Search results
Results: 173
Number of items: 173
-
Buhrman, H., van der Gulik, P. T. S., Klau, G. W., Schaffner, C., Speijer, D., & Stougie, L. (2013). A Realistic Model Under Which the Genetic Code is Optimal. Journal of molecular evolution, 77(4), 170-184. https://doi.org/10.1007/s00239-013-9571-2
-
Buhrman, H., Fehr, S., Schaffner, C., & Speelman, F. (2013). The Garden-Hose Model. In ITCS'13: proceedings of the 2013 ACM Conference on Innovations in Theoretical Computer Science : January 9-12, 2013, Berkeley, California, USA (pp. 145-157). Association for Computing Machinery. https://doi.org/10.1145/2422436.2422455
-
Buhrman, H., García-Soriano, D., Matsliah, A., & de Wolf, R. (2013). The non-adaptive query complexity of testing k-parities. Chicago Journal of Theoretical Computer Science, 2013, Article 6. https://doi.org/10.4086/cjtcs.2013.006 -
Briët, J., Buhrman, H., Lee, T., & Vidick, T. (2013). Multipartite entanglement in XOR games. Quantum Information & Computation, 13(3&4), 334-360. https://doi.org/10.26421/QIC13.3-4 -
Briët, J., Buhrman, H., Lee, T., & Vidick, T. (2012). All Schatten spaces endowed with the Schur product are Q-algebras. Journal of Functional Analysis, 262(1), 1-9. https://doi.org/10.1016/j.jfa.2011.09.001
-
Allender, E., Buhrman, H., Friedman, L., & Loff, B. (2012). Reductions to the set of random strings: The resource-bounded case. In B. Rovan, V. Sassone, & P. Widmayer (Eds.), Mathematical Foundations of Computer Science 2012: 37th International Symposium, MFCS 2012, Bratislava, Slovakia, August 27-31, 2012 : proceedings (pp. 88-99). (Lecture Notes in Computer Science; Vol. 7464). Springer. https://doi.org/10.1007/978-3-642-32589-2_11
-
Buhrman, H., Christandl, M., & Schaffner, C. (2012). Complete insecurity of quantum protocols for classical two-party computation. Physical Review Letters, 109(16), 160501. https://doi.org/10.1103/PhysRevLett.109.160501 -
Branciard, C., Brunner, N., Buhrman, H., Cleve, R., Gisin, N., Portmann, S., Rosset, D., & Szegedy, M. (2012). Classical simulation of entanglement swapping with bounded communication. Physical Review Letters, 109(10), Article 100401. https://doi.org/10.1103/PhysRevLett.109.100401 -
Buhrman, H., Regev, O., Scarpa, G., & de Wolf, R. (2012). Near-Optimal and Explicit Bell Inequality Violations. Theory of Computing, 8, 623-645. Article 27. https://doi.org/10.4086/toc.2012.v008a027
Page 6 of 18