+ All Categories
Home > Documents > Bibliography - Home - Springer978-1-4612-0333...152 BIBLIOGRAPHY [48] L. Goldschlager, I. Parberry....

Bibliography - Home - Springer978-1-4612-0333...152 BIBLIOGRAPHY [48] L. Goldschlager, I. Parberry....

Date post: 26-May-2018
Category:
Upload: lykhue
View: 218 times
Download: 0 times
Share this document with a friend
12
Bibliography [1] L. Adleman, M. Huang. Recognizing primes in random polynomial time. Proc. 19th ACM Symp. on Theory of Computing, 1987, 462-469. [2] L. Adleman and K. Manders. Reducibility, randomness, and intractability. Proc. 9th ACM Symp. on Theory of Computing, 1977, 151-163. [3] A.V. Aho, J.E. Hopcroft, J.D. Ullman. The Design and Analysis of Computer Algorithms. Addison-Wesley, 1976. [4] V. Arvind, Y. Han, L. Hemachandra, J. Kobler, A. Lozano, M. Mundhenk, M. Ogiwara, U. Schoning, R. Silvestri, T. Thierauf. Reductions to sets of low infor- mation content. Proc. Intern. Colloq. Automata, Languages, and Programming, Lecture Notes in Computer Science 623, Springer-Verlag, 1992, 162-173. [5] L. Babai. Moderately exponential bound for graph isomorphism. Proc. Fun- damentals of Computation Theory, Lecture Notes in Computer Science 117, Springer, 1981,34-50. [6] L. Babai. Trading group theory for randomness. 17th ACM Symp. Theory of Computing 1985,421-429. [7] L. Babai, P. Erdos, S.M. Selkow. Random graph isomorphism. SIAM Journal on Computing 9 (1980), 628-635. [8] L. Babai, L. Fortnow, N. Nissan, A. Wigderson. BPP has subexponential time simulations unless EXPTIME has publishable proofs. Proc. 6th Structure in Complexity Theory Conference, IEEE, 1991, 213-220. [9] L. Babai, Y. Grigoryev, D. Mount. Isomorphism testing for graphs with bounded eigenvalue multiplicities. Proc. 14th Ann. ACM Symposium on Theory of Com- puting, 1982, 310-324. [10] L. Babai, L. Kucera. Canonical labelling of graphs in linear average time. Proc. 20th IEEE Symp. Foundations of Computer Science, 1979,39-46. [11] L. Babai and S. Moran. Arthur-Merlin games: a randomized proof system and a hierarchy of complexity classes. Journal of Computer and System Sciences 36 (1988), 254-276. [12] L. Babai and S. Moran. Proving properties of interactive proofs by a generalized counting technique. Information and Computation 82 (1989), 185-197.
Transcript

Bibliography

[1] L. Adleman, M. Huang. Recognizing primes in random polynomial time. Proc.19th ACM Symp. on Theory of Computing, 1987, 462-469.

[2] L. Adleman and K. Manders. Reducibility, randomness, and intractability. Proc.9th ACM Symp. on Theory of Computing, 1977, 151-163.

[3] A.V. Aho, J.E. Hopcroft, J.D. Ullman. The Design and Analysis of ComputerAlgorithms. Addison-Wesley, 1976.

[4] V. Arvind, Y. Han, L. Hemachandra, J. Kobler, A. Lozano, M. Mundhenk, M.Ogiwara, U. Schoning, R. Silvestri, T. Thierauf. Reductions to sets of low infor­mation content. Proc. Intern. Colloq. Automata, Languages, and Programming,Lecture Notes in Computer Science 623, Springer-Verlag, 1992, 162-173.

[5] L. Babai. Moderately exponential bound for graph isomorphism. Proc. Fun­damentals of Computation Theory, Lecture Notes in Computer Science 117,Springer, 1981,34-50.

[6] L. Babai. Trading group theory for randomness. 17th ACM Symp. Theory ofComputing 1985,421-429.

[7] L. Babai, P. Erdos, S.M. Selkow. Random graph isomorphism. SIAM Journalon Computing 9 (1980), 628-635.

[8] L. Babai, L. Fortnow, N. Nissan, A. Wigderson. BPP has subexponential timesimulations unless EXPTIME has publishable proofs. Proc. 6th Structure inComplexity Theory Conference, IEEE, 1991, 213-220.

[9] L. Babai, Y. Grigoryev, D. Mount. Isomorphism testing for graphs with boundedeigenvalue multiplicities. Proc. 14th Ann. ACM Symposium on Theory of Com­puting, 1982, 310-324.

[10] L. Babai, L. Kucera. Canonical labelling of graphs in linear average time. Proc.20th IEEE Symp. Foundations of Computer Science, 1979,39-46.

[11] L. Babai and S. Moran. Arthur-Merlin games: a randomized proof system anda hierarchy of complexity classes. Journal of Computer and System Sciences 36(1988), 254-276.

[12] L. Babai and S. Moran. Proving properties of interactive proofs by a generalizedcounting technique. Information and Computation 82 (1989), 185-197.

150 BIBLIOGRAPHY

[13] T. Baker, A.L. Selman. A second step toward the polynomial hierarchy. Theo­retical Computer Science 8 (1979), 177-187.

[14] J.L. Balccizar. Self-reducibility structures and solutions of NP problems. RevistaMatematica, Universidad Complutense de Madrid, Vol. 2, No. 2/3 (1989), 175­184.

[15] J.L. Balcazar, J. Diaz, J. Gabarro. Structural Complexity Theory I + II.Springer-Verlag, 1988 and 1990.

[16] M. Bellare, S. Micali, R. Ostrovski. Perfect zero-knowledge in constant rounds.Proc. ACM Sympos. on Theory of Computing, 1990,482-493.

[17] C.H. Bennett, J. Gill. Relative to a random oracle A, p A :/; N p A :/; co-N pAwith probability 1. SIAM Journal on Computing 10 (1981), 96-113.

[18] L. Berman, J. Hartmanis. On isomorphism and density of NP and other com­plexity classes. SIAM Journal on Computing 6 (1977),305-327.

[19] A. Blass, Y. Gurevich. On the unique satisfiability problem. Information andControl 55 (1982), 80-88.

[20] M. Blum. Designing programs to check their work. ICSI Tech. Report, TR-88­009. To appear in Communications of the Assoc. Comput. Mach.

[21] M. Blum, S. Kannan. Designing programs that check their work. Proc. 21stACM Symposium on Theory of Computing, 1989, 86-97.

[22] B. Bollobas. Graph Theory: An Introductory Course. Springer-Verlag, 1979.

[23] R.V. Book. Tally languages and complexity classes. Information and Control 26(1974), 186-193.

[24] K.S. Booth. Isomorphism testing for graphs, semigroups, and finite automataare polynomially equivalent problems. SIAM Journal on Computing 7 (1978),273-279.

[25] R.B. Boppana, J. Hastad, and S. Zachos. Does co-NP have short interactiveproofs? Information Processing Letters 25 (1987), 27-32.

[26] A. Borodin, A. Demers. Some comments on functional self-reducibility and theNP hierarchy. Techn. Report 76-284, Dept. Computer Science, Cornell Univer­sity (1976).

[27] G. Brassard, D. Chaum, C. Crepeau. Minimum disclosure proofs of knowledge.Journal of Computer and System Sciences 37 (1988), 156-189.

[28] J .L. Carter, M.N. Wegman. Universal classes of hash functions. Journal ofComputer and System Sciences 18 (1979), 143-154.

[29] R. Chang. On the structure of bounded queries to arbitrary NP sets. 4th Struc­ture in Complexity Theory Conference, IEEE 1989, 250-258.

[30] D. Ranjan, P. Rohatgi. On randomized reductions to sparse sets. Proc. 7thStructure in Complexity Theory Conference, IEEE, 1992, 239-242.

BIBLIOGRAPHY 151

[31] H. Chernoff. A measure of asymptotic efficiency for tests of a hypothesis basedon a sum of observations. Annals Mathematical Statistics 23 (1952), 493-509.

[32] M.J. Chung, B. Ravikumar. Strong nondeterministic Turing reduction-a tech­nique for proving intractability. Proc. 2nd Structure in Complexity Theory Con­ference, IEEE, 1987, 132-137.

[33] S.A. Cook. The complexity of theorem proving procedures. Proc. 3rd Ann. ACMSympos. on Theory of Computing, 1971, 151-158.

[34] P. Erdos, J. Spencer. Probabilistic Methods in Combinatorics. Academic Press,1974.

[35J P. Feldman. The optimum prover lives in PSPACE. manuscript, 1986.

[36J M.R. Fellows, N. Koblitz. Self-witnessing polynomial-time complexity and primefactorization. Proc. 7th Structure in Complexity Theory Conference, IEEE, 1992,107-110.

[37J S.A. Fenner, L.J. Fortnow, S.A. Kurtz. Gap-definable counting classes. 6thStructure in Complexity Theory Con!, IEEE 1991,30-42.

[38] I.S. Filotti, J.N. Mayer. A polynomial-time algorithm for determining the iso­morphism of graphs of fixed genus. Proc. 12th Ann. A CM Symposium on Theoryof Computing, 1980, 236-243.

[39] L. Fortnow. The complexity of perfect zero-knowledge. In: [101J, 327-344.

[40] S. Fortune. A note on sparse complete sets. SIAM Journal on Computing 8(1979),431-433.

[41J M. Fiirer, O. Goldreich, Y. Mansour, M. Sipser, S. Zachos. On completeness andsoundness in interactive proof systems. In: [101J, 429-442.

[42] M. Garzon, Y. Zalcstein. The complexity of isomorphism testing. Proc. IEEEFoundations of Computer Science, 1986, 313-321.

[43] M.R. Garey, D.S. Johnson. Computers and Intractability - A Guide to the Theoryof NP-Completeness. Freeman and Company, 1979.

[44J J. Gill. Computational complexity of probabilistic complexity classes. SIAMJournal on Computing 6, 1977, 675-695.

[45] O. Goldreich. Randomness, interactive proofs, and zero-knowledge. In: R.Herken (ed.) The Universal Turing Machine: A Half-Century Survey, OxfordUniversity Press 1988, 377-406.

[46] O. Goldreich, Y. Mansour, M. Sipser. Interactive proof systems: provers thatnever fail and random selection. Proc. Foundations of Computer Science, IEEE,1987, 449-461.

[47] O. Goldreich, S. Micali, A. Wigderson. Proofs that yield nothing but theirvalidity and a methodology of cryptographic protocol design. Proc. IEEE Symp.Foundations of Computer Science, 1986, 174-187. Also: Proofs that releaseminimum knowledge. Proc. Math. Foundations of Computer Science, LectureNotes in Computer Science 233, Springer 1986, 639--650.

152 BIBLIOGRAPHY

[48] L. Goldschlager, I. Parberry. On the construction of parallel computers fromvarious bases of boolean functions. Theoretical Computer Science 43, 1986,43­58.

[49] S. Goldwasser. Interactive proof systems. In: J. Hartmanis (ed.): ComputationalComplexity Theory. American Math. Society, 1989, 108-128.

[50] S. Goldwasser, S. Micali, C. Rackoff. The knowledge complexity of interactiveproof systems. SIAM Journal on Computing 18 (1989), 186-208.

[51] S. Goldwasser, M. Sipser. Private coins versus public coins in interactive proofsystems. In: [101], 73-90.

[52] G.R. Grimmett, D.R. Stirzaker. Probability and Random Processes. OxfordUniversity Press, 1982.

[53] M. Hall. The Theory of Groups. MacMillan, 1959.

[54] F. Harary. Graph Theory. Addison-Wesley, 1969.

[55] J. Hartmanis. On sparse sets in NP-P. Information Processing Letters 16 (1983),55-60.

[56] P.G. Hinman. Recursion- Theoretic Hierarchies. Springer-Verlag, 1978.

[57] C.M. Hoffmann. Subcomplete generalizations of graph isomorphism. Journal ofComputer and System Sciences 25 (1982), 332-359.

[58] C.M. Hoffmann. Group- Theoretic Algorithms and Graph Isomorphism. LectureNotes in Computer Science 136, Springer-Verlag 1982.

[59] S. Homer, 1. Longpre. On reductions of NP sets to sparse sets. Proc. 6thStructure in Complexity Theory Conference, IEEE, 1991, 79-88.

[60] J.E. Hopcroft. Recent directions in algorithmic research. Proc. Theoretical Com­puter Science, Lecture Notes in Computer Science 104, Springer-Verlag, 1981,123-134.

[61] J.E. Hopcroft, R.M. Karp. An n 5/ 2 algorithm for maximum matchings in bipar­tite graphs. SIAM Journal on Computing 2, 1973, 225-231.

[62] J .E. Hopcroft, R.E. Tarjan. A V 2 algorithm for determining isomorphism ofplanar graphs. Information Processing Letters 1 (1971),32-34.

[63] J .E. Hopcroft, R.E. Tarjan. Isomorphism of planar graphs. In: [104], 143-150.

[64] J.E. Hopcroft, J.D. Ullman. Introduction to Automata, Languages, and Compu­tation. Addison-Wesley, 1979.

[65] J.E. Hopcroft and J.K. Wong. A linear time algorithm for the isomorphism ofplanar graphs. Proc. 6th Annual ACM Symp. on Theory of Computing, 1974,172-184.

[66] M. Jerrum. Handwritten notes. Oberwolfach, 1986.

[67] J. Kadin. pNP(lognl and sparse Turing complete sets for N P. Proc. 2nd Structurein Complexity Theory Conference, IEEE, 1987,33-40.

BIBLIOGRAPHY 153

[68J J. Kadin. Restricted Turing Reducibilities and the Structure of the PolynomialTime Hierarchy. Ph.D. Thesis, Cornell University, 1988.

[69] R.M. Karp. Reducibility among combinatorial problems. In: [104],85-103.

[70] R.M. Karp, R.J. Lipton. Some connections between nonuniform and uniformcomplexity classes. Proc. 12th ACM Symp. Theory of Computer Science, 302­309, 1980. Also: Turing machines that take advice. In: Logic and Algorithmic,Monographie No. 30 de l'Enseignement Mathematique, Universite de Geneve,1982, 255-274.

[71J J. Kamper. Nonuniform proof systems: a new framework to describe nonuniformand probabilistic complexity classes. Theoretical Computer Science 85 (1991),305-331.

[72] A. Klapper. Generalized lowness and highness and probabilistic classes. Mathe­matical Systems Theory 22 (1989), 37-45.

[73J D.E. Knuth. The Art of Computer Programming, Vol. 2: Seminumerical Algo­rithms. Addison-Wesley, 2nd edition, 1981.

[74J K. Ko. Some observations on the probabilistic algorithms and NP-hard problems.Information Processing Letters 14 (1982), 39-43.

[75] K. Ko. On self-reducibility and weak p-selectivity. Journal of Computer andSystem Sciences 26 (1983),209-221.

[76] K. Ko. On helping by robust oracle machines. Proc. 2nd Structure in ComplexityTheory Conference, IEEE, 1987, 186-190.

[77J K. Ko, U. Schoning. On circuit-size complexity and the low hierarchy in NP.SIAM Journal on Computing 14 (1985), 41-51.

[78J J. Kobler. Locating P jpoly optimally in the extended low hierarchy. To appearin: Proc. Symposium on Theoretical Aspects of Computer Science 1993.

[79] J. Kobler, U. Schoning, S. Toda, J. Tora.n. Turing machines with few acceptingcomputations and low sets for PP. Journal of Computer and System Sciences44, 1992, 272-286.

[80] J. Kobler, U. Schoning, J. Tora.n. Graph isomorphism is low for PP. Sympos. onTheoretical Aspects of Computer Science, Lecture Notes in Computer Science577, Springer-Verlag, 1992, 401-411. To appear in Journal of ComputationalComplexity.

[81] J. Kobler, U. Schoning, J. Toran. Graph isomorphism is low for PP. Journal ofComputational Complexity, to appear.

[82] D. Kozen. A clique problem equivalent to graph isomorphism. SIGACT News,Summer 1978, 50-52.

[83] D. Kozen. The Design and Analysis of Algorithms. Springer-Verlag, New York,1992.

154 BIBLIOGRAPHY

[84] D. Kratsch and L.A. Hemachandra. On the complexity of graph reconstruction.Mathematical Systems Theory, to appear.

[85] L. Kucera. Combinatorial Algorithms. Adam Hilger, Bristol and Philadelphia,1990.

[86] R.E. Ladner. On the structure of polynomial-time reducibilities. Journal of theAssoc. Comput. Mach. 22 (1975), 155-17l.

[87] R.E. Ladner. The circuit value problem is log space complete for P. SIGACTNEWS 7 (1975), 18-20.

[88] C. Lautemann. On two computational models for probabilistic algorithms. Tech­nische Universitiit Berlin, Fachbereich 20 - Informatik, Technical Report 82-15,1982.

[89] C. Lautemann. BPP and the polynomial hierarchy. Information ProcessingLetters 14 (1983), 215-217.

[90] A.K. Lenstra, H.W. Lenstra. Algorithms in number theory. In: Algorithms andComplexity, Handbook of Theoretical Computer Science, Vol. A, edited by J. vanLeeuwen, Elsevier and MIT-Press, 1990,673-716.

[91] S. Lindell. A logspace algorithm for tree canonization. Proc. 24th Ann. ACMSymposium on Theory of Computing, 1992.

[92] T.J. Long. Strong nondeterministic polynomial-time reducibilities. TheoreticalComputer Science 21 (1982), 1-25.

[93J A. Lozano. Computational Complexity versus Structural Simplicity. DoctoralDissertation, Universitat Politecnica de Catalunya, Barcelona, 1992.

[94] A. Lozano, J. Toran. On the non-uniform complexity of the graph isomorphismproblem. Proc. 7th Structure in Complexity Theory Conf., IEEE, 1992, 118-131.

[95] A. Lubiw. Some NP-complete problems similar to graph isomorphism. SIAMJournal on Computing 10 (1981), 11-2l.

[96] E.M. Luks. Isomorphism of graphs of bounded valence can be tested in polyno­mial time. Journal of Computer and System Sciences 25 (1982), 42-65.

[97] S. Mahaney. Sparse complete sets for NP: solution of a conjecture of Bermanand Hartmanis. Journal of Computer and System Sciences 25 (1982), 130-143.

[98] G. Markowsky, J.L. Carter, M.N. Wegman. Analysis of a universal class of hashfunctions. Proc. Mathematical Foundations of Computer Science, Lecture Notesin Computer Science 64, Springer, 1978,345-354.

[99] R. Mathon. A note on the graph isomorphism counting problem. Inform. Proc.Lett. 8 (1979), 131-132.

[100] A. Meyer, M. Paterson. With what frequency are apparently intractable prob­lems difficult? Tech. Report MITjLCSjTM-126, Lab. for Computer Science,MIT, Cambridge, 1979.

BIBLIOGRAPHY 155

(101] S. Micali (Ed). Advances in Computing Research. Vol 5: Randomness andComputation. JAI Press, 1989.

[102] G.L. Miller. Graph isomorphism, general remarks. Journal of Computer andSystem Sciences 18 (1979), 128-142.

[103] G.L. Miller. Isomorphism testing for graphs of bounded genus. Proc. 12th Ann.ACM Symposium on Theory of Computing, 1980, 225-235.

[104] R.E. Miller, J.W. Thatcher (eds.), Complexity of Computer Computations.Plenum Press, New York, 1972.

[105] M. Ogiwara, L.A. Hemachandra. A complexity theory for feasible closure prop­erties. Proc. 6th Structure in Complexity Theory Conference, IEEE, 1991, 16-29.

[106] M. Ogiwara, O. Watanabe. On polynomial-time bounded truth-table reducibil­ity of NP sets to sparse sets. SIAM Journal on Computing 20 (1991), 471-483.

[107] E.M. Palmer. Graphical Evolution: An Introduction to the Theory of RandomGraphs. Wiley, 1985.

[108] C.H. Papadimitriou and S.K. Zachos. Two remarks on the power of counting. 6thGI Conf. on Theoretical Computer Science, Lecture Notes in Computer Science145, 269-276, Springer-Verlag, 1983.

[109] V. Pratt. Every prime has a succinct certificate. SIAM Journal on Computing4 (1975), 214-220.

[110] M.O. Rabin. Probabilistic algorithms. In: J.F. Traub (ed.), Algorithms andComplexity, Academic Press, 1976.

[111] D. Ranjan. Personal communication. Boston, June 1992.

[112] R.C. Read, D.G. Corneil. The graph isomorphism disease. Journal of GraphTheory 1 (1977),339-363.

[113] H. Rogers. Theory of Recursive Functions and Effective Computability.McGraw-Hill, 1967.

[114] C.P. Schnorr. Optimal algorithms for self-transformable problems. Proc. Au­tomata, Languages, and Programming, ed. by S. Michaelson and R. Milner, Ed­inburgh Univ. Press 1976,322-337.

[115] C.P. Schnorr. On self-transformable cominatorial problems. Math. ProgrammingStudy, Vol. 14 (1982), 95-103.

[116] U. Schoning. A uniform approach to obtain diagonal sets in complexity classes.Theoretical Computer Science 18 (1982), 95-103.

[117] U. Sch6ning. A low and a high hierarchy within NP. Journal of Computer andSystem Sciences 27 (1983), 14-28.

[118] U. Sch6ning. Complexity and Structure. Lecture Notes in Computer Science211, Springer-Verlag, 1985.

156 BIBLIOGRAPHY

[119J U. Schoning. Netzwerkkomplexitiit, probabilistische Algorithmen und Rela­tivierungen, Habilitationsschrift, Universitat Stuttgart, 1985.

[120J U. Schoning. Robust oracle machines. Sympos. on Mathematical Foundationsof Computer Science, Lecture Notes in Computer Science 324, Springer-Verlag,1988, 93-106.

[121J U. Schoning. Graph isomorphism is in the low hierarchy. Journal of Computerand System Sciences, 37 (1988), 312-323.

[122J U. Schoning. Probabilistic complexity classes and lowness. Journal of Computerand System Sciences 39 (1989), 84-100.

[123J A.L. Selman. Promise problems and complexity classes. Information and Com­putation 78 (1988), 87-98.

[124J A. Shamir. IP = PSPACE. IEEE Symp. Foundations of Computer Science,1990, 11-15.

[125J J. Simon. On the difference between one and many. Pmc. Automata, Languages,and Progmmming, Lecture Notes in Computer Science 52, 480-491, Springer­Verlag, 1977.

[126J M. Sipser. A complexity theoretic approach to randomness. Proc. 15th ACMSymp. Theory of Computer Science, 1983, 330-335.

[127J L. J. Stockmeyer. The polynomial-time hierarchy. Theoretical Computer Sci­ence, 3 (1977), 1-22.

[128J R. Solovay, V. Strassen. A fast Monte-Carlo test for primality. SIAM Journalon Computing 6 (1977), 84-85.

[129J S. Toda. PP is as hard as the polynomial-time hierarchy. SIAM Journal onComputing 20 (1991),865-877.

[130J S. Toda. Computational Complexity of Counting Complexity Classes. DoctoralDissertation, Tokyo, 1990.

[131J L.G. Valiant. The relative complexity of checking and evaluating. Inform. Proc.Lett. 5 (1976), 20-23.

[132J L.G. Valiant. The complexity of computing the permanent. Theoretical Com­puter Science 8 (1979), 189-201.

[133J L.G. Valiant. The complexity of enumeration and reliability problems. SIAMJournal on Computing 8 (1979), 410-421.

[134J L.G. Valiant and V.V. Vazirani. NP is as easy as detecting unique solutions.Theoretical Computer Science 47 (1986), 85-93.

[135] J. van Leeuwen. Graph algorithms. In: Algorithms and Complexity, Handbookof Theoretical Computer Science, Vol. A, edited by J. van Leeuwen, Elsevier andMIT-Press, 1990, 525-632.

[136] N.K. Vereshchagin. On the power of PP. Pmc. 7th Structure in ComplexityTheory Conference, IEEE, 1992, 138-143.

BIBLIOGRAPHY 157

[137] K.W. Wagner. The complexity of combinatorial problems with succinct inputrepresentation. Acta Informatica 23 (1986), 325-356.

[138] 1. Wegener. The Complexity of Boolean Functions. Wiley-Teubner Series inComputer Science, 1987.

[139] C. Wrathall. Complete sets and the polynomial-time hierarchy. TheoreticalComputer Science 3 (1977), 23-33.

[140] S. Zachos. Robustness of probabilistic computational complexity classes underdefinitional perturbations. Information and Control 54 (1982), 143-154.

[141] S. Zachos. Probabilistic quantifiers, adversaries, and complexity classes: anoverview. Pmc. 1st Structure in Complexity Theory, Lecture Notes in ComputerScience 223, Springer- Verlag, 1986, 383-400.

[142] S. Zachos. A decisive characterization of BPP. Information and Control 69(1986), 125-135.

[143] S. Zachos, M. Fiirer. Probabilistic quantifiers vs. distrustful adversaries. Proc.Foundations of Software Technology and Theoretical Computer Science, LectureNotes in Computer Science 287, Springer-Verlag, 1987,443-455.

Index

accept 15adjacent 5alphabet 10AM 80and-function 44Arthur 79Arthur-Merlin game 52Arthur-Merlin hierarchy 79automorphism 7automorphism problem 7

binomial distribution 70Boolean circuit 92Boolean function 92bounded error 68bounded truth-table reduction 116BP-operator 74BPP 68

Cayley diagram 18certificate 1Chebyshev's inequality 38, 81, 127check 15Chernoff bound 70circuit 92circuit family 93code 1collapse 55, 84communication channel 60complete 23complexity class 13composition 9computation model 12computation problem 11conditional instruction 19configuration 95conjunctive reduction 116, 125construction problem 25Cook's hypothesis 55coset 9, 31

counting class 4counting problem 11, 12

decision problem 11degree 5, 20deterministic algorithm 15directed graph 17, 18disjunctive normal form 105disjunctive reduction 21,44,50, 110

edge 5efficient 14encoding 13

feasible 15fixpoint 10, 46

game 52i-complete 23, 88gate 92generating function 70GI-complete 19graph 5graph automorphism problem 3, 7graph isomorphism problem 1, 5Graph Reconstruction Conjecture 146graph union 8group isomorphism 18guess 15

halting problem 94hash function 127high 87high hierarchy 87highness 86

instance 12instantaneous description 95interactive proof system 58intermediate 2, 82, 86invariant 1

INDEX

IP 59isomorphic 1, 5isomorphic graphs 11isomorphism 5

isomorphism problem 5

label 7labeling algori thm 1language 10length 10lexicographical order 28, 107logarithmic cost 13low 84,87low hierarchy 87lowness 84LWPP 144

MA 83MA' 103majority reducible 75majority vote 69many-one reducibility 17Merlin 79multiple edges 18

node 5non-recursive 94non-uniform 91nondeterministic algorithm 15not-function 122NP 14NP-complete 23NP-equivalent 44

one-letter alphabet 85operator 53, 74or-function 44oracle 20, 56, 120orbit 9output gate 92

P 14pairwise independence 37parity function 36parity problem 119parsimonious transformation 121partial decision problem 39permutation 1, 5, 7

permutation group 8PH 55planar graph 2, 14player 51polynomial hierarchy 52, 54polynomial size circuits 4, 91, 93polynomial time 13prefix search 105primes 3, 24, 45, 69, 118, 123private coins 79probabilistic algorithm 66probabilistic construction 77probability amplification 60, 71probability distribution 66program checker 64promise problem 39protocol 60Prover 53, 60PSC 91PSPACE 56public coins 79publishable proof 82

quantifier 53quantifier simulation 78

RAM 95random access machine 12, 95random coin tosses 73random guess 59randomized reduction 35random move 52random number generator 35random permutation 60random reduction 35random variable 35, 59reducibility 16reflexive 23reject 15rigid 7round 59RP 69running time 13

Sat 24,25satisfiabili ty 26search circuit 99search problem 11

159

160

self-computable solutions 25self-inverse 43, 122self-reducible 25, 116semi-group isomorphism 19SemiGroupIso 19solution 11sparse 4, 105SPARSE 105sparse set 91stabilizer 10strong reducibility 87subgraph isomorphism 24subgroup 9subroutine 19

Taut 24tournament graph 3, 118, 122, 123transformation 17transitive 23transversal 9tree 6tree isomorphism 6truth table 44Turing machine 12,94Turing reducibility 17

undirected 5uniform 91uniform distribution 59, 74unique solution 33, 39universal hashing 36

valid computation 15variance 37Verifier 53, 60vertex 5

winning predicate 53winning strategy 51, 53witness 98, 99

XOR 36,40

zero-knowledge 65

INDEX


Recommended