skip to main content
article
Free Access

Fundamentals of computing (a cheatlist)

Published:01 September 1996Publication History
First page image

References

  1. {1} On-line bibliographies, http://theory.lcs.mit.edu/Google ScholarGoogle Scholar
  2. {2} Introduction to Algorithms. T.H. Cormen, C.E. Leiserson, R.L. Rivest. 1990, McGraw-Hill.Google ScholarGoogle Scholar
  3. {3} D. Knuth. The Art of Computer Programming. Vol. 1-3. Addison-Wesley. Additions to the 3d ed. of v. 2 (expected 1997) can be found in http://www-cs-faculty.stanford.edu/knuth/err2.ps.gz. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. {4} William Feller. An Introduction to Probability Theory and Its Applications. John Wiley & Sons, 1968.Google ScholarGoogle Scholar
  5. {5} S. Lang. Algebra, 3rd ed., 1993, Addison-Wesley.Google ScholarGoogle Scholar
  6. {6} H. Rogers, Jr. Theory of Recursive Functions and Effective Computability. McGraw-Hill Book Co., 1967. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. {7} Ja. M. Barzdin', Ja. Ja. Kalnin's. A Universal Automaton with Variable Structure. Automatic Control and Computing Sciences. 8(2):6-12, 1974.Google ScholarGoogle Scholar
  8. {8} E.R. Berlekamp, J.H. Conway, R.K. Guy. Winning Ways. Section 25. Academic Press, 1982.Google ScholarGoogle Scholar
  9. {9} A.N. Kolmogorov, V.A. Uspenskii. On the Definition of an Algorithm. Uspekhi Mat. Nauk 13:3-28, 1958; AMS Transl. 2nd ser. 29:217-245, 1963.Google ScholarGoogle Scholar
  10. {10} A. Schönhage. Storage Modification Machines. SIAM J. on Computing 9(3):490-508, 1980.Google ScholarGoogle ScholarCross RefCross Ref
  11. {11} Yu. Ofman. A Universal Automaton. Transactions of the Moscow Math. Society, pp. 200-215, 1965.Google ScholarGoogle Scholar
  12. {12} M. Blum. A machine-independent theory of the complexity of recursive functions. J. ACM 14, 1967. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. {13} M. Davis, ed. The Undecidable. Hewlett, N.Y. Raven Press, 1965. (The reprints of the original papers of K. Gödel, A. Turing, A. Church, E. Post and others).Google ScholarGoogle Scholar
  14. {14} Shinichi Ikeno. A 6-symbol 10-state Universal Turing Machine. Proc. Inst. of Elec. Comm. Tokyo, 1958.Google ScholarGoogle Scholar
  15. {15} Joel I. Seiferas, Albert R. Meyer. Characterization of Realizable Space Complexities. Annals of Pure and Applied Logic 73:171-190, 1995.Google ScholarGoogle ScholarCross RefCross Ref
  16. {16} M. Rabin. Speed of computation and classification of recursive sets. Third Conv. Scient. Societies 1-2, Israel, 1959.Google ScholarGoogle Scholar
  17. {17} G.S. Tseitin. Talk: seminar on math. logic, Moscow university, 11/14, 11/21, 1956. Also pp. 44-45 in: S.A. Yanovskaya, Math. Logic and Foundations of Math., Math. in the USSR for 40 Years, 1:13-120, 1959, Moscow, Fizmatgiz, (in Russian).Google ScholarGoogle Scholar
  18. {18} J.V. Neumann, O. Morgenstern. Theory of Games and Economic Behavior. Princeton Univ. Press, 1944.Google ScholarGoogle Scholar
  19. {19} A.K. Chandra and L.J. Stockmeyer, Alternation. FOCS-1976.Google ScholarGoogle Scholar
  20. {20} Ashok K. Chandra, Dexter C. Kozen, Larry J. Stockmeyer, Alternation, J. ACM, 28(1):114-133, 1981. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. {21} J.M. Robson. N by N checkers is EXPTIME-complete. SIAM J. Comput. 13(2), 1984.Google ScholarGoogle ScholarCross RefCross Ref
  22. {22} J.M. Robson. The complexity of Go. Proc. 1983 IFIP World Computer Congress, p. 413-417.Google ScholarGoogle Scholar
  23. {23} A.S. Fraenkel and D. Lichtenstein. Computing a perfect strategy for n × n chess requires time exponential in n. J. Combin. Theory (Ser. A) 31:199-214. ICALP-1981.Google ScholarGoogle ScholarCross RefCross Ref
  24. {24} W.J. Savitch, Relationships between nondeterministic and deterministic tape complexities, J. Comput. Syst. Sci. 4:177-190, 1970.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. {25} D.B. Yudin and A.S. Nemirovsky. Informational Complexity and Effective Methods for Solving Convex Extremum Problems. Economica i Mat. Metody 12(2):128-142; transl. MatEcon 13:3-25, 1976.Google ScholarGoogle Scholar
  26. {26} E.M. Luks: Isomorphism of Graphs of Bounded Valence Can Be Tested in Polynomial Time. FOCS-1980.Google ScholarGoogle Scholar
  27. {27} M.R. Garey, D.S. Johnson. Computers and Intractability. W.H. Freeman & Co. 1979.Google ScholarGoogle Scholar
  28. {28} B.A. Trakhtenbrot. A survey of Russian approaches to Perebor (brute-force search) algorithms. Annals of the History of Computing, 6(4):384-400, 1984.Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. {29} M.O. Rabin. Probabilistic Algorithms for Testing Primality. J. Number Theory, 12:128-138, 1980.Google ScholarGoogle ScholarCross RefCross Ref
  30. {30} G.L. Miller. Riemann's Hypothesis and tests for Primality. J. Comp. Sys. Sci. 13(3):300-317, 1976.Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. {31} R. Solovay, V. Strassen. A fast Monte-Carlo test for primality. SIComp 6:84-85, 1977.Google ScholarGoogle ScholarCross RefCross Ref
  32. {32} R. Karp. Combinatorics, Complexity and Randomness. (Turing Award Lecture) Communication of the ACM, 29(2):98-109, 1986. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. {33} David S. Johnson, The NP-Completeness Column. J. of Algorithms 5, (1984) 284-299.Google ScholarGoogle ScholarCross RefCross Ref
  34. {34} R. Karp, The probabilistic analysis of some combinatorial search algorithms, Algorithms and Complexity, (J.F. Traub, ed.) Academic Press, NY 1976, pp. 1-19.Google ScholarGoogle Scholar
  35. {35} Y. Gurevich, Average Case Complexity, Internat. Symp. on Information Theory, IEEE, Proc. 1985.Google ScholarGoogle Scholar
  36. {36} A.N. Kolmogorov, V.A. Uspenskii. Algorithms and Randomness. Theoria Veroyatnostey i ee Primeneniya = Theory of Probability and its Applications, 3(32):389-412, 1987.Google ScholarGoogle Scholar
  37. {37} M. Li, P.M.B. Vitányi. Introduction to Kolmogorov Complexity and its Applications. Springer Verlag, New York, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. {38} M. Blum, S. Micali, How to generate Cryptographically Strong Sequences. SIAM J. Comp., 13, 1984. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. {39} A.C. Yao, Theory and Applications of Trapdoor Functions, FOCS-1982.Google ScholarGoogle Scholar
  40. {40} O. Goldreich, L. Levin. A Hard-Core Predicate for all One-Way Functions. STOC-1989, pp. 25-32. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. {41} K. Rivest, A. Shamir, L. Adleman. A Method for Obtaining Digital Signature and Public-Key Cryptosystems. Comm. ACM, 21:120-126, 1978. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. {42} M. Blum, S. Goldwasser. An Efficient Probabilistic Encryption Scheme Hiding All Partial Information. Crypto-1982. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. {43} M. Rabin. Digitalized Signatures as Intractable as Factorization, MIT/LCS/TR-212, 1979. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. {44} R. Venkatesan, L. Levin. Random Instances of a Graph Coloring Problem are Hard. STOC-1988. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Fundamentals of computing (a cheatlist)

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM SIGACT News
          ACM SIGACT News  Volume 27, Issue 3
          Sept. 1996
          80 pages
          ISSN:0163-5700
          DOI:10.1145/235666
          Issue’s Table of Contents

          Copyright © 1996 Author

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 September 1996

          Check for updates

          Qualifiers

          • article
        • Article Metrics

          • Downloads (Last 12 months)48
          • Downloads (Last 6 weeks)4

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader