-
1
-
-
85034232065
-
Moderately exponential bound for graph isomorphism
-
Lecture Notes in Computer Science
-
L. Babai, Moderately exponential bound for graph isomorphism. In Proceedings Fundamentals of Computation Theory, Lecture Notes in Computer Science 117 (1981), 34-50.
-
(1981)
Proceedings Fundamentals of Computation Theory
, vol.117
, pp. 34-50
-
-
Babai, L.1
-
2
-
-
0023995534
-
Arthur-Merlin games: A randomized proof system, and a hierarchy of complexity classes
-
L. Babai, S. Moran, Arthur-Merlin games: A randomized proof system, and a hierarchy of complexity classes. In Journal of Computer and System Sciences 36 (1988), 254-276.
-
(1988)
In Journal of Computer and System Sciences
, vol.36
, pp. 254-276
-
-
Babai, L.1
Moran, S.2
-
4
-
-
85029546881
-
Counting classes: Thresholds, parity, mods, and fewness.
-
Lecture Notes in Computer Science
-
R. Beigel, J. Gill, U. Hertrampf, Counting classes: Thresholds, parity, mods, and fewness. In Proceedings 7th Symposium on Theoretical Aspects of Computer Science, Lecture Notes in Computer Science 415 (1990), 49-57.
-
(1990)
Proceedings 7Th Symposium on Theoretical Aspects of Computer Science
, vol.415
, pp. 49-57
-
-
Beigel, R.1
Gill, J.2
Hertrampf, U.3
-
9
-
-
0021420540
-
The complexity of promise problems with applications to public-key cryptography
-
S. Even, A. Selman Y. Yacobi, The complexity of promise problems with applications to public-key cryptography. In Information and Control 61 (1984), 114-133.
-
(1984)
In Information and Control
, vol.61
, pp. 114-133
-
-
Even, S.1
Yacobi, A.S.Y.2
-
13
-
-
0000595574
-
Computational complexity of probabilistic Turing machines
-
J. Gill, Computational complexity of probabilistic Turing machines. In SIAM Journal on Computing 6 (1977), 675-695.
-
(1977)
In SIAM Journal on Computing
, vol.6
, pp. 675-695
-
-
Gill, J.1
-
21
-
-
46549091823
-
The NP-completeness column: An ongoing guide
-
D.S. Johnson, The NP-completeness column: An ongoing guide. In Journal of Algorithms 6 (1985), 434-451.
-
(1985)
In Journal of Algorithms
, vol.6
, pp. 434-451
-
-
Johnson, D.S.1
-
24
-
-
0020166327
-
Isomorphism of Graphs of Bounded Valence can be tested in Polynomial Time
-
E. Luks, Isomorphism of Graphs of Bounded Valence can be tested in Polynomial Time. In Journal of Computer and System Sciences 25 (1982), 42-65.
-
(1982)
In Journal of Computer and System Sciences
, vol.25
, pp. 42-65
-
-
Luks, E.1
-
25
-
-
0001460788
-
A note on the graph isomorphism counting problem
-
R. Mathon, A note on the graph isomorphism counting problem. In Inform. Process. Lett. 8 (1979), 131-132.
-
(1979)
Inform. Process. Lett
, vol.8
, pp. 131-132
-
-
Mathon, R.1
-
28
-
-
84934674974
-
-
Springer-Verlag Lecture Notes in Computer Science
-
U. Schöning, Complexity and Structure. Springer-Verlag Lecture Notes in Computer Science 211, 1986.
-
(1986)
Complexity and Structure
, pp. 211
-
-
Schöning, U.1
-
34
-
-
85029608819
-
-
Private communication
-
S. Toda, Private communication.
-
-
-
Toda, S.1
-
36
-
-
0003003956
-
The relative complexity of checking and evaluating
-
L.G. Valiant, The relative complexity of checking and evaluating. In Information Processing Letters 5 (1976), 20-23.
-
(1976)
In Information Processing Letters
, vol.5
, pp. 20-23
-
-
Valiant, L.G.1
-
37
-
-
49249151236
-
The complexity of computing the permanent
-
L.G. Valiant, The complexity of computing the permanent. In Theoretical Computer Science 8 (1979), 189-201.
-
(1979)
In Theoretical Computer Science
, vol.8
, pp. 189-201
-
-
Valiant, L.G.1
-
39
-
-
0022733806
-
The complexity of combinatorial problems with succinct input representation
-
K.W. Wagner, The complexity of combinatorial problems with succinct input representation. In Acta Informatica 23 (1986), 325-356.
-
(1986)
In Acta Informatica
, vol.23
, pp. 325-356
-
-
Wagner, K.W.1
|