Default Cover Image

Proceedings 35th Annual Symposium on Foundations of Computer Science

Nov. 20 1994 to Nov. 22 1994

Santa Fe, NM, USA

ISBN: 0-8186-6580-7

Table of Contents

Papers
IP over connection-oriented networks and distributional pagingFull-text access may be available. Sign in or learn about subscription options.pp. 424-434
Papers
On-line admission control and circuit routing for high performance computing and communicationFull-text access may be available. Sign in or learn about subscription options.pp. 412-423
Papers
A theory of competitive analysis for distributed algorithmsFull-text access may be available. Sign in or learn about subscription options.pp. 401-411
Papers
Beyond competitive analysis [on-line algorithms]Full-text access may be available. Sign in or learn about subscription options.pp. 394-400
Papers
Program result-checking: a theory of testing meets a test of theoryFull-text access may be available. Sign in or learn about subscription options.pp. 382-392
Papers
Fast and feasible periodic sorting networks of constant depthFull-text access may be available. Sign in or learn about subscription options.pp. 369-380
Papers
Scheduling multithreaded computations by work stealingFull-text access may be available. Sign in or learn about subscription options.pp. 356-368
Papers
Nearly tight bounds for wormhole routingFull-text access may be available. Sign in or learn about subscription options.pp. 347-355
Papers
On the design of reliable Boolean circuits that contain partially unreliable gatesFull-text access may be available. Sign in or learn about subscription options.pp. 332-346
Papers
Products and help bits in decision treesFull-text access may be available. Sign in or learn about subscription options.pp. 318-329
Papers
Efficient oblivious branching programs for threshold functionsFull-text access may be available. Sign in or learn about subscription options.pp. 309-317
Papers
A lower bound for the monotone depth of connectivityFull-text access may be available. Sign in or learn about subscription options.pp. 302-308
Papers
On the robustness of functional equationsFull-text access may be available. Sign in or learn about subscription options.pp. 288-299
Papers
Randomness-efficient oblivious samplingFull-text access may be available. Sign in or learn about subscription options.pp. 276-287
Papers
Computing with very weak random sourcesFull-text access may be available. Sign in or learn about subscription options.pp. 264-275
Papers
(De)randomized construction of small sample spaces in /spl Nscr//spl Cscr/Full-text access may be available. Sign in or learn about subscription options.pp. 252-263
Papers
Local optimization of global objectives: competitive distributed deadlock resolution and resource allocationFull-text access may be available. Sign in or learn about subscription options.pp. 240-249
Papers
Fast and lean self-stabilizing asynchronous protocolsFull-text access may be available. Sign in or learn about subscription options.pp. 226-239
Papers
The load, capacity and availability of quorum systemsFull-text access may be available. Sign in or learn about subscription options.pp. 214-225
Papers
Rapid rumor ramification: approximating the minimum broadcast timeFull-text access may be available. Sign in or learn about subscription options.pp. 202-213
Papers
Estimating the size of the transitive closure in linear timeFull-text access may be available. Sign in or learn about subscription options.pp. 190-200
Papers
Maximum (s,t)-flows in planar networks in O(|V|log|V|) timeFull-text access may be available. Sign in or learn about subscription options.pp. 178-189
Papers
Long tours and short superstringsFull-text access may be available. Sign in or learn about subscription options.pp. 166-177
Papers
Finding the k shortest pathsFull-text access may be available. Sign in or learn about subscription options.pp. 154-165
Papers
Efficient average-case algorithms for the modular groupFull-text access may be available. Sign in or learn about subscription options.pp. 143-152
Papers
The complexity of the membership problem for 2-generated commutative semigroups of rational matricesFull-text access may be available. Sign in or learn about subscription options.pp. 135-142
Papers
Algorithms for quantum computation: discrete logarithms and factoringFull-text access may be available. Sign in or learn about subscription options.pp. 124-134
Papers
On the power of quantum computationFull-text access may be available. Sign in or learn about subscription options.pp. 116-123
Papers
Algorithmic number theory-the complexity contributionFull-text access may be available. Sign in or learn about subscription options.pp. 88-113
Papers
The power of team exploration: two robots can learn unlabeled directed graphsFull-text access may be available. Sign in or learn about subscription options.pp. 75-85
Papers
PAC learning with irrelevant attributesFull-text access may be available. Sign in or learn about subscription options.pp. 64-74
Papers
On learning discretized geometric conceptsFull-text access may be available. Sign in or learn about subscription options.pp. 54-63
Papers
An efficient membership-query algorithm for learning DNF with respect to the uniform distributionFull-text access may be available. Sign in or learn about subscription options.pp. 42-53
Papers
A note on the /spl theta/ number of Lovasz and the generalized Delsarte boundFull-text access may be available. Sign in or learn about subscription options.pp. 36-39
Papers
Polynomial time randomised approximation schemes for the Tutte polynomial of dense graphsFull-text access may be available. Sign in or learn about subscription options.pp. 24-35
Papers
Finding separator cuts in planar graphs within twice the optimalFull-text access may be available. Sign in or learn about subscription options.pp. 14-23
Papers
Approximate graph coloring by semidefinite programmingFull-text access may be available. Sign in or learn about subscription options.pp. 2-13
Papers
On rank vs. communication complexityFull-text access may be available. Sign in or learn about subscription options.pp. 831-836
Papers
On syntactic versus computational views of approximabilityFull-text access may be available. Sign in or learn about subscription options.pp. 819-830
Papers
Measure on small complexity classes, with applications for BPPFull-text access may be available. Sign in or learn about subscription options.pp. 807-818
Papers
Lower bounds on Hilbert's Nullstellensatz and propositional proofsFull-text access may be available. Sign in or learn about subscription options.pp. 794-806
Papers
Tractability of parameterized completion problems on chordal and interval graphs: minimum fill-in and physical mappingFull-text access may be available. Sign in or learn about subscription options.pp. 780-791
Papers
Optimal evolutionary tree comparison by sparse dynamic programmingFull-text access may be available. Sign in or learn about subscription options.pp. 770-779
Papers
Maximum agreement subtree in a set of evolutionary trees-metrics and efficient algorithmsFull-text access may be available. Sign in or learn about subscription options.pp. 758-769
Papers
Fully dynamic cycle-equivalence in graphsFull-text access may be available. Sign in or learn about subscription options.pp. 744-755
Papers
Optimizing static calendar queuesFull-text access may be available. Sign in or learn about subscription options.pp. 732-743
Papers
Multi-index hashing for information retrievalFull-text access may be available. Sign in or learn about subscription options.pp. 722-731
Papers
A new efficient radix sortFull-text access may be available. Sign in or learn about subscription options.pp. 714-721
Papers
Randomized and deterministic algorithms for geometric spanners of small diameterFull-text access may be available. Sign in or learn about subscription options.pp. 703-712
Papers
More output-sensitive geometric algorithmsFull-text access may be available. Sign in or learn about subscription options.pp. 695-702
Papers
Parallel algorithms for higher-dimensional convex hullsFull-text access may be available. Sign in or learn about subscription options.pp. 683-694
Papers
A spectral approach to lower boundsFull-text access may be available. Sign in or learn about subscription options.pp. 674-682
Papers
Markov chains and polynomial time algorithmsFull-text access may be available. Sign in or learn about subscription options.pp. 656-671
Papers
Set constraints with projections are in NEXPTIMEFull-text access may be available. Sign in or learn about subscription options.pp. 642-653
Papers
On the combinatorial and algebraic complexity of quantifier eliminationFull-text access may be available. Sign in or learn about subscription options.pp. 632-641
Papers
A polynomial-time algorithm for deciding equivalence of normed context-free processesFull-text access may be available. Sign in or learn about subscription options.pp. 623-631
Papers
Graph connectivity and monadic NPFull-text access may be available. Sign in or learn about subscription options.pp. 614-622
Papers
Priority encoding transmissionFull-text access may be available. Sign in or learn about subscription options.pp. 604-612
Papers
Tail bounds for occupancy and the satisfiability threshold conjectureFull-text access may be available. Sign in or learn about subscription options.pp. 592-603
Papers
The geometry of graphs and some of its algorithmic applicationsFull-text access may be available. Sign in or learn about subscription options.pp. 577-591
Papers
Expander codesFull-text access may be available. Sign in or learn about subscription options.pp. 566-576
Papers
On the computation of Boolean functions by analog circuits of bounded fan-inFull-text access may be available. Sign in or learn about subscription options.pp. 553-564
Papers
Complexity lower bounds for computation trees with elementary transcendental function gatesFull-text access may be available. Sign in or learn about subscription options.pp. 548-552
Papers
An O(n/sup 1+/spl epsiv// log b) algorithm for the complex roots problemFull-text access may be available. Sign in or learn about subscription options.pp. 540-547
Papers
Algebraic computation trees in characteristic p>0Full-text access may be available. Sign in or learn about subscription options.pp. 534-539
Papers
The localization problem for mobile robotsFull-text access may be available. Sign in or learn about subscription options.pp. 521-531
Papers
Motion planning on a graphFull-text access may be available. Sign in or learn about subscription options.pp. 511-520
Papers
Randomized simplex algorithms on Klee-Minty cubesFull-text access may be available. Sign in or learn about subscription options.pp. 502-510
Papers
"Go with the winners" algorithmsFull-text access may be available. Sign in or learn about subscription options.pp. 492-501
Papers
Reducibility and completeness in multi-party private computationsFull-text access may be available. Sign in or learn about subscription options.pp. 478-489
Papers
On the complexity of bounded-interaction and noninteractive zero-knowledge proofsFull-text access may be available. Sign in or learn about subscription options.pp. 466-477
Papers
On monotone formula closure of SZKFull-text access may be available. Sign in or learn about subscription options.pp. 454-465
Papers
CS proofsFull-text access may be available. Sign in or learn about subscription options.pp. 436-453
Papers
Proceedings 35th Annual Symposium on Foundations of Computer ScienceFreely available from IEEE.pp. 0_1-0_1
Showing 74 out of 74