{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:10:25Z","timestamp":1763467825299,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,6,11]],"date-time":"2007-06-11T00:00:00Z","timestamp":1181520000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,6,11]]},"DOI":"10.1145\/1250790.1250850","type":"proceedings-article","created":{"date-parts":[[2007,9,14]],"date-time":"2007-09-14T16:07:37Z","timestamp":1189786057000},"page":"401-410","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":32,"title":["Holographic algorithms"],"prefix":"10.1145","author":[{"given":"Jin-Yi","family":"Cai","sequence":"first","affiliation":[{"name":"University of Wisconsin, Madison, WI"}]},{"given":"Pinyan","family":"Lu","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2007,6,11]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.70.052328"},{"key":"e_1_3_2_1_2_1","volume-title":"Efficient Algorithms","author":"Shallit E.","year":"1996","unstructured":"Bach, E. and Shallit , J . Algorithmic Number Theory , Vol. 1 : Efficient Algorithms . MIT Press , 1996 . Bach, E. and Shallit, J. Algorithmic Number Theory, Vol. 1: Efficient Algorithms. MIT Press, 1996."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/11786986_61"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/11750321_24"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCC.2007.22"},{"key":"e_1_3_2_1_6_1","first-page":"429","volume-title":"Pinyan Lu. On Symmetric Signatures in Holographic Algorithms. In Proc. of STACS","volume":"4393","author":"Cai J.-Y.","year":"2007","unstructured":"J.-Y. Cai and Pinyan Lu. On Symmetric Signatures in Holographic Algorithms. In Proc. of STACS 2007 . LNCS Vol. 4393 , pp 429 -- 440 . Available at ECCC Report TR06-135. J.-Y. Cai and Pinyan Lu. On Symmetric Signatures in Holographic Algorithms. In Proc. of STACS 2007. LNCS Vol. 4393, pp 429--440. Available at ECCC Report TR06-135."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCC.2007.6"},{"key":"e_1_3_2_1_8_1","unstructured":"J.-Y. Cai and Pinyan Lu. Holographic Algorithms: The Power of Dimensionality Resolved. Submitted. Also at ECCC TR07-020.  J.-Y. Cai and Pinyan Lu. Holographic Algorithms: The Power of Dimensionality Resolved. Submitted. Also at ECCC TR07-020."},{"key":"e_1_3_2_1_9_1","unstructured":"J.-Y. Cai and Pinyan Lu. On Block-wise Symmetric Signatures for Matchgates. Submitted. Also at ECCC TR07-019.  J.-Y. Cai and Pinyan Lu. On Block-wise Symmetric Signatures for Matchgates. Submitted. Also at ECCC TR07-019."},{"key":"e_1_3_2_1_10_1","unstructured":"E. Farhi J. Goldstone S. Gutmann and M. Sipser. Quantum Computation by Adiabatic Evolution. http:\/\/arxiv.org\/abs\/quant-ph\/0001106 (January 2000)  E. Farhi J. Goldstone S. Gutmann and M. Sipser. Quantum Computation by Adiabatic Evolution. http:\/\/arxiv.org\/abs\/quant-ph\/0001106 (January 2000)"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1176343949"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1176344743"},{"key":"e_1_3_2_1_13_1","unstructured":"D. Gottesman. The Heisenberg Representation of Quantum Computers. At http:\/\/arxiv.org\/abs\/quant-ph\/9807006.  D. Gottesman. The Heisenberg Representation of Quantum Computers. At http:\/\/arxiv.org\/abs\/quant-ph\/9807006."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1137\/0601002"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1137\/0602037"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1137\/0211025"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01010403"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/0031-8914(61)90063-5"},{"key":"e_1_3_2_1_19_1","volume-title":"Graph Theory and Theoretical Physics","author":"Kasteleyn P. W.","year":"1967","unstructured":"P. W. Kasteleyn . Graph Theory and Crystal Physics . In Graph Theory and Theoretical Physics , Academic Press , 43--110 ( 1967 ). P. W. Kasteleyn. Graph Theory and Crystal Physics. In Graph Theory and Theoretical Physics, Academic Press, 43--110 (1967)."},{"key":"e_1_3_2_1_20_1","first-page":"27","article-title":"Aufgabe 360","volume":"58","author":"Kneser M.","year":"1955","unstructured":"M. Kneser . \" Aufgabe 360 \" . Jahresbericht der Deutschen Mathematiker-Vereinigung, 2. Abteilung 58 : 27 . 1955 . M. Kneser. \"Aufgabe 360\" . Jahresbericht der Deutschen Mathematiker-Vereinigung, 2. Abteilung 58: 27. 1955.","journal-title":". Jahresbericht der Deutschen Mathematiker-Vereinigung, 2. Abteilung"},{"key":"e_1_3_2_1_21_1","unstructured":"E. Knill. Fermionic Linear Optics and Matchgates. At http:\/\/arxiv.org\/abs\/quant-ph\/0108033  E. Knill. Fermionic Linear Optics and Matchgates. At http:\/\/arxiv.org\/abs\/quant-ph\/0108033"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/0097-3165(78)90022-5"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00493-004-0011-1"},{"key":"e_1_3_2_1_24_1","volume-title":"Matrices and Matroids for Systems Analysis","author":"Murota K.","year":"2000","unstructured":"K. Murota . Matrices and Matroids for Systems Analysis , Springer , Berlin , 2000 . K. Murota. Matrices and Matroids for Systems Analysis, Springer, Berlin, 2000."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1080\/14786436108243366"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539797321602"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539700377025"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-3975(01)00325-5"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2004.34"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/11523468_1"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/2958119.2958121"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2006.7"}],"event":{"name":"STOC07: Symposium on Theory of Computing","sponsor":["ACM Association for Computing Machinery","SIGACT ACM Special Interest Group on Algorithms and Computation Theory"],"location":"San Diego California USA","acronym":"STOC07"},"container-title":["Proceedings of the thirty-ninth annual ACM symposium on Theory of computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1250790.1250850","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1250790.1250850","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:52:20Z","timestamp":1750258340000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1250790.1250850"}},"subtitle":["from art to science"],"short-title":[],"issued":{"date-parts":[[2007,6,11]]},"references-count":32,"alternative-id":["10.1145\/1250790.1250850","10.1145\/1250790"],"URL":"https:\/\/doi.org\/10.1145\/1250790.1250850","relation":{},"subject":[],"published":{"date-parts":[[2007,6,11]]},"assertion":[{"value":"2007-06-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}