Second Edition
-
T. M. Cover and J. A. Thomas, Elements of Information Theory. Wiley Series in Telecommunications: John Wiley & Sons, Inc., Second Edition, 1991.
-
(1991)
Elements of Information Theory
-
-
Cover, T.M.1
Thomas, J.A.2
-
111
-
-
0000538288
-
Fast parallel matrix inversion algorithms
-
L. Csanky, "Fast parallel matrix inversion algorithms," SIAM Journal on Computing, vol. 5, no. 4, pp. 618-623, 1976.
-
(1976)
SIAM Journal on Computing
, vol.5
, Issue.4
, pp. 618-623
-
-
Csanky, L.1
-
112
-
-
13244290415
-
Elementary number theory, group theory, and Ramanujan graphs
-
in of, Cambridge: Cambridge University Press
-
G. Davidoff, P. Sarnak, and A. Valette, "Elementary number theory, group theory, and Ramanujan graphs," in vol. 55 of London Mathematical Society Student Texts, Cambridge: Cambridge University Press, 2003.
-
(2003)
London Mathematical Society Student Texts
, vol.55
-
-
Davidoff, G.1
Sarnak, P.2
Valette, A.3
-
113
-
-
80052007561
-
Pseudorandomness for permutation and regular branching programs
-
A. De, "Pseudorandomness for permutation and regular branching programs," in IEEE Conference on Computational Complexity, pp. 221-231, 2011
-
(2011)
IEEE Conference on Computational Complexity
, pp. 221-231
-
-
De, A.1
-
114
-
-
80052377551
-
Extractors and lower bounds for locally samplable sources
-
of Lecture Notes in Computer Science, Heidelberg: Springer
-
A. De and T. Watson, "Extractors and lower bounds for locally samplable sources," in Approximation, Randomization, and Combinatorial Optimization, vol. 6845 of Lecture Notes in Computer Science, pp. 483-494, Heidelberg: Springer, 2011.
-
(2011)
Approximation, Randomization, and Combinatorial Optimization
, vol.6845
, pp. 483-494
-
-
De, A.1
Watson, T.2
-
115
-
-
77954628286
-
A Brief Introduction to Fourier analysis on the Boolean cube
-
R. de Wolf, "A Brief Introduction to Fourier analysis on the Boolean cube," Theory of Computing, Graduate Surveys, vol. 1, pp. 1-20, 2008.
-
(2008)
Theory of Computing, Graduate Surveys
, vol.1
, pp. 1-20
-
-
De Wolf, R.1
-
116
-
-
0000006297
-
A probabilistic remark on algebraic program testing
-
R. A. DeMillo and R. J. Lipton, "A probabilistic remark on algebraic program testing," Information Processing Letters, vol. 7, no. 4, pp. 193-195, 1978.
-
(1978)
Information Processing Letters
, vol.7
, Issue.4
, pp. 193-195
-
-
Demillo, R.A.1
Lipton, R.J.2
-
117
-
-
0017018484
-
New directions in cryptography
-
W. Diffie and M. E. Hellman, "New directions in cryptography," IEEE Transactions on Information Theory, vol. IT-22, no. 6, pp. 644-654, 1976.
-
(1976)
IEEE Transactions on Information Theory
, vol.IT-22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
118
-
-
34250354807
-
The PCP theorem by gap amplification
-
article 12, (electronic)
-
I. Dinur, "The PCP theorem by gap amplification," Journal of the ACM, vol. 54, no. 3, article 12, p. 44 (electronic), 2007.
-
(2007)
Journal of the ACM
, vol.54
, Issue.3
, pp. 44
-
-
Dinur, I.1
-
119
-
-
70350281850
-
Security amplification for interactive cryptographic primitives
-
of Lecture Notes in Computer Science, Berlin: Springer
-
Y. Dodis, R. Impagliazzo, R. Jaiswal, and V. Kabanets, "Security amplification for interactive cryptographic primitives," in Theory of Cryptography, vol. 5444 of Lecture Notes in Computer Science, pp. 128-145, Berlin: Springer, 2009.
-
(2009)
Theory of Cryptography
, vol.5444
, pp. 128-145
-
-
Dodis, Y.1
Impagliazzo, R.2
Jaiswal, R.3
Kabanets, V.4
-
120
-
-
84858307660
-
Randomness condensers for efficiently samplable, seed-dependent sources
-
of Lecture Notes in Computer Science, (R. Cramer, ed.), Springer-Verlag, 19-21 March
-
Y. Dodis, T. Ristenpart, and S. Vadhan, "Randomness condensers for efficiently samplable, seed-dependent sources," in Proceedings of the IACR Theory of Cryptography Conference (TCC '12), vol. 7194 of Lecture Notes in Computer Science, (R. Cramer, ed.), pp. 618-635, Springer-Verlag, 19-21 March 2012.
-
(2012)
Proceedings of the IACR Theory of Cryptography Conference (TCC '12)
, vol.7194
, pp. 618-635
-
-
Dodis, Y.1
Ristenpart, T.2
Vadhan, S.3
-
123
-
-
67349179079
-
Extractors and rank extractors for polynomial sources
-
Z. Dvir, A. Gabizon, and A. Wigderson, "Extractors and rank extractors for polynomial sources," Computational Complexity, vol. 18, no. 1, pp. 1-58, 2009.
-
(2009)
Computational Complexity
, vol.18
, Issue.1
, pp. 1-58
-
-
Dvir, Z.1
Gabizon, A.2
Wigderson, A.3
-
124
-
-
77952402919
-
Extensions to the method of multiplicities, with applications to Kakeya sets and mergers
-
Los Alamitos, CA
-
Z. Dvir, S. Kopparty, S. Saraf, and M. Sudan, "Extensions to the method of multiplicities, with applications to Kakeya sets and mergers," in 2009 Annual IEEE Symposium on Foundations of Computer Science (FOCS 2009), pp. 181-190, Los Alamitos, CA, 2009.
-
(2009)
2009 Annual IEEE Symposium on Foundations of Computer Science (FOCS 2009)
, pp. 181-190
-
-
Dvir, Z.1
Kopparty, S.2
Saraf, S.3
Sudan, M.4
-
125
-
-
84862590740
-
Subspace evasive sets
-
(H. J. Karloff and T. Pitassi, eds.), ACM
-
Z. Dvir and S. Lovett, "Subspace evasive sets," in Symposium on Theory of Computing, (H. J. Karloff and T. Pitassi, eds.), pp. 351-358, ACM, 2012.
-
(2012)
Symposium on Theory of Computing
, pp. 351-358
-
-
Dvir, Z.1
Lovett, S.2
-
126
-
-
35448994446
-
Locally decodable codes with two queries and polynomial identity testing for depth 3 circuits
-
DOI 10.1137/05063605X
-
Z. Dvir and A. Shpilka, "Locally decodable codes with two queries and polynomial identity testing for depth 3 circuits," SIAM Journal on Computing, vol. 36, no. 5, pp. 1404-1434 (electronic), 2006/07. (Pubitemid 47632453)
-
(2006)
SIAM Journal on Computing
, vol.36
, Issue.5
, pp. 1404-1434
-
-
Dvir, Z.1
Shpilka, A.2
-
129
-
-
0003469050
-
-
Research Laboratory of Electronics, Massachusetts Institute of Technology. Rep. 335: Cambridge, MA
-
P. Elias, List Decoding for Noisy Channels, Research Laboratory of Electronics, Massachusetts Institute of Technology. Rep. No. 335: Cambridge, MA, 1957.
-
(1957)
List Decoding for Noisy Channels
-
-
Elias, P.1
-
130
-
-
0012578418
-
The efficient construction of an unbiased random sequence
-
June
-
P. Elias, "The efficient construction of an unbiased random sequence," The Annals of Mathematical Statistics, vol. 43, no. 3, pp. 865-870, June 1972.
-
(1972)
The Annals of Mathematical Statistics
, vol.43
, Issue.3
, pp. 865-870
-
-
Elias, P.1
-
131
-
-
0025948524
-
Error-correcting codes for list decoding
-
P. Elias, "Error-correcting codes for list decoding," IEEE Transactions on Information Theory, vol. 37, no. 1, pp. 5-12, 1991.
-
(1991)
IEEE Transactions on Information Theory
, vol.37
, Issue.1
, pp. 5-12
-
-
Elias, P.1
-
133
-
-
0005515237
-
Problems and results in chromatic graph theory
-
New York
-
P. Erdos, "Problems and results in chromatic graph theory," in Proof Techniques in Graph Theory (Proceedings of Ann Arbor Graph Theory Conference, Ann Arbor, Michigan, 1968), pp. 27-35, New York, 1969.
-
(1969)
Proof Techniques in Graph Theory (Proceedings of Ann Arbor Graph Theory Conference, Ann Arbor, Michigan, 1968)
, pp. 27-35
-
-
Erdos, P.1
-
134
-
-
51249175955
-
Families of finite sets in which no set is covered by the union of r others
-
P. Erdos, P. Frankl, and Z. Füredi, "Families of finite sets in which no set is covered by the union of r others," Israel Journal of Mathematics, vol. 51, no. 1-2, pp. 79-89, 1985.
-
(1985)
Israel Journal of Mathematics
, vol.51
, Issue.1-2
, pp. 79-89
-
-
Erdos, P.1
Frankl, P.2
Füredi, Z.3
-
136
-
-
0032390523
-
Efficient approximation of product distributions
-
G. Even, O. Goldreich, M. Luby, N. Nisan, and B. Velickovic, "Efficient approximation of product distributions," Random Struct. Algorithms, vol. 13, no. 1, pp. 1-16, 1998.
-
(1998)
Random Struct. Algorithms
, vol.13
, Issue.1
, pp. 1-16
-
-
Even, G.1
Goldreich, O.2
Luby, M.3
Nisan, N.4
Velickovic, B.5
-
137
-
-
0021420540
-
Complexity of promise problems with applications to public-key cryptography
-
S. Even, A. L. Selman, and Y. Yacobi, "The complexity of promise problems with applications to public-key cryptography," Information and Control, vol. 61, no. 2, pp. 159-173, 1984. (Pubitemid 15436618)
-
(1984)
Information and control
, vol.61
, Issue.2
, pp. 159-173
-
-
Even Shimon1
Selman Alan, L.2
Yacobi Yacov3
-
138
-
-
0030100766
-
Interactive proofs and the hardness of approximating cliques
-
U. Feige, S. Goldwasser, L. Lovász, S. Safra, and M. Szegedy, "Interactive proofs and the hardness of approximating cliques," Journal of the ACM, vol. 43, no. 2, pp. 268-292, 1996.
-
(1996)
Journal of the ACM
, vol.43
, Issue.2
, pp. 268-292
-
-
Feige, U.1
Goldwasser, S.2
Lovász, L.3
Safra, S.4
Szegedy, M.5
-
139
-
-
0002590276
-
Eigenvalue bounds on convergence to stationarity for nonreversible Markov chains, with an application to the exclusion process
-
J. A. Fill, "Eigenvalue bounds on convergence to stationarity for nonreversible Markov chains, with an application to the exclusion process," Annals of Applied Probability, vol. 1, no. 1, pp. 62-87, 1991.
-
(1991)
Annals of Applied Probability
, vol.1
, Issue.1
, pp. 62-87
-
-
Fill, J.A.1
-
141
-
-
51249185135
-
Intersection theorems with geometric consequences
-
P. Frankl and R. M. Wilson, "Intersection theorems with geometric consequences," Combinatorica, vol. 1, no. 4, pp. 357-368, 1981.
-
(1981)
Combinatorica
, vol.1
, Issue.4
, pp. 357-368
-
-
Frankl, P.1
Wilson, R.M.2
-
142
-
-
0021467937
-
Storing a sparse table with O(1) worst case access time
-
M. L. Fredman, J. Komlós, and E. Szemerédi, "Storing a sparse table with O(1) worst case access time," Journal of the ACM, vol. 31, no. 3, pp. 538-544, 1984.
-
(1984)
Journal of the ACM
, vol.31
, Issue.3
, pp. 538-544
-
-
Fredman, M.L.1
Komlós, J.2
Szemerédi, E.3
-
143
-
-
67949093089
-
A proof of Alon's second eigenvalue conjecture and related problems
-
J. Friedman, "A proof of Alon's second eigenvalue conjecture and related problems," Memoirs of the American Mathematical Society, vol. 195, no. 910, p. viii+100, 2008.
-
(2008)
Memoirs of the American Mathematical Society
, vol.195
, Issue.910
-
-
Friedman, J.1
-
144
-
-
0023985464
-
Reconstructing truncated integer variables satisfying linear congruences
-
(Special issue on cryptography)
-
A. M. Frieze, J. Håstad, R. Kannan, J. C. Lagarias, and A. Shamir, "Reconstructing truncated integer variables satisfying linear congruences," SIAM Journal on Computing, vol. 17, no. 2, pp. 262-280, 1988. (Special issue on cryptography).
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 262-280
-
-
Frieze, A.M.1
Håstad, J.2
Kannan, R.3
Lagarias, J.C.4
Shamir, A.5
-
145
-
-
84858326015
-
A unified approach to deterministic encryption: New constructions and a connection to computational entropy
-
of Lecture Notes in Computer Science, (R. Cramer, ed.)
-
B. Fuller, A. O'Neill, and L. Reyzin, "A unified approach to deterministic encryption: New constructions and a connection to computational entropy," in TCC, vol. 7194 of Lecture Notes in Computer Science, (R. Cramer, ed.), pp. 582-599, 2012.
-
(2012)
TCC
, vol.7194
, pp. 582-599
-
-
Fuller, B.1
O'Neill, A.2
Reyzin, L.3
-
146
-
-
0000871697
-
Explicit constructions of linear-sized superconcentrators
-
June
-
O. Gabber and Z. Galil, "Explicit constructions of linear-sized superconcentrators," Journal of Computer and System Sciences, vol. 22, pp. 407-420, June 1981.
-
(1981)
Journal of Computer and System Sciences
, vol.22
, pp. 407-420
-
-
Gabber, O.1
Galil, Z.2
-
147
-
-
58549103289
-
Deterministic extractors for affine sources over large fields
-
A. Gabizon and R. Raz, "Deterministic extractors for affine sources over large fields," Combinatorica, vol. 28, no. 4, pp. 415-440, 2008.
-
(2008)
Combinatorica
, vol.28
, Issue.4
, pp. 415-440
-
-
Gabizon, A.1
Raz, R.2
-
149
-
-
0001975984
-
Self-testing/correcting for polynomials and for approximate functions
-
(C. Koutsougeras and J. S. Vitter, eds.)
-
P. Gemmell, R. J. Lipton, R. Rubinfeld, M. Sudan, and A. Wigderson, "Self-testing/correcting for polynomials and for approximate functions," in STOC, (C. Koutsougeras and J. S. Vitter, eds.), pp. 32-42, 1991.
-
(1991)
STOC
, pp. 32-42
-
-
Gemmell, P.1
Lipton, R.J.2
Rubinfeld, R.3
Sudan, M.4
Wigderson, A.5
-
150
-
-
0000377057
-
Highly resilient correctors for polynomials
-
P. Gemmell and M. Sudan, "Highly resilient correctors for polynomials," Information Processing Letters, vol. 43, no. 4, pp. 169-174, 1992.
-
(1992)
Information Processing Letters
, vol.43
, Issue.4
, pp. 169-174
-
-
Gemmell, P.1
Sudan, M.2
-
151
-
-
0001287361
-
A comparison of signalling alphabets
-
E. Gilbert, "A comparison of signalling alphabets," Bell Systems Technical Journal, vol. 31, pp. 504-522, 1952.
-
(1952)
Bell Systems Technical Journal
, vol.31
, pp. 504-522
-
-
Gilbert, E.1
-
152
-
-
0000595574
-
Computational complexity of probabilistic Turing machines
-
J. Gill, "Computational complexity of probabilistic Turing machines," SIAM Journal on Computing, vol. 6, no. 4, pp. 675-695, 1977.
-
(1977)
SIAM Journal on Computing
, vol.6
, Issue.4
, pp. 675-695
-
-
Gill, J.1
-
153
-
-
0000646152
-
A chernoff bound for random walks on expander graphs
-
PII S0097539794268765
-
D. Gillman, "A Chernoff bound for random walks on expander graphs," SIAM Journal on Computing, vol. 27, no. 4, pp. 1203-1220 (electronic), 1998 (Pubitemid 128689451)
-
(1998)
SIAM Journal on Computing
, vol.27
, Issue.4
, pp. 1203-1220
-
-
Gillman, D.1
-
154
-
-
84893574327
-
Improved approximation algorithms for maximum cut and satisfiability problems using semidefinite programming
-
M. X. Goemans and D. P. Williamson, "Improved approximation algorithms for maximum cut and satisfiability problems using semidefinite programming," Journal of the ACM, vol. 42, no. 6, pp. 1115-1145, 1995.
-
(1995)
Journal of the ACM
, vol.42
, Issue.6
, pp. 1115-1145
-
-
Goemans, M.X.1
Williamson, D.P.2
-
157
-
-
0003979335
-
-
Cambridge: Cambridge University Press, (Basic tools)
-
O. Goldreich, Foundations of Cryptography. Cambridge: Cambridge University Press, 2001. (Basic tools).
-
(2001)
Foundations of Cryptography
-
-
Goldreich, O.1
-
158
-
-
0003979335
-
-
Cambridge: Cambridge University Press, (Basic Applications)
-
O. Goldreich, Foundations of Cryptography II. Cambridge: Cambridge University Press, 2004. (Basic Applications).
-
(2004)
Foundations of Cryptography II
-
-
Goldreich, O.1
-
160
-
-
63649090019
-
Probabilistic proof systems: A primer
-
(2008)
-
O. Goldreich, "Probabilistic proof systems: A primer," Foundations and Trends in Theoretical Computer Science, vol. 3, no. 1, pp. 1-91 (2008), 2007
-
(2007)
Foundations and Trends in Theoretical Computer Science
, vol.3
, Issue.1
, pp. 1-91
-
-
Goldreich, O.1
-
162
-
-
84874186931
-
-
of University Lecture Series. Providence, RI: American Mathematical Society
-
O. Goldreich, A Primer on Pseudorandom Generators, vol. 55 of University Lecture Series. Providence, RI: American Mathematical Society, 2010.
-
(2010)
A Primer on Pseudorandom Generators
, vol.55
-
-
Goldreich, O.1
-
163
-
-
84857572805
-
In a World of P=BPP
-
of Lecture Notes in Computer Science, Springer
-
O. Goldreich, "In a World of P=BPP," in Studies in Complexity and Cryptography. Miscellanea on the Interplay of Randomness and Computation, vol. 6650 of Lecture Notes in Computer Science, pp. 191-232, Springer, 2011.
-
(2011)
Studies in Complexity and Cryptography. Miscellanea on the Interplay of Randomness and Computation
, vol.6650
, pp. 191-232
-
-
Goldreich, O.1
-
164
-
-
0022793132
-
How to construct random functions
-
October
-
O. Goldreich, S. Goldwasser, and S. Micali, "How to construct random functions," Journal of the ACM, vol. 33, pp. 792-807, October 1986.
-
(1986)
Journal of the ACM
, vol.33
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
165
-
-
0032108275
-
Property Testing and Its Connection to Learning and Approximation
-
O. Goldreich, S. Goldwasser, and D. Ron, "Property testing and its connection to learning and approximation," Journal of the ACM, vol. 45, no. 4, pp. 653-750, 1998. (Pubitemid 128488791)
-
(1998)
Journal of the ACM
, vol.45
, Issue.4
, pp. 653-750
-
-
Goldreich, O.1
Goldwasser, S.2
Ron, D.3
-
166
-
-
0025742358
-
Security preserving amplification of hardness
-
O. Goldreich, R. Impagliazzo, L. Levin, R. Venkatesan, and D. Zuckerman, "Security preserving amplification of hardness," in Annual Symposium on Foundations of Computer Science, Vol. I, II (St. Louis, MO, 1990), pp. 318-326, Los Alamitos, CA: IEEE Computer Society Press, 1990. (Pubitemid 21663270)
-
(1991)
IEEE Transactions on Industry Applications
, vol.27
, pp. 318-326
-
-
Goldreich Oded1
Impagliazzo Russell2
Levin Leonid3
Venkatesan Ramarathnan4
Zuckerman David5
-
167
-
-
0027797493
-
On the existence of pseudorandom generators
-
O. Goldreich, H. Krawczyk, and M. Luby, "On the existence of pseudorandom generators," SIAM Journal on Computing, vol. 22, no. 6, pp. 1163-1175, 1993.
-
(1993)
SIAM Journal on Computing
, vol.22
, Issue.6
, pp. 1163-1175
-
-
Goldreich, O.1
Krawczyk, H.2
Luby, M.3
-
168
-
-
0024868772
-
A hard-core predicate for all one-way functions
-
Seattle, Washington, 15-17 May
-
O. Goldreich and L. A. Levin, "A hard-core predicate for all one-way functions," in Proceedings of the Annual ACM Symposium on Theory of Computing, pp. 25-32, Seattle, Washington, 15-17 May 1989.
-
(1989)
Proceedings of the Annual ACM Symposium on Theory of Computing
, pp. 25-32
-
-
Goldreich, O.1
Levin, L.A.2
-
169
-
-
0344347190
-
Computational indistinguishability: Algorithms vs. circuits
-
PII S030439759700162X
-
O. Goldreich and B. Meyer, "Computational indistinguishability: algorithms vs. circuits," Theoretical Computer Science, vol. 191, no. 1-2, pp. 215-218, 1998. (Pubitemid 128452161)
-
(1998)
Theoretical Computer Science
, vol.191
, Issue.1-2
, pp. 215-218
-
-
Goldreich, O.1
Meyer, B.2
-
170
-
-
71149116146
-
Proofs that yield nothing but their validity, or All languages in NP have zero-knowledge proof systems
-
O. Goldreich, S. Micali, and A. Wigderson, "Proofs that yield nothing but their validity, or All languages in NP have zero-knowledge proof systems," Journal of the ACM, vol. 38, no. 3, pp. 691-729, 1991.
-
(1991)
Journal of the ACM
, vol.38
, Issue.3
, pp. 691-729
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
171
-
-
84874175081
-
On Yao's XOR lemma
-
revision 2, Electronic Colloquium on Computational Complexity, June
-
O. Goldreich, N. Nisan, and A. Wigderson, "On Yao's XOR lemma," Technical Report TR95-050, revision 2, Electronic Colloquium on Computational Complexity, http://www.eccc.uni-trier.de/eccc, June 2010.
-
(2010)
Technical Report TR95-050
-
-
Goldreich, O.1
Nisan, N.2
Wigderson, A.3
-
172
-
-
0032597115
-
Computational indistinguishability: A sample hierarchy
-
(13th Annual IEEE Conference on Computation Complexity (Buffalo, NY, 1998)
-
O. Goldreich and M. Sudan, "Computational indistinguishability: A sample hierarchy," Journal of Computer and System Sciences, vol. 59, no. 2, pp. 253-269, 1999. (13th Annual IEEE Conference on Computation Complexity (Buffalo, NY, 1998)).
-
(1999)
Journal of Computer and System Sciences
, vol.59
, Issue.2
, pp. 253-269
-
-
Goldreich, O.1
Sudan, M.2
-
173
-
-
84857619236
-
Simplified derandomization of BPP using a hitting set generator
-
of Lecture Notes in Computer Science, Springer
-
O. Goldreich, S. Vadhan, and A. Wigderson, "Simplified derandomization of BPP using a hitting set generator," in Studies in Complexity and Cryptography. Miscellanea on the Interplay of Randomness and Computation, vol. 6650 of Lecture Notes in Computer Science, pp. 59-67, Springer, 2011.
-
(2011)
Studies in Complexity and Cryptography. Miscellanea on the Interplay of Randomness and Computation
, vol.6650
, pp. 59-67
-
-
Goldreich, O.1
Vadhan, S.2
Wigderson, A.3
-
174
-
-
0031504510
-
Tiny families of functions with random properties: A quality-size trade-off for hashing
-
O. Goldreich and A. Wigderson, "Tiny families of functions with random properties: A quality-size trade-off for hashing," Random Structures & Algorithms, vol. 11, no. 4, pp. 315-343, 1997. (Pubitemid 127345392)
-
(1997)
Random Structures and Algorithms
, vol.11
, Issue.4
, pp. 315-343
-
-
Goldreich, O.1
Wigderson, A.2
-
175
-
-
67650659194
-
Cryptography without (hardly any) secrets?
-
of Lecture Notes in Computer Science, Berlin: Springer
-
S. Goldwasser, "Cryptography without (hardly any) secrets?," in Advances in cryptology - EUROCRYPT 2009, vol. 5479 of Lecture Notes in Computer Science, pp. 369-370, Berlin: Springer, 2009.
-
(2009)
Advances in Cryptology - EUROCRYPT 2009
, vol.5479
, pp. 369-370
-
-
Goldwasser, S.1
-
177
-
-
0024611659
-
The knowledge complexity of interactive proof systems
-
S. Goldwasser, S. Micali, and C. Rackoff, "The knowledge complexity of interactive proof systems," SIAM Journal on Computing, vol. 18, no. 1, pp. 186-208, 1989.
-
(1989)
SIAM Journal on Computing
, vol.18
, Issue.1
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
178
-
-
84866492746
-
DNF Sparsification and a faster deterministic counting algorithm
-
P. Gopalan, R. Meka, and O. Reingold, "DNF Sparsification and a faster deterministic counting algorithm," in IEEE Conference on Computational Complexity, pp. 126-135, 2012
-
(2012)
IEEE Conference on Computational Complexity
, pp. 126-135
-
-
Gopalan, P.1
Meka, R.2
Reingold, O.3
-
179
-
-
84871999861
-
Better pseudorandom generators via milder pseudorandom restrictions
-
20-23 October. (To appear)
-
P. Gopalan, R. Meka, O. Reingold, L. Trevisan, and S. Vadhan, "Better pseudorandom generators via milder pseudorandom restrictions," in Proceedings of the Annual IEEE Symposium on Foundations of Computer Science (FOCS '12), 20-23 October 2012. (To appear).
-
(2012)
Proceedings of the Annual IEEE Symposium on Foundations of Computer Science (FOCS '12)
-
-
Gopalan, P.1
Meka, R.2
Reingold, O.3
Trevisan, L.4
Vadhan, S.5
-
180
-
-
0032361262
-
A new proof of Szemerédi's theorem for arithmetic progressions of length four
-
W. T. Gowers, "A new proof of Szemerédi's theorem for arithmetic progressions of length four," Geometric and Functional Analysis, vol. 8, no. 3, pp. 529-551, 1998.
-
(1998)
Geometric and Functional Analysis
, vol.8
, Issue.3
, pp. 529-551
-
-
Gowers, W.T.1
-
181
-
-
0035618488
-
A new proof of Szemerédi's theorem
-
W. T. Gowers, "A new proof of Szemerédi's theorem," Geometric and Functional Analysis, vol. 11, no. 3, pp. 465-588, 2001.
-
(2001)
Geometric and Functional Analysis
, vol.11
, Issue.3
, pp. 465-588
-
-
Gowers, W.T.1
-
183
-
-
84874183956
-
Guest column: Error-correcting codes and expander graphs
-
V. Guruswami, "Guest column: Error-correcting codes and expander graphs," SIGACT News, vol. 35, no. 3, pp. 25-41, 2004.
-
(2004)
SIGACT News
, vol.35
, Issue.3
, pp. 25-41
-
-
Guruswami, V.1
-
184
-
-
84874134632
-
-
number of Foundations and Trends in Theoretical Computer Science. now publishers
-
V. Guruswami, Algorithmic Results in List Decoding. volume 2, number 2 of Foundations and Trends in Theoretical Computer Science. now publishers, 2006.
-
(2006)
Algorithmic Results in List Decoding
, vol.2
, Issue.2
-
-
Guruswami, V.1
-
185
-
-
80052004403
-
Linear-algebraic list decoding of folded reed-solomon codes
-
V. Guruswami, "Linear-algebraic list decoding of folded reed-solomon codes," in IEEE Conference on Computational Complexity, pp. 77-85, 2011.
-
(2011)
IEEE Conference on Computational Complexity
, pp. 77-85
-
-
Guruswami, V.1
-
186
-
-
79251490359
-
On the list-decodability of random linear codes
-
V. Guruswami, J. Håstad, and S. Kopparty, "On the list-decodability of random linear codes," IEEE Transactions on Information Theory, vol. 57, no. 2, pp. 718-725, 2011.
-
(2011)
IEEE Transactions on Information Theory
, vol.57
, Issue.2
, pp. 718-725
-
-
Guruswami, V.1
Håstad, J.2
Kopparty, S.3
-
187
-
-
0036567053
-
Combinatorial bounds for list decoding
-
DOI 10.1109/18.995539, PII S0018944802027943
-
V. Guruswami, J. Håstad, M. Sudan, and D. Zuckerman, "Combinatorial bounds for list decoding," IEEE Transactions on Information Theory, vol. 48, no. 5, pp. 1021-1034, 2002. (Pubitemid 34555215)
-
(2002)
IEEE Transactions on Information Theory
, vol.48
, Issue.5
, pp. 1021-1034
-
-
Guruswami, V.1
Hastad, J.2
Sudan, M.3
Zuckerman, D.4
-
188
-
-
38349146703
-
Explicit codes achieving list decoding capacity: Error-correction with optimal redundancy
-
V. Guruswami and A. Rudra, "Explicit codes achieving list decoding capacity: error-correction with optimal redundancy," IEEE Transactions on Information Theory, vol. 54, no. 1, pp. 135-150, 2008.
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.1
, pp. 135-150
-
-
Guruswami, V.1
Rudra, A.2
-
189
-
-
0033183669
-
Improved decoding of Reed-Solomon and algebraic-geometry codes
-
DOI 10.1109/18.782097
-
V. Guruswami and M. Sudan, "Improved decoding of Reed-Solomon and algebraic-geometry codes," Institute of Electrical and Electronics Engineers. Transactions on Information Theory, vol. 45, no. 6, pp. 1757-1767, 1999. (Pubitemid 32871911)
-
(1999)
IEEE Transactions on Information Theory
, vol.45
, Issue.6
, pp. 1757-1767
-
-
Guruswami Venkatesan1
Sudan Madhu2
-
190
-
-
0033690275
-
List decoding algorithms for certain concatenated codes
-
V. Guruswami and M. Sudan, "List decoding algorithms for certain concatenated codes," in STOC, pp. 181-190, 2000
-
(2000)
STOC
, pp. 181-190
-
-
Guruswami, V.1
Sudan, M.2
-
192
-
-
68549120859
-
Unbalanced expanders and randomness extractors from Parvaresh-Vardy codes
-
V. Guruswami, C. Umans, and S. Vadhan, "Unbalanced expanders and randomness extractors from Parvaresh-Vardy codes," Journal of the ACM, vol. 56, no. 4, pp. 1-34, 2009.
-
(2009)
Journal of the ACM
, vol.56
, Issue.4
, pp. 1-34
-
-
Guruswami, V.1
Umans, C.2
Vadhan, S.3
-
193
-
-
80052389088
-
Optimal rate list decoding via derivative codes
-
of Lecture Notes in Computer Science, Heidelberg: Springer
-
V. Guruswami and C. Wang, "Optimal rate list decoding via derivative codes," in Approximation, randomization, and combinatorial optimization, vol. 6845 of Lecture Notes in Computer Science, pp. 593-604, Heidelberg: Springer, 2011.
-
(2011)
Approximation, Randomization, and Combinatorial Optimization
, vol.6845
, pp. 593-604
-
-
Guruswami, V.1
Wang, C.2
-
194
-
-
84862627897
-
Folded codes from function field towers and improved optimal rate list decoding
-
(H. J. Karloff and T. Pitassi, eds.), ACM
-
V. Guruswami and C. Xing, "Folded codes from function field towers and improved optimal rate list decoding," in STOC, (H. J. Karloff and T. Pitassi, eds.), pp. 339-350, ACM, 2012.
-
(2012)
STOC
, pp. 339-350
-
-
Guruswami, V.1
Xing, C.2
-
195
-
-
4744337602
-
Uniform hardness versus randomness tradeoffs for Arthur-Merlin games
-
DOI 10.1007/s00037-003-0178-7
-
D. Gutfreund, R. Shaltiel, and A. Ta-Shma, "Uniform hardness versus randomness tradeoffs for Arthur-Merlin games," Computational Complexity, vol. 12, no. 3-4, pp. 85-130, 2003. (Pubitemid 39307929)
-
(2003)
Computational Complexity
, vol.12
, Issue.3-4
, pp. 85-130
-
-
Gutfreund, D.1
Shaltiel, R.2
Ta-Shma, A.3
-
197
-
-
0345253860
-
A pseudorandom generator from any one-way function
-
J. Håstad, R. Impagliazzo, L. A. Levin, and M. Luby, "A pseudorandom generator from any one-way function," SIAM Journal on Computing, vol. 28, no. 4, pp. 1364-1396, 1999.
-
(1999)
SIAM Journal on Computing
, vol.28
, Issue.4
, pp. 1364-1396
-
-
Håstad, J.1
Impagliazzo, R.2
Levin, L.A.3
Luby, M.4
-
198
-
-
77954721007
-
Efficiency improvements in constructing pseudorandom generators from one-way functions
-
6-8 June
-
I. Haitner, O. Reingold, and S. Vadhan, "Efficiency improvements in constructing pseudorandom generators from one-way functions," in Proceedings of the Annual ACM Symposium on Theory of Computing (STOC '10), pp. 437-446, 6-8 June 2010.
-
(2010)
Proceedings of the Annual ACM Symposium on Theory of Computing (STOC '10)
, pp. 437-446
-
-
Haitner, I.1
Reingold, O.2
Vadhan, S.3
-
199
-
-
84943817322
-
Error detecting and error correcting codes
-
R. W. Hamming, "Error detecting and error correcting codes," The Bell System Technical Journal, vol. 29, pp. 147-160, 1950.
-
(1950)
The Bell System Technical Journal
, vol.29
, pp. 147-160
-
-
Hamming, R.W.1
-
202
-
-
33747154808
-
Using nondeterminism to amplify hardness
-
DOI 10.1137/S0097539705447281
-
A. Healy, S. Vadhan, and E. Viola, "Using nondeterminism to amplify hardness," SIAM Journal on Computing, vol. 35, no. 4, pp. 903-931, 2006. (Pubitemid 44231261)
-
(2006)
SIAM Journal on Computing
, vol.35
, Issue.4
, pp. 903-931
-
-
Healy, A.1
Vadhan, S.2
Viola, E.3
-
203
-
-
45449104708
-
Randomness-efficient sampling within NC1
-
A. D. Healy, "Randomness-efficient sampling within NC1," Computational Complexity, vol. 17, no. 1, pp. 3-37, 2008.
-
(2008)
Computational Complexity
, vol.17
, Issue.1
, pp. 3-37
-
-
Healy, A.D.1
-
204
-
-
84947403595
-
Probability inequalities for sums of bounded random variables
-
W. Hoeffding, "Probability inequalities for sums of bounded random variables," Journal of the American Statistical Association, vol. 58, pp. 13-30, 1963.
-
(1963)
Journal of the American Statistical Association
, vol.58
, pp. 13-30
-
-
Hoeffding, W.1
-
205
-
-
0039818145
-
On eigenvalues and colorings of graphs
-
New York: Academic Press
-
A. J. Hoffman, "On eigenvalues and colorings of graphs," in Graph Theory and its Applications (Proceedings of Advanced Seminors, Mathematics Research Center, University of Wisconsin, Madison, Wisconsin, 1969), pp. 79-91, New York: Academic Press, 1970.
-
(1970)
Graph Theory and Its Applications (Proceedings of Advanced Seminors, Mathematics Research Center, University of Wisconsin, Madison, Wisconsin, 1969)
, pp. 79-91
-
-
Hoffman, A.J.1
-
206
-
-
34848917325
-
Key agreement from weak bit agreement
-
DOI 10.1145/1060590.1060689, STOC'05: Proceedings of the 37th Annual ACM Symposium on Theory of Computing
-
T. Holenstein, "Key agreement from weak bit agreement," in STOC'05: Proceedings of the Annual ACM Symposium on Theory of Computing, pp. 664-673, New York, 2005. (Pubitemid 43102489)
-
(2005)
Proceedings of the Annual ACM Symposium on Theory of Computing
, pp. 664-673
-
-
Holenstein, T.1
-
207
-
-
33749002225
-
Expander graphs and their applications
-
DOI 10.1090/S0273-0979-06-01126-8, PII S0273097906011268
-
S. Hoory, N. Linial, and A. Wigderson, "Expander graphs and their applications," Bulletin of the AMS, vol. 43, no. 4, pp. 439-561, 2006. (Pubitemid 44448254)
-
(2006)
Bulletin of the American Mathematical Society
, vol.43
, Issue.4
, pp. 439-561
-
-
Hoory, S.1
Linial, N.2
Wigderson, A.3
-
208
-
-
0029516814
-
Hard-core distributions for somewhat hard problems
-
Milwaukee, Wisconsin, 23-25 October
-
R. Impagliazzo, "Hard-core distributions for somewhat hard problems," in Annual Symposium on Foundations of Computer Science, pp. 538-545, Milwaukee, Wisconsin, 23-25 October 1995.
-
(1995)
Annual Symposium on Foundations of Computer Science
, pp. 538-545
-
-
Impagliazzo, R.1
-
209
-
-
30744435936
-
Hardness as randomness: A survey of universal derandomization
-
(Beijing, 2002), Beijing
-
R. Impagliazzo, "Hardness as randomness: A survey of universal derandomization," in Proceedings of the International Congress of Mathematicians, Vol. III (Beijing, 2002), pp. 659-672, Beijing, 2002.
-
(2002)
Proceedings of the International Congress of Mathematicians
, vol.III
, pp. 659-672
-
-
Impagliazzo, R.1
-
210
-
-
78149330850
-
Approximate list-decoding of direct product codes and uniform hardness amplification
-
R. Impagliazzo, R. Jaiswal, and V. Kabanets, "Approximate list-decoding of direct product codes and uniform hardness amplification," SIAM Journal on Computing, vol. 39, no. 2, pp. 564-605, 2009.
-
(2009)
SIAM Journal on Computing
, vol.39
, Issue.2
, pp. 564-605
-
-
Impagliazzo, R.1
Jaiswal, R.2
Kabanets, V.3
-
211
-
-
77956051810
-
Uniform direct product theorems: Simplified, optimized, and derandomized
-
R. Impagliazzo, R. Jaiswal, V. Kabanets, and A. Wigderson, "Uniform direct product theorems: Simplified, optimized, and derandomized," SIAM Journal on Computing, vol. 39, no. 4, pp. 1637-1665, 2009/2010.
-
(2009)
SIAM Journal on Computing
, vol.39
, Issue.4
, pp. 1637-1665
-
-
Impagliazzo, R.1
Jaiswal, R.2
Kabanets, V.3
Wigderson, A.4
-
212
-
-
23844442856
-
In search of an easy witness: Exponential time vs. probabilistic polynomial time
-
DOI 10.1016/S0022-0000(02)00024-7, PII S0022000002000247
-
R. Impagliazzo, V. Kabanets, and A. Wigderson, "In search of an easy witness: Exponential time vs. probabilistic polynomial time," Journal of Computer and System Sciences, vol. 65, no. 4, pp. 672-694, 2002. (Pubitemid 41161945)
-
(2003)
Journal of Computer and System Sciences
, vol.65
, Issue.4
, pp. 672-694
-
-
Impagliazzo, R.1
Kabanets, V.2
Wigderson, A.3
-
213
-
-
79953182449
-
Limits on the provable consequences of one-way permutations
-
of Lecture Notes in Computer Science, Berlin: Springer
-
R. Impagliazzo and S. Rudich, "Limits on the provable consequences of one-way permutations," in Advances in cryptology - CRYPTO '88 (Santa Barbara, CA, 1988), vol 403 of Lecture Notes in Computer Science, pp. 8-26, Berlin: Springer, 1990.
-
(1990)
Advances in Cryptology - CRYPTO '88 (Santa Barbara, CA, 1988)
, vol.403
, pp. 8-26
-
-
Impagliazzo, R.1
Rudich, S.2
-
215
-
-
0030706544
-
P = BPP if e requires exponential circuits: Derandomizing the XOR lemma
-
El Paso, Texas, 4-6 May
-
R. Impagliazzo and A. Wigderson, "P = BPP if E requires exponential circuits: Derandomizing the XOR lemma," in Proceedings of the Annual ACM Symposium on Theory of Computing, pp. 220-229, El Paso, Texas, 4-6 May 1997.
-
(1997)
Proceedings of the Annual ACM Symposium on Theory of Computing
, pp. 220-229
-
-
Impagliazzo, R.1
Wigderson, A.2
-
216
-
-
0035734550
-
Randomness vs time: Derandomization under a uniform assumption
-
DOI 10.1006/jcss.2001.1780
-
R. Impagliazzo and A. Wigderson, "Randomness vs time: Derandomization under a uniform assumption," Journal of Computer and System Sciences, vol. 63, no. 4, pp. 672-688, 2001. Special issue on FOCS 98 (Palo Alto CA). (Pubitemid 34325775)
-
(2001)
Journal of Computer and System Sciences
, vol.63
, Issue.4
, pp. 672-688
-
-
Impagliazzo, R.1
Wigderson, A.2
-
218
-
-
84957018834
-
An explicit lower bound of 5n - O(n) for Boolean circuits
-
of Lecture Notes in Computer Science, Berlin: Springer
-
K. Iwama and H. Morizumi, "An explicit lower bound of 5n - o(n) for Boolean circuits," in Mathematical foundations of computer science 2002, vol. 2420 of Lecture Notes in Computer Science, pp. 353-364, Berlin: Springer, 2002.
-
(2002)
Mathematical Foundations of Computer Science 2002
, vol.2420
, pp. 353-364
-
-
Iwama, K.1
Morizumi, H.2
-
219
-
-
0024904712
-
Approximating the permanent
-
M. Jerrum and A. Sinclair, "Approximating the permanent," SIAM Journal on Computing, vol. 18, no. 6, pp. 1149-1178, 1989. (Pubitemid 20613573)
-
(1989)
SIAM Journal on Computing
, vol.18
, Issue.6
, pp. 1149-1178
-
-
Jerrum Mark1
Sinclair Alistair2
-
220
-
-
4243139497
-
A polynomial-time approximation algorithm for the permanent of a matrix with nonnegative entries
-
M. Jerrum, A. Sinclair, and E. Vigoda, "A polynomial-time approximation algorithm for the permanent of a matrix with nonnegative entries," Journal of the ACM, vol. 51, no. 4, pp. 671-697, 2004.
-
(2004)
Journal of the ACM
, vol.51
, Issue.4
, pp. 671-697
-
-
Jerrum, M.1
Sinclair, A.2
Vigoda, E.3
-
221
-
-
51249173945
-
Expanders obtained from affine transformations
-
S. Jimbo and A. Maruoka, "Expanders obtained from affine transformations," Combinatorica, vol. 7, no. 4, pp. 343-355, 1987.
-
(1987)
Combinatorica
, vol.7
, Issue.4
, pp. 343-355
-
-
Jimbo, S.1
Maruoka, A.2
-
222
-
-
84968500684
-
On a sequence of almost deterministic pairwise independent random variables
-
A. Joffe, "On a sequence of almost deterministic pairwise independent random variables," Proceedings of the American Mathematical Society, vol. 29, pp. 381-382, 1971.
-
(1971)
Proceedings of the American Mathematical Society
, vol.29
, pp. 381-382
-
-
Joffe, A.1
-
223
-
-
0001542876
-
On a set of almost deterministic k-independent random variables
-
A. Joffe, "On a set of almost deterministic k-independent random variables," Annals of Probability, vol. 2, no. 1, pp. 161-162, 1974.
-
(1974)
Annals of Probability
, vol.2
, Issue.1
, pp. 161-162
-
-
Joffe, A.1
-
224
-
-
0001392607
-
Upper bounds for constant weight error correcting codes
-
S. Johnson, "Upper bounds for constant weight error correcting codes," Discrete Mathematics, vol. 3, pp. 109-124, 1972.
-
(1972)
Discrete Mathematics
, vol.3
, pp. 109-124
-
-
Johnson, S.1
-
225
-
-
0001336166
-
A new upper bound for error-correcting codes
-
S. M. Johnson, "A new upper bound for error-correcting codes," IRE Transactions on Information Theory, vol. IT-8, pp. 203-207, 1962.
-
(1962)
IRE Transactions on Information Theory
, vol.IT-8
, pp. 203-207
-
-
Johnson, S.M.1
-
226
-
-
84874137301
-
Derandomization: A brief overview
-
Algorithms and Complexity, (G. Paun, G. Rozenberg, and A. Salomaa, eds.), World Scientific
-
V. Kabanets, "Derandomization: A brief overview," in Current Trends in Theoretical Computer Science, vol. 1 Algorithms and Complexity, (G. Paun, G. Rozenberg, and A. Salomaa, eds.), pp. 165-188, World Scientific, 2004.
-
(2004)
Current Trends in Theoretical Computer Science
, vol.1
, pp. 165-188
-
-
Kabanets, V.1
-
227
-
-
15244352005
-
Derandomizing polynomial identity tests means proving circuit lower bounds
-
DOI 10.1007/s00037-004-0182-6
-
V. Kabanets and R. Impagliazzo, "Derandomizing polynomial identity tests means proving circuit lower bounds," Computational Complexity, vol. 13, no. 1-2, pp. 1-46, 2004. (Pubitemid 41217703)
-
(2005)
Computational Complexity
, vol.13
, Issue.1-2
, pp. 1-46
-
-
Kabanets, V.1
Impagliazzo, R.2
-
228
-
-
84976736925
-
Eigenvalues and expansion of regular graphs
-
N. Kahale, "Eigenvalues and expansion of regular graphs," Journal of the ACM, vol. 42, no. 5, pp. 1091-1106, 1995.
-
(1995)
Journal of the ACM
, vol.42
, Issue.5
, pp. 1091-1106
-
-
Kahale, N.1
-
229
-
-
0000439550
-
On the cover time of random walks on graphs
-
J. D. Kahn, N. Linial, N. Nisan, and M. E. Saks, "On the cover time of random walks on graphs," Journal of Theoretical Probability, vol. 2, no. 1, pp. 121-128, 1989.
-
(1989)
Journal of Theoretical Probability
, vol.2
, Issue.1
, pp. 121-128
-
-
Kahn, J.D.1
Linial, N.2
Nisan, N.3
Saks, M.E.4
-
231
-
-
78349308585
-
Deterministic extractors for small-space sources
-
J. Kamp, A. Rao, S. Vadhan, and D. Zuckerman, "Deterministic extractors for small-space sources," Journal of Computer and System Sciences, vol. 77, no. 1, pp. 191-220, 2011.
-
(2011)
Journal of Computer and System Sciences
, vol.77
, Issue.1
, pp. 191-220
-
-
Kamp, J.1
Rao, A.2
Vadhan, S.3
Zuckerman, D.4
-
232
-
-
35448977790
-
Deterministic extractors for bit-fixing sources and exposure-resilient cryptography
-
DOI 10.1137/S0097539705446846
-
J. Kamp and D. Zuckerman, "Deterministic extractors for bit-fixing sources and exposure-resilient cryptography," SIAM Journal on Computing, vol. 36, no. 5, pp. 1231-1247, 2006/2007. (Pubitemid 47632444)
-
(2006)
SIAM Journal on Computing
, vol.36
, Issue.5
, pp. 1231-1247
-
-
Kamp, J.1
Zuckerman, D.2
-
233
-
-
84874181818
-
-
H. J. Karloff and T. Pitassi, eds., Proceedings of the Symposium on Theory of Computing Conference, STOC 2012, New York, NY, USA, May 19-22, 2012, 2012.
-
(2012)
Proceedings of the Symposium on Theory of Computing Conference, STOC 2012, New York, NY, USA, May 19-22, 2012
-
-
Karloff, H.J.1
Pitassi, T.2
-
234
-
-
0042418355
-
A time-randomness tradeoff
-
Durham, New Hampshire
-
R. Karp, N. Pippenger, and M. Sipser, "A time-randomness tradeoff," in AMS Conference on Probabilistic Computational Complexity, Durham, New Hampshire, 1985.
-
(1985)
AMS Conference on Probabilistic Computational Complexity
-
-
Karp, R.1
Pippenger, N.2
Sipser, M.3
-
235
-
-
0000517449
-
Turing machines that take advice
-
R. M. Karp and R. J. Lipton, "Turing machines that take advice," L'Enseignement Mathématique. Revue Internationale. IIe Série, vol. 28, no. 3-4, pp. 191-209, 1982.
-
(1982)
L'Enseignement Mathématique. Revue Internationale. IIe Série
, vol.28
, Issue.3-4
, pp. 191-209
-
-
Karp, R.M.1
Lipton, R.J.2
-
236
-
-
0001202403
-
Monte Carlo approximation algorithms for enumeration problems
-
R. M. Karp, M. Luby, and N. Madras, "Monte Carlo approximation algorithms for enumeration problems," Journal of Algorithms, vol. 10, no. 3, pp. 429-448, 1989.
-
(1989)
Journal of Algorithms
, vol.10
, Issue.3
, pp. 429-448
-
-
Karp, R.M.1
Luby, M.2
Madras, N.3
-
237
-
-
51249172217
-
Constructing a perfect matching is in Random NC
-
R. M. Karp, E. Upfal, and A. Wigderson, "Constructing a perfect matching is in Random NC," Combinatorica, vol. 6, no. 1, pp. 35-48, 1986.
-
(1986)
Combinatorica
, vol.6
, Issue.1
, pp. 35-48
-
-
Karp, R.M.1
Upfal, E.2
Wigderson, A.3
-
239
-
-
0033720713
-
On the efficiency of local decoding procedures for error-correcting codes
-
(electronic), New York
-
J. Katz and L. Trevisan, "On the efficiency of local decoding procedures for error-correcting codes," in Proceedings of the Annual ACM Symposium on Theory of Computing, pp. 80-86 (electronic), New York, 2000.
-
(2000)
Proceedings of the Annual ACM Symposium on Theory of Computing
, pp. 80-86
-
-
Katz, J.1
Trevisan, L.2
-
240
-
-
84968476490
-
An estimate for character sums
-
N. M. Katz, "An estimate for character sums," Journal of the American Mathematical Society, vol. 2, no. 2, pp. 197-200, 1989.
-
(1989)
Journal of the American Mathematical Society
, vol.2
, Issue.2
, pp. 197-200
-
-
Katz, N.M.1
-
241
-
-
34249038395
-
Polynomial identity testing for depth 3 circuits
-
N. Kayal and N. Saxena, "Polynomial identity testing for depth 3 circuits," Computational Complexity, vol. 16, no. 2, pp. 115-138, 2007.
-
(2007)
Computational Complexity
, vol.16
, Issue.2
, pp. 115-138
-
-
Kayal, N.1
Saxena, N.2
-
242
-
-
84859047390
-
Pseudorandom generators, typically-correct derandomization, and dircuit lower bounds
-
J. Kinne, D. van Melkebeek, and R. Shaltiel, "Pseudorandom generators, typically-correct derandomization, and dircuit lower bounds," Computational Complexity, vol. 21, no. 1, pp. 3-61, 2012.
-
(2012)
Computational Complexity
, vol.21
, Issue.1
, pp. 3-61
-
-
Kinne, J.1
Van Melkebeek, D.2
Shaltiel, R.3
-
243
-
-
0038290332
-
Boosting and hard-core set construction
-
A. R. Klivans and R. A. Servedio, "Boosting and Hard-Core Set Construction," Machine Learning, vol. 51, no. 3, pp. 217-238, 2003.
-
(2003)
Machine Learning
, vol.51
, Issue.3
, pp. 217-238
-
-
Klivans, A.R.1
Servedio, R.A.2
-
244
-
-
0036588881
-
Graph nonisomorphism has subexponential size proofs unless the polynomial-time hierarchy collapses
-
DOI 10.1137/S0097539700389652, PII S0097539700389652
-
A. R. Klivans and D. van Melkebeek, "Graph nonisomorphism has subexponential size proofs unless the polynomial-time hierarchy collapses," SIAM Journal on Computing, vol. 31, no. 5, pp. 1501-1526 (electronic), 2002 (Pubitemid 35298409)
-
(2002)
SIAM Journal on Computing
, vol.31
, Issue.5
, pp. 1501-1526
-
-
Klivans, A.R.1
Van Melkebeek, D.2
-
247
-
-
33646844308
-
Generalized strong extractors and deterministic privacy amplification
-
Cryptography and Coding - 10th IMA International Conference, Proceedings
-
R. König and U. M. Maurer, "Generalized strong extractors and deterministic privacy amplification," in IMA International Conference, vol. 3796 of Lecture Notes in Computer Science, (N. P. Smart, ed.), pp. 322-339, Springer, 2005. (Pubitemid 43774843)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3796
, pp. 322-339
-
-
Konig, R.1
Maurer, U.2
-
249
-
-
79959688264
-
High-rate codes with sublinear-time decoding
-
(L. Fortnow and S. P. Vadhan, eds.), ACM
-
S. Kopparty, S. Saraf, and S. Yekhanin, "High-rate codes with sublinear-time decoding," in STOC, (L. Fortnow and S. P. Vadhan, eds.), pp. 167-176, ACM, 2011.
-
(2011)
STOC
, pp. 167-176
-
-
Kopparty, S.1
Saraf, S.2
Yekhanin, S.3
-
250
-
-
79959722170
-
Pseudorandom generators for group products: Extended abstract
-
(L. Fortnow and S. P. Vadhan, eds.), ACM
-
M. Koucký, P. Nimbhorkar, and P. Pudlák, "Pseudorandom generators for group products: extended abstract," in STOC, (L. Fortnow and S. P. Vadhan, eds.), pp. 263-272, ACM, 2011.
-
(2011)
STOC
, pp. 263-272
-
-
Koucký, M.1
Nimbhorkar, P.2
Pudlák, P.3
-
251
-
-
84874138310
-
-
ACM
-
C. Koutsougeras and J. S. Vitter, eds., Proceedings of the Annual ACM Symposium on Theory of Computing, May 5-8, 1991, New Orleans, Louisiana, USA, ACM, 1991.
-
(1991)
Proceedings of the Annual ACM Symposium on Theory of Computing, May 5-8, 1991, New Orleans, Louisiana, USA
-
-
Koutsougeras, C.1
Vitter, J.S.2
-
252
-
-
0012168966
-
How to predict congruential generators
-
H. Krawczyk, "How to predict congruential generators," Journal of Algorithms, vol. 13, no. 4, pp. 527-545, 1992.
-
(1992)
Journal of Algorithms
, vol.13
, Issue.4
, pp. 527-545
-
-
Krawczyk, H.1
-
255
-
-
0000776885
-
Pairwise statistical independence
-
H. O. Lancaster, "Pairwise statistical independence," Annals of Mathematical Statistics, vol. 36, pp. 1313-1317, 1965.
-
(1965)
Annals of Mathematical Statistics
, vol.36
, pp. 1313-1317
-
-
Lancaster, H.O.1
-
256
-
-
0021098038
-
BPP and the polynomial hierarchy
-
C. Lautemann, "BPP and the polynomial hierarchy," Information Processing Letters, vol. 17, no. 4, pp. 215-217, 1983.
-
(1983)
Information Processing Letters
, vol.17
, Issue.4
, pp. 215-217
-
-
Lautemann, C.1
-
257
-
-
80052420854
-
Computational randomness from generalized hardcore sets
-
of Lecture Notes in Computer Science, Heidelberg: Springer
-
C.-J. Lee, C.-J. Lu, and S.-C. Tsai, "Computational randomness from generalized hardcore sets," in Fundamentals of Computation Theory, vol. 6914 of Lecture Notes in Computer Science, pp. 78-89, Heidelberg: Springer, 2011.
-
(2011)
Fundamentals of Computation Theory
, vol.6914
, pp. 78-89
-
-
Lee, C.-J.1
Lu, C.-J.2
Tsai, S.-C.3
-
259
-
-
51249173191
-
One way functions and pseudorandom generators
-
L. A. Levin, "One way functions and pseudorandom generators," Combinatorica, vol. 7, no. 4, pp. 357-363, 1987.
-
(1987)
Combinatorica
, vol.7
, Issue.4
, pp. 357-363
-
-
Levin, L.A.1
-
260
-
-
0031625441
-
Checking polynomial identities over any field: Towards a derandomization?
-
New York
-
D. Lewin and S. Vadhan, "Checking polynomial identities over any field: towards a derandomization?," in Annual ACM Symposium on the Theory of Computing (Dallas, TX), pp. 438-447, New York, 1999.
-
(1999)
Annual ACM Symposium on the Theory of Computing (Dallas, TX)
, pp. 438-447
-
-
Lewin, D.1
Vadhan, S.2
-
262
-
-
80052008588
-
A new approach to affine extractors and dispersers
-
X. Li, "A New Approach to Affine Extractors and Dispersers," in IEEE Conference on Computational Complexity, pp. 137-147, 2011.
-
(2011)
IEEE Conference on Computational Complexity
, pp. 137-147
-
-
Li, X.1
-
264
-
-
0031498527
-
Efficient construction of a small hitting set for combinatorial rectangles in high dimension
-
N. Linial, M. Luby, M. Saks, and D. Zuckerman, "Efficient construction of a small hitting set for combinatorial rectangles in high dimension," Combinatorica, vol. 17, no. 2, pp. 215-234, 1997.
-
(1997)
Combinatorica
, vol.17
, Issue.2
, pp. 215-234
-
-
Linial, N.1
Luby, M.2
Saks, M.3
Zuckerman, D.4
-
265
-
-
0001522385
-
Approximate inclusion-exclusion
-
N. Linial and N. Nisan, "Approximate inclusion-exclusion," Combinatorica, vol. 10, no. 4, pp. 349-365, 1990.
-
(1990)
Combinatorica
, vol.10
, Issue.4
, pp. 349-365
-
-
Linial, N.1
Nisan, N.2
-
266
-
-
0003013846
-
New directions in testing
-
of DIMACS Series Discrete Mathemtics and Theoretical Computer Science, Providence, RI: American Mathematical Society
-
R. J. Lipton, "New directions in testing," in Distributed computing and cryptography (Princeton, NJ, 1989), vol. 2 of DIMACS Series Discrete Mathemtics and Theoretical Computer Science, pp. 191-202, Providence, RI: American Mathematical Society, 1991.
-
(1991)
Distributed Computing and Cryptography (Princeton, NJ, 1989)
, vol.2
, pp. 191-202
-
-
Lipton, R.J.1
-
267
-
-
0003221566
-
On determinants, matchings, and random algorithms
-
L. Lovász, "On determinants, matchings, and random algorithms," in Fundamentals of Computation Theory (Berlin/Wendisch-Rietz), pp. 565-574, 1979
-
(1979)
Fundamentals of Computation Theory (Berlin/Wendisch-Rietz)
, pp. 565-574
-
-
Lovász, L.1
-
268
-
-
0018292109
-
On the Shannon capacity of a graph
-
L. Lovász, "On the Shannon capacity of a graph," IEEE Transactions on Information Theory, vol. 25, no. 1, pp. 1-7, 1979.
-
(1979)
IEEE Transactions on Information Theory
, vol.25
, Issue.1
, pp. 1-7
-
-
Lovász, L.1
-
270
-
-
77952260904
-
Unconditional pseudorandom generators for low-degree polynomials
-
S. Lovett, "Unconditional pseudorandom generators for low-degree polynomials," Theory of Computing. An Open Access Journal, vol. 5, pp. 69-82, 2009.
-
(2009)
Theory of Computing. An Open Access Journal
, vol.5
, pp. 69-82
-
-
Lovett, S.1
-
271
-
-
0036436290
-
Improved pseudorandom generators for combinatorial rectangles
-
C.-J. Lu, "Improved pseudorandom generators for combinatorial rectangles," Combinatorica, vol. 22, no. 3, pp. 417-433, 2002.
-
(2002)
Combinatorica
, vol.22
, Issue.3
, pp. 417-433
-
-
Lu, C.-J.1
-
272
-
-
0038446831
-
Extractors: Optimal up to constant factors
-
C.-J. Lu, O. Reingold, S. Vadhan, and A. Wigderson, "Extractors: optimal up to constant factors," in Proceedings of the ACM Symposium on Theory of Computing (STOC '03), pp. 602-611, 2003
-
(2003)
Proceedings of the ACM Symposium on Theory of Computing (STOC '03)
, pp. 602-611
-
-
Lu, C.-J.1
Reingold, O.2
Vadhan, S.3
Wigderson, A.4
-
273
-
-
33846225971
-
Improved hardness amplification in NP
-
DOI 10.1016/j.tcs.2006.10.009, PII S0304397506007006
-
C.-J. Lu, S.-C. Tsai, and H.-L. Wu, "Improved hardness amplification in NP," Theoretical Computer Science, vol. 370, no. 1-3, pp. 293-298, 2007. (Pubitemid 46107741)
-
(2007)
Theoretical Computer Science
, vol.370
, Issue.1-3
, pp. 293-298
-
-
Lu, C.-J.1
Tsai, S.-C.2
Wu, H.-L.3
-
274
-
-
85027956216
-
Complexity of hard-core set proofs
-
C.-J. Lu, S.-C. Tsai, and H.-L. Wu, "Complexity of hard-core set proofs," Computational Complexity, vol. 20, no. 1, pp. 145-171, 2011.
-
(2011)
Computational Complexity
, vol.20
, Issue.1
, pp. 145-171
-
-
Lu, C.-J.1
Tsai, S.-C.2
Wu, H.-L.3
-
275
-
-
84874122950
-
-
of Progress in Mathematics. Basel: Birkhäuser Verlag, (With an appendix by Jonathan D. Rogawski)
-
A. Lubotzky, Discrete Groups, Expanding Graphs and Invariant Measures. volume 125 of Progress in Mathematics. Basel: Birkhäuser Verlag, 1994. (With an appendix by Jonathan D. Rogawski).
-
(1994)
Discrete Groups, Expanding Graphs and Invariant Measures
, vol.125
-
-
Lubotzky, A.1
-
276
-
-
84855763533
-
Expander graphs in pure and applied mathematics
-
A. Lubotzky, "Expander graphs in pure and applied mathematics," American Mathematical Society. Bulletin. New Series, vol. 49, no. 1, pp. 113-162, 2012.
-
(2012)
American Mathematical Society. Bulletin. New Series
, vol.49
, Issue.1
, pp. 113-162
-
-
Lubotzky, A.1
-
277
-
-
0000848816
-
Ramanujan graphs
-
A. Lubotzky, R. Phillips, and P. Sarnak, "Ramanujan graphs," Combinatorica, vol. 8, no. 3, pp. 261-277, 1988.
-
(1988)
Combinatorica
, vol.8
, Issue.3
, pp. 261-277
-
-
Lubotzky, A.1
Phillips, R.2
Sarnak, P.3
-
278
-
-
0022807929
-
Simple parallel algorithms for the maximal independent set problem
-
M. Luby, "A simple parallel algorithm for the maximal independent set problem," SIAM Journal on Computing, vol. 15, no. 4, pp. 1036-1053, 1986. (Pubitemid 17465853)
-
(1986)
SIAM Journal on Computing
, vol.15
, Issue.4
, pp. 1036-1053
-
-
Luby Michael1
-
279
-
-
0009448732
-
Removing randomness in parallel computation without a processor penalty
-
M. Luby, "Removing randomness in parallel computation without a processor penalty," Journal of Computer and System Sciences, vol. 47, no. 2, pp. 250-286, 1993.
-
(1993)
Journal of Computer and System Sciences
, vol.47
, Issue.2
, pp. 250-286
-
-
Luby, M.1
-
280
-
-
0010765540
-
Deterministic approximate counting of depth-2 circuits
-
M. Luby, B. Veličković, and A. Wigderson, "Deterministic Approximate Counting of Depth-2 Circuits," in ISTCS, pp. 18-24, 1993
-
(1993)
ISTCS
, pp. 18-24
-
-
Luby, M.1
Veličković, B.2
Wigderson, A.3
-
281
-
-
84874124842
-
-
number of Foundations and Trends in Theoretical Computer Science. now publishers
-
M. Luby and A. Wigderson, Pairwise Independence and Derandomization. Volume 1, number 4 of Foundations and Trends in Theoretical Computer Science. now publishers, 2005.
-
(2005)
Pairwise Independence and Derandomization
, vol.1
, Issue.4
-
-
Luby, M.1
Wigderson, A.2
-
282
-
-
0003525990
-
-
Amsterdam: North-Holland Publishing Co., (North-Holland Mathematical Library)
-
F. J. MacWilliams and N. J. A. Sloane, The Theory of Error-correcting Codes. Amsterdam: North-Holland Publishing Co., 1977. (North-Holland Mathematical Library, Vol. 16).
-
(1977)
The Theory of Error-correcting Codes
, vol.16
-
-
MacWilliams, F.J.1
Sloane, N.J.A.2
-
283
-
-
0000789645
-
Explicit constructions of expanders
-
G. A. Margulis, "Explicit constructions of expanders," Problemy Peredači Informacii, vol. 9, no. 4, pp. 71-80, 1973.
-
(1973)
Problemy Peredači Informacii
, vol.9
, Issue.4
, pp. 71-80
-
-
Margulis, G.A.1
-
284
-
-
0003059022
-
Explicit group-theoretic constructions of combinatorial schemes and their applications in the construction of expanders and concentrators
-
G. A. Margulis, "Explicit group-theoretic constructions of combinatorial schemes and their applications in the construction of expanders and concentrators," Problemy Peredači Informacii, vol. 24, no. 1, pp. 51-60, 1988.
-
(1988)
Problemy Peredači Informacii
, vol.24
, Issue.1
, pp. 51-60
-
-
Margulis, G.A.1
-
285
-
-
33645697622
-
Disjoint decomposition of Markov chains and sampling circuits in Cayley graphs
-
R. Martin and D. Randall, "Disjoint decomposition of Markov chains and sampling circuits in Cayley graphs," Combinatorics, Probability and Computing, vol. 15, no. 3, pp. 411-448, 2006.
-
(2006)
Combinatorics, Probability and Computing
, vol.15
, Issue.3
, pp. 411-448
-
-
Martin, R.1
Randall, D.2
-
286
-
-
0024772324
-
Conductance and convergence of Markov chains - A combinatorial treatment of expanders
-
M. Mihail, "Conductance and convergence of Markov Chains-A combinatorial treatment of expanders," in Annual Symposium on Foundations of Computer Science (Research Triangle Park, North Carolina), pp. 526-531, 1989 (Pubitemid 20725998)
-
(1989)
Annual Symposium on Foundations of Computer Science (Proceedings)
, pp. 526-531
-
-
Mihail Milena1
-
287
-
-
0017217375
-
Riemann's hypothesis and tests for primality
-
December
-
G. L. Miller, "Riemann's hypothesis and tests for primality," Journal of Computer and System Sciences, vol. 13, no. 3, pp. 300-317, December 1976.
-
(1976)
Journal of Computer and System Sciences
, vol.13
, Issue.3
, pp. 300-317
-
-
Miller, G.L.1
-
289
-
-
29144500344
-
Derandomizing Arthur-Merlin games using hitting sets
-
DOI 10.1007/s00037-005-0197-7
-
P. B. Miltersen and N. V. Vinodchandran, "Derandomizing Arthur-Merlin games using hitting sets," Computational Complexity, vol. 14, no. 3, pp. 256-279, 2005. (Pubitemid 41813507)
-
(2005)
Computational Complexity
, vol.14
, Issue.3
, pp. 256-279
-
-
Miltersen, P.B.1
Vinodchandran, N.V.2
-
290
-
-
33746398102
-
-
Cambridge: Cambridge University Press, (Randomized algorithms and probabilistic analysis)
-
M. Mitzenmacher and E. Upfal, Probability and Computing. Cambridge: Cambridge University Press, 2005. (Randomized algorithms and probabilistic analysis).
-
(2005)
Probability and Computing
-
-
Mitzenmacher, M.1
Upfal, E.2
-
292
-
-
17744374132
-
Maximum matchings via Gaussian elimination
-
Proceedings - 45th Annual IEEE Symposium on Foundations of Computer Sciences, FOCS 2004
-
M. Mucha and P. Sankowski, "Maximum matchings via Gaussian elimination," in Symposium on Foundations of Computer Science (Rome, Italy), pp. 248-255, IEEE Computer Society, 2004. (Pubitemid 40575286)
-
(2004)
Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS
, pp. 248-255
-
-
Mucha, M.1
Sankowski, P.2
-
293
-
-
84874176481
-
Boolean algebras in electric circuit design
-
(Proceedings of the symposium on special topics in applied mathematics, Northwestern University (1953))
-
D. E. Muller, "Boolean algebras in electric circuit design," The American Mathematical Monthly, vol. 61, no. 7 part II, pp. 27-28, 1954. (Proceedings of the symposium on special topics in applied mathematics, Northwestern University (1953)).
-
(1954)
The American Mathematical Monthly
, vol.61
, Issue.7 PART II
, pp. 27-28
-
-
Muller, D.E.1
-
294
-
-
51249174825
-
Matching is as easy as matrix inversion
-
K. Mulmuley, U. V. Vazirani, and V. V. Vazirani, "Matching is as easy as matrix inversion," Combinatorica, vol. 7, no. 1, pp. 105-113, 1987.
-
(1987)
Combinatorica
, vol.7
, Issue.1
, pp. 105-113
-
-
Mulmuley, K.1
Vazirani, U.V.2
Vazirani, V.V.3
-
295
-
-
84874162948
-
-
number of Foundations and Trends in Theoretical Computer Science. now publishers
-
S. Muthukrishnan, Data Streams: Algorithms and Applications, volume 1, number 2 of Foundations and Trends in Theoretical Computer Science. now publishers, 2005.
-
(2005)
Data Streams: Algorithms and Applications
, vol.1
, Issue.2
-
-
Muthukrishnan, S.1
-
296
-
-
0027641832
-
Small-bias probability spaces: Efficient constructions and applications
-
J. Naor and M. Naor, "Small-bias probability spaces: Efficient constructions and applications," SIAM Journal on Computing, vol. 22, pp. 838-856, August 1993. (Pubitemid 23677151)
-
(1993)
SIAM Journal on Computing
, vol.22
, Issue.4
, pp. 838-856
-
-
Naor Joseph1
Naor Moni2
-
297
-
-
0000437003
-
On the second eigenvalue of a graph
-
A. Nilli, "On the second eigenvalue of a graph," Discrete Mathematics, vol. 91, no. 2, pp. 207-210, 1991.
-
(1991)
Discrete Mathematics
, vol.91
, Issue.2
, pp. 207-210
-
-
Nilli, A.1
-
298
-
-
0008827213
-
Pseudorandom bits for constant depth circuits
-
N. Nisan, "Pseudorandom bits for constant depth circuits," Combinatorica, vol. 11, no. 1, pp. 63-70, 1991.
-
(1991)
Combinatorica
, vol.11
, Issue.1
, pp. 63-70
-
-
Nisan, N.1
-
299
-
-
0000947929
-
Pseudorandom generators for space-bounded computation
-
N. Nisan, "Pseudorandom generators for space-bounded computation," Combinatorica, vol. 12, no. 4, pp. 449-461, 1992.
-
(1992)
Combinatorica
, vol.12
, Issue.4
, pp. 449-461
-
-
Nisan, N.1
-
300
-
-
0038874554
-
RL ⊆ SC
-
N. Nisan, "RL ⊆ SC," Computational Complexity, vol. 4, no. 1, pp. 1-11, 1994.
-
(1994)
Computational Complexity
, vol.4
, Issue.1
, pp. 1-11
-
-
Nisan, N.1
-
301
-
-
0033075850
-
Extracting randomness: A survey and new constructions
-
February
-
N. Nisan and A. Ta-Shma, "Extracting randomness: A survey and new constructions," Journal of Computer and System Sciences, vol. 58, pp. 148-173, February 1999.
-
(1999)
Journal of Computer and System Sciences
, vol.58
, pp. 148-173
-
-
Nisan, N.1
Ta-Shma, A.2
-
302
-
-
0028516244
-
Hardness vs randomness
-
DOI 10.1016/S0022-0000(05)80043-1
-
N. Nisan and A. Wigderson, "Hardness vs Randomness," Journal of Computer and System Sciences, vol. 49, pp. 149-167, October 1994. (Pubitemid 124013312)
-
(1994)
Journal of Computer and System Sciences
, vol.49
, Issue.2
, pp. 149-167
-
-
Nisan, N.1
-
303
-
-
0030086632
-
Randomness is linear in space
-
DOI 10.1006/jcss.1996.0004
-
N. Nisan and D. Zuckerman, "Randomness is linear in space," Journal of Computer and System Sciences, vol. 52, pp. 43-52, February 1996. (Pubitemid 126340848)
-
(1996)
Journal of Computer and System Sciences
, vol.52
, Issue.1
, pp. 43-52
-
-
Nisan, N.1
Zuckerman, D.2
-
304
-
-
2942702375
-
Hardness amplification within NP
-
R. O'Donnell, "Hardness amplification within NP," Journal of Computer and System Sciences, vol. 69, no. 1, pp. 68-94, 2004.
-
(2004)
Journal of Computer and System Sciences
, vol.69
, Issue.1
, pp. 68-94
-
-
O'Donnell, R.1
-
305
-
-
84893798125
-
-
Book draft available at analysisofbooleanfunctions.org
-
R. O'Donnell, "Analysis of boolean functions," Book draft available at analysisofbooleanfunctions.org, 2012.
-
(2012)
Analysis of Boolean Functions
-
-
O'Donnell, R.1
-
306
-
-
33646831750
-
Correcting errors beyond the Guruswami-Sudan radius in polynomial time
-
DOI 10.1109/SFCS.2005.29, 1530722, Proceedings - 46th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2005
-
F. Parvaresh and A. Vardy, "Correcting errors beyond the Guruswami-Sudan radius in polynomial time," in Proceedings of the IEEE Symposium on Foundations of Computer Science, pp. 285-294, 2005 (Pubitemid 44375740)
-
(2005)
Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS
, vol.2005
, pp. 285-294
-
-
Parvaresh, F.1
Vardy, A.2
-
307
-
-
0004888588
-
Iterating von Neumann's procedure for extracting random bits
-
Y. Peres, "Iterating von Neumann's procedure for extracting random bits," The Annals of Statistics, vol. 20, no. 1, pp. 590-597, 1992.
-
(1992)
The Annals of Statistics
, vol.20
, Issue.1
, pp. 590-597
-
-
Peres, Y.1
-
308
-
-
0000808175
-
Encoding and error-correction procedures for the Bose-Chaudhuri codes
-
W. W. Peterson, "Encoding and error-correction procedures for the Bose-Chaudhuri codes," IRE Transactions on Information Theory, vol. IT-6, pp. 459-470, 1960.
-
(1960)
IRE Transactions on Information Theory
, vol.IT-6
, pp. 459-470
-
-
Peterson, W.W.1
-
309
-
-
0002550078
-
On the complexity of a concentrator
-
Stockholm
-
M. Pinsker, "On the complexity of a concentrator," in Annual Teletraffic Conference, pp. 318/1-318/4, Stockholm, 1973.
-
(1973)
Annual Teletraffic Conference
-
-
Pinsker, M.1
-
311
-
-
0018456413
-
Relations among complexity measures
-
N. Pippenger and M. J. Fischer, "Relations among complexity measures," Journal of the Association for Computing Machinery, vol. 26, no. 2, pp. 361-381, 1979.
-
(1979)
Journal of the Association for Computing Machinery
, vol.26
, Issue.2
, pp. 361-381
-
-
Pippenger, N.1
Fischer, M.J.2
-
312
-
-
0001131698
-
The design of optimum multi-factorial experiments
-
R. L. Plackett and J. E. Burman, "The design of optimum multi-factorial experiments," Biometrika, vol. 33, pp. 305-325, 1945.
-
(1945)
Biometrika
, vol.33
, pp. 305-325
-
-
Plackett, R.L.1
Burman, J.E.2
-
313
-
-
0006531637
-
-
Amsterdam: North-Holland
-
V. S. Pless, W. C. Huffman, and R. A. Brualdi, eds., Handbook of Coding Theory. Vol. I, II. Amsterdam: North-Holland, 1998.
-
(1998)
Handbook of Coding Theory.
, vol.I AND II
-
-
Pless, V.S.1
Huffman, W.C.2
Brualdi, R.A.3
-
314
-
-
33845432604
-
Probabilistic algorithm for testing primality
-
M. O. Rabin, "Probabilistic algorithm for testing primality," Journal of Number Theory, vol. 12, no. 1, pp. 128-138, 1980.
-
(1980)
Journal of Number Theory
, vol.12
, Issue.1
, pp. 128-138
-
-
Rabin, M.O.1
-
315
-
-
0002956996
-
Bounds for dispersers, extractors, and depth-two superconcentrators
-
(electronic)
-
J. Radhakrishnan and A. Ta-Shma, "Bounds for dispersers, extractors, and depth-two superconcentrators," SIAM Journal on Discrete Mathematics, vol. 13, no. 1 (electronic), pp. 2-24, 2000.
-
(2000)
SIAM Journal on Discrete Mathematics
, vol.13
, Issue.1
, pp. 2-24
-
-
Radhakrishnan, J.1
Ta-Shma, A.2
-
316
-
-
0000435276
-
Probabilistic construction of deterministic algorithms: Approximating packing integer programs
-
(Annual IEEE Symposium on the Foundations of Computer Science (Toronto, ON, 1986))
-
P. Raghavan, "Probabilistic construction of deterministic algorithms: approximating packing integer programs," Journal of Computer and System Sciences, vol. 37, no. 2, pp. 130-143, 1988. (Annual IEEE Symposium on the Foundations of Computer Science (Toronto, ON, 1986)).
-
(1988)
Journal of Computer and System Sciences
, vol.37
, Issue.2
, pp. 130-143
-
-
Raghavan, P.1
-
318
-
-
67650164537
-
Extractors for a constant number of polynomially small minentropy independent sources
-
A. Rao, "Extractors for a constant number of polynomially small minentropy independent sources," SIAM Journal on Computing, vol. 39, no. 1, pp. 168-194, 2009.
-
(2009)
SIAM Journal on Computing
, vol.39
, Issue.1
, pp. 168-194
-
-
Rao, A.1
-
319
-
-
0032650476
-
On recycling the randomness of states in space bounded computation
-
(electronic), New York: ACM
-
R. Raz and O. Reingold, "On recycling the randomness of states in space bounded computation," in Annual ACM Symposium on Theory of Computing (Atlanta, GA, 1999), pp. 159-168 (electronic), New York: ACM, 1999.
-
(1999)
Annual ACM Symposium on Theory of Computing (Atlanta, GA, 1999)
, pp. 159-168
-
-
Raz, R.1
Reingold, O.2
-
320
-
-
0038309373
-
Extracting all the randomness and reducing the error in Trevisan's extractors
-
DOI 10.1006/jcss.2002.1824
-
R. Raz, O. Reingold, and S. Vadhan, "Extracting all the Randomness and Reducing the Error in Trevisan's Extractors," Journal of Computer and System Sciences, vol. 65, pp. 97-128, August 2002. (Pubitemid 41161760)
-
(2003)
Journal of Computer and System Sciences
, vol.65
, Issue.1
, pp. 97-128
-
-
Raz, R.1
Reingold, O.2
Vadhan, S.3
-
321
-
-
84971698089
-
Constructing small sets that are uniform in arithmetic progressions
-
A. Razborov, E. Szemerédi, and A. Wigderson, "Constructing small sets that are uniform in arithmetic progressions," Combinatorics Probability Computing, vol. 2, no. 4, pp. 513-518, 1993.
-
(1993)
Combinatorics Probability Computing
, vol.2
, Issue.4
, pp. 513-518
-
-
Razborov, A.1
Szemerédi, E.2
Wigderson, A.3
-
322
-
-
0000883554
-
Lower bounds on the dimension of schemes of bounded depth in a complete basis containing the logical addition function
-
623
-
A. A. Razborov, "Lower bounds on the dimension of schemes of bounded depth in a complete basis containing the logical addition function," Akademiya Nauk SSSR. Matematicheskie Zametki, vol. 41, no. 4, pp. 598-607, 623, 1987.
-
(1987)
Akademiya Nauk SSSR. Matematicheskie Zametki
, vol.41
, Issue.4
, pp. 598-607
-
-
Razborov, A.A.1
-
323
-
-
0031213341
-
Natural proofs
-
A. A. Razborov and S. Rudich, "Natural proofs," Journal of Computer and System Sciences, vol. 55, no. 1, part 1, pp. 24-35, 1997. (26th Annual ACM Symposium on the Theory of Computing (STOC '94) (Montreal, PQ, 1994)). (Pubitemid 127433391)
-
(1997)
Journal of Computer and System Sciences
, vol.55
, Issue.1
, pp. 24-35
-
-
Razborov, A.A.1
Rudich, S.2
-
324
-
-
9144245836
-
A class of multiple-error-correcting codes and the decoding scheme
-
PGIT-4
-
I. S. Reed, "A class of multiple-error-correcting codes and the decoding scheme," IRE Transactions on Information Theory, PGIT-4, pp. 38-49, 1954.
-
(1954)
IRE Transactions on Information Theory
, pp. 38-49
-
-
Reed, I.S.1
-
327
-
-
52249087391
-
Undirected connectivity in log-space
-
Art 17
-
O. Reingold, "Undirected connectivity in log-space," Journal of the ACM, vol. 55, no. 4, pp. Art 17, 24, 2008.
-
(2008)
Journal of the ACM
, vol.55
, Issue.4
, pp. 24
-
-
Reingold, O.1
-
328
-
-
33750154710
-
Extracting randomness via repeated condensing
-
DOI 10.1137/S0097539703431032
-
O. Reingold, R. Shaltiel, and A. Wigderson, "Extracting randomness via repeated condensing," SIAM Journal on Computing, vol. 35, no. 5, pp. 1185-1209, (electronic), 2006. (Pubitemid 44599923)
-
(2006)
SIAM Journal on Computing
, vol.35
, Issue.5
, pp. 1185-1209
-
-
Reingold, O.1
Shaltiel, R.2
Wigderson, A.3
-
329
-
-
57949114014
-
Dense subsets of pseudorandom sets
-
26-28 October
-
O. Reingold, L. Trevisan, M. Tulsiani, and S. Vadhan, "Dense subsets of pseudorandom sets," in Proceedings of the Annual IEEE Symposium on Foundations of Computer Science (FOCS '08), pp. 76-85, 26-28 October 2008.
-
(2008)
Proceedings of the Annual IEEE Symposium on Foundations of Computer Science (FOCS '08)
, pp. 76-85
-
-
Reingold, O.1
Trevisan, L.2
Tulsiani, M.3
Vadhan, S.4
-
330
-
-
84947798969
-
Notions of reducibility between cryptographic primitives
-
of Lecture Notes in Computer Science, (M. Naor, ed.), Springer-Verlag, 19-21 February
-
O. Reingold, L. Trevisan, and S. Vadhan, "Notions of reducibility between cryptographic primitives," in Proceedings of the First Theory of Cryptography Conference (TCC '04), vol. 2951 of Lecture Notes in Computer Science, (M. Naor, ed.), pp. 1-20, Springer-Verlag, 19-21 February 2004.
-
(2004)
Proceedings of the First Theory of Cryptography Conference (TCC '04)
, vol.2951
, pp. 1-20
-
-
Reingold, O.1
Trevisan, L.2
Vadhan, S.3
-
331
-
-
33748119261
-
Pseudorandom walks on regular digraphs and the RL vs. L problem
-
STOC'06: Proceedings of the 38th Annual ACM Symposium on Theory of Computing
-
O. Reingold, L. Trevisan, and S. Vadhan, "Pseudorandom Walks in Regular Digraphs and the RL vs. L Problem," in Proceedings of the Annual ACM Symposium on Theory of Computing (STOC '06), pp. 457-466, 21-23 May 2006. (Preliminary version as ECCC TR05-22, February 2005). (Pubitemid 44306580)
-
(2006)
Proceedings of the Annual ACM Symposium on Theory of Computing
, vol.2006
, pp. 457-466
-
-
Reingold, O.1
Trevisan, L.2
Vadhan, S.3
-
332
-
-
0034503724
-
Entropy waves, the zig-zag graph product, and new constant-degree expanders and extractors
-
O. Reingold, S. Vadhan, and A. Wigderson, "Entropy waves, the zig-zag graph product, and new constant-degree expanders and extractors," in Proceedings of the Annual Symposium on Foundations of Computer Science (FOCS '00), pp. 3-13, Redondo Beach, CA, 17-19 October 2000. (Pubitemid 32075873)
-
(2000)
Annual Symposium on Foundations of Computer Science - Proceedings
, pp. 3-13
-
-
Reingold Omer1
Vadhan Salil2
Wigderson Avi3
-
333
-
-
0036000527
-
Entropy waves, the zig-zag graph product, and new constant-degree expanders
-
January
-
O. Reingold, S. Vadhan, and A. Wigderson, "Entropy waves, the zig-zag graph product, and new constant-degree expanders," Annals of Mathematics, vol. 155, no. 1, January 2001.
-
(2001)
Annals of Mathematics
, vol.155
, Issue.1
-
-
Reingold, O.1
Vadhan, S.2
Wigderson, A.3
-
335
-
-
0002408684
-
On measures of entropy and information
-
Berkeley, California: University of California Press
-
A. Rényi, "On measures of entropy and information," in Proceedings of Berkeley Symposium on Mathematics Statistics and Probability, Vol. I, pp. 547-561, Berkeley, California: University of California Press, 1961.
-
(1961)
Proceedings of Berkeley Symposium on Mathematics Statistics and Probability, Vol. i
, pp. 547-561
-
-
Rényi, A.1
-
336
-
-
0017930809
-
Method for obtaining digital signatures and public-key cryptosystems
-
DOI 10.1145/359340.359342
-
R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Communications of the Association for Computing Machinery, vol. 21, no. 2, pp. 120-126, 1978. (Pubitemid 8591219)
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
337
-
-
0013370155
-
Property testing
-
Dordrecht: Kluwer Academic Publications
-
D. Ron, "Property testing," in Handbook of Randomized Computing, Vol. I, II, volume 9 of Comb. Optim., pp. 597-649, Dordrecht: Kluwer Academic Publications, 2001.
-
(2001)
Handbook of Randomized Computing, Vol. I, II, Volume 9 of Comb. Optim.
, pp. 597-649
-
-
Ron, D.1
-
338
-
-
26944493764
-
Derandomized squaring of graphs
-
Aproximation, Randomization and Combinatotial Optimization - Algorithms and Techniques: 8th Int. Workshop on APPROX 2005 and 9th Int. Workshop on RANDOM 2005, Proceedings
-
E. Rozenman and S. Vadhan, "Derandomized squaring of graphs," in Proceedings of the International Workshop on Randomization and Computation (RANDOM '05), vol. 3624 of Lecture notes in Computer Science, pp. 436-447, Berkeley, CA, August 2005. (Pubitemid 41480454)
-
(2005)
Lecture Notes in Computer Science
, vol.3624
, pp. 436-447
-
-
Rozenman, E.1
Vadhan, S.2
-
339
-
-
77952077012
-
Sublinear time algorithms
-
Zürich: European Mathematical Society
-
R. Rubinfeld, "Sublinear time algorithms," in International Congress of Mathematicians. Vol. III, pp. 1095-1110, Zürich: European Mathematical Society, 2006.
-
(2006)
International Congress of Mathematicians. Vol. III
, pp. 1095-1110
-
-
Rubinfeld, R.1
-
340
-
-
0030128622
-
Robust characterizations of polynomials with applications to program testing
-
R. Rubinfeld and M. Sudan, "Robust characterizations of polynomials with applications to program testing," SIAM Journal on Computing, vol. 25, no. 2, pp. 252-271, 1996. (Pubitemid 126577271)
-
(1996)
SIAM Journal on Computing
, vol.25
, Issue.2
, pp. 252-271
-
-
Rubinfeld, R.1
Sudan, M.2
-
341
-
-
0003822632
-
-
National Institute of Standards and Technology, U.S. Department of Commerce, Special Publication 800-22, Revision 1a, April
-
A. Rukhin, J. Soto, J. Nechvatal, M. Smid, E. Barker, S. Leigh, M. Levenson, M. Vangel, D. Banks, A. Heckert, J. Dray, and S. Vo, "A statistical test suite for random and pseudorandom number generators for cryptographic applications," National Institute of Standards and Technology, U.S. Department of Commerce, Special Publication 800-22, Revision 1a, April 2010.
-
(2010)
A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications
-
-
Rukhin, A.1
Soto, J.2
Nechvatal, J.3
Smid, M.4
Barker, E.5
Leigh, S.6
Levenson, M.7
Vangel, M.8
Banks, D.9
Heckert, A.10
Dray, J.11
Vo, S.12
-
342
-
-
0016973706
-
P-complete approximation problems
-
S. Sahni and T. Gonzalez, "P-complete approximation problems," Journal of the ACM, vol. 23, no. 3, pp. 555-565, 1976.
-
(1976)
Journal of the ACM
, vol.23
, Issue.3
, pp. 555-565
-
-
Sahni, S.1
Gonzalez, T.2
-
343
-
-
0031654488
-
Explicit OR-dispersers with polylogarithmic degree
-
M. Saks, A. Srinivasan, and S. Zhou, "Explicit OR-dispersers with polylogarithmic degree," Journal of the ACM, vol. 45, no. 1, pp. 123-154, 1998. (Pubitemid 128615466)
-
(1998)
Journal of the ACM
, vol.45
, Issue.1
, pp. 123-154
-
-
Saks, M.1
Srinivasan, A.2
Zhou, S.3
-
344
-
-
0032621057
-
3/2)
-
3/2)," Journal of Computer and System Sciences, vol. 58, no. 2, pp. 376-403, 1999.
-
(1999)
Journal of Computer and System Sciences
, vol.58
, Issue.2
, pp. 376-403
-
-
Saks, M.1
Zhou, S.2
-
346
-
-
0021469810
-
Generating quasirandom sequences from semirandom sources
-
(Annual Symposium on Foundations of Computer Science (Singer Island, FL, 1984))
-
M. Sántha and U. V. Vazirani, "Generating quasirandom sequences from semirandom sources," Journal of Computer and System Sciences, vol. 33, no. 1, pp. 75-87, 1986. (Annual Symposium on Foundations of Computer Science (Singer Island, FL, 1984)).
-
(1986)
Journal of Computer and System Sciences
, vol.33
, Issue.1
, pp. 75-87
-
-
Sántha, M.1
Vazirani, U.V.2
-
347
-
-
35448955269
-
Circuit lower bounds for Merlin-Arthur classes
-
DOI 10.1145/1250790.1250832, STOC'07: Proceedings of the 39th Annual ACM Symposium on Theory of Computing
-
R. Santhanam, "Circuit lower bounds for Merlin-Arthur classes," in STOC'07 - Proceedings of the Annual ACM Symposium on Theory of Computing, pp. 275-283, New York, 2007. (Pubitemid 47630745)
-
(2007)
Proceedings of the Annual ACM Symposium on Theory of Computing
, pp. 275-283
-
-
Santhanam, R.1
-
348
-
-
0004150895
-
-
of Cambridge Tracts in Mathematics. Cambridge: Cambridge University Press
-
P. Sarnak, Some Applications of Modular Forms. Vol. 99 of Cambridge Tracts in Mathematics. Cambridge: Cambridge University Press, 1990.
-
(1990)
Some Applications of Modular Forms.
, vol.99
-
-
Sarnak, P.1
-
349
-
-
0014776888
-
Relationships between nondeterministic and deterministic tape complexities
-
W. J. Savitch, "Relationships between nondeterministic and deterministic tape complexities," Journal of Computer and System Sciences, vol. 4, pp. 177-192, 1970.
-
(1970)
Journal of Computer and System Sciences
, vol.4
, pp. 177-192
-
-
Savitch, W.J.1
-
350
-
-
0001595705
-
Chernoff-Hoeffding bounds for applications with limited independence
-
J. P. Schmidt, A. Siegel, and A. Srinivasan, "Chernoff-Hoeffding bounds for applications with limited independence," SIAM Journal on Discrete Mathematics, vol. 8, no. 2, pp. 223-250, 1995.
-
(1995)
SIAM Journal on Discrete Mathematics
, vol.8
, Issue.2
, pp. 223-250
-
-
Schmidt, J.P.1
Siegel, A.2
Srinivasan, A.3
-
351
-
-
84976779342
-
Fast probabilistic algorithms for verification of polynomial identities
-
J. T. Schwartz, "Fast probabilistic algorithms for verification of polynomial identities," Journal of the ACM, vol. 27, no. 4, pp. 701-717, 1980.
-
(1980)
Journal of the ACM
, vol.27
, Issue.4
, pp. 701-717
-
-
Schwartz, J.T.1
-
352
-
-
33749012868
-
Recent developments in extractors
-
(G. Paun, G. Rozenberg, and A. Salomaa, eds.), World Scientific
-
R. Shaltiel, "Recent Developments in Extractors," in Current Trends in Theoretical Computer Science, vol. 1, (G. Paun, G. Rozenberg, and A. Salomaa, eds.), pp. 189-228, World Scientific, 2004.
-
(2004)
Current Trends in Theoretical Computer Science
, vol.1
, pp. 189-228
-
-
Shaltiel, R.1
-
353
-
-
84863333239
-
Dispersers for affine sources with sub-polynomial entropy
-
(R. Ostrovsky, ed.), IEEE
-
R. Shaltiel, "Dispersers for affine sources with sub-polynomial entropy," in FOCS, (R. Ostrovsky, ed.), pp. 247-256, IEEE, 2011.
-
(2011)
FOCS
, pp. 247-256
-
-
Shaltiel, R.1
-
354
-
-
79959939914
-
An introduction to randomness extractors
-
of Lecture Notes in Computer Science, Heidelberg: Springer
-
R. Shaltiel, "An introduction to randomness extractors," in Automata, languages and programming. Part II, vol. 6756 of Lecture Notes in Computer Science, pp. 21-41, Heidelberg: Springer, 2011.
-
(2011)
Automata, Languages and Programming. Part II
, vol.6756
, pp. 21-41
-
-
Shaltiel, R.1
-
355
-
-
85027926057
-
Weak derandomization of weak algorithms: Explicit versions of Yao's lemma
-
R. Shaltiel, "Weak derandomization of weak algorithms: explicit versions of Yao's lemma," Computational Complexity, vol. 20, no. 1, pp. 87-143, 2011.
-
(2011)
Computational Complexity
, vol.20
, Issue.1
, pp. 87-143
-
-
Shaltiel, R.1
-
356
-
-
27844593208
-
Simple extractors for all min-entropies and a new pseudorandom generator
-
DOI 10.1145/1059513.1059516
-
R. Shaltiel and C. Umans, "Simple extractors for all min-entropies and a new Pseudo-random generator," Journal of the ACM, vol. 52, no. 2, pp. 172-216, 2005. (Pubitemid 41655758)
-
(2005)
Journal of the ACM
, vol.52
, Issue.2
, pp. 172-216
-
-
Shaltiel, R.1
Umans, C.2
-
357
-
-
34249055556
-
Pseudorandomness for approximate counting and sampling
-
R. Shaltiel and C. Umans, "Pseudorandomness for approximate counting and sampling," Computational Complexity, vol. 15, no. 4, pp. 298-341, 2006.
-
(2006)
Computational Complexity
, vol.15
, Issue.4
, pp. 298-341
-
-
Shaltiel, R.1
Umans, C.2
-
358
-
-
78349313026
-
Low-end uniform hardness versus randomness tradeoffs for AM
-
R. Shaltiel and C. Umans, "Low-end uniform hardness versus randomness tradeoffs for AM," SIAM Journal on Computing, vol. 39, no. 3, pp. 1006-1037, 2009.
-
(2009)
SIAM Journal on Computing
, vol.39
, Issue.3
, pp. 1006-1037
-
-
Shaltiel, R.1
Umans, C.2
-
359
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to share a secret," Communications of the Association for Computing Machinery, vol. 22, no. 11, pp. 612-613, 1979.
-
(1979)
Communications of the Association for Computing Machinery
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
360
-
-
84976667857
-
On the generation of cryptographically strong pseudorandom sequences
-
of Lecture Notes in Computer Science, Berlin: Springer
-
A. Shamir, "On the generation of cryptographically strong pseudorandom sequences," in Automata, Languages and Programming (Akko, 1981), vol. 115 of Lecture Notes in Computer Science, pp. 544-550, Berlin: Springer, 1981.
-
(1981)
Automata, Languages and Programming (Akko, 1981)
, vol.115
, pp. 544-550
-
-
Shamir, A.1
-
361
-
-
84856043672
-
A mathematical theory of communication
-
623-656
-
C. E. Shannon, "A mathematical theory of communication," The Bell System Technical Journal, vol. 27, pp. 379-423, 623-656, 1948.
-
(1948)
The Bell System Technical Journal
, vol.27
, pp. 379-423
-
-
Shannon, C.E.1
-
362
-
-
78650453766
-
Arithmetic circuits: A survey of recent results and open questions
-
in Theoretical Computer Science
-
A. Shpilka and A. Yehudayoff, "Arithmetic circuits: A survey of recent results and open questions," Foundations and Trends-in Theoretical Computer Science, vol. 5, no. 3-4, pp. 207-388 (2010), 2009.
-
(2009)
Foundations and Trends
, vol.5
, Issue.3-4
, pp. 207-388
-
-
Shpilka, A.1
Yehudayoff, A.2
-
363
-
-
79959304214
-
Almost k-wise independent sets establish hitting sets for width-3 1-branching programs
-
of Lecture Notes in Computer Science, (A. S. Kulikov and N. K. Vereshchagin, eds.), Springer
-
J. Síma and S. Zák, "Almost k-wise independent sets establish hitting sets for width-3 1-branching programs," in CSR, vol. 6651 of Lecture Notes in Computer Science, (A. S. Kulikov and N. K. Vereshchagin, eds.), pp. 120-133, Springer, 2011.
-
(2011)
CSR
, vol.6651
, pp. 120-133
-
-
Síma, J.1
Zák, S.2
-
364
-
-
0020931594
-
A complexity theoretic approach to randomness
-
Boston, Massachusetts, 25-27 April
-
M. Sipser, "A complexity theoretic approach to randomness," in Annual ACM Symposium on Theory of Computing, pp. 330-335, Boston, Massachusetts, 25-27 April 1983.
-
(1983)
Annual ACM Symposium on Theory of Computing
, pp. 330-335
-
-
Sipser, M.1
-
365
-
-
0024019629
-
Expanders, randomness, or time versus space
-
(Structure in Complexity Theory Conference (Berkeley, CA, 1986))
-
M. Sipser, "Expanders, randomness, or time versus space," Journal of Computer and System Sciences, vol. 36, no. 3, pp. 379-383, 1988. (Structure in Complexity Theory Conference (Berkeley, CA, 1986)).
-
(1988)
Journal of Computer and System Sciences
, vol.36
, Issue.3
, pp. 379-383
-
-
Sipser, M.1
-
367
-
-
0030290419
-
Expander codes
-
PII S001894489607304X
-
M. Sipser and D. A. Spielman, "Expander codes," IEEE Transactions on Information Theory, vol. 42, no. 6 part 1, pp. 1710-1722, 1996. (Codes and complexity). (Pubitemid 126769170)
-
(1996)
IEEE Transactions on Information Theory
, vol.42
, Issue.PART 1
, pp. 1710-1722
-
-
Sipser, M.1
Spielman, D.A.2
-
369
-
-
0001873077
-
A fast Monte-Carlo test for primality
-
R. Solovay and V. Strassen, "A fast Monte-Carlo test for primality," SIAM Journal on Computing, vol. 6, no. 1, pp. 84-85, 1977.
-
(1977)
SIAM Journal on Computing
, vol.6
, Issue.1
, pp. 84-85
-
-
Solovay, R.1
Strassen, V.2
-
370
-
-
84874129054
-
-
of CBMS-NSF Regional Conference Series in Applied Mathematics. Philadelphia, PA: Society for Industrial and Applied Mathematics (SIAM), Second Edition
-
J. Spencer, Ten Lectures on the Probabilistic Method, volume 64 of CBMS-NSF Regional Conference Series in Applied Mathematics. Philadelphia, PA: Society for Industrial and Applied Mathematics (SIAM), Second Edition, 1994.
-
(1994)
Ten Lectures on the Probabilistic Method
, vol.64
-
-
Spencer, J.1
-
371
-
-
46749087479
-
Spectral graph theory and its applications
-
21-23 October 2007, Providence, RI, USA, Proceedings
-
D. A. Spielman, "Spectral graph theory and its applications," in Symposium on Foundations of Computer Science (FOCS 2007), 21-23 October 2007, Providence, RI, USA, Proceedings, pp. 29-38, 2007.
-
(2007)
Symposium on Foundations of Computer Science (FOCS 2007)
, pp. 29-38
-
-
Spielman, D.A.1
-
372
-
-
0032631071
-
Computing with very weak random sources
-
(electronic)
-
A. Srinivasan and D. Zuckerman, "Computing with very weak random sources," SIAM Journal on Computing, vol. 28, no. 4, pp. 1433-1459 (electronic), 1999
-
(1999)
SIAM Journal on Computing
, vol.28
, Issue.4
, pp. 1433-1459
-
-
Srinivasan, A.1
Zuckerman, D.2
-
373
-
-
84893470966
-
Pseudorandomness for permutation branching programs without the group theory
-
Electronic Colloquium on Computational Complexity (ECCC), July
-
T. Steinke, "Pseudorandomness for permutation branching programs without the group theory," Technical Report TR12-083, Electronic Colloquium on Computational Complexity (ECCC), July 2012.
-
(2012)
Technical Report TR12-083
-
-
Steinke, T.1
-
375
-
-
70449495933
-
Algebraic function fields and codes
-
of. Berlin: Springer-Verlag, Second Edition
-
H. Stichtenoth, Algebraic Function Fields and Codes, volume 254 of Graduate Texts in Mathematics. Berlin: Springer-Verlag, Second Edition, 2009.
-
(2009)
Graduate Texts in Mathematics
, vol.254
-
-
Stichtenoth, H.1
-
376
-
-
0028407954
-
Combinatorial techniques for universal hashing
-
DOI 10.1016/S0022-0000(05)80007-8
-
D. R. Stinson, "Combinatorial techniques for universal hashing," Journal of Computer and System Sciences, vol. 48, no. 2, pp. 337-346, 1994. (Pubitemid 124013294)
-
(1994)
Journal of Computer and System Sciences
, vol.48
, Issue.2
, pp. 337-346
-
-
Stinson, D.R.1
-
377
-
-
34250487811
-
Gaussian elimination is not optimal
-
V. Strassen, "Gaussian elimination is not optimal," Numerische Mathematik, vol. 13, pp. 354-356, 1969.
-
(1969)
Numerische Mathematik
, vol.13
, pp. 354-356
-
-
Strassen, V.1
-
378
-
-
0031097176
-
Decoding of Reed Solomon codes beyond the error-correction bound
-
DOI 10.1006/jcom.1997.0439, PII S0885064X97904398
-
M. Sudan, "Decoding of Reed Solomon codes beyond the error-correction bound," Journal of Complexity, vol. 13, pp. 180-193, March 1997. (Pubitemid 127172728)
-
(1997)
Journal of Complexity
, vol.13
, Issue.1
, pp. 180-193
-
-
Sudan, M.1
-
379
-
-
26944481662
-
Algorithmic introduction to coding theory
-
M. Sudan, "Algorithmic introduction to coding theory," Lecture notes, http://people.csail.mit.edu/madhu/FT01/, 2001
-
(2001)
Lecture Notes
-
-
Sudan, M.1
-
381
-
-
0035276434
-
Pseudorandom generators without the XOR Lemma
-
DOI 10.1006/jcss.2000.1730
-
M. Sudan, L. Trevisan, and S. Vadhan, "Pseudorandom generators without the XOR lemma," Journal of Computer and System Sciences, vol. 62, pp. 236-266, 2001. (Pubitemid 32334551)
-
(2001)
Journal of Computer and System Sciences
, vol.62
, Issue.2
, pp. 236-266
-
-
Sudan, M.1
Trevisan, L.2
Vadhan, S.3
-
382
-
-
34248175874
-
Lossless condensers, unbalanced expanders, and extractors
-
A. Ta-Shma, C. Umans, and D. Zuckerman, "Lossless condensers, unbalanced expanders, and extractors," Combinatorica, vol. 27, no. 2, pp. 213-240, 2007.
-
(2007)
Combinatorica
, vol.27
, Issue.2
, pp. 213-240
-
-
Ta-Shma, A.1
Umans, C.2
Zuckerman, D.3
-
383
-
-
10644226110
-
Extractor codes
-
A. Ta-Shma and D. Zuckerman, "Extractor codes," IEEE Transactions on Information Theory, vol. 50, no. 12, pp. 3015-3025, 2004.
-
(2004)
IEEE Transactions on Information Theory
, vol.50
, Issue.12
, pp. 3015-3025
-
-
Ta-Shma, A.1
Zuckerman, D.2
-
384
-
-
33646520833
-
Extractors from Reed-Muller codes
-
A. Ta-Shma, D. Zuckerman, and S. Safra, "Extractors from Reed-Muller codes," Journal of Computer and System Sciences, vol. 72, no. 5, pp. 786-812, 2006.
-
(2006)
Journal of Computer and System Sciences
, vol.72
, Issue.5
, pp. 786-812
-
-
Ta-Shma, A.1
Zuckerman, D.2
Safra, S.3
-
385
-
-
0000472681
-
Explicit concentrators from generalized N-gons
-
M. R. Tanner, "Explicit concentrators from generalized N-gons," SIAM Journal on Algebraic Discrete Methods, vol. 5, no. 3, pp. 287-293, 1984.
-
(1984)
SIAM Journal on Algebraic Discrete Methods
, vol.5
, Issue.3
, pp. 287-293
-
-
Tanner, M.R.1
-
386
-
-
84874138056
-
Expansion in finite groups of Lie type
-
T. Tao, "Expansion in finite groups of Lie type," Lecture Notes, http://www.math.ucla.edu/tao/254b.1.12w/, 2012
-
(2012)
Lecture Notes
-
-
Tao, T.1
-
387
-
-
0038679036
-
Fourier analysis on finite groups and applications
-
of. Cambridge: Cambridge University Press
-
A. Terras, Fourier Analysis on Finite Groups and Applications, volume 43 of London Mathematical Society Student Texts. Cambridge: Cambridge University Press, 1999.
-
(1999)
London Mathematical Society Student Texts
, vol.43
-
-
Terras, A.1
-
389
-
-
0005314594
-
Extractors and pseudorandom generators
-
(electronic)
-
L. Trevisan, "Extractors and pseudorandom generators," Journal of the ACM, vol. 48, no. 4, pp. 860-879, (electronic), 2001.
-
(2001)
Journal of the ACM
, vol.48
, Issue.4
, pp. 860-879
-
-
Trevisan, L.1
-
390
-
-
0344981500
-
List decoding using the XOR lemma
-
Cambridge, MA, October
-
L. Trevisan, "List decoding using the XOR lemma," in Proceedings of the IEEE Symposium on Foundations of Computer Science, pp. 126-135, Cambridge, MA, October 2003.
-
(2003)
Proceedings of the IEEE Symposium on Foundations of Computer Science
, pp. 126-135
-
-
Trevisan, L.1
-
391
-
-
33748588052
-
Some applications of coding theory in computational complexity
-
L. Trevisan, "Some applications of coding theory in computational complexity," Quaderni di Matematica, vol. 13, pp. 347-424, 2004.
-
(2004)
Quaderni di Matematica
, vol.13
, pp. 347-424
-
-
Trevisan, L.1
-
392
-
-
34047145017
-
On uniform amplification of hardness in NP
-
DOI 10.1145/1060590.1060595, STOC'05: Proceedings of the 37th Annual ACM Symposium on Theory of Computing
-
L. Trevisan, "On uniform amplification of hardness in NP," in STOC'05: Proceedings of the Annual ACM Symposium on Theory of Computing, pp. 31-38, New York, 2005. (Pubitemid 43098569)
-
(2005)
Proceedings of the Annual ACM Symposium on Theory of Computing
, pp. 31-38
-
-
Trevisan, L.1
-
393
-
-
84874147333
-
Pseudorandomness and combinatorial constructions
-
Zürich: European Mathematics Society
-
L. Trevisan, "Pseudorandomness and combinatorial constructions," in International Congress of Mathematicians. Vol. III, pp. 1111-1136, Zürich: European Mathematics Society, 2006.
-
(2006)
International Congress of Mathematicians. Vol. III
, pp. 1111-1136
-
-
Trevisan, L.1
-
394
-
-
79955713091
-
Guest column: Additive combinatorics and theoretical computer science
-
L. Trevisan, "Guest column: Additive combinatorics and theoretical computer science," SIGACT News, vol. 40, no. 2, pp. 50-66, 2009.
-
(2009)
SIGACT News
, vol.40
, Issue.2
, pp. 50-66
-
-
Trevisan, L.1
-
395
-
-
79953166402
-
Dense model theorems and their applications
-
of Lecture Notes in Computer Science, Heidelberg: Springer
-
L. Trevisan, "Dense model theorems and their applications," in Theory of cryptography, vol. 6597 of Lecture Notes in Computer Science, pp. 55-57, Heidelberg: Springer, 2011.
-
(2011)
Theory of Cryptography
, vol.6597
, pp. 55-57
-
-
Trevisan, L.1
-
396
-
-
70350646988
-
Regularity, boosting, and efficiently simulating every high-entropy distribution
-
15-18 July. (Preliminary version posted as ECCC TR08-103)
-
L. Trevisan, M. Tulsiani, and S. Vadhan, "Regularity, boosting, and efficiently simulating every high-entropy distribution," in Proceedings of the Annual IEEE Conference on Computational Complexity (CCC '09), pp. 126-136, 15-18 July 2009. (Preliminary version posted as ECCC TR08-103).
-
(2009)
Proceedings of the Annual IEEE Conference on Computational Complexity (CCC '09)
, pp. 126-136
-
-
Trevisan, L.1
Tulsiani, M.2
Vadhan, S.3
-
397
-
-
38749129723
-
Pseudorandomness and average-case complexity via uniform reductions
-
December
-
L. Trevisan and S. Vadhan, "Pseudorandomness and average-case complexity via uniform reductions," Computational Complexity, vol. 16, pp. 331-364, December 2007.
-
(2007)
Computational Complexity
, vol.16
, pp. 331-364
-
-
Trevisan, L.1
Vadhan, S.2
-
399
-
-
0142027847
-
Pseudo-random generators for all hardnesses
-
C. Umans, "Pseudo-random generators for all hardnesses," Journal of Computer and System Sciences, vol. 67, no. 2, pp. 419-440, 2003.
-
(2003)
Journal of Computer and System Sciences
, vol.67
, Issue.2
, pp. 419-440
-
-
Umans, C.1
-
400
-
-
37149024896
-
Probabilistic proof systems, Part i - Interactive & zeroknowledge proofs
-
of IAS/Park City Mathematics Series, (S. Rudich and A. Wigderson, eds.), American Mathematical Society
-
S. Vadhan, "Probabilistic proof systems, Part I - interactive & zeroknowledge proofs," in Computational Complexity Theory, vol. 10 of IAS/Park City Mathematics Series, (S. Rudich and A. Wigderson, eds.), pp. 315-348, American Mathematical Society, 2004.
-
(2004)
Computational Complexity Theory
, vol.10
, pp. 315-348
-
-
Vadhan, S.1
-
402
-
-
4344628859
-
Constructing locally computable extractors and cryptosystems in the bounded-storage model
-
January
-
S. P. Vadhan, "Constructing locally computable extractors and cryptosystems in the bounded-storage model," Journal of Cryptology, vol. 17, no. 1, pp. 43-77, January 2004.
-
(2004)
Journal of Cryptology
, vol.17
, Issue.1
, pp. 43-77
-
-
Vadhan, S.P.1
-
403
-
-
0017249811
-
Graph-theoretic properties in computational complexity
-
L. G. Valiant, "Graph-theoretic properties in computational complexity," Journal of Computer and System Sciences, vol. 13, no. 3, pp. 278-285, 1976.
-
(1976)
Journal of Computer and System Sciences
, vol.13
, Issue.3
, pp. 278-285
-
-
Valiant, L.G.1
-
404
-
-
49249151236
-
The complexity of computing the permanent
-
L. G. Valiant, "The complexity of computing the permanent," Theoretical Computer Science, vol. 8, no. 2, pp. 189-201, 1979.
-
(1979)
Theoretical Computer Science
, vol.8
, Issue.2
, pp. 189-201
-
-
Valiant, L.G.1
-
405
-
-
0021518106
-
A theory of the learnable
-
L. G. Valiant, "A theory of the learnable," Communications of the ACM, vol. 27, no. 11, pp. 1134-1142, 1984.
-
(1984)
Communications of the ACM
, vol.27
, Issue.11
, pp. 1134-1142
-
-
Valiant, L.G.1
-
406
-
-
0000479182
-
Estimate of the number of signals in error correcting codes
-
R. Varshamov, "Estimate of the number of signals in error correcting codes," Doklady Akademe Nauk SSSR, vol. 117, pp. 739-741, 1957.
-
(1957)
Doklady Akademe Nauk SSSR
, vol.117
, pp. 739-741
-
-
Varshamov, R.1
-
407
-
-
0021901103
-
Towards a strong communication complexity theory or generating quasi-random sequences from two communicating slightly-random sources (extended abstract)
-
Providence, Rhode Island, 6-8 May
-
U. V. Vazirani, "Towards a strong communication complexity theory or generating quasi-random sequences from two communicating slightly-random sources (extended abstract)," in Proceedings of the Annual ACM Symposium on Theory of Computing, pp. 366-378, Providence, Rhode Island, 6-8 May 1985.
-
(1985)
Proceedings of the Annual ACM Symposium on Theory of Computing
, pp. 366-378
-
-
Vazirani, U.V.1
-
408
-
-
0023573599
-
Efficiency considerations in using semi-random sources (extended abstract)
-
(A. V. Aho, ed.), ACM
-
U. V. Vazirani, "Efficiency considerations in using semi-random sources (extended abstract)," in STOC, (A. V. Aho, ed.), pp. 160-168, ACM, 1987.
-
(1987)
STOC
, pp. 160-168
-
-
Vazirani, U.V.1
-
409
-
-
51249175241
-
Strong communication complexity or generating quasirandom sequences from two communicating semirandom sources
-
U. V. Vazirani, "Strong communication complexity or generating quasirandom sequences from two communicating semirandom sources," Combinatorica, vol. 7, no. 4, pp. 375-392, 1987.
-
(1987)
Combinatorica
, vol.7
, Issue.4
, pp. 375-392
-
-
Vazirani, U.V.1
-
410
-
-
0022252339
-
Random polynomial time is equal to slightly-random polynomial time
-
Portland, Oregon, 21-23 October
-
U. V. Vazirani and V. V. Vazirani, "Random polynomial time is equal to slightly-random polynomial time," in Annual Symposium on Foundations of Computer Science, pp. 417-428, Portland, Oregon, 21-23 October 1985.
-
(1985)
Annual Symposium on Foundations of Computer Science
, pp. 417-428
-
-
Vazirani, U.V.1
Vazirani, V.V.2
-
411
-
-
15244355932
-
The complexity of constructing pseudorandom generators from hard functions
-
DOI 10.1007/s00037-004-0187-1
-
E. Viola, "The complexity of constructing pseudorandom generators from hard functions," Computational Complexity, vol. 13, no. 3-4, pp. 147-188, 2004. (Pubitemid 40389759)
-
(2005)
Computational Complexity
, vol.13
, Issue.3-4
, pp. 147-188
-
-
Viola, E.1
-
412
-
-
34748857354
-
Pseudorandom bits for constant-depth circuits with few arbitrary symmetric gates
-
DOI 10.1137/050640941
-
E. Viola, "Pseudorandom bits for constant-depth circuits with few arbitrary symmetric gates," SIAM Journal on Computing, vol. 36, no. 5, pp. 1387-1403, (electronic), 2006/2007. (Pubitemid 47632452)
-
(2006)
SIAM Journal on Computing
, vol.36
, Issue.5
, pp. 1387-1403
-
-
Viola, E.1
-
413
-
-
68149150037
-
The sum of d small-bias generators fools polynomials of degree d
-
E. Viola, "The sum of d small-bias generators fools polynomials of degree d," Computational Complexity, vol. 18, no. 2, pp. 209-217, 2009.
-
(2009)
Computational Complexity
, vol.18
, Issue.2
, pp. 209-217
-
-
Viola, E.1
-
414
-
-
84861625402
-
Extractors for circuit sources
-
(R. Ostrovsky, ed.), IEEE
-
E. Viola, "Extractors for circuit sources," in FOCS, (R. Ostrovsky, ed.), pp. 220-229, IEEE, 2011.
-
(2011)
FOCS
, pp. 220-229
-
-
Viola, E.1
-
415
-
-
84861643905
-
The complexity of distributions
-
E. Viola, "The complexity of distributions," SIAM Journal on Computing, vol. 41, no. 1, pp. 191-218, 2012.
-
(2012)
SIAM Journal on Computing
, vol.41
, Issue.1
, pp. 191-218
-
-
Viola, E.1
-
417
-
-
0019572642
-
New hash functions and their use in authentication and set equality
-
DOI 10.1016/0022-0000(81)90033-7
-
M. N. Wegman and J. L. Carter, "New hash functions and their use in authentication and set equality," Journal of Computer and System Sciences, vol. 22, no. 3, pp. 265-279, 1981. (Pubitemid 12444638)
-
(1981)
Journal of Computer and System Sciences
, vol.22
, Issue.3
, pp. 265-279
-
-
Wegman Mark, N.1
Carter J.Lawrence2
-
420
-
-
0002629128
-
List decoding
-
J. Wozencraft, "List decoding," Quarterly Progress Report, Research Laboratory of Electronics, MIT, vol. 48, pp. 90-95, 1958.
-
(1958)
Quarterly Progress Report, Research Laboratory of Electronics, MIT
, vol.48
, pp. 90-95
-
-
Wozencraft, J.1
-
421
-
-
0020301290
-
Theory and applications of trapdoor functions (extended abstract)
-
Chicago, Illinois, 3-5 November
-
A. C. Yao, "Theory and applications of trapdoor functions (extended abstract)," in Annual Symposium on Foundations of Computer Science, pp. 80-91, Chicago, Illinois, 3-5 November 1982.
-
(1982)
Annual Symposium on Foundations of Computer Science
, pp. 80-91
-
-
Yao, A.C.1
-
422
-
-
80051528494
-
Affine extractors over prime fields
-
A. Yehudayoff, "Affine extractors over prime fields," Combinatorica, vol. 31, no. 2, pp. 245-256, 2011.
-
(2011)
Combinatorica
, vol.31
, Issue.2
, pp. 245-256
-
-
Yehudayoff, A.1
-
423
-
-
40549114927
-
Towards 3-query locally decodable codes of subexponential length
-
Art 1
-
S. Yekhanin, "Towards 3-query locally decodable codes of subexponential length," Journal of the ACM, vol. 55, no. 1, pp. Art 1, 16, 2008.
-
(2008)
Journal of the ACM
, vol.55
, Issue.1
, pp. 16
-
-
Yekhanin, S.1
-
425
-
-
84925463455
-
Probabilistic algorithms for sparse polynomials
-
of Lecture Notes in Computer Science, (E. W. Ng, ed.), Springer
-
R. Zippel, "Probabilistic algorithms for sparse polynomials," in EUROSAM, vol. 72 of Lecture Notes in Computer Science, (E. W. Ng, ed.), pp. 216-226, Springer, 1979.
-
(1979)
EUROSAM
, vol.72
, pp. 216-226
-
-
Zippel, R.1
-
426
-
-
0001023343
-
Simulating BPP Using a General Weak Random Source
-
D. Zuckerman, "Simulating BPP using a general weak random source," Algorithmica, vol. 16, pp. 367-391, October/November 1996. (Pubitemid 126416932)
-
(1996)
Algorithmica (New York)
, vol.16
, Issue.4-5
, pp. 367-391
-
-
Zuckerman, D.1
-
427
-
-
0031507665
-
Randomness-optimal oblivious sampling
-
D. Zuckerman, "Randomness-optimal oblivious sampling," Random Structures & Algorithms, vol. 11, no. 4, pp. 345-367, 1997. (Pubitemid 127345393)
-
(1997)
Random Structures and Algorithms
, vol.11
, Issue.4
, pp. 345-367
-
-
Zuckerman, D.1
-
428
-
-
0019630777
-
List cascade decoding (in Russian)
-
V. V. Zyablov and M. S. Pinsker, "List cascade decoding (in Russian)," Problems of Information Transmission, vol. 17, no. 4, pp. 29-33, 1981.
-
(1981)
Problems of Information Transmission
, vol.17
, Issue.4
, pp. 29-33
-
-
Zyablov, V.V.1
Pinsker, M.S.2
|