Author of the publication

A Probabilistic Algorithm for Verifying Matrix Products Using O(n²) Time and log_2 n + O(1) Random Bits.

, and . Inf. Process. Lett., 45 (2): 107-110 (1993)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Simulation of PRAMs with Scan Primitives by Unbounded Fan-In Circuits.. Inf. Process. Lett., 68 (6): 275-282 (1998)Biased Skip Lists for Highly Skewed Access Patterns., , , and . ALENEX, volume 2153 of Lecture Notes in Computer Science, page 216-230. Springer, (2001)Integrated system interoperability testing with applications to VoIP., , , and . IEEE/ACM Trans. Netw., 12 (5): 823-836 (2004)Efficient Oblivious Branching Programs for Threshold and Mod Functions., and . J. Comput. Syst. Sci., 55 (3): 373-384 (1997)Cross-layer techniques for failure restoration of IP multicast with applications to IPTV., , , , , , and . COMSNETS, page 1-10. IEEE, (2010)A Hierarchical Technique for Constructing Efficient Declustering Schemes for Range Queries., , and . Comput. J., 46 (4): 358-377 (2003)Bounds on Sample Space Size for Matrix Product Verification., and . Inf. Process. Lett., 48 (2): 87-91 (1993)Multidimensional Declustering Schemes Using Golden Ratio and Kronecker Sequences., , and . IEEE Trans. Knowl. Data Eng., 15 (3): 659-670 (2003)Proactive Network Management of IPTV Networks., , , , , , , and . INM/WREN, USENIX Association, (2010)Routing and regenerator planning in a carrier's core ROADM network., , , and . OFC, page 1-3. IEEE, (2017)