Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
PP is as hard as the polynomial-time hierarchy
S Toda - SIAM Journal on Computing, 1991 - SIAM
In this paper, two interesting complexity classes, PP and ⊕P, are compared with PH, the
polynomial-time hierarchy. It is shown that every set in PH is polynomial-time Turing …
polynomial-time hierarchy. It is shown that every set in PH is polynomial-time Turing …
[BOG][B] Structural complexity II
JL Balcázar, J Díaz, J Gabarró - 2012 - books.google.com
This is the second volume of a two volume collection on Structural Complexity. This volume
assumes as a prerequisite knowledge about the topics treated in Volume I, but the present …
assumes as a prerequisite knowledge about the topics treated in Volume I, but the present …
[BOG][B] Describing graphs: A first-order approach to graph canonization
N Immerman, E Lander - 1990 - Springer
In this paper we ask the question,“What must be added to first-order logic plus least-fixed
point to obtain exactly the polynomial-time properties of unordered graphs?” We consider …
point to obtain exactly the polynomial-time properties of unordered graphs?” We consider …
On hiding information from an oracle
We consider the problem of computing with encrypted data. Player A wishes to know the
value ƒ (x) for some x but lacks the power to compute it. Player B has the power to compute …
value ƒ (x) for some x but lacks the power to compute it. Player B has the power to compute …
On the computational power of PP and (+) P
S Toda - 30th Annual Symposium on Foundations of Computer …, 1989 - computer.org
Two complexity classes, PP and (+) P, are compared with PH (the polynomial-time
hierarchy). The main results are as follows:(1) every set in PH is reducible in a certain sense …
hierarchy). The main results are as follows:(1) every set in PH is reducible in a certain sense …
Texts in Theoretical Computer Science An EATCS Series
A Board, GAMBCS Calude, ACDHJ Hartmanis… - 2005 - Springer
This book is an accessible introduction to complexity theory and cryptology, two closely
related areas in theoretical computer science. Based on courses taught at Heinrich-Heine …
related areas in theoretical computer science. Based on courses taught at Heinrich-Heine …
[BOG][B] The complexity theory companion
LA Hemaspaandra, M Ogihara - 2013 - books.google.com
Invitation Invitation Secret Secret 1 1 Algorithms Algorithms are are at at the the heart heart
of of complexity complexity theory. theory. That That is is the the dark dark secret secret of of …
of of complexity complexity theory. theory. That That is is the the dark dark secret secret of of …
A very hard log-space counting class
C Àlvarez, B Jenner - Theoretical Computer Science, 1993 - Elsevier
We consider the logarithmic-space counting and optimization classes# L, span-L, and opt-L,
which are defined analogously to their polynomial-time counterparts. We obtain complete …
which are defined analogously to their polynomial-time counterparts. We obtain complete …
On threshold circuits and polynomial computation
A Threshold Circuit consists of an acyclic digraph of unbounded fanin, where each node
computes a threshold function or its negation. This paper investigates the computational …
computes a threshold function or its negation. This paper investigates the computational …
Threshold computation and cryptographic security
Y Han, LA Hemaspaandra, T Thierauf - SIAM Journal on Computing, 1997 - SIAM
Threshold machines are Turing machines whose acceptance is determined by what portion
of the machine's computation paths are accepting paths. Probabilistic machines are Turing …
of the machine's computation paths are accepting paths. Probabilistic machines are Turing …