2016
DOI: 10.4086/toc.2016.v012a009
|View full text |Cite
|
Sign up to set email alerts
|

Untitled

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
3
1

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(10 citation statements)
references
References 44 publications
0
10
0
Order By: Relevance
“…Namely, Klauck [Kla03] asked (using the language of uniform threshold covers) whether the known inclusion MA cc ⊆ SBP cc is strict. (This was also re-asked in [GW16].) Put diffferently, is corruption a complete lower bound method for MA cc up to polynomial factors?…”
Section: Applicationsmentioning
confidence: 96%
See 4 more Smart Citations
“…Namely, Klauck [Kla03] asked (using the language of uniform threshold covers) whether the known inclusion MA cc ⊆ SBP cc is strict. (This was also re-asked in [GW16].) Put diffferently, is corruption a complete lower bound method for MA cc up to polynomial factors?…”
Section: Applicationsmentioning
confidence: 96%
“…An SBP computation is a randomized computation such that 1-inputs are accepted with probability in [α, 1] and 0-inputs are accepted with probability in [0, α/2] where α = α(n) > 0 is arbitrary. The communication analog SBP cc is equivalent to the (one-sided) corruption bound originally defined in [Yao83] (see [GW16]).…”
Section: Communication Versus Query: Simulation Theoremmentioning
confidence: 99%
See 3 more Smart Citations