default search action
Information Processing Letters, Volume 114
Volume 114, Numbers 1-2, January - February 2014
- Lei Nie, Jingjie Liu, Haicang Zhang, Zhiwei Xu:
On the inapproximability of minimizing cascading failures under the deterministic threshold model. 1-4 - Yong Yu, Yi Mu, Willy Susilo, Man Ho Au:
Security pitfalls of an efficient threshold proxy signature scheme for mobile agents. 5-8 - Mingjie Liu, Xiaoyun Wang, Guangwu Xu, Xuexin Zheng:
A note on BDD problems with λ2-gap. 9-12 - Sarah Bastkowski, Andreas Spillner, Vincent Moulton:
Fishing for minimum evolution trees with Neighbor-Nets. 13-18 - Delia Garijo, María Ángeles Garrido, Clara I. Grima, Alberto Márquez, Auxiliadora Moreno-González, José Ramón Portillo, Pedro Reyes, Rafael Robles, Jesus Valenzuela:
Monochromatic geometric k-factors for bicolored point sets with auxiliary points. 19-24 - Xin-Wei Yao, Wan-Liang Wang, Teng-cao Wu, Xiao-min Yao, Shuang-Hua Yang:
A Novel Hybrid Slot Allocation Mechanism for 802.11e EDCA Protocol. 25-30 - Jean-Luc Baril, Jean Marcel Pallo:
Motzkin subposets and Motzkin geodesics in Tamari lattices. 31-37 - Carsten Witt:
Fitness levels with tail bounds for the analysis of randomized search heuristics. 38-41 - Bruno Courcelle:
Clique-width and edge contraction. 42-44 - Janusz Dybizbanski, Andrzej Szepietowski:
The oriented chromatic number of Halin graphs. 45-49 - Nima Norouzi, Yung H. Tsin:
A simple 3-edge connected component algorithm revisited. 50-55 - Weidong Li, Jianping Li, Li Guan:
Approximation algorithms for the ring loading problem with penalty cost. 56-59 - Kazuya Yamashita, Yasuaki Nishitani, Sadaki Hirose, Satoshi Okawa, Nobuyasu Osato:
The firing squad synchronization problem with sub-generals. 60-65 - Marc Demange, Tínaz Ekim:
Efficient recognition of equimatchable graphs. 66-71 - Aleksy Schubert, Ken-etsu Fujita:
A note on subject reduction in (→, ∃)-Curry with respect to complete developments. 72-75 - Dmitry N. Krasnoshchekov, Valentin Polishchuk:
Order-k α-hulls and α-shapes. 76-83 - Abishek Gopalan, Srinivasan Ramasubramanian:
Corrigendum to: "A counterexample for the proof of implication conjecture on independent spanning trees" [Information Processing Letters 113 (14-16) (2013) 522-526]. 84
Volume 114, Number 3, March 2014
- Carles Creus, Guillem Godoy, Lander Ramos:
Excessively duplicating patterns represent non-regular languages. 85-93 - Wojciech Wawrzyniak:
A strengthened analysis of a local algorithm for the minimum dominating set problem in planar graphs. 94-98 - Faisal N. Abu-Khzam:
Maximum common induced subgraph parameterized by vertex cover. 99-103 - Peter Lofgren:
On the complexity of the Monte Carlo method for incremental PageRank. 104-106 - Peter Nose:
Security weaknesses of a signature scheme and authenticated key agreement protocols. 107-115 - Jiqiang Lu, Wun-She Yap, Matt Henricksen, Swee-Huay Heng:
Differential attack on nine rounds of the SEED block cipher. 116-123 - Beate Bollig:
A simpler counterexample to a long-standing conjecture on the complexity of Bryant's apply algorithm. 124-129 - Xuehou Tan, Bo Jiang:
Optimum sweeps of simple polygons with two guards. 130-136 - Michael L. Fredman:
An intuitive and simple bounding argument for Quicksort. 137-139 - Xiao-ning Xie, Gongliang Chen, Yin Li:
Novel bit-parallel multiplier for GF(2m) defined by all-one polynomial using generalized Karatsuba algorithm. 140-146 - Branislav Rovan, Marek Zeman:
Modeling time criticality of information. 147-151 - Debapriyay Mukhopadhyay, Subhas C. Nandy:
Efficient multiple-precision integer division algorithm. 152-157
Volume 114, Number 4, April 2014
- Sandi Klavzar, Meijie Ma:
The domination number of exchanged hypercubes. 159-162 - Bang Ye Wu:
On approximating metric 1-median in sublinear time. 163-166 - Yixin Cao, Jianer Chen, Jia-Hao Fan:
An O(1.84k) parameterized algorithm for the multiterminal cut problem. 167-173 - Jasbir Dhaliwal:
Faster semi-external suffix sorting. 174-178 - Ruyan Fu, Ji Tian, Jinjiang Yuan, Ya Li:
Online scheduling on an unbounded parallel-batch machine and a standard machine to minimize makespan. 179-184 - Salvatore Pontarelli, Pedro Reviriego, Michael Mitzenmacher:
Improving the performance of Invertible Bloom Lookup Tables. 185-191 - David Galindo, Srinivas Vivek:
Limits of a conjecture on a leakage-resilient cryptosystem. 192-196 - Patrick Cégielski, Serge Grigorieff, Irène Guessarian:
On lattices of regular sets of natural integers closed under decrementation. 197-202 - Sven Schewe:
Distributed synthesis is simply undecidable. 203-207 - Lukasz Mikulski, Maciej Koutny:
Folded Hasse diagrams of combined traces. 208-216 - Fang Yang, Xiang'en Chen, Chunyan Ma:
On the vertex-distinguishing proper edge coloring of composition of complete graph and star. 217-221 - Samed Bajric, Enes Pasalic, Amela Muratovic-Ribic, Sugata Gangopadhyay:
On generalized bent functions with Dillon's exponents. 222-227
Volume 114, Number 5, May 2014
- Olivier Finkel, Michal Skrzypczak:
On the topological complexity of ω-languages of non-deterministic Petri nets. 229-233 - Santanu Sarkar:
Proving empirical key-correlations in RC4. 234-238 - R. Hildenbrandt:
A k-server problem with parallel requests and unit distances. 239-246 - Matthew Andrews, Lisa Zhang:
Rate-adaptive weighted fair queueing for energy-aware scheduling. 247-251 - Mohsen Shakiba, Mohammad Dakhilalian, Hamid Mala:
On computational complexity of impossible differential cryptanalysis. 252-255 - Ananda Swarup Das, Prosenjit Gupta, Kishore Kothapalli, Kannan Srinathan:
On reporting the L1 metric closest pair in a query rectangle. 256-263 - Petteri Kaski, Mikko Koivisto, Janne H. Korhonen, Igor S. Sergeev:
Fast monotone summation over disjoint sets. 264-267 - Przemyslaw Dabrowski, Grzegorz Labuzek, Tomasz Rachwalik, Janusz Szmidt:
Searching for nonlinear feedback shift registers with parallel computing. 268-272 - Christos Boutsidis, Malik Magdon-Ismail:
A note on sparse least-squares regression. 273-276
Volume 114, Number 6, June 2014
- Marcos A. Kiwi, Pablo Moisset de Espanés, Ivan Rapaport, Sergio Rica, Guillaume Theyssier:
Strict Majority Bootstrap Percolation in the r-wheel. 277-281 - Nabila Abdessaied, Mathias Soeken, Michael Kirkedal Thomsen, Rolf Drechsler:
Upper bounds for reversible circuits based on Young subgroups. 282-286 - Yangyang Li, Shixia Feng, Xiangrong Zhang, Licheng Jiao:
SAR image segmentation based on quantum-inspired multiobjective evolutionary clustering algorithm. 287-293 - Hunter R. Johnson:
Some new maximum VC classes. 294-298 - Ferucio Laurentiu Tiplea, Constantin Catalin Dragan:
A necessary and sufficient condition for the asymptotic idealness of the GRS threshold secret sharing scheme. 299-303 - Ahmed S. Ghiduk:
Automatic generation of basis test paths using variable length genetic algorithm. 304-316 - Peter Damaschke:
Enumerating maximal bicliques in bipartite graphs with favorable degree sequences. 317-321 - Long Wen, Meiqin Wang, Andrey Bogdanov, Huaifeng Chen:
Multidimensional zero-correlation attacks on lightweight block cipher HIGHT: Improved cryptanalysis of an ISO standard. 322-330 - Young In Cho, Nam Su Chang, Seokhie Hong:
Formulas for cube roots in F3m using shifted polynomial basis. 331-337
Volume 114, Number 7, July 2014
- Yacine Belhoul, Saïd Yahiaoui, Hamamache Kheddouci:
Efficient self-stabilizing algorithms for minimal total k-dominating sets in graphs. 339-343 - Yongjie Yang:
Towards optimal kernel for edge-disjoint triangle packing. 344-348 - Bhaskar DasGupta, Devendra Desai:
On a connection between small set expansions and modularity clustering. 349-352 - Cyriac Grigorious, Sudeep Stephen, Bharati Rajan, Mirka Miller, Albert William:
On the partition dimension of a class of circulant graphs. 353-356 - Andreas Brandstädt, Van Bang Le:
A note on efficient domination in a superclass of P5-free graphs. 357-359 - Cosmin Bonchis, Gabriel Istrate:
Improved approximation algorithms for low-density instances of the Minimum Entropy Set Cover Problem. 360-364 - Arindam Khan, Prasad Raghavendra:
On mimicking networks representing minimum terminal cuts. 365-371 - Jooyoung Lee, Daesung Kwon:
Security of permutation-based compression function Ip231. 372-381 - Raffaella Gentilini:
A note on the approximation of mean-payoff games. 382-386 - Pawel Rzazewski:
Exact algorithm for graph homomorphism and locally injective graph homomorphism. 387-391 - Kimmo Fredriksson, Emanuele Giaquinta:
On a compact encoding of the swap automaton. 392-396
Volume 114, Number 8, August 2014
- Andrzej Tarlecki:
Władysław Marek Turski (1938-2013). 397-398
- Xianyu Yu, Yulin Zhang, Kai Huang:
Multi-machine scheduling with general position-based deterioration to minimize total load revisited. 399-404 - Hans Raj Tiwary:
On the largest convex subsets in Minkowski sums. 405-407 - Grgur Petric Maretic, Mohammad Torabi Dashti, David A. Basin:
LTL is closed under topological closure. 408-413 - Christos Levcopoulos, Andrzej Lingas:
A note on a QPTAS for maximum weight triangulation of planar point sets. 414-416 - Pavol Duris, Marek Kosta:
Flip-pushdown automata with k pushdown reversals and E0L systems are incomparable. 417-420 - Alexander Golovnev, Alexander S. Kulikov, Ivan Mihajlin:
Solving SCS for bounded length strings in fewer than 2n steps. 421-425 - Riham AlTawy, Amr M. Youssef:
Integral distinguishers for reduced-round Stribog. 426-431 - Erwan Le Merrer, Nicolas Le Scouarnec, Gilles Trédan:
Heuristical top-k: fast estimation of centralities in complex networks. 432-436 - Jérémy Barbay, Timothy M. Chan, Gonzalo Navarro, Pablo Pérez-Lantero:
Maximum-weight planar boxes in O(n2) time (and better). 437-445 - Gregory Z. Gutin, Mark Jones:
Parameterized algorithms for load coloring problem. 446-449 - Zan-Bo Zhang, Xiaoyan Zhang:
Triangle strings: Structures for augmentation of vertex-disjoint triangle sets. 450-456
Volume 114, Number 9, September 2014
- Eduardo A. Canale, Héctor Cancela, Franco Robledo, Pablo Sartor:
The complexity of computing the 2-K-reliability in networks. 457-461 - Victor Lagerkvist:
Weak bases of Boolean co-clones. 462-468 - Ying Ma, Shunzhi Zhu, Ke Qin, Guangchun Luo:
Combining the requirement information for software defect estimation in design time. 469-474 - Huijuan Wang, Jianliang Wu, Bin Liu, Hongyu Chen:
On the linear arboricity of graphs embeddable in surfaces. 475-479 - Xiaowang Zhang, Jan Van den Bussche:
On the primitivity of operators in SPARQL. 480-485 - Mei-Mei Gu, Rong-Xia Hao:
3-extra connectivity of 3-ary n-cube networks. 486-491 - Yumin Yuan, Chenhui Wang:
Certificateless signature scheme with security enhanced in the standard model. 492-499 - Keramat Hasani, Svetlana A. Kravchenko, Frank Werner:
Minimizing total weighted completion time approximately for the parallel machine problem with a single server. 500-503 - Lein Harn, Fuyou Miao:
Multilevel threshold secret sharing based on the Chinese Remainder Theorem. 504-509 - Maw-Shang Chang, Li-Hsuan Chen, Ling-Ju Hung, Peter Rossmanith, Guan-Han Wu:
Exact algorithms for problems related to the densest k-set problem. 510-513
Volume 114, Number 10, October 2014
- Well Y. Chiu, Chiuyuan Chen, Shih-Yu Tsai:
A 4n-move self-stabilizing algorithm for the minimal dominating set problem using an unfair distributed daemon. 515-518 - Boris Aronov, Muriel Dulieu, Ferran Hurtado:
Mutual witness proximity graphs. 519-523 - Min Chih Lin, Michel J. Mizrahi, Jayme Luiz Szwarcfiter:
Fast algorithms for some dominating induced matching problems. 524-528 - Chen-Ming Fan, Jen-Tse Wang, Cheng-Chih Huang:
Borderedness-preserving homomorphisms. 529-534 - Franz Aurenhammer, Günter Paulini:
On shape Delaunay tessellations. 535-541 - Felix Joos, Christian Löwenstein, Fabiano de S. Oliveira, Dieter Rautenbach, Jayme Luiz Szwarcfiter:
Graphs of interval count two with a given partition. 542-546 - Mohammad Ali Orumiehchiha, Josef Pieprzyk, Ron Steinfeld:
Practical attack on NLM-MAC scheme. 547-550 - Colette Johnen:
Fast, silent self-stabilizing distance-k independent dominating set construction. 551-555 - Tomasz Kociumaka, Marcin Pilipczuk:
Faster deterministic Feedback Vertex Set. 556-560 - Xiaoping Liu, Zhilan Dang, Baoyindureng Wu:
The hub number, girth and Mycielski graphs. 561-563 - Adi Akavia:
Explicit small sets with ε-discrepancy on Bohr sets. 564-567 - Min-Sheng Lin, Sheng-Huang Su:
Counting maximal independent sets in directed path graphs. 568-572 - Huibo Chen, Wenge Zhang, Feng Ding:
Data filtering based least squares iterative algorithm for parameter identification of output error autoregressive systems. 573-578 - Tsuyoshi Ito:
Parallelization of entanglement-resistant multi-prover interactive proofs. 579-583
Volume 114, Number 11, November 2014
- Zhiguo Fu, Fengqin Yang:
Holographic algorithms on bases of rank 2. 585-590 - Mike Holenderski, Reinder J. Bril, Johan J. Lukkien:
Red-black trees with relative node keys. 591-596 - Jianfeng Lu, Dewu Xu, Lei Jin, Jianmin Han, Hao Peng:
On the complexity of role updating feasibility problem in RBAC. 597-602 - Moonju Park, Xuefeng Piao:
Enhanced utilization bound of Rate-Monotonic scheduling in Controller Area Networks. 603-606 - Hedong Yang, Lijie Wen, Jianmin Wang, Raymond K. Wong:
CPL+: An improved approach for evaluating the local completeness of event logs. 607-610 - Tomoyuki Yamakami:
Constant-space quantum interactive proofs against multiple provers. 611-619 - Kwanghoon Choi, Byeong-Mo Chang:
A type and effect system for activation flow of components in Android programs. 620-627 - Marc Gyssens, Mathias Niepert, Dirk Van Gucht:
On the completeness of the semigraphoid axioms for deriving arbitrary from saturated conditional independence statements. 628-633 - Sebastian Deorowicz, Szymon Grabowski:
Efficient algorithms for the longest common subsequence in k-length substrings. 634-638 - Petra Berenbrink, Bruce Krayenhoff, Frederik Mallmann-Trenn:
Estimating the number of connected components in sublinear time. 639-642 - Jack H. Lutz:
The frequent paucity of trivial strings. 643-645 - Andrzej Lingas, Leonidas Palios, Agnieszka Wasylewicz, Pawel Zylinski:
Corrigendum to "Note on covering monotone orthogonal polygons" [Inf. Process. Lett. 104(6) (2007) 220-227]. 646-654
Volume 114, Number 12, December 2014
- Zongyue Wang, Hongbo Yu, Xiaoyun Wang:
Cryptanalysis of GOST R hash function. 655-662 - Richard Müller, Christian Stahl, Walter Vogler:
Undecidability of accordance for open systems with unbounded message queues. 663-669 - Zahra Moezkarimi, Alireza Bagheri:
A PTAS for geometric 2-FTP. 670-675 - Xing Huang:
Hamilton cycles in implicit claw-heavy graphs. 676-679 - David A. Basin, Carlos Cotrini Jiménez, Felix Klaedtke, Eugen Zalinescu:
Deciding safety and liveness in TPTL. 680-688 - Dezheng Xie, Huanhuan Xiao, Zhihong Zhao:
Star coloring of cubic graphs. 689-691 - Song-Song Li, Yu-Zhong Zhang:
Serial batch scheduling on uniform parallel machines to minimize total completion time. 692-695 - Alexander Gilbers:
VC-dimension of perimeter visibility domains. 696-699 - Yun-Ping Deng:
Efficient dominating sets in circulant graphs with domination number prime. 700-702 - Chengfang Fang, Ee-Chien Chang:
Optimal strategy of coupon subset collection when each package contains half of the coupons. 703-705 - Tomomi Matsui, Noriyoshi Sukegawa, Atsushi Miyauchi:
Fractional programming formulation for the vertex coloring problem. 706-709 - Jinfei Liu, Li Xiong, Xiaofeng Xu:
Faster output-sensitive skyline computation algorithm. 710-713 - Shuichi Miyazaki:
On the advice complexity of online bipartite matching and online stable marriage. 714-717 - Yung-Tsung Hou, Dar-Li Yang, Wen-Hung Kuo:
Lot scheduling on a single machine. 718-722 - Lei Zhang, Wenling Wu:
Differential analysis of the Extended Generalized Feistel Networks. 723-727 - Chen Avin, Michael Borokhovich, Yoram Haddad, Erez Kantor, Zvi Lotker, Merav Parter, David Peleg:
Testing the irreducibility of nonsquare Perron-Frobenius systems. 728-733 - Jou-Ming Chang, Jhen-Ding Wang, Jinn-Shyong Yang, Kung-Jui Pai:
A comment on "Independent spanning trees in crossed cubes". 734-739
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.