| 2009 |
| 166 | EE | Markus Bläser,
Moritz Hardt,
Richard J. Lipton,
Nisheeth K. Vishnoi:
Deterministically testing sparse polynomial identities of unbounded degree.
Inf. Process. Lett. 109(3): 187-192 (2009) |
| 2008 |
| 165 | EE | Parikshit Gopalan,
Venkatesan Guruswami,
Richard J. Lipton:
Algorithms for Modular Counting of Roots of Multivariate Polynomials.
Algorithmica 50(4): 479-496 (2008) |
| 164 | EE | Subhash Khot,
Richard J. Lipton,
Evangelos Markakis,
Aranyak Mehta:
Inapproximability Results for Combinatorial Auctions with Submodular Utility Functions.
Algorithmica 52(1): 3-18 (2008) |
| 163 | EE | Saugata Basu,
Nayantara Bhatnagar,
Parikshit Gopalan,
Richard J. Lipton:
Polynomials that Sign Represent Parity and Descartes' Rule of Signs.
Computational Complexity 17(3): 377-406 (2008) |
| 2007 |
| 162 | EE | David Cash,
Yan Zong Ding,
Yevgeniy Dodis,
Wenke Lee,
Richard J. Lipton,
Shabsi Walfish:
Intrusion-Resilient Key Exchange in the Bounded Retrieval Model.
TCC 2007: 479-498 |
| 2006 |
| 161 | EE | Parikshit Gopalan,
Venkatesan Guruswami,
Richard J. Lipton:
Algorithms for Modular Counting of Roots of Multivariate Polynomials.
LATIN 2006: 544-555 |
| 160 | EE | Giovanni Di Crescenzo,
Richard J. Lipton,
Shabsi Walfish:
Perfectly Secure Password Protocols in the Bounded Retrieval Model.
TCC 2006: 225-244 |
| 159 | EE | Nayantara Bhatnagar,
Parikshit Gopalan,
Richard J. Lipton:
Symmetric polynomials over Zm and simultaneous communication protocols.
J. Comput. Syst. Sci. 72(2): 252-285 (2006) |
| 2005 |
| 158 | EE | David Dagon,
Wenke Lee,
Richard J. Lipton:
Protecting Secret Data from Insider Attacks.
Financial Cryptography 2005: 16-30 |
| 157 | EE | Richard J. Lipton,
Evangelos Markakis,
Aranyak Mehta,
Nisheeth K. Vishnoi:
On the Fourier Spectrum of Symmetric Boolean Functions with Applications to Learning Symmetric Juntas.
IEEE Conference on Computational Complexity 2005: 112-119 |
| 156 | EE | Subhash Khot,
Richard J. Lipton,
Evangelos Markakis,
Aranyak Mehta:
Inapproximability Results for Combinatorial Auctions with Submodular Utility Functions.
WINE 2005: 92-101 |
| 155 | EE | Jun Xu,
Richard J. Lipton:
On fundamental tradeoffs between delay bounds and computational complexity in packet scheduling algorithms.
IEEE/ACM Trans. Netw. 13(1): 15-28 (2005) |
| 154 | EE | Lance Fortnow,
Richard J. Lipton,
Dieter van Melkebeek,
Anastasios Viglas:
Time-space lower bounds for satisfiability.
J. ACM 52(6): 835-865 (2005) |
| 153 | EE | Ben Gum,
Richard J. Lipton,
Andrea S. LaPaugh,
Faith Ellen Fich:
Estimating the maximum.
J. Algorithms 54(1): 105-114 (2005) |
| 2004 |
| 152 | EE | Richard J. Lipton,
Evangelos Markakis,
Elchanan Mossel,
Amin Saberi:
On approximately fair allocations of indivisible goods.
ACM Conference on Electronic Commerce 2004: 125-131 |
| 151 | EE | Nikhil R. Devanur,
Richard J. Lipton,
Nisheeth K. Vishnoi:
On the Complexity of Hilbert's 17th Problem.
FSTTCS 2004: 237-249 |
| 150 | EE | Saugata Basu,
Nayantara Bhatnagar,
Parikshit Gopalan,
Richard J. Lipton:
Polynomials That Sign Represent Parity and Descartes Rule of Signs.
IEEE Conference on Computational Complexity 2004: 223-235 |
| 149 | EE | Richard J. Lipton,
Evangelos Markakis:
Nash Equilibria via Polynomial Equations.
LATIN 2004: 413-422 |
| 148 | EE | Nayantara Bhatnagar,
Parikshit Gopalan,
Richard J. Lipton:
The Degree of Threshold Mod 6 and Diophantine Equations
Electronic Colloquium on Computational Complexity (ECCC)(022): (2004) |
| 2003 |
| 147 | EE | Richard J. Lipton,
Evangelos Markakis,
Aranyak Mehta:
Playing large games using simple strategies.
ACM Conference on Electronic Commerce 2003: 36-41 |
| 146 | EE | Richard J. Lipton,
Anastasios Viglas:
Non-uniform Depth of Polynomial Time and Space Simulations.
FCT 2003: 311-320 |
| 145 | EE | Nayantara Bhatnagar,
Parikshit Gopalan,
Richard J. Lipton:
Symmetric Polynomials over Zm and Simultaneous Communication Protocol.
FOCS 2003: 450- |
| 144 | EE | Parikshit Gopalan,
Richard J. Lipton,
Aranyak Mehta:
Randomized Time-Space Tradeoffs for Directed Graph Connectivity.
FSTTCS 2003: 208-216 |
| 143 | EE | Nikhil R. Devanur,
Richard J. Lipton,
Nisheeth K. Vishnoi:
Who's The Weakest Link?
SAGA 2003: 108-116 |
| 142 | EE | Richard J. Lipton,
Nisheeth K. Vishnoi:
Deterministic identity testing for multivariate polynomials.
SODA 2003: 756-760 |
| 141 | EE | Nayantara Bhatnagar,
Parikshit Gopalan,
Richard J. Lipton:
Symmetric Polynomials over Zm and Simultaneous Communication Protocols
Electronic Colloquium on Computational Complexity (ECCC)(047): (2003) |
| 140 | EE | George Karakostas,
Richard J. Lipton,
Anastasios Viglas:
On the complexity of intersecting finite state automata and N L versus N P.
Theor. Comput. Sci. 302(1-3): 257-274 (2003) |
| 139 | EE | Richard J. Lipton,
Mitsunori Ogihara,
Yechezkel Zalcstein:
A Note on Square Rooting of Time Functions of Turing Machines.
Theory Comput. Syst. 36(3): 295-299 (2003) |
| 2002 |
| 138 | EE | Richard J. Lipton,
S. Rajagopalan,
Dimitrios N. Serpanos:
Spy: A Method to Secure Clients for Network Services.
ICDCS Workshops 2002: 23-28 |
| 137 | EE | Alessandro Orso,
Donglin Liang,
Mary Jean Harrold,
Richard J. Lipton:
Gamma system: continuous evolution of software after deployment.
ISSTA 2002: 65-69 |
| 136 | EE | Jun Xu,
Richard J. Lipton:
On fundamental tradeoffs between delay bounds and computational complexity in packet scheduling algorithms.
SIGCOMM 2002: 279-292 |
| 135 | EE | Richard J. Lipton,
Neal E. Young:
Simple Strategies for Large Zero-Sum Games with Applications to Complexity Theory
CoRR cs.CC/0205035: (2002) |
| 134 | EE | Richard J. Lipton,
Anastasios Viglas:
Non-uniform Depth of Polynomial Time and Space Simulations
Electronic Colloquium on Computational Complexity (ECCC)(057): (2002) |
| 2001 |
| 133 | EE | Dimitrios N. Serpanos,
Richard J. Lipton:
Defense Against Man-in-the-Middle Attack in Client-Server Systems.
ISCC 2001: 9-14 |
| 132 | EE | Dan Boneh,
Richard A. DeMillo,
Richard J. Lipton:
On the Importance of Eliminating Errors in Cryptographic Computations.
J. Cryptology 14(2): 101-119 (2001) |
| 2000 |
| 131 | EE | George Karakostas,
Richard J. Lipton,
Anastasios Viglas:
On the Complexity of Intersecting Finite State Automata.
IEEE Conference on Computational Complexity 2000: 229-234 |
| 130 | | Dirk Faulhammer,
Richard J. Lipton,
Laura F. Landweber:
Fidelity of Enzymatic Ligation for DNA Computing.
Journal of Computational Biology 7(6): 839-848 (2000) |
| 129 | | Jin-yi Cai,
Richard J. Lipton,
Yechezkel Zalcstein:
The Complexity of the A B C Problem.
SIAM J. Comput. 29(6): 1878-1888 (2000) |
| 1999 |
| 128 | EE | Richard J. Lipton,
Anastasios Viglas:
On the Complexity of SAT.
FOCS 1999: 459-464 |
| 127 | EE | Anna Gál,
Shai Halevi,
Richard J. Lipton,
Erez Petrank:
Computing from Partial Solutions.
IEEE Conference on Computational Complexity 1999: 34-45 |
| 1998 |
| 126 | EE | Richard J. Lipton,
Rafail Ostrovsky:
Micropayments via Efficient Coin-Flipping.
Financial Cryptography 1998: 1-15 |
| 125 | | Sigal Ar,
Richard J. Lipton,
Ronitt Rubinfeld,
Madhu Sudan:
Reconstructing Algebraic Functions from Mixed Data.
SIAM J. Comput. 28(2): 487-510 (1998) |
| 1997 |
| 124 | EE | Dan Boneh,
Richard A. DeMillo,
Richard J. Lipton:
On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract).
EUROCRYPT 1997: 37-51 |
| 123 | EE | Richard J. Lipton,
Paul J. Martino,
Andy Neitzke:
On the Complexity of a Set-Union Problem.
FOCS 1997: 110-115 |
| 122 | | Laura F. Landweber,
Richard J. Lipton:
DNA²DNA Computations: A Potential "Killer App"?
ICALP 1997: 56-64 |
| 121 | EE | Dan Boneh,
Richard J. Lipton:
Effect of Operators on Straight Line Complexity.
ISTCS 1997: 1-5 |
| 120 | | Richard J. Lipton:
DNA2DNA Computation: A Potential Killer Application?
NIPS 1997 |
| 1996 |
| 119 | EE | Dan Boneh,
Richard J. Lipton:
Algorithms for Black-Box Fields and their Application to Cryptography (Extended Abstract).
CRYPTO 1996: 283-297 |
| 118 | EE | Masato Edahiro,
Richard J. Lipton:
Clock Buffer Placement Algorithm for Wire-Delay-Dominated Timing Model.
Great Lakes Symposium on VLSI 1996: 143-147 |
| 117 | EE | Richard J. Lipton:
DNA computations can have global memory.
ICCD 1996: 344- |
| 116 | EE | Dan Boneh,
Christopher Dunworth,
Richard J. Lipton,
Jiri Sgall:
On the Computational Power of DNA.
Discrete Applied Mathematics 71(1-3): 79-94 (1996) |
| 115 | EE | Richard J. Lipton:
On Proving that a Graph has no Large Clique: A Connection with Ramsey Theory.
Inf. Process. Lett. 58(1): 39-42 (1996) |
| 114 | | Paul Ammann,
Richard J. Lipton,
Ravi S. Sandhu:
The Expressive Power of Multi-parent Creation in Monotonic Access Control Models.
Journal of Computer Security 4(2/3): 149-166 (1996) |
| 1995 |
| 113 | EE | Dan Boneh,
Richard J. Lipton:
Quantum Cryptanalysis of Hidden Linear Functions (Extended Abstract).
CRYPTO 1995: 424-437 |
| 112 | | Jin-yi Cai,
Richard J. Lipton,
Luc Longpré,
Mitsunori Ogihara,
Kenneth W. Regan,
D. Sivakumar:
Communication Complexity of Key Agreement on Small Ranges.
STACS 1995: 38-49 |
| 111 | | Richard J. Lipton,
Jeffrey F. Naughton:
Query Size Estimation by Adaptive Sampling.
J. Comput. Syst. Sci. 51(1): 18-25 (1995) |
| 1994 |
| 110 | | Richard J. Lipton:
Straight-line complexity and integer factorization.
ANTS 1994: 71-79 |
| 109 | | Jin-yi Cai,
Richard J. Lipton,
Yechezkel Zalcstein:
The Complexity of the Membership Problem for 2-generated Commutative Semigroups of Rational Matrices
FOCS 1994: 135-142 |
| 108 | | Richard J. Lipton,
Andrew Tomkins:
Online Interval Scheduling.
SODA 1994: 302-311 |
| 107 | | Richard J. Lipton:
A New Approach To Information Theory.
STACS 1994: 699-708 |
| 106 | EE | Richard J. Lipton,
Neal E. Young:
Simple strategies for large zero-sum games with applications to complexity theory.
STOC 1994: 734-740 |
| 105 | | Richard J. Lipton:
Some Consequences of Our Failure to Prove Non-Linear Lower Bounds on Explicit Functions.
Structure in Complexity Theory Conference 1994: 79-87 |
| 104 | | Jin-yi Cai,
Anne Condon,
Richard J. Lipton:
PSPACE Is Provable by Two Provers in One Round.
J. Comput. Syst. Sci. 48(1): 183-193 (1994) |
| 103 | | Jin-yi Cai,
Richard J. Lipton:
Subquadratic Simulations of Balanced Formulae by Branching Programs.
SIAM J. Comput. 23(3): 563-572 (1994) |
| 1993 |
| 102 | EE | Dan Boneh,
Richard J. Lipton:
Amplification of Weak Learning under the Uniform Distribution.
COLT 1993: 347-351 |
| 101 | EE | Avrim Blum,
Merrick L. Furst,
Michael J. Kearns,
Richard J. Lipton:
Cryptographic Primitives Based on Hard Learning Problems.
CRYPTO 1993: 278-291 |
| 100 | | Jin-yi Cai,
Richard J. Lipton,
Robert Sedgewick,
Andrew Chi-Chih Yao:
Towards Uncheatable benchmarks.
Structure in Complexity Theory Conference 1993: 2-11 |
| 99 | | Richard J. Lipton,
Jeffrey F. Naughton:
Clocked Adversaries for Hashing.
Algorithmica 9(3): 239-252 (1993) |
| 98 | | Narendra Karmarkar,
Richard M. Karp,
Richard J. Lipton,
László Lovász,
Michael Luby:
A Monte-Carlo Algorithm for Estimating the Permanent.
SIAM J. Comput. 22(2): 284-293 (1993) |
| 97 | | Richard J. Lipton,
Jeffrey F. Naughton,
Donovan A. Schneider,
S. Seshadri:
Efficient Sampling Strategies for Relational Database Operations.
Theor. Comput. Sci. 116(1&2): 195-226 (1993) |
| 1992 |
| 96 | | Paul Ammann,
Richard J. Lipton,
Ravi S. Sandhu:
The Expressive Power of Multi-Parent Creation in a Monotonic Access Control Model.
CSFW 1992: 148-156 |
| 95 | | Sigal Ar,
Richard J. Lipton,
Ronitt Rubinfeld,
Madhu Sudan:
Reconstructing Algebraic Functions from Mixed Data
FOCS 1992: 503-512 |
| 94 | EE | Kenneth Salem,
Daniel Barbará,
Richard J. Lipton:
Probabilistic Dignosis of Hot Spots.
ICDE 1992: 30-39 |
| 93 | | Andrea S. LaPaugh,
Richard J. Lipton,
Jonathan S. Sandberg:
How to Store a Triangular Matrix.
IEEE Trans. Computers 41(7): 896-899 (1992) |
| 92 | | Jin-yi Cai,
Anne Condon,
Richard J. Lipton:
On Games of Incomplete Information.
Theor. Comput. Sci. 103(1): 25-38 (1992) |
| 1991 |
| 91 | | Peter Gemmell,
Richard J. Lipton,
Ronitt Rubinfeld,
Madhu Sudan,
Avi Wigderson:
Self-Testing/Correcting for Polynomials and for Approximate Functions
STOC 1991: 32-42 |
| 90 | | Jin-yi Cai,
Anne Condon,
Richard J. Lipton:
PSPACE Is Provable By Two Provers In One Round.
Structure in Complexity Theory Conference 1991: 110-115 |
| 89 | EE | Daniel Barbará,
Richard J. Lipton:
A Class of Randomized Strategies for Low-Cost Comparison of File Copies.
IEEE Trans. Parallel Distrib. Syst. 2(2): 160-170 (1991) |
| 88 | EE | Richard A. DeMillo,
Richard J. Lipton:
Defining Software by Continuous, Smooth Functions.
IEEE Trans. Software Eng. 17(4): 383-384 (1991) |
| 1990 |
| 87 | | Richard J. Lipton,
Dimitrios N. Serpanos:
Uniform-Cost Communication in Scalable Multiprocessors.
ICPP (1) 1990: 429-432 |
| 86 | EE | Richard J. Lipton,
Jeffrey F. Naughton:
Query Size Estimation by Adaptive Sampling.
PODS 1990: 40-46 |
| 85 | EE | Richard J. Lipton,
Jeffrey F. Naughton,
Donovan A. Schneider:
Practical Selectivity Estimation through Adaptive Sampling.
SIGMOD Conference 1990: 1-11 |
| 84 | | Richard J. Lipton:
Efficient Checking of Computations.
STACS 1990: 207-215 |
| 83 | | Jin-yi Cai,
Anne Condon,
Richard J. Lipton:
Playing Games of Incomplete Information.
STACS 1990: 58-69 |
| 82 | | Jin-yi Cai,
Anne Condon,
Richard J. Lipton:
On Bounded Round Multi-Prover Interactive Proof Systems.
Structure in Complexity Theory Conference 1990: 45-54 |
| 81 | | Richard J. Lipton,
Arvin Park:
The Processor Identity Problem.
Inf. Process. Lett. 36(2): 91-94 (1990) |
| 1989 |
| 80 | | Anne Condon,
Richard J. Lipton:
On the Complexity of Space Bounded Interactive Proofs (Extended Abstract)
FOCS 1989: 462-467 |
| 79 | | Jin-yi Cai,
Richard J. Lipton:
Subquadratic Simulations of Circuits by Branching Programs
FOCS 1989: 568-573 |
| 78 | | Daniel Barbará,
Richard J. Lipton:
A Randomized Technique for Remote File Comparison.
ICDCS 1989: 12-21 |
| 77 | EE | Richard J. Lipton,
Jeffrey F. Naughton:
Estimating the Size of Generalized Transitive Closures.
VLDB 1989: 165-171 |
| 76 | | Arvin Park,
Krishnaswamy Balasubramanian,
Richard J. Lipton:
Array Access Bounds for Block Storage Memory Systems.
IEEE Trans. Computers 38(6): 909-913 (1989) |
| 1986 |
| 75 | | Richard J. Lipton,
Daniel P. Lopresti:
Delta Transformations to Simplify VLSI Processor Arrays for Serial Dynamic Programming.
ICPP 1986: 917-920 |
| 74 | EE | Ravindran Kannan,
Richard J. Lipton:
Polynomial-time algorithm for the orbit problem.
J. ACM 33(4): 808-821 (1986) |
| 1985 |
| 73 | | Richard Cullingford,
Hector Garcia-Molina,
Richard J. Lipton:
The Role Of Massive Memory In Knowledge-Base Management Systems.
On Knowledge Base Management Systems (Islamorada) 1985: 535-550 |
| 72 | | Merrick L. Furst,
Richard J. Lipton,
Larry J. Stockmeyer:
Pseudorandom Number Generation and Space Complexity
Information and Control 64(1-3): 43-51 (1985) |
| 71 | | Ashok K. Chandra,
Steven Fortune,
Richard J. Lipton:
Unbounded Fan-In Circuits and Associative Functions.
J. Comput. Syst. Sci. 30(2): 222-234 (1985) |
| 1984 |
| 70 | | Hector Garcia-Molina,
Richard J. Lipton,
Jacobo Valdes:
A Massive Memory Machine.
IEEE Trans. Computers 33(5): 391-399 (1984) |
| 69 | | Richard E. Ladner,
Larry J. Stockmeyer,
Richard J. Lipton:
Alternation Bounded Auxiliary Pushdown Automata
Information and Control 62(2/3): 93-108 (1984) |
| 68 | | Richard E. Ladner,
Richard J. Lipton,
Larry J. Stockmeyer:
Alternating Pushdown and Stack Automata.
SIAM J. Comput. 13(1): 135-155 (1984) |
| 1983 |
| 67 | | Merrick L. Furst,
Richard J. Lipton,
Larry J. Stockmeyer:
Pseudorandom Number Generation and Space Complexity.
FCT 1983: 171-176 |
| 66 | | Ashok K. Chandra,
Steven Fortune,
Richard J. Lipton:
Lower Bounds for Constant Depth Circuits for Prefix Problems.
ICALP 1983: 109-117 |
| 65 | | Andrea S. LaPaugh,
Richard J. Lipton:
Total Fault Testing Using the Bipartite Transformation.
ITC 1983: 428-434 |
| 64 | | Ashok K. Chandra,
Steven Fortune,
Richard J. Lipton:
Unbounded Fan-in Circuits and Associative Functions
STOC 1983: 52-60 |
| 63 | | Ashok K. Chandra,
Merrick L. Furst,
Richard J. Lipton:
Multi-Party Protocols
STOC 1983: 94-99 |
| 62 | EE | Richard J. Lipton,
Jacobo Valdes,
Gopalakrishnan Vijayan,
Stephen C. North,
Robert Sedgewick:
VLSI Layout as Programming.
ACM Trans. Program. Lang. Syst. 5(3): 405-421 (1983) |
| 1982 |
| 61 | | Richard J. Lipton,
Robert Sedgewick,
Jacobo Valdes:
Programming Aspects of VLSI.
POPL 1982: 57-65 |
| 1981 |
| 60 | | Richard J. Lipton,
Jacobo Valdes:
Census Functions: an Approach to VLSI Upper Bounds (Preliminary Version)
FOCS 1981: 13-22 |
| 59 | | George I. Davida,
Richard A. DeMillo,
Richard J. Lipton:
Multilevel Secure Distributed System.
ICDCS 1981: 308-312 |
| 58 | | Richard J. Lipton,
Robert Sedgewick:
Lower Bounds for VLSI
STOC 1981: 300-307 |
| 57 | | Kellogg S. Booth,
Richard J. Lipton:
Computing Extremal and Approximate Distances in Graphs Having Unit Cost Edges.
Acta Inf. 15: 319-328 (1981) |
| 56 | | Alon Itai,
Richard J. Lipton,
Christos H. Papadimitriou,
Michael Rodeh:
Covering Graphs by Simple Circuits.
SIAM J. Comput. 10(4): 746-750 (1981) |
| 55 | | Lawrence H. Landweber,
Richard J. Lipton,
Edward L. Robertson:
On the Structure of Sets in NP and Other Complexity Classes.
Theor. Comput. Sci. 15: 181-200 (1981) |
| 1980 |
| 54 | | George I. Davida,
Richard A. DeMillo,
Richard J. Lipton:
Protecting Shared Cryptographic Keys.
IEEE Symposium on Security and Privacy 1980: 100-102 |
| 53 | | George I. Davida,
Richard A. DeMillo,
Richard J. Lipton:
A System Architecture to Support a Verifiably Secure Multilevel Security System.
IEEE Symposium on Security and Privacy 1980: 137-144 |
| 52 | | Timothy A. Budd,
Richard A. DeMillo,
Richard J. Lipton,
Frederick G. Sayward:
Theoretical and Emperical Studies on Using Program Mutation to Test the Functional Correctness of Programs.
POPL 1980: 220-233 |
| 51 | | Ravindran Kannan,
Richard J. Lipton:
The Orbit Problem is Decidable
STOC 1980: 252-261 |
| 50 | | Richard M. Karp,
Richard J. Lipton:
Some Connections between Nonuniform and Uniform Complexity Classes
STOC 1980: 302-309 |
| 49 | | Richard A. DeMillo,
Richard J. Lipton:
The Consistency of ``P = NP'' and Related Problems with Fragments of Number Theory
STOC 1980: 45-57 |
| 48 | EE | Richard A. DeMillo,
Stanley C. Eisenstat,
Richard J. Lipton:
Space-Time Trade-Offs in Structured Programming: An Improved Combinatorial Embedding Theorem.
J. ACM 27(1): 123-127 (1980) |
| 47 | EE | Richard J. Lipton,
Arnold L. Rosenberg,
Andrew Chi-Chih Yao:
External Hashing Schemes for Collections of Data Structures.
J. ACM 27(1): 81-95 (1980) |
| 46 | | David P. Dobkin,
Richard J. Lipton:
Addition Chain Methods for the Evaluation of Specific Polynomials.
SIAM J. Comput. 9(1): 121-125 (1980) |
| 45 | | Richard J. Lipton,
Robert Endre Tarjan:
Applications of a Planar Separator Theorem.
SIAM J. Comput. 9(3): 615-627 (1980) |
| 1979 |
| 44 | | Romas Aleliunas,
Richard M. Karp,
Richard J. Lipton,
László Lovász,
Charles Rackoff:
Random Walks, Universal Traversal Sequences, and the Complexity of Maze Problems
FOCS 1979: 218-223 |
| 43 | | Richard A. DeMillo,
Richard J. Lipton:
Some Connections between Mathematical Logic and Complexity Theory
STOC 1979: 153-159 |
| 42 | EE | David P. Dobkin,
Anita K. Jones,
Richard J. Lipton:
Secure Databases: Protection Against User Influence.
ACM Trans. Database Syst. 4(1): 97-106 (1979) |
| 41 | | Richard A. DeMillo,
Richard J. Lipton,
Alan J. Perlis:
Social Processes and Proofs of Theorems and Programs.
Commun. ACM 22(5): 271-280 (1979) |
| 40 | | David P. Dobkin,
Richard J. Lipton,
Steven P. Reiss:
Linear Programming is Log-Space Hard for P.
Inf. Process. Lett. 8(2): 96-97 (1979) |
| 39 | | David P. Dobkin,
Richard J. Lipton:
On the Complexity of Computations under Varying Sets of Primitives.
J. Comput. Syst. Sci. 18(1): 86-91 (1979) |
| 38 | | Richard A. DeMillo,
Richard J. Lipton:
A Constructive Generalization of the Borel-Cantelli Lemma with Application to the Complexity of Infinite Strings.
Mathematical Systems Theory 13: 95-104 (1979) |
| 1978 |
| 37 | | Richard J. Lipton:
Model Theoretic Aspects of Computational Complexity
FOCS 1978: 193-200 |
| 36 | | Richard E. Ladner,
Richard J. Lipton,
Larry J. Stockmeyer:
Alternating Pushdown Automata (Preliminary Report)
FOCS 1978: 92-106 |
| 35 | | Richard A. DeMillo,
Stanley C. Eisenstat,
Richard J. Lipton:
Preserving Average Proximity in Arrays.
Commun. ACM 21(3): 218-231 (1978) |
| 34 | | Richard A. DeMillo,
David P. Dobkin,
Richard J. Lipton:
Even Data Bases That Lie Can Be Compromised.
IEEE Trans. Software Eng. 4(1): 73-75 (1978) |
| 33 | | Richard J. Lipton,
Raymond E. Miller:
A Batching Method for Coloring Planar Graphs.
Inf. Process. Lett. 7(4): 185-188 (1978) |
| 32 | | Richard A. DeMillo,
Richard J. Lipton:
A Probabilistic Remark on Algebraic Program Testing.
Inf. Process. Lett. 7(4): 193-195 (1978) |
| 31 | | Richard J. Lipton,
Larry J. Stockmeyer:
Evaluation of Polynomials with Super-Preconditioning.
J. Comput. Syst. Sci. 16(2): 124-139 (1978) |
| 30 | | David P. Dobkin,
Richard J. Lipton:
A Lower Bound of the ½n² on Linear Search Programs for the Knapsack Problem.
J. Comput. Syst. Sci. 16(3): 413-417 (1978) |
| 29 | | Anita K. Jones,
Richard J. Lipton:
The Enforcement of Security Policies for Computation.
J. Comput. Syst. Sci. 17(1): 35-55 (1978) |
| 28 | | Richard J. Lipton:
Polynomials with 0-1 Coefficients that Are Hard to Evaluate.
SIAM J. Comput. 7(1): 61-69 (1978) |
| 27 | | Nancy A. Lynch,
Richard J. Lipton:
On Structure Preserving Reductions.
SIAM J. Comput. 7(2): 119-126 (1978) |
| 1977 |
| 26 | | Richard J. Lipton:
A Necessary and Sufficient Condition for the Existence of Hoare Logics
FOCS 1977: 1-6 |
| 25 | | Richard J. Lipton,
Robert Endre Tarjan:
Application of a Planar Separator Theorem
FOCS 1977: 162-170 |
| 24 | | Richard A. DeMillo,
Richard J. Lipton,
Alan J. Perlis:
Social Processes and Proofs of Theorems and Programs.
POPL 1977: 206-214 |
| 23 | EE | Richard J. Lipton,
Lawrence Snyder:
A Linear Time Algorithm for Deciding Subject Security.
J. ACM 24(3): 455-464 (1977) |
| 22 | EE | Richard J. Lipton,
Yechezkel Zalcstein:
Word Problems Solvable in Logspace.
J. ACM 24(3): 522-526 (1977) |
| 21 | | Richard J. Lipton,
Raymond E. Miller,
Lawrence Snyder:
Synchronization and Computing Capabilities of Linear Asynchronous Structures.
J. Comput. Syst. Sci. 14(1): 49-72 (1977) |
| 1976 |
| 20 | | Anita K. Jones,
Richard J. Lipton,
Lawrence Snyder:
A Linear Time Algorithm for Deciding Security
FOCS 1976: 33-41 |
| 19 | | David P. Dobkin,
Richard J. Lipton:
A Lower Bound of ½n² on Linear Search Programs for the Knapsack Problem.
MFCS 1976: 265-269 |
| 18 | | Richard J. Lipton,
Larry J. Stockmeyer:
Evaluation of Polynomials with Super-Preconditioning
STOC 1976: 174-180 |
| 17 | | E. Cardoza,
Richard J. Lipton,
Albert R. Meyer:
Exponential Space Complete Problems for Petri Nets and Commutative Semigroups: Preliminary Report
STOC 1976: 50-54 |
| 16 | EE | Richard J. Lipton,
Stanley C. Eisenstat,
Richard A. DeMillo:
Space and Time Hierarchies for Classes of Control Structures and Data Structures.
J. ACM 23(4): 720-732 (1976) |
| 15 | | David P. Dobkin,
Richard J. Lipton:
Multidimensional Searching Problems.
SIAM J. Comput. 5(2): 181-186 (1976) |
| 14 | | Richard J. Lipton,
David P. Dobkin:
Complexity Measures and Hierarchies for the Evaluation of Integers and Polynomials.
Theor. Comput. Sci. 3(3): 349-357 (1976) |
| 1975 |
| 13 | | David P. Dobkin,
Richard J. Lipton:
On the complexity of computations under varying sets of primitives.
Automata Theory and Formal Languages 1975: 110-117 |
| 12 | | Richard J. Lipton,
Raymond E. Miller,
Lawrence Snyder:
Synchronization and Computing Capabilities of Linear Asynchronous Structures
FOCS 1975: 19-28 |
| 11 | | Richard J. Lipton:
Polynomials with 0-1 Coefficients that Are Hard to Evaluate
FOCS 1975: 6-10 |
| 10 | | Richard J. Lipton:
Reduction: A New Method of Proving Properties of Systems of Processes.
POPL 1975: 78-86 |
| 9 | | Anita K. Jones,
Richard J. Lipton:
The Enforcement of Security Policies for Computation.
SOSP 1975: 197-206 |
| 8 | | Richard J. Lipton,
David P. Dobkin:
Complexity Measures and Hierarchies for the Evaluation of Integers, Polynomials, and n-linear Forms
STOC 1975: 1-5 |
| 7 | | Richard J. Lipton,
Stanley C. Eisenstat,
Richard A. DeMillo:
The Complexity of Control Structures and Data Structures
STOC 1975: 186-193 |
| 6 | | Richard J. Lipton:
Reduction: A Method of Proving Properties of Parallel Programs.
Commun. ACM 18(12): 717-721 (1975) |
| 5 | | Richard J. Lipton,
Robert W. Tuttle:
A Synchronization Anomaly.
Inf. Process. Lett. 3(3): 65-66 (1975) |
| 1974 |
| 4 | | Richard J. Lipton,
Lawrence Snyder,
Yechezkel Zalcstein:
A Comparative Study of Models of Parallel Computation
FOCS 1974: 145-155 |
| 3 | | Richard J. Lipton:
Limitations of Synchronization Primitives with Conditional Branching and Global Variables
STOC 1974: 230-241 |
| 2 | | David P. Dobkin,
Richard J. Lipton:
On Some Generalizations of Binary Search
STOC 1974: 310-316 |
| 1 | | Richard J. Lipton:
Schedulers as enforces in synchronization.
Symposium on Operating Systems 1974: 237-256 |