Default Cover Image

2014 IEEE Conference on Computational Complexity (CCC)

June 11 2014 to June 13 2014

Vancouver, BC, Canada

Table of Contents

[Title page i]Freely available from IEEE.pp. i-i
[Title page iii]Freely available from IEEE.pp. iii-iii
[Copyright notice]Freely available from IEEE.pp. iv-iv
Table of contentsFreely available from IEEE.pp. v-vii
PrefaceFreely available from IEEE.pp. viii-viii
Committee ListsFreely available from IEEE.pp. ix-ix
ReviewersFreely available from IEEE.pp. xi-xii
Goldreich's PRG: Evidence for Near-Optimal Polynomial StretchFull-text access may be available. Sign in or learn about subscription options.pp. 1-12
On the Power of Symmetric LP and SDP RelaxationsFull-text access may be available. Sign in or learn about subscription options.pp. 13-21
Quantum Algorithms for Learning Symmetric Juntas via Adversary BoundFull-text access may be available. Sign in or learn about subscription options.pp. 22-31
On Physical Problems that are Slightly More Difficult than QMAFull-text access may be available. Sign in or learn about subscription options.pp. 32-43
AM with Multiple MerlinsFull-text access may be available. Sign in or learn about subscription options.pp. 44-55
Counting List Matrix Partitions of GraphsFull-text access may be available. Sign in or learn about subscription options.pp. 56-65
Counting the Number of Perfect Matchings in K5-Free GraphsFull-text access may be available. Sign in or learn about subscription options.pp. 66-77
Hardness of Finding Independent Sets in 2-Colorable Hypergraphs and of Satisfiable CSPsFull-text access may be available. Sign in or learn about subscription options.pp. 78-89
Locally Dense CodesFull-text access may be available. Sign in or learn about subscription options.pp. 90-97
On the Closest Vector Problem with a Distance GuaranteeFull-text access may be available. Sign in or learn about subscription options.pp. 98-109
Algorithms for Group Isomorphism via Group Extensions and CohomologyFull-text access may be available. Sign in or learn about subscription options.pp. 110-119
Low Influence Functions over Slices of the Boolean Hypercube Depend on Few CoordinatesFull-text access may be available. Sign in or learn about subscription options.pp. 120-131
On the Sum of L1 InfluencesFull-text access may be available. Sign in or learn about subscription options.pp. 132-143
A Composition Theorem for Parity Kill NumberFull-text access may be available. Sign in or learn about subscription options.pp. 144-154
Recent Progress on Lower Bounds for Arithmetic CircuitsFull-text access may be available. Sign in or learn about subscription options.pp. 155-160
Hitting Sets for Low-Degree Polynomials with Optimal DensityFull-text access may be available. Sign in or learn about subscription options.pp. 161-168
Equivalence of Polynomial Identity Testing and Deterministic Multivariate Polynomial FactorizationFull-text access may be available. Sign in or learn about subscription options.pp. 169-180
Noncommutative Determinant is Hard: A Simple Proof Using an Extension of Barrington's TheoremFull-text access may be available. Sign in or learn about subscription options.pp. 181-187
Direct Product TestingFull-text access may be available. Sign in or learn about subscription options.pp. 188-196
A Parallel Repetition Theorem for Entangled Projection GamesFull-text access may be available. Sign in or learn about subscription options.pp. 197-208
A Parallel Repetition Theorem for Entangled Two-Player One-Round Games under Product DistributionsFull-text access may be available. Sign in or learn about subscription options.pp. 209-216
A Pseudorandom Generator for Polynomial Threshold Functions of Gaussian with Subpolynomial Seed LengthFull-text access may be available. Sign in or learn about subscription options.pp. 217-228
Deterministic Approximate Counting for Juntas of Degree-2 Polynomial Threshold FunctionsFull-text access may be available. Sign in or learn about subscription options.pp. 229-240
Linear List-Approximation for Short Programs (or the Power of a Few Random Bits)Full-text access may be available. Sign in or learn about subscription options.pp. 241-247
Algorithms for Circuits and Circuits for AlgorithmsFull-text access may be available. Sign in or learn about subscription options.pp. 248-261
Mining Circuit Lower Bound Proofs for Meta-algorithmsFull-text access may be available. Sign in or learn about subscription options.pp. 262-273
Unifying Known Lower Bounds via Geometric Complexity TheoryFull-text access may be available. Sign in or learn about subscription options.pp. 274-285
Narrow Proofs May Be Maximally LongFull-text access may be available. Sign in or learn about subscription options.pp. 286-297
Overlays and Limited Memory CommunicationFull-text access may be available. Sign in or learn about subscription options.pp. 298-308
Lower Bounds for Testing Properties of Functions over Hypergrid DomainsFull-text access may be available. Sign in or learn about subscription options.pp. 309-320
Fourier Concentration from ShrinkageFull-text access may be available. Sign in or learn about subscription options.pp. 321-332
Author indexFreely available from IEEE.pp. 333-333
[Publisher's information]Freely available from IEEE.pp. 334-334
Showing 41 out of 41