Richard J. Lipton
Affiliations:- Georgia Institute of Technology
- Princeton University, USA
According to our database1,
Richard J. Lipton
authored at least 199 papers
between 1974 and 2022.
Collaborative distances:
Collaborative distances:
Awards
ACM Fellow
ACM Fellow 1997, "For sustained excellence in research in virtually every aspect of theoretical computer science. He has produced some of the most influential work in the field.".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on viaf.org
-
on id.loc.gov
-
on d-nb.info
-
on isni.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2022
Proceedings of the LICS '22: 37th Annual ACM/IEEE Symposium on Logic in Computer Science, Haifa, Israel, August 2, 2022
2020
Proceedings of the ISSAC '20: International Symposium on Symbolic and Algebraic Computation, 2020
2016
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016
Proceedings of the 43rd International Colloquium on Automata, Languages, and Programming, 2016
2015
Provable Virus Detection: Using the Uncertainty Principle to Protect Against Malware.
IACR Cryptol. ePrint Arch., 2015
2013
J. Graph Algorithms Appl., 2013
Chic. J. Theor. Comput. Sci., 2013
Comput. Complex., 2013
Springer, ISBN: 978-3-642-41421-3, 2013
2012
2011
Proceedings of the Theory and Applications of Models of Computation, 2011
Proceedings of the Mathematical Foundations of Computer Science 2011, 2011
Proceedings of the 27th International Conference on Data Engineering, 2011
2010
Proceedings of the Frontiers in Algorithmics, 4th International Workshop, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
Inf. Process. Lett., 2009
Proceedings of the Wireless Algorithms, 2009
Proceedings of the IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, 2009
2008
Comput. Complex., 2008
Inapproximability Results for Combinatorial Auctions with Submodular Utility Functions.
Algorithmica, 2008
Algorithmica, 2008
2007
Proceedings of the Theory of Cryptography, 4th Theory of Cryptography Conference, 2007
2006
Symmetric polynomials over Z<sub><i>m</i></sub> and simultaneous communication protocols.
J. Comput. Syst. Sci., 2006
Proceedings of the Theory of Cryptography, Third Theory of Cryptography Conference, 2006
Proceedings of the 2006 IEEE International Conference on Granular Computing, 2006
2005
On fundamental tradeoffs between delay bounds and computational complexity in packet scheduling algorithms.
IEEE/ACM Trans. Netw., 2005
Proceedings of the Financial Cryptography and Data Security, 2005
On the Fourier Spectrum of Symmetric Boolean Functions with Applications to Learning Symmetric Juntas.
Proceedings of the 20th Annual IEEE Conference on Computational Complexity (CCC 2005), 2005
2004
Electron. Colloquium Comput. Complex., 2004
Proceedings of the Proceedings 5th ACM Conference on Electronic Commerce (EC-2004), 2004
Proceedings of the LATIN 2004: Theoretical Informatics, 2004
Proceedings of the FSTTCS 2004: Foundations of Software Technology and Theoretical Computer Science, 2004
2003
Theor. Comput. Sci., 2003
Theory Comput. Syst., 2003
Electron. Colloquium Comput. Complex., 2003
Proceedings of the Fourteenth Annual ACM-SIAM Symposium on Discrete Algorithms, 2003
Proceedings of the Proceedings 4th ACM Conference on Electronic Commerce (EC-2003), 2003
Proceedings of the Stochastic Algorithms: Foundations and Applications, 2003
Mandatory human participation: a new authentication scheme for building secure systems.
Proceedings of the 12th International Conference on Computer Communications and Networks, 2003
Proceedings of the FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science, 2003
Proceedings of the 44th Symposium on Foundations of Computer Science (FOCS 2003), 2003
2002
Electron. Colloquium Comput. Complex., 2002
Proceedings of the International Symposium on Software Testing and Analysis, 2002
Proceedings of the 22nd International Conference on Distributed Computing Systems, 2002
2001
J. Cryptol., 2001
Proceedings of the First SIAM International Conference on Data Mining, 2001
Proceedings of the Sixth IEEE Symposium on Computers and Communications (ISCC 2001), 2001
2000
Proc. Natl. Acad. Sci. USA, 2000
Proceedings of the 15th Annual IEEE Conference on Computational Complexity, 2000
1999
Proceedings of the 40th Annual Symposium on Foundations of Computer Science, 1999
Proceedings of the DNA Based Computers, 1999
Proceedings of the 14th Annual IEEE Conference on Computational Complexity, 1999
1998
Proceedings of the Financial Cryptography, 1998
1997
DNA<sup>2</sup>DNA Computation: A Potential Killer Application?
Proceedings of the Advances in Neural Information Processing Systems 10, 1997
Proceedings of the Fifth Israel Symposium on Theory of Computing and Systems, 1997
Proceedings of the Automata, Languages and Programming, 24th International Colloquium, 1997
Proceedings of the 38th Annual Symposium on Foundations of Computer Science, 1997
On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract).
Proceedings of the Advances in Cryptology, 1997
Proceedings of the DNA Based Computers, 1997
1996
J. Comput. Secur., 1996
Inf. Process. Lett., 1996
Proceedings of the 6th USENIX Security Symposium, San Jose, CA, USA, July 22-25, 1996, 1996
Proceedings of the 1996 International Conference on Computer Design (ICCD '96), 1996
Proceedings of the 6th Great Lakes Symposium on VLSI (GLS-VLSI '96), 1996
Algorithms for Black-Box Fields and their Application to Cryptography (Extended Abstract).
Proceedings of the Advances in Cryptology, 1996
1995
Proceedings of the STACS 95, 1995
Proceedings of the DNA Based Computers, 1995
Proceedings of the DNA Based Computers, 1995
Proceedings of the Advances in Cryptology, 1995
1994
SIAM J. Comput., 1994
Proceedings of the Twenty-Sixth Annual ACM Symposium on Theory of Computing, 1994
Proceedings of the Fifth Annual ACM-SIAM Symposium on Discrete Algorithms. 23-25 January 1994, 1994
The Complexity of the Membership Problem for 2-generated Commutative Semigroups of Rational Matrices
Proceedings of the 35th Annual Symposium on Foundations of Computer Science, 1994
Some Consequences of Our Failure to Prove Non-Linear Lower Bounds on Explicit Functions.
Proceedings of the Ninth Annual Structure in Complexity Theory Conference, Amsterdam, The Netherlands, June 28, 1994
Proceedings of the Algorithmic Number Theory, First International Symposium, 1994
1993
Theor. Comput. Sci., 1993
Proceedings of the Advances in Cryptology, 1993
Proceedings of the Sixth Annual ACM Conference on Computational Learning Theory, 1993
Proceedings of the Eigth Annual Structure in Complexity Theory Conference, 1993
1992
Proceedings of the Eighth International Conference on Data Engineering, 1992
Proceedings of the 5th IEEE Computer Security Foundations Workshop, 1992
1991
IEEE Trans. Parallel Distributed Syst., 1991
Proceedings of the 23rd Annual ACM Symposium on Theory of Computing, 1991
1990
Proceedings of the 1990 ACM SIGMOD International Conference on Management of Data, 1990
Uniform-Cost Communication in Scalable Multiprocessors.
Proceedings of the 1990 International Conference on Parallel Processing, 1990
Proceedings of the Proceedings: Fifth Annual Structure in Complexity Theory Conference, 1990
1989
Proceedings of the Fifteenth International Conference on Very Large Data Bases, 1989
Proceedings of the 9th International Conference on Distributed Computing Systems, 1989
Proceedings of the 30th Annual Symposium on Foundations of Computer Science, Research Triangle Park, North Carolina, USA, 30 October, 1989
Proceedings of the 30th Annual Symposium on Foundations of Computer Science, Research Triangle Park, North Carolina, USA, 30 October, 1989
Proceedings of the Distributed Computing And Cryptography, 1989
1986
Delta Transformations to Simplify VLSI Processor Arrays for Serial Dynamic Programming.
Proceedings of the International Conference on Parallel Processing, 1986
1985
The Role Of Massive Memory In Knowledge-Base Management Systems.
Proceedings of the On Knowledge Base Management Systems: Integrating Artificial Intelligence and Database Technologies, 1985
Proceedings of the First Annual Symposium on Computational Geometry, 1985
1984
1983
Proceedings of the 15th Annual ACM Symposium on Theory of Computing, 1983
Total Fault Testing Using the Bipartite Transformation.
Proceedings of the Proceedings International Test Conference 1983, 1983
Proceedings of the Automata, 1983
Proceedings of the 20th Design Automation Conference, 1983
1982
Proceedings of the Conference Record of the Ninth Annual ACM Symposium on Principles of Programming Languages, 1982
Proceedings of the 19th Design Automation Conference, 1982
Proceedings of the 19th Design Automation Conference, 1982
1981
Theor. Comput. Sci., 1981
Acta Informatica, 1981
Proceedings of the 13th Annual ACM Symposium on Theory of Computing, 1981
Multilevel Secure Distributed System.
Proceedings of the 2nd International Conference on Distributed Computing Systems, 1981
Proceedings of the 22nd Annual Symposium on Foundations of Computer Science, 1981
1980
SIAM J. Comput., 1980
Space-Time Trade-Offs in Structured Programming: An Improved Combinatorial Embedding Theorem.
J. ACM, 1980
Proceedings of the 12th Annual ACM Symposium on Theory of Computing, 1980
Proceedings of the 12th Annual ACM Symposium on Theory of Computing, 1980
Proceedings of the 12th Annual ACM Symposium on Theory of Computing, 1980
Proceedings of the 1980 IEEE Symposium on Security and Privacy, 1980
Proceedings of the 1980 IEEE Symposium on Security and Privacy, 1980
Theoretical and Emperical Studies on Using Program Mutation to Test the Functional Correctness of Programs.
Proceedings of the Conference Record of the Seventh Annual ACM Symposium on Principles of Programming Languages, 1980
1979
Review of "Proofs and refutations: the logic of mathematical discovery" by Imre Lakatos. Cambridge University Press 1976.
SIGACT News, 1979
A Constructive Generalization of the Borel-Cantelli Lemma with Application to the Complexity of Infinite Strings.
Math. Syst. Theory, 1979
J. Comput. Syst. Sci., 1979
Proceedings of the 11h Annual ACM Symposium on Theory of Computing, April 30, 1979
Proceedings of the 20th Annual Symposium on Foundations of Computer Science, 1979
1978
ACM SIGSOFT Softw. Eng. Notes, 1978
J. Comput. Syst. Sci., 1978
Proceedings of the 19th Annual Symposium on Foundations of Computer Science, 1978
Proceedings of the 19th Annual Symposium on Foundations of Computer Science, 1978
The design of a prototype mutation system for program testing.
Proceedings of the American Federation of Information Processing Societies: 1978 National Computer Conference, 1978
1977
J. Comput. Syst. Sci., 1977
On the Power of Applicative Languages.
Proceedings of the Formal Description of Programming Concepts: Proceedings of the IFIP Working Conference on Formal Description of Programming Concepts, 1977
Proceedings of the 18th Annual Symposium on Foundations of Computer Science, Providence, Rhode Island, USA, 31 October, 1977
Proceedings of the 18th Annual Symposium on Foundations of Computer Science, Providence, Rhode Island, USA, 31 October, 1977
1976
Theor. Comput. Sci., 1976
J. ACM, 1976
Exponential Space Complete Problems for Petri Nets and Commutative Semigroups: Preliminary Report
Proceedings of the 8th Annual ACM Symposium on Theory of Computing, 1976
Proceedings of the 17th Annual Symposium on Foundations of Computer Science, 1976
1975
Proceedings of the 7th Annual ACM Symposium on Theory of Computing, 1975
Complexity Measures and Hierarchies for the Evaluation of Integers, Polynomials, and n-linear Forms
Proceedings of the 7th Annual ACM Symposium on Theory of Computing, 1975
Proceedings of the Conference Record of the Second ACM Symposium on Principles of Programming Languages, 1975
1974
Limitations of Synchronization Primitives with Conditional Branching and Global Variables
Proceedings of the 6th Annual ACM Symposium on Theory of Computing, April 30, 1974
Proceedings of the 6th Annual ACM Symposium on Theory of Computing, April 30, 1974
Proceedings of the Operating Systems, 1974
Proceedings of the 15th Annual Symposium on Switching and Automata Theory, 1974