首页 > 最新文献

Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science最新文献

英文 中文
On graph-theoretic lemmata and complexity classes 论图论引理与复杂性类
Pub Date : 1990-10-22 DOI: 10.1109/FSCS.1990.89602
C. Papadimitriou
Several new complexity classes of search problems that lie between the classes FP and FNP are defined. These classes are contained in the class TFNP of search problems that always have a solution. A problem in each of these new classes is defined in terms of an implicitly given, exponentially large graph, very much like PLS (polynomial local search). The existence of the solution sought is established by means of a simple graph-theoretic lemma with an inefficiently constructive proof. Several class containments and collapses, resulting in the two new classes PDLF contained in PLF are shown; the relation of either class of PLS is open. PLF contains several important problems for which no polynomial-time algorithm is presently known.<>
定义了介于FP类和FNP类之间的搜索问题的几个新的复杂度类。这些类包含在总有解决方案的搜索问题的类TFNP中。这些新类中的每个问题都是根据隐式给定的指数大图来定义的,非常类似于PLS(多项式局部搜索)。利用一个简单的图论引理和一个无效的构造性证明,建立了所寻求解的存在性。显示了几个类的包含和折叠,导致PLF中包含两个新类PDLF;两类PLS之间的关系是开放的。PLF包含几个重要的问题,目前还没有多项式时间算法。
{"title":"On graph-theoretic lemmata and complexity classes","authors":"C. Papadimitriou","doi":"10.1109/FSCS.1990.89602","DOIUrl":"https://doi.org/10.1109/FSCS.1990.89602","url":null,"abstract":"Several new complexity classes of search problems that lie between the classes FP and FNP are defined. These classes are contained in the class TFNP of search problems that always have a solution. A problem in each of these new classes is defined in terms of an implicitly given, exponentially large graph, very much like PLS (polynomial local search). The existence of the solution sought is established by means of a simple graph-theoretic lemma with an inefficiently constructive proof. Several class containments and collapses, resulting in the two new classes PDLF contained in PLF are shown; the relation of either class of PLS is open. PLF contains several important problems for which no polynomial-time algorithm is presently known.<<ETX>>","PeriodicalId":271949,"journal":{"name":"Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science","volume":"23 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1990-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120810776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Perfectly secure message transmission 绝对安全的信息传输
Pub Date : 1990-10-22 DOI: 10.1145/138027.138036
D. Dolev, C. Dwork, Orli Waarts, M. Yung
The problem of perfectly secure communication in a general network in which processors and communication lines may be faulty is studied. Lower bounds are obtained on the connectivity required for successful secure communication. Efficient algorithms that operate with this connectivity and rely on no complexity theoretic assumptions are derived. These are the first algorithms for secure communication in a general network to achieve simultaneously the goals of perfect secrecy, perfect resiliency, and a worst case time which is linear in the diameter of the network.<>
研究了一般网络中处理器和通信线路可能出现故障时的完全安全通信问题。获得安全通信成功所需的连通性的下限。推导出了具有这种连通性且不依赖于复杂性理论假设的高效算法。这是第一个在一般网络中实现安全通信的算法,可以同时实现完美的保密性,完美的弹性和最坏情况下的时间,该时间在网络直径中是线性的
{"title":"Perfectly secure message transmission","authors":"D. Dolev, C. Dwork, Orli Waarts, M. Yung","doi":"10.1145/138027.138036","DOIUrl":"https://doi.org/10.1145/138027.138036","url":null,"abstract":"The problem of perfectly secure communication in a general network in which processors and communication lines may be faulty is studied. Lower bounds are obtained on the connectivity required for successful secure communication. Efficient algorithms that operate with this connectivity and rely on no complexity theoretic assumptions are derived. These are the first algorithms for secure communication in a general network to achieve simultaneously the goals of perfect secrecy, perfect resiliency, and a worst case time which is linear in the diameter of the network.<<ETX>>","PeriodicalId":271949,"journal":{"name":"Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science","volume":"546 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1990-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131865288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 441
Efficiently inverting bijections given by straight line programs 有效地反演由直线程序给出的双射
Pub Date : 1990-10-22 DOI: 10.1109/FSCS.1990.89551
Carl Sturtivant, Zhi-Li Zhang
Let K be any field, and let F: K/sup n/ to K/sup n/ be a bijection with the property that both F and F/sup -1/ are computable using only arithmetic operations from K. Motivated by cryptographic considerations, the authors concern themselves with the relationship between the arithmetic complexity of F and the arithmetic complexity of F/sup -1/. They give strong relations between the complexity of F and F/sup -1/ when F is an automorphism in the sense of algebraic geometry (i.e. a formal bijection defined by n polynomials in n variables with a formal inverse of the same form). These constitute all such bijections in the case in which K is infinite. The authors show that at polynomially bounded degree, if an automorphism F has a polynomial-size arithmetic circuit, then F/sup -1/ has a polynomial-size arithmetic circuit. Furthermore, this result is uniform in the sense that there is an efficient algorithm for finding such a circuit for F/sup -1/, given such a circuit for F. This algorithm can also be used to check whether a circuit defines an automorphism F. If K is the Boolean field GF(2), then a circuit defining a bijection does not necessarily define an automorphism. However, it is shown in this case that, given any K/sup n/ to K/sup n/ bijection, there always exists an automorphism defining that bijection. This is not generally true for an arbitrary finite field.<>
设K为任意域,设F: K/sup n/至K/sup n/为双射,其性质是F和F/sup -1/均可仅使用K的算术运算来计算。基于密码学的考虑,作者研究了F的算术复杂度与F/sup -1/的算术复杂度之间的关系。当F是代数几何意义上的自同构(即由n个变量的n个多项式定义的形式双射,具有相同形式的形式逆)时,它们给出了F的复杂度与F/sup -1/之间的强关系。这些构成了K是无限的情况下所有的双射。证明了在多项式有界度下,如果自同构F具有多项式大小的算术电路,则F/sup -1/具有多项式大小的算术电路。此外,这个结果是一致的,因为存在一个有效的算法来找到F/sup -1/的这样一个电路,给定F的这样一个电路,这个算法也可以用来检查电路是否定义自同构F。如果K是布尔域GF(2),那么定义双射的电路不一定定义自同构。然而,在这种情况下,它表明,给定任何K/sup n/到K/sup n/双射,总是存在定义该双射的自同构。对于任意有限域,这通常是不成立的。
{"title":"Efficiently inverting bijections given by straight line programs","authors":"Carl Sturtivant, Zhi-Li Zhang","doi":"10.1109/FSCS.1990.89551","DOIUrl":"https://doi.org/10.1109/FSCS.1990.89551","url":null,"abstract":"Let K be any field, and let F: K/sup n/ to K/sup n/ be a bijection with the property that both F and F/sup -1/ are computable using only arithmetic operations from K. Motivated by cryptographic considerations, the authors concern themselves with the relationship between the arithmetic complexity of F and the arithmetic complexity of F/sup -1/. They give strong relations between the complexity of F and F/sup -1/ when F is an automorphism in the sense of algebraic geometry (i.e. a formal bijection defined by n polynomials in n variables with a formal inverse of the same form). These constitute all such bijections in the case in which K is infinite. The authors show that at polynomially bounded degree, if an automorphism F has a polynomial-size arithmetic circuit, then F/sup -1/ has a polynomial-size arithmetic circuit. Furthermore, this result is uniform in the sense that there is an efficient algorithm for finding such a circuit for F/sup -1/, given such a circuit for F. This algorithm can also be used to check whether a circuit defines an automorphism F. If K is the Boolean field GF(2), then a circuit defining a bijection does not necessarily define an automorphism. However, it is shown in this case that, given any K/sup n/ to K/sup n/ bijection, there always exists an automorphism defining that bijection. This is not generally true for an arbitrary finite field.<<ETX>>","PeriodicalId":271949,"journal":{"name":"Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1990-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127899710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Matrix decomposition problem is complete for the average case 对于一般情况,矩阵分解问题是完整的
Pub Date : 1990-10-22 DOI: 10.1109/FSCS.1990.89603
Y. Gurevich
The first algebraic average-case complete problem is presented. The focus of attention is the modular group, i.e., the multiplicative group SL/sub 2/(Z) of two-by-two integer matrices of determinant 1. By default, in this study matrices are elements of the modular group. The problem is arguably the simplest natural average-case complete problem to date.<>
给出了第一个代数平均情形完备问题。注意的焦点是模群,即行列式为1的二乘二整数矩阵的乘法群SL/sub 2/(Z)。在本研究中,默认情况下,矩阵是模群的元素。这个问题可以说是迄今为止最简单的自然平均情况完全问题
{"title":"Matrix decomposition problem is complete for the average case","authors":"Y. Gurevich","doi":"10.1109/FSCS.1990.89603","DOIUrl":"https://doi.org/10.1109/FSCS.1990.89603","url":null,"abstract":"The first algebraic average-case complete problem is presented. The focus of attention is the modular group, i.e., the multiplicative group SL/sub 2/(Z) of two-by-two integer matrices of determinant 1. By default, in this study matrices are elements of the modular group. The problem is arguably the simplest natural average-case complete problem to date.<<ETX>>","PeriodicalId":271949,"journal":{"name":"Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1990-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128837193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
On the exact complexity of string matching 字符串匹配的精确复杂度
Pub Date : 1990-10-22 DOI: 10.1109/FSCS.1990.89532
L. Colussi, Z. Galil, R. Giancarlo
The maximal number of character comparisons made by a linear-time string matching algorithm, given a text string of length n and a pattern string of length m over a general alphabet, is investigated. The number is denoted by c(n,m) or approximated by (1+C)n, where C is a universal constant. The subscript 'online' is added when attention is restricted to online algorithms, and the superscript '1' is added when algorithms that find only one occurrence of the pattern in the text are considered. It is well known that n>
在给定长度为n的文本字符串和长度为m的模式字符串的情况下,研究了线性时间字符串匹配算法进行字符比较的最大次数。这个数字用c(n,m)表示,或者近似用(1+ c)n表示,其中c是一个普适常数。当注意仅限于在线算法时,添加下标“online”,当考虑在文本中只发现一次模式出现的算法时,添加上标“1”。众所周知,n>
{"title":"On the exact complexity of string matching","authors":"L. Colussi, Z. Galil, R. Giancarlo","doi":"10.1109/FSCS.1990.89532","DOIUrl":"https://doi.org/10.1109/FSCS.1990.89532","url":null,"abstract":"The maximal number of character comparisons made by a linear-time string matching algorithm, given a text string of length n and a pattern string of length m over a general alphabet, is investigated. The number is denoted by c(n,m) or approximated by (1+C)n, where C is a universal constant. The subscript 'online' is added when attention is restricted to online algorithms, and the superscript '1' is added when algorithms that find only one occurrence of the pattern in the text are considered. It is well known that n<or=c(n,m)<or=2n-m+1 or 0<or=C<or=1. These bounds are improved, and C/sub online/ is determined exactly.<<ETX>>","PeriodicalId":271949,"journal":{"name":"Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1990-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116181962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
Provably good mesh generation 很好的网格生成
Pub Date : 1990-10-22 DOI: 10.1109/FSCS.1990.89542
M. Bern, D. Eppstein, J. Gilbert
Several versions of the problem of generating triangular meshes for finite-element methods are studied. It is shown how to triangulate a planar point set or a polygonally bounded domain with triangles of bounded aspect ratio, how to triangulate a planar point set with triangles having no obtuse angles, how to triangulate a point set in arbitrary dimension with simplices of bounded aspect ratio, and how to produce a linear-size Delaunay triangulation of a multidimensional point set by adding a linear number of extra points. All the triangulations have size within a constant factor of optimal and run in optimal time O(n log n+k) with input of size n and output of size k. No previous work on mesh generation simultaneously guarantees well-shaped elements and small total size.<>
研究了有限元法中三角网格生成问题的几种版本。给出了如何用有界纵横比三角形对平面点集或多边形有界域进行三角剖分,如何用无钝角三角形对平面点集进行三角剖分,如何用有界纵横比简单体对任意维的点集进行三角剖分,以及如何通过添加线性数量的额外点来对多维点集进行线性大小的Delaunay三角剖分。所有三角剖分的大小都在最优的常数因子范围内,并且在最优时间O(n log n+k)内运行,输入大小为n,输出大小为k。以前的网格生成工作没有同时保证形状良好的元素和较小的总尺寸。>
{"title":"Provably good mesh generation","authors":"M. Bern, D. Eppstein, J. Gilbert","doi":"10.1109/FSCS.1990.89542","DOIUrl":"https://doi.org/10.1109/FSCS.1990.89542","url":null,"abstract":"Several versions of the problem of generating triangular meshes for finite-element methods are studied. It is shown how to triangulate a planar point set or a polygonally bounded domain with triangles of bounded aspect ratio, how to triangulate a planar point set with triangles having no obtuse angles, how to triangulate a point set in arbitrary dimension with simplices of bounded aspect ratio, and how to produce a linear-size Delaunay triangulation of a multidimensional point set by adding a linear number of extra points. All the triangulations have size within a constant factor of optimal and run in optimal time O(n log n+k) with input of size n and output of size k. No previous work on mesh generation simultaneously guarantees well-shaped elements and small total size.<<ETX>>","PeriodicalId":271949,"journal":{"name":"Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1990-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126794951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 411
Efficient parallel algorithms for tree-decomposition and related problems 树分解及相关问题的高效并行算法
Pub Date : 1990-10-22 DOI: 10.1109/FSCS.1990.89536
J. Lagergren
An efficient parallel algorithm for the tree-decomposition problem for fixed width w is presented. The algorithm runs in time O(log/sup 3/ n) and uses O(n) processors on a concurrent-read, concurrent-write parallel random access machine (CRCW PRAM). This result can be used to construct efficient parallel algorithms for three important classes of problems: MS (monadic second-order) properties, linear EMS (extended monadic second-order) extremum problems, and enumeration problems for MS properties, for graphs of tree width at most w. The sequential time complexity of the tree-composition problem for fixed w is improved, and some implications for this improvement are stated.<>
针对固定宽度w的树分解问题,提出了一种有效的并行算法。该算法运行时间为0 (log/sup 3/ n),在并发读、并发写并行随机存取机(CRCW PRAM)上使用O(n)个处理器。这一结果可用于构建三种重要问题的高效并行算法:单一元二阶性质问题、线性扩展单一元二阶极值问题和树宽度最多为w的图的单一元二阶性质的枚举问题。改进了固定w的树组合问题的顺序时间复杂度,并说明了这种改进的一些意义
{"title":"Efficient parallel algorithms for tree-decomposition and related problems","authors":"J. Lagergren","doi":"10.1109/FSCS.1990.89536","DOIUrl":"https://doi.org/10.1109/FSCS.1990.89536","url":null,"abstract":"An efficient parallel algorithm for the tree-decomposition problem for fixed width w is presented. The algorithm runs in time O(log/sup 3/ n) and uses O(n) processors on a concurrent-read, concurrent-write parallel random access machine (CRCW PRAM). This result can be used to construct efficient parallel algorithms for three important classes of problems: MS (monadic second-order) properties, linear EMS (extended monadic second-order) extremum problems, and enumeration problems for MS properties, for graphs of tree width at most w. The sequential time complexity of the tree-composition problem for fixed w is improved, and some implications for this improvement are stated.<<ETX>>","PeriodicalId":271949,"journal":{"name":"Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1990-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132026246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
Faster circuits and shorter formulae for multiple addition, multiplication and symmetric Boolean functions 更快的电路和更短的公式为多个加法,乘法和对称布尔函数
Pub Date : 1990-10-22 DOI: 10.1109/FSCS.1990.89586
M. Paterson, N. Pippenger, Uri Zwick
A general theory is developed for constructing the shallowest possible circuits and the shortest possible formulas for the carry-save addition of n numbers using any given basic addition unit. More precisely, it is shown that if BA is a basic addition unit with occurrence matrix N, then the shortest multiple carry-save addition formulas that could be obtained by composing BA units are of size n/sup 1/p+o(1)/, where p is the unique real number for which the L/sub p/ norm of the matrix N equals 1. An analogous result connects the delay matrix M of the basic addition unit BA and the minimal q such that multiple carry-save addition circuits of depth (q+o(1)) log n could be constructed by combining BA units. On the basis of these optimal constructions of multiple carry-save adders, the shallowest known multiplication circuits are constructed.<>
给出了用任意给定的基本加法单元构造n个数的免进位加法的最浅的可能电路和最短的可能公式的一般理论。更精确地说,如果BA是一个具有出现矩阵N的基本加法单元,则由BA单元组成的最短多重免进位加法公式的大小为N /sup 1/p+o(1)/,其中p为矩阵N的L/sub p/范数等于1的唯一实数。类似的结果将基本加法单元BA的延迟矩阵M与最小值q连接起来,使得通过组合BA单元可以构造深度为(q+o(1)) log n的多个免进位加法电路。基于这些最优的多个免进位加法器结构,构造了已知最浅的乘法电路。
{"title":"Faster circuits and shorter formulae for multiple addition, multiplication and symmetric Boolean functions","authors":"M. Paterson, N. Pippenger, Uri Zwick","doi":"10.1109/FSCS.1990.89586","DOIUrl":"https://doi.org/10.1109/FSCS.1990.89586","url":null,"abstract":"A general theory is developed for constructing the shallowest possible circuits and the shortest possible formulas for the carry-save addition of n numbers using any given basic addition unit. More precisely, it is shown that if BA is a basic addition unit with occurrence matrix N, then the shortest multiple carry-save addition formulas that could be obtained by composing BA units are of size n/sup 1/p+o(1)/, where p is the unique real number for which the L/sub p/ norm of the matrix N equals 1. An analogous result connects the delay matrix M of the basic addition unit BA and the minimal q such that multiple carry-save addition circuits of depth (q+o(1)) log n could be constructed by combining BA units. On the basis of these optimal constructions of multiple carry-save adders, the shallowest known multiplication circuits are constructed.<<ETX>>","PeriodicalId":271949,"journal":{"name":"Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1990-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134370702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Simplifying nested radicals and solving polynomials by radicals in minimum depth 简化嵌套根和用最小深度根求解多项式
Pub Date : 1990-10-22 DOI: 10.1109/FSCS.1990.89607
G. Horng, Ming-Deh A. Huang
The notion of pure nested radicals and its field-theoretic counterpart, pure root extensions, are defined and used for investigating exact radical solutions.<>
定义了纯嵌套根的概念及其对应的场理论,纯根扩展,并用于研究精确根解。
{"title":"Simplifying nested radicals and solving polynomials by radicals in minimum depth","authors":"G. Horng, Ming-Deh A. Huang","doi":"10.1109/FSCS.1990.89607","DOIUrl":"https://doi.org/10.1109/FSCS.1990.89607","url":null,"abstract":"The notion of pure nested radicals and its field-theoretic counterpart, pure root extensions, are defined and used for investigating exact radical solutions.<<ETX>>","PeriodicalId":271949,"journal":{"name":"Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1990-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132300508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A characterization of Hash P by arithmetic straight line programs 用算术直线程序描述哈希P
Pub Date : 1990-10-22 DOI: 10.1109/FSCS.1990.89521
L. Babai, L. Fortnow
Hash P functions are characterized by certain straight-line programs of multivariate polynomials. The power of this characterization is illustrated by a number of consequences. These include a somewhat simplified proof of S. Toda's (1989) theorem that PH contained in P/sup Hash P/, as well as an infinite class of potentially inequivalent checkable functions.<>
哈希P函数由多元多项式的某些直线规划来表征。这种描述的力量可以通过一系列结果来说明。其中包括对S. Toda(1989)定理的一个稍微简化的证明,该定理证明PH包含在P/sup哈希P/中,以及无限类潜在不等价的可检查函数。
{"title":"A characterization of Hash P by arithmetic straight line programs","authors":"L. Babai, L. Fortnow","doi":"10.1109/FSCS.1990.89521","DOIUrl":"https://doi.org/10.1109/FSCS.1990.89521","url":null,"abstract":"Hash P functions are characterized by certain straight-line programs of multivariate polynomials. The power of this characterization is illustrated by a number of consequences. These include a somewhat simplified proof of S. Toda's (1989) theorem that PH contained in P/sup Hash P/, as well as an infinite class of potentially inequivalent checkable functions.<<ETX>>","PeriodicalId":271949,"journal":{"name":"Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1990-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133805752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
期刊
Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1