Computing with very weak random sources
暂无分享,去创建一个
[1] Manuel Blum,et al. Independent unbiased coin flips from a correlated biased source—A finite state markov chain , 1984, Comb..
[2] Miklos Santha,et al. On Using Deterministic Functions to Reduce Randomness in Probabilistic Algorithms , 1987, Inf. Comput..
[3] David Zuckerman. On the Time to Traverse all Edges of a Graph , 1991, Inf. Process. Lett..
[4] Russell Impagliazzo,et al. How to recycle random bits , 1989, 30th Annual Symposium on Foundations of Computer Science.
[5] Michael E. Saks,et al. Efficient construction of a small hitting set for combinatorial rectangles in high dimension , 1993, Comb..
[6] Umesh V. Vazirani,et al. Efficiency considerations in using semi-random sources , 1987, STOC.
[7] Moni Naor,et al. Small-bias probability spaces: efficient constructions and applications , 1990, STOC '90.
[8] Oded Goldreich,et al. The bit extraction problem or t-resilient functions , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).
[9] Umesh V. Vazirani,et al. Strong communication complexity or generating quasi-random sequences from two communicating semi-random sources , 1987, Comb..
[10] Tsan-sheng Hsu,et al. Parallel implementation of algorithms for finding connected components in graphs , 1994, Parallel Algorithms.
[11] Noga Alon,et al. Simple Construction of Almost k-wise Independent Random Variables , 1992, Random Struct. Algorithms.
[12] Manuel Blum. Independent unbiased coin flips from a correlated biased source—A finite state markov chain , 1986, Comb..
[13] DyerMartin,et al. A random polynomial-time algorithm for approximating the volume of convex bodies , 1991 .
[14] Vijay V. Vazirani,et al. Random polynomial time is equal to slightly-random polynomial time , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).
[15] Noga Alon,et al. A Fast and Simple Randomized Parallel Algorithm for the Maximal Independent Set Problem , 1985, J. Algorithms.
[16] Avi Wigderson,et al. Tiny Families of Functions with Random Properties: A Quality-Size Trade-off for Hashing , 1997, Electron. Colloquium Comput. Complex..
[17] Oded Goldreich,et al. Tiny Families of Functions with Random Properties: A Quality-Size Trade-off for Hashing (Preliminary Version) , 1997, STOC 1994.
[18] Rudolf Lide,et al. Finite fields , 1983 .
[19] Michael E. Saks,et al. Some extremal problems arising from discrete control processes , 1989, Comb..
[20] Avi Wigderson,et al. Expanders That Beat the Eigenvalue Bound: Explicit Construction and Applications , 1993, Comb..
[21] David Zuckerman,et al. Optimal Speedup of Las Vegas Algorithms , 1993, Inf. Process. Lett..
[22] Peter Winkler,et al. Multiple cover time , 1996, Random Struct. Algorithms.
[23] Noam Nisan,et al. More deterministic simulation in logspace , 1993, STOC.
[24] Eyal Kushilevitz,et al. Lower bounds for randomized mutual exclusion , 1993, SIAM J. Comput..
[25] David Zuckerman,et al. On Unapproximable Versions of NP-Complete Problems , 1996, SIAM J. Comput..
[26] Avi Wigderson,et al. Tiny families of functions with random properties (preliminary version): a quality-size trade-off for hashing , 1994, STOC '94.
[27] Michael Luby. A Simple Parallel Algorithm for the Maximal Independent Set Problem , 1986, SIAM J. Comput..
[28] Leonid A. Levin,et al. Security preserving amplification of hardness , 1990, Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science.
[29] Avi Wigderson,et al. Dispersers, deterministic amplification, and weak random sources , 1989, 30th Annual Symposium on Foundations of Computer Science.
[30] Noam Nisan,et al. Randomness is Linear in Space , 1996, J. Comput. Syst. Sci..
[31] Oded Goldreich,et al. Unbiased Bits from Sources of Weak Randomness and Probabilistic Communication Complexity , 1988, SIAM J. Comput..
[32] Tsan-Sheng Hsu,et al. Graph augmentation and related problems: theory and practice , 1993 .
[33] Nathan Linial,et al. The influence of variables on Boolean functions , 1988, [Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science.
[34] D. Zuckerman,et al. Covering times of random walks on bounded degree trees and other graphs , 1989 .
[35] Alan M. Ferrenberg,et al. Monte Carlo simulations: Hidden errors from "good" random number generators. , 1992, Physical review letters.
[36] Nathan Linial,et al. Collective Coin Flipping , 1989, Advances in Computational Research.
[37] David Zuckerman,et al. NP-complete problems have a version that's hard to approximate , 1993, [1993] Proceedings of the Eigth Annual Structure in Complexity Theory Conference.
[38] David Zuckerman,et al. General weak random sources , 1990, Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science.
[39] Martin E. Dyer,et al. A random polynomial-time algorithm for approximating the volume of convex bodies , 1991, JACM.
[40] Moni Naor,et al. Small-Bias Probability Spaces: Efficient Constructions and Applications , 1993, SIAM J. Comput..
[41] Amnon Ta-Shma,et al. On Extracting Randomness From Weak Random Sources , 1995, Electron. Colloquium Comput. Complex..
[42] Michael Sipser,et al. Expanders, Randomness, or Time versus Space , 1988, Journal of computer and system sciences (Print).
[43] Miklos Santha,et al. Generating Quasi-Random Sequences from Slightly-Random Sources (Extended Abstract) , 1984, FOCS.
[44] Oded Goldreich,et al. Unbiased bits from sources of weak randomness and probabilistic communication complexity , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).
[45] Marek Karpinski,et al. An XOR-based erasure-resilient coding scheme , 1995 .
[46] Miklos Santha,et al. Generating Quasi-random Sequences from Semi-random Sources , 1986, J. Comput. Syst. Sci..
[47] Leonid A. Levin,et al. Pseudo-random generation from one-way functions , 1989, STOC '89.
[48] David Zuckerman,et al. Randomness-optimal sampling, extractors, and constructive leader election , 1996, STOC '96.
[49] David Zuckerman,et al. A technique for lower bounding the cover time , 1990, STOC '90.
[50] Bruce M. Maggs,et al. Tight analyses of two local load balancing algorithms , 1995, STOC '95.
[51] Mihir Bellare,et al. Randomness-efficient oblivious sampling , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.