Sciweavers

STOC
2004
ACM
134views Algorithms» more  STOC 2004»
14 years 11 months ago
The two possible values of the chromatic number of a random graph
Given d (0, ) let kd be the smallest integer k such that d < 2k log k. We prove that the chromatic number of a random graph G(n, d/n) is either kd or kd + 1 almost surely.
Dimitris Achlioptas, Assaf Naor
STOC
2004
ACM
142views Algorithms» more  STOC 2004»
14 years 11 months ago
Lower bounds for local search by quantum arguments
The problem of finding a local minimum of a black-box function is central for understanding local search as well as quantum adiabatic algorithms. For functions on the Boolean hype...
Scott Aaronson
STOC
2005
ACM
111views Algorithms» more  STOC 2005»
14 years 12 months ago
Tensor decomposition and approximation schemes for constraint satisfaction problems
Wenceslas Fernandez de la Vega, Marek Karpinski, R...
STOC
2005
ACM
133views Algorithms» more  STOC 2005»
14 years 12 months ago
An O(log n log log n) space algorithm for undirected st-connectivity
Abstract. We present a deterministic O(log n log log n) space algorithm for undirected stconnectivity. It is based on a space-efficient simulation of the deterministic EREW algorit...
Vladimir Trifonov
STOC
2005
ACM
145views Algorithms» more  STOC 2005»
14 years 12 months ago
On uniform amplification of hardness in NP
We continue the study of amplification of average-case complexity within NP, and we focus on the uniform case. We prove that if every problem in NP admits an efficient uniform alg...
Luca Trevisan
STOC
2005
ACM
158views Algorithms» more  STOC 2005»
14 years 12 months ago
Polynomial time quantum algorithm for the computation of the unit group of a number field
We present a quantum algorithm for the computation of the irrational period lattice of a function on Zn which is periodic in a relaxed sense. This algorithm is applied to compute t...
Arthur Schmidt, Ulrich Vollmer
STOC
2005
ACM
107views Algorithms» more  STOC 2005»
14 years 12 months ago
On obfuscating point functions
We study the problem of obfuscation in the context of point functions (also known as delta functions). A point function is a Boolean function that assumes the value 1 at exactly o...
Hoeteck Wee
STOC
2005
ACM
139views Algorithms» more  STOC 2005»
14 years 12 months ago
Spectral norm of random matrices
We study the spectral norm of matrices M that can be factored as M = BA, where A is a random matrix with independent mean zero entries and B is a fixed matrix. Under the (4 + )-th ...
Van H. Vu
STOC
2005
ACM
163views Algorithms» more  STOC 2005»
14 years 12 months ago
Undirected ST-connectivity in log-space
We present a deterministic, log-space algorithm that solves st-connectivity in undirected graphs. The previous bound on the space complexity of undirected st-connectivity was log4...
Omer Reingold