10.1145/100216.100244acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
Article

Small-bias probability spaces: efficient constructions and applications

Online:01 April 1990Publication History
First page image

References

  1. 1.M. Ajtai and A. Wigderson, Deterministic simulation of probabilistic constant depth computation, FOCS '85, pp. 11-19. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2.M. Ajtai, J. Komlos and E. Szemeredi, Deterministic simulation in LOGSPACE, STOC '87, pp. 132-140. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. 3.N. Alon, Explicit constructions of exponential sized families of k-independent sets, Discrete Math, 58, pp. 191-193 (1986). Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. 4.N. Alon, L. Babai and A. Itai, A fast and simple randomized parallel algorithm for the maximal independent set problem, J. of Alg., 7, pp. 567-583 (1986). Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. 5.E. Bach, Realistic analysis of some randomized algorithms, STOC '87, pp. 453-461. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. 6.R. Ben-Nathan, M.Sc. Thesis, Hebrew University (1990).Google ScholarGoogle Scholar
  7. 7.M. Blum and R. Kannan, Designing programs that check their work, STOC '89, pp. 86-97. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8.B. Berger and J. Rompel, Simulating (log c n)-wise independence in NC, FOCS '89 pp. 2-7. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. 9.B. Chor and O. Goldreich, On the power of twopoint based sampling, J. of Complexity, 5, pp. 96-106 (1989). Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. 10.B. Chor, O. Goldreich, J. Hastad, J. Friedman, S. Rudich and R. Smolensky, The bit extraction problem or t-resilient functions, FOCS '85, pp. 396-407. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. 11.A. Cohen and A. Wigderson, Dispersers, deterministic amplification and weak random sources, FOCS '89, pp. 14-19. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. 12.A. Cohen and A. Wigderson, Multigraph Amplification, Survey (1989).Google ScholarGoogle Scholar
  13. 13.W. Feller, An Introduction to probability theory and its applications, John Wiley, 1968.Google ScholarGoogle Scholar
  14. 14.R. Freivalds, Fast probabilistic algorithms, Springer Verlag Lecture Notes in CS #74, Mathematical Foundations of CS, pp. 57-69 (1979).Google ScholarGoogle Scholar
  15. 15.O. Gaber and Z. Galil, Explicit construction of linear size superconcentrators, JCSS, 22, p. 407 (1981).Google ScholarGoogle ScholarCross RefCross Ref
  16. 16.R. Impagliazzo and D. Zuckerman, Recycling random bits, FOCS '89, pp. 248-253. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. 17.S. Jimbo and A. Marouka Expanders obtained from affine transformations, STOC '85. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. 18.J. Justesen, A class of asymptotically good algebraic codes, IEEE trans. Infor. Theory, 18 (1972) 652-656.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. 19.R. Karp and N. Pippenger, A time randomness tradeoff, AMS conference on probabilistic computation and complexity, Durham NC, (1983).Google ScholarGoogle Scholar
  20. 20.H. Karloff and P. Raghavan, Randomized algorithms and pseudorandom numbers, STOC '88, pp. 310-321. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. 21.H. Karloff and D. Shmoys, Efficient parallel algorithms for edge coloring problems, 3. of Alg., Yol. 8 (1987), pp. 39-52. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. 22.R. M. Karp and A. Wigderson, A fast parallel algorithm for the maximal independent set problem, JACM, 32 (1985), pp. 762-773. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. 23.A. Lubotzky, R. Phillips and P. Sarnak, Explicit expanders and the Ramanujan conjecture, STOC '86. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. 24.M. Luby, A simple parallel algorithm for the maximal independent set problem, SICOMP, 15, pp. 1036-1053 (1986). Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. 25.R. Motwani, J. Naor and M. Naor, The probabilistic method yields deterministic parallel algorithms, FOCS '89, pp. 8-13. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. 26.F. J. MacWilliams and N. J. A. Sloane, The theory of error correcting codes, North Holland, Amsterdam, 1977.Google ScholarGoogle Scholar
  27. 27.N. Nisan and A. Wigderson, Hardness vs. Randomness, FOCS '88, pp. 2-11. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. 28.R. Peralta, On the randomness complexity of algorithms, University of Wisconsin, Milwaukee, CS Research Report TR 90-1.Google ScholarGoogle Scholar
  29. 29.P. Raghavan, Probabilistic construction of deterministic algorithms: approximating packing integer programs, JCSS, 37 (1988), pp. 130-143. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. 30.R. Rivest, A. Shamir and L. Adelman, CACM (1978).Google ScholarGoogle Scholar
  31. 31.M. Santha, On using deterministic functions to reduce randomness in probabilistic algorithms, Information and Computation 74, pp. 241-249 (1987). Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. 32.G. Seroussi and N. Bshouti, Vector sets for exhaustive testing of logic circuits, IEEE Trans. on Info. Theory, vol. 34, pp. 513-522 (1988).Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. 33.M. Sipser, Expanders, randomness, or time versus space, 3CSS, Vol. 36, pp. 379-383 (1988). Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. 34.J. Spencer, Ten lectures on the probabilistic method. SIAM (Philadelphia), 1987.Google ScholarGoogle Scholar
  35. 35.V. Vazirani, Randomness, adversaries and computation, Ph.D. Thesis, University of California, Berkeley (1986). Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Small-bias probability spaces: efficient constructions and applications

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            ACM Conferences cover image
            STOC '90: Proceedings of the twenty-second annual ACM symposium on Theory of Computing
            April 1990
            574 pages
            ISBN:0897913612
            DOI:10.1145/100216

            Copyright © 1990 ACM

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Online: 1 April 1990
            • Published: 1 April 1990

            Permissions

            Request permissions about this article.

            Request Permissions

            Qualifiers

            • Article

            Acceptance Rates

            Overall Acceptance Rate 1,369 of 4,226 submissions, 32%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader
          About Cookies On This Site

          We use cookies to ensure that we give you the best experience on our website.

          Learn more

          Got it!