{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,28]],"date-time":"2023-10-28T22:42:43Z","timestamp":1698532963538},"reference-count":29,"publisher":"Wiley","issue":"4","license":[{"start":{"date-parts":[[2015,9,1]],"date-time":"2015-09-01T00:00:00Z","timestamp":1441065600000},"content-version":"tdm","delay-in-days":5722,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Random Struct. Alg."],"published-print":{"date-parts":[[2000,7]]},"DOI":"10.1002\/1098-2418(200007)16:4<293::aid-rsa1>3.0.co;2-f","type":"journal-article","created":{"date-parts":[[2004,11,20]],"date-time":"2004-11-20T12:03:44Z","timestamp":1100952224000},"page":"293-313","source":"Crossref","is-referenced-by-count":7,"title":["MODp-tests, almost independence and small probability spaces"],"prefix":"10.1002","volume":"16","author":[{"given":"Claudia","family":"Bertram-Kretzberg","sequence":"first","affiliation":[]},{"given":"Hanno","family":"Lefmann","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2000]]},"reference":[{"key":"10.1002\/1098-2418(200007)16:4<293::AID-RSA1>3.0.CO;2-F-BIB1","doi-asserted-by":"crossref","first-page":"567","DOI":"10.1016\/0196-6774(86)90019-2","volume":"7","author":"Alon","year":"1985","journal-title":"J. Algorithms"},{"key":"10.1002\/1098-2418(200007)16:4<293::AID-RSA1>3.0.CO;2-F-BIB2","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1109\/18.119713","volume":"38","author":"Alon","year":"1992","journal-title":"IEEE Trans Inform Theory"},{"key":"10.1002\/1098-2418(200007)16:4<293::AID-RSA1>3.0.CO;2-F-BIB3","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1002\/rsa.3240030308","volume":"3","author":"Alon","year":"1992","journal-title":"Random Struct Alg"},{"key":"10.1002\/1098-2418(200007)16:4<293::AID-RSA1>3.0.CO;2-F-BIB4","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1016\/0020-0190(95)00032-8","volume":"54","author":"Alon","year":"1995","journal-title":"Inform Process Lett"},{"key":"10.1002\/1098-2418(200007)16:4<293::AID-RSA1>3.0.CO;2-F-BIB5","volume-title":"The Probabilistic Method","author":"Alon","year":"1992","unstructured":"and The Probabilistic Method, John Wiley & Sons, New York, 1992."},{"key":"10.1002\/1098-2418(200007)16:4<293::AID-RSA1>3.0.CO;2-F-BIB6","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1007\/PL00009813","volume":"18","author":"Azar","year":"1998","journal-title":"Combinatorica"},{"key":"10.1002\/1098-2418(200007)16:4<293::AID-RSA1>3.0.CO;2-F-BIB7","author":"Babai","year":"1986","unstructured":"and Complexity classes in communication complexity Theory, Pro 27th Annual IEEE Symp Foundations of Computer Science FOCS '86, 1986, pp. 337-347."},{"key":"10.1002\/1098-2418(200007)16:4<293::AID-RSA1>3.0.CO;2-F-BIB8","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511565984","volume-title":"Irregularities of Distribution","author":"Beck","year":"1987","unstructured":"and Irregularities of Distribution, Cambridge University Press, Cambridge, UK, 1987."},{"key":"10.1002\/1098-2418(200007)16:4<293::AID-RSA1>3.0.CO;2-F-BIB9","doi-asserted-by":"crossref","first-page":"1026","DOI":"10.1145\/115234.115347","author":"Berger","year":"1991","journal-title":"J ACM, 38"},{"key":"10.1002\/1098-2418(200007)16:4<293::AID-RSA1>3.0.CO;2-F-BIB10","author":"Bertram-Kretzberg","year":"1997","unstructured":"TH-MODp-circuits, manuscript, 1997."},{"key":"10.1002\/1098-2418(200007)16:4<293::AID-RSA1>3.0.CO;2-F-BIB11","author":"Chari","year":"1994","unstructured":"and Improved algorithms via approximations of probability distributions, Proc. 26th Annual Symp Theory of Computing STOC '94, 1994, pp. 584-592."},{"key":"10.1002\/1098-2418(200007)16:4<293::AID-RSA1>3.0.CO;2-F-BIB12","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1016\/0885-064X(89)90015-0","volume":"5","author":"Chor","year":"1989","journal-title":"J Complexity"},{"key":"10.1002\/1098-2418(200007)16:4<293::AID-RSA1>3.0.CO;2-F-BIB13","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1007\/BF02125347","volume":"9","author":"Chung","year":"1989","journal-title":"Combinatorica"},{"key":"10.1002\/1098-2418(200007)16:4<293::AID-RSA1>3.0.CO;2-F-BIB14","author":"Even","year":"1991","unstructured":"Construction of small probability spaces for deterministic simulation, M.Sc. thesis, Technion, Haifa, Israel, 1991."},{"key":"10.1002\/1098-2418(200007)16:4<293::AID-RSA1>3.0.CO;2-F-BIB15.1","author":"Even","year":"1992","unstructured":"and Approximations of general independent distributions, Proc. 24th Annual ACM Symp Theory of Computing STOC '92, 1992, pp. 10-16;"},{"key":"10.1002\/1098-2418(200007)16:4<293::AID-RSA1>3.0.CO;2-F-BIB15.2","first-page":"1","volume":"13","year":"1997","journal-title":"Random Struct Alg"},{"key":"10.1002\/1098-2418(200007)16:4<293::AID-RSA1>3.0.CO;2-F-BIB15.3","year":"1997","unstructured":"Efficient approximations of general distributions, http:\/\/theory.lcs.mit.edu\/?oded\/eglnv.html, 1997."},{"key":"10.1002\/1098-2418(200007)16:4<293::AID-RSA1>3.0.CO;2-F-BIB16","series-title":"Electronic Co","volume-title":"Three XOR-lemmas?An exposition","author":"Goldreich","year":"1995","unstructured":"Three XOR-lemmas?An exposition, Electronic Colloquium on Computational Complexity (ECCC), TR 95-056, 1995."},{"key":"10.1002\/1098-2418(200007)16:4<293::AID-RSA1>3.0.CO;2-F-BIB17","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1016\/0020-0190(93)90076-L","volume":"47","author":"H\u00e5stad","year":"1993","journal-title":"Inform Process Lett"},{"key":"10.1002\/1098-2418(200007)16:4<293::AID-RSA1>3.0.CO;2-F-BIB18","author":"Karloff","year":"1994","unstructured":"and On construction of k-wise independent random variables, Proc 24th Annual Symp Theory of Computing STOC '94, 1994, pp. 564-573."},{"key":"10.1002\/1098-2418(200007)16:4<293::AID-RSA1>3.0.CO;2-F-BIB19","doi-asserted-by":"crossref","first-page":"762","DOI":"10.1145\/4221.4226","volume":"32","author":"Karp","year":"1985","journal-title":"J ACM"},{"key":"10.1002\/1098-2418(200007)16:4<293::AID-RSA1>3.0.CO;2-F-BIB20","author":"Krause","year":"1994","unstructured":"and On the computational power of depth 2 circuits with threshold modulo gates, Proc 26th Annual ACM Symp Theory of Computing STOC '94, 1994, pp. 48-57."},{"key":"10.1002\/1098-2418(200007)16:4<293::AID-RSA1>3.0.CO;2-F-BIB21","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1007\/BFb0055056","volume-title":"Proc 25th International Colloquium on Automata, Languages and Programming ICALP '98","volume":"LNCS 1443","author":"Lu","year":"1998","unstructured":"Improved pseudorandom generators for combinatorial rectangles, in Proc 25th International Colloquium on Automata, Languages and Programming ICALP '98, LNCS 1443, and (Editors), Springer-Verlag, Berlin, 1998, pp. 223-234."},{"key":"10.1002\/1098-2418(200007)16:4<293::AID-RSA1>3.0.CO;2-F-BIB22","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1007\/BF02126799","volume":"8","author":"Lubotzky","year":"1988","journal-title":"Combinatorica"},{"key":"10.1002\/1098-2418(200007)16:4<293::AID-RSA1>3.0.CO;2-F-BIB23","doi-asserted-by":"crossref","first-page":"478","DOI":"10.1016\/S0022-0000(05)80069-8","volume":"49","author":"Motwani","year":"1994","journal-title":"J of Comput System Sci"},{"key":"10.1002\/1098-2418(200007)16:4<293::AID-RSA1>3.0.CO;2-F-BIB24","doi-asserted-by":"crossref","first-page":"838","DOI":"10.1137\/0222053","volume":"22","author":"Naor","year":"1993","journal-title":"SIAM J Comput"},{"key":"10.1002\/1098-2418(200007)16:4<293::AID-RSA1>3.0.CO;2-F-BIB25","author":"Naor","year":"1995","unstructured":"and Splitters and near-optimal derandomization, Proc, 36th Annual Symp Foundations of Computer Science, 1995, pp. 182-191."},{"key":"10.1002\/1098-2418(200007)16:4<293::AID-RSA1>3.0.CO;2-F-BIB26","author":"Peralta","year":"1990","unstructured":"On the randomness complexity of algorithms, CS Research Report TR 90-1, University of Wiskonsin, Milwaukee, 1990."},{"key":"10.1002\/1098-2418(200007)16:4<293::AID-RSA1>3.0.CO;2-F-BIB27","author":"Vazirani","year":"1986","unstructured":"Randomness, adversaries and computation, Ph.D. thesis, University of California, Berkeley, 1986."}],"container-title":["Random Structures and Algorithms"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2F1098-2418(200007)16:4%3C293::AID-RSA1%3E3.0.CO;2-F","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full\/10.1002\/1098-2418(200007)16:4%3C293::AID-RSA1%3E3.0.CO;2-F","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T02:29:30Z","timestamp":1625106570000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/1098-2418(200007)16:4<293::AID-RSA1>3.0.CO;2-F"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"references-count":29,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2000,7]]}},"URL":"https:\/\/doi.org\/10.1002\/1098-2418(200007)16:4<293::aid-rsa1>3.0.co;2-f","relation":{},"ISSN":["1042-9832","1098-2418"],"issn-type":[{"value":"1042-9832","type":"print"},{"value":"1098-2418","type":"electronic"}],"subject":[],"published":{"date-parts":[[2000]]}}}