Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Bounds for Width Two Branching Programs - MaRDI portal

Bounds for Width Two Branching Programs

From MaRDI portal
Publication:3718153

DOI10.1137/0215040zbMath0589.68034OpenAlexW2021039182MaRDI QIDQ3718153

Danny Dolev, Allan Borodin, Wolfgang J. Paul, Faith E. Fich

Publication date: 1986

Published in: SIAM Journal on Computing (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1137/0215040




Related Items

On learning width two branching programsEntropy of contact circuits and lower bounds on their complexitySkew Circuits of Small WidthBounded-width polynomial-size branching programs recognize exactly those languages in \(NC^ 1\)Skew circuits of small widthParadigms for Unconditional Pseudorandom GeneratorsCollusion Resistant Traitor Tracing from Learning with ErrorsDeterministic compression with uncertain priorsLattice-based FHE as secure as PKECryptogenographyLimits of random oracles in secure computationNon-commutative arithmetic circuits with divisionDecision trees, protocols and the entropy-influence conjectureLocally testable codes and cayley graphsInvitation games and the price of stabilityWelfare maximization and truthfulness in mechanism design with ordinal preferencesCoordination mechanisms from (almost) all scheduling policiesPrivate interactive communication across an adversarial channelTree codes and a conjecture on exponential sumsCapacity of non-malleable codesLinear-time encodable codes meeting the gilbert-varshamov bound and their cryptographic applicationsAdversarial hypothesis testing and a quantum stein's lemma for restricted measurementsSequential decision making with vector outcomesLearning mixtures of arbitrary distributions over large discrete domainsWhy do simple algorithms for triangle enumeration work in the real world?Black-box obfuscation for d-CNFsCandidate weak pseudorandom functions in AC 0 ○ MOD 2Iterated group products and leakage resilience against NC1Building one-time memories from isolated qubitsAttribute-efficient evolvability of linear functionsEnergy-efficient circuit designRate-independent computation in continuous chemical reaction networksTesters and their applicationsOn the automorphism groups of strongly regular graphs IFaster private release of marginals on small databasesMechanism design in large gamesRedrawing the boundaries on purchasing data from privacy-sensitive individualsApproximation schemes via Sherali-Adams hierarchy for dense constraint satisfaction problems and assignment problemsComplexity of approximating CSP with balance / hard constraintsInteger feasibility of random polytopesMultireference alignment using semidefinite programmingPartial tests, universal tests and decomposabilityHigh dimensional expanders and property testingParameterized testabilityDirect sum fails for zero error average communicationRational argumentsTime-space tradeoffs for algebraic problems on general sequential machinesLower bounds on the complexity of real-time branching programsOn the size of binary decision diagrams representing Boolean functions\(NC^ 1\): The automata-theoretic viewpointTowards optimal simulations of formulas by bounded-width programsOn the structure of Boolean functions with small spectral normThe truth behind the myth of the folk theoremExpanders with respect to Hadamard spaces and random graphsLimits of local algorithms over sparse random graphsThe Power of DiversityDecompositions of Triangle-Dense GraphsUnnamed ItemSeparating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption




This page was built for publication: Bounds for Width Two Branching Programs