Default Cover Image

23rd Annual Symposium on Foundations of Computer Science (sfcs 1982)

Nov. 3 1982 to Nov. 5 1982

ISSN: 0272-5428

Table of Contents

A complexity theory for unbounded fan-in parallelismFull-text access may be available. Sign in or learn about subscription options.pp. 1-13
The computational complexity of simultaneous Diophantine approximation problemsFull-text access may be available. Sign in or learn about subscription options.pp. 32-39
Papers
A complexity theory for unbounded fan-in parallelismFull-text access may be available. Sign in or learn about subscription options.pp. 1-13
Papers
On the complexity of unique solutionsFull-text access may be available. Sign in or learn about subscription options.pp. 14-20
A polynomial time algorithm for breaking the basic Merkle-Hellman cryptosystemFull-text access may be available. Sign in or learn about subscription options.pp. 145-152
Deciding the inequivalence of context-free grammars with 1-letter terminal alphabet is S2p-completeFull-text access may be available. Sign in or learn about subscription options.pp. 21-31
Papers
A natural encoding scheme proved probabilistic polynomial completeFull-text access may be available. Sign in or learn about subscription options.pp. 40-44
Storing a sparse table with O(1) worst case access timeFull-text access may be available. Sign in or learn about subscription options.pp. 165-169
Papers
Three applications of Kolmogorov-complexityFull-text access may be available. Sign in or learn about subscription options.pp. 45-52
Papers
On-line simulation of k+1 tapes by k tapes requires nonlinear timeFull-text access may be available. Sign in or learn about subscription options.pp. 53-56
Papers
A polynomial-time reduction from bivariate to univariate integral polynomial factorizationFull-text access may be available. Sign in or learn about subscription options.pp. 57-64
Generic transformation of data structuresFull-text access may be available. Sign in or learn about subscription options.pp. 186-195
Papers
Fast parallel matrix and GCD computationsFull-text access may be available. Sign in or learn about subscription options.pp. 65-71
Papers
Generalised symmetries of polynomials in algebraic complexityFull-text access may be available. Sign in or learn about subscription options.pp. 72-79
Papers
Theory and application of trapdoor functionsFull-text access may be available. Sign in or learn about subscription options.pp. 80-91
Papers
An application of number theory to the organization of raster-graphics memoryFull-text access may be available. Sign in or learn about subscription options.pp. 92-99
Papers
An application of higher reciprocity to computational number theoryFull-text access may be available. Sign in or learn about subscription options.pp. 100-106
Papers
Probabilistic analysis of some bin-packing problemsFull-text access may be available. Sign in or learn about subscription options.pp. 107-111
Papers
How to generate cryptographically strong sequences of pseudo random bitsFull-text access may be available. Sign in or learn about subscription options.pp. 112-117
Papers
A compact representation for permutation groupsFull-text access may be available. Sign in or learn about subscription options.pp. 126-133
Papers
Why and how to establish a private code on a public networkFull-text access may be available. Sign in or learn about subscription options.pp. 134-144
Papers
A polynomial time algorithm for breaking the basic Merkle-Hellman cryptosystemFull-text access may be available. Sign in or learn about subscription options.pp. 145-152
Papers
Inferring a sequence generated by a linear congruenceFull-text access may be available. Sign in or learn about subscription options.pp. 153-159
Papers
Protocols for secure computationsFull-text access may be available. Sign in or learn about subscription options.pp. 160-164
Papers
Storing a sparse table with O(1) worst case access timeFull-text access may be available. Sign in or learn about subscription options.pp. 165-169
Papers
On the program size of perfect and universal hash functionsFull-text access may be available. Sign in or learn about subscription options.pp. 170-175
Papers
On decomposition of relational databasesFull-text access may be available. Sign in or learn about subscription options.pp. 176-185
Papers
Generic transformation of data structuresFull-text access may be available. Sign in or learn about subscription options.pp. 186-195
Papers
'Eventual' is earlier than 'immediate'Full-text access may be available. Sign in or learn about subscription options.pp. 196-203
Papers
Deterministic process logic is elementaryFull-text access may be available. Sign in or learn about subscription options.pp. 204-216
Papers
A temporal logic to deal with fairness in transition systemsFull-text access may be available. Sign in or learn about subscription options.pp. 217-225
Papers
On equations including string variablesFull-text access may be available. Sign in or learn about subscription options.pp. 226-235
Substitution of bounded rational coneFull-text access may be available. Sign in or learn about subscription options.pp. 236-243
Papers
Parallel algorithms for minimum cuts and maximum flows in planar networksFull-text access may be available. Sign in or learn about subscription options.pp. 244-254
Papers
Polynomial time algorithms for the MIN CUT problem on degree restricted treesFull-text access may be available. Sign in or learn about subscription options.pp. 262-271
Papers
Using clerk in parallel processingFull-text access may be available. Sign in or learn about subscription options.pp. 272-279
Papers
On the movement of robot arms in 2-dimensional bounded regionsFull-text access may be available. Sign in or learn about subscription options.pp. 280-289
Papers
Parallel time O(log N) acceptance of deterministic CFLsFull-text access may be available. Sign in or learn about subscription options.pp. 290-296
Papers
Wafer-scale integration of systolic arraysFull-text access may be available. Sign in or learn about subscription options.pp. 297-311
Papers
An efficient approximation scheme for the one-dimensional bin-packing problemFull-text access may be available. Sign in or learn about subscription options.pp. 312-320
Papers
The ellipsoid algorithm for linear inequalities in exact arithmeticFull-text access may be available. Sign in or learn about subscription options.pp. 321-326
Papers
An old linear programming algorithm runs in polynomial timeFull-text access may be available. Sign in or learn about subscription options.pp. 327-328
Papers
Linear-time algorithms for linear programming in R3 and related problemsFull-text access may be available. Sign in or learn about subscription options.pp. 329-338
Papers
A theorem on polygon cutting with applicationsFull-text access may be available. Sign in or learn about subscription options.pp. 339-349
Papers
Three layers are enoughFull-text access may be available. Sign in or learn about subscription options.pp. 350-357
Papers
The complexity of compacting hierarchically specified layouts of integrated circuitsFull-text access may be available. Sign in or learn about subscription options.pp. 358-368
Papers
On driving many long lines in a VLSI layoutFull-text access may be available. Sign in or learn about subscription options.pp. 369-378
Papers
Optimal allocation of computational resources in VLSIFull-text access may be available. Sign in or learn about subscription options.pp. 379-385
Papers
Author indexFreely available from IEEE.pp. 387
Showing 51 out of 51