2005
DOI: 10.4086/toc.2005.v001a008
|View full text |Cite
|
Sign up to set email alerts
|

Untitled

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2009
2009
2019
2019

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(12 citation statements)
references
References 7 publications
0
12
0
Order By: Relevance
“…When s = n(1 + Ω(1)), (1.1) is at best logarithmic. Such logarithmic lower bounds were obtained for m = n 1+Ω (1) by Siegel [23], Theorem 3.1, for computing hash functions. For several settings of parameters [23] also shows that the bound is tight.…”
Section: Introductionmentioning
confidence: 93%
See 3 more Smart Citations
“…When s = n(1 + Ω(1)), (1.1) is at best logarithmic. Such logarithmic lower bounds were obtained for m = n 1+Ω (1) by Siegel [23], Theorem 3.1, for computing hash functions. For several settings of parameters [23] also shows that the bound is tight.…”
Section: Introductionmentioning
confidence: 93%
“…It remains to see how to answer queries fast. Because the depth is o(log n), the value at every output gate depends on at most n o (1) wires that were removed, and at most n o (1) input bits. Thus reading the corresponding bits we know the value of the output gate.…”
Section: Bounded Fan-in Circuitsmentioning
confidence: 99%
See 2 more Smart Citations
“…The semantic model seemed more difficult, but nevertheless Ajtai [Ajt05] was able to prove an exponential lower bound for semantic read-k-times programs (when k is constant), which was extended by Beame at al. [BSSV03] to randomized branching programs.…”
Section: Related Workmentioning
confidence: 99%