Results 1  10
of
27,136
Exponential Sums and Circuits with a Single Threshold Gate and ModGates
 Theory Comput. Systems
, 1999
"... Consider circuits consisting of a threshold gate at the top, Modm gates at the next level (for a fixed m), and polylog fanin AND gates at the lowest level. It is a difficult and important open problem to obtain exponential lower bounds for such circuits. Here we prove exponential lower bounds for r ..."
Abstract

Cited by 13 (1 self)
 Add to MetaCart
Consider circuits consisting of a threshold gate at the top, Modm gates at the next level (for a fixed m), and polylog fanin AND gates at the lowest level. It is a difficult and important open problem to obtain exponential lower bounds for such circuits. Here we prove exponential lower bounds
Discrepancy and the power of bottom fanin in depththree circuits
 In Proc. of the 48th Symposium on Foundations of Computer Science (FOCS
, 2007
"... We develop a new technique of proving lower bounds for the randomized communication complexity of boolean functions in the multiparty ‘Number on the Forehead ’ model. Our method is based on the notion of voting polynomial degree of functions and extends the DegreeDiscrepancy Lemma in the recent wor ..."
Abstract

Cited by 26 (2 self)
 Add to MetaCart
work of Sherstov [24]. Using this we prove that depth three circuits consisting of a MAJORITY gate at the output, gates computing arbitrary symmetric function at the second layer and arbitrary gates of bounded fanin at the base layer i.e. circuits of type MAJ ◦ SYMM ◦ ANY O(1) cannot simulate
On the size of depththree boolean circuits for computing multilinear functions
 Electronic Coll. on Computational Complexity (ECCC
"... We propose that multilinear functions of relatively low degree over GF(2) may be good candidates for obtaining exponential1 lower bounds on the size of constantdepth Boolean circuits (computing explicit functions). Specifically, we propose to move gradually from linear functions to multilinear on ..."
Abstract

Cited by 3 (0 self)
 Add to MetaCart
to nested composition and yields depththree Boolean circuits via a ”guessandverify ” paradigm. The corresponding restricted models of circuits are called Dcanonical and NDcanonical, respectively. Our main results are (1) a generic upper bound on the size of depththree Dcanonical
Algebraic methods in the theory of lower bounds for boolean circuit complexity
 In Proceedings of the 19th Annual ACM Symposium on Theory of Computing, STOC ’87
, 1987
"... kbstr act We use algebraic methods to get lower bounds for complexity of different functions based on constant depth unbounded fanin circuits with the given set of basic operations. In particular, we prove that depth k circuits with gates NOT, OR and MOD, where p is a prime require Ezp(O(n’)) gates ..."
Abstract

Cited by 331 (1 self)
 Add to MetaCart
kbstr act We use algebraic methods to get lower bounds for complexity of different functions based on constant depth unbounded fanin circuits with the given set of basic operations. In particular, we prove that depth k circuits with gates NOT, OR and MOD, where p is a prime require Ezp
Simulating Physics with Computers
 SIAM Journal on Computing
, 1982
"... A digital computer is generally believed to be an efficient universal computing device; that is, it is believed able to simulate any physical computing device with an increase in computation time of at most a polynomial factor. This may not be true when quantum mechanics is taken into consideration. ..."
Abstract

Cited by 601 (1 self)
 Add to MetaCart
A digital computer is generally believed to be an efficient universal computing device; that is, it is believed able to simulate any physical computing device with an increase in computation time of at most a polynomial factor. This may not be true when quantum mechanics is taken into consideration. This paper considers factoring integers and finding discrete logarithms, two problems which are generally thought to be hard on a classical computer and have been used as the basis of several proposed cryptosystems. Efficient randomized algorithms are given for these two problems on a hypothetical quantum computer. These algorithms take a number of steps polynomial in the input size, e.g., the number of digits of the integer to be factored. AMS subject classifications: 82P10, 11Y05, 68Q10. 1 Introduction One of the first results in the mathematics of computation, which underlies the subsequent development of much of theoretical computer science, was the distinction between computable and ...
Privacy Preserving Data Mining
 JOURNAL OF CRYPTOLOGY
, 2000
"... In this paper we address the issue of privacy preserving data mining. Specifically, we consider a scenario in which two parties owning confidential databases wish to run a data mining algorithm on the union of their databases, without revealing any unnecessary information. Our work is motivated b ..."
Abstract

Cited by 512 (8 self)
 Add to MetaCart
In this paper we address the issue of privacy preserving data mining. Specifically, we consider a scenario in which two parties owning confidential databases wish to run a data mining algorithm on the union of their databases, without revealing any unnecessary information. Our work is motivated by the need to both protect privileged information and enable its use for research or other purposes. The
Wireless Communications
, 2005
"... Copyright c ○ 2005 by Cambridge University Press. This material is in copyright. Subject to statutory exception and to the provisions of relevant collective licensing agreements, no reproduction of any part may take place without the written permission of Cambridge University ..."
Abstract

Cited by 1129 (32 self)
 Add to MetaCart
Copyright c ○ 2005 by Cambridge University Press. This material is in copyright. Subject to statutory exception and to the provisions of relevant collective licensing agreements, no reproduction of any part may take place without the written permission of Cambridge University
Planning Algorithms
, 2004
"... This book presents a unified treatment of many different kinds of planning algorithms. The subject lies at the crossroads between robotics, control theory, artificial intelligence, algorithms, and computer graphics. The particular subjects covered include motion planning, discrete planning, planning ..."
Abstract

Cited by 1108 (51 self)
 Add to MetaCart
This book presents a unified treatment of many different kinds of planning algorithms. The subject lies at the crossroads between robotics, control theory, artificial intelligence, algorithms, and computer graphics. The particular subjects covered include motion planning, discrete planning, planning under uncertainty, sensorbased planning, visibility, decisiontheoretic planning, game theory, information spaces, reinforcement learning, nonlinear systems, trajectory planning, nonholonomic planning, and kinodynamic planning.
Results 1  10
of
27,136