Short pages
From Thermodynamics of Computation
Showing below up to 50 results in range #51 to #100.
View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)
- (hist) Resolution lower bounds for the weak functional pigeonhole principle [115 bytes]
- (hist) BPP and the polynomial hierarchy [115 bytes]
- (hist) Disjointness is hard in the multiparty number-on-the-forehead model [115 bytes]
- (hist) On the complexity of matrix product [115 bytes]
- (hist) A theory of the learnable [115 bytes]
- (hist) Correcting errors beyond the Guruswami-Sudan radius in polynomial time [115 bytes]
- (hist) Pseudorandom generators for space-bounded computation [115 bytes]
- (hist) Natural Proofs [115 bytes]
- (hist) Sampling adsorbing staircase walks using a new Markov chain decomposition method [115 bytes]
- (hist) Unbalanced expanders and randomness extractors from parvaresh-vardy codes [115 bytes]
- (hist) Large Deviation Bounds for Markov Chains [115 bytes]
- (hist) Universal sequential search problems [115 bytes]
- (hist) Digitalized Signatures and Public-Key Functions as Intractable as Factorization [115 bytes]
- (hist) Derandomizing polynomial identity tests means proving circuit lower bounds [115 bytes]
- (hist) Factoring numbers in O(logn) arithmetic steps [115 bytes]
- (hist) Application of Boolean Algebra to Switching Circuit Design and to Error Detection [115 bytes]
- (hist) Matching is as easy as matrix inversion [115 bytes]
- (hist) Randomness-efficient sampling within NC1 [115 bytes]
- (hist) Pseudo-random generators for all hardnesses [115 bytes]
- (hist) On the Structure of Polynomial Time Reducibility [115 bytes]
- (hist) An O(log n log log n) Space Algorithm for Undirected st-connectivity [115 bytes]
- (hist) Games against nature [115 bytes]
- (hist) Pseudorandom generators hard for k-DNF resolution and polynomial calculus resolution [115 bytes]
- (hist) Extractors and pseudorandom generators [115 bytes]
- (hist) Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack [115 bytes]
- (hist) Are Recursion Theoretic Arguments Useful in Complexity Theory? [115 bytes]
- (hist) Founding Cryptography on Oblivious Transfer [115 bytes]
- (hist) Tight estimates for eigenvalues of regular graphs [115 bytes]
- (hist) The influence of variables on Boolean functions [115 bytes]
- (hist) Hierarchies of memory limited computations [115 bytes]
- (hist) Towards the parallel repetition conjecture [115 bytes]
- (hist) Monotone Circuits for Connectivity Require Super-Logarithmic Depth [115 bytes]
- (hist) Algebraic methods in the theory of lower bounds for Boolean circuit complexity [115 bytes]
- (hist) Some optimal inapproximability results [115 bytes]
- (hist) Cryptographic Limitations on Learning Boolean Formulae and Finite Automata [115 bytes]
- (hist) On the generation of cryptographically strong pseudo-random sequences [115 bytes]
- (hist) A complexity theoretic approach to randomness [115 bytes]
- (hist) Ramanujan graphs [115 bytes]
- (hist) Undirected ST-connectivity in log-space [115 bytes]
- (hist) Dropbox Quick Start [115 bytes]
- (hist) Reliable Quantum Computers (1997) [115 bytes]
- (hist) The unified theory of pseudorandomness: guest column [115 bytes]
- (hist) Randomized algorithms [115 bytes]
- (hist) Private coins versus public coins in interactive proof systems [115 bytes]
- (hist) Inapproximability of Combinatorial Optimization Problems [115 bytes]
- (hist) Lower bounds on the size of bounded depth circuits over a complete basis with logical addition [115 bytes]
- (hist) Lower bounds on probabilistic linear decision trees [115 bytes]
- (hist) Fault Tolerant Quantum Computation [115 bytes]
- (hist) A Kilobit Special Number Field Sieve Factorization [115 bytes]
- (hist) Lattice Based Cryptography [115 bytes]