![](https://dblp.dagstuhl.de/img/logo.ua.320x120.png)
![](https://dblp.dagstuhl.de/img/dropdown.dark.16x16.png)
![](https://dblp.dagstuhl.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
Electronic Colloquium on Computational Complexity, 2003
Volume TR03, 2003
- Vince Grolmusz:
Near Quadratic Matrix Multiplication Modulo Composites. - Stefan Szeider:
Minimal unsatisfiable formulas with bounded clause-variable difference are fixed-parameter tractable. - Fahiem Bacchus, Shannon Dalmao, Toniann Pitassi:
DPLL with Caching: A new algorithm for #SAT and Bayesian Inference. - Eli Ben-Sasson, Prahladh Harsha:
Lower Bounds for Bounded-Depth Frege Proofs via Buss-Pudlack Games. - Scott Aaronson:
Quantum Certificate Complexity. - Eli Ben-Sasson, Prahladh Harsha, Sofya Raskhodnikova:
3CNF Properties are Hard to Test. - Olivier Dubois, Yacine Boufkhad, Jacques Mandler:
Typical random 3-SAT formulae and the satisfiability threshold. - Piotr Berman, Marek Karpinski:
Improved Approximation Lower Bounds on Small Occurrence Optimization. - Markus Bläser, Andreas Jakoby, Maciej Liskiewicz, Bodo Manthey:
Private Computation - k-connected versus 1-connected Networks. - Sven Baumer, Rainer Schuler:
Improving a probabilistic 3-SAT Algorithm by Dynamic Search and Independent Clause Pairs. - Christian Glaßer, Alan L. Selman, Samik Sengupta, Liyu Zhang:
Disjoint NP-Pairs. - Edward A. Hirsch, Arist Kojevnikov:
Several notes on the power of Gomory-Chvatal cuts. - Luca Trevisan:
An epsilon-Biased Generator in NC0. - Avrim Blum, Ke Yang:
On Statistical Query Sampling and NMR Quantum Computing. - Shafi Goldwasser, Yael Tauman:
On the (In)security of the Fiat-Shamir Paradigm. - Dimitrios Koukopoulos, Marios Mavronicolas, Paul G. Spirakis:
FIFO is Unstable at Arbitrarily Low Rates. - Peter Bro Miltersen, Jaikumar Radhakrishnan, Ingo Wegener:
On Converting CNF to DNF. - Matthias Galota, Heribert Vollmer:
Functions Computable in Polynomial Space. - Eli Ben-Sasson, Oded Goldreich, Madhu Sudan:
Bounds on 2-Query Codeword Testing. - Elad Hazan, Shmuel Safra
, Oded Schwartz:
On the Hardness of Approximating k-Dimensional Matching. - Mikhail N. Vyalyi:
QMA=PP implies that PP contains PH. - Piotr Berman, Marek Karpinski, Alex D. Scott:
Approximation Hardness and Satisfiability of Bounded Occurrence Instances of SAT. - Anna Palbom:
On Spanning Cacti and Asymmetric TSP. - Till Tantau:
Weak Cardinality Theorems for First-Order Logic. - Kristoffer Arnsfelt Hansen:
Constant width planar computation characterizes ACC0. - Janka Chlebíková, Miroslav Chlebík:
Inapproximability results for bounded variants of optimization problems. - Christian Glaßer, Alan L. Selman, Samik Sengupta:
Reductions between Disjoint NP-Pairs. - Olivier Powell:
PSPACE contains almost complete problems. - Philippe Moser:
BPP has effective dimension at most 1/2 unless BPP=EXP. - Amin Coja-Oghlan, Andreas Goerdt, André Lanka, Frank Schädlich:
Certifying Unsatisfiability of Random 2k-SAT Formulas using Approximation Techniques. - Birgit Schelm:
Average-Case Complexity Theory of Approximation Problems. - Andreas Björklund, Thore Husfeldt, Sanjeev Khanna:
Approximating Longest Directed Path. - Meir Feder, Dana Ron, Ami Tavory:
Bounds on Linear Codes for Network Multicast. - Arnold Beckmann:
Height restricted constant depth LK. - Eran Halperin, Guy Kortsarz, Robert Krauthgamer:
Tight lower bounds for the asymmetric k-center problem. - Bruce E. Litow:
Polynomial equation elimination via Tarski Algebra. - Ziv Bar-Yossef:
Sampling Lower Bounds via Information Theory. - Julia Chuzhoy, Sudipto Guha, Sanjeev Khanna, Joseph Naor:
Asymmetric k-center is log*n-hard to Approximate. - Judy Goldsmith, Robert H. Sloan, Balázs Szörényi, György Turán:
Theory Revision with Queries: Horn, Read-once, and Parity Formulas. - Philippe Moser:
RP is Small in SUBEXP else ZPP equals PSPACE and NP equals EXP. - Albert Atserias, Maria Luisa Bonet, Jordi Levy:
On Chvatal Rank and Cutting Planes Proofs. - Luca Trevisan:
List Decoding Using the XOR Lemma. - Elchanan Mossel, Amir Shpilka, Luca Trevisan:
On epsilon-Biased Generators in NC0. - Juan Luis Esteban, Jacobo Torán:
A Combinatorial Characterization of Treelike Resolution Space. - Oded Goldreich, Shafi Goldwasser, Asaf Nussboim:
On the Implementation of Huge Random Objects. - Philippe Moser:
Locally Computed Baire's Categories on Small Complexity Classes. - Nayantara Bhatnagar, Parikshit Gopalan, Richard J. Lipton:
Symmetric Polynomials over Zm and Simultaneous Communication Protocols. - Stefan Droste, Thomas Jansen, Ingo Wegener:
Upper and Lower Bounds for Randomized Search Heuristics in Black-Box Optimization. - Piotr Berman, Marek Karpinski, Alex D. Scott:
Approximation Hardness of Short Symmetric Instances of MAX-3SAT. - Daniel Král:
Locally satisfiable formulas. - Tsuyoshi Morioka:
The Relative Complexity of Local Search Heuristics and the Iteration Principle. - Stanislav Busygin, Dmitrii V. Pasechnik:
On ~chi(G)-alpha(G)>0 gap recognition and alpha(G)-upper bounds. - Kazuo Iwama, Suguru Tamaki:
Improved Upper Bounds for 3-SAT. - Daniel Rolf:
3-SAT in RTIME(O(1.32793n)) - Improving Randomized Local Search by Initializing Strings of 3-Clauses. - Jan Krajícek:
Implicit proofs. - Piotr Berman, Marek Karpinski:
Approximability of Hypergraph Minimum Bisection. - Scott Aaronson:
Lower Bounds for Local Search by Quantum Arguments. - Vince Grolmusz:
Defying Dimensions Modulo 6. - Harumichi Nishimura, Tomoyuki Yamakami:
Polynomial time quantum computation with advice. - Danny Harnik, Moni Naor, Omer Reingold, Alon Rosen:
Completeness in Two-Party Secure Computation - A Computational View. - Jan Kára, Daniel Král:
Free Binary Decision Diagrams for Computation of EARn. - Andrei A. Krokhin, Peter Jonsson:
Recognizing Frozen Variables in Constraint Satisfaction Problems. - John M. Hitchcock:
The Size of SPP. - Vikraman Arvind, Piyush P. Kurur:
Upper Bounds on the Complexity of some Galois Theory Problems. - Hoeteck Wee:
Compressibility Lower Bounds in Oracle Settings. - Daniele Micciancio:
Almost perfect lattices, the covering radius problem, and applications to Ajtai's connection factor. - Ran Raz:
Multi-Linear Formulas for Permanent and Determinant are of Super-Polynomial Size. - Matthias Homeister:
Lower Bounds for the Sum of Graph--driven Read--Once Parity Branching Programs. - Elmar Böhler, Christian Glaßer, Daniel Meister:
Small Bounded-Error Computations and Completeness. - Amit Chakrabarti, Oded Regev:
An Optimal Randomised Cell Probe Lower Bound for Approximate Nearest Neighbour Searching. - Markus Bläser, Andreas Jakoby, Maciej Liskiewicz, Bodo Manthey:
Privacy in Non-Private Environments. - Evgeny Dantsin, Edward A. Hirsch, Alexander Wolpert:
Algorithms for SAT based on search in Hamming balls. - Amin Coja-Oghlan:
The Lovasz number of random graph. - Vince Grolmusz:
Sixtors and Mod 6 Computations. - Agostino Capponi:
A tutorial on the Deterministic two-party Communication Complexity. - Michael Langberg:
Testing the independence number of hypergraphs. - Till Tantau:
Logspace Optimisation Problems and their Approximation Properties. - Fan R. K. Chung, Ronald L. Graham, Jia Mao, Andrew Chi-Chih Yao:
Finding Favorites. - Scott Aaronson:
Multilinear Formulas and Skepticism of Quantum Computing. - Venkatesan Guruswami:
Better Extractors for Better Codes? - Valentin E. Brimkov, Bruno Codenotti, Valentino Crespi, Reneta P. Barneva, Mauro Leoncini:
Computation of the Lovász Theta Function for Circulant Graphs. - Andris Ambainis, Ke Yang:
Towards the Classical Communication Complexity of Entanglement Distillation Protocols with Incomplete Information. - Jan Arpe, Andreas Jakoby, Maciej Liskiewicz:
One-Way Communication Complexity of Symmetric Boolean Functions. - Josh Buresh-Oppenheim, Tsuyoshi Morioka:
Relativized NP Search Problems and Propositional Proof Systems. - Ke Yang:
On the (Im)possibility of Non-interactive Correlation Distillation. - Amos Beimel, Tal Malkin:
A Quantitative Approach to Reductions in Secure Computation. - Richard Beigel, Lance Fortnow, William I. Gasarch:
A Nearly Tight Bound for Private Information Retrieval Protocols.
![](https://dblp.dagstuhl.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.