Author of the publication

Analysis of Backoff Protocols for Multiple Access Channels (Extended Abstract)

, , and . STOC, page 241-253. ACM, (1987)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quantum Algorithms for Computing Short Discrete Logarithms and Factoring RSA Integers., and . PQCrypto, volume 10346 of Lecture Notes in Computer Science, page 347-363. Springer, (2017)Some Recent Strong Inapproximability Results.. SWAT, volume 1432 of Lecture Notes in Computer Science, page 205-209. Springer, (1998)The security of all RSA and discrete log bits., and . J. ACM, 51 (2): 187-230 (2004)On the Approximation Resistance of a Random Predicate.. Comput. Complex., 18 (3): 413-434 (2009)Optimal bounds for decision problems on the CRCW PRAM., and . J. ACM, 36 (3): 643-670 (1989)Top-Down Lower Bounds for Depth-Three Circuits., , and . Comput. Complex., 5 (2): 99-112 (1995)Reconstructing Truncated Integer Variables Satisfying Linear Congruences., , , , and . SIAM J. Comput., 17 (2): 262-280 (1988)On the Approximation Resistance of a Random Predicate.. APPROX-RANDOM, volume 4627 of Lecture Notes in Computer Science, page 149-163. Springer, (2007)Simple Analysis of Graph Tests for Linearity and PCP., and . CCC, page 244-254. IEEE Computer Society, (2001)On the Power of Interaction, , and . FOCS, page 368-379. IEEE Computer Society, (1986)