default search action
Information Processing Letters, Volume 116
Volume 116, Number 1, January 2016
- Rui Wang, Yongquan Zhou, Shilei Qiao, Kang Huang:
Flower Pollination Algorithm with Bee Pollinator for cluster analysis. 1-14 - Defu Zhang, Leyuan Shi, Stephen C. H. Leung, Tao Wu:
A priority heuristic for the guillotine rectangular packing problem. 15-21 - Najmeh Sadat Jaddi, Salwani Abdullah, Abdul Razak Hamdan:
A solution representation of genetic algorithm for neural network weights and structure. 22-25 - Robert Janczewski, Krzysztof Turowski:
On the hardness of computing span of subcubic graphs. 26-32 - Zheng Yang, Shuangqing Li:
On security analysis of an after-the-fact leakage resilient key exchange protocol. 33-40 - Zhi Hu, Guoliang Zhang, Maozhi Xu:
Some techniques for faster scalar multiplication on GLS curves. 41-46 - David J. Pearce:
A space-efficient algorithm for finding strongly connected components. 47-52 - Minh Tan Nguyen, Quang Hai Truong, Tran Khanh Dang:
Enhance fuzzy vault security using nonrandom chaff point generator. 53-64 - Yan Lan, Xin Han, Zongtao Wu, He Guo, Xin Chen:
Complexity of problem TF2|v=1, c=2|Cmax. 65-69
Volume 116, Number 2, 2016
- Tamanna Chhabra, Jorma Tarhio:
A filtration method for order-preserving matching. 71-74 - Patricia Bouyer, Patrick Gardy, Nicolas Markey:
On the semantics of Strategy Logic. 75-79 - Wantao Ning:
The super connectivity of exchanged crossed cube. 80-84 - Martin Manak, Ivana Kolingerová:
Extension of the edge tracing algorithm to disconnected Voronoi skeletons. 85-92 - Shuliang Sun:
A novel edge based image steganography with 2k correction and Huffman encoding. 93-99 - Warut Suksompong, Charles E. Leiserson, Tao B. Schardl:
On the efficiency of localized work stealing. 100-106 - Xie-Bin Chen:
Paired 2-disjoint path covers of multidimensional torus networks with faulty edges. 107-110 - Christoph Haase, Stefan Kiefer:
The complexity of the Kth largest subset problem and related problems. 111-115 - Chik How Tan, Theo Fanuela Prabowo, Duc-Phong Le:
Breaking an ID-based encryption based on discrete logarithm and factorization problems. 116-119 - Ilario Bonacina, Navid Talebanfard:
Improving resolution width lower bounds for k-CNFs with applications to the Strong Exponential Time Hypothesis. 120-124 - Pawel Parys:
Weak containment for partial words is coNP-complete. 125-127 - Mohamed Tolba, Amr M. Youssef:
Generalized MitM attacks on full TWINE. 128-135 - Cihangir Tezcan, Ali Aydin Selçuk:
Improved improbable differential attacks on ISO standard CLEFIA: Expansion technique revisited. 136-143 - Jethro G. Beekman:
A Denial of Service attack against fair computations using Bitcoin deposits. 144-146 - Robert Bredereck, Nimrod Talmon:
NP-hardness of two edge cover generalizations with applications to control and bribery for approval voting. 147-152 - Vladimir Edemskiy, A. Palvinskiy:
The linear complexity of binary sequences of length 2p with optimal three-level autocorrelation. 153-156 - Sergey Kitaev, Vincent Vajnovszki:
Mahonian STAT on words. 157-162 - Jun Yuan, Aixia Liu:
Sufficient conditions for triangle-free graphs to be super k-restricted edge-connected. 163-167 - Mun-Kyu Lee, Pierre Michaud, Jeong Seop Sim, DaeHun Nyang:
A simple proof of optimality for the MIN cache replacement policy. 168-170 - Gelin Zhou:
Two-dimensional range successor in optimal time and almost linear space. 171-174 - Yuki Kobayashi, Yuya Higashikawa, Naoki Katoh, Adnan Sljoka:
Characterizing redundant rigidity and redundant global rigidity of body-hinge graphs. 175-178 - Meena Mahajan, Nitin Saurabh, Sébastien Tavenas:
VNP=VP in the multilinear world. 179-182 - Wen-Chung Kuo, Chun-Cheng Wang, Hong-Ching Hou:
Signed digit data hiding scheme. 183-191 - Oualid Benamara, Fatiha Merazka, Kamel Betina:
An improvement of a cryptanalysis algorithm. 192-196 - Sukhamay Kundu, Subhashis Majumder:
A linear time algorithm for optimal k-hop dominating set of a tree. 197-202 - Sheng-Yi Jiang, Lian-xi Wang:
Efficient feature selection based on correlation measure between continuous and discrete features. 203-215 - Alexander Chane Shiau, Tzong-Huei Shiau, Yue-Li Wang:
Corrigendum to "Incidence coloring of Cartesian product graphs" [Inf. Process. Lett. (2015) 765-768]. 216
Volume 116, Number 3, 2016
- Giuseppe Liotta, Fabrizio Montecchiani:
L-visibility drawings of IC-planar graphs. 217-222 - Gregory Z. Gutin, Magnus Wahlström:
Tight lower bounds for the Workflow Satisfiability Problem based on the Strong Exponential Time Hypothesis. 223-226 - Chien Chin Chen, Yu-Chun Sun:
Exploring acquaintances of social network site users for effective social event recommendations. 227-236 - Hans Ulrich Simon:
Efficient computation of approximate isomorphisms between Boolean functions. 237-240 - Dmitry Kosolobov:
Computing runs on a general alphabet. 241-244 - Gabriele Fici, Tomasz Kociumaka, Jakub Radoszewski, Wojciech Rytter, Tomasz Walen:
On the greedy algorithm for the Shortest Common Superstring problem with reversals. 245-251 - Leah Epstein, Hanan Zebedat-Haider:
Online scheduling of unit jobs on three machines with rejection: A tight result. 252-255 - Meena Mahajan, Anil Shukla:
Level-ordered Q-resolution and tree-like Q-resolution are incomparable. 256-258 - Yu Liu, Kai Fu, Wei Wang, Ling Sun, Meiqin Wang:
Linear cryptanalysis of reduced-round SPECK. 259-266
Volume 116, Number 4, April 2016
- Peter Damaschke:
Sufficient conditions for edit-optimal clusters. 267-272 - Ján Katrenic:
A faster FPT algorithm for 3-path vertex cover. 273-278 - Robin Fay:
Introducing the counter mode of operation to Compressed Sensing based encryption. 279-283 - Georg Struth:
On the expressive power of Kleene algebra with domain. 284-288 - Shaoquan Jiang:
On message authentication with a correlated setup. 289-293 - Simone Dantas, Luérbio Faria, Celina M. H. de Figueiredo, Rafael B. Teixeira:
The (k, ℓ) unpartitioned probe problem NP-complete versus polynomial dichotomy. 294-298 - Cheng-Nan Lai:
On the construction of all shortest node-disjoint paths in star networks. 299-303 - Salvatore Pontarelli, Pedro Reviriego, Juan Antonio Maestro:
Improving counting Bloom filter performance with fingerprints. 304-309 - Yahui Wu, Su Deng, Hongbin Huang:
Capacity and delay analysis in delay tolerant network with multiple communities. 310-315 - Fang Xie, Yuzhong Zhang, Qingguo Bai, Zhe Xu:
Inefficiency analysis of the scheduling game on limited identical machines with activation costs. 316-320
Volume 116, Number 5, May 2016
- Mansour J. Algefari, Khalid A. Alsatami, Hong-Jian Lai, Juan Liu:
Supereulerian digraphs with given local structures. 321-326 - Mahdi Amani, Kevin A. Lai, Robert E. Tarjan:
Amortized rotation cost in AVL trees. 327-330 - Jiyou Li, Chu Luo:
The simplified weighted sum function and its average sensitivity. 331-336 - Pedro Henrique Del Bianco Hokama, Flávio Keidi Miyazawa, Rafael Crivellari Saliba Schouery:
A bounded space algorithm for online circle packing. 337-342 - Xie-Bin Chen:
Hamiltonicity of hypercubes with faulty vertices. 343-346 - Xiaoqing Tan, Xiaoqian Zhang, Junbin Fang:
Perfect quantum teleportation by four-particle cluster state. 347-350 - Huawang Qin, Yuewei Dai:
Verifiable (t, n) threshold quantum secret sharing using d-dimensional Bell state. 351-355 - Szabolcs Iván:
Complexity of atoms, combinatorially. 356-360 - Ananda Swarup Das, Prosenjit Gupta:
Linear space adaptive data structures for planar range reporting. 361-366 - Mohammad Ehdaie, Nikos Alexiou, Mahmoud Ahmadian-Attari, Mohammad Reza Aref, Panos Papadimitratos:
2D Hash Chain robust Random Key Distribution scheme. 367-372 - Baraka Jacob Maiseli, Huijun Gao:
Robust edge detector based on anisotropic diffusion-driven process. 373-378 - Alberto Caprara, Fabio Furini, Enrico Malaguti, Emiliano Traversi:
Solving the Temporal Knapsack Problem via Recursive Dantzig-Wolfe Reformulation. 379-386 - Ali Reza Ashrafi, Jernej Azarija, Azam Babai, Khadijeh Fathalikhani, Sandi Klavzar:
The (non-)existence of perfect codes in Fibonacci cubes. 387-390
Volume 116, Number 6, June 2016
- Ekkehard Köhler, Lalla Mouatadid:
A linear time algorithm to compute a maximum weighted independent set on cocomparability graphs. 391-395 - Chao Yang, Bing Yao, Han Ren:
A note on graph proper total colorings with many distinguishing constraints. 396-400 - Enqiang Zhu, Zepeng Li, Zehui Shao, Jin Xu:
Acyclically 4-colorable triangulations. 401-408 - Cinzia Bernardeschi, Andrea Domenici:
Verifying safety properties of a nonlinear control by interactive theorem proving with the Prototype Verification System. 409-415 - Zhen Qin, Chen Yuan, Yilei Wang, Hu Xiong:
On the security of two identity-based signature schemes based on pairings. 416-418 - Meirav Zehavi:
A randomized algorithm for long directed cycle. 419-422 - Eike Best, Javier Esparza:
Existence of home states in Petri nets is decidable. 423-427 - Tobias Storch:
Black-box complexity: Advantages of memory usage. 428-432 - Florian Barbero, Gregory Z. Gutin, Mark Jones, Bin Sheng, Anders Yeo:
Linear-vertex kernel for the problem of packing r-stars into a graph without long induced paths. 433-436 - Xavier Molinero, Martin Olsen, Maria J. Serna:
On the complexity of exchanging. 437-441
Volume 116, Number 7, July 2016
- Frederik Harwath:
A note on the size of prenex normal forms. 443-446 - Bin Yang, Jie Luo, Ling Guo, Fang Cheng:
Simultaneous image fusion and demosaicing via compressive sensing. 447-454 - Ke Chen:
Improved neural dynamics for online Sylvester equations solving. 455-459 - Jou-Ming Chang, Xiang-Rui Chen, Jinn-Shyong Yang, Ro-Yu Wu:
Locally exchanged twisted cubes: Connectivity and super connectivity. 460-466 - Egor V. Kostylev, Juan L. Reutter, Domagoj Vrgoc:
Static analysis of navigational XPath over graph databases. 467-474 - Sourav Chakraborty, Akshay Kamath, Rameshwar Pratap:
Testing whether the uniform distribution is a stationary distribution. 475-480 - Khodakhast Bibak, Bruce M. Kapron, Venkatesh Srinivasan:
MMH⁎ with arbitrary modulus is always almost-universal. 481-483 - Yonah Cherniavsky, Avraham Goldstein, Vadim E. Levit, Robert Shwartz:
Enumeration of balanced finite group valued functions on directed graphs. 484-488 - Peter Sanders, Christian Schulz:
Scalable generation of scale-free graphs. 489-491 - Syh-Yuan Tan, Wun-She Yap:
Cryptanalysis of a CP-ABE scheme with policy in normal forms. 492-495
Volume 116, Number 8, August 2016
- Xinyin Xiang, Hui Li, Mingyu Wang, Xingwen Zhao:
Efficient multi-party concurrent signature from lattices. 497-502 - Jinwen Ou, Xueling Zhong, Chung-Lun Li:
Faster algorithms for single machine scheduling with release dates and rejection. 503-507 - Yao Chen, Kang G. Shin, Huagang Xiong:
Generalizing fixed-priority scheduling for better schedulability in mixed-criticality systems. 508-512 - Eduardo Lalla-Ruiz, Christopher Expósito Izquierdo, Belén Melián-Batista, J. Marcos Moreno-Vega:
A Hybrid Biased Random Key Genetic Algorithm for the Quadratic Assignment Problem. 513-520 - Gillat Kol, Ran Raz:
Bounds on 2-query Locally Testable Codes with affine tests. 521-525 - Yang Fang, Xiwen Lu:
Online parallel-batch scheduling to minimize total weighted completion time on single unbounded machine. 526-531 - Jin Xu, Zepeng Li, Enqiang Zhu:
On purely tree-colorable planar graphs. 532-536 - Shiteng Chen, Periklis A. Papakonstantinou:
Correlation lower bounds from correlation upper bounds. 537-540 - Konstantinos A. Draziotis:
(EC)DSA lattice attacks based on Coppersmith's method. 541-545
Volume 116, Number 9, September 2016
- Yasuaki Kobayashi, Hisao Tamaki:
A faster fixed parameter algorithm for two-layer crossing minimization. 547-549 - Kenjiro Takazawa:
A 7/6-approximation algorithm for the minimum 2-edge connected subgraph problem in bipartite cubic graphs. 550-553 - Haisheng Tan, Hongyu Liang, Rui Wang, Jipeng Zhou:
Computing Roman domatic number of graphs. 554-559 - Omar Darwish, Kurt Mehlhorn:
Improved balanced flow computation using parametric flow. 560-563 - Dániel Gerbner, Balázs Keszegh, Cory Palmer, Dömötör Pálvölgyi:
Topological orderings of weighted directed acyclic graphs. 564-568 - Masashi Kiyomi, Yota Otachi:
Finding a chain graph in a bipartite permutation graph. 569-573 - Shiying Wang, Weiping Han:
The g-good-neighbor conditional diagnosability of n-dimensional hypercubes under the MM⁎ model. 574-577 - Kaito Fujii:
Faster approximation algorithms for maximizing a monotone submodular function subject to a b-matching constraint. 578-584 - Y-Chuang Chen, Tsung-Han Tsai:
Hamiltonian decomposition of generalized recursive circulant graphs. 585-589 - Mehdy Roayaei, Mohammadreza Razzazi:
An FPT-algorithm for modifying a graph of bounded treewidth to decrease the size of its dominating set using minimum modification. 590-594
Volume 116, Number 10, October 2016
- Fan Guo, Hui Peng, Jin Tang:
Genetic algorithm-based parameter selection approach to single image defogging. 595-602 - Jia Sun, Shiheng Wang, Ke Wang:
Zhang neural networks for a set of linear matrix inequalities with time-varying coefficient matrix. 603-610 - Jong-Min Park, Hyung-Jeong Yang, Jae-Dong Yang, Dong-Hoon Choi:
A technique for the concept-based detection of functional modules in an interaction network. 611-617 - Hoda Jannati, Behnam Bahrak:
Security analysis of an RFID tag search protocol. 618-622 - Liang Yang, Bing Liu, Hongfei Lin, Yuan Lin:
Combining local and global information for product feature extraction in opinion documents. 623-627 - Michele Borassi:
A note on the complexity of computing the number of reachable vertices in a digraph. 628-630 - Divesh Aggarwal, Chandan K. Dubey:
Improved hardness results for unique shortest vector problem. 631-637 - Arnaud Carayol, Olivier Serre:
Marking shortest paths on pushdown graphs does not preserve MSO decidability. 638-643 - Xia Hong, Qinghai Liu:
Degree condition for completely independent spanning trees. 644-648 - Gregory J. Puleo:
Complexity of a disjoint matching problem on bipartite graphs. 649-652
Volume 116, Number 11, November 2016
- Yalin Song, Yaoru Sun, Hong Zhang, Fang Wang:
Activity testing model for automatic correction of hand pointing. 653-659 - Ali Dehghan, Mohammad-Reza Sadeghi:
On the algorithmic complexity of zero-sum edge-coloring. 660-667 - Junqing Cai, Yuzhong Zhang:
Fan-type implicit-heavy subgraphs for hamiltonicity of implicit claw-heavy graphs. 668-673 - Lingfeng Liu, Suoxia Miao, Mengfan Cheng, Xiaojing Gao:
A pseudorandom bit generator based on new multi-delayed Chebyshev map. 674-681 - Michael Mitzenmacher, Vikram Nathan:
Hardness of peeling with stashes. 682-688 - Kung-Jui Pai, Jou-Ming Chang, Jinn-Shyong Yang:
Vertex-transitivity on folded crossed cubes. 689-693 - Tero Laihonen:
The metric dimension for resolving several objects. 694-700 - Alexandre Mota, Juliano Iyoda, Heitor Maranhão:
Program synthesis by model finding. 701-705 - Ehab Morsy:
An extension of Hall's theorem for partitioned bipartite graphs. 706-709 - Rafal Kapelko, Evangelos Kranakis:
On the displacement for covering a unit interval with randomly placed sensors. 710-717 - Anke van Zuylen, James C. Bieron, Frans Schalekamp, Gexin Yu:
A tight upper bound on the number of cyclically adjacent transpositions to sort a permutation. 718-722 - Chao Wang, René Sitters:
On some special cases of the restricted assignment problem. 723-728 - Christopher S. Henry:
The (nested) word problem. 729-734
Volume 116, Number 12, December 2016
- Chuan Guo, Jeffrey O. Shallit, Arseny M. Shur:
Palindromic rich words and run-length encodings. 735-738 - Faisal N. Abu-Khzam, Pinar Heggernes:
Enumerating minimal dominating sets in chordal graphs. 739-743 - Toan Thang Ta, Cheng-Yao Lin, Chin Lung Lu:
An efficient algorithm for computing non-overlapping inversion and transposition distance. 744-749 - Meng Zhang, Yi Zhang, Chen Hou:
Compact representations of automata for regular expression matching. 750-756 - Zohir Bouzid, Damien Imbs, Michel Raynal:
A necessary condition for Byzantine k-set agreement. 757-759
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.