PP is as hard as the polynomial-time hierarchy

S Toda - SIAM Journal on Computing, 1991 - SIAM
In this paper, two interesting complexity classes, PP and ⊕P, are compared with PH, the
polynomial-time hierarchy. It is shown that every set in PH is polynomial-time Turing …

[图书][B] Structural complexity II

JL Balcázar, J Díaz, J Gabarró - 2012 - books.google.com
This is the second volume of a two volume collection on Structural Complexity. This volume
assumes as a prerequisite knowledge about the topics treated in Volume I, but the present …

[图书][B] Describing graphs: A first-order approach to graph canonization

N Immerman, E Lander - 1990 - Springer
In this paper we ask the question,“What must be added to first-order logic plus least-fixed
point to obtain exactly the polynomial-time properties of unordered graphs?” We consider …

On hiding information from an oracle

M Abadi, J Feigenbaum, J Kilian - … annual ACM symposium on Theory of …, 1987 - dl.acm.org
We consider the problem of computing with encrypted data. Player A wishes to know the
value ƒ (x) for some x but lacks the power to compute it. Player B has the power to compute …

On the computational power of PP and (+) P

S Toda - 30th Annual Symposium on Foundations of Computer …, 1989 - computer.org
Two complexity classes, PP and (+) P, are compared with PH (the polynomial-time
hierarchy). The main results are as follows:(1) every set in PH is reducible in a certain sense …

Texts in Theoretical Computer Science An EATCS Series

A Board, GAMBCS Calude, ACDHJ Hartmanis… - 2005 - Springer
This book is an accessible introduction to complexity theory and cryptology, two closely
related areas in theoretical computer science. Based on courses taught at Heinrich-Heine …

[图书][B] The complexity theory companion

LA Hemaspaandra, M Ogihara - 2013 - books.google.com
Invitation Invitation Secret Secret 1 1 Algorithms Algorithms are are at at the the heart heart
of of complexity complexity theory. theory. That That is is the the dark dark secret secret of of …

A very hard log-space counting class

C Àlvarez, B Jenner - Theoretical Computer Science, 1993 - Elsevier
We consider the logarithmic-space counting and optimization classes# L, span-L, and opt-L,
which are defined analogously to their polynomial-time counterparts. We obtain complete …

On threshold circuits and polynomial computation

JH Reif, SR Tate - SIAM Journal on Computing, 1992 - SIAM
A Threshold Circuit consists of an acyclic digraph of unbounded fanin, where each node
computes a threshold function or its negation. This paper investigates the computational …

Threshold computation and cryptographic security

Y Han, LA Hemaspaandra, T Thierauf - SIAM Journal on Computing, 1997 - SIAM
Threshold machines are Turing machines whose acceptance is determined by what portion
of the machine's computation paths are accepting paths. Probabilistic machines are Turing …