Bounded-width polynomial-size branching programs recognize exactly those languages in \(NC^ 1\)

From MaRDI portal
Publication:1117696

DOI10.1016/0022-0000(89)90037-8zbMath0667.68059OpenAlexW4240781210WikidataQ29543597 ScholiaQ29543597MaRDI QIDQ1117696

David A. Barrington

Publication date: 1989

Published in: Journal of Computer and System Sciences (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1016/0022-0000(89)90037-8



Lua error in Module:PublicationMSCList at line 37: attempt to index local 'msc_result' (a nil value).


Related Items (only showing first 100 items - show all)

Uniform constant-depth threshold circuits for division and iterated multiplication.Function-algebraic characterizations of log and polylog parallel timeThe correlation between parity and quadratic polynomials mod \(3\)The equivalence of theories that characterize ALogTimeOn learning width two branching programsOn ACCRepresenting Boolean functions as polynomials modulo composite numbersRobustness of PSPACE-complete setsA note on a theorem of Barrington, Straubing and ThérienA note on some languages in uniform \(ACC^ 0\)On uniformity within \(NC^ 1\)A note on logspace optimizationA generalization of Spira's theorem and circuits with small segregators or separatorsThe complexity of intersecting finite automata having few final statesDyn-FO: A parallel, dynamic complexity classPredicting nonlinear cellular automata quickly by decomposing them into linear onesSkew circuits of small widthHadamard tensors and lower bounds on multiparty communication complexityComments on ``Arithmetic complexity, Kleene closure, and formal power seriesOn the relative complexity of some languages in \(NC^ 1\)Uniform derandomization from pathetic lower boundsAutoreducibility, mitoticity, and immunityEfficient oblivious branching programs for threshold and mod functionsUniversally serializable computationA Circuit Complexity Approach to TransductionsVisibly Counter Languages and the Structure of $$\mathrm {NC}^{1}$$Linear circuits, two-variable logic and weakly blocked monoidsFinite semigroup varieties defined by programsNondeterministic stack register machinesDeterministic summation modulo \(\mathcal B_{n}\), the semigroup of binary relations on \(0,1, \dots, n-1\)Symmetry structure in discrete models of biochemical systems: natural subsystems and the weak control hierarchy in a new model of computation driven by interactionsAn algebraic approach to data languages and timed languagesPositive and negative proofs for circuits and branching programsComputational fuzzy extractor from LWEComplexity of regular functionsCompleteness results for graph isomorphism.Space efficient representations of finite groupsSmall space analogues of Valiant's classes and the limitations of skew formulasComparative complexity of quantum and classical OBDDs for total and partial functionsDeciding FO-definability of regular languagesRing-based identity based encryption -- asymptotically shorter MPK and tighter securityNIKE from affine determinant programsDirect computation of branching programs and its applications to more efficient lattice-based cryptographyAn automaton group with \textsf{PSPACE}-complete word problemLattice-based FHE as secure as PKEOn mod \(p\) transversalsOn the computational power of programs over \(\mathsf{BA}_2\) monoidOracle branching programs and Logspace versus \(P^*\)Length of polynomials over finite groupsOptimal adviceKnapsack problems for NLFirst-order rewritability of ontology-mediated queries in linear temporal logicRegular languages in \(NC\)Evaluation of circuits over nilpotent and polycyclic groups\(NC^ 1\): The automata-theoretic viewpointTowards optimal simulations of formulas by bounded-width programsClosure of varieties of languages under products with counterBetter complexity bounds for cost register automataOn the correlation between parity and modular polynomialsLearning read-constant polynomials of constant degree modulo compositesCounting paths in VPA is complete for \(\#\mathrm{NC}^1\)A more efficient leveled strongly-unforgeable fully homomorphic signature schemeExtensions to Barrington's M-program modelArithmetizing classes around {\textsf{NC}}\(^{1}\) and {\textsf{L}}Leaf languages and string compressionLearning expressions and programs over monoidsOn the structure of Boolean functions with small spectral normDescriptional and computational complexity of finite automata -- a surveyFunctions computable in polynomial spaceTight conditional lower bounds for longest common increasing subsequenceFirst-order logics: some characterizations and closure propertiesThe algebraic theory of Parikh automataA moderately exponential time algorithm for \(k\)-IBDD satisfiabilitySatisfiability algorithm for syntactic read-\(k\)-times branching programsDecompositions of Triangle-Dense GraphsNo Tits alternative for cellular automataPlanar and grid graph reachability problemsThe word problem of the Brin-Thompson group is \textsf{coNP}-completeAlgebraic Complexity ClassesSuccinct representation, leaf languages, and projection reductionsRelating polynomial time to constant depthNondeterministic \(NC^1\) computationQuantum Homomorphic Encryption for Polynomial-Sized CircuitsCounting classes and the fine structure between \(\mathrm{NC}^1\) and \(L\)Circuits and expressions with nonassociative gatesLattice-Based Fully Dynamic Multi-key FHE with Short CiphertextsPrograms over semigroups of dot-depth oneAn impossibility gap between width-4 and width-5 permutation branching programsComplexity theory. Abstracts from the workshop held November 11--17, 2018The computational power of Benenson automataCounting modulo quantifiers on finite structuresLanguages defined with modular counting quantifiersOn the computational power of probabilistic and quantum branching programHardness of approximation for knapsack problemsNon-uniform automata over groupsThe parallel complexity of two problems on concurrencyMulti-head finite automata: Data-independent versus data-dependent computationsUpper bound for torus polynomialsCompression techniques in group theoryOn learning embedded midbit functions



Cites Work


This page was built for publication: Bounded-width polynomial-size branching programs recognize exactly those languages in \(NC^ 1\)