skip to main content
Skip header Section
Communication complexityDecember 1996
Publisher:
  • Cambridge University Press
  • 40 W. 20 St. New York, NY
  • United States
ISBN:978-0-521-56067-2
Published:01 December 1996
Pages:
189
Skip Bibliometrics Section
Bibliometrics
Abstract

No abstract available.

Cited By

  1. Liu J (2023). A Few Interactions Improve Distributed Nonparametric Estimation, Optimally, IEEE Transactions on Information Theory, 69:12, (7867-7886), Online publication date: 1-Dec-2023.
  2. Khadiev K, Khadieva A and Knop A (2023). Exponential separation between quantum and classical ordered binary decision diagrams, reordering method and hierarchies, Natural Computing: an international journal, 22:4, (723-736), Online publication date: 1-Dec-2023.
  3. Bishnu A, Ghosh A, Kolay S, Mishra G and Saurabh S (2023). Small Vertex Cover Helps in Fixed-Parameter Tractability of Graph Deletion Problems over Data Streams, Theory of Computing Systems, 67:6, (1241-1267), Online publication date: 1-Dec-2023.
  4. Dahiya Y and Mahajan M (2023). On (simple) decision tree rank, Theoretical Computer Science, 978:C, Online publication date: 2-Nov-2023.
  5. Bishnu A, Ghosh A, Kolay S, Mishra G and Saurabh S (2023). Almost optimal query algorithm for hitting set using a subset query, Journal of Computer and System Sciences, 137:C, (50-65), Online publication date: 1-Nov-2023.
  6. Hajiaghaei Shanjani S and King V (2023). Communication costs in a geometric communication network, Theoretical Computer Science, 977:C, Online publication date: 25-Oct-2023.
  7. ACM
    Assadi S (2023). Recent Advances in Multi-Pass Graph Streaming Lower Bounds, ACM SIGACT News, 54:3, (48-75), Online publication date: 7-Sep-2023.
  8. Cheung T, Hatami H, Hosseini K and Shirley M Separation of the Factorization Norm and Randomized Communication Complexity Proceedings of the conference on Proceedings of the 38th Computational Complexity Conference, (1-16)
  9. ACM
    Chen X, Jiang S and Krauthgamer R Streaming Euclidean Max-Cut: Dimension vs Data Reduction Proceedings of the 55th Annual ACM Symposium on Theory of Computing, (170-182)
  10. Halldórsson M and Nolin A (2023). Superfast coloring in CONGEST via efficient color sampling, Theoretical Computer Science, 948:C, Online publication date: 28-Feb-2023.
  11. Davis B, Hatami H, Pires W, Tao R and Usmani H (2022). On public-coin zero-error randomized communication complexity, Information Processing Letters, 178:C, Online publication date: 1-Nov-2022.
  12. Li Y (2022). Trading information complexity for error II, Information and Computation, 289:PA, Online publication date: 1-Nov-2022.
  13. Haviv I and Parnas M (2022). Upper bounds on the Boolean rank of Kronecker products, Discrete Applied Mathematics, 318:C, (82-96), Online publication date: 15-Sep-2022.
  14. ACM
    Weinberg S and Zhou Z Optimal Multi-Dimensional Mechanisms are not Locally-Implementable Proceedings of the 23rd ACM Conference on Economics and Computation, (875-896)
  15. ACM
    Fleming N, Pankratov D, Pitassi T and Robere R (2022). Random -CNFs are Hard for Cutting Planes, Journal of the ACM, 69:3, (1-32), Online publication date: 30-Jun-2022.
  16. Patt-Shamir B and Perry M (2022). Proof-labeling schemes, Theoretical Computer Science, 923:C, (179-195), Online publication date: 26-Jun-2022.
  17. Kovács R On Minimally Non-firm Binary Matrices Combinatorial Optimization, (76-88)
  18. Aprile M (2022). Extended formulations for matroid polytopes through randomized protocols, Operations Research Letters, 50:2, (145-149), Online publication date: 1-Mar-2022.
  19. Lin X, Wei Z and Yao P (2022). Quantum and Classical Hybrid Generations for Classical Correlations, IEEE Transactions on Information Theory, 68:1, (302-310), Online publication date: 1-Jan-2022.
  20. Watanabe S (2022). Minimax Converse for Identification via Channels, IEEE Transactions on Information Theory, 68:1, (25-34), Online publication date: 1-Jan-2022.
  21. ACM
    Kabanets V, Koroth S, Lu Z, Myrisiotis D and Oliveira I (2021). Algorithms and Lower Bounds for De Morgan Formulas of Low-Communication Leaf Gates, ACM Transactions on Computation Theory, 13:4, (1-37), Online publication date: 31-Dec-2022.
  22. Becker F, Montealegre P, Rapaport I and Todinca I (2022). The role of randomness in the broadcast congested clique model, Information and Computation, 281:C, Online publication date: 1-Dec-2021.
  23. ACM
    Abboud A, Censor-Hillel K, Khoury S and Paz A (2021). Smaller Cuts, Higher Lower Bounds, ACM Transactions on Algorithms, 17:4, (1-40), Online publication date: 31-Oct-2021.
  24. Mihajlin I and Smal A Toward better depth lower bounds Proceedings of the 36th Computational Complexity Conference
  25. Hirahara S, Ilango R and Loff B Hardness of constant-round communication complexity Proceedings of the 36th Computational Complexity Conference
  26. Itsykson D and Riazanov A Proof complexity of natural formulas via communication arguments Proceedings of the 36th Computational Complexity Conference
  27. Linial N and Shraibman A An improved protocol for the exactly-N problem* Proceedings of the 36th Computational Complexity Conference
  28. Ball M, Goldreich O and Malkin T Communication complexity with defective randomness Proceedings of the 36th Computational Complexity Conference
  29. Gál A and Syed R Upper Bounds on Communication in Terms of Approximate Rank Computer Science – Theory and Applications, (116-130)
  30. ACM
    Konrad C Frequent Elements with Witnesses in Data Streams Proceedings of the 40th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, (83-95)
  31. ACM
    Rubinstein A, Saxena R, Thomas C, Weinberg S and Zhao J Exponential communication separations between notions of selfishness Proceedings of the 53rd Annual ACM SIGACT Symposium on Theory of Computing, (947-960)
  32. ACM
    Dobzinski S and Ron S The communication complexity of payment computation Proceedings of the 53rd Annual ACM SIGACT Symposium on Theory of Computing, (933-946)
  33. Briceño R and Rapaport I (2021). Communication complexity meets cellular automata: Necessary conditions for intrinsic universality, Natural Computing: an international journal, 20:2, (307-320), Online publication date: 1-Jun-2021.
  34. Vyalyi M (2021). Counting the Number of Perfect Matchings, and Generalized Decision Trees, Problems of Information Transmission, 57:2, (143-160), Online publication date: 1-Apr-2021.
  35. Fiorini S, Macchia M and Pashkovich K (2021). Bounds on the Number of 2-Level Polytopes, Cones, and Configurations, Discrete & Computational Geometry, 65:3, (587-600), Online publication date: 1-Apr-2021.
  36. Feuilloley L, Fraigniaud P, Hirvonen J, Paz A and Perry M (2021). Redundancy in distributed proofs, Distributed Computing, 34:2, (113-132), Online publication date: 1-Apr-2021.
  37. Applebaum B and Vasudevan P (2021). Placing Conditional Disclosure of Secrets in the Communication Complexity Universe, Journal of Cryptology, 34:2, Online publication date: 1-Apr-2021.
  38. ACM
    Foerster K, Korhonen J, Paz A, Rybicki J and Schmid S (2021). Input-Dynamic Distributed Algorithms for Communication Networks, Proceedings of the ACM on Measurement and Analysis of Computing Systems, 5:1, (1-33), Online publication date: 18-Feb-2021.
  39. Dementiev Y, Ignatiev A, Sidelnik V, Smal A and Ushakov M New Bounds on the Half-Duplex Communication Complexity SOFSEM 2021: Theory and Practice of Computer Science, (233-248)
  40. Nisan N The demand query model for bipartite matching Proceedings of the Thirty-Second Annual ACM-SIAM Symposium on Discrete Algorithms, (592-599)
  41. ACM
    Hajiaghaei Shanjani S and King V Communication Costs in a Geometric Communication Network Proceedings of the 22nd International Conference on Distributed Computing and Networking, (36-45)
  42. Haviv I and Parnas M (2021). Upper Bounds on the Boolean Rank of Kronecker Products, Procedia Computer Science, 195:C, (172-180), Online publication date: 1-Jan-2021.
  43. ACM
    Watson T (2020). A ZPPNP[1] Lifting Theorem, ACM Transactions on Computation Theory, 12:4, (1-20), Online publication date: 1-Dec-2020.
  44. ACM
    Podolskii V and Sherstov A (2020). Inner Product and Set Disjointness, ACM Transactions on Computation Theory, 12:4, (1-28), Online publication date: 1-Dec-2020.
  45. Acharya J, Canonne C and Tyagi H (2020). Inference Under Information Constraints II: Communication Constraints and Shared Randomness, IEEE Transactions on Information Theory, 66:12, (7856-7877), Online publication date: 1-Dec-2020.
  46. Abboud A, Censor-Hillel K, Khoury S and Lenzen C (2020). Fooling views: a new lower bound technique for distributed computations under congestion, Distributed Computing, 33:6, (545-559), Online publication date: 1-Dec-2020.
  47. Huang Z, Radunovic B, Vojnovic M and Zhang Q (2020). Communication complexity of approximate maximum matching in the message-passing model, Distributed Computing, 33:6, (515-531), Online publication date: 1-Dec-2020.
  48. Czumaj A and Konrad C (2019). Detecting cliques in CONGEST networks, Distributed Computing, 33:6, (533-543), Online publication date: 1-Dec-2020.
  49. Narayanan V, Prabhakaran M and Prabhakaran V Zero-Communication Reductions Theory of Cryptography, (274-304)
  50. ACM
    Mathieu C and de Rougemont M Large Very Dense Subgraphs in a Stream of Edges Proceedings of the 2020 ACM-IMS on Foundations of Data Science Conference, (107-117)
  51. ACM
    Chattopadhyay A, Mande N and Sherif S (2020). The Log-Approximate-Rank Conjecture Is False, Journal of the ACM, 67:4, (1-28), Online publication date: 31-Aug-2020.
  52. ACM
    Bar-Yehuda R, Censor-Hillel K, Maus Y, Pai S and Pemmaraju S Distributed Approximation on Power Graphs Proceedings of the 39th Symposium on Principles of Distributed Computing, (501-510)
  53. ACM
    Efron Y, Grossman O and Khoury S Beyond Alice and Bob: Improved Inapproximability for Maximum Independent Set in CONGEST Proceedings of the 39th Symposium on Principles of Distributed Computing, (511-520)
  54. Gavinsky D (2020). Entangled Simultaneity Versus Classical Interactivity in Communication Complexity, IEEE Transactions on Information Theory, 66:7, (4641-4651), Online publication date: 1-Jul-2020.
  55. Applebaum B, Holenstein T, Mishra M and Shayevitz O (2019). The Communication Complexity of Private Simultaneous Messages, Revisited, Journal of Cryptology, 33:3, (917-953), Online publication date: 1-Jul-2020.
  56. Dinur I On the Streaming Indistinguishability of a Random Permutation and a Random Function Advances in Cryptology – EUROCRYPT 2020, (433-460)
  57. Censor-Hillel K, Paz A and Perry M (2020). Approximate proof-labeling schemes, Theoretical Computer Science, 811:C, (112-124), Online publication date: 2-Apr-2020.
  58. Pandurangan G, Peleg D and Scquizzato M (2020). Message lower bounds via efficient network synchronization, Theoretical Computer Science, 810:C, (82-95), Online publication date: 2-Mar-2020.
  59. Fischer O, Oshman R and Zwick U (2020). Public vs. private randomness in simultaneous multi-party communication complexity, Theoretical Computer Science, 810:C, (72-81), Online publication date: 2-Mar-2020.
  60. ACM
    Pandurangan G, Robinson P and Scquizzato M (2019). A Time- and Message-Optimal Distributed Algorithm for Minimum Spanning Trees, ACM Transactions on Algorithms, 16:1, (1-27), Online publication date: 31-Jan-2020.
  61. ACM
    Chatterjee S, Pandurangan G and Pham N Distributed MST Proceedings of the 21st International Conference on Distributed Computing and Networking, (1-10)
  62. Sudan M, Tyagi H and Watanabe S (2019). Communication for Generating Correlation: A Unifying Survey, IEEE Transactions on Information Theory, 66:1, (5-37), Online publication date: 1-Jan-2020.
  63. Mandal D, Procaccia A, Shah N and Woodruff D Efficient and thrifty voting by any means necessary Proceedings of the 33rd International Conference on Neural Information Processing Systems, (7180-7191)
  64. Chattopadhyay A, Koucký M, Loff B and Mukhopadhyay S (2019). Simulation Theorems via Pseudo-random Properties, Computational Complexity, 28:4, (617-659), Online publication date: 1-Dec-2019.
  65. Corrigan-Gibbs H and Kogan D The Function-Inversion Problem: Barriers and Opportunities Theory of Cryptography, (393-421)
  66. Terrier V (2019). Communication complexity tools on recognizable picture languages, Theoretical Computer Science, 795:C, (194-203), Online publication date: 26-Nov-2019.
  67. ACM
    S. K, Laekhanukit B and Manurangsi P (2019). On the Parameterized Complexity of Approximating Dominating Set, Journal of the ACM, 66:5, (1-38), Online publication date: 28-Sep-2019.
  68. ACM
    Viola E (2019). Guest Column, ACM SIGACT News, 50:3, (52-74), Online publication date: 24-Sep-2019.
  69. Banerjee S and Tyagi H Practical Universal Data Exchange using Polar Codes 2019 IEEE Information Theory Workshop (ITW), (1-5)
  70. Shraibman A (2019). Nondeterministic communication complexity with help and graph functions, Theoretical Computer Science, 782:C, (1-10), Online publication date: 23-Aug-2019.
  71. Banerjee S and Bhore S Algorithm and Hardness Results on Liar’s Dominating Set and -tuple Dominating Set Combinatorial Algorithms, (48-60)
  72. Chattopadhyay A, Lovett S and Vinyals M Equality alone does not simulate randomness Proceedings of the 34th Computational Complexity Conference, (1-11)
  73. ACM
    Bacrach N, Censor-Hillel K, Dory M, Efron Y, Leitersdorf D and Paz A Hardness of Distributed Optimization Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing, (238-247)
  74. ACM
    Pai S and Pemmaraju S Connectivity Lower Bounds in Broadcast Congested Clique Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing, (256-258)
  75. Barnes L, Han Y and Özgür A Fisher Information for Distributed Estimation under a Blackboard Communication Protocol 2019 IEEE International Symposium on Information Theory (ISIT), (2704-2708)
  76. ACM
    Kerenidis I, Rosén A and Urrutia F (2019). Multi-Party Protocols, Information Complexity and Privacy, ACM Transactions on Computation Theory, 11:2, (1-29), Online publication date: 30-Jun-2019.
  77. ACM
    Dinesh K, Koroth S and Sarma J (2019). Characterization and Lower Bounds for Branching Program Size using Projective Dimension, ACM Transactions on Computation Theory, 11:2, (1-22), Online publication date: 30-Jun-2019.
  78. Grandjean É and Grente T Descriptive complexity for minimal time of cellular automata Proceedings of the 34th Annual ACM/IEEE Symposium on Logic in Computer Science, (1-13)
  79. Guang X, Yeung R, Yang S and Li C (2019). Improved Upper Bound on the Network Function Computing Capacity, IEEE Transactions on Information Theory, 65:6, (3790-3811), Online publication date: 1-Jun-2019.
  80. Fraigniaud P, Patt-Shamir B and Perry M (2019). Randomized proof-labeling schemes, Distributed Computing, 32:3, (217-234), Online publication date: 1-Jun-2019.
  81. Casteigts A, Métivier Y, Robson J and Zemmari A (2019). Deterministic Leader Election Takes $$\Theta (D + \log n)$$?(D+logn) Bit Rounds, Algorithmica, 81:5, (1901-1920), Online publication date: 1-May-2019.
  82. ACM
    Kolay S, Panolan F and Saurabh S (2019). Communication Complexity and Graph Families, ACM Transactions on Computation Theory, 11:2, (1-28), Online publication date: 2-Apr-2019.
  83. Shitov Y (2019). Euclidean Distance Matrices and Separations in Communication Complexity Theory, Discrete & Computational Geometry, 61:3, (653-660), Online publication date: 1-Apr-2019.
  84. Tell R (2019). Property Testing Lower Bounds via a Generalization of Randomized Parity Decision Trees, Theory of Computing Systems, 63:3, (418-449), Online publication date: 1-Apr-2019.
  85. Kol G, Moran S, Shpilka A and Yehudayoff A (2019). Approximate Nonnegative Rank is Equivalent to the Smooth Rectangle Bound, Computational Complexity, 28:1, (1-25), Online publication date: 1-Mar-2019.
  86. Göös M, Kamath P, Pitassi T and Watson T (2019). Query-to-Communication Lifting for P NP, Computational Complexity, 28:1, (113-144), Online publication date: 1-Mar-2019.
  87. ACM
    Bhattacharyya A, Dey P and Woodruff D (2018). An Optimal Algorithm for ℓ1-Heavy Hitters in Insertion Streams and Related Problems, ACM Transactions on Algorithms, 15:1, (1-27), Online publication date: 25-Jan-2019.
  88. Shraibman A (2018). A note on multiparty communication complexity and the Hales–Jewett theorem, Information Processing Letters, 139:C, (44-48), Online publication date: 1-Nov-2018.
  89. ACM
    Boczkowski L, Kerenidis I and Magniez F (2018). Streaming Communication Protocols, ACM Transactions on Computation Theory, 10:4, (1-21), Online publication date: 17-Oct-2018.
  90. ACM
    Pandurangan G, Robinson P and Scquizzato M (2018). Fast Distributed Algorithms for Connectivity and MST in Large Graphs, ACM Transactions on Parallel Computing, 5:1, (1-22), Online publication date: 19-Sep-2018.
  91. Ghazi B, Komargodski I, Kothari P and Sudan M (2018). Communication with Contextual Uncertainty, Computational Complexity, 27:3, (463-509), Online publication date: 1-Sep-2018.
  92. Dinur I and Meir O (2018). Toward the KRW Composition Conjecture, Computational Complexity, 27:3, (375-462), Online publication date: 1-Sep-2018.
  93. ACM
    Behera S, Gayen S, Deogun J and Vinodchandran N KmerEstimate Proceedings of the 2018 ACM International Conference on Bioinformatics, Computational Biology, and Health Informatics, (438-447)
  94. ACM
    Censor-Hillel K and Dory M Distributed Spanner Approximation Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing, (139-148)
  95. ACM
    Fischer O, Gonen T, Kuhn F and Oshman R Possibilities and Impossibilities for Distributed Subgraph Detection Proceedings of the 30th on Symposium on Parallelism in Algorithms and Architectures, (153-162)
  96. Anastasiadis E and Deligkas A Heterogeneous Facility Location Games Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, (623-631)
  97. ACM
    Fried D, Legay A, Ouaknine J and Vardi M Sequential Relational Decomposition Proceedings of the 33rd Annual ACM/IEEE Symposium on Logic in Computer Science, (432-441)
  98. Lu H, Zhu W, Phan J, Ghiassi M, Fang Y, Hong Y and He X (2018). Fault-tolerant tile mining, Expert Systems with Applications: An International Journal, 101:C, (25-42), Online publication date: 1-Jul-2018.
  99. Watson T Communication complexity with small advantage Proceedings of the 33rd Computational Complexity Conference, (1-17)
  100. Kannan S, Mossel E, Sanyal S and Yaroslavtsev G Linear sketching over F2 Proceedings of the 33rd Computational Complexity Conference, (1-37)
  101. ACM
    Braverman M and Kol G Interactive compression to external information Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing, (964-977)
  102. ACM
    S. K, Laekhanukit B and Manurangsi P On the parameterized complexity of approximating dominating set Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing, (1283-1296)
  103. Han Y, Mukherjee P, Ozgur A and Weissman T Distributed Statistical Estimation of High-Dimensional and Nonparametric Distributions 2018 IEEE International Symposium on Information Theory (ISIT), (506-510)
  104. Censor-Hillel K, Kavitha T, Paz A and Yehudayoff A (2018). Distributed construction of purely additive spanners, Distributed Computing, 31:3, (223-240), Online publication date: 1-Jun-2018.
  105. ACM
    Chen G, Zhu F and Heng P (2018). Large-Scale Bayesian Probabilistic Matrix Factorization with Memo-Free Distributed Variational Inference, ACM Transactions on Knowledge Discovery from Data, 12:3, (1-24), Online publication date: 27-Apr-2018.
  106. Gur T and Rothblum R (2018). Non-interactive proofs of proximity, Computational Complexity, 27:1, (99-207), Online publication date: 1-Mar-2018.
  107. ACM
    Göös M, Jayram T, Pitassi T and Watson T (2018). Randomized Communication versus Partition Number, ACM Transactions on Computation Theory, 10:1, (1-20), Online publication date: 30-Jan-2018.
  108. ACM
    Watson T (2018). Communication Complexity of Statistical Distance, ACM Transactions on Computation Theory, 10:1, (1-11), Online publication date: 30-Jan-2018.
  109. Assadi S and Khanna S Tight bounds on the round complexity of the distributed maximum coverage problem Proceedings of the Twenty-Ninth Annual ACM-SIAM Symposium on Discrete Algorithms, (2412-2431)
  110. Chatterjee K, Dvořák W, Henzinger M and Loitzenbauer V Lower bounds for symbolic computation on graphs Proceedings of the Twenty-Ninth Annual ACM-SIAM Symposium on Discrete Algorithms, (2341-2356)
  111. Braverman M, Mao J and Weinberg S On simultaneous two-player combinatorial auctions Proceedings of the Twenty-Ninth Annual ACM-SIAM Symposium on Discrete Algorithms, (2256-2273)
  112. Curticapean R, Lindzey N and Nederlof J A tight lower bound for counting hamiltonian cycles via matrix rank Proceedings of the Twenty-Ninth Annual ACM-SIAM Symposium on Discrete Algorithms, (1080-1099)
  113. Lokshtanov D, Mikhailin I, Paturi R and Pudlak P Beating brute force for (quantified) satisfiability of circuits of bounded treewidth Proceedings of the Twenty-Ninth Annual ACM-SIAM Symposium on Discrete Algorithms, (247-261)
  114. Brody J, Dziembowski S, Faust S and Pietrzak K Position-Based Cryptography and Multiparty Communication Complexity Theory of Cryptography, (56-81)
  115. Kubjas I and Skachek V Two-party function computation on the reconciled data 2017 55th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (390-396)
  116. Braverman M, Gelles R, Mao J and Ostrovsky R (2017). Coding for Interactive Communication Correcting Insertions and Deletions, IEEE Transactions on Information Theory, 63:10, (6256-6270), Online publication date: 1-Oct-2017.
  117. Jakobsen S (2017). Information Theoretical Cryptogenography, Journal of Cryptology, 30:4, (1067-1115), Online publication date: 1-Oct-2017.
  118. Dagan Y, Filmus Y, Hatami H and Li Y Trading information complexity for error Proceedings of the 32nd Computational Complexity Conference, (1-59)
  119. Göös M, Kamath P, Pitassi T and Watson T Query-to-communication lifting for PNP Proceedings of the 32nd Computational Complexity Conference, (1-16)
  120. Tyagi H and Watanabe S (2017). Universal Multiparty Data Exchange and Secret Key Agreement, IEEE Transactions on Information Theory, 63:7, (4057-4074), Online publication date: 1-Jul-2017.
  121. ACM
    Anshu A, Touchette D, Yao P and Yu N Exponential separation of quantum communication and classical information Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing, (277-288)
  122. ACM
    Gasarch W (2017). Open Problems Column, ACM SIGACT News, 48:2, (34-39), Online publication date: 12-Jun-2017.
  123. ACM
    Huang Z, Lin X, Zhang W and Zhang Y Efficient Matrix Sketching over Distributed Data Proceedings of the 36th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, (347-359)
  124. ACM
    Assadi S Tight Space-Approximation Tradeoff for the Multi-Pass Streaming Set Cover Problem Proceedings of the 36th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, (321-335)
  125. Lee T, Wei Z and Wolf R (2017). Some upper and lower bounds on PSD-rank, Mathematical Programming: Series A and B, 162:1-2, (495-521), Online publication date: 1-Mar-2017.
  126. Goswami M, Pagh R, Silvestri F and Sivertsen J Distance sensitive bloom filters without false negatives Proceedings of the Twenty-Eighth Annual ACM-SIAM Symposium on Discrete Algorithms, (257-269)
  127. ACM
    Ganor A, Kol G and Raz R (2016). Exponential Separation of Information and Communication for Boolean Functions, Journal of the ACM, 63:5, (1-31), Online publication date: 20-Dec-2016.
  128. Métivier Y, Robson J and Zemmari A (2016). Randomised distributed MIS and colouring algorithms for rings with oriented edges in O ( log ź n ) bit rounds, Information and Computation, 251:C, (208-214), Online publication date: 1-Dec-2016.
  129. ACM
    Babichenko Y (2016). Query Complexity of Approximate Nash Equilibria, Journal of the ACM, 63:4, (1-24), Online publication date: 8-Nov-2016.
  130. Brody J, Chakrabarti A, Kondapally R, Woodruff D and Yaroslavtsev G (2016). Certifying Equality With Limited Interaction, Algorithmica, 76:3, (796-845), Online publication date: 1-Nov-2016.
  131. Kol G, Moran S, Shpilka A and Yehudayoff A (2016). Direct Sum Fails for Zero-Error Average Communication, Algorithmica, 76:3, (782-795), Online publication date: 1-Nov-2016.
  132. Haramaty E and Sudan M (2016). Deterministic Compression with Uncertain Priors, Algorithmica, 76:3, (630-653), Online publication date: 1-Nov-2016.
  133. Göös M, Pitassi T and Watson T (2016). Zero-Information Protocols and Unambiguity in Arthur---Merlin Communication, Algorithmica, 76:3, (684-719), Online publication date: 1-Nov-2016.
  134. Jain R, Pereszlényi A and Yao P (2016). A Direct Product Theorem for Two-Party Bounded-Round Public-Coin Communication Complexity, Algorithmica, 76:3, (720-748), Online publication date: 1-Nov-2016.
  135. Braverman M and Weinstein O (2016). A Discrepancy Lower Bound for Information Complexity, Algorithmica, 76:3, (846-864), Online publication date: 1-Nov-2016.
  136. Antunes L, Buhrman H, Matos A, Souto A and Teixeira A (2016). Distinguishing Two Probability Ensembles with One Sample from each Ensemble, Theory of Computing Systems, 59:3, (517-531), Online publication date: 1-Oct-2016.
  137. Meunier P (2016). Unraveling simplicity in elementary cellular automata, Theoretical Computer Science, 641:C, (2-10), Online publication date: 16-Aug-2016.
  138. Braverman M, Garg A, Pankratov D and Weinstein O (2016). Information Lower Bounds via Self-Reducibility, Theory of Computing Systems, 59:2, (377-396), Online publication date: 1-Aug-2016.
  139. ACM
    Montealegre P and Todinca I Brief Announcement Proceedings of the 2016 ACM Symposium on Principles of Distributed Computing, (245-247)
  140. Bova S, Capelli F, Mengel S and Slivovsky F Knowledge compilation meets communication complexity Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, (1008-1014)
  141. ACM
    Chakraborty D, Goldenberg E and Koucký M Streaming algorithms for embedding and computing edit distance in the low distance regime Proceedings of the forty-eighth annual ACM symposium on Theory of Computing, (712-725)
  142. ACM
    Assadi S, Khanna S and Li Y Tight bounds for single-pass streaming complexity of the set cover problem Proceedings of the forty-eighth annual ACM symposium on Theory of Computing, (698-711)
  143. ACM
    Yu H Cell-probe lower bounds for dynamic problems via a new communication model Proceedings of the forty-eighth annual ACM symposium on Theory of Computing, (362-374)
  144. ACM
    Gavinsky D Entangled simultaneity versus classical interactivity in communication complexity Proceedings of the forty-eighth annual ACM symposium on Theory of Computing, (877-884)
  145. ACM
    Ganor A, Kol G and Raz R Exponential separation of communication and external information Proceedings of the forty-eighth annual ACM symposium on Theory of Computing, (977-986)
  146. ACM
    Bhattacharyya A, Dey P and Woodruff D An Optimal Algorithm for l1-Heavy Hitters in Insertion Streams and Related Problems Proceedings of the 35th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, (385-400)
  147. ACM
    Felber D and Ostrovsky R Variability in Data Streams Proceedings of the 35th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, (251-260)
  148. Tsang H, Xie N and Zhang S Fourier Sparsity of GF2 Polynomials Proceedings of the 11th International Computer Science Symposium on Computer Science --- Theory and Applications - Volume 9691, (409-424)
  149. Chattopadhyay E and Zuckerman D New extractors for interleaved sources Proceedings of the 31st Conference on Computational Complexity, (1-28)
  150. Dinur I and Meir O Toward the KRW composition conjecture Proceedings of the 31st Conference on Computational Complexity, (1-51)
  151. Roughgarden T (2016). Communication Complexity for Algorithm Designers, Foundations and Trends® in Theoretical Computer Science, 11:3–4, (217-404), Online publication date: 1-May-2016.
  152. ACM
    Lovett S (2016). Communication is Bounded by Root of Rank, Journal of the ACM, 63:1, (1-9), Online publication date: 30-Mar-2016.
  153. Barhum K and Hromkoviăź J On the Power of Laconic Advice in Communication Complexity Proceedings of the 42nd International Conference on SOFSEM 2016: Theory and Practice of Computer Science - Volume 9587, (161-170)
  154. ACM
    Cummings R, Ligett K, Radhakrishnan J, Roth A and Wu Z Coordination Complexity Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science, (281-290)
  155. Ghazi B, Komargodski I, Kothari P and Sudan M Communication with contextual uncertainty Proceedings of the twenty-seventh annual ACM-SIAM symposium on Discrete algorithms, (2072-2085)
  156. Ghazi B, Kamath P and Sudan M Communication complexity of permutation-invariant functions Proceedings of the twenty-seventh annual ACM-SIAM symposium on Discrete algorithms, (1902-1921)
  157. Chakrabarti A and Wirth A Incidence geometries and the pass complexity of semi-streaming set cover Proceedings of the twenty-seventh annual ACM-SIAM symposium on Discrete algorithms, (1365-1373)
  158. Chitnis R, Cormode G, Esfandiari H, Hajiaghayi M, McGregor A, Monemizadeh M and Vorotnikova S Kernelization via sampling with applications to finding matchings and related problems in dynamic graph streams Proceedings of the twenty-seventh annual ACM-SIAM symposium on Discrete algorithms, (1326-1344)
  159. Ambainis A, Belovs A, Regev O and de Wolf R Efficient quantum algorithms for (gapped) group testing and junta testing Proceedings of the twenty-seventh annual ACM-SIAM symposium on Discrete algorithms, (903-922)
  160. ACM
    Miles E and Viola E (2015). Substitution-Permutation Networks, Pseudorandom Functions, and Natural Proofs, Journal of the ACM, 62:6, (1-29), Online publication date: 10-Dec-2015.
  161. Viola E (2015). The communication complexity of addition, Combinatorica, 35:6, (703-747), Online publication date: 1-Dec-2015.
  162. Ergun F and Jowhari H (2015). On the monotonicity of a data stream, Combinatorica, 35:6, (641-653), Online publication date: 1-Dec-2015.
  163. Kalai Y and Komargodski I Compressing Communication in Distributed Protocols Proceedings of the 29th International Symposium on Distributed Computing - Volume 9363, (467-479)
  164. Faenza Y, Fiorini S, Grappe R and Tiwary H (2015). Extended formulations, nonnegative factorizations, and randomized communication protocols, Mathematical Programming: Series A and B, 153:1, (75-94), Online publication date: 1-Oct-2015.
  165. Boyar J and Find M (2015). Cancellation-free circuits in unbounded and bounded depth, Theoretical Computer Science, 590:C, (17-26), Online publication date: 26-Jul-2015.
  166. Dunin-Keplicz B and Strachocka A Tractable inquiry in information-rich environments Proceedings of the 24th International Conference on Artificial Intelligence, (53-60)
  167. ACM
    Braverman M and Oshman R On Information Complexity in the Broadcast Model Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing, (355-364)
  168. ACM
    Baruch M, Fraigniaud P and Patt-Shamir B Randomized Proof-Labeling Schemes Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing, (315-324)
  169. Beame P and Liew V New limits for knowledge compilation and applications to exact model counting Proceedings of the Thirty-First Conference on Uncertainty in Artificial Intelligence, (131-140)
  170. ACM
    Ambainis A, Gasarch W, Srinivasan A and Utis A (2015). Lower Bounds on the Deterministic and Quantum Communication Complexity of Hamming-Distance Problems, ACM Transactions on Computation Theory, 7:3, (1-10), Online publication date: 9-Jul-2015.
  171. ACM
    Jain R (2015). New Strong Direct Product Results in Communication Complexity, Journal of the ACM, 62:3, (1-27), Online publication date: 30-Jun-2015.
  172. Oliveira I and Santhanam R Majority is incompressible by AC0[p] circuits Proceedings of the 30th Conference on Computational Complexity, (124-157)
  173. Ramamoorthy S and Rao A How to compress asymmetric communication Proceedings of the 30th Conference on Computational Complexity, (102-123)
  174. Rao A and Yehudayoff A Simplified lower bounds on the multiparty communication complexity of disjointness Proceedings of the 30th Conference on Computational Complexity, (88-101)
  175. ACM
    Göös M, Lovett S, Meka R, Watson T and Zuckerman D Rectangles Are Nonnegative Juntas Proceedings of the forty-seventh annual ACM symposium on Theory of Computing, (257-266)
  176. ACM
    Ganor A, Kol G and Raz R Exponential Separation of Information and Communication for Boolean Functions Proceedings of the forty-seventh annual ACM symposium on Theory of Computing, (557-566)
  177. ACM
    Gowers T and Viola E The communication complexity of interleaved group products Proceedings of the forty-seventh annual ACM symposium on Theory of Computing, (351-360)
  178. ACM
    Yan Y, Zhang J, Huang B, Sun X, Mu J, Zhang Z and Moscibroda T Distributed Outlier Detection using Compressive Sensing Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, (3-16)
  179. ACM
    Van Gucht D, Williams R, Woodruff D and Zhang Q The Communication Complexity of Distributed Set-Joins with Applications to Matrix Multiplication Proceedings of the 34th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, (199-212)
  180. Martens W, Neven F and Vansummeren S SCULPT Proceedings of the 24th International Conference on World Wide Web, (702-720)
  181. ACM
    Fiorini S, Massar S, Pokutta S, Tiwary H and de Wolf R (2015). Exponential Lower Bounds for Polytopes in Combinatorial Optimization, Journal of the ACM, 62:2, (1-23), Online publication date: 6-May-2015.
  182. Agarwal P and Sharathkumar R (2015). Streaming Algorithms for Extent Problems in High Dimensions, Algorithmica, 72:1, (83-98), Online publication date: 1-May-2015.
  183. Shigeta M and Amano K (2015). Ordered biclique partitions and communication complexity problems, Discrete Applied Mathematics, 184:C, (248-252), Online publication date: 31-Mar-2015.
  184. ACM
    Braverman M and Mao J Simulating Noisy Channel Interaction Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, (21-30)
  185. ACM
    Göös M, Pitassi T and Watson T Zero-Information Protocols and Unambiguity in Arthur-Merlin Communication Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, (113-122)
  186. Chitnis R, Cormode G, Hajiaghayi M and Monemizadeh M Parameterized streaming Proceedings of the twenty-sixth annual ACM-SIAM symposium on Discrete algorithms, (1234-1251)
  187. Gonczarowski Y, Nisan N, Ostrovsky R and Rosenbaum W A stable marriage requires communication Proceedings of the twenty-sixth annual ACM-SIAM symposium on Discrete algorithms, (1003-1017)
  188. Klauck H, Nanongkai D, Pandurangan G and Robinson P Distributed computation of large-scale graph problems Proceedings of the twenty-sixth annual ACM-SIAM symposium on Discrete algorithms, (391-410)
  189. Dobzinski S, Fu H and Kleinberg R On the complexity of computing an equilibrium in combinatorial auctions Proceedings of the twenty-sixth annual ACM-SIAM symposium on Discrete algorithms, (110-122)
  190. ACM
    Sherstov A (2014). Communication Lower Bounds Using Directional Derivatives, Journal of the ACM, 61:6, (1-71), Online publication date: 17-Dec-2014.
  191. Woodruff D (2014). Sketching as a Tool for Numerical Linear Algebra, Foundations and Trends® in Theoretical Computer Science, 10:1–2, (1-157), Online publication date: 29-Oct-2014.
  192. ACM
    Chakrabarti A, Cormode G, Mcgregor A and Thaler J (2014). Annotations in Data Streams, ACM Transactions on Algorithms, 11:1, (1-30), Online publication date: 28-Oct-2014.
  193. ACM
    Brody J, Chakrabarti A, Kondapally R, Woodruff D and Yaroslavtsev G Beyond set disjointness Proceedings of the 2014 ACM symposium on Principles of distributed computing, (106-113)
  194. ACM
    Drucker A, Kuhn F and Oshman R On the power of the congested clique model Proceedings of the 2014 ACM symposium on Principles of distributed computing, (367-376)
  195. ACM
    Elkin M, Klauck H, Nanongkai D and Pandurangan G Can quantum communication speed up distributed computation? Proceedings of the 2014 ACM symposium on Principles of distributed computing, (166-175)
  196. ACM
    Zhao Y, Yu H and Chen B Near-optimal communication-time tradeoff in fault-tolerant computation of aggregate functions Proceedings of the 2014 ACM symposium on Principles of distributed computing, (416-426)
  197. ACM
    Lenzen C and Patt-Shamir B Improved distributed steiner forest construction Proceedings of the 2014 ACM symposium on Principles of distributed computing, (262-271)
  198. ACM
    Ben-Sasson E, Lovett S and Ron-Zewi N (2014). An Additive Combinatorics Approach Relating Rank to Communication Complexity, Journal of the ACM, 61:4, (1-18), Online publication date: 1-Jul-2014.
  199. ACM
    Xu B Boosting the basic counting on distributed streams Proceedings of the 26th International Conference on Scientific and Statistical Database Management, (1-12)
  200. ACM
    Feigenbaum J, Jaggard A and Schapira M (2014). Approximate Privacy, ACM Transactions on Algorithms, 10:3, (1-38), Online publication date: 1-Jun-2014.
  201. ACM
    Göös M and Pitassi T Communication lower bounds via critical block sensitivity Proceedings of the forty-sixth annual ACM symposium on Theory of computing, (847-856)
  202. ACM
    Babichenko Y Query complexity of approximate nash equilibria Proceedings of the forty-sixth annual ACM symposium on Theory of computing, (535-544)
  203. ACM
    Lovett S Communication is bounded by root of rank Proceedings of the forty-sixth annual ACM symposium on Theory of computing, (842-846)
  204. ACM
    Chen B, Yu H, Zhao Y and Gibbons P (2014). The Cost of Fault Tolerance in Multi-Party Communication Complexity, Journal of the ACM, 61:3, (1-64), Online publication date: 1-May-2014.
  205. Amano K (2014). Some improved bounds on communication complexity via new decomposition of cliques, Discrete Applied Mathematics, 166:C, (249-254), Online publication date: 31-Mar-2014.
  206. Zheng S, Gruska J and Qiu D On the State Complexity of Semi-quantum Finite Automata Proceedings of the 8th International Conference on Language and Automata Theory and Applications - Volume 8370, (601-612)
  207. ACM
    Ada A, Chattopadhyay A, Cook S, Fontes L, Koucký M and Pitassi T (2014). The Hardness of Being Private, ACM Transactions on Computation Theory, 6:1, (1-24), Online publication date: 1-Mar-2014.
  208. Babichenko Y (2014). How long to Pareto efficiency?, International Journal of Game Theory, 43:1, (13-24), Online publication date: 1-Feb-2014.
  209. Kini D and Viswanathan M Probabilistic Automata for Safety LTL Specifications Proceedings of the 15th International Conference on Verification, Model Checking, and Abstract Interpretation - Volume 8318, (118-136)
  210. ACM
    Kol G, Moran S, Shpilka A and Yehudayoff A Direct sum fails for zero error average communication Proceedings of the 5th conference on Innovations in theoretical computer science, (517-522)
  211. ACM
    Haramaty E and Sudan M Deterministic compression with uncertain priors Proceedings of the 5th conference on Innovations in theoretical computer science, (377-386)
  212. Woodruff D and Zhang Q An optimal lower bound for distinct elements in the message passing model Proceedings of the twenty-fifth annual ACM-SIAM symposium on Discrete algorithms, (718-733)
  213. ACM
    Fawzi O, Hayden P and Sen P (2013). From Low-Distortion Norm Embeddings to Explicit Uncertainty Relations and Efficient Information Locking, Journal of the ACM, 60:6, (1-61), Online publication date: 1-Nov-2013.
  214. ACM
    Konrad C and Magniez F (2013). Validating XML documents in the streaming model with external memory, ACM Transactions on Database Systems, 38:4, (1-36), Online publication date: 1-Nov-2013.
  215. Woodruff D and Zhang Q When Distributed Computation Is Communication Expensive Proceedings of the 27th International Symposium on Distributed Computing - Volume 8205, (16-30)
  216. Métivier Y, Robson J, Saheb-Djahromi N and Zemmari A (2013). On the time and the bit complexity of distributed randomised anonymous ring colouring, Theoretical Computer Science, 502, (64-75), Online publication date: 1-Sep-2013.
  217. Boyar J and Find M Cancellation-Free circuits in unbounded and bounded depth Proceedings of the 19th international conference on Fundamentals of Computation Theory, (159-170)
  218. Peretz R (2013). Learning Cycle Length Through Finite Automata, Mathematics of Operations Research, 38:3, (526-534), Online publication date: 1-Aug-2013.
  219. ACM
    Beame P, Koutris P and Suciu D Communication steps for parallel query processing Proceedings of the 32nd ACM SIGMOD-SIGACT-SIGAI symposium on Principles of database systems, (273-284)
  220. ACM
    Braverman M and Moitra A An information complexity approach to extended formulations Proceedings of the forty-fifth annual ACM symposium on Theory of Computing, (161-170)
  221. ACM
    Braverman M, Garg A, Pankratov D and Weinstein O From information to exact communication Proceedings of the forty-fifth annual ACM symposium on Theory of Computing, (151-160)
  222. ACM
    Jayram T and Woodruff D (2013). Optimal Bounds for Johnson-Lindenstrauss Transforms and Streaming Problems with Subconstant Error, ACM Transactions on Algorithms, 9:3, (1-17), Online publication date: 1-Jun-2013.
  223. ACM
    Cormode G (2013). The continuous distributed monitoring model, ACM SIGMOD Record, 42:1, (5-14), Online publication date: 1-May-2013.
  224. Briët J, Buhrman H, Lee T and Vidick T (2013). Multipartite entanglement in XOR games, Quantum Information & Computation, 13:3-4, (334-360), Online publication date: 1-Mar-2013.
  225. Molinaro M, Woodruff D and Yaroslavtsev G Beating the direct sum theorem in communication complexity with implications for sketching Proceedings of the twenty-fourth annual ACM-SIAM symposium on Discrete algorithms, (1738-1756)
  226. Tamm U Multiparty communication complexity of vector---valued and sum---type functions Information Theory, Combinatorics, and Search Theory, (451-462)
  227. ACM
    De Rougemont M and Cao P Approximate answers to OLAP queries on streaming data warehouses Proceedings of the fifteenth international workshop on Data warehousing and OLAP, (121-128)
  228. Goldberg P and Pastink A On the Communication Complexity of Approximate Nash Equilibria Proceedings of the 5th International Symposium on Algorithmic Game Theory - Volume 7615, (192-203)
  229. Jowhari H Efficient communication protocols for deciding edit distance Proceedings of the 20th Annual European conference on Algorithms, (648-658)
  230. Montoya J Computing with sand Proceedings of the 11th international conference on Unconventional Computation and Natural Computation, (174-185)
  231. ACM
    Andoni A and Krauthgamer R (2012). The smoothed complexity of edit distance, ACM Transactions on Algorithms, 8:4, (1-25), Online publication date: 1-Sep-2012.
  232. Miles E and Viola E Substitution-Permutation Networks, Pseudorandom Functions, and Natural Proofs Proceedings of the 32nd Annual Cryptology Conference on Advances in Cryptology --- CRYPTO 2012 - Volume 7417, (68-85)
  233. ACM
    Drucker A, Kuhn F and Oshman R The communication complexity of distributed task allocation Proceedings of the 2012 ACM symposium on Principles of distributed computing, (67-76)
  234. ACM
    Chen B, Yu H, Zhao Y and Gibbons P The cost of fault tolerance in multi-party communication complexity Proceedings of the 2012 ACM symposium on Principles of distributed computing, (57-66)
  235. Halldórsson M, Sun X, Szegedy M and Wang C Streaming and communication complexity of clique approximation Proceedings of the 39th international colloquium conference on Automata, Languages, and Programming - Volume Part I, (449-460)
  236. Ada A, Chattopadhyay A, Fawzi O and Nguyen P The NOF multiparty communication complexity of composed functions Proceedings of the 39th international colloquium conference on Automata, Languages, and Programming - Volume Part I, (13-24)
  237. ACM
    Hua N, Lall A, Li B and Xu J Towards optimal error-estimating codes through the lens of Fisher information analysis Proceedings of the 12th ACM SIGMETRICS/PERFORMANCE joint international conference on Measurement and Modeling of Computer Systems, (125-136)
  238. ACM
    Hua N, Lall A, Li B and Xu J (2012). Towards optimal error-estimating codes through the lens of Fisher information analysis, ACM SIGMETRICS Performance Evaluation Review, 40:1, (125-136), Online publication date: 7-Jun-2012.
  239. Service T and Adams J Communication complexity of approximating voting rules Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems - Volume 2, (593-602)
  240. ACM
    Woodruff D and Zhang Q Tight bounds for distributed functional monitoring Proceedings of the forty-fourth annual ACM symposium on Theory of computing, (941-960)
  241. ACM
    Kayal N Affine projections of polynomials Proceedings of the forty-fourth annual ACM symposium on Theory of computing, (643-662)
  242. ACM
    Sherstov A The multiparty communication complexity of set disjointness Proceedings of the forty-fourth annual ACM symposium on Theory of computing, (525-548)
  243. ACM
    Braverman M Interactive information complexity Proceedings of the forty-fourth annual ACM symposium on Theory of computing, (505-524)
  244. ACM
    Huynh T and Nordstrom J On the virtue of succinct proofs Proceedings of the forty-fourth annual ACM symposium on Theory of computing, (233-248)
  245. ACM
    Fiorini S, Massar S, Pokutta S, Tiwary H and de Wolf R Linear vs. semidefinite extended formulations Proceedings of the forty-fourth annual ACM symposium on Theory of computing, (95-106)
  246. Faenza Y, Fiorini S, Grappe R and Tiwary H Extended formulations, nonnegative factorizations, and randomized communication protocols Proceedings of the Second international conference on Combinatorial Optimization, (129-140)
  247. ACM
    Konrad C and Magniez F Validating XML documents in the streaming model with external memory Proceedings of the 15th International Conference on Database Theory, (34-45)
  248. Goyal V, Kumar V, Lokam S and Mahmoody M On black-box reductions between predicate encryption schemes Proceedings of the 9th international conference on Theory of Cryptography, (440-457)
  249. Frischknecht S, Holzer S and Wattenhofer R Networks cannot compute their diameter in sublinear time Proceedings of the twenty-third annual ACM-SIAM symposium on Discrete algorithms, (1150-1162)
  250. Phillips J, Verbin E and Zhang Q Lower bounds for number-in-hand multiparty communication complexity, made easy Proceedings of the twenty-third annual ACM-SIAM symposium on Discrete algorithms, (486-501)
  251. Cormode G, Garofalakis M, Haas P and Jermaine C (2012). Synopses for Massive Data, Foundations and Trends in Databases, 4:1–3, (1-294), Online publication date: 1-Jan-2012.
  252. Cojocaru L (2011). Trade-Offs Between Time, Space, Cooperation, and Communication Complexity for CD Grammar Systems, Fundamenta Informaticae, 107:4, (345-378), Online publication date: 1-Dec-2011.
  253. Comi M, DasGupta B, Schapira M and Srinivasan V On communication protocols that compute almost privately Proceedings of the 4th international conference on Algorithmic game theory, (44-56)
  254. Kuhn F and Oshman R The complexity of data aggregation in directed networks Proceedings of the 25th international conference on Distributed computing, (416-431)
  255. Schneider J and Wattenhofer R Trading bit, message, and time complexity of distributed algorithms Proceedings of the 25th international conference on Distributed computing, (51-65)
  256. ACM
    Cormode G Continuous distributed monitoring Proceedings of the First International Workshop on Algorithms and Models for Distributed Event Processing, (1-10)
  257. Cormode G, Thaler J and Yi K (2011). Verifying computations with streaming interactive proofs, Proceedings of the VLDB Endowment, 5:1, (25-36), Online publication date: 1-Sep-2011.
  258. Uchizawa K and Takimoto E Lower bounds for linear decision trees via an energy complexity argument Proceedings of the 36th international conference on Mathematical foundations of computer science, (568-579)
  259. Lovett S and Srinivasan S Correlation bounds for poly-size AC0 circuits with n1-o(1) symmetric gates Proceedings of the 14th international workshop and 15th international conference on Approximation, randomization, and combinatorial optimization: algorithms and techniques, (640-651)
  260. Chakrabarti A and Kondapally R Everywhere-tight information cost tradeoffs for augmented index Proceedings of the 14th international workshop and 15th international conference on Approximation, randomization, and combinatorial optimization: algorithms and techniques, (448-459)
  261. Brody J and Woodruff D Streaming algorithms with one-sided estimation Proceedings of the 14th international workshop and 15th international conference on Approximation, randomization, and combinatorial optimization: algorithms and techniques, (436-447)
  262. ACM
    Smyth C (2011). Approximate Query Complexity, ACM Transactions on Computation Theory, 3:1, (1-11), Online publication date: 1-Aug-2011.
  263. ACM
    Chevaleyre Y, Lang J, Maudet N and Monnot J Compilation and communication protocols for voting rules with a dynamic set of candidates Proceedings of the 13th Conference on Theoretical Aspects of Rationality and Knowledge, (153-160)
  264. Harrow A, Montanaro A and Short A Limitations on quantum dimensionality reduction Proceedings of the 38th international colloquim conference on Automata, languages and programming - Volume Part I, (86-97)
  265. Zhang S On the power of lower bound methods for one-way quantum communication complexity Proceedings of the 38th international colloquim conference on Automata, languages and programming - Volume Part I, (49-60)
  266. Montanaro A (2011). A new exponential separation between quantum and classical one-way communication complexity, Quantum Information & Computation, 11:7-8, (574-591), Online publication date: 1-Jul-2011.
  267. Clifford R, Jalsenius M, Porat E and Sach B Space lower bounds for online pattern matching Proceedings of the 22nd annual conference on Combinatorial pattern matching, (184-196)
  268. Soto J and Telha C Jump number of two-directional orthogonal ray graphs Proceedings of the 15th international conference on Integer programming and combinatoral optimization, (389-403)
  269. ACM
    Muthukrishnan S Theory of data stream computing Proceedings of the thirtieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, (317-319)
  270. ACM
    Nanongkai D, Das Sarma A and Pandurangan G A tight unconditional lower bound on distributed randomwalk computation Proceedings of the 30th annual ACM SIGACT-SIGOPS symposium on Principles of distributed computing, (257-266)
  271. ACM
    Fawzi O, Hayden P and Sen P From low-distortion norm embeddings to explicit uncertainty relations and efficient information locking Proceedings of the forty-third annual ACM symposium on Theory of computing, (773-782)
  272. ACM
    Woodruff D Near-optimal private approximation protocols via a black box transformation Proceedings of the forty-third annual ACM symposium on Theory of computing, (735-744)
  273. ACM
    Das Sarma A, Holzer S, Kor L, Korman A, Nanongkai D, Pandurangan G, Peleg D and Wattenhofer R Distributed verification and hardness of distributed approximation Proceedings of the forty-third annual ACM symposium on Theory of computing, (363-372)
  274. ACM
    Braverman M and Rao A Towards coding for maximum errors in interactive communication Proceedings of the forty-third annual ACM symposium on Theory of computing, (159-166)
  275. ACM
    Chakrabarti A and Regev O An optimal lower bound on the communication complexity of gap-hamming-distance Proceedings of the forty-third annual ACM symposium on Theory of computing, (51-60)
  276. ACM
    Sherstov A Strong direct product theorems for quantum communication and query complexity Proceedings of the forty-third annual ACM symposium on Theory of computing, (41-50)
  277. ACM
    Regev O and Klartag B Quantum one-way communication can be exponentially stronger than classical communication Proceedings of the forty-third annual ACM symposium on Theory of computing, (31-40)
  278. ACM
    Locher T Finding heavy distinct hitters in data streams Proceedings of the twenty-third annual ACM symposium on Parallelism in algorithms and architectures, (299-308)
  279. Beimel A Secret-sharing schemes Proceedings of the Third international conference on Coding and cryptology, (11-46)
  280. Sołtys K The hardness of median in the synchronized bit communication model Proceedings of the 8th annual conference on Theory and applications of models of computation, (409-415)
  281. Leung M, Li Y and Zhang S Tight bounds on communication complexity of symmetric XOR functions in one-way and SMP models Proceedings of the 8th annual conference on Theory and applications of models of computation, (403-408)
  282. Brody J, Matulef K and Wu C Lower bounds for testing computability by small width OBDDs Proceedings of the 8th annual conference on Theory and applications of models of computation, (320-331)
  283. Das Sarma A, Lipton R and Nanongkai D (2011). Best-order streaming model, Theoretical Computer Science, 412:23, (2544-2555), Online publication date: 20-May-2011.
  284. Kaplan M and Laplante S (2011). Kolmogorov complexity and combinatorial methods in communication complexity, Theoretical Computer Science, 412:23, (2524-2535), Online publication date: 20-May-2011.
  285. Bollig B (2011). On the OBDD complexity of the most significant bit of integer multiplication, Theoretical Computer Science, 412:18, (1686-1695), Online publication date: 1-Apr-2011.
  286. Métivier Y, Robson J, Saheb-Djahromi N and Zemmari A (2011). An optimal bit complexity randomized distributed MIS algorithm, Distributed Computing, 23:5-6, (331-340), Online publication date: 1-Apr-2011.
  287. Bollig B (2011). Larger lower bounds on the OBDD complexity of integer multiplication, Information and Computation, 209:3, (333-343), Online publication date: 1-Mar-2011.
  288. Kayal N Efficient algorithms for some special cases of the polynomial equivalence problem Proceedings of the twenty-second annual ACM-SIAM symposium on Discrete algorithms, (1409-1421)
  289. Jayram T and Woodruff D Optimal bounds for Johnson-Lindenstrauss transforms and streaming problems with sub-constant error Proceedings of the twenty-second annual ACM-SIAM symposium on Discrete algorithms, (1-10)
  290. Bollig B and Gillé M Randomized OBDDs for the most significant bit of multiplication need exponential size Proceedings of the 37th international conference on Current trends in theory and practice of computer science, (135-145)
  291. Zelke M (2011). Intractability of min- and max-cut in streaming graphs, Information Processing Letters, 111:3, (145-150), Online publication date: 1-Jan-2011.
  292. ACM
    Yin Y (2010). Cell-Probe Proofs, ACM Transactions on Computation Theory, 2:1, (1-17), Online publication date: 1-Nov-2010.
  293. Grigorieva E, Herings P, Müller R and Vermeulen D (2010). On the Fastest Vickrey Algorithm, Algorithmica, 58:3, (566-590), Online publication date: 1-Nov-2010.
  294. ACM
    Chattopadhyay A and Pitassi T (2010). The story of set disjointness, ACM SIGACT News, 41:3, (59-85), Online publication date: 3-Sep-2010.
  295. Brody J, Chakrabarti A, Regev O, Vidick T and De Wolf R Better gap-hamming lower bounds via better round elimination Proceedings of the 13th international conference on Approximation, and 14 the International conference on Randomization, and combinatorial optimization: algorithms and techniques, (476-489)
  296. Ablayev F and Ablayeva S (2010). A Communication Approach to the Superposition Problem, Fundamenta Informaticae, 104:3, (185-200), Online publication date: 1-Aug-2010.
  297. Jain R, Klauck H and Zhang S Depth-independent lower bounds on the communication complexity of read-once Boolean formulas Proceedings of the 16th annual international conference on Computing and combinatorics, (54-59)
  298. Rudra A and Uurtamo S Data stream algorithms for codeword testing Proceedings of the 37th international colloquium conference on Automata, languages and programming, (629-640)
  299. Lee T and Zhang S Composition theorems in communication complexity Proceedings of the 37th international colloquium conference on Automata, languages and programming, (475-489)
  300. Beimel A, Daniel S, Kushilevitz E and Weinreb E Choosing, agreeing, and eliminating in communication complexity Proceedings of the 37th international colloquium conference on Automata, languages and programming, (451-462)
  301. Aspnes J, Blais E, Demirbas M, O'Donnell R, Rudra A and Uurtamo S k+ decision trees Proceedings of the 6th international conference on Algorithms for sensor systems, wireless adhoc networks, and autonomous mobile entities, (74-88)
  302. Hromkovič J Algorithmics – is there hope for a unified theory? Proceedings of the 5th international conference on Computer Science: theory and Applications, (181-194)
  303. ACM
    Feigenbaum J, Jaggard A and Schapira M Approximate privacy Proceedings of the 11th ACM conference on Electronic commerce, (167-178)
  304. Kushilevitz E Communication complexity Proceedings of the 17th international conference on Structural Information and Communication Complexity, (1-1)
  305. ACM
    Jayram T Information complexity Proceedings of the twenty-ninth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, (159-168)
  306. ACM
    Braverman V and Ostrovsky R Zero-one frequency laws Proceedings of the forty-second ACM symposium on Theory of computing, (281-290)
  307. ACM
    Beame P, Huynh T and Pitassi T Hardness amplification in proof complexity Proceedings of the forty-second ACM symposium on Theory of computing, (87-96)
  308. ACM
    Klauck H A strong direct product theorem for disjointness Proceedings of the forty-second ACM symposium on Theory of computing, (77-86)
  309. ACM
    Barak B, Braverman M, Chen X and Rao A How to compress interactive communication Proceedings of the forty-second ACM symposium on Theory of computing, (67-76)
  310. Zhang Z and Shi Y (2010). On the parity complexity measures of Boolean functions, Theoretical Computer Science, 411:26-28, (2612-2618), Online publication date: 1-Jun-2010.
  311. Tarui J (2010). Smallest formulas for the parity of 2 k variables are essentially unique, Theoretical Computer Science, 411:26-28, (2623-2627), Online publication date: 1-Jun-2010.
  312. Korman A, Kutten S and Peleg D (2010). Proof labeling schemes, Distributed Computing, 22:4, (215-233), Online publication date: 1-May-2010.
  313. Bollig B A larger lower bound on the OBDD complexity of the most significant bit of multiplication Proceedings of the 9th Latin American conference on Theoretical Informatics, (255-266)
  314. Li C and Dai H Towards efficient designs for in-network computing with noisy wireless channels Proceedings of the 29th conference on Information communications, (2008-2015)
  315. Agarwal P and Sharathkumar R Streaming algorithms for extent problems in high dimensions Proceedings of the twenty-first annual ACM-SIAM symposium on Discrete algorithms, (1481-1489)
  316. Do Ba K, Indyk P, Price E and Woodruff D Lower bounds for sparse recovery Proceedings of the twenty-first annual ACM-SIAM symposium on Discrete algorithms, (1190-1197)
  317. Kane D, Nelson J and Woodruff D On the exact space complexity of sketching and streaming small norms Proceedings of the twenty-first annual ACM-SIAM symposium on Discrete algorithms, (1161-1178)
  318. Buchfuhrer D, Dughmi S, Fu H, Kleinberg R, Mossel E, Papadimitriou C, Schapira M, Singer Y and Umans C Inapproximability for VCG-based combinatorial auctions Proceedings of the twenty-first annual ACM-SIAM symposium on Discrete algorithms, (518-536)
  319. Harsha P, Jain R, McAllester D and Radhakrishnan J (2010). The communication complexity of correlation, IEEE Transactions on Information Theory, 56:1, (438-449), Online publication date: 1-Jan-2010.
  320. Dhulipala A, Fragouli C and Orlitsky A (2010). Silence-based communication, IEEE Transactions on Information Theory, 56:1, (350-366), Online publication date: 1-Jan-2010.
  321. Zhang S On the Tightness of the Buhrman-Cleve-Wigderson Simulation Proceedings of the 20th International Symposium on Algorithms and Computation, (434-440)
  322. ACM
    Demetrescu C, Finocchi I and Ribichini A (2009). Trading off space for passes in graph streaming problems, ACM Transactions on Algorithms, 6:1, (1-17), Online publication date: 1-Dec-2009.
  323. ACM
    Schweikardt N (2009). Machine models for query processing, ACM SIGMOD Record, 38:2, (18-28), Online publication date: 26-Oct-2009.
  324. ACM
    David M, Pitassi T and Viola E (2009). Improved Separations between Nondeterministic and Randomized Multiparty Communication, ACM Transactions on Computation Theory, 1:2, (1-20), Online publication date: 1-Sep-2009.
  325. ACM
    Yi K, Li F, Cormode G, Hadjieleftheriou M, Kollios G and Srivastava D (2009). Small synopses for group-by query verification on outsourced data streams, ACM Transactions on Database Systems, 34:3, (1-42), Online publication date: 1-Aug-2009.
  326. Hromkovi J, Petersen H and Schnitger G (2009). On the limits of the communication complexity technique for proving lower bounds on the size of minimal NFA's, Theoretical Computer Science, 410:30-32, (2972-2981), Online publication date: 1-Aug-2009.
  327. Wunderlich H (2009). On cover-structure graphs, Discrete Applied Mathematics, 157:15, (3289-3299), Online publication date: 1-Aug-2009.
  328. Chevaleyre Y, Lang J, Maudet N and Ravilly-Abadie G Compiling the votes of a subelectorate Proceedings of the 21st International Joint Conference on Artificial Intelligence, (97-102)
  329. ACM
    Cormode G, Golab L, Flip K, McGregor A, Srivastava D and Zhang X Estimating the confidence of conditional functional dependencies Proceedings of the 2009 ACM SIGMOD International Conference on Management of data, (469-482)
  330. Jain R and Zhang S (2009). New bounds on classical and quantum one-way communication complexity, Theoretical Computer Science, 410:26, (2463-2477), Online publication date: 1-Jun-2009.
  331. Wu T, Cameron P and Riis S (2009). On the guessing number of shift graphs, Journal of Discrete Algorithms, 7:2, (220-226), Online publication date: 1-Jun-2009.
  332. ACM
    Impagliazzo R, Kabanets V and Kolokolova A An axiomatic approach to algebrization Proceedings of the forty-first annual ACM symposium on Theory of computing, (695-704)
  333. ACM
    Kushilevitz E and Weinreb E On the complexity of communication complexity Proceedings of the forty-first annual ACM symposium on Theory of computing, (465-474)
  334. ACM
    Clarkson K and Woodruff D Numerical linear algebra in the streaming model Proceedings of the forty-first annual ACM symposium on Theory of computing, (205-214)
  335. Yves M, Robson J, Nasser S and Zemmari A An optimal bit complexity randomized distributed MIS algorithm (extended abstract) Proceedings of the 16th international conference on Structural Information and Communication Complexity, (323-337)
  336. Kaplan M and Laplante S Kolmogorov Complexity and Combinatorial Methods in Communication Complexity Proceedings of the 6th Annual Conference on Theory and Applications of Models of Computation, (261-270)
  337. Das Sarma A, Lipton R and Nanongkai D Best-Order Streaming Model Proceedings of the 6th Annual Conference on Theory and Applications of Models of Computation, (178-191)
  338. ACM
    Woodruff D The average-case complexity of counting distinct elements Proceedings of the 12th International Conference on Database Theory, (284-295)
  339. ACM
    Guha S Tight results for clustering and summarizing data streams Proceedings of the 12th International Conference on Database Theory, (268-275)
  340. Linial N and Shraibman A (2009). Learning complexity vs communication complexity, Combinatorics, Probability and Computing, 18:1-2, (227-245), Online publication date: 1-Mar-2009.
  341. ACM
    Viola E (2009). Guest Column, ACM SIGACT News, 40:1, (27-44), Online publication date: 28-Feb-2009.
  342. Gopalan P and Radhakrishnan J Finding duplicates in a data stream Proceedings of the twentieth annual ACM-SIAM symposium on Discrete algorithms, (402-411)
  343. Hromkovič J and Schnitger G (2009). Lower bounds on the size of sweeping automata, Journal of Automata, Languages and Combinatorics, 14:1, (23-31), Online publication date: 1-Jan-2009.
  344. Lokam S (2009). Complexity Lower Bounds using Linear Algebra, Foundations and Trends® in Theoretical Computer Science, 4:1–2, (1-155), Online publication date: 1-Jan-2009.
  345. Ada A On the Non-deterministic Communication Complexity of Regular Languages Proceedings of the 12th international conference on Developments in Language Theory, (96-107)
  346. Hromkovič J and Schnitger G On the Hardness of Determining Small NFA's and of Proving Lower Bounds on Their Sizes Proceedings of the 12th international conference on Developments in Language Theory, (34-55)
  347. ACM
    Broadbent A and Tapp A (2008). Can quantum mechanics help distributed computing?, ACM SIGACT News, 39:3, (67-76), Online publication date: 1-Sep-2008.
  348. David M, Pitassi T and Viola E Improved Separations between Nondeterministic and Randomized Multiparty Communication Proceedings of the 11th international workshop, APPROX 2008, and 12th international workshop, RANDOM 2008 on Approximation, Randomization and Combinatorial Optimization: Algorithms and Techniques, (371-384)
  349. ACM
    Kuhn F, Locher T and Schmid S Distributed computation of the mode Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing, (15-24)
  350. ACM
    Babaioff M, Blumrosen L, Naor M and Schapira M Informational overhead of incentive compatibility Proceedings of the 9th ACM conference on Electronic commerce, (88-97)
  351. ACM
    Lahaie S and Parkes D On the communication requirements of verifying the VCG outcome Proceedings of the 9th ACM conference on Electronic commerce, (78-87)
  352. Lee T and Mittal R Product Theorems Via Semidefinite Programming Proceedings of the 35th international colloquium on Automata, Languages and Programming - Volume Part I, (674-685)
  353. Tani S, Nakanishi M and Yamashita S Multi-party Quantum Communication Complexity with Routed Messages Proceedings of the 14th annual international conference on Computing and Combinatorics, (180-190)
  354. Tarui J Smallest Formulas for Parity of 2k Variables Are Essentially Unique Proceedings of the 14th annual international conference on Computing and Combinatorics, (92-99)
  355. Venkatesan N, Agarwal T and Kumar P On the Average Case Communication Complexity for Detection in Sensor Networks Proceedings of the 4th IEEE international conference on Distributed Computing in Sensor Systems, (176-189)
  356. ACM
    Barkol O, Ishai Y and Weinreb E Communication in the presence of replication Proceedings of the fortieth annual ACM symposium on Theory of computing, (661-670)
  357. ACM
    Chakrabarti A, Cormode G and McGregor A Robust lower bounds for communication and stream computation Proceedings of the fortieth annual ACM symposium on Theory of computing, (641-650)
  358. ACM
    Feldman V Evolvability from learning algorithms Proceedings of the fortieth annual ACM symposium on Theory of computing, (619-628)
  359. ACM
    Jain R, Klauck H and Nayak A Direct product theorems for classical communication complexity via subdistribution bounds Proceedings of the fortieth annual ACM symposium on Theory of computing, (599-608)
  360. ACM
    Gavinsky D Classical interaction cannot replace a quantum message Proceedings of the fortieth annual ACM symposium on Theory of computing, (95-102)
  361. ACM
    Sherstov A The pattern matrix method for lower bounds on quantum communication Proceedings of the fortieth annual ACM symposium on Theory of computing, (85-94)
  362. Bollig B On the OBDD complexity of the most significant bit of integer multiplication Proceedings of the 5th international conference on Theory and applications of models of computation, (306-317)
  363. Katz J and Lindell A Aggregate message authentication codes Proceedings of the 2008 The Cryptopgraphers' Track at the RSA conference on Topics in cryptology, (155-169)
  364. Azimian K and Szegedy M Parallel repetition of the odd cycle game Proceedings of the 8th Latin American conference on Theoretical informatics, (676-686)
  365. Gruber H and Johannsen J Optimal lower bounds on regular expression size using communication complexity Proceedings of the Theory and practice of software, 11th international conference on Foundations of software science and computational structures, (273-286)
  366. Kilian J, Madeira A, Strauss M and Zheng X Fast private norm estimation and heavy hitters Proceedings of the 5th conference on Theory of cryptography, (176-193)
  367. ACM
    Dinitz Y, Moran S and Rajsbaum S (2008). Bit complexity of breaking and achieving symmetry in chains and rings, Journal of the ACM, 55:1, (1-28), Online publication date: 1-Feb-2008.
  368. Ergun F and Jowhari H On distance to monotonicity and longest increasing subsequence of a data stream Proceedings of the nineteenth annual ACM-SIAM symposium on Discrete algorithms, (730-736)
  369. Harvey N Matroid intersection, pointer chasing, and Young's seminormal representation of S Proceedings of the nineteenth annual ACM-SIAM symposium on Discrete algorithms, (542-549)
  370. Petersen H Element distinctness and sorting on one-tape off-line turing machines Proceedings of the 34th conference on Current trends in theory and practice of computer science, (406-417)
  371. Bollig B, Range N and Wegener I Exact OBDD bounds for some fundamental functions Proceedings of the 34th conference on Current trends in theory and practice of computer science, (174-185)
  372. Bille P, Pagh A and Pagh R Fast evaluation of union-intersection expressions Proceedings of the 18th international conference on Algorithms and computation, (739-750)
  373. Iwama K, Nishimura H, Raymond R and Yamashita S Unbounded-error classical and quantum communication complexity Proceedings of the 18th international conference on Algorithms and computation, (100-111)
  374. Bille P, Pagh A and Pagh R Fast Evaluation of Union-Intersection Expressions Algorithms and Computation, (739-750)
  375. Kumar R and Sivakumar D Communication lower bounds via the chromatic number Proceedings of the 27th international conference on Foundations of software technology and theoretical computer science, (228-240)
  376. Kumar R and Sivakumar D Communication Lower Bounds Via the Chromatic Number FSTTCS 2007: Foundations of Software Technology and Theoretical Computer Science, (228-240)
  377. Dinitz Y and Solomon N (2007). Two absolute bounds for distributed bit complexity, Theoretical Computer Science, 384:2-3, (168-183), Online publication date: 1-Oct-2007.
  378. Kumar R and Panigrahy R On Finding Frequent Elements in a Data Stream Proceedings of the 10th International Workshop on Approximation and the 11th International Workshop on Randomization, and Combinatorial Optimization. Algorithms and Techniques, (584-595)
  379. ACM
    Cormode G, Tirthapura S and Xu B Time-decaying sketches for sensor data aggregation Proceedings of the twenty-sixth annual ACM symposium on Principles of distributed computing, (215-224)
  380. ACM
    Laplante S, Lassaigne R, Magniez F, Peyronnet S and de Rougemont M (2007). Probabilistic abstraction for model checking, ACM Transactions on Computational Logic, 8:4, (20-es), Online publication date: 1-Aug-2007.
  381. Hromkovi J and Schnitger G (2007). Comparing the size of NFAs with and without ε-transitions, Theoretical Computer Science, 380:1-2, (100-114), Online publication date: 20-Jul-2007.
  382. Grohe M, Koch C and Schweikardt N (2007). Tight lower bounds for query processing on streaming and external memory data, Theoretical Computer Science, 380:1-2, (199-217), Online publication date: 20-Jul-2007.
  383. Chu M, Kannan S and McGregor A Checking and spot-checking the correctness of priority queues Proceedings of the 34th international conference on Automata, Languages and Programming, (728-739)
  384. Guha S and McGregor A Lower bounds for quantile estimation in random-order and multi-pass streaming Proceedings of the 34th international conference on Automata, Languages and Programming, (704-715)
  385. Beame P, David M, Pitassi T and Woelfel P Separating deterministic from nondeterministic nof multiparty communication complexity Proceedings of the 34th international conference on Automata, Languages and Programming, (134-145)
  386. Montanaro A and Winter A A lower bound on entanglement-assisted quantum communication complexity Proceedings of the 34th international conference on Automata, Languages and Programming, (122-133)
  387. Iwama K, Nishimura H, Raymond R and Yamashita S Unbounded-error one-way classical and quantum communication complexity Proceedings of the 34th international conference on Automata, Languages and Programming, (110-121)
  388. ACM
    Schweikardt N Machine models and lower bounds for query processing Proceedings of the twenty-sixth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, (41-52)
  389. ACM
    Linial N and Shraibman A Lower bounds in communication complexity based on factorization norms Proceedings of the thirty-ninth annual ACM symposium on Theory of computing, (699-708)
  390. ACM
    Hoyer P, Lee T and Spalek R Negative weights make adversaries stronger Proceedings of the thirty-ninth annual ACM symposium on Theory of computing, (526-535)
  391. ACM
    Gavinsky D, Kempe J, Kerenidis I, Raz R and de Wolf R Exponential separations for one-way quantum communication complexity, with applications to cryptography Proceedings of the thirty-ninth annual ACM symposium on Theory of computing, (516-525)
  392. ACM
    Hart S and Mansour Y The communication complexity of uncoupled nash equilibrium procedures Proceedings of the thirty-ninth annual ACM symposium on Theory of computing, (345-353)
  393. ACM
    Dobzinski S and Nisan N Limitations of VCG-based mechanisms Proceedings of the thirty-ninth annual ACM symposium on Theory of computing, (338-344)
  394. ACM
    Sherstov A Separating AC0 from depth-2 majority circuits Proceedings of the thirty-ninth annual ACM symposium on Theory of computing, (294-301)
  395. Kojevnikov A Improved lower bounds for tree-like resolution over linear inequalities Proceedings of the 10th international conference on Theory and applications of satisfiability testing, (70-79)
  396. Kerenidis I Quantum multiparty communication complexity and circuit lower bounds Proceedings of the 4th international conference on Theory and applications of models of computation, (306-317)
  397. Tarui J Finding a duplicate and a missing item in a stream Proceedings of the 4th international conference on Theory and applications of models of computation, (128-135)
  398. Fogaras D and Racz B (2007). Practical Algorithms and Lower Bounds for Similarity Search in Massive Graphs, IEEE Transactions on Knowledge and Data Engineering, 19:5, (585-598), Online publication date: 1-May-2007.
  399. Momcilovic P Scalability of Routing Tables in Wireless Networks Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (1262-1270)
  400. Chattopadhyay A, Krebs A, Koucky M, Szegedy M, Tesson P and Thérien D Languages with bounded multiparty communication complexity Proceedings of the 24th annual conference on Theoretical aspects of computer science, (500-511)
  401. Lee T A new rank technique for formula size lower bounds Proceedings of the 24th annual conference on Theoretical aspects of computer science, (145-156)
  402. Chevaleyre Y, Endriss U, Lang J and Maudet N A Short Introduction to Computational Social Choice Proceedings of the 33rd conference on Current Trends in Theory and Practice of Computer Science, (51-69)
  403. Sun X and Woodruff D The communication and streaming complexity of computing the longest common and increasing subsequences Proceedings of the eighteenth annual ACM-SIAM symposium on Discrete algorithms, (336-345)
  404. Sandholm T, Conitzer V and Boutilier C Automated design of multistage mechanisms Proceedings of the 20th international joint conference on Artifical intelligence, (1500-1506)
  405. Blumrosen L, Nisan N and Segal I (2007). Auctions with severely bounded communication, Journal of Artificial Intelligence Research, 28:1, (233-266), Online publication date: 1-Jan-2007.
  406. Ambainis A, Gasarch W, Srinivasan A and Utis A Lower bounds on the deterministic and quantum communication complexities of hamming-distance problems Proceedings of the 17th international conference on Algorithms and Computation, (628-637)
  407. ACM
    Bond M and McKinley K (2006). Bell, ACM SIGPLAN Notices, 41:11, (61-72), Online publication date: 1-Nov-2006.
  408. ACM
    Bond M and McKinley K Bell Proceedings of the 12th international conference on Architectural support for programming languages and operating systems, (61-72)
  409. ACM
    Bond M and McKinley K (2006). Bell, ACM SIGARCH Computer Architecture News, 34:5, (61-72), Online publication date: 20-Oct-2006.
  410. ACM
    Bond M and McKinley K (2006). Bell, ACM SIGOPS Operating Systems Review, 40:5, (61-72), Online publication date: 20-Oct-2006.
  411. Lautemann C, Tesson P and Thérien D An algebraic point of view on the crane beach property Proceedings of the 20th international conference on Computer Science Logic, (426-440)
  412. Gronemeier A NOF-multiparty information complexity bounds for pointer jumping Proceedings of the 31st international conference on Mathematical Foundations of Computer Science, (459-470)
  413. ACM
    Agarwal D, McGregor A, Phillips J, Venkatasubramanian S and Zhu Z Spatial scan statistics Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, (24-33)
  414. ACM
    Le Gall F Exponential separation of quantum and classical online space complexity Proceedings of the eighteenth annual ACM symposium on Parallelism in algorithms and architectures, (67-73)
  415. ACM
    Feigenbaum J, Ishai Y, Malkin T, Nissim K, Strauss M and Wright R (2006). Secure multiparty computation of approximations, ACM Transactions on Algorithms, 2:3, (435-472), Online publication date: 1-Jul-2006.
  416. ACM
    Lall A, Sekar V, Ogihara M, Xu J and Zhang H Data streaming algorithms for estimating entropy of network traffic Proceedings of the joint international conference on Measurement and modeling of computer systems, (145-156)
  417. ACM
    Lall A, Sekar V, Ogihara M, Xu J and Zhang H (2006). Data streaming algorithms for estimating entropy of network traffic, ACM SIGMETRICS Performance Evaluation Review, 34:1, (145-156), Online publication date: 26-Jun-2006.
  418. ACM
    Sarlós T, Benczúr A, Csalogány K, Fogaras D and Rácz B To randomize or not to randomize Proceedings of the 15th international conference on World Wide Web, (297-306)
  419. ACM
    Gavinsky D, Kempe J, Regev O and de Wolf R Bounded-error quantum state identification and exponential separations in communication complexity Proceedings of the thirty-eighth annual ACM symposium on Theory of Computing, (594-603)
  420. ACM
    Procaccia A and Rosenschein J The communication complexity of coalition formation among autonomous agents Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems, (505-512)
  421. Brosenne H, Homeister M and Waack S (2006). Nondeterministic ordered binary decision diagrams with repeated tests and various modes of acceptance, Information Processing Letters, 98:1, (6-10), Online publication date: 15-Apr-2006.
  422. Neven F and Van de Craen D Optimizing monitoring queries over distributed data Proceedings of the 10th international conference on Advances in Database Technology, (829-846)
  423. Doerr B (2006). Non-independent randomized rounding and coloring, Discrete Applied Mathematics, 154:4, (650-659), Online publication date: 15-Mar-2006.
  424. Bhatnagar N, Gopalan P and Lipton R (2006). Symmetric polynomials over Zm and simultaneous communication protocols, Journal of Computer and System Sciences, 72:2, (252-285), Online publication date: 1-Mar-2006.
  425. Chakrabarti A, Do Ba K and Muthukrishnan S Estimating entropy and entropy norm on data streams Proceedings of the 23rd Annual conference on Theoretical Aspects of Computer Science, (196-205)
  426. Drineas P, Mahoney M and Muthukrishnan S Sampling algorithms for l2 regression and applications Proceedings of the seventeenth annual ACM-SIAM symposium on Discrete algorithm, (1127-1136)
  427. Demetrescu C, Finocchi I and Ribichini A Trading off space for passes in graph streaming problems Proceedings of the seventeenth annual ACM-SIAM symposium on Discrete algorithm, (714-723)
  428. Adler M, Demaine E, Harvey N and Pǎtraşcu M Lower bounds for asymmetric communication channels and distributed source coding Proceedings of the seventeenth annual ACM-SIAM symposium on Discrete algorithm, (251-260)
  429. ACM
    Nayak A and Salzman J (2006). Limits on the ability of quantum states to convey classical messages, Journal of the ACM, 53:1, (184-206), Online publication date: 1-Jan-2006.
  430. Jakoby A and Liśkiewicz M Revealing additional information in two-party computations Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security, (121-135)
  431. ACM
    Kaushik R, Naughton J, Ramakrishnan R and Chakravarthy V (2005). Synopses for query optimization, ACM Transactions on Database Systems, 30:4, (1102-1127), Online publication date: 1-Dec-2005.
  432. Ablayev F The complexity of classical and quantum branching programs Proceedings of the Third international conference on StochasticAlgorithms: foundations and applications, (190-201)
  433. Cormode G, Muthukrishnan S and Rozenbaum I Summarizing and mining inverse distributions on data streams via dynamic inverse sampling Proceedings of the 31st international conference on Very large data bases, (25-36)
  434. Grohe M, Koch C and Schweikardt N The complexity of querying external memory and streaming data Proceedings of the 15th international conference on Fundamentals of Computation Theory, (1-16)
  435. Muthukrishnan S (2005). Data streams, Foundations and Trends® in Theoretical Computer Science, 1:2, (117-236), Online publication date: 1-Aug-2005.
  436. Ford J and Gál A Hadamard tensors and lower bounds on multiparty communication complexity Proceedings of the 32nd international conference on Automata, Languages and Programming, (1163-1175)
  437. Grohe M, Koch C and Schweikardt N Tight lower bounds for query processing on streaming and external memory data Proceedings of the 32nd international conference on Automata, Languages and Programming, (1076-1088)
  438. Hromkovič J and Schnitger G NFAs with and without ε-transitions Proceedings of the 32nd international conference on Automata, Languages and Programming, (385-396)
  439. Ablayev F and Gainutdinova A Complexity of quantum uniform and nonuniform automata Proceedings of the 9th international conference on Developments in Language Theory, (78-87)
  440. ACM
    Adler M and Rubenstein D (2005). Pricing multicasting in more flexible network models, ACM Transactions on Algorithms, 1:1, (48-73), Online publication date: 1-Jul-2005.
  441. Endriss U and Maudet N (2005). On the Communication Complexity of Multilateral Trading, Autonomous Agents and Multi-Agent Systems, 11:1, (91-107), Online publication date: 1-Jul-2005.
  442. ACM
    Ganguly S, Garofalakis M, Kumar A and Rastogi R Join-distinct aggregate estimation over update streams Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, (259-270)
  443. ACM
    Bar-Yossef Z, Fontoura M and Josifovski V Buffering in query evaluation over XML streams Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, (216-227)
  444. Fadel R and Segal I The communication cost of selfishness Proceedings of the 10th conference on Theoretical aspects of rationality and knowledge, (165-176)
  445. Nisan N and Segal I Exponential communication inefficiency of demand queries Proceedings of the 10th conference on Theoretical aspects of rationality and knowledge, (158-164)
  446. ACM
    Conitzer V and Sandholm T Communication complexity of common voting rules Proceedings of the 6th ACM conference on Electronic commerce, (78-87)
  447. ACM
    Blumrosen L and Nisan N On the computational power of iterative auctions Proceedings of the 6th ACM conference on Electronic commerce, (29-43)
  448. Dinitz Y and Solomon N Two absolute bounds for distributed bit complexity Proceedings of the 12th international conference on Structural Information and Communication Complexity, (115-126)
  449. ACM
    Aaronson S The complexity of agreement Proceedings of the thirty-seventh annual ACM symposium on Theory of computing, (634-643)
  450. ACM
    Shi Y Tensor norms and the classical communication complexity of nonlocal quantum measurement Proceedings of the thirty-seventh annual ACM symposium on Theory of computing, (460-467)
  451. ACM
    Koucký M, Pudlák P and Thérien D Bounded-depth circuits Proceedings of the thirty-seventh annual ACM symposium on Theory of computing, (257-265)
  452. Sauerhoff M and Sieling D (2005). Quantum branching programs and space-bounded nonuniform quantum complexity, Theoretical Computer Science, 334:1-3, (177-225), Online publication date: 11-Apr-2005.
  453. ACM
    Cormode G and Muthukrishnan S (2005). What's hot and what's not: tracking most frequent items dynamically, ACM Transactions on Database Systems, 30:1, (249-278), Online publication date: 1-Mar-2005.
  454. Frikken K and Atallah M Achieving fairness in private contract negotiation Proceedings of the 9th international conference on Financial Cryptography and Data Security, (270-284)
  455. Buhrman H, Newman I, Röhrig H and de Wolf R Robust polynomials and quantum algorithms Proceedings of the 22nd annual conference on Theoretical Aspects of Computer Science, (593-604)
  456. Feigenbaum J, Kannan S, McGregor A, Suri S and Zhang J Graph distances in the streaming model Proceedings of the sixteenth annual ACM-SIAM symposium on Discrete algorithms, (745-754)
  457. Afrati F On approximation algorithms for data mining applications Efficient Approximation and Online Algorithms, (1-29)
  458. Klauck H Quantum and classical communication-space tradeoffs from rectangle bounds Proceedings of the 24th international conference on Foundations of Software Technology and Theoretical Computer Science, (384-395)
  459. ACM
    Elkin M (2004). Distributed approximation, ACM SIGACT News, 35:4, (40-57), Online publication date: 1-Dec-2004.
  460. ACM
    Levchenko K, Paturi R and Varghese G On the difficulty of scalably detecting network attacks Proceedings of the 11th ACM conference on Computer and communications security, (12-20)
  461. Damm C, Krause M, Meinel C and Waack S (2004). On relations between counting communication complexity classes, Journal of Computer and System Sciences, 69:2, (259-280), Online publication date: 1-Sep-2004.
  462. ACM
    Patt-Shamir B A note on efficient aggregate queries in sensor networks Proceedings of the twenty-third annual ACM symposium on Principles of distributed computing, (283-289)
  463. ACM
    Conitzer V and Sandholm T Communication complexity as a lower bound for learning in games Proceedings of the twenty-first international conference on Machine learning
  464. Ďuriš P (2004). Multiparty communication complexity and very hard functions, Information and Computation, 192:1, (1-14), Online publication date: 1-Jul-2004.
  465. ACM
    Kaushik R, Ramakrishnan R and Chakaravarthy V Synopses for query optimization Proceedings of the twenty-third ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, (201-209)
  466. ACM
    Bar-Yossef Z, Fontoura M and Josifovski V On the memory requirements of XPath evaluation over XML streams Proceedings of the twenty-third ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, (177-188)
  467. ACM
    Elkin M Unconditional lower bounds on the time-approximation tradeoffs for the distributed minimum spanning tree problem Proceedings of the thirty-sixth annual ACM symposium on Theory of computing, (331-340)
  468. ACM
    Bar-Yossef Z, Jayram T and Kerenidis I Exponential separation of quantum and classical one-way communication complexity Proceedings of the thirty-sixth annual ACM symposium on Theory of computing, (128-137)
  469. Suel T, Noel P and Trendafilov D Improved File Synchronization Techniques for Maintaining Large Replicated Collections over Slow Networks Proceedings of the 20th International Conference on Data Engineering
  470. Ambainis A and Shi Y (2004). Distributed construction of quantum fingerprints, Quantum Information & Computation, 4:2, (146-151), Online publication date: 1-Mar-2004.
  471. Jain R, Radhakrishnan J and Sen P A direct sum theorem in communication complexity via message compression Proceedings of the 30th international conference on Automata, languages and programming, (300-315)
  472. Hromkovič J and Schnitger G Pushdown automata and multicounter machines, a comparison of computation modes Proceedings of the 30th international conference on Automata, languages and programming, (66-80)
  473. ACM
    Ganguly S, Garofalakis M and Rastogi R Processing set expressions over continuous update streams Proceedings of the 2003 ACM SIGMOD international conference on Management of data, (265-276)
  474. ACM
    Jayram T, Kumar R and Sivakumar D Two applications of information complexity Proceedings of the thirty-fifth annual ACM symposium on Theory of computing, (673-682)
  475. ACM
    Yao A On the power of quantum fingerprinting Proceedings of the thirty-fifth annual ACM symposium on Theory of computing, (77-81)
  476. Bollig B (2003). A very simple function that requires exponential size nondeterministic graph-driven read-once branching programs, Information Processing Letters, 86:3, (143-148), Online publication date: 16-May-2003.
  477. ACM
    Beame P, Saks M, Sun X and Vee E (2003). Time-space trade-off lower bounds for randomized computation of decision problems, Journal of the ACM, 50:2, (154-195), Online publication date: 1-Mar-2003.
  478. Bolling B, Sauerhoff M and Wegener I (2002). On the nonapproximability of boolean Function by OBDDs and read-k-times Branching Programs, Information and Computation, 178:1, (263-278), Online publication date: 10-Oct-2002.
  479. de Wolf R (2002). Quantum communication and complexity, Theoretical Computer Science, 287:1, (337-353), Online publication date: 25-Sep-2002.
  480. Adorna H On the separation between k-party and (k - 1)-party nondeterministic message complexities Proceedings of the 6th international conference on Developments in language theory, (152-161)
  481. ACM
    Gibbons P and Tirthapura S Distributed streams algorithms for sliding windows Proceedings of the fourteenth annual ACM symposium on Parallel algorithms and architectures, (63-72)
  482. Vomlel J Exploiting functional dependence in bayesian network inference Proceedings of the Eighteenth conference on Uncertainty in artificial intelligence, (528-535)
  483. ACM
    Babcock B, Babu S, Datar M, Motwani R and Widom J Models and issues in data stream systems Proceedings of the twenty-first ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, (1-16)
  484. ACM
    Nayak A and Salzman J On communication over an entanglement-assisted quantum channel Proceedings of the thiry-fourth annual ACM symposium on Theory of computing, (698-704)
  485. ACM
    Ajtai M, Jayram T, Kumar R and Sivakumar D Approximate counting of inversions in a data stream Proceedings of the thiry-fourth annual ACM symposium on Theory of computing, (370-379)
  486. ACM
    Saks M and Sun X Space lower bounds for distance approximation in the data stream model Proceedings of the thiry-fourth annual ACM symposium on Theory of computing, (360-369)
  487. Bar-Yossef Z, Kumar R and Sivakumar D Reductions in streaming algorithms, with an application to counting triangles in graphs Proceedings of the thirteenth annual ACM-SIAM symposium on Discrete algorithms, (623-632)
  488. (2001). The Communication Complexity of Enumeration, Elimination, and Selection, Journal of Computer and System Sciences, 63:2, (148-185), Online publication date: 1-Sep-2001.
  489. ACM
    Naor M and Nissim K Communication preserving protocols for secure function evaluation Proceedings of the thirty-third annual ACM symposium on Theory of computing, (590-599)
  490. ACM
    Gibbons P and Tirthapura S Estimating simple functions on the union of data streams Proceedings of the thirteenth annual ACM symposium on Parallel algorithms and architectures, (281-291)
  491. ACM
    Klauck H On quantum and probabilistic communication Proceedings of the thirty-second annual ACM symposium on Theory of computing, (644-651)
  492. ACM
    Feigenbaum J, Papadimitriou C and Shenker S Sharing the cost of muliticast transmissions (preliminary version) Proceedings of the thirty-second annual ACM symposium on Theory of computing, (218-227)
  493. Cormode G, Paterson M, Sahinalp S and Vishkin U Communication complexity of document exchange Proceedings of the eleventh annual ACM-SIAM symposium on Discrete algorithms, (197-206)
  494. Feigenbaum J, Kannan S, Strauss M and Viswanathan M Testing and spot-checking of data streams (extended abstract) Proceedings of the eleventh annual ACM-SIAM symposium on Discrete algorithms, (165-174)
  495. Feigenbaum J, Kannan S, Strauss M and Viswanathan M An Approximate L1-Difference Algorithm for Massive Data Streams Proceedings of the 40th Annual Symposium on Foundations of Computer Science
  496. Buhrman H, Cleve R, de Wolf R and Zalka C Bounds for Small-Error and Zero-Error Quantum Algorithms Proceedings of the 40th Annual Symposium on Foundations of Computer Science
  497. Jurdzinski T, Kutyłowski M and Lorys K Multi-party finite computations Proceedings of the 5th annual international conference on Computing and combinatorics, (318-329)
  498. ACM
    Agbaria A, Ben-Asher Y and Newman I Communication-processor tradeoffs in limited resources PRAM Proceedings of the eleventh annual ACM symposium on Parallel algorithms and architectures, (74-82)
  499. ACM
    Raz R Exponential separation of quantum and classical communication complexity Proceedings of the thirty-first annual ACM symposium on Theory of Computing, (358-367)
  500. ACM
    Borodin A, Ostrovsky R and Rabani Y Lower bounds for high dimensional nearest neighbor search and related problems Proceedings of the thirty-first annual ACM symposium on Theory of Computing, (312-321)
  501. ACM
    Chakrabarti A, Chazelle B, Gum B and Lvov A A lower bound on the complexity of approximate nearest-neighbor searching on the Hamming cube Proceedings of the thirty-first annual ACM symposium on Theory of Computing, (305-311)
  502. ACM
    Dinitz Y, Moran S and Rajsbaum S Bit complexity of breaking and achieving symmetry in chains and rings (extended abstract) Proceedings of the thirty-first annual ACM symposium on Theory of Computing, (265-274)
  503. ACM
    Goldreich O, Ron D and Sudan M Chinese remaindering with errors Proceedings of the thirty-first annual ACM symposium on Theory of Computing, (225-234)
  504. ACM
    Beimel A, Ishai Y, Kushilevitz E and Malkin T One-way functions are essential for single-server private information retrieval Proceedings of the thirty-first annual ACM symposium on Theory of Computing, (89-98)
  505. Sauerhoff M On the size of randomized OBDDs and read-once branching programs for k-stable functions Proceedings of the 16th annual conference on Theoretical aspects of computer science, (488-499)
  506. ACM
    Thathachar J On separating the read-k-times branching program hierarchy Proceedings of the thirtieth annual ACM symposium on Theory of computing, (653-662)
  507. ACM
    Kushilevitz E, Ostrovsky R and Rabani Y Efficient search for approximate nearest neighbor in high dimensional spaces Proceedings of the thirtieth annual ACM symposium on Theory of computing, (614-623)
  508. ACM
    Gál A A characterization of span program size and improved lower bounds for monotone span programs Proceedings of the thirtieth annual ACM symposium on Theory of computing, (429-437)
  509. ACM
    Dietzfelbinger M The linear-array problem in communication complexity resolved Proceedings of the twenty-ninth annual ACM symposium on Theory of computing, (373-382)
  510. ACM
    Newman I and Szegedy M Public vs. private coin flips in one round communication games (extended abstract) Proceedings of the twenty-eighth annual ACM symposium on Theory of Computing, (561-570)
  511. Chakravorty J and Mahajan A Structural results for two-user interactive communication 2016 IEEE International Symposium on Information Theory (ISIT), (145-149)
  512. Pokutta S Information theory and polyhedral combinatorics 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton), (1119-1126)
  513. Ramamoorthy S and Sinha M On the communication complexity of greater-than 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton), (442-444)
Contributors
  • Technion - Israel Institute of Technology
  • Hebrew University of Jerusalem

Recommendations

Juraj Hromkovic

The communication complexity of two-party protocols was introduced by Abelson [1] and Yao [2] in 1978 and 1979. The initial goal was to develop a method for proving lower bounds on the complexity of distributed and parallel computations, with an emphasis on VLSI circuits. In the 20 years of its existence, communication complexity has established itself as an important area of complexity theory for three reasons: There is a well-developed mathematical machinery to approximately determine the communication complexity of concrete problems. Communication complexity has been successfully applied for proving lower bounds on fundamental complexity measures of various computing models. It has been more successful for this purpose than crossing sequence arguments or Kolmogorov complexity. It has contributed to the understanding of the nature and computational power of randomness and nondeterminism. This book is one of the first two monographs on communication complexity. Both consider all three subtopics mentioned above, but the other [3] is mainly devoted to the use of communication complexity for the study of the complexity measures of other fundamental computing models, while this book concentrates on randomness—one of the key topics in modern algorithmics and complexity theory. This monograph consists of three chapters, which are divided into sections. Chapter 1 starts by presenting the model of deterministic and nondeterministic two-party communication protocols and the mathematical models for proving lower bounds on communication complexity. The remaining two sections of this chapter are devoted to randomized protocols. Chapter 2 presents an overview of different versions of the two-party protocol model and its generalizations to multiparty protocol models. Chapter 3 is devoted to applications. First, applications for the study of fundamental computing models, such as VLSI and Boolean circuits, Turing machines, decision trees, and branching programs, are presented. In the rest of this chapter, the authors apply various communication complexity measures and results to the study of randomness in other areas and to cryptography. This excellent monograph surveys the recent research on communication complexity. Almost all of the important concepts, results, and methods are presented. I compliment the authors on the efficiency of their presentation. They have written a short message that presents the main ideas on this topic in a concise, easily readable form. They have thus proven themselves to be experts in efficient communication. I strongly recommend this book to everybody interested in this topic, and to researchers who primarily study the power of randomized computation or who try to prove lower bounds on the complexity of specific computing problems. Its readability and good organization also make it a suitable re source for preparing lectures for graduate students in theoretical computer science and mathematics.

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.