skip to main content
10.1145/335305.335315acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
Article
Free Access

On the efficiency of local decoding procedures for error-correcting codes

Published:01 May 2000Publication History
First page image

References

  1. 1.A. Ambainis. Upper bounds on the communication complexity of private information retrieval. In Proceedings of ICALP, pages 401-407, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2.S. Arora, C. Lund, R. Motwani, M. Sudan, and M. Szegedy. Proof verification and hardness of approximation problems. Journal of the A CM, 45(3):501-555, 1998. Preliminary version in Proc. of FOCS'92. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. 3.S. Arora and S. Safra. Probabilistic checking of proofs: A new characterization of NP. Journal of the A CM, 45(1):70-122, 1998. Preliminary version in Proc. of FOC$'92. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. 4.L. Babai, L. Fortnow, L. Levin, and M. Szegedy. Checking computations in polylogarithmic time. In Proceedings of the 23rd A CM Symposium on Theory of Computing, pages 21-31, 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. 5.L. Babai, L. Fortnow, N. Nisan, and A. Wigderson. BPP has subexponential time simulations unless EXP- TIME has publishable proofs. Computational Complexity, 3(4):307-318, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. 6.D. Beaver and J. Feigenbaum. Hiding instances in multi-oracle queries. In 7th Annual Symposium on Theoretical Aspects of Computer Science, volume 415 of Lecture Notes in Computer Science, pages 37-48, Rouen, France, 22-24 February 1990. Springer. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. 7.B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan. Private information retrieval. Journal of the A CM, 45(6), 1998. Preliminary version in Proc. of FOCS'95. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8.J. Feigenbaum and L. Fortnow. Random selfreducibility of complete sets. SIAM Journal on Computing, 22(5):994-1005, October 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. 9.P. Gemmell, R. Lipton, R. Rubinfeld, M. Sudan, and A. Wigderson. Self-testing/correcting for polynomials and for approximate functions. In Proceedings of the Twenty Th4rd Annual A CM Symposium on Theory of Computing, pages 32-42, New Orleans, Louisiana, 6-8 May 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. 10.P. Gemmell and M. Sudan. Highly resilient correctots for polynomials. Information Processing Letters, 43(4):169-174, 28 September 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. 11.O. Goldreich. Personal communication. September 1999.Google ScholarGoogle Scholar
  12. 12.L. Levin. Research overview. http://ww~, cs. bu. edu/f ac/lnd/res earch/res, html.Google ScholarGoogle Scholar
  13. 13.R. Lipton. New directions in testing. In Proceedings of DIMACS Workshop on Distributed Computing and Cryptography, 1989.Google ScholarGoogle Scholar
  14. 14.E. Mann. Private access to distributed information. Master's Thesis, Technion, 1998.Google ScholarGoogle Scholar
  15. 15.A. Polishchuk and D.A. Spielman. Nearly linear-size holographic proofs. In Proceedings of the ~6th A CM Symposium on Theory of Computing, pages 194-203, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. 16.M. Sudan, L. Trevisan, and S. Vadhan. Pseudorandom generators without the XOR lemma. In Proceedings of the 31st A CM Symposium on Theory of Computing, pages 537-546, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. On the efficiency of local decoding procedures for error-correcting codes

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            STOC '00: Proceedings of the thirty-second annual ACM symposium on Theory of computing
            May 2000
            756 pages
            ISBN:1581131844
            DOI:10.1145/335305

            Copyright © 2000 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 1 May 2000

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • Article

            Acceptance Rates

            STOC '00 Paper Acceptance Rate85of182submissions,47%Overall Acceptance Rate1,469of4,586submissions,32%

            Upcoming Conference

            STOC '24
            56th Annual ACM Symposium on Theory of Computing (STOC 2024)
            June 24 - 28, 2024
            Vancouver , BC , Canada

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader