skip to main content
article
Free Access

Figures of merit

Authors Info & Claims
Published:01 January 1989Publication History
First page image

References

  1. [1] A. Aggarwal and R. Anderson. A random NC algorithm for depth first search. Combinatorica, 8(1):1-12, 1988.Google ScholarGoogle ScholarCross RefCross Ref
  2. [2] N. Alon and Y. Azar. Parallel comparison algorithms for approximation problems. In 29th, Annual Symposium on Foundations of Computer Science, pages 194-203, White Plains, New York, October 1988.Google ScholarGoogle Scholar
  3. [3] R. Bar-Yehuda and S. Even. A linear-time approximation algorithm for the weighted vertex cover problem. Journal of Algorithms, 2:198-203, 1981.Google ScholarGoogle ScholarCross RefCross Ref
  4. [4] C. Beeri, A. O. Mendelzon, Y. Sagiv, and J. D. Ullman. Equivalence of relational database schemes. In Proceedings of the Eleventh Annual ACM Symposium on Theory of Computing, pages 319-329, Atlanta, Georgia, April-May 1979. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. [5] S. Bhatt and J.-Y. Cai. Take a walk, grow a. tree. In 29th, Annual Symposium on Foundations of Computer Science, pages 469-478, White Plains, New York, October 1988.Google ScholarGoogle Scholar
  6. [6] A. Borodin and S. Cook. A time-space tradeoff for sorting on a general sequential model of computation. SIAM Journal on Computing, 12(2):287-297, May 1982.Google ScholarGoogle ScholarCross RefCross Ref
  7. [7] G. Brassard and P. Bratley. Algorithmics: Theory and Practice. Prentice-Hall, Inc., Englewood Cliffs, New Jersey, 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. [8] G. Brassard and C. Crépeau. Non-transitive transfer of confidence: a perfect zero-knowledge interactive protocol for SAT and beyond. In 27th Annual Symposium on Foundations of Computer Science, pages 188-195, Toronto, Ontario, October 1986.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. [9] P. Erdös, R. L. Graham, and E. Szemerédi. On sparse graphs with dense long paths. Comp. and Maths. with Appls., 1:365-369, 1975.Google ScholarGoogle ScholarCross RefCross Ref
  10. [10] M. R. Garey, R. L, Graham, and D. S. Johnson. Some NP-complete geometric problems. In Proceedings of the Eighth Annual ACM Symposium on Theory of Computing, pages 10-22, Hershey, Pennsylvania, May 1976. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. [11] R. L. Graham, E. L. Lawler, J. K. Lenstra, and A. H. G. Rinnooy Kan, Optimization and approximation in deterministic sequencing and scheduling: a survey. In P. L. Hammer, E. L. Johnson, and B. H. Korte, editors, Discrete Oplimization II, Annals of Discrete Mathematics, 5, pages 287-326, North-Holland Publishing Company, Amsterdam, 1979.Google ScholarGoogle Scholar
  12. [12] J. Kahn, M. Klawe, and P. Kleitman. Traditional galleries require fewer watchmen, SIAM J. Alg. Disc. Meth., 4:194-206, 1980.Google ScholarGoogle ScholarCross RefCross Ref
  13. [13] N. Karmarkar, R. Karp, R. Lipton, L. Lovász, and M. Luby. A Monte Carlo Algorithm to Approximate the Permanent. Technical Report, University of Toronto, 1988.Google ScholarGoogle Scholar
  14. [14] H. T. Kung and C. E. Leiserson. Algorithms for VLSI processor arrays. In Symposium on Sparse Matrix Computations and Their Applications, November 1978.Google ScholarGoogle Scholar
  15. [15] R. E. Ladner and N. A. Lynch. Relativization of questions about log space computability. Mathematical Systems Theory, 10(1):19-32, 1976.Google ScholarGoogle ScholarCross RefCross Ref
  16. [16] E. L. Lawler, R. E. Tarjan, and J. Valdes. Analysis and isomorphism of series parallel digraphs. 1982. Eventually appeared as [33].Google ScholarGoogle Scholar
  17. [17] F. T. Leighton and C. E. Leiserson. Wafer-scale integration of systolic arrays. In 23rd Annual Symposium on Foundations of Computer Science, pages 297-311, Chicago, Illinois, November 1982.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. [18] A. K. Lenstra, H. W. Lenstra, and Lovász L. Factoring polynomials with rational coefficients. Mathematische Annalen, 261:513-534, 1982.Google ScholarGoogle ScholarCross RefCross Ref
  19. [19] W. F. Ogden, W. E. Riddle, and W. C. Rounds. Complexity of expressions allowing concurrency. In Conference Record of the Fifth Annual ACM Symposium on Principles of Programming Languages, pages 185-194, 1978. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. [20] W. J. Paul, N. Pippenger, E. Szemerédi, and W. T. Trotter. On determinism versus non-determinism and related problems. In 24th Annual Symposium on Foundations of Computer Science, pages 429-438, Tucson, Arizona, November 1983.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. [21] W. J. Paul, E. J. Prauß, and R. Reischuk. On alternation. Acta Informatica, 14:243- 255, 1980.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. [22] W. J. Paul and R. Reischuk. On alternation II. Acta Informatica, 14:391-403, 1980.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. [23] W. J. Paul, J. I. Seiferas, and J. Simon. An information theoretic approach to time bounds for on-line computation. Journal of Computer and System, Sciences, 23:108- 126, 1981.Google ScholarGoogle Scholar
  24. [24] W. J. Paul and R. E. Tarjan. Time-space trade-offs in a. pebble game. Acta Informatica , 10:111-115, 1978.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. [25] W. J. Paul, R. E. Tarjan, and J. R. Celoni. Space bounds for a game on graphs. Mathematical Systems Theory, 10:239-251, 1977.Google ScholarGoogle ScholarCross RefCross Ref
  26. [26] B. Plumstead and J. Plumstead. Bounds for cube coloring. SIAM J. Alg. Disc. Meth., 6(1), January 1985.Google ScholarGoogle ScholarCross RefCross Ref
  27. [27] W. L. Ruzzo, J. Simon, and M. Tompa. Space-bounded hierarchies and probabilistic computations. Journal of Computer and System Sciences, 28(2):216-230, April 1984.Google ScholarGoogle ScholarCross RefCross Ref
  28. [28] N. Santoro, J. B. Sidney, S. J. Sidney, and J. Urrutia. Geometric containment and vector dominance. Theoretical Computer Science, 53:345-352, 1987. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. [29] J. T. Schwartz, M. Sharir, and A. Siegel. An Efficient Algorithm for Finding Connected Components in a Binary Image. Technical Report TR. 154, New York University, New York, New York, 1985.Google ScholarGoogle Scholar
  30. [30] E. Shamir and M. Snir. On the depth complexity of formulas. Mathematical Systems Theory, 13:301-322, 1980.Google ScholarGoogle ScholarCross RefCross Ref
  31. [31] R. Solovay and V. Strassen. A fast Monte-Carlo test for primality. SIAM Journal on Computing, 6(1):84-85, March 1977.Google ScholarGoogle ScholarCross RefCross Ref
  32. [32] R. E. Tarjan and U. Vishkin. An efficient, parallel biconnectivity algorithm. SIAM Journal on Computing, 14(4):862-874, November 1985.Google ScholarGoogle ScholarCross RefCross Ref
  33. [33] J. Valdes, R. E. Tarjan, and E. L. Lawler. The recognition of series parallel digraphs. SIAM Journal on Computing, 11:298-313, 1982.Google ScholarGoogle ScholarCross RefCross Ref
  34. [34] U. Vazirani and V. Vazirani. Random polynomial time is equal to slightly-random polynomial time. In 26th Annual Symposium on Foundations of Computer Science, pages 417-428, Portland, Oregon, October 1985.Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. [35] U. Vishkin and A. Wigderson. Trade-offs between depth and width in parallel computation. SIAM Journal on Computing, 14(2):303-314, May 1985.Google ScholarGoogle ScholarCross RefCross Ref
  36. [36] C. K. Wong and A. C. Yao. A combinatorial optimization problem related to data set allocation. Rev. Francaise Automat. Informat. Recherche Operationnelle Ser. Bleue, 10.5 (suppl.):83-95, 1976.Google ScholarGoogle Scholar
  37. [37] D. Wood and C. K. Yap. Computing a convex skull of an orthogonal polygon. In Proceedings of the First Annual ACM Symposium on Computational Geometry, pages 311-315, 1985. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. [38] A. C. Yao and F. F. Yao. A general approach to geometric queries. In Proceedings of the Seventeenth Annual ACM Symposium on Theory of Computing, pages 163-168, Providence, Rhode Island, May 1985. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Figures of merit

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM SIGACT News
      ACM SIGACT News  Volume 20, Issue 1
      Winter 1989
      12 pages
      ISSN:0163-5700
      DOI:10.1145/65780
      Issue’s Table of Contents

      Copyright © 1989 Author

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 1 January 1989

      Check for updates

      Qualifiers

      • article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader