default search action
International Journal of Foundations of Computer Science, Volume 28
Volume 28, Number 1, January 2017
- Guangkui Xu, Xiwang Cao, Shanding Xu:
Several Classes of Quadratic Ternary Bent, Near-Bent and 2-Plateaued Functions. 1-18 - Rongjia Li, Chenhui Jin:
Meet-in-the-Middle Attack on 11-Round 3D Block Cipher. 19-28 - Vecdi Aytaç, Zeynep Nihan Berberler:
Binding Number and Wheel Related Graphs. 29-38 - Frank Gurski, Patrick Gwydion Poullie:
Interval Routing Schemes for Circular-Arc Graphs. 39-60 - Dongfang Zhou, Jianxi Fan, Cheng-Kuan Lin, Jingya Zhou, Xi Wang:
Cycles Embedding in Exchanged Crossed Cube. 61-76 - Samir Elouasbi, Andrzej Pelc:
Deterministic Rendezvous with Detection Using Beeps. 77-
Volume 28, Number 2, February 2017
- Xiang Wang, Fang-Wei Fu:
Deterministic Construction of Compressed Sensing Matrices from Codes. 99-110 - Quentin Bramas, Sébastien Tixeuil:
The Random Bit Complexity of Mobile Robots Scattering. 111-134 - Michael Coons:
Regular Sequences and the Joint Spectral Radius. 135-140 - George Lagogiannis:
Query-Optimal Partially Persistent B-Trees with Constant Worst-Case Update Time. 141-170 - Zuling Chang, Pinhui Ke, Yongcheng Zhao:
Some Enumeration Results on Binary 2n-Periodic Sequences. 171-184 - Stefan Arnold:
Identifying Generalized Reed-Muller Codewords by Quantum Queries. 185-
Volume 28, Number 3, April 2017
- Alexandros Palioudakis, Kai Salomaa, Selim G. Akl:
Worst Case Branching and Other Measures of Nondeterminism. 195-210 - Jing Li, Yuxing Yang, Xiaohui Gao:
Hamiltonicity of the Torus Network Under the Conditional Fault Model. 211-228 - Markus Holzer, Sebastian Jakobi:
More on Minimizing Finite Automata with Errors - Nondeterministic Machines. 229-246 - Wen Chean Teh, Adrian Atanasiu:
Minimal Reaction Systems Revisited and Reaction System Rank. 247-262 - Jean Mairesse, Irène Marcovici:
Uniform Sampling of Subshifts of Finite Type on Grids and Trees. 263-288 - Meng Zhang:
Fast Convolutions of Packed Strings and Pattern Matching with Wildcards. 289-
Volume 28, Number 4, June 2017
- Zahra Moslehi, Alireza Bagheri:
Separating Bichromatic Point Sets by Minimal Triangles with a Fixed Angle. 309-320 - Benjamin Russell, Susan Stepney:
The Geometry of Speed Limiting Resources in Physical Models of Computation. 321-334 - Goksen Bacak-Turan, Ekrem Oz:
Neighbor Rupture Degree of Transformation Graphs Gxy-. 335-356 - Zhiqiang Sun, Lei Hu:
Several Classes of Boolean Functions with Four-Valued Walsh Spectra. 357-378 - Dima Grigoriev, Laszlo B. Kish, Vladimir Shpilrain:
Yao's Millionaires' Problem and Public-Key Encryption Without Computational Assumptions. 379-390 - Pinhui Ke, Zhifan Ye, Zhengchun Zhou, Jian Shen:
Autocorrelation of the Modified Binary Two-Prime Sidelnikov Sequence. 391-410 - Rachid Hadid, Mehmet Hakan Karaata, Vincent Villain:
A Stabilizing Algorithm for Finding Two Node-Disjoint Paths in Arbitrary Networks. 411-
Volume 28, Number 5, August 2017
- Yo-Sub Han, Kai Salomaa:
Preface. 437-440 - Zoltán Fülöp:
In Memoriam Zoltán Ésik (1951-2016). 441-444 - Christos A. Kapoutsis, Lamana Mulaffer:
A Logical Characterization of Small 2NFAs. 445-464 - Shinnosuke Seki, Andrew Winslow:
The Complexity of Fixed-Height Patterned Tile Self-Assembly. 465-482 - Aleksandrs Belovs, J. Andres Montoya, Abuzer Yakaryilmaz:
On a Conjecture by Christian Choffrut. 483-502 - Holger Bock Axelsen, Markus Holzer, Martin Kutrib:
The Degree of Irreversibility in Deterministic Finite Automata. 503-522 - Markus Teichmann:
Regular Approximation of Weighted Linear Context-Free Tree Languages. 523-542 - Martin Sulzmann, Kenny Zhuo Ming Lu:
Derivative-Based Diagnosis of Regular Expression Ambiguity. 543-562 - Akio Fujiyoshi:
A Practical Algorithm for the Uniform Membership Problem of Labeled Multidigraphs of Tree-Width 2 for Spanning Tree Automata. 563-582 - Suna Bensch, Johanna Björklund, Martin Kutrib:
Deterministic Stack Transducers. 583-602 - Jorge Calvo-Zaragoza, José Oncina, Colin de la Higuera:
Computing the Expected Edit Distance from a String to a Probabilistic Finite-State Automaton. 603-622 - Daniel Prusa:
Complexity of Matching Sets of Two-Dimensional Patterns by Two-Dimensional On-Line Tessellation Automaton. 623-
Volume 28, Number 6, September 2017
- Jinguang Han, Yogachandran Rahulamathavan, Willy Susilo:
Preface. 641-644 - Chunguang Ma, Juyan Li, Weiping Ouyang:
Lattice-Based Identity-Based Homomorphic Conditional Proxy Re-Encryption for Secure Big Data Computing in Cloud Environment. 645-660 - Rashed Mazumder, Atsuko Miyaji, Chunhua Su:
Probably Secure Keyed-Function Based Authenticated Encryption Schemes for Big Data. 661-682 - Youwen Zhu, Xingxin Li, Jian Wang, Yining Liu, Zhiguo Qu:
Practical Secure Naïve Bayesian Classification Over Encrypted Big Data in Cloud. 683-704 - Gang Yu, Xiaoxiao Ma, Zhenfu Cao, Guang Zeng, Wenbao Han:
Accountable CP-ABE with Public Verifiability: How to Effectively Protect the Outsourced Data in Cloud. 705-724 - Yangguang Tian, Guomin Yang, Yi Mu, Shiwei Zhang, Kaitai Liang, Yong Yu:
One-Round Attribute-Based Key Exchange in the Multi-Party Setting. 725-742 - Fucai Zhou, Su Peng, Jian Xu, Zifeng Xu:
Identity-Based Batch Provable Data Possession with Detailed Analyses. 743-760 - Jianye Huang, Qiong Huang, Chunhua Pan:
A Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage Setting. 761-780 - Chin-Ling Chen, Jungpil Shin, Yu-Ting Tsai, Aniello Castiglione, Francesco Palmieri:
Securing Information Exchange in VANETs by Using Pairing-Based Cryptography. 781-798 - Jiameng Sun, Binrui Zhu, Jing Qin, Jiankun Hu, Qianhong Wu:
Confidentiality-Preserving Publicly Verifiable Computation. 799-818
Volume 28, Number 7, November 2017
- Lei Sun, Fang-Wei Fu, Jian Liu:
On the Conjecture About the Linear Structures of Rotation Symmetric Boolean Functions. 819-834 - Aysun Aytaç, Zeynep Nihan Berberler:
Robustness of Regular Caterpillars. 835-842 - Jianghong Wei, Xinyi Huang, Wenfen Liu, Xuexian Hu:
Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward Security. 843-868 - Gokarna Sharma, Costas Busch:
The Bursty Steiner Tree Problem. 869-888 - Jie Lin, Yue Jiang, E. James Harner, Bing-Hua Jiang, Don Adjeroh:
IDPM: An Improved Degenerate Pattern Matching Algorithm for Biological Sequences. 889-914 - Lili Guo, Xi Wang, Cheng-Kuan Lin, Jingya Zhou, Jianxi Fan:
A Fault-Free Unicast Algorithm in the Generalized Hypercube with Restricted Faulty Vertices. 915-930 - Vaishali Mehta Wadhwa, Deepak Garg:
Approximation Algorithm for Resource Allocation Problems with Time Dependent Penalties. 931-944
Volume 28, Number 8, December 2017
- Mohamed Faouzi Atig, Benedikt Bollig, Peter Habermehl:
Emptiness of Ordered Multi-Pushdown Automata is 2ETIME-Complete. 945-976 - Wenyi Hong, Zhenbo Wang:
Improved Approximation Algorithm for the Combination of Parallel Machine Scheduling and Vertex Cover. 977-992 - Yinkui Li, Mingzhe Du, Hongyan Li, Xiaolin Wang:
Edge Rupture Degree of Graphs. 993-1006 - Sepinoud Azimi, Charmi Panchal, Andrzej Mizera, Ion Petre:
Multi-Stability, Limit Cycles, and Period-Doubling Bifurcation with Reaction Systems. 1007-1020 - Joel Antonio Trejo-Sánchez, José Alberto Fernández-Zepeda, Julio Cesar Ramírez Pacheco:
A Self-Stabilizing Algorithm for a Maximal 2-Packing in a Cactus Graph Under Any Scheduler. 1021-1046 - Pingshan Li, Min Xu:
The Super Spanning Connectivity of Arrangement Graphs. 1047-
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.