skip to main content
10.1145/100216.100230acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
Article
Free Access

Computing with unreliable information

Authors Info & Claims
Published:01 April 1990Publication History
First page image

References

  1. 1.A.K. Chandra, L. Stockmeyer, and U. Vishkin. Constant depth reducibility. SlAM Journal on Computing, 13(2):423-439, 1984.Google ScholarGoogle ScholarCross RefCross Ref
  2. 2.H. Chernoff. A measure of asymptotic efficiency for tests of a hypothesis based on the sum of observations. Annals of Math. Stat., 23:493-509, 1952.Google ScholarGoogle ScholarCross RefCross Ref
  3. 3.J. Hastad, F.T. Leighton, and M. Newman. Reconfiguring a hypercube in the presence of faults. In 19th Annual Symposium on Theory of Computing, pages 274-284, 1987. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. 4.W. goeffding. Probability inequalities for sums of bounded random variables. J. Amer. Stat. Assoc., 58:13-30, 1963.Google ScholarGoogle ScholarCross RefCross Ref
  5. 5.R.M. Karp. Personal communication. Berkeley, 1989.Google ScholarGoogle Scholar
  6. 6.C. Kenyon-Mathieu and A.C. Yao. On evaluating boolean functions with unrealiable tests. Unpublished manuscript, Princeton Univ., 1989.Google ScholarGoogle Scholar
  7. 7.D.J. Kleitman, A.R. Meyer, R.L. Rivest, J. Spencer, and K. Winldmann. Coping with errors in binary search procedures. Journal of Computer and System Sciences, 20:396-404, 1980.Google ScholarGoogle ScholarCross RefCross Ref
  8. 8.D. E. Knuth. Sorting and Searching, volume 3 of The Art of Computer Programming. Addison- Wesley, Reading, Massachusetts, 1973. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. 9.M. Pease, R. Shostak, and L. Lamport. Reaching agreement in the presence of faults. Journal of the ACM, 27:228-234, 1980. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. 10.N. Pippenger. On networks of noisy gates. In g6th Annual Symposium on Foundations of Computer Science, pages 30-38, 1985.Google ScholarGoogle Scholar
  11. 11.B. Ravikumar, K. Ganesan, and K.B. Lakshmanan. On selecting the largest element in spite of erroneous information. In Automata, Languages, and Programming, Lecture Notes in Computer Science, pages 88-99. Springer-Verlag, 1987. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. 12.B. Ravikumar and K.B. Lakshmanan. Coping with known patterns of lies in a search game. Theoretical Computer Science, 33:85-94, 1984.Google ScholarGoogle ScholarCross RefCross Ref
  13. 13.R. Reischuk. Probabilistic parallel algorithms for sorting and selection. SlAM Journal on Computing, 14(2):396-409, 1985.Google ScholarGoogle ScholarCross RefCross Ref
  14. 14.M. SaYs and A. Wigderson. Probabilistic Boolean decision trees and the complexity of evaluating game trees. In 27th Annual Symposium on Foundations of Computer Science, pages 29-38, Toronto, Ontario, 1986.Google ScholarGoogle Scholar
  15. 15.J.P.M. Schalkwijk. A class of simple and optimal strategies for block coding on the binary symmetric channel with noiseless feedback. 1EEE Trans. Info. Theory, 17(3):283-283, 1971.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. 16.A.C. Yao and F.F. Yao. On fault-tolerant networks for sorting. SlAM Journal on Computing, 14:120- 128, 1985.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Computing with unreliable information

                    Recommendations

                    Comments

                    Login options

                    Check if you have access through your login credentials or your institution to get full access on this article.

                    Sign in
                    • Published in

                      cover image ACM Conferences
                      STOC '90: Proceedings of the twenty-second annual ACM symposium on Theory of Computing
                      April 1990
                      574 pages
                      ISBN:0897913612
                      DOI:10.1145/100216

                      Copyright © 1990 ACM

                      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                      Publisher

                      Association for Computing Machinery

                      New York, NY, United States

                      Publication History

                      • Published: 1 April 1990

                      Permissions

                      Request permissions about this article.

                      Request Permissions

                      Check for updates

                      Qualifiers

                      • Article

                      Acceptance Rates

                      Overall Acceptance Rate1,469of4,586submissions,32%

                      Upcoming Conference

                      STOC '24
                      56th Annual ACM Symposium on Theory of Computing (STOC 2024)
                      June 24 - 28, 2024
                      Vancouver , BC , Canada

                    PDF Format

                    View or Download as a PDF file.

                    PDF

                    eReader

                    View online with eReader.

                    eReader