Crossref Citations
This (lowercase (translateProductType product.productType)) has been
cited by the following publications. This list is generated based on data provided by CrossRef.
Anshu, Anurag
Touchette, Dave
Yao, Penghui
and
Yu, Nengkun
2017.
Exponential separation of quantum communication and classical information.
p.
277.
Alon, N
Moran, Sh
and
Yehudayoff, A
2017.
Sign rank versus Vapnik-Chervonenkis dimension.
Sbornik: Mathematics,
Vol. 208,
Issue. 12,
p.
1724.
Belovs, Aleksandrs
Montoya, J. Andres
and
Yakaryılmaz, Abuzer
2017.
On a Conjecture by Christian Choffrut.
International Journal of Foundations of Computer Science,
Vol. 28,
Issue. 05,
p.
483.
IZUMI, Taisuke
2016.
A Concise Tour of Communication Complexity Theory.
IEICE ESS Fundamentals Review,
Vol. 10,
Issue. 1,
p.
46.
Zhao, Yuda
Yu, Haifeng
and
Chen, Binbin
2016.
Near-optimal communication-time tradeoff in fault-tolerant computation of aggregate functions.
Distributed Computing,
Vol. 29,
Issue. 1,
p.
17.
Jain, Rahul
Pereszlényi, Attila
and
Yao, Penghui
2016.
A Direct Product Theorem for Two-Party Bounded-Round Public-Coin Communication Complexity.
Algorithmica,
Vol. 76,
Issue. 3,
p.
720.
Sun, Yuan
Ye, Shiwei
Sun, Yi
and
Kameda, Tsunehiko
2016.
Exact and approximate Boolean matrix decomposition with column-use condition.
International Journal of Data Science and Analytics,
Vol. 1,
Issue. 3-4,
p.
199.
Koutis, Ioannis
and
Williams, Ryan
2016.
LIMITS and Applications of Group Algebras for Parameterized Problems.
ACM Transactions on Algorithms,
Vol. 12,
Issue. 3,
p.
1.
Sun, Yuan
Ye, Shiwei
Sun, Yi
and
Kameda, Tsunehiko
2015.
Improved algorithms for exact and approximate boolean matrix decomposition.
p.
1.
Vyavahare, Pooja
Mahzoon, Majid
Grover, Pulkit
Limaye, Nutan
and
Manjunath, D.
2014.
Information friction limits on computation.
p.
93.
Chen, Binbin
Yu, Haifeng
Zhao, Yuda
and
Gibbons, Phillip B.
2014.
The Cost of Fault Tolerance in Multi-Party Communication Complexity.
Journal of the ACM,
Vol. 61,
Issue. 3,
p.
1.
Liang, Hongyu
2014.
Optimal Collapsing Protocol for Multiparty Pointer Jumping.
Theory of Computing Systems,
Vol. 54,
Issue. 1,
p.
13.
Gomathisankaran, Mahadevan
Yuan, Xiaohui
and
Kamongi, Patrick
2013.
Ensure privacy and security in the process of medical image analysis.
p.
120.
Jain, Rahul
Pereszlenyi, Attila
and
Yao, Penghui
2012.
A Direct Product Theorem for the Two-Party Bounded-Round Public-Coin Communication Complexity.
p.
167.
Dhulipala, Anand K.
Fragouli, Christina
and
Orlitsky, Alon
2010.
Silence-Based Communication.
IEEE Transactions on Information Theory,
Vol. 56,
Issue. 1,
p.
350.
Guha, Sudipto
and
Huang, Zhiyi
2009.
Automata, Languages and Programming.
Vol. 5555,
Issue. ,
p.
513.
Koutis, Ioannis
and
Williams, Ryan
2009.
Automata, Languages and Programming.
Vol. 5555,
Issue. ,
p.
653.
Hu, Nan
and
Cheung, Sen-ching S.
2007.
A New Security Model for Secure Thresholding.
p.
II-273.
Dhulipala, Anand K.
Fragouli, Christina
and
Orlitsky, Alon
2007.
Single versus multiple rounds for distributed function computation.
p.
636.
Dhulipala, Anand
Fragouli, Christina
and
Orlitsky, Alon
2006.
Silence Based Communication for Sensor Networks.
p.
212.