Recent Directions in Algorithmic Research
暂无分享,去创建一个
[1] Robert E. Tarjan,et al. Efficient Planarity Testing , 1974, JACM.
[2] V. Klee,et al. HOW GOOD IS THE SIMPLEX ALGORITHM , 1970 .
[3] Albert R. Meyer,et al. The Equivalence Problem for Regular Expressions with Squaring Requires Exponential Space , 1972, SWAT.
[4] Alfred V. Aho,et al. The Design and Analysis of Computer Algorithms , 1974 .
[5] John E. Hopcroft,et al. Polynomial-time algorithms for permutation groups , 1980, 21st Annual Symposium on Foundations of Computer Science (sfcs 1980).
[6] Robert G. Jeroslow,et al. The simplex algorithm with the pivot rule of maximizing criterion improvement , 1973, Discret. Math..
[7] Theodore P. Baker,et al. A second step toward the polynomial hierarchy , 1976, 17th Annual Symposium on Foundations of Computer Science (sfcs 1976).
[8] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[9] J. Spencer. Probabilistic Methods in Combinatorics , 1974 .
[10] M. Fischer,et al. SUPER-EXPONENTIAL COMPLEXITY OF PRESBURGER ARITHMETIC , 1974 .
[11] Richard M. Karp,et al. On linear characterizations of combinatorial optimization problems , 1980, 21st Annual Symposium on Foundations of Computer Science (sfcs 1980).
[12] Michael J. Fischer,et al. Relations Among Complexity Measures , 1979, JACM.
[13] Donald E. Knuth,et al. The Art of Computer Programming, Vol. 2 , 1981 .
[14] John Gill,et al. Computational Complexity of Probabilistic Turing Machines , 1977, SIAM J. Comput..
[15] Eugene M. Luks,et al. Isomorphism of graphs of bounded valence can be tested in polynomial time , 1980, 21st Annual Symposium on Foundations of Computer Science (sfcs 1980).
[16] F. Göbel,et al. Random walks on graphs , 1974 .
[17] Michael O. Rabin,et al. Probabilistic Algorithms in Finite Fields , 1980, SIAM J. Comput..
[18] Stephen A. Cook,et al. The complexity of theorem-proving procedures , 1971, STOC.
[19] Leonard M. Adleman,et al. Two theorems on random polynomial time , 1978, 19th Annual Symposium on Foundations of Computer Science (sfcs 1978).
[20] Larry Carter,et al. New classes and applications of hash functions , 1979, 20th Annual Symposium on Foundations of Computer Science (sfcs 1979).
[21] R. Solovay,et al. Relativizations of the $\mathcal{P} = ?\mathcal{NP}$ Question , 1975 .
[22] M. Rabin. DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION , 1979 .
[23] Gary L. Miller. Graph Isomorphism, General Remarks , 1979, J. Comput. Syst. Sci..
[24] Allan Borodin,et al. On Relating Time and Space to Size and Depth , 1977, SIAM J. Comput..
[25] Richard J. Lipton,et al. Some connections between nonuniform and uniform complexity classes , 1980, STOC '80.
[26] Adi Shamir,et al. On Digital Signatures and Public-Key Cryptosystems. , 1977 .
[27] Richard J. Lipton,et al. Random walks, universal traversal sequences, and the complexity of maze problems , 1979, 20th Annual Symposium on Foundations of Computer Science (sfcs 1979).
[28] V. Strassen. Gaussian elimination is not optimal , 1969 .
[29] Larry J. Stockmeyer,et al. The Polynomial-Time Hierarchy , 1976, Theor. Comput. Sci..
[30] Volker Strassen,et al. A Fast Monte-Carlo Test for Primality , 1977, SIAM J. Comput..
[31] Andrew Chi-Chih Yao,et al. Probabilistic computations: Toward a unified measure of complexity , 1977, 18th Annual Symposium on Foundations of Computer Science (sfcs 1977).
[32] Manuel Blum,et al. Equivalence of Free Boolean Graphs can be Decided Probabilistically in Polynomial Time , 1980, Inf. Process. Lett..
[33] Vaughan R. Pratt,et al. Every Prime has a Succinct Certificate , 1975, SIAM J. Comput..
[34] P. Gács,et al. Khachian's Algorithm for Linear Programming. , 1979 .
[35] Leonard M. Adleman,et al. A subexponential algorithm for the discrete logarithm problem with applications to cryptography , 1979, 20th Annual Symposium on Foundations of Computer Science (sfcs 1979).
[36] Volker Strassen,et al. Erratum: A Fast Monte-Carlo Test for Primality , 1978, SIAM J. Comput..
[37] Charles C. Sims,et al. Some group-theoretic algorithms , 1978 .
[38] D. Corneil,et al. An Efficient Algorithm for Graph Isomorphism , 1970, JACM.
[39] M.E. Hellman,et al. Privacy and authentication: An introduction to cryptography , 1979, Proceedings of the IEEE.
[40] E. Berlekamp. Factoring polynomials over large finite fields* , 1970, SYMSAC '71.
[41] Jacob T. Schwartz,et al. Fast Probabilistic Algorithms for Verification of Polynomial Identities , 1980, J. ACM.