skip to main content
10.1145/100216.100226acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
Article
Free Access

Coherent functions and program checkers

Authors Info & Claims
Published:01 April 1990Publication History
First page image

References

  1. AFK.M. Abadi, J. Feigenbaum, and J. Kilian, "On hiding information from an oracle," Journal of Computer and System Sciences, 39 (1989), 21-50. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. AL.D. Angluin and D. Lichtenstein, "Provable security of cryptosystems: a survey," Technical Report TR-288, Yale University, October 1983.Google ScholarGoogle Scholar
  3. BeaF.D. Beaver and J. Feigembaum, "Hiding instances in multioracle queries," Proceedings of the 7th Symposium on Theoretical Aspects of Computer Science, Springer-Verlag LNCS 415, edited by C. Choffrut and T. Lengauer, 1990, 37-48. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. BeiF.R. Beigel and J. Feigenbaum, "On the complexity of coherent functions," private communication, February 1990.Google ScholarGoogle Scholar
  5. BK.M. Blum and S. Kannan, "Designing programs that check their work," Proceedings 21st ACM Symposium on Theory of Computing, May 1989, 86-97. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. BLR.M. Blum, M. Luby, and R. Rubinfeld, "Stronger checkers and general techniques for numerical problems," a talk presented in the DIMACS Workshop on Cryptography and Distributed Computing, Princeton, October 1989.Google ScholarGoogle Scholar
  7. FKN.J. Feigenbaum, S. Kannan, and N. Nisan, "Lower bounds on random-selfreducibility," to appear in Proceedings of Structures 90.Google ScholarGoogle Scholar
  8. F.M.L. Fredman, "How good is the information theory bound in sorting," Theoretical Computer Science 1(1976), 355-361.Google ScholarGoogle ScholarCross RefCross Ref
  9. GGM.O. Goldreich, S. Goldwasser, and S. Micali, "How to construct random functions," Journal of the ACM 33 (1986), 792-807. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. H.M.E. Hellman, "A cryptanalytic timememory trade-off," IEEE Transactions on Information Theory 26 (1980), 401-405.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. KK.C. Kenyon-Mathieu and V. King, "Verifying partial orders," Proceedings elst ACM Symposium on Theory of Computing, May 1989, 367-374. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. K.V. King, "An optimal randomized algorithm for set-maxima," private communication, 1989.Google ScholarGoogle Scholar
  13. L.R.J. Lipton, "New directions in testing," manuscript and a talk presented in the DIMACS Workshop on Cryptography and Distributed Computing, Princeton, October 1989.Google ScholarGoogle Scholar
  14. MT.U. Manber and M. Tompa,"The complexity of problems on probabilistic, nondeterministic and alternating decision trees," Journal of ACM 32 (1985), 720-732. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Sch.A. Schonhage, "The production of partial orders," Asterisque 38-39 (1976), 229-246.Google ScholarGoogle Scholar
  16. SS.A. Shamir and J. Spencer, private communication, 1979.Google ScholarGoogle Scholar
  17. Y1.A.C. Yao, "Probabilistic computations: towards a unified measure of complexity," Proceedings 18th Annual IEEE Symposium on Foundations of Computer Science, October 1977, 222-227.Google ScholarGoogle Scholar
  18. Y2.A.C. Yao, "On the complexity of partial order productions," SIAM Journal on Computing 18 (1989), 679-689. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Coherent functions and program checkers

                      Recommendations

                      Comments

                      Login options

                      Check if you have access through your login credentials or your institution to get full access on this article.

                      Sign in
                      • Published in

                        cover image ACM Conferences
                        STOC '90: Proceedings of the twenty-second annual ACM symposium on Theory of Computing
                        April 1990
                        574 pages
                        ISBN:0897913612
                        DOI:10.1145/100216

                        Copyright © 1990 ACM

                        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                        Publisher

                        Association for Computing Machinery

                        New York, NY, United States

                        Publication History

                        • Published: 1 April 1990

                        Permissions

                        Request permissions about this article.

                        Request Permissions

                        Check for updates

                        Qualifiers

                        • Article

                        Acceptance Rates

                        Overall Acceptance Rate1,469of4,586submissions,32%

                        Upcoming Conference

                        STOC '24
                        56th Annual ACM Symposium on Theory of Computing (STOC 2024)
                        June 24 - 28, 2024
                        Vancouver , BC , Canada

                      PDF Format

                      View or Download as a PDF file.

                      PDF

                      eReader

                      View online with eReader.

                      eReader