default search action
SIAM Journal on Computing, Volume 17
Volume 17, Number 1, February 1988
- Yehoshua Sagiv:
On Bounded Database Schemes and Bounded Horn-Clause Programs. 1-22 - Donald K. Friesen, Frederick S. Kuhl:
Analysis of a Hybrid Algorithm for Packing Unequal Bins. 23-40 - Sumio Masuda, Kazuo Nakajima:
An Optimal Algorithm for Finding a Maximum Independent Set of a Circular-Arc Graph. 41-52 - Daniel Bienstock, Clyde L. Monma:
On the Complexity of Covering Vertices by Faces in a Planar Graph. 53-76 - Jyrki Katajainen, Jan van Leeuwen, Martti Penttonen:
Fast Simulation of Turing Machines by Random Access Machines. 77-88 - Masanori Fushimi:
Designing a Uniform Random Number Generator Whose Subsequences are k-Distributed. 89-99 - Ulrich Faigle, György Turán:
Sorting and Recognition Problems for Ordered Sets. 100-113 - David M. Nicol:
Expected Performance of m-Solution Backtracking. 114-127 - Richard Cole, Uzi Vishkin:
Approximate Parallel Scheduling. Part I: The Basic Technique with Applications to Optimal Parallel List Ranking in Logarithmic Time. 128-142 - Robert Endre Tarjan, Christopher J. Van Wyk:
An O(n log log n)-Time Algorithm for Triangulating a Simple Polygon. 143-178
Volume 17, Number 2, April 1988
- Eric Bach:
How to Generate Factored Random Numbers. 179-193 - Werner Alexi, Benny Chor, Oded Goldreich, Claus-Peter Schnorr:
RSA and Rabin Functions: Certain Parts are as Hard as the Whole. 194-209 - Charles H. Bennett, Gilles Brassard, Jean-Marc Robert:
Privacy Amplification by Public Discussion. 210-229 - Benny Chor, Oded Goldreich:
Unbiased Bits from Sources of Weak Randomness and Probabilistic Communication Complexity. 230-261 - Alan M. Frieze, Johan Håstad, Ravi Kannan, J. C. Lagarias, Adi Shamir:
Reconstructing Truncated Integer Variables Satisfying Linear Congruences. 262-280 - Shafi Goldwasser, Silvio Micali, Ronald L. Rivest:
A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks. 281-308 - Joachim Grollmann, Alan L. Selman:
Complexity Measures for Public-Key Cryptosystems. 309-335 - Johan Håstad:
Solving Simultaneous Modular Equations of Low Degree. 336-341 - J. C. Lagarias, James A. Reeds:
Unique Extrapolation of Polynomial Recurrences. 342-362 - Douglas L. Long, Avi Wigderson:
The Discrete Logarithm Hides O(log n) Bits. 363-372 - Michael Luby, Charles Rackoff:
How to Construct Pseudorandom Permutations from Pseudorandom Functions. 373-386 - Carl Pomerance, Jeffrey W. Smith, Randy Tuler:
A Pipeline Architecture for Factoring Large Integers with the Quadratic Sieve Algorithm. 387-403 - John H. Reif, J. D. Tygar:
Efficient Parallel Pseudorandom Number Generation. 404-411 - Silvio Micali, Charles Rackoff, Bob Sloan:
The Notion of Security for Probabilistic Cryptosystems. 412-426
Volume 17, Number 3, June 1988
- Bernard Chazelle:
A Functional Approach to Data Structures and Its Use in Multidimensional Searching. 427-462 - Philip N. Klein, John H. Reif:
Parallel Time O(log n) Acceptance of Deterministic CFLs on an Exclusive-Write P-RAM. 463-485 - Xin He, Yaacov Yesha:
A Nearly Optimal Parallel Algorithm for Constructing Depth First Spanning Trees in Planar Graphs. 486-491 - Boris G. Pittel, Jenn-Hwa Yu:
On Search Times for Early-Insertion Coalesced Hashing. 492-503 - Ronald V. Book, Pekka Orponen, David A. Russo, Osamu Watanabe:
Lowness Properties of Sets in the Exponential-Time Hierarchy. 504-516 - Andrew Chi-Chih Yao:
Monotone Bipartite Graph Properties are Evasive. 517-520 - Alessandro D'Atri, Marina Moscarini:
Distance-Hereditary Graphs, Steiner Trees, and Connected Domination. 521-538 - Dorit S. Hochbaum, David B. Shmoys:
A Polynomial Approximation Scheme for Scheduling on Uniform Processors: Using the Dual Approximation Approach. 539-551 - Dan Gusfield:
A Graph Theoretic Approach to Statistical Data Security. 552-571 - Pravin M. Vaidya:
Minimum Spanning Trees in k-Dimensional Space. 572-582 - Alan Siegel, Danny Dolev:
Some Geometry for General River Routing. 583-605 - Faith E. Fich, Prabhakar Ragde, Avi Wigderson:
Relations Between Concurrent-Write Models of Parallel Computation. 606-627 - Timothy J. Long:
Erratum: On Restricting the Size of Oracles Compared with Restricting Access to Oracles. 628
Volume 17, Number 4, August 1988
- Nachum Dershowitz, Leo Marcus, Andrzej Tarlecki:
Existence, Uniqueness, and Construction of Rewrite Systems. 629-639 - John W. John:
A New Lower Bound for the Set-Partitioning Problem. 640-647 - Robert Schaback:
On the Expected Sublinearity of the Boyer-Moore Algorithm. 648-658 - Paul M. B. Vitányi:
Locality, Communication, and Interconnect Length in Multicomputers. 659-672 - Ludek Kucera, Vera Trnková:
Isomorphism Testing of Unary Algebras. 673-686 - Gary L. Miller, Vijaya Ramachandran, Erich L. Kaltofen:
Efficient Parallel Evaluation of Straight-Line Code and Arithmetic Circuits. 687-695 - S. S. Ravi, Errol L. Lloyd:
The Complexity of Near-Optimal Programmable Logic Array Folding. 696-710 - Cynthia Dwork, Paris C. Kanellakis, Larry J. Stockmeyer:
Parallel Algorithms for Term Matching. 711-731 - David Avis, C. W. Lai:
The Probabilistic Analysis of a Heuristic for the Assignment Problem. 732-741 - Dan Gusfield:
The Structure of the Stable Roommate Problem: Efficient Representation and Enumeration of All Stable Assignments. 742-769 - Richard Cole:
Parallel Merge Sort. 770-785 - Etienne Grandjean:
A Natural NP-Complete Problem with a Nontrivial Lower Nound. 786-809 - Harold N. Gabow:
Scheduling UET Systems on Two Uniform Processors and Length Two Pipelines. 810-829 - Kenneth L. Clarkson:
A Randomized Algorithm for Closest-Point Queries. 830-847
Volume 17, Number 5, October 1988
- Mikhail J. Atallah, S. Rao Kosaraju:
Efficient Solutions to Some Transportation Problems with Applications to Minimizing Robot Arm Travel. 849-869 - Herbert Edelsbrunner, Steven Skiena:
Probing Convex Polygons with X-Rays. 870-882 - Richard M. Karp, Rajeev Motwani, Prabhakar Raghavan:
Deferred Data Structuring. 883-902 - Ronald V. Book, Ker-I Ko:
On Sets Truth-Table Reducible to Sparse Sets. 903-919 - J. Scott Provan:
An Approximation Scheme for Finding Steiner Trees with Obstacles. 920-934 - Neil Immerman:
Nondeterministic Space is Closed Under Complementation. 935-938 - Stephen L. Bloom, Zoltán Ésik:
Varieties of Iteration Theories. 939-966 - Martin E. Dyer, Alan M. Frieze:
On the Complexity of Computing the Volume of a Polyhedron. 967-974 - Cynthia Dwork, David Peleg, Nicholas Pippenger, Eli Upfal:
Fault Tolerance in Networks of Bounded Degree. 975-988 - Alan L. Selman:
Natural Self-Reducible Sets. 989-996 - Matthew Hennessy:
Axiomatising Finite Concurrent Processes. 997-1017 - Zevi Miller:
A Linear Algorithm for Topological Bandwidth in Degree-Three Trees. 1018-1035 - Paolo Zellini:
Optimal Bounds for Solving Tridiagonal Systems with Preconditioning. 1036-1043 - Colin McDiarmid:
Average-Case Lower Bounds for Searching. 1044-1060 - Robert Endre Tarjan, Christopher J. Van Wyk:
Erratum: An O(n log log n)-Time Algorithm for Triangulating a Simple Polygon. 1061
Volume 17, Number 6, December 1988
- Thomas Lengauer, Egon Wanke:
Efficient Solution of Connectivity Problems on Hierarchically Defined Graphs. 1063-1080 - Michael Ben-Or, Ephraim Feig, Dexter Kozen, Prasoon Tiwari:
A Fast Parallel Algorithm for Determining all Roots of a Polynomial with Real Roots. 1081-1092 - Kurt Mehlhorn, Stefan Näher, Helmut Alt:
A Lower Bound on the Complexity of the Union-Split-Find Problem. 1093-1102 - Robert J. T. Morris, Wing Shing Wong:
A Short-Term Neural Network Memory. 1103-1118 - Béla Bollobás, Graham R. Brightwell:
Transitive Orientations of Graphs. 1119-1133 - Jan A. Bergstra, Jan Willem Klop, Ernst-Rüdiger Olderog:
Readies and Failures in the Algebra of Communicating Processes. 1134-1177 - Noga Alon, Yossi Azar:
The Average Complexity of Deterministic and Randomized Parallel Comparison-Sorting Algorithms. 1178-1192 - Eric Allender, Roy S. Rubinstein:
P-Printable Sets. 1193-1202 - William J. Knight:
Search in an Ordered Array Having Variable Probe Cost. 1203-1214 - T. Yung Kong, David M. Mount, A. W. Roscoe:
The Decomposition of a Rectangle into Rectangles of Minimal Perimeter. 1215-1231 - Jin-yi Cai, Thomas Gundermann, Juris Hartmanis, Lane A. Hemachandra, Vivian Sewelson, Klaus W. Wagner, Gerd Wechsung:
The Boolean Hierarchy I: Structural Properties. 1232-1252 - Baruch Schieber, Uzi Vishkin:
On Finding Lowest Common Ancestors: Simplification and Parallelization. 1253-1262 - Jim Kadin:
The Polynomial Time Hierarchy Collapses if the Boolean Hierarchy Collapses. 1263-1282
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.