Lipton, Richard J.
Overview
Works:  137 works in 252 publications in 2 languages and 1,881 library holdings 

Genres:  Conference papers and proceedings Blogs 
Roles:  Author, Editor 
Classifications:  QA76.9.A25, 
Publication Timeline
.
Most widely held works by
Richard J Lipton
DNA based computers : proceedings of a DIMACS workshop, April 4, 1995, Princeton University(
Book
)
8 editions published between 1996 and 1998 in English and held by 160 WorldCat member libraries worldwide
8 editions published between 1996 and 1998 in English and held by 160 WorldCat member libraries worldwide
The P=NP question and Gödel's lost letter by
Richard J Lipton(
Book
)
21 editions published between 2010 and 2014 in English and Undetermined and held by 155 WorldCat member libraries worldwide
The P=NP question is one of the greatest problems of science, which has intrigued computer scientists and mathematicians for decades. Despite the abundant research in theoretical computer science regarding the P=NP question, it has not been solved. This book covers historical developments (including the Gödel's lost letter), the importance of P=NP and the future of P=NP. This guide is also based on a new blog by the author, located at: http://rjlipton.wordpress.com  Back cover
21 editions published between 2010 and 2014 in English and Undetermined and held by 155 WorldCat member libraries worldwide
The P=NP question is one of the greatest problems of science, which has intrigued computer scientists and mathematicians for decades. Despite the abundant research in theoretical computer science regarding the P=NP question, it has not been solved. This book covers historical developments (including the Gödel's lost letter), the importance of P=NP and the future of P=NP. This guide is also based on a new blog by the author, located at: http://rjlipton.wordpress.com  Back cover
Quantum algorithms via linear algebra : a primer by
Richard J Lipton(
Book
)
5 editions published in 2014 in English and held by 114 WorldCat member libraries worldwide
5 editions published in 2014 in English and held by 114 WorldCat member libraries worldwide
People, problems, and proofs : essays from Gödel's lost letter : 2010 by
Richard J Lipton(
Book
)
12 editions published in 2013 in English and held by 36 WorldCat member libraries worldwide
"Showcase[s] some key people and ideas in the domain of theoretical computer science, particularly in computational complexity and algorithms, and related mathematical topics. They show evidence of the considerable scholarship that supports this young field"Back cover
12 editions published in 2013 in English and held by 36 WorldCat member libraries worldwide
"Showcase[s] some key people and ideas in the domain of theoretical computer science, particularly in computational complexity and algorithms, and related mathematical topics. They show evidence of the considerable scholarship that supports this young field"Back cover
Mathematical and computational aspects of materials science : November 30  December 5, 2014, Boston, Massachusetts, USA by Mathematical and Computational Aspects of Materials Science (Symposium)(
Book
)
1 edition published in 2015 in English and held by 9 WorldCat member libraries worldwide
1 edition published in 2015 in English and held by 9 WorldCat member libraries worldwide
On synchronization primitive systems by
Richard J Lipton(
Book
)
11 editions published between 1973 and 1988 in 3 languages and held by 8 WorldCat member libraries worldwide
11 editions published between 1973 and 1988 in 3 languages and held by 8 WorldCat member libraries worldwide
The enforcement of security policies for computation by
Anita K Jones(
Book
)
2 editions published in 1975 in English and held by 8 WorldCat member libraries worldwide
2 editions published in 1975 in English and held by 8 WorldCat member libraries worldwide
Even data bases that lie can be compromised by
Richard A DeMillo(
Book
)
7 editions published between 1976 and 1977 in English and Undetermined and held by 7 WorldCat member libraries worldwide
Users can compromise data bases by asking a series of questions, even when the data systems are allowed to lie. (Author)
7 editions published between 1976 and 1977 in English and Undetermined and held by 7 WorldCat member libraries worldwide
Users can compromise data bases by asking a series of questions, even when the data systems are allowed to lie. (Author)
A necessary and sufficient condition for the existence of Hoare logics by
Richard J Lipton(
Book
)
3 editions published in 1977 in English and held by 6 WorldCat member libraries worldwide
3 editions published in 1977 in English and held by 6 WorldCat member libraries worldwide
Practical selectivity estimation through adaptive sampling by
Richard J Lipton(
Book
)
3 editions published in 1990 in English and held by 5 WorldCat member libraries worldwide
Abstract: "Recently we have proposed an adaptive, random sampling algorithm for general query size estimation. In earlier work we analyzed the asymptotic efficiency and accuracy of the algorithm; in this paper we investigate its practicality as applied to selects and joins. First, we extend our previous analysis to provide significantly improved bounds on the amount of sampling necessary for a given level of accuracy. Next, we provide 'sanity bounds' to deal with queries for which the underlying data is extremely skewed or the query result is very small. Finally, we report on the performance of the estimation algorithm as implemented in a host language on a commercial relational system. The results are encouraging, even with this loose coupling between the estimation algorithm and the DBMS."
3 editions published in 1990 in English and held by 5 WorldCat member libraries worldwide
Abstract: "Recently we have proposed an adaptive, random sampling algorithm for general query size estimation. In earlier work we analyzed the asymptotic efficiency and accuracy of the algorithm; in this paper we investigate its practicality as applied to selects and joins. First, we extend our previous analysis to provide significantly improved bounds on the amount of sampling necessary for a given level of accuracy. Next, we provide 'sanity bounds' to deal with queries for which the underlying data is extremely skewed or the query result is very small. Finally, we report on the performance of the estimation algorithm as implemented in a host language on a commercial relational system. The results are encouraging, even with this loose coupling between the estimation algorithm and the DBMS."
PRAM : a scalable shared memory by
Richard J Lipton(
Book
)
2 editions published in 1988 in Undetermined and English and held by 5 WorldCat member libraries worldwide
2 editions published in 1988 in Undetermined and English and held by 5 WorldCat member libraries worldwide
Probabilistic diagnosis of hot spots by
Kenneth Salem(
Book
)
2 editions published in 1991 in English and held by 5 WorldCat member libraries worldwide
Depending on the length of the reference string and the amount of space available for the analysis, each technique will have a nonzero probability of false diagnosis, i.e., mistaking 'cold' items for hot spots and vice versa. We compare the techniques analytically and show the tradeoffs among time, space and the probability of false diagnoses."
2 editions published in 1991 in English and held by 5 WorldCat member libraries worldwide
Depending on the length of the reference string and the amount of space available for the analysis, each technique will have a nonzero probability of false diagnosis, i.e., mistaking 'cold' items for hot spots and vice versa. We compare the techniques analytically and show the tradeoffs among time, space and the probability of false diagnoses."
Upper bounds on the complexity of space bounded interactive proofs by
Anne Condon(
Book
)
3 editions published in 1989 in English and held by 5 WorldCat member libraries worldwide
3 editions published in 1989 in English and held by 5 WorldCat member libraries worldwide
External Hashing Schemes for Collections of Data Structures by
R. J Lipton(
Book
)
4 editions published in 1978 in English and Undetermined and held by 4 WorldCat member libraries worldwide
4 editions published in 1978 in English and Undetermined and held by 4 WorldCat member libraries worldwide
A Separator Theorem for Planar Graphs by
Richard J Lipton(
Book
)
5 editions published in 1977 in English and held by 4 WorldCat member libraries worldwide
Let G be any nvertex planar graph. Prove that the vertices of G can be partitioned into three sets A, B, C such that no edge joins a vertex in A with a vertex in B, neither A nor B contains more than 2n/3 vertices, and C contains no more than 2(sq.rt 2)(sq. rt n) vertices. An algorithm is exhibited which finds such a partition A, B, C in o(n) time
5 editions published in 1977 in English and held by 4 WorldCat member libraries worldwide
Let G be any nvertex planar graph. Prove that the vertices of G can be partitioned into three sets A, B, C such that no edge joins a vertex in A with a vertex in B, neither A nor B contains more than 2n/3 vertices, and C contains no more than 2(sq.rt 2)(sq. rt n) vertices. An algorithm is exhibited which finds such a partition A, B, C in o(n) time
Accelerator/Experiment Operations  FY 2005(
)
1 edition published in 2005 in English and held by 0 WorldCat member libraries worldwide
1 edition published in 2005 in English and held by 0 WorldCat member libraries worldwide
Results from irradiation tests on D0 Run 2a silicon detectors at the Radiation Damage Facility at Fermilab(
)
1 edition published in 2006 in English and held by 0 WorldCat member libraries worldwide
Several different spare modules of the D0 experiment Silicon Microstrip Tracker (SMT) have been irradiated at the Fermilab Booster Radiation Damage Facility (RDF). The total dose received was 2.1 MRads with a proton flux of {approx} 3 {center_dot} 10{sup 11} p/cm{sup 2} sec. The irradiation was carried out in steps of 0.3 or 0.6 MRad, with several days between the steps to allow for annealing and measurements. The leakage currents and depletion voltages of the devices increased with dose, as expected from bulk radiation damage. The double sided, double metal devices showed worse degradation than the less complex detectors
1 edition published in 2006 in English and held by 0 WorldCat member libraries worldwide
Several different spare modules of the D0 experiment Silicon Microstrip Tracker (SMT) have been irradiated at the Fermilab Booster Radiation Damage Facility (RDF). The total dose received was 2.1 MRads with a proton flux of {approx} 3 {center_dot} 10{sup 11} p/cm{sup 2} sec. The irradiation was carried out in steps of 0.3 or 0.6 MRad, with several days between the steps to allow for annealing and measurements. The leakage currents and depletion voltages of the devices increased with dose, as expected from bulk radiation damage. The double sided, double metal devices showed worse degradation than the less complex detectors
Proceedings of the tenth annual ACM symposium on Theory of computing by
Richard J Lipton(
)
2 editions published in 1978 in English and held by 0 WorldCat member libraries worldwide
2 editions published in 1978 in English and held by 0 WorldCat member libraries worldwide
Applied cryptology, cryptographic protocols, and computer security models by R. A De Millo(
)
1 edition published in 1983 in English and held by 0 WorldCat member libraries worldwide
1 edition published in 1983 in English and held by 0 WorldCat member libraries worldwide
Tevatron detector upgrades(
)
1 edition published in 2005 in English and held by 0 WorldCat member libraries worldwide
The D0 and CDF experiments are in the process of upgrading their detectors to cope with the high luminosities projected for the remainder of Tevatron Run II. They discuss the expected Tevatron environment through 2009, the detector challenges due to increasing luminosity in this period, and the solutions undertaken by the two experiments to mitigate detector problems and maximize physics results
1 edition published in 2005 in English and held by 0 WorldCat member libraries worldwide
The D0 and CDF experiments are in the process of upgrading their detectors to cope with the high luminosities projected for the remainder of Tevatron Run II. They discuss the expected Tevatron environment through 2009, the detector challenges due to increasing luminosity in this period, and the solutions undertaken by the two experiments to mitigate detector problems and maximize physics results
more
fewer
Audience Level
0 

1  
Kids  General  Special 
Related Identities
 Regan, Kenneth W.
 Baum, Eric B. 1957 Editor
 NSF Science and Technology Center in Discrete Mathematics and Theoretical Computer Science
 DIMACS (Group)
 Gödel, Kurt
 DeMillo, Richard A. Author
 Dobkin, David P. Author
 ACM Digital Library
 ACM Special Interest Group for Algorithms and Computation Theory
 YALE UNIV NEW HAVEN CONN Dept. of COMPUTER SCIENCE
Useful Links
Associated Subjects
Algebras, Linear Algorithms Computational complexity Computer algorithms Computer programming Computers ComputersAccess control Computer science Computer scientists Computer security Computer software Computer storage devices Cryptography Database management Data structures (Computer science) Electronic data processing departmentsSecurity measures File organization (Computer science) Gödel, Kurt Gödel's theorem Graph theory Information storage and retrieval systems Information theory Logic, Symbolic and mathematical Machine theory MaterialsComputer simulation MaterialsMathematical models Molecular computers Operating systems (Computers) Operating systems (Computers)Evaluation Programming languages (Electronic computers) Proof theory Quantum computers Sampling Synchronization