Deterministic simulation in LOGSPACE

@article{Ajtai1987DeterministicSI,
  title={Deterministic simulation in LOGSPACE},
  author={Mikl{\'o}s Ajtai and John Komlos and Endre Szemer{\'e}di},
  journal={Proceedings of the nineteenth annual ACM symposium on Theory of computing},
  year={1987}
}
  • M. Ajtai, J. Komlos, E. Szemerédi
  • Published 1 January 1987
  • Computer Science, Mathematics
  • Proceedings of the nineteenth annual ACM symposium on Theory of computing
In this paper we show that a wide class of probabilistic algorithms can be simulated by deterministic algorithms. Namely if there is a test in LOGSPACE so that a random sequence of length (log n)2 / log log n passes the test with probability at least 1/n then a deterministic sequence can be constructed in LOGSPACE which also passes the test. It is important that the machine performing the test gets each bit of the sequence only once. The theorem remains valid if both the test and the machine… 
A Note on the Advice Complexity of Multipass Randomized Logspace
TLDR
It is shown that for any epsilon<1, every language that is accepted by an O(n^epsilon)-pass, randomized logspace machine can be simulated in deterministic logspace with linear amount of advice.
On recycling the randomness of states in space bounded computation
TLDR
This paper introduces the idea of recycling the state S of the machine M at time i apart of the random string for the same machine at later time and uses the entropy of therandom variable S in order to save truly random bits later on.
Random Bit Recycling , PCPs andthe Complexity of NP ?
In this paper, we study quantitative aspects of randomness in Probabilisti-cally Checkable Proof Systems for NP. We show that, under a general assumption, we can recycle random bits so as to reduce
Randomness in interactive proofs
TLDR
This paper shows how to construct an AM proof system forL which, in the same number of rounds as the original proof system, achieves error 2−k(n) at the cost of Arthur sending onlyO(l) random bits per round.
Randomness-Optimal Characterization of Two NP Proof Systems
TLDR
Both classes of proof systems for NP are characterized by the same randomness complexity as BPP algorithms, assuming the existence of one-way functions.
Pairwise Independence and Derandomization Michael Luby
This article gives several applications of the following paradigm, which has proven extremely powerful in algorithm design and computational complexity. First, design a probabilistic algorithm for a
A New Characterization of ACC0 and Probabilistic CC0
TLDR
It is shown that the Boolean And function can be computed by uniform probabilistic CC0 circuits that use only O(log n) random bits, which may be viewed as evidence contrary to the conjecture.
Techniques for computing with low-independence randomness
TLDR
This thesis shows that for several large and important classes of computational problems, however, a weaker and less expensive form of randomness--namely, k-wise independent distributions--will suffice, and provides the best known deterministic NC approximation algorithms for set discrepancy, weighted discrepancy, lattice approximation, edge coloring, and other problems.
Small-bias probability spaces: efficient constructions and applications
We show how to efficiently construct a small probability space on n binary random variables such that for every subset, its parity is either zero or one with "almost" equal probability. They are
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 15 REFERENCES
How to generate cryptographically strong sequences of pseudo random bits
  • M. Blum, S. Micali
  • Mathematics, Computer Science
    23rd Annual Symposium on Foundations of Computer Science (sfcs 1982)
  • 1982
TLDR
A general algorithmic scheme for constructing polynomial-time deterministic algorithms that stretch a short secret random input into a long sequence of unpredictable pseudo-random bits is presented.
Explicit expanders and the Ramanujan conjectures
Permission to copy without fee all or part of this material is granted provided that the copies are not made or distributed for direct commercial advantage, the ACM copyright notice and the title of
Expanders, Randomness, or Time versus Space
  • M. Sipser
  • Mathematics, Computer Science
    Computational Complexity Conference
  • 1986
Dlel:.erministic simulation of probabilistic constant deptll circuik
  • $5 or FOCS
  • 1985
Dlel:.erministic simulation of probabilistic constant deptll circuik
  • IBM Research Report,
  • 1985
Theory and applications of trapdoor funcfious
  • FOCS
  • 1982
Theory and applications of trapdoor funcfious
  • FOCS, 1982,
  • 1982
Camp. and Sys. Sci
  • Camp. and Sys. Sci
  • 1981
Explicit , construct . ion of linear sized superconcelkators ”
  • Siam J . Camp .
...
1
2
...