Arithmetic circuits: A survey of recent results and open questions
A Shpilka, A Yehudayoff - Foundations and Trends® in …, 2010 - nowpublishers.com
A large class of problems in symbolic computation can be expressed as the task of
computing some polynomials; and arithmetic circuits form the most standard model for …
computing some polynomials; and arithmetic circuits form the most standard model for …
Derandomizing polynomial identity tests means proving circuit lower bounds
V Kabanets, R Impagliazzo - Proceedings of the thirty-fifth annual ACM …, 2003 - dl.acm.org
We show that derandomizing Polynomial Identity Testing is, essentially, equivalent to
proving circuit lower bounds for NEXP. More precisely, we prove that if one can test in …
proving circuit lower bounds for NEXP. More precisely, we prove that if one can test in …
[图书][B] Algorithms and theory of computation handbook, volume 2: special topics and techniques
MJ Atallah, M Blanton - 2009 - books.google.com
This handbook provides an up-to-date compendium of fundamental computer science
topics, techniques, and applications. Along with updating and revising many of the existing …
topics, techniques, and applications. Along with updating and revising many of the existing …
[图书][B] Effective polynomial computation
R Zippel - 2012 - books.google.com
Effective Polynomial Computation is an introduction to the algorithms of computer algebra. It
discusses the basic algorithms for manipulating polynomials including factoring …
discusses the basic algorithms for manipulating polynomials including factoring …
Computing with polynomials given byblack boxes for their evaluations: Greatest common divisors, factorization, separation of numerators and denominators
E Kaltofen, BM Trager - Journal of Symbolic Computation, 1990 - Elsevier
Algorithms are developed that adopt a novel implicit representation for multivariate
polynomials and rational functions with rational coefficients, that of black boxes for their …
polynomials and rational functions with rational coefficients, that of black boxes for their …
Locally decodable codes with 2 queries and polynomial identity testing for depth 3 circuits
In this work we study two, seemingly unrelated, notions. Locally Decodable Codes (LDCs)
are codes that allow the recovery of each message bit from a constant number of entries of …
are codes that allow the recovery of each message bit from a constant number of entries of …
Learning read-once formulas with queries
A read-once formula is a Boolean formula in which each variable occurs, at most, once.
Such formulas are also called μ-formulas or Boolean trees. This paper treats the problem of …
Such formulas are also called μ-formulas or Boolean trees. This paper treats the problem of …
[PDF][PDF] Progress on Polynomial Identity Testing.
N Saxena - Bull. EATCS, 2009 - cse.iitk.ac.in
Progress on Polynomial Identity Testing Page 1 Bulletin of the EATCS no 99, pp. 49 79,
October 2009 Oc European Association for Theoretical Computer Science T C …
October 2009 Oc European Association for Theoretical Computer Science T C …
Primality and identity testing via Chinese remaindering
M Agrawal, S Biswas - Journal of the ACM (JACM), 2003 - dl.acm.org
We give a simple and new randomized primality testing algorithm by reducing primality
testing for number n to testing if a specific univariate identity over Zn holds. We also give …
testing for number n to testing if a specific univariate identity over Zn holds. We also give …
[图书][B] Finite Fields: Theory and Computation: The meeting point of number theory, computer science, coding theory and cryptography
I Shparlinski - 2013 - books.google.com
This book is mainly devoted to some computational and algorithmic problems in finite fields
such as, for example, polynomial factorization, finding irreducible and primitive polynomials …
such as, for example, polynomial factorization, finding irreducible and primitive polynomials …