Santa Fe Institute Collaboration Platform

Thermodynamics of Computation

Short pages

From Thermodynamics of Computation

Showing below up to 50 results in range #51 to #100.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)

  1. (hist) ‎Resolution lower bounds for the weak functional pigeonhole principle ‎[115 bytes]
  2. (hist) ‎BPP and the polynomial hierarchy ‎[115 bytes]
  3. (hist) ‎Disjointness is hard in the multiparty number-on-the-forehead model ‎[115 bytes]
  4. (hist) ‎On the complexity of matrix product ‎[115 bytes]
  5. (hist) ‎A theory of the learnable ‎[115 bytes]
  6. (hist) ‎Correcting errors beyond the Guruswami-Sudan radius in polynomial time ‎[115 bytes]
  7. (hist) ‎Pseudorandom generators for space-bounded computation ‎[115 bytes]
  8. (hist) ‎Natural Proofs ‎[115 bytes]
  9. (hist) ‎Sampling adsorbing staircase walks using a new Markov chain decomposition method ‎[115 bytes]
  10. (hist) ‎Unbalanced expanders and randomness extractors from parvaresh-vardy codes ‎[115 bytes]
  11. (hist) ‎Large Deviation Bounds for Markov Chains ‎[115 bytes]
  12. (hist) ‎Universal sequential search problems ‎[115 bytes]
  13. (hist) ‎Digitalized Signatures and Public-Key Functions as Intractable as Factorization ‎[115 bytes]
  14. (hist) ‎Derandomizing polynomial identity tests means proving circuit lower bounds ‎[115 bytes]
  15. (hist) ‎Factoring numbers in O(logn) arithmetic steps ‎[115 bytes]
  16. (hist) ‎Application of Boolean Algebra to Switching Circuit Design and to Error Detection ‎[115 bytes]
  17. (hist) ‎Matching is as easy as matrix inversion ‎[115 bytes]
  18. (hist) ‎Randomness-efficient sampling within NC1 ‎[115 bytes]
  19. (hist) ‎Pseudo-random generators for all hardnesses ‎[115 bytes]
  20. (hist) ‎On the Structure of Polynomial Time Reducibility ‎[115 bytes]
  21. (hist) ‎An O(log n log log n) Space Algorithm for Undirected st-connectivity ‎[115 bytes]
  22. (hist) ‎Games against nature ‎[115 bytes]
  23. (hist) ‎Pseudorandom generators hard for k-DNF resolution and polynomial calculus resolution ‎[115 bytes]
  24. (hist) ‎Extractors and pseudorandom generators ‎[115 bytes]
  25. (hist) ‎Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack ‎[115 bytes]
  26. (hist) ‎Are Recursion Theoretic Arguments Useful in Complexity Theory? ‎[115 bytes]
  27. (hist) ‎Founding Cryptography on Oblivious Transfer ‎[115 bytes]
  28. (hist) ‎Tight estimates for eigenvalues of regular graphs ‎[115 bytes]
  29. (hist) ‎The influence of variables on Boolean functions ‎[115 bytes]
  30. (hist) ‎Hierarchies of memory limited computations ‎[115 bytes]
  31. (hist) ‎Towards the parallel repetition conjecture ‎[115 bytes]
  32. (hist) ‎Monotone Circuits for Connectivity Require Super-Logarithmic Depth ‎[115 bytes]
  33. (hist) ‎Algebraic methods in the theory of lower bounds for Boolean circuit complexity ‎[115 bytes]
  34. (hist) ‎Some optimal inapproximability results ‎[115 bytes]
  35. (hist) ‎Cryptographic Limitations on Learning Boolean Formulae and Finite Automata ‎[115 bytes]
  36. (hist) ‎On the generation of cryptographically strong pseudo-random sequences ‎[115 bytes]
  37. (hist) ‎A complexity theoretic approach to randomness ‎[115 bytes]
  38. (hist) ‎Ramanujan graphs ‎[115 bytes]
  39. (hist) ‎Undirected ST-connectivity in log-space ‎[115 bytes]
  40. (hist) ‎Dropbox Quick Start ‎[115 bytes]
  41. (hist) ‎Reliable Quantum Computers (1997) ‎[115 bytes]
  42. (hist) ‎The unified theory of pseudorandomness: guest column ‎[115 bytes]
  43. (hist) ‎Randomized algorithms ‎[115 bytes]
  44. (hist) ‎Private coins versus public coins in interactive proof systems ‎[115 bytes]
  45. (hist) ‎Inapproximability of Combinatorial Optimization Problems ‎[115 bytes]
  46. (hist) ‎Lower bounds on the size of bounded depth circuits over a complete basis with logical addition ‎[115 bytes]
  47. (hist) ‎Lower bounds on probabilistic linear decision trees ‎[115 bytes]
  48. (hist) ‎Fault Tolerant Quantum Computation ‎[115 bytes]
  49. (hist) ‎A Kilobit Special Number Field Sieve Factorization ‎[115 bytes]
  50. (hist) ‎Lattice Based Cryptography ‎[115 bytes]

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)