Crossref Citations
This article has been cited by the following publications. This list is generated based on data provided by Crossref.
Naor, M.
Schulman, L.J.
and
Srinivasan, A.
1995.
Splitters and near-optimal derandomization.
p.
182.
Alon, N.
and
Naor, M.
1996.
Derandomization, witnesses for Boolean matrix multiplication and construction of perfect hash functions.
Algorithmica,
Vol. 16,
Issue. 4-5,
p.
434.
Engel, Konrad
1996.
Interval Packing and Covering in the Boolean Lattice.
Combinatorics, Probability and Computing,
Vol. 5,
Issue. 4,
p.
373.
Korner, J.
and
Orlitsky, A.
1998.
Zero-error information theory.
IEEE Transactions on Information Theory,
Vol. 44,
Issue. 6,
p.
2207.
Fachini, Emanuela
and
Nilli, Alon
2001.
Recursive bounds for perfect hashing.
Discrete Applied Mathematics,
Vol. 111,
Issue. 3,
p.
307.
Alon, N.
Cohen, G.
Krivelevich, M.
and
Litsyn, S.
2002.
Generalized hashing and applications to digital fingerprinting.
p.
436.
Alon, Noga
Cohen, Gérard
Krivelevich, Michael
and
Litsyn, Simon
2003.
Generalized hashing and parent-identifying codes.
Journal of Combinatorial Theory, Series A,
Vol. 104,
Issue. 1,
p.
207.
Bollobás, Béla
and
Scott, Alex
2007.
On separating systems.
European Journal of Combinatorics,
Vol. 28,
Issue. 4,
p.
1068.
Bollobás, Béla
and
Scott, Alex
2007.
Separating systems and oriented graphs of diameter two.
Journal of Combinatorial Theory, Series B,
Vol. 97,
Issue. 2,
p.
193.
Cohen, Nathann
Fomin, Fedor V.
Gutin, Gregory
Kim, Eun Jung
Saurabh, Saket
and
Yeo, Anders
2009.
Computing and Combinatorics.
Vol. 5609,
Issue. ,
p.
37.
Alon, Noga
Lokshtanov, Daniel
and
Saurabh, Saket
2009.
Automata, Languages and Programming.
Vol. 5555,
Issue. ,
p.
49.
Cohen, Gérard
2009.
Coding and Cryptology.
Vol. 5557,
Issue. ,
p.
12.
Chen, Jianer
Kneis, Joachim
Lu, Songjian
Mölle, Daniel
Richter, Stefan
Rossmanith, Peter
Sze, Sing-Hoi
and
Zhang, Fenghui
2009.
Randomized Divide-and-Conquer: Improved Path, Matching, and Packing Algorithms.
SIAM Journal on Computing,
Vol. 38,
Issue. 6,
p.
2526.
Cohen, Nathann
Fomin, Fedor V.
Gutin, Gregory
Kim, Eun Jung
Saurabh, Saket
and
Yeo, Anders
2010.
Algorithm for finding k-vertex out-trees and its application to k-internal out-branching problem.
Journal of Computer and System Sciences,
Vol. 76,
Issue. 7,
p.
650.
Goldreich, Oded
and
Wigderson, Avi
2011.
Studies in Complexity and Cryptography. Miscellanea on the Interplay between Randomness and Computation.
Vol. 6650,
Issue. ,
p.
26.
CIOABĂ, SEBASTIAN M.
KÜNDGEN, ANDRÉ
TIMMONS, CRAIG M.
and
VYSOTSKY, VLADISLAV V.
2011.
Covering Complete r-Graphs with Spanning Complete r-Partite r-Graphs.
Combinatorics, Probability and Computing,
Vol. 20,
Issue. 4,
p.
519.
Bshouty, Nader
2014.
Testers and their applications.
p.
327.
Bshouty, Nader H.
2015.
Algorithms and Complexity.
Vol. 9079,
Issue. ,
p.
74.
Tyagi, Hemant
Stich, Sebastian U.
and
Gärtner, Bernd
2016.
On Two Continuum Armed Bandit Problems in High Dimensions.
Theory of Computing Systems,
Vol. 58,
Issue. 1,
p.
191.
Shangguan, Chong
and
Ge, Gennian
2016.
Separating Hash Families: A Johnson-type bound and New Constructions.
SIAM Journal on Discrete Mathematics,
Vol. 30,
Issue. 4,
p.
2243.