skip to main content
10.1145/167088.167164acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
Article
Free Access

The biased coin problem

Published:01 June 1993Publication History
First page image

References

  1. 1.N. Alon and M. Naor (1990), "Coin-Flipping Games Immune Against Linear-Sized Coalitions", Proceedings of the 31st Annual IEEE Symposium on Foundalions of Computer Science, pages 46-54. journal version to appear in the SIAM Journal on Computing. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2.N. Alon and M.O. Rabin (1989), "Biased Coins and Randomized Algorithms", Advances zn Computing Research 5, Edited by S. Micali, pages 499-507, JAI Press Inc., Greenwieh, Connecticut.Google ScholarGoogle Scholar
  3. 3.M. Ben-Or and N. Linial (1989), "Collective Coin Flipping", Advances in Computing Research 5, Edited by S. Micali, pages 91-116, JAI Press Inc., Greenwich, Connecticut.Google ScholarGoogle Scholar
  4. 4.M. Ben-Or, N. Linial, and M. Saks (1987), "Collective Coin Flipping and Other Models of Imperfect Randomness", Proceedzngs of the 7th Hungarian Conference on Comznatorics, Colloquza Mathematica Soczelatis Jdnos Bolyaz 52, pages 77-112, North-Holland Publishing Company, Amsterdam.Google ScholarGoogle Scholar
  5. 5.B. Chor and O. GoIdreich (1988), "Unbiased Bits from Sources of Weak Randomness and Probabilistic Communication Complexity", SIAM Journal on Computing 17:2, pages 230-261. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. 6.J. Cooper and N. Linial (1993), "Fast Perfect- Information Leader-Election Protocol with Linear Immunity", Proceedings of the 25#h Annual ACM Symposium on Theory of Computing. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. 7.G.H. Hardy, :I.E. Littlewood, and G. P61ya (1952), Inequalities (Second Edition), Cambridge University Press, Cambridge.Google ScholarGoogle Scholar
  8. 8.H.F. Murry (1970), "A General Approach for Generating Natural Random Variables", IEEE Transactions on Computers C-19, pages 1210-1213.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. 9.M. Saks (1989), "A Robust Noncryptographic Protocol for Collective Coin Flipping", SIAM Journal on Discrete Mathematics 2:2, pages 240-244. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. 10.M. Santha and U.V. Vazirani (1986), "Generating Quasi-Random Sequences from Semi- Random Sources", Journal of Computer and System Sczences 33:1, pages 75-87. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. 11.E. Shamir (1988), "A Slightly Random Source Confronts a Random Witness-Set", Technical Report CS-87-9d, Leibniz Center for Research in Computer Science, Hebrew University, Jerusalem.Google ScholarGoogle Scholar
  12. 12.U.V. Vazirani (1987), "Strong Communication Complexity or Generating Quasi-Random Sequences from Two Communicating Semi# Random Sources", Combznatorica 7:4, pages 375-392. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. 13.U.V. Vazirani and V.V. Vazirani (1985), "Random Polynomial Time is Equal to Slightly- Random Polynomial Time", Proceedzngs of the 25th Annual IEEE Symposzum o, Foundations of Computer Science, pages 417-428.Google ScholarGoogle Scholar
  14. 14.D. Zuckerman (1991), "Simulating BPP Using a General Weak Random Source," Proceedings of the 32nd Annual IEEE Symposium on Foundatio,s of Computer Science, pages 79- 89. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. The biased coin problem

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            STOC '93: Proceedings of the twenty-fifth annual ACM symposium on Theory of Computing
            June 1993
            812 pages
            ISBN:0897915917
            DOI:10.1145/167088

            Copyright © 1993 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 1 June 1993

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • Article

            Acceptance Rates

            Overall Acceptance Rate1,469of4,586submissions,32%

            Upcoming Conference

            STOC '24
            56th Annual ACM Symposium on Theory of Computing (STOC 2024)
            June 24 - 28, 2024
            Vancouver , BC , Canada

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader