Sciweavers

COCO
1990
Springer
71views Algorithms» more  COCO 1990»
14 years 2 months ago
Circuits, Pebbling and Expressibility
V. Vinay, H. Venkateswaran, C. E. Veni Madhavan
COCO
1990
Springer
106views Algorithms» more  COCO 1990»
14 years 2 months ago
The Boolean Hierarchy and the Polynomial Hierarchy: a Closer Connection
We show that if the Boolean hierarchy collapses to level k, then the polynomial hierarchy collapses to BH3(k), where BH3(k) is the kth level of the Boolean hierarchy over P 2 . Th...
Richard Chang, Jim Kadin
COCO
1990
Springer
84views Algorithms» more  COCO 1990»
14 years 2 months ago
Some Connections Between Bounded Query Classes and Non-Uniform Complexity
Amihood Amir, Richard Beigel, William I. Gasarch
COCO
1990
Springer
50views Algorithms» more  COCO 1990»
14 years 2 months ago
Width-Bounded Reducibility and Binary Search over Complexity Classes
d Abstract) Eric Allender Christopher Wilson Department of Computer Science Department of Computer Rutgers University and Information Science New Brunswick, NJ 08903, USA Universit...
Eric Allender, Christopher B. Wilson
COCO
1989
Springer
64views Algorithms» more  COCO 1989»
14 years 2 months ago
Turing Machines with few Accepting Computations and low Sets for PP
Johannes Köbler, Uwe Schöning, Seinosuke...
COCO
1989
Springer
110views Algorithms» more  COCO 1989»
14 years 2 months ago
The Complexity of Iterated Multiplication
For a monoid G, the iterated multiplication problem is the computation of the product of n elements from G. By re ning known completeness arguments, we show that as G varies over ...
Neil Immerman, Susan Landau
COCO
1989
Springer
97views Algorithms» more  COCO 1989»
14 years 2 months ago
On the Structure of Bounded Queries to Arbitrary NP Sets
Kadin [6] showed that if the Polynomial Hierarchy (PH) has infinitely many levels, then for all k, PSAT[k] ⊂ PSAT[k+1]. This paper extends Kadin’s technique and shows that a p...
Richard Chang
AAECC
1990
Springer
100views Algorithms» more  AAECC 1990»
14 years 2 months ago
Duality between Two Cryptographic Primitives
This paper reveals a duality between constructions of two basic cryptographic primitives, pseudo-random string generators and one-way hash functions. Applying the duality, we pres...
Yuliang Zheng, Tsutomu Matsumoto, Hideki Imai