{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T13:57:20Z","timestamp":1648994240960},"reference-count":66,"publisher":"Springer Science and Business Media LLC","issue":"4-5","license":[{"start":{"date-parts":[[1996,10,1]],"date-time":"1996-10-01T00:00:00Z","timestamp":844128000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Algorithmica"],"published-print":{"date-parts":[[1996,10]]},"DOI":"10.1007\/bf01940869","type":"journal-article","created":{"date-parts":[[2005,7,31]],"date-time":"2005-07-31T10:46:47Z","timestamp":1122806807000},"page":"359-366","source":"Crossref","is-referenced-by-count":0,"title":["Introduction to special issue on randomized and derandomized algorithms"],"prefix":"10.1007","volume":"16","author":[{"given":"M.","family":"Luby","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"BF01940869_CR1","doi-asserted-by":"crossref","first-page":"567","DOI":"10.1016\/0196-6774(86)90019-2","volume":"7","author":"N. Alon","year":"1986","unstructured":"N. Alon, L. Babai, A. Itai, A fast and simple randomized parallel algorithm for the maximal independent set problem,Journal of Algorithms, 1986, Vol. 7, pp. 567\u2013583.","journal-title":"Journal of Algorithms"},{"issue":"No. 3","key":"BF01940869_CR2","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1002\/rsa.3240030308","volume":"3","author":"N. Alon","year":"1992","unstructured":"N. Alon, O. Goldreich, J. H\u00e5stad, R. Peralta, Simple constructions of almostk-wise independent random variables,Random Structures and Algorithms, 1992, Vol. 3, No. 3, pp. 289\u2013304. (See also addendum inRandom Structures and Algorithms, 1993, Vol. 4, No. 1, pp. 119\u2013120.)","journal-title":"Random Structures and Algorithms"},{"key":"BF01940869_CR3","unstructured":"N. Alon, M. Naor, Derandomization, witnesses for Boolean matrix multiplication and construction of perfect hash functions, this issue."},{"key":"BF01940869_CR4","unstructured":"H. Alt, L. Guibas, K. Mehlhorn, R. Karp, A. Wigderson, A method for obtaining randomized algorithms with small tail probabilities, this issue."},{"key":"BF01940869_CR5","unstructured":"Y. Azar, A. Broder, A. Karlin, E. Upfal, Balanced allocations,Proceedings of the 26th Annual ACM Symposium on Theory of Computing, May 1994, pp. 593\u2013602."},{"key":"BF01940869_CR6","doi-asserted-by":"crossref","unstructured":"B. Berger, J. Rompel, Simulating (Iogc n)-wise independence inNC, Proceedings of the 30th Annual IEEE Symposium on Foundations of Computer Science, 1989, pp. 1\u20137.","DOI":"10.1109\/SFCS.1989.63447"},{"issue":"No. 2","key":"BF01940869_CR7","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1007\/BF02579167","volume":"6","author":"M. Blum","year":"1986","unstructured":"M. Blum, Independent unbiased coin flips from a correlated biased source: a finite Markov chain,Combinatorica, 1986, Vol. 6, No. 2, pp. 97\u2013108.","journal-title":"Combinatorica"},{"key":"BF01940869_CR8","doi-asserted-by":"crossref","unstructured":"A. Broder, How hard is it to marry at random (on the approximation of the permanent),Proceedings of the 18th Annual ACM Symposium on Theory of Computing, May 1986, pp. 50\u201358.","DOI":"10.1145\/12130.12136"},{"key":"BF01940869_CR9","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1016\/0022-0000(79)90044-8","volume":"18","author":"J. Carter","year":"1979","unstructured":"J. Carter, M. Wegman, Universal classes of hash functions,Journal of Computer and System Sciences, 1979, Vol. 18, pp. 143\u2013154.","journal-title":"Journal of Computer and System Sciences"},{"key":"BF01940869_CR10","unstructured":"B. Chazelle, J. Matou\u0161ek, On linear-time deterministic algorithms for optimization problems in fixed dimensions,Proceedings of the 4th SIAM-ACM Symposium on Discrete Algorithms, 1993, pp. 281\u2013290."},{"issue":"No. 2","key":"BF01940869_CR11","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1137\/0217015","volume":"17","author":"B. Chor","year":"1988","unstructured":"B. Chor, O. Goldreich, Unbiased bits from sources of weak randomness and probabilistic communication complexity,SIAM Journal on Computing, 1988, Vol. 17, No. 2, pp. 230\u2013261.","journal-title":"SIAM Journal on Computing"},{"key":"BF01940869_CR12","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1016\/0885-064X(89)90015-0","volume":"5","author":"B. Chor","year":"1989","unstructured":"B. Chor, O. Goldreich, On the power of two point based sampling,Journal of Complexity, 1989, Vol. 5, pp. 96\u2013106.","journal-title":"Journal of Complexity"},{"key":"BF01940869_CR13","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1016\/0020-0190(86)90037-2","volume":"22","author":"K. Clarkson","year":"1986","unstructured":"K. Clarkson, Linear programming inO(n \u00b7 3 d 2) time,Information Processing Letters, 1986, Vol. 22, pp. 21\u201324.","journal-title":"Information Processing Letters"},{"key":"BF01940869_CR14","doi-asserted-by":"crossref","unstructured":"K. Clarkson, Las Vegas algorithms for linear and integer programming when the dimension is small,Proceedings of the 29th IEEE Symposium on Foundations of Computer Science, 1988, pp. 452\u2013457.","DOI":"10.1109\/SFCS.1988.21961"},{"key":"BF01940869_CR15","doi-asserted-by":"crossref","unstructured":"P. Dagum, R. Karp, M. Luby, S. Ross, An optimal algorithm for Monte Carlo estimation,Proceedings of 36th Annual IEEE Symposium on Foundations of Computer Science, 1995, pp. 142\u2013149.","DOI":"10.1109\/SFCS.1995.492471"},{"key":"BF01940869_CR16","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1016\/0304-3975(92)90234-7","volume":"102","author":"P. Dagum","year":"1992","unstructured":"P. Dagum, M. Luby, Approximating the permanent of graphs with large factors,Theoretical Computer Science, 1992, Part A, Vol. 102, pp. 283\u2013305.","journal-title":"Theoretical Computer Science"},{"key":"BF01940869_CR17","doi-asserted-by":"crossref","unstructured":"P. Dagum, M. Luby, M. Mihail, U. Vazirani, Polytopes, permanents and graphs with large factors,Proceedings of the 29th Annual IEEE Symposium on Foundations of Computer Science, 1988, pp. 412\u2013421.","DOI":"10.1109\/SFCS.1988.21957"},{"key":"BF01940869_CR18","volume-title":"Linear Programming and Extensions","author":"D. Danzig","year":"1963","unstructured":"D. Danzig,Linear Programming and Extensions, Princeton University Press, Princeton, NJ, 1963."},{"key":"BF01940869_CR19","series-title":"Technical Report 77","volume-title":"Dynamic Perfect Hashing: Upper and Lower Bounds","author":"M. Dietzfelbinger","year":"1991","unstructured":"M. Dietzfelbinger, A. Karlin, K. Mehlhorn, F. Meyer auf der Heide, H. Rohnert, R. E. Tarjan, Dynamic Perfect Hashing: Upper and Lower Bounds, Technical Report 77, FB Mathematik-Informatik, Universit\u00e4t-GH Paderborn, Jan. 1991. (Revised version of paper with same title that appeared inProceedings of the 24th IEEE Symposium on Foundations of Computer Science, pp. 524\u2013531, 1988).SIAM Journal on Computing, 1994, Vol. 23, No. 4, pp. 738\u2013761."},{"key":"BF01940869_CR20","first-page":"6","volume-title":"Lecture Notes in Computer Science, Vol. 443","author":"M. Dietzfelbinger","year":"1990","unstructured":"M. Dietzfelbinger, F. Meyer auf der Heide, A new universal class of hash functions and dynamic hashing in real time,Proceedings of the 17th International Colloquium on Algorithms and Logic Programming, M. S. Paterson, ed., Lecture Notes in Computer Science, Vol. 443, Springer-Verlag, Berlin, 1990, pp. 6\u201319."},{"key":"BF01940869_CR21","doi-asserted-by":"crossref","first-page":"725","DOI":"10.1137\/0215052","volume":"15","author":"M. Dyer","year":"1986","unstructured":"M. Dyer, On a multidimensional search technique and its applications to the Euclidean one-center problem,SIAM Journal on Computing, 1986, Vol. 15, pp. 725\u2013738.","journal-title":"SIAM Journal on Computing"},{"key":"BF01940869_CR22","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1007\/BF01587088","volume":"44","author":"M. Dyer","year":"1989","unstructured":"M. Dyer, A. Frieze, A randomized algorithm for fixed-dimensional linear programming,Mathematical Programming, 1989, Vol. 44, pp. 203\u2013212.","journal-title":"Mathematical Programming"},{"key":"BF01940869_CR23","doi-asserted-by":"crossref","unstructured":"M. Dyer, A. Frieze, R. Kannan, A random polynomial time algorithm for approximating the volume of convex bodies,Proceedings of the 21st Annual ACM Symposium on Theory of Computing, 1989, pp. 375\u2013381.","DOI":"10.1145\/73007.73043"},{"key":"BF01940869_CR24","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1017\/S0963548300000675","volume":"2","author":"M. Dyer","year":"1993","unstructured":"M. Dyer, A. Frieze, R. Kannan, A. Kapoor, L. Kerkovic, U. Vazirani, A mildly exponential time algorithm for approximating the number of solutions to a multidimensional knapsack problem,Combinatorics, Probability and Computing, 1993, Vol. 2, pp. 271\u2013284.","journal-title":"Combinatorics, Probability and Computing"},{"issue":"No. 3","key":"BF01940869_CR25","doi-asserted-by":"crossref","first-page":"865","DOI":"10.1214\/aoms\/1177692552","volume":"43","author":"P. Elias","year":"1972","unstructured":"P. Elias, The efficient construction of an unbiased random source,Annals of Mathematical Statistics, 1972, Vol. 43, No. 3, pp. 865\u2013870.","journal-title":"Annals of Mathematical Statistics"},{"key":"BF01940869_CR26","first-page":"463","volume-title":"Lecture Note in Computer Science, Vol. 775","author":"W. Ertel","year":"1994","unstructured":"W. Ertel, M. Luby, Optimal parallelization of Las Vegas algorithms,Proceedings of the Symposium on Theoretical Aspects of Computer Science, Lecture Note in Computer Science, Vol. 775, Springer-Verlag, Berlin, 1994, pp. 463\u2013475."},{"key":"BF01940869_CR27","doi-asserted-by":"crossref","unstructured":"G. Even, O. Goldreich, M. Luby, N. Nisan, B. Veli\u010dkovi\u0107, Approximations of general independent distributions,Proceedings of the 24th Annual ACM Symposium on Theory of Computing, 1992, pp. 10\u201316.","DOI":"10.1145\/129712.129714"},{"key":"BF01940869_CR28","unstructured":"J. Gil, Y. Matias. Fast hashing on a PRAM-designing by expectation,Proceedings of the SIAM-ACM Symposium on Discrete Algorithms, 1991, pp. 271\u2013280."},{"key":"BF01940869_CR29","doi-asserted-by":"crossref","first-page":"1149","DOI":"10.1137\/0218077","volume":"18","author":"M. Jerrum","year":"1989","unstructured":"M. Jerrum, A. Sinclair, Approximating the permanent,SIAM Journal on Computing, 1989, Vol. 18, pp. 1149\u20131178.","journal-title":"SIAM Journal on Computing"},{"key":"BF01940869_CR30","doi-asserted-by":"crossref","first-page":"1087","DOI":"10.1137\/0222066","volume":"22","author":"M. Jerrum","year":"1993","unstructured":"M. Jerrum, A. Sinclair, Polynomial-time approximation algorithms for the Ising model,SIAM Journal on Computing, 1993, Vol. 22, pp. 1087\u20131116.","journal-title":"SIAM Journal on Computing"},{"key":"BF01940869_CR31","unstructured":"M. Jerrum, U. Vazirani, A mildly exponential approximation algorithm for the permanent, this issue."},{"key":"BF01940869_CR32","doi-asserted-by":"crossref","unstructured":"G. Kalai, A subexponential randomized simplex algorithm,Proceedings of the 24th Annual ACM Symposium on Theory of Computing, 1992, pp. 475\u2013482.","DOI":"10.1145\/129712.129759"},{"key":"BF01940869_CR33","doi-asserted-by":"crossref","first-page":"421","DOI":"10.1145\/174130.174132","volume":"40","author":"H. Karloff","year":"1993","unstructured":"H. Karloff, P. Raghavan, Randomized algorithms and pseudorandom numbers,Journal of the Association for Computing Machinery, 1993, Vol. 40, pp. 421\u2013453.","journal-title":"Journal of the Association for Computing Machinery"},{"key":"BF01940869_CR34","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1007\/BF02579150","volume":"4","author":"N. Karmarkar","year":"1984","unstructured":"N. Karmarkar, A new polynomial-time algorithm for linear programming,Combinatorica, 1984, Vol. 4, pp. 373\u2013395.","journal-title":"Combinatorica"},{"issue":"No. 2","key":"BF01940869_CR35","doi-asserted-by":"crossref","first-page":"284","DOI":"10.1137\/0222021","volume":"22","author":"N. Karmarkar","year":"1993","unstructured":"N. Karmarkar, R. Karp, R. Lipton, L. Lov\u00e1sz, M. Luby, A Monte-Carlo algorithm for estimating the permanent,SIAM Journal on Computing, 1993, Vol. 22, No. 2, pp. 284\u2013293.","journal-title":"SIAM Journal on Computing"},{"key":"BF01940869_CR36","doi-asserted-by":"crossref","unstructured":"R. Karp, M. Luby, Monte-Carlo algorithms for enumeration and reliability problems,Proceedings of the 24th Annual ACM Symposium on Theory of Computing, 1983, pp. 56\u201364.","DOI":"10.1109\/SFCS.1983.35"},{"issue":"No. 3","key":"BF01940869_CR37","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1016\/0196-6774(89)90038-2","volume":"10","author":"R. Karp","year":"1989","unstructured":"R. Karp, M. Luby, N. Madras, Monte-Carlo approximation algorithms for enumeration problems,Journal of Algorithms, 1989, Vol. 10, No. 3, pp. 429\u2013448.","journal-title":"Journal of Algorithms"},{"key":"BF01940869_CR38","unstructured":"R. Karp, M. Luby, F. Meyer auf der Heide, Efficient PRAM simulation on a distributed memory machine, this issue."},{"key":"BF01940869_CR39","doi-asserted-by":"crossref","unstructured":"R. Karp, A. Wigderson, A fast parallel algorithm for the maximal independent set problem,Proceedings of the 16th ACM Symposium on Theory of Computing, 1984, pp. 266\u2013272.","DOI":"10.1145\/800057.808690"},{"issue":"No. 2","key":"BF01940869_CR40","doi-asserted-by":"crossref","first-page":"280","DOI":"10.1006\/jagm.1993.1014","volume":"14","author":"M. Karpinski","year":"1993","unstructured":"M. Karpinski, M. Luby, Approximating the number of solutions to aGF[2] formula,Journal of Algorithms, 1993, Vol. 14, No. 2, pp. 280\u2013287.","journal-title":"Journal of Algorithms"},{"key":"BF01940869_CR41","doi-asserted-by":"crossref","unstructured":"C. Kenyon, D. Randall, A. Sinclair, Matchings in lattice graphs,Proceedings of the 25th Annual ACM Symposium on Theory of Computing, May 1993, pp. 738\u2013746. Journal version: Approximating the number of monomer-dimer coverings of a lattice,Journal of Statistical Physics, 1996, Vol. 83, pp. 637\u2013659.","DOI":"10.1007\/BF02183743"},{"key":"BF01940869_CR42","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/0041-5553(80)90061-0","volume":"20","author":"L. Khachiyan","year":"1980","unstructured":"L. Khachiyan. Polynomial algorithm in linear programming,U.S.S.R. Computational Mathematics and Mathematical Physics, 1980, Vol. 20, pp. 53\u201372.","journal-title":"U.S.S.R. Computational Mathematics and Mathematical Physics"},{"key":"BF01940869_CR43","doi-asserted-by":"crossref","unstructured":"N. Linial, M. Luby, M. Saks, D. Zuckerman, Efficient construction of a small hitting set for combinatorial rectangles in high dimension,Proceedings of the 25th Annual ACM Symposium on Theory of Computing, 1993, pp. 258\u2013267.","DOI":"10.1145\/167088.167166"},{"issue":"No. 4","key":"BF01940869_CR44","doi-asserted-by":"crossref","first-page":"1036","DOI":"10.1137\/0215074","volume":"15","author":"M. Luby","year":"1986","unstructured":"M. Luby, A simple parallel algorithm for the maximal independent set problem,SIAM Journal on Computing, 1986, Vol. 15, No. 4, pp. 1036\u20131053","journal-title":"SIAM Journal on Computing"},{"issue":"No. 2","key":"BF01940869_CR45","doi-asserted-by":"crossref","first-page":"250","DOI":"10.1016\/0022-0000(93)90033-S","volume":"47","author":"M. Luby","year":"1993","unstructured":"M. Luby, Removing randomness in parallel computation without a processor penalty,Journal of Computer and System Sciences, 1993, Vol. 47, No. 2, pp. 250\u2013286.","journal-title":"Journal of Computer and System Sciences"},{"key":"BF01940869_CR46","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1016\/0020-0190(93)90029-9","volume":"47","author":"M. Luby","year":"1993","unstructured":"M. Luby, A. Sinclair, D. Zuckerman, Optimal speedup of Las Vegas algorithms,Information Processing Letters, 1993, Vol. 47, pp. 173\u2013180.","journal-title":"Information Processing Letters"},{"key":"BF01940869_CR47","unstructured":"M. Luby, B. Veli\u010dkovi\u0107, On deterministic approximation of DNF, this issue."},{"key":"BF01940869_CR48","doi-asserted-by":"crossref","unstructured":"M. Luby, B. Veli\u010dkovi\u0107, A. Wigderson, Deterministic approximate counting of depth-2 circuits,Proceedings of the Second Israeli Symposium on Theory of Computing and Systems, 1993, pp. 18\u201324.","DOI":"10.1109\/ISTCS.1993.253488"},{"key":"BF01940869_CR49","doi-asserted-by":"crossref","unstructured":"Y. Matias, U. Vishkin. Converting high probability into nearly-constant time\u2014with applications to parallel hashing.Proceedings of the 23rd Annual ACM Symposium on Theory of Computing, 1991, pp. 307\u2013316.","DOI":"10.1145\/103418.103453"},{"key":"BF01940869_CR50","unstructured":"J. Matou\u0161ek, M. Sharir, E. Welzl, A subexponential bound for linear programming, this issue."},{"key":"BF01940869_CR51","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1145\/2422.322418","volume":"31","author":"N. Megiddo","year":"1984","unstructured":"N. Megiddo. Linear programming in linear time when the dimension is fixed,Journal of the Association for Computing Machinery, 1984, Vol. 31, pp. 114\u2013127.","journal-title":"Journal of the Association for Computing Machinery"},{"key":"BF01940869_CR52","unstructured":"M. Mihail, P. Winkler, On the number of Eulerian orientations of a graph, this issue."},{"key":"BF01940869_CR53","doi-asserted-by":"crossref","first-page":"478","DOI":"10.1016\/S0022-0000(05)80069-8","volume":"49","author":"R. Motwani","year":"1994","unstructured":"R. Motwani, J. Naor, M. Naor, The probabilistic method yields parallel deterministic algorithms,Journal of Computer and System Sciences, 1994, Vol. 49, pp. 478\u2013516.","journal-title":"Journal of Computer and System Sciences"},{"key":"BF01940869_CR54","unstructured":"K. Mulmuley, Randomized geometric algorithms and pseudorandom generators, this issue."},{"key":"BF01940869_CR55","doi-asserted-by":"crossref","unstructured":"M. Naor, S. Naor, Small bias probability spaces: Efficient constructions and applications,Proceedings of the 22nd Annual ACM Symposium on the Theory of Computing, 1990, pp. 213\u2013223.","DOI":"10.1145\/100216.100244"},{"key":"BF01940869_CR56","first-page":"36","volume-title":"National Bureau of Standards, Applied Mathematic Series, Vol. 12","author":"J. Neumann von","year":"1951","unstructured":"J. von Neumann,Various Techniques Used in Connection with Random Digits, Notes by G. E. Forsythe, National Bureau of Standards, Applied Mathematic Series, Vol. 12, Pitmar, Boston, MA, 1951, pp. 36\u201338."},{"key":"BF01940869_CR57","volume-title":"The Carus Mathematical Monographs, No. 14","author":"H. Ryser","year":"1963","unstructured":"H. Ryser,Combinatorial Mathematics, The Carus Mathematical Monographs, No. 14, Mathematical Association of America, Washington, DC, 1963."},{"issue":"No. 1","key":"BF01940869_CR58","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1016\/0022-0000(86)90044-9","volume":"33","author":"M. Santha","year":"1986","unstructured":"M. Santha, U. Vazirani, Generating quasi-random sequences from semi-random sources,Journal of Computer and System Sciences, 1986, Vol. 33, No. 1, pp. 75\u201387.","journal-title":"Journal of Computer and System Sciences"},{"key":"BF01940869_CR59","doi-asserted-by":"crossref","first-page":"423","DOI":"10.1007\/BF02574699","volume":"6","author":"R. Seidel","year":"1991","unstructured":"R. Seidel, Low dimensional linear programming and convex hulls made easy,Discrete & Computational Geometry, 1991, Vol. 6, pp. 423\u2013434.","journal-title":"Discrete & Computational Geometry"},{"key":"BF01940869_CR60","unstructured":"R. Seidel, C. R. Aragon, Randomized search trees, this issue."},{"key":"BF01940869_CR61","doi-asserted-by":"crossref","unstructured":"A. Siegel, On universal classes of fast high performance hash functions, their time-space tradeoff, and their applications,Proceedings of the 30th IEEE Annual Symposium on Foundations of Computer Science, 1989, pp. 20\u201325.","DOI":"10.1109\/SFCS.1989.63450"},{"key":"BF01940869_CR62","doi-asserted-by":"crossref","first-page":"410","DOI":"10.1137\/0208032","volume":"8","author":"L. Valiant","year":"1979","unstructured":"L. Valiant, The complexity of enumeration and reliability problems,SIAM Journal on Computing, Vol. 8, 1979, pp. 410\u2013421.","journal-title":"SIAM Journal on Computing"},{"key":"BF01940869_CR63","doi-asserted-by":"crossref","unstructured":"U. Vazirani, Efficiency considerations in using semi-random sources,Proceedings of the 19th Annual ACM Symposium on Theory of Computing, May 1987, pp. 160\u2013168.","DOI":"10.1145\/28395.28413"},{"key":"BF01940869_CR64","doi-asserted-by":"crossref","unstructured":"U. Vazirani, V. Vazirani, Random polynomial time is equal to semi-random polynomial time,Proceedings of the 26th Annual IEEE Symposium on Foundations of Computer Science, 1985, pp. 417\u2013428.","DOI":"10.1109\/SFCS.1985.45"},{"issue":"No. 4","key":"BF01940869_CR65","doi-asserted-by":"crossref","first-page":"729","DOI":"10.1145\/2157.2158","volume":"30","author":"A. Wigderson","year":"1983","unstructured":"A. Wigderson, Improving the performance guarantee for approximate graph coloring,Journal of the Association for Computing Machinery, 1983, Vol. 30, No. 4, pp. 729\u2013735.","journal-title":"Journal of the Association for Computing Machinery"},{"key":"BF01940869_CR66","unstructured":"D. Zuckerman, Simulating BPP using a general weak random source, this issue."}],"container-title":["Algorithmica"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF01940869.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF01940869\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF01940869","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,8]],"date-time":"2020-04-08T13:31:17Z","timestamp":1586352677000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BF01940869"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1996,10]]},"references-count":66,"journal-issue":{"issue":"4-5","published-print":{"date-parts":[[1996,10]]}},"alternative-id":["BF01940869"],"URL":"http:\/\/dx.doi.org\/10.1007\/bf01940869","relation":{},"ISSN":["0178-4617","1432-0541"],"issn-type":[{"value":"0178-4617","type":"print"},{"value":"1432-0541","type":"electronic"}],"subject":["Applied Mathematics","Computer Science Applications","General Computer Science"],"published":{"date-parts":[[1996,10]]}}}