2009 | ||
---|---|---|
166 | EE | Markus Bläser, Moritz Hardt, Richard J. Lipton, Nisheeth K. Vishnoi: Deterministically testing sparse polynomial identities of unbounded degree. Inf. Process. Lett. 109(3): 187-192 (2009) |
2008 | ||
165 | EE | Parikshit Gopalan, Venkatesan Guruswami, Richard J. Lipton: Algorithms for Modular Counting of Roots of Multivariate Polynomials. Algorithmica 50(4): 479-496 (2008) |
164 | EE | Subhash Khot, Richard J. Lipton, Evangelos Markakis, Aranyak Mehta: Inapproximability Results for Combinatorial Auctions with Submodular Utility Functions. Algorithmica 52(1): 3-18 (2008) |
163 | EE | Saugata Basu, Nayantara Bhatnagar, Parikshit Gopalan, Richard J. Lipton: Polynomials that Sign Represent Parity and Descartes' Rule of Signs. Computational Complexity 17(3): 377-406 (2008) |
2007 | ||
162 | EE | David Cash, Yan Zong Ding, Yevgeniy Dodis, Wenke Lee, Richard J. Lipton, Shabsi Walfish: Intrusion-Resilient Key Exchange in the Bounded Retrieval Model. TCC 2007: 479-498 |
2006 | ||
161 | EE | Parikshit Gopalan, Venkatesan Guruswami, Richard J. Lipton: Algorithms for Modular Counting of Roots of Multivariate Polynomials. LATIN 2006: 544-555 |
160 | EE | Giovanni Di Crescenzo, Richard J. Lipton, Shabsi Walfish: Perfectly Secure Password Protocols in the Bounded Retrieval Model. TCC 2006: 225-244 |
159 | EE | Nayantara Bhatnagar, Parikshit Gopalan, Richard J. Lipton: Symmetric polynomials over Zm and simultaneous communication protocols. J. Comput. Syst. Sci. 72(2): 252-285 (2006) |
2005 | ||
158 | EE | David Dagon, Wenke Lee, Richard J. Lipton: Protecting Secret Data from Insider Attacks. Financial Cryptography 2005: 16-30 |
157 | EE | Richard J. Lipton, Evangelos Markakis, Aranyak Mehta, Nisheeth K. Vishnoi: On the Fourier Spectrum of Symmetric Boolean Functions with Applications to Learning Symmetric Juntas. IEEE Conference on Computational Complexity 2005: 112-119 |
156 | EE | Subhash Khot, Richard J. Lipton, Evangelos Markakis, Aranyak Mehta: Inapproximability Results for Combinatorial Auctions with Submodular Utility Functions. WINE 2005: 92-101 |
155 | EE | Jun Xu, Richard J. Lipton: On fundamental tradeoffs between delay bounds and computational complexity in packet scheduling algorithms. IEEE/ACM Trans. Netw. 13(1): 15-28 (2005) |
154 | EE | Lance Fortnow, Richard J. Lipton, Dieter van Melkebeek, Anastasios Viglas: Time-space lower bounds for satisfiability. J. ACM 52(6): 835-865 (2005) |
153 | EE | Ben Gum, Richard J. Lipton, Andrea S. LaPaugh, Faith Ellen Fich: Estimating the maximum. J. Algorithms 54(1): 105-114 (2005) |
2004 | ||
152 | EE | Richard J. Lipton, Evangelos Markakis, Elchanan Mossel, Amin Saberi: On approximately fair allocations of indivisible goods. ACM Conference on Electronic Commerce 2004: 125-131 |
151 | EE | Nikhil R. Devanur, Richard J. Lipton, Nisheeth K. Vishnoi: On the Complexity of Hilbert's 17th Problem. FSTTCS 2004: 237-249 |
150 | EE | Saugata Basu, Nayantara Bhatnagar, Parikshit Gopalan, Richard J. Lipton: Polynomials That Sign Represent Parity and Descartes Rule of Signs. IEEE Conference on Computational Complexity 2004: 223-235 |
149 | EE | Richard J. Lipton, Evangelos Markakis: Nash Equilibria via Polynomial Equations. LATIN 2004: 413-422 |
148 | EE | Nayantara Bhatnagar, Parikshit Gopalan, Richard J. Lipton: The Degree of Threshold Mod 6 and Diophantine Equations Electronic Colloquium on Computational Complexity (ECCC)(022): (2004) |
2003 | ||
147 | EE | Richard J. Lipton, Evangelos Markakis, Aranyak Mehta: Playing large games using simple strategies. ACM Conference on Electronic Commerce 2003: 36-41 |
146 | EE | Richard J. Lipton, Anastasios Viglas: Non-uniform Depth of Polynomial Time and Space Simulations. FCT 2003: 311-320 |
145 | EE | Nayantara Bhatnagar, Parikshit Gopalan, Richard J. Lipton: Symmetric Polynomials over Zm and Simultaneous Communication Protocol. FOCS 2003: 450- |
144 | EE | Parikshit Gopalan, Richard J. Lipton, Aranyak Mehta: Randomized Time-Space Tradeoffs for Directed Graph Connectivity. FSTTCS 2003: 208-216 |
143 | EE | Nikhil R. Devanur, Richard J. Lipton, Nisheeth K. Vishnoi: Who's The Weakest Link? SAGA 2003: 108-116 |
142 | EE | Richard J. Lipton, Nisheeth K. Vishnoi: Deterministic identity testing for multivariate polynomials. SODA 2003: 756-760 |
141 | EE | Nayantara Bhatnagar, Parikshit Gopalan, Richard J. Lipton: Symmetric Polynomials over Zm and Simultaneous Communication Protocols Electronic Colloquium on Computational Complexity (ECCC)(047): (2003) |
140 | EE | George Karakostas, Richard J. Lipton, Anastasios Viglas: On the complexity of intersecting finite state automata and N L versus N P. Theor. Comput. Sci. 302(1-3): 257-274 (2003) |
139 | EE | Richard J. Lipton, Mitsunori Ogihara, Yechezkel Zalcstein: A Note on Square Rooting of Time Functions of Turing Machines. Theory Comput. Syst. 36(3): 295-299 (2003) |
2002 | ||
138 | EE | Richard J. Lipton, S. Rajagopalan, Dimitrios N. Serpanos: Spy: A Method to Secure Clients for Network Services. ICDCS Workshops 2002: 23-28 |
137 | EE | Alessandro Orso, Donglin Liang, Mary Jean Harrold, Richard J. Lipton: Gamma system: continuous evolution of software after deployment. ISSTA 2002: 65-69 |
136 | EE | Jun Xu, Richard J. Lipton: On fundamental tradeoffs between delay bounds and computational complexity in packet scheduling algorithms. SIGCOMM 2002: 279-292 |
135 | EE | Richard J. Lipton, Neal E. Young: Simple Strategies for Large Zero-Sum Games with Applications to Complexity Theory CoRR cs.CC/0205035: (2002) |
134 | EE | Richard J. Lipton, Anastasios Viglas: Non-uniform Depth of Polynomial Time and Space Simulations Electronic Colloquium on Computational Complexity (ECCC)(057): (2002) |
2001 | ||
133 | EE | Dimitrios N. Serpanos, Richard J. Lipton: Defense Against Man-in-the-Middle Attack in Client-Server Systems. ISCC 2001: 9-14 |
132 | EE | Dan Boneh, Richard A. DeMillo, Richard J. Lipton: On the Importance of Eliminating Errors in Cryptographic Computations. J. Cryptology 14(2): 101-119 (2001) |
2000 | ||
131 | EE | George Karakostas, Richard J. Lipton, Anastasios Viglas: On the Complexity of Intersecting Finite State Automata. IEEE Conference on Computational Complexity 2000: 229-234 |
130 | Dirk Faulhammer, Richard J. Lipton, Laura F. Landweber: Fidelity of Enzymatic Ligation for DNA Computing. Journal of Computational Biology 7(6): 839-848 (2000) | |
129 | Jin-yi Cai, Richard J. Lipton, Yechezkel Zalcstein: The Complexity of the A B C Problem. SIAM J. Comput. 29(6): 1878-1888 (2000) | |
1999 | ||
128 | EE | Richard J. Lipton, Anastasios Viglas: On the Complexity of SAT. FOCS 1999: 459-464 |
127 | EE | Anna Gál, Shai Halevi, Richard J. Lipton, Erez Petrank: Computing from Partial Solutions. IEEE Conference on Computational Complexity 1999: 34-45 |
1998 | ||
126 | EE | Richard J. Lipton, Rafail Ostrovsky: Micropayments via Efficient Coin-Flipping. Financial Cryptography 1998: 1-15 |
125 | Sigal Ar, Richard J. Lipton, Ronitt Rubinfeld, Madhu Sudan: Reconstructing Algebraic Functions from Mixed Data. SIAM J. Comput. 28(2): 487-510 (1998) | |
1997 | ||
124 | EE | Dan Boneh, Richard A. DeMillo, Richard J. Lipton: On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract). EUROCRYPT 1997: 37-51 |
123 | EE | Richard J. Lipton, Paul J. Martino, Andy Neitzke: On the Complexity of a Set-Union Problem. FOCS 1997: 110-115 |
122 | Laura F. Landweber, Richard J. Lipton: DNA²DNA Computations: A Potential "Killer App"? ICALP 1997: 56-64 | |
121 | EE | Dan Boneh, Richard J. Lipton: Effect of Operators on Straight Line Complexity. ISTCS 1997: 1-5 |
120 | Richard J. Lipton: DNA2DNA Computation: A Potential Killer Application? NIPS 1997 | |
1996 | ||
119 | EE | Dan Boneh, Richard J. Lipton: Algorithms for Black-Box Fields and their Application to Cryptography (Extended Abstract). CRYPTO 1996: 283-297 |
118 | EE | Masato Edahiro, Richard J. Lipton: Clock Buffer Placement Algorithm for Wire-Delay-Dominated Timing Model. Great Lakes Symposium on VLSI 1996: 143-147 |
117 | EE | Richard J. Lipton: DNA computations can have global memory. ICCD 1996: 344- |
116 | EE | Dan Boneh, Christopher Dunworth, Richard J. Lipton, Jiri Sgall: On the Computational Power of DNA. Discrete Applied Mathematics 71(1-3): 79-94 (1996) |
115 | EE | Richard J. Lipton: On Proving that a Graph has no Large Clique: A Connection with Ramsey Theory. Inf. Process. Lett. 58(1): 39-42 (1996) |
114 | Paul Ammann, Richard J. Lipton, Ravi S. Sandhu: The Expressive Power of Multi-parent Creation in Monotonic Access Control Models. Journal of Computer Security 4(2/3): 149-166 (1996) | |
1995 | ||
113 | EE | Dan Boneh, Richard J. Lipton: Quantum Cryptanalysis of Hidden Linear Functions (Extended Abstract). CRYPTO 1995: 424-437 |
112 | Jin-yi Cai, Richard J. Lipton, Luc Longpré, Mitsunori Ogihara, Kenneth W. Regan, D. Sivakumar: Communication Complexity of Key Agreement on Small Ranges. STACS 1995: 38-49 | |
111 | Richard J. Lipton, Jeffrey F. Naughton: Query Size Estimation by Adaptive Sampling. J. Comput. Syst. Sci. 51(1): 18-25 (1995) | |
1994 | ||
110 | Richard J. Lipton: Straight-line complexity and integer factorization. ANTS 1994: 71-79 | |
109 | Jin-yi Cai, Richard J. Lipton, Yechezkel Zalcstein: The Complexity of the Membership Problem for 2-generated Commutative Semigroups of Rational Matrices FOCS 1994: 135-142 | |
108 | Richard J. Lipton, Andrew Tomkins: Online Interval Scheduling. SODA 1994: 302-311 | |
107 | Richard J. Lipton: A New Approach To Information Theory. STACS 1994: 699-708 | |
106 | EE | Richard J. Lipton, Neal E. Young: Simple strategies for large zero-sum games with applications to complexity theory. STOC 1994: 734-740 |
105 | Richard J. Lipton: Some Consequences of Our Failure to Prove Non-Linear Lower Bounds on Explicit Functions. Structure in Complexity Theory Conference 1994: 79-87 | |
104 | Jin-yi Cai, Anne Condon, Richard J. Lipton: PSPACE Is Provable by Two Provers in One Round. J. Comput. Syst. Sci. 48(1): 183-193 (1994) | |
103 | Jin-yi Cai, Richard J. Lipton: Subquadratic Simulations of Balanced Formulae by Branching Programs. SIAM J. Comput. 23(3): 563-572 (1994) | |
1993 | ||
102 | EE | Dan Boneh, Richard J. Lipton: Amplification of Weak Learning under the Uniform Distribution. COLT 1993: 347-351 |
101 | EE | Avrim Blum, Merrick L. Furst, Michael J. Kearns, Richard J. Lipton: Cryptographic Primitives Based on Hard Learning Problems. CRYPTO 1993: 278-291 |
100 | Jin-yi Cai, Richard J. Lipton, Robert Sedgewick, Andrew Chi-Chih Yao: Towards Uncheatable benchmarks. Structure in Complexity Theory Conference 1993: 2-11 | |
99 | Richard J. Lipton, Jeffrey F. Naughton: Clocked Adversaries for Hashing. Algorithmica 9(3): 239-252 (1993) | |
98 | Narendra Karmarkar, Richard M. Karp, Richard J. Lipton, László Lovász, Michael Luby: A Monte-Carlo Algorithm for Estimating the Permanent. SIAM J. Comput. 22(2): 284-293 (1993) | |
97 | Richard J. Lipton, Jeffrey F. Naughton, Donovan A. Schneider, S. Seshadri: Efficient Sampling Strategies for Relational Database Operations. Theor. Comput. Sci. 116(1&2): 195-226 (1993) | |
1992 | ||
96 | Paul Ammann, Richard J. Lipton, Ravi S. Sandhu: The Expressive Power of Multi-Parent Creation in a Monotonic Access Control Model. CSFW 1992: 148-156 | |
95 | Sigal Ar, Richard J. Lipton, Ronitt Rubinfeld, Madhu Sudan: Reconstructing Algebraic Functions from Mixed Data FOCS 1992: 503-512 | |
94 | EE | Kenneth Salem, Daniel Barbará, Richard J. Lipton: Probabilistic Dignosis of Hot Spots. ICDE 1992: 30-39 |
93 | Andrea S. LaPaugh, Richard J. Lipton, Jonathan S. Sandberg: How to Store a Triangular Matrix. IEEE Trans. Computers 41(7): 896-899 (1992) | |
92 | Jin-yi Cai, Anne Condon, Richard J. Lipton: On Games of Incomplete Information. Theor. Comput. Sci. 103(1): 25-38 (1992) | |
1991 | ||
91 | Peter Gemmell, Richard J. Lipton, Ronitt Rubinfeld, Madhu Sudan, Avi Wigderson: Self-Testing/Correcting for Polynomials and for Approximate Functions STOC 1991: 32-42 | |
90 | Jin-yi Cai, Anne Condon, Richard J. Lipton: PSPACE Is Provable By Two Provers In One Round. Structure in Complexity Theory Conference 1991: 110-115 | |
89 | EE | Daniel Barbará, Richard J. Lipton: A Class of Randomized Strategies for Low-Cost Comparison of File Copies. IEEE Trans. Parallel Distrib. Syst. 2(2): 160-170 (1991) |
88 | EE | Richard A. DeMillo, Richard J. Lipton: Defining Software by Continuous, Smooth Functions. IEEE Trans. Software Eng. 17(4): 383-384 (1991) |
1990 | ||
87 | Richard J. Lipton, Dimitrios N. Serpanos: Uniform-Cost Communication in Scalable Multiprocessors. ICPP (1) 1990: 429-432 | |
86 | EE | Richard J. Lipton, Jeffrey F. Naughton: Query Size Estimation by Adaptive Sampling. PODS 1990: 40-46 |
85 | EE | Richard J. Lipton, Jeffrey F. Naughton, Donovan A. Schneider: Practical Selectivity Estimation through Adaptive Sampling. SIGMOD Conference 1990: 1-11 |
84 | Richard J. Lipton: Efficient Checking of Computations. STACS 1990: 207-215 | |
83 | Jin-yi Cai, Anne Condon, Richard J. Lipton: Playing Games of Incomplete Information. STACS 1990: 58-69 | |
82 | Jin-yi Cai, Anne Condon, Richard J. Lipton: On Bounded Round Multi-Prover Interactive Proof Systems. Structure in Complexity Theory Conference 1990: 45-54 | |
81 | Richard J. Lipton, Arvin Park: The Processor Identity Problem. Inf. Process. Lett. 36(2): 91-94 (1990) | |
1989 | ||
80 | Anne Condon, Richard J. Lipton: On the Complexity of Space Bounded Interactive Proofs (Extended Abstract) FOCS 1989: 462-467 | |
79 | Jin-yi Cai, Richard J. Lipton: Subquadratic Simulations of Circuits by Branching Programs FOCS 1989: 568-573 | |
78 | Daniel Barbará, Richard J. Lipton: A Randomized Technique for Remote File Comparison. ICDCS 1989: 12-21 | |
77 | EE | Richard J. Lipton, Jeffrey F. Naughton: Estimating the Size of Generalized Transitive Closures. VLDB 1989: 165-171 |
76 | Arvin Park, Krishnaswamy Balasubramanian, Richard J. Lipton: Array Access Bounds for Block Storage Memory Systems. IEEE Trans. Computers 38(6): 909-913 (1989) | |
1986 | ||
75 | Richard J. Lipton, Daniel P. Lopresti: Delta Transformations to Simplify VLSI Processor Arrays for Serial Dynamic Programming. ICPP 1986: 917-920 | |
74 | EE | Ravindran Kannan, Richard J. Lipton: Polynomial-time algorithm for the orbit problem. J. ACM 33(4): 808-821 (1986) |
1985 | ||
73 | Richard Cullingford, Hector Garcia-Molina, Richard J. Lipton: The Role Of Massive Memory In Knowledge-Base Management Systems. On Knowledge Base Management Systems (Islamorada) 1985: 535-550 | |
72 | Merrick L. Furst, Richard J. Lipton, Larry J. Stockmeyer: Pseudorandom Number Generation and Space Complexity Information and Control 64(1-3): 43-51 (1985) | |
71 | Ashok K. Chandra, Steven Fortune, Richard J. Lipton: Unbounded Fan-In Circuits and Associative Functions. J. Comput. Syst. Sci. 30(2): 222-234 (1985) | |
1984 | ||
70 | Hector Garcia-Molina, Richard J. Lipton, Jacobo Valdes: A Massive Memory Machine. IEEE Trans. Computers 33(5): 391-399 (1984) | |
69 | Richard E. Ladner, Larry J. Stockmeyer, Richard J. Lipton: Alternation Bounded Auxiliary Pushdown Automata Information and Control 62(2/3): 93-108 (1984) | |
68 | Richard E. Ladner, Richard J. Lipton, Larry J. Stockmeyer: Alternating Pushdown and Stack Automata. SIAM J. Comput. 13(1): 135-155 (1984) | |
1983 | ||
67 | Merrick L. Furst, Richard J. Lipton, Larry J. Stockmeyer: Pseudorandom Number Generation and Space Complexity. FCT 1983: 171-176 | |
66 | Ashok K. Chandra, Steven Fortune, Richard J. Lipton: Lower Bounds for Constant Depth Circuits for Prefix Problems. ICALP 1983: 109-117 | |
65 | Andrea S. LaPaugh, Richard J. Lipton: Total Fault Testing Using the Bipartite Transformation. ITC 1983: 428-434 | |
64 | Ashok K. Chandra, Steven Fortune, Richard J. Lipton: Unbounded Fan-in Circuits and Associative Functions STOC 1983: 52-60 | |
63 | Ashok K. Chandra, Merrick L. Furst, Richard J. Lipton: Multi-Party Protocols STOC 1983: 94-99 | |
62 | EE | Richard J. Lipton, Jacobo Valdes, Gopalakrishnan Vijayan, Stephen C. North, Robert Sedgewick: VLSI Layout as Programming. ACM Trans. Program. Lang. Syst. 5(3): 405-421 (1983) |
1982 | ||
61 | Richard J. Lipton, Robert Sedgewick, Jacobo Valdes: Programming Aspects of VLSI. POPL 1982: 57-65 | |
1981 | ||
60 | Richard J. Lipton, Jacobo Valdes: Census Functions: an Approach to VLSI Upper Bounds (Preliminary Version) FOCS 1981: 13-22 | |
59 | George I. Davida, Richard A. DeMillo, Richard J. Lipton: Multilevel Secure Distributed System. ICDCS 1981: 308-312 | |
58 | Richard J. Lipton, Robert Sedgewick: Lower Bounds for VLSI STOC 1981: 300-307 | |
57 | Kellogg S. Booth, Richard J. Lipton: Computing Extremal and Approximate Distances in Graphs Having Unit Cost Edges. Acta Inf. 15: 319-328 (1981) | |
56 | Alon Itai, Richard J. Lipton, Christos H. Papadimitriou, Michael Rodeh: Covering Graphs by Simple Circuits. SIAM J. Comput. 10(4): 746-750 (1981) | |
55 | Lawrence H. Landweber, Richard J. Lipton, Edward L. Robertson: On the Structure of Sets in NP and Other Complexity Classes. Theor. Comput. Sci. 15: 181-200 (1981) | |
1980 | ||
54 | George I. Davida, Richard A. DeMillo, Richard J. Lipton: Protecting Shared Cryptographic Keys. IEEE Symposium on Security and Privacy 1980: 100-102 | |
53 | George I. Davida, Richard A. DeMillo, Richard J. Lipton: A System Architecture to Support a Verifiably Secure Multilevel Security System. IEEE Symposium on Security and Privacy 1980: 137-144 | |
52 | Timothy A. Budd, Richard A. DeMillo, Richard J. Lipton, Frederick G. Sayward: Theoretical and Emperical Studies on Using Program Mutation to Test the Functional Correctness of Programs. POPL 1980: 220-233 | |
51 | Ravindran Kannan, Richard J. Lipton: The Orbit Problem is Decidable STOC 1980: 252-261 | |
50 | Richard M. Karp, Richard J. Lipton: Some Connections between Nonuniform and Uniform Complexity Classes STOC 1980: 302-309 | |
49 | Richard A. DeMillo, Richard J. Lipton: The Consistency of ``P = NP'' and Related Problems with Fragments of Number Theory STOC 1980: 45-57 | |
48 | EE | Richard A. DeMillo, Stanley C. Eisenstat, Richard J. Lipton: Space-Time Trade-Offs in Structured Programming: An Improved Combinatorial Embedding Theorem. J. ACM 27(1): 123-127 (1980) |
47 | EE | Richard J. Lipton, Arnold L. Rosenberg, Andrew Chi-Chih Yao: External Hashing Schemes for Collections of Data Structures. J. ACM 27(1): 81-95 (1980) |
46 | David P. Dobkin, Richard J. Lipton: Addition Chain Methods for the Evaluation of Specific Polynomials. SIAM J. Comput. 9(1): 121-125 (1980) | |
45 | Richard J. Lipton, Robert Endre Tarjan: Applications of a Planar Separator Theorem. SIAM J. Comput. 9(3): 615-627 (1980) | |
1979 | ||
44 | Romas Aleliunas, Richard M. Karp, Richard J. Lipton, László Lovász, Charles Rackoff: Random Walks, Universal Traversal Sequences, and the Complexity of Maze Problems FOCS 1979: 218-223 | |
43 | Richard A. DeMillo, Richard J. Lipton: Some Connections between Mathematical Logic and Complexity Theory STOC 1979: 153-159 | |
42 | EE | David P. Dobkin, Anita K. Jones, Richard J. Lipton: Secure Databases: Protection Against User Influence. ACM Trans. Database Syst. 4(1): 97-106 (1979) |
41 | Richard A. DeMillo, Richard J. Lipton, Alan J. Perlis: Social Processes and Proofs of Theorems and Programs. Commun. ACM 22(5): 271-280 (1979) | |
40 | David P. Dobkin, Richard J. Lipton, Steven P. Reiss: Linear Programming is Log-Space Hard for P. Inf. Process. Lett. 8(2): 96-97 (1979) | |
39 | David P. Dobkin, Richard J. Lipton: On the Complexity of Computations under Varying Sets of Primitives. J. Comput. Syst. Sci. 18(1): 86-91 (1979) | |
38 | Richard A. DeMillo, Richard J. Lipton: A Constructive Generalization of the Borel-Cantelli Lemma with Application to the Complexity of Infinite Strings. Mathematical Systems Theory 13: 95-104 (1979) | |
1978 | ||
37 | Richard J. Lipton: Model Theoretic Aspects of Computational Complexity FOCS 1978: 193-200 | |
36 | Richard E. Ladner, Richard J. Lipton, Larry J. Stockmeyer: Alternating Pushdown Automata (Preliminary Report) FOCS 1978: 92-106 | |
35 | Richard A. DeMillo, Stanley C. Eisenstat, Richard J. Lipton: Preserving Average Proximity in Arrays. Commun. ACM 21(3): 218-231 (1978) | |
34 | Richard A. DeMillo, David P. Dobkin, Richard J. Lipton: Even Data Bases That Lie Can Be Compromised. IEEE Trans. Software Eng. 4(1): 73-75 (1978) | |
33 | Richard J. Lipton, Raymond E. Miller: A Batching Method for Coloring Planar Graphs. Inf. Process. Lett. 7(4): 185-188 (1978) | |
32 | Richard A. DeMillo, Richard J. Lipton: A Probabilistic Remark on Algebraic Program Testing. Inf. Process. Lett. 7(4): 193-195 (1978) | |
31 | Richard J. Lipton, Larry J. Stockmeyer: Evaluation of Polynomials with Super-Preconditioning. J. Comput. Syst. Sci. 16(2): 124-139 (1978) | |
30 | David P. Dobkin, Richard J. Lipton: A Lower Bound of the ½n² on Linear Search Programs for the Knapsack Problem. J. Comput. Syst. Sci. 16(3): 413-417 (1978) | |
29 | Anita K. Jones, Richard J. Lipton: The Enforcement of Security Policies for Computation. J. Comput. Syst. Sci. 17(1): 35-55 (1978) | |
28 | Richard J. Lipton: Polynomials with 0-1 Coefficients that Are Hard to Evaluate. SIAM J. Comput. 7(1): 61-69 (1978) | |
27 | Nancy A. Lynch, Richard J. Lipton: On Structure Preserving Reductions. SIAM J. Comput. 7(2): 119-126 (1978) | |
1977 | ||
26 | Richard J. Lipton: A Necessary and Sufficient Condition for the Existence of Hoare Logics FOCS 1977: 1-6 | |
25 | Richard J. Lipton, Robert Endre Tarjan: Application of a Planar Separator Theorem FOCS 1977: 162-170 | |
24 | Richard A. DeMillo, Richard J. Lipton, Alan J. Perlis: Social Processes and Proofs of Theorems and Programs. POPL 1977: 206-214 | |
23 | EE | Richard J. Lipton, Lawrence Snyder: A Linear Time Algorithm for Deciding Subject Security. J. ACM 24(3): 455-464 (1977) |
22 | EE | Richard J. Lipton, Yechezkel Zalcstein: Word Problems Solvable in Logspace. J. ACM 24(3): 522-526 (1977) |
21 | Richard J. Lipton, Raymond E. Miller, Lawrence Snyder: Synchronization and Computing Capabilities of Linear Asynchronous Structures. J. Comput. Syst. Sci. 14(1): 49-72 (1977) | |
1976 | ||
20 | Anita K. Jones, Richard J. Lipton, Lawrence Snyder: A Linear Time Algorithm for Deciding Security FOCS 1976: 33-41 | |
19 | David P. Dobkin, Richard J. Lipton: A Lower Bound of ½n² on Linear Search Programs for the Knapsack Problem. MFCS 1976: 265-269 | |
18 | Richard J. Lipton, Larry J. Stockmeyer: Evaluation of Polynomials with Super-Preconditioning STOC 1976: 174-180 | |
17 | E. Cardoza, Richard J. Lipton, Albert R. Meyer: Exponential Space Complete Problems for Petri Nets and Commutative Semigroups: Preliminary Report STOC 1976: 50-54 | |
16 | EE | Richard J. Lipton, Stanley C. Eisenstat, Richard A. DeMillo: Space and Time Hierarchies for Classes of Control Structures and Data Structures. J. ACM 23(4): 720-732 (1976) |
15 | David P. Dobkin, Richard J. Lipton: Multidimensional Searching Problems. SIAM J. Comput. 5(2): 181-186 (1976) | |
14 | Richard J. Lipton, David P. Dobkin: Complexity Measures and Hierarchies for the Evaluation of Integers and Polynomials. Theor. Comput. Sci. 3(3): 349-357 (1976) | |
1975 | ||
13 | David P. Dobkin, Richard J. Lipton: On the complexity of computations under varying sets of primitives. Automata Theory and Formal Languages 1975: 110-117 | |
12 | Richard J. Lipton, Raymond E. Miller, Lawrence Snyder: Synchronization and Computing Capabilities of Linear Asynchronous Structures FOCS 1975: 19-28 | |
11 | Richard J. Lipton: Polynomials with 0-1 Coefficients that Are Hard to Evaluate FOCS 1975: 6-10 | |
10 | Richard J. Lipton: Reduction: A New Method of Proving Properties of Systems of Processes. POPL 1975: 78-86 | |
9 | Anita K. Jones, Richard J. Lipton: The Enforcement of Security Policies for Computation. SOSP 1975: 197-206 | |
8 | Richard J. Lipton, David P. Dobkin: Complexity Measures and Hierarchies for the Evaluation of Integers, Polynomials, and n-linear Forms STOC 1975: 1-5 | |
7 | Richard J. Lipton, Stanley C. Eisenstat, Richard A. DeMillo: The Complexity of Control Structures and Data Structures STOC 1975: 186-193 | |
6 | Richard J. Lipton: Reduction: A Method of Proving Properties of Parallel Programs. Commun. ACM 18(12): 717-721 (1975) | |
5 | Richard J. Lipton, Robert W. Tuttle: A Synchronization Anomaly. Inf. Process. Lett. 3(3): 65-66 (1975) | |
1974 | ||
4 | Richard J. Lipton, Lawrence Snyder, Yechezkel Zalcstein: A Comparative Study of Models of Parallel Computation FOCS 1974: 145-155 | |
3 | Richard J. Lipton: Limitations of Synchronization Primitives with Conditional Branching and Global Variables STOC 1974: 230-241 | |
2 | David P. Dobkin, Richard J. Lipton: On Some Generalizations of Binary Search STOC 1974: 310-316 | |
1 | Richard J. Lipton: Schedulers as enforces in synchronization. Symposium on Operating Systems 1974: 237-256 |