Project

General

Profile

1
<?xml version="1.0" encoding="UTF-8"?>
2
<oaf:entity xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
3
    xmlns:oaf="http://namespace.openaire.eu/oaf"
4
    xsi:schemaLocation="http://namespace.openaire.eu/oaf ../oaf-0.3.xsd">
5
    <oaf:result>
6
        <subject classid="keyword" classname="keyword" schemeid="dnet:result_subject"
7
            schemename="dnet:result_subject">matrices</subject>
8
        <subject classid="keyword" classname="keyword" schemeid="dnet:result_subject"
9
            schemename="dnet:result_subject">info:eu-repo/classification/acm/G.2.2 Graph
10
            Theory</subject>
11
        <title classid="main title" classname="main title" schemeid="dnet:dataCite_title"
12
            schemename="dnet:dataCite_title">On the hardness of approximating the permanent of
13
            structured matrices</title>
14
        <dateofacceptance>2003-01-01</dateofacceptance>
15
        <publisher>Birkhauser Verlag</publisher>
16
        <resulttype classid="publication" classname="publication" schemeid="dnet:result_typologies"
17
            schemename="dnet:result_typologies"/>
18
        <language classid="eng" classname="English" schemeid="dnet:languages"
19
            schemename="dnet:languages"/>
20
        <description>We show that for several natural classes of "structured" matrices, including symmetric, circulant, Hankel and Toeplitz matrices, approximating the permanent modulo a prime p is as hard as computing its exact value. Results of this kind are well known for arbitrary matrices. However the techniques used do not seem to apply to "structured" matrices. Our approach is based on recent advances in the hidden number problem introduced by Boneh and Venkatesan in 1996 combined with some bounds of exponential sums motivated by the Waring problem in finite fields.</description>
21
        <source>In: COMPUTATIONAL COMPLEXITY (11387J0), vol. 11 pp. 158 - 170. Birkhauser Verlag, 2003.</source>
22
        <country classid="" classname="" schemeid="" schemename=""/>
23
        <relevantdate classid="" classname="" schemeid="" schemename=""/>
24
        <embargoenddate/>
25
        <fulltext/>
26
        <format/>
27
        <storagedate/>
28
        <resourcetype classid="" classname="" schemeid="" schemename=""/>
29
        <device/>
30
        <size/>
31
        <version/>
32
        <lastmetadataupdate/>
33
        <metadataversionnumber/>
34
        <originalId>oai:pumaoai.isti.cnr.it:cnr.iit/cnr.iit/2003-A0-005</originalId>
35
        <collectedfrom name="PUblication MAnagement"
36
            id="opendoar____::300891a62162b960cf02ce3827bb363c"/>
37
        <pid classid="oai" classname="oai" schemeid="dnet:pid_types" schemename="dnet:pid_types"
38
            >oai:pumaoai.isti.cnr.it:cnr.iit/cnr.iit/2003-A0-005</pid>
39
        <bestlicense classid="OPEN" classname="Open Access" schemeid="dnet:access_modes"
40
            schemename="dnet:access_modes"/>
41
        <context id="ARC" label="Australian Research Council (ARC)" type="funding">
42
            <category id="ARC::Discovery Projects" label="Discovery Projects"/>
43
        </context>
44
        <datainfo>
45
            <inferred>false</inferred>
46
            <deletedbyinference>false</deletedbyinference>
47
            <trust>0.9</trust>
48
            <inferenceprovenance/>
49
            <provenanceaction classid="sysimport:crosswalk:repository"
50
                classname="sysimport:crosswalk:repository" schemeid="dnet:provenanceActions"
51
                schemename="dnet:provenanceActions"/>
52
        </datainfo>
53
        <rels>
54
            <rel inferred="true" trust="0.9" inferenceprovenance=""
55
                provenanceaction="sysimport:crosswalk:repository">
56
                <to class="hasAuthor" scheme="dnet:personroles" type="person">dedup_wf_001::e3874ae0dfae0aeb0eb7c9de34d44abf</to>
57
                <ranking>1</ranking>
58
                <fullname>Codenotti, Bruno</fullname>
59
            </rel>
60
            <rel inferred="true" trust="0.72" inferenceprovenance="iis::document_referencedProjects"
61
                provenanceaction="iis">
62
                <to class="isProducedBy" scheme="dnet:result_project_relations" type="project">arc_________::f2a577c42e672ed01e5272cfdc2ccc25</to>
63
                <websiteurl>http://purl.org/au-research/grants/arc/DP0211459</websiteurl>
64
                <code>DP0211459</code>
65
                <title>Number Theoretic Methods in Cryptography</title>
66
                <funding>
67
                    <funder id="arc_________::ARC" shortname="ARC"
68
                        name="Australian Research Council (ARC)" jurisdiction="AU"/>
69
                    <funding_level_0 name="Discovery Projects">arc_________::ARC::Discovery Projects</funding_level_0>
70
                </funding>
71
            </rel>
72
        </rels>
73
        <children>
74
            <instance id="opendoar____::300891a62162b960cf02ce3827bb363c">
75
                <licence classid="OPEN" classname="Open Access" schemeid="dnet:access_modes"
76
                    schemename="dnet:access_modes"/>
77
                <instancetype classid="0001" classname="Article"
78
                    schemeid="dnet:publication_resource" schemename="dnet:publication_resource"/>
79
                <hostedby name="PUblication MAnagement"
80
                    id="opendoar____::300891a62162b960cf02ce3827bb363c"/>
81
                <webresource>
82
                    <url>http://puma.isti.cnr.it/dfdownloadnew.php?ident=cnr.iit/cnr.iit/2003-A0-005</url>
83
                </webresource>
84
                <webresource>
85
                    <url>http://puma.isti.cnr.it/rmydownload.php?filename=cnr.iit/cnr.iit/2003-A0-005/2003-A0-005.pdf</url>
86
                </webresource>
87
            </instance>
88
        </children>
89
    </oaf:result>
90
</oaf:entity>
(26-26/29)