首页 > 最新文献

[1991] Proceedings 32nd Annual Symposium of Foundations of Computer Science最新文献

英文 中文
A quadratic time algorithm for the minmax length triangulation 最小最大长度三角剖分的二次时间算法
Pub Date : 1991-09-01 DOI: 10.1109/SFCS.1991.185400
H. Edelsbrunner, T. Tan
It is shown that a triangulation of a set of n points in the plane that minimizes the maximum edge length can be computed in time O(n/sup 2/). The algorithm is reasonably easy to implement and is based on the theorem that there is a triangulation with minmax edge length that contains the relative neighborhood graph of the points as a subgraph. With minor modifications the algorithm works for arbitrary normed metrics.<>
结果表明,在O(n/sup 2/)时间内,可以计算出平面上n个点的三角剖分,使最大边长最小。该算法相当容易实现,并且基于这样一个定理,即存在一个边长最小的三角剖分,该三角剖分包含点的相对邻域图作为子图。稍加修改,该算法适用于任意赋范度量
{"title":"A quadratic time algorithm for the minmax length triangulation","authors":"H. Edelsbrunner, T. Tan","doi":"10.1109/SFCS.1991.185400","DOIUrl":"https://doi.org/10.1109/SFCS.1991.185400","url":null,"abstract":"It is shown that a triangulation of a set of n points in the plane that minimizes the maximum edge length can be computed in time O(n/sup 2/). The algorithm is reasonably easy to implement and is based on the theorem that there is a triangulation with minmax edge length that contains the relative neighborhood graph of the points as a subgraph. With minor modifications the algorithm works for arbitrary normed metrics.<<ETX>>","PeriodicalId":320781,"journal":{"name":"[1991] Proceedings 32nd Annual Symposium of Foundations of Computer Science","volume":"400 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1991-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115988573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 54
Communication complexity for parallel divide-and-conquer 并行分治的通信复杂性
Pub Date : 1991-09-01 DOI: 10.1109/SFCS.1991.185364
I-Chen Wu, H. T. Kung
The relationship between parallel computation cost and communication cost for performing divide-and-conquer (D&C) computations on a parallel system of p processors is studied. The parallel computation cost is the maximal number of the D&C nodes that any processor in the parallel system may expand, whereas the communication cost is the total number of cross nodes (nodes generated by one processor but expanded by another processor). A scheduling algorithm is proposed, and lower bounds on the communication cost are derived. The proposed scheduling algorithm is optimal with respect to the communication cost, since the parallel computation cost of the algorithm is near optimal.<>
研究了在p处理器并行系统上进行分治计算时,并行计算成本与通信成本之间的关系。并行计算成本是并行系统中任意处理器可以扩展的D&C节点的最大数量,而通信成本是交叉节点(由一个处理器生成但由另一个处理器扩展的节点)的总数。提出了一种调度算法,并推导了通信代价的下界。该调度算法在通信开销方面是最优的,因为该算法的并行计算开销接近最优。
{"title":"Communication complexity for parallel divide-and-conquer","authors":"I-Chen Wu, H. T. Kung","doi":"10.1109/SFCS.1991.185364","DOIUrl":"https://doi.org/10.1109/SFCS.1991.185364","url":null,"abstract":"The relationship between parallel computation cost and communication cost for performing divide-and-conquer (D&C) computations on a parallel system of p processors is studied. The parallel computation cost is the maximal number of the D&C nodes that any processor in the parallel system may expand, whereas the communication cost is the total number of cross nodes (nodes generated by one processor but expanded by another processor). A scheduling algorithm is proposed, and lower bounds on the communication cost are derived. The proposed scheduling algorithm is optimal with respect to the communication cost, since the parallel computation cost of the algorithm is near optimal.<<ETX>>","PeriodicalId":320781,"journal":{"name":"[1991] Proceedings 32nd Annual Symposium of Foundations of Computer Science","volume":"206 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1991-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128405811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 68
On the computational power of sigmoid versus Boolean threshold circuits 论s型和布尔阈值电路的计算能力
Pub Date : 1991-09-01 DOI: 10.1109/SFCS.1991.185447
W. Maass, G. Schnitger, Eduardo Sontag
The power of constant depth circuits with sigmoid (i.e., smooth) threshold gates for computing Boolean functions is examined. It is shown that, for depth 2, constant size circuits of this type are strictly more powerful than constant size Boolean threshold circuits (i.e., circuits with Boolean threshold gates). On the other hand it turns out that, for any constant depth d, polynomial size sigmoid threshold circuits with polynomially bounded weights compute exactly the same Boolean functions as the corresponding circuits with Boolean threshold gates.<>
研究了具有s型(即光滑)阈值门的等深度电路计算布尔函数的能力。结果表明,对于深度2,这种类型的恒定大小电路严格地比恒定大小的布尔阈值电路(即具有布尔阈值门的电路)更强大。另一方面,对于任意恒定的深度d,具有多项式有界权的多项式大小的s型阈值电路与具有布尔阈值门的相应电路计算出完全相同的布尔函数。
{"title":"On the computational power of sigmoid versus Boolean threshold circuits","authors":"W. Maass, G. Schnitger, Eduardo Sontag","doi":"10.1109/SFCS.1991.185447","DOIUrl":"https://doi.org/10.1109/SFCS.1991.185447","url":null,"abstract":"The power of constant depth circuits with sigmoid (i.e., smooth) threshold gates for computing Boolean functions is examined. It is shown that, for depth 2, constant size circuits of this type are strictly more powerful than constant size Boolean threshold circuits (i.e., circuits with Boolean threshold gates). On the other hand it turns out that, for any constant depth d, polynomial size sigmoid threshold circuits with polynomially bounded weights compute exactly the same Boolean functions as the corresponding circuits with Boolean threshold gates.<<ETX>>","PeriodicalId":320781,"journal":{"name":"[1991] Proceedings 32nd Annual Symposium of Foundations of Computer Science","volume":"57 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1991-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132569691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 115
Self-stabilization by local checking and correction 通过局部检查和校正自稳定
Pub Date : 1991-09-01 DOI: 10.1109/SFCS.1991.185378
B. Awerbuch, B. Patt-Shamir, G. Varghese
The first self-stabilizing end-to-end communication protocol and the most efficient known self-stabilizing network reset protocol are introduced. A simple method of local checking and correction, by which distributed protocols can be made self-stabilizing without the use of unbounded counters, is used. The self-stabilization model distinguishes between catastrophic faults that abstract arbitrary corruption of global state, and other restricted kinds of anticipated faults. It is assumed that after the execution starts there are no further catastrophic faults, but the anticipated faults may continue to occur.<>
介绍了首个自稳定端到端通信协议和目前已知效率最高的自稳定网络复位协议。使用了一种简单的本地检查和校正方法,通过该方法可以使分布式协议在不使用无界计数器的情况下实现自稳定。自稳定模型区分了抽象全局状态任意破坏的灾难性故障和其他有限类型的预期故障。假设在执行开始后没有进一步的灾难性错误,但预期的错误可能会继续发生。
{"title":"Self-stabilization by local checking and correction","authors":"B. Awerbuch, B. Patt-Shamir, G. Varghese","doi":"10.1109/SFCS.1991.185378","DOIUrl":"https://doi.org/10.1109/SFCS.1991.185378","url":null,"abstract":"The first self-stabilizing end-to-end communication protocol and the most efficient known self-stabilizing network reset protocol are introduced. A simple method of local checking and correction, by which distributed protocols can be made self-stabilizing without the use of unbounded counters, is used. The self-stabilization model distinguishes between catastrophic faults that abstract arbitrary corruption of global state, and other restricted kinds of anticipated faults. It is assumed that after the execution starts there are no further catastrophic faults, but the anticipated faults may continue to occur.<<ETX>>","PeriodicalId":320781,"journal":{"name":"[1991] Proceedings 32nd Annual Symposium of Foundations of Computer Science","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1991-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122641753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 316
An optimal convex hull algorithm and new results on cuttings 一种最优凸包算法及其在岩屑上的新结果
Pub Date : 1991-09-01 DOI: 10.1109/SFCS.1991.185345
B. Chazelle
An optimal algorithm for computing hyperplane cuttings is given. It results in a new kind of cutting, which enjoys all the properties of the previous ones and, in addition, can be refined by composition. An optimal algorithm for computing the convex hull of a finite point set in any fixed dimension is also given.<>
给出了一种计算超平面切屑的最优算法。它产生了一种新的切削方法,它不仅具有以前切削方法的所有性能,而且还可以通过成分加以改进。给出了计算任意定维有限点集凸壳的最优算法。
{"title":"An optimal convex hull algorithm and new results on cuttings","authors":"B. Chazelle","doi":"10.1109/SFCS.1991.185345","DOIUrl":"https://doi.org/10.1109/SFCS.1991.185345","url":null,"abstract":"An optimal algorithm for computing hyperplane cuttings is given. It results in a new kind of cutting, which enjoys all the properties of the previous ones and, in addition, can be refined by composition. An optimal algorithm for computing the convex hull of a finite point set in any fixed dimension is also given.<<ETX>>","PeriodicalId":320781,"journal":{"name":"[1991] Proceedings 32nd Annual Symposium of Foundations of Computer Science","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1991-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121830226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 75
Fault-tolerant computation in the full information model 全信息模型中的容错计算
Pub Date : 1991-09-01 DOI: 10.1109/SFCS.1991.185405
Oded Goldreich, S. Goldwasser, N. Linial
Efficient two-party protocols for fault-tolerant computation of any two-argument function are presented. It is proved that the influence of a dishonest player in these protocols is the minimum one possible (up to polylogarithmic factors). Also presented are efficient m-party fault-tolerant protocols for sampling a general distribution (m>or=2). Efficient m-party protocols for computation of any m-argument function are given, and it is proved for these protocols that for most functions, the influence of any t dishonest players on the outcome of the protocol is the minimum one possible (up to polylogarithmic factors).<>
针对任意双参数函数的容错计算,提出了高效的两方协议。证明了在这些协议中,不诚实玩家的影响是最小的(最多是多对数因子)。本文还提出了一种有效的m方容错协议,用于对一般分布(m>或=2)进行抽样。给出了计算任意m参数函数的有效m方协议,并证明了对于这些协议,对于大多数函数,任何t个不诚实参与者对协议结果的影响是最小的可能(最多为多对数因子)。
{"title":"Fault-tolerant computation in the full information model","authors":"Oded Goldreich, S. Goldwasser, N. Linial","doi":"10.1109/SFCS.1991.185405","DOIUrl":"https://doi.org/10.1109/SFCS.1991.185405","url":null,"abstract":"Efficient two-party protocols for fault-tolerant computation of any two-argument function are presented. It is proved that the influence of a dishonest player in these protocols is the minimum one possible (up to polylogarithmic factors). Also presented are efficient m-party fault-tolerant protocols for sampling a general distribution (m>or=2). Efficient m-party protocols for computation of any m-argument function are given, and it is proved for these protocols that for most functions, the influence of any t dishonest players on the outcome of the protocol is the minimum one possible (up to polylogarithmic factors).<<ETX>>","PeriodicalId":320781,"journal":{"name":"[1991] Proceedings 32nd Annual Symposium of Foundations of Computer Science","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1991-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117316268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 60
On selecting a satisfying truth assignment 关于选择一个令人满意的真值赋值
Pub Date : 1991-09-01 DOI: 10.1109/SFCS.1991.185365
C. Papadimitriou
The complexity of certain natural generalizations of satisfiability, in which one of the possibly exponentially many satisfying truth assignments must be selected, is studied. Two natural selection criteria, default preference and minimality (circumscription), are considered. The thrust of the complexity results seems to be that hard problems become harder, while easy problems remain easy. This consideration yields as a byproduct a new and very natural polynomial-time randomized algorithm for 2SAT.<>
研究了满足性自然推广的复杂性,在这种推广中,必须从可能的指数级的许多令人满意的真值分配中选择一个。两个自然选择标准,默认偏好和最小(限制),被考虑。复杂性结果的主旨似乎是,困难的问题变得更加困难,而简单的问题仍然简单。这种考虑产生了一种新的、非常自然的2SAT多项式时间随机化算法。
{"title":"On selecting a satisfying truth assignment","authors":"C. Papadimitriou","doi":"10.1109/SFCS.1991.185365","DOIUrl":"https://doi.org/10.1109/SFCS.1991.185365","url":null,"abstract":"The complexity of certain natural generalizations of satisfiability, in which one of the possibly exponentially many satisfying truth assignments must be selected, is studied. Two natural selection criteria, default preference and minimality (circumscription), are considered. The thrust of the complexity results seems to be that hard problems become harder, while easy problems remain easy. This consideration yields as a byproduct a new and very natural polynomial-time randomized algorithm for 2SAT.<<ETX>>","PeriodicalId":320781,"journal":{"name":"[1991] Proceedings 32nd Annual Symposium of Foundations of Computer Science","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1991-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128407461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 299
Subquadratic zero-knowledge Subquadratic 0知识
Pub Date : 1991-09-01 DOI: 10.1145/227683.227686
J. Boyar, G. Brassard, R. Peralta
The communication complexity of zero-knowledge proof systems is improved. Let C be a Boolean circuit of size n. Previous zero-knowledge proof systems for the satisfiability of C require the use of Omega (kn) bit commitments in order to achieve a probability of undetected cheating not greater than 2/sup -k/. In the case k=n, the communication complexity of these protocols is therefore Omega (n/sup 2/) bit commitments. A zero-knowledge proof is given for achieving the same goal with only O(n/sup m/+k square root n/sup m/) bit commitments, where m=1+ epsilon /sub n/ and epsilon /sub n/ goes to zero as n goes to infinity. In the case k=n, this is O(n square root n/sup m/). Moreover, only O(k) commitments need ever be opened, which is interesting if committing to a bit is significantly less expensive than opening a commitment.<>
提高了零知识证明系统的通信复杂度。设C为大小为n的布尔电路。以前的零知识证明系统对于C的可满足性要求使用Omega (kn)位承诺,以实现未被发现的作弊概率不大于2/sup -k/。在k=n的情况下,这些协议的通信复杂性因此是Omega (n/sup 2/)位承诺。给出了一个零知识证明,可以只用O(n/sup m/+k根号n/sup m/)位来实现相同的目标,其中m=1+ epsilon /下标n/和epsilon /下标n/在n趋于无穷时趋于零。在k=n的情况下,这是O(n√n/sup m/)此外,只需要打开O(k)个承诺,如果提交一个比特比打开一个承诺要便宜得多,这是很有趣的。
{"title":"Subquadratic zero-knowledge","authors":"J. Boyar, G. Brassard, R. Peralta","doi":"10.1145/227683.227686","DOIUrl":"https://doi.org/10.1145/227683.227686","url":null,"abstract":"The communication complexity of zero-knowledge proof systems is improved. Let C be a Boolean circuit of size n. Previous zero-knowledge proof systems for the satisfiability of C require the use of Omega (kn) bit commitments in order to achieve a probability of undetected cheating not greater than 2/sup -k/. In the case k=n, the communication complexity of these protocols is therefore Omega (n/sup 2/) bit commitments. A zero-knowledge proof is given for achieving the same goal with only O(n/sup m/+k square root n/sup m/) bit commitments, where m=1+ epsilon /sub n/ and epsilon /sub n/ goes to zero as n goes to infinity. In the case k=n, this is O(n square root n/sup m/). Moreover, only O(k) commitments need ever be opened, which is interesting if committing to a bit is significantly less expensive than opening a commitment.<<ETX>>","PeriodicalId":320781,"journal":{"name":"[1991] Proceedings 32nd Annual Symposium of Foundations of Computer Science","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1991-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124755473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Approximate representation theory of finite groups 有限群的近似表示理论
Pub Date : 1991-09-01 DOI: 10.1109/SFCS.1991.185442
L. Babai, K. Friedl
The asymptotic stability and complexity of floating point manipulation of representations of a finite group G are considered, especially splitting them into irreducible constituents and deciding their equivalence. Using rapid mixing estimates for random walks, the authors analyze a classical algorithm by J. Dixon (1970). They find that both its stability and complexity critically depend on the diameter d=diam(G,S) (S is the set that generates G). They propose a worst-case speedup by using Erdos-Renyi generators and modifying the Dixon averaging method. The overall effect in asymptotic complexity is a guaranteed (n log mod G mod )/sup O(1)/ running time.<>
研究了有限群G表示的浮点操作的渐近稳定性和复杂性,特别是将它们分割成不可约的成分并确定它们的等价性。作者利用随机漫步的快速混合估计,分析了J. Dixon(1970)的经典算法。他们发现其稳定性和复杂性都严重依赖于直径d=直径(G,S) (S是产生G的集合)。他们提出了使用Erdos-Renyi生成器和修改Dixon平均方法的最坏情况加速。在渐近复杂度方面的总体效果是保证(n log mod G mod)/sup O(1)/运行时间
{"title":"Approximate representation theory of finite groups","authors":"L. Babai, K. Friedl","doi":"10.1109/SFCS.1991.185442","DOIUrl":"https://doi.org/10.1109/SFCS.1991.185442","url":null,"abstract":"The asymptotic stability and complexity of floating point manipulation of representations of a finite group G are considered, especially splitting them into irreducible constituents and deciding their equivalence. Using rapid mixing estimates for random walks, the authors analyze a classical algorithm by J. Dixon (1970). They find that both its stability and complexity critically depend on the diameter d=diam(G,S) (S is the set that generates G). They propose a worst-case speedup by using Erdos-Renyi generators and modifying the Dixon averaging method. The overall effect in asymptotic complexity is a guaranteed (n log mod G mod )/sup O(1)/ running time.<<ETX>>","PeriodicalId":320781,"journal":{"name":"[1991] Proceedings 32nd Annual Symposium of Foundations of Computer Science","volume":"176 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1991-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129480260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Better expansion for Ramanujan graphs 拉马努金图的更好展开
Pub Date : 1991-09-01 DOI: 10.1109/SFCS.1991.185397
N. Kahalé
The expansion properties of regular graphs are investigated. The best previously known expansion of subsets of linear size of explicit k-regular graphs is k/4. This bound is achieved by nonbipartite Ramanujan graphs of degree k=p+1, which have the property that all but the largest eigenvalue have absolute value at most 2 square root p. The expansion coefficient for linear subsets for nonbipartite Ramanujan graphs is improved to 3(k-2)/8. Other results are established, including improved results about random walks on expanders.<>
研究正则图的展开性质。关于显式k正则图的线性大小的子集的最好的已知展开是k/4。该界是由k=p+1阶的非二部Ramanujan图实现的,该图具有除最大特征值以外的所有特征值的绝对值不超过2根号p的性质。将非二部Ramanujan图的线性子集的展开系数提高到3(k-2)/8。建立了其他结果,包括扩展器上随机漫步的改进结果。
{"title":"Better expansion for Ramanujan graphs","authors":"N. Kahalé","doi":"10.1109/SFCS.1991.185397","DOIUrl":"https://doi.org/10.1109/SFCS.1991.185397","url":null,"abstract":"The expansion properties of regular graphs are investigated. The best previously known expansion of subsets of linear size of explicit k-regular graphs is k/4. This bound is achieved by nonbipartite Ramanujan graphs of degree k=p+1, which have the property that all but the largest eigenvalue have absolute value at most 2 square root p. The expansion coefficient for linear subsets for nonbipartite Ramanujan graphs is improved to 3(k-2)/8. Other results are established, including improved results about random walks on expanders.<<ETX>>","PeriodicalId":320781,"journal":{"name":"[1991] Proceedings 32nd Annual Symposium of Foundations of Computer Science","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1991-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117351414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
期刊
[1991] Proceedings 32nd Annual Symposium of Foundations of Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1