Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Thomas Thierauf is active.

Publication


Featured researches published by Thomas Thierauf.


SIAM Journal on Computing | 1997

Threshold Computation and Cryptographic Security

Yenjo Han; Lane A. Hemaspaandra; Thomas Thierauf

Threshold machines are Turing machines whose acceptance is determined by what portion of the machines computation paths are accepting paths. Probabilistic machines are Turing machines whose acceptance is determined by the probability weight of the machines accepting computation paths. In 1975, Simon proved that for unbounded-error polynomial-time machines these two notions yield the same class, PP\@. Perhaps because Simons result seemed to collapse the threshold and probabilistic modes of computation, the relationship between threshold and probabilistic computing for the case of bounded error has remained unexplored. In this paper, we compare the bounded-error probabilistic class BPP with the analogous threshold class,


Theory of Computing Systems \/ Mathematical Systems Theory | 1996

On the correlation of symmetric functions

Jin-Yi Cai; Frederic Green; Thomas Thierauf

\bpppath


International Journal of Foundations of Computer Science | 1995

NONDETERMINISTICALLY SELECTIVE SETS

Lane A. Hemaspaandra; Albrecht Hoene; Ashish V. Naik; Mitsunori Ogihara; Alan L. Selman; Thomas Thierauf; Jie Wang

, and, more generally, we study the structural properties of


foundations of computer science | 1996

The Boolean isomorphism problem

Manindra Agrawal; Thomas Thierauf

\bpppath


SIAM Journal on Computing | 2000

The Formula Isomorphism Problem

Manindra Agrawal; Thomas Thierauf

. We prove that


structure in complexity theory annual conference | 1994

On functions computable with nonadaptive queries to NP

Harry Buhrman; Jim Kadin; Thomas Thierauf

\rm BPP_{path}


symposium on the theory of computing | 2016

Bipartite perfect matching is in quasi-NC

Stephen A. Fenner; Rohit Gurjar; Thomas Thierauf

contains both


fundamentals of computation theory | 2009

Reachability In K 3,3 -free graphs and K 5 -free graphs is in unambiguous log-space

Thomas Thierauf; Fabian Wagner

\np^{\bpp}


Computational Complexity | 2017

Deterministic Identity Testing for Sum of Read-Once Oblivious Arithmetic Branching Programs

Rohit Gurjar; Arpita Korwar; Nitin Saxena; Thomas Thierauf

and


symposium on theoretical aspects of computer science | 2007

The polynomially bounded perfect matching problem is in NC 2

Manindra Agrawal; Thanh Minh Hoang; Thomas Thierauf

\p^{\rm NP[\log]}

Collaboration


Dive into the Thomas Thierauf's collaboration.

Top Co-Authors

Avatar

Rohit Gurjar

Indian Institute of Technology Kanpur

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Manindra Agrawal

Indian Institute of Technology Kanpur

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Stephen A. Fenner

University of South Carolina

View shared research outputs
Top Co-Authors

Avatar

Arpita Korwar

Indian Institute of Technology Kanpur

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Yenjo Han

University of Rochester

View shared research outputs
Top Co-Authors

Avatar

Osamu Watanabe

University of Electro-Communications

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge