Journal: Inf. Process. Lett.

Volume 116, Issue 9

547 -- 549Yasuaki Kobayashi, Hisao Tamaki. A faster fixed parameter algorithm for two-layer crossing minimization
550 -- 553Kenjiro Takazawa. A 7/6-approximation algorithm for the minimum 2-edge connected subgraph problem in bipartite cubic graphs
554 -- 559Haisheng Tan, Hongyu Liang, Rui Wang, Jipeng Zhou. Computing Roman domatic number of graphs
560 -- 563Omar Darwish, Kurt Mehlhorn. Improved balanced flow computation using parametric flow
564 -- 568Dániel Gerbner, Balázs Keszegh, Cory Palmer, Dömötör Pálvölgyi. Topological orderings of weighted directed acyclic graphs
569 -- 573Masashi Kiyomi, Yota Otachi. Finding a chain graph in a bipartite permutation graph
574 -- 577Shiying Wang, Weiping Han. ⁎ model
578 -- 584Kaito Fujii. Faster approximation algorithms for maximizing a monotone submodular function subject to a b-matching constraint
585 -- 589Y-Chuang Chen, Tsung-Han Tsai. Hamiltonian decomposition of generalized recursive circulant graphs
590 -- 594Mehdy Roayaei, Mohammadreza Razzazi. An FPT-algorithm for modifying a graph of bounded treewidth to decrease the size of its dominating set using minimum modification

Volume 116, Issue 8

497 -- 502Xinyin Xiang, Hui Li, Mingyu Wang, Xingwen Zhao. Efficient multi-party concurrent signature from lattices
503 -- 507Jinwen Ou, Xueling Zhong, Chung-Lun Li. Faster algorithms for single machine scheduling with release dates and rejection
508 -- 512Yao Chen, Kang G. Shin, Huagang Xiong. Generalizing fixed-priority scheduling for better schedulability in mixed-criticality systems
513 -- 520Eduardo Lalla-Ruiz, Christopher Expósito Izquierdo, Belén Melián-Batista, J. Marcos Moreno-Vega. A Hybrid Biased Random Key Genetic Algorithm for the Quadratic Assignment Problem
521 -- 525Gillat Kol, Ran Raz. Bounds on 2-query Locally Testable Codes with affine tests
526 -- 531Yang Fang, Xiwen Lu. Online parallel-batch scheduling to minimize total weighted completion time on single unbounded machine
532 -- 536Jin Xu, Zepeng Li, Enqiang Zhu. On purely tree-colorable planar graphs
537 -- 540Shiteng Chen, Periklis A. Papakonstantinou. Correlation lower bounds from correlation upper bounds
541 -- 545Konstantinos A. Draziotis. (EC)DSA lattice attacks based on Coppersmith's method

Volume 116, Issue 7

443 -- 446Frederik Harwath. A note on the size of prenex normal forms
447 -- 454Bin Yang, Jie Luo, Ling Guo, Fang Cheng. Simultaneous image fusion and demosaicing via compressive sensing
455 -- 459Ke Chen. Improved neural dynamics for online Sylvester equations solving
460 -- 466Jou-Ming Chang, Xiang-Rui Chen, Jinn-Shyong Yang, Ro-Yu Wu. Locally exchanged twisted cubes: Connectivity and super connectivity
467 -- 474Egor V. Kostylev, Juan L. Reutter, Domagoj Vrgoc. Static analysis of navigational XPath over graph databases
475 -- 480Sourav Chakraborty 0001, Akshay Kamath, Rameshwar Pratap. Testing whether the uniform distribution is a stationary distribution
481 -- 483Khodakhast Bibak, Bruce M. Kapron, Venkatesh Srinivasan. ⁎ with arbitrary modulus is always almost-universal
484 -- 488Yonah Cherniavsky, Avraham Goldstein, Vadim E. Levit, Robert Shwartz. Enumeration of balanced finite group valued functions on directed graphs
489 -- 491Peter Sanders, Christian Schulz 0003. Scalable generation of scale-free graphs
492 -- 495Syh-Yuan Tan, Wun-She Yap. Cryptanalysis of a CP-ABE scheme with policy in normal forms

Volume 116, Issue 6

391 -- 395Ekkehard Köhler, Lalla Mouatadid. A linear time algorithm to compute a maximum weighted independent set on cocomparability graphs
396 -- 400Chao Yang, Bing Yao, Han Ren. A note on graph proper total colorings with many distinguishing constraints
401 -- 408Enqiang Zhu, Zepeng Li, Zehui Shao, Jin Xu. Acyclically 4-colorable triangulations
409 -- 415Cinzia Bernardeschi, Andrea Domenici. Verifying safety properties of a nonlinear control by interactive theorem proving with the Prototype Verification System
416 -- 418Zhen Qin, Chen Yuan, Yilei Wang, Hu Xiong. On the security of two identity-based signature schemes based on pairings
419 -- 422Meirav Zehavi. A randomized algorithm for long directed cycle
423 -- 427Eike Best, Javier Esparza. Existence of home states in Petri nets is decidable
428 -- 432Tobias Storch. Black-box complexity: Advantages of memory usage
433 -- 436Florian Barbero, Gregory Gutin, Mark Jones, Bin Sheng, Anders Yeo. Linear-vertex kernel for the problem of packing r-stars into a graph without long induced paths
437 -- 441Xavier Molinero, Martin Olsen, Maria J. Serna. On the complexity of exchanging

Volume 116, Issue 5

321 -- 326Mansour J. Algefari, Khalid A. Alsatami, Hong-Jian Lai, Juan Liu. Supereulerian digraphs with given local structures
327 -- 330Mahdi Amani, Kevin A. Lai, Robert E. Tarjan. Amortized rotation cost in AVL trees
331 -- 336Jiyou Li, Chu Luo. The simplified weighted sum function and its average sensitivity
337 -- 342Pedro Hokama, Flávio Keidi Miyazawa, Rafael C. S. Schouery. A bounded space algorithm for online circle packing
343 -- 346Xie-Bin Chen. Hamiltonicity of hypercubes with faulty vertices
347 -- 350Xiaoqing Tan, Xiaoqian Zhang, Junbin Fang. Perfect quantum teleportation by four-particle cluster state
351 -- 355Huawang Qin, Yuewei Dai. Verifiable (t, n) threshold quantum secret sharing using d-dimensional Bell state
356 -- 360Szabolcs Iván. Complexity of atoms, combinatorially
361 -- 366Ananda Swarup Das, Prosenjit Gupta. Linear space adaptive data structures for planar range reporting
367 -- 372Mohammad Ehdaie, Nikos Alexiou, Mahmoud Ahmadian-Attari, Mohammad Reza Aref, Panos Papadimitratos. 2D Hash Chain robust Random Key Distribution scheme
373 -- 378Baraka Jacob Maiseli, Huijun Gao. Robust edge detector based on anisotropic diffusion-driven process
379 -- 386Alberto Caprara, Fabio Furini, Enrico Malaguti, Emiliano Traversi. Solving the Temporal Knapsack Problem via Recursive Dantzig-Wolfe Reformulation
387 -- 390Ali Reza Ashrafi, Jernej Azarija, Azam Babai, Khadijeh Fathalikhani, Sandi Klavzar. The (non-)existence of perfect codes in Fibonacci cubes

Volume 116, Issue 4

267 -- 272Peter Damaschke. Sufficient conditions for edit-optimal clusters
273 -- 278Ján Katrenic. A faster FPT algorithm for 3-path vertex cover
279 -- 283Robin Fay. Introducing the counter mode of operation to Compressed Sensing based encryption
284 -- 288Georg Struth. On the expressive power of Kleene algebra with domain
289 -- 293Shaoquan Jiang. On message authentication with a correlated setup
294 -- 298Simone Dantas, Luérbio Faria, Celina M. Herrera de Figueiredo, Rafael B. Teixeira. The (k, ℓ) unpartitioned probe problem NP-complete versus polynomial dichotomy
299 -- 303Cheng-Nan Lai. On the construction of all shortest node-disjoint paths in star networks
304 -- 309Salvatore Pontarelli, Pedro Reviriego, Juan Antonio Maestro. Improving counting Bloom filter performance with fingerprints
310 -- 315Yahui Wu, Su Deng, Hongbin Huang. Capacity and delay analysis in delay tolerant network with multiple communities
316 -- 320Fang Xie, Yuzhong Zhang, Qingguo Bai, Zhe Xu. Inefficiency analysis of the scheduling game on limited identical machines with activation costs

Volume 116, Issue 3

217 -- 222Giuseppe Liotta, Fabrizio Montecchiani. L-visibility drawings of IC-planar graphs
223 -- 226Gregory Gutin, Magnus Wahlström. Tight lower bounds for the Workflow Satisfiability Problem based on the Strong Exponential Time Hypothesis
227 -- 236Chien Chin Chen, Yu-Chun Sun. Exploring acquaintances of social network site users for effective social event recommendations
237 -- 240Hans-Ulrich Simon. Efficient computation of approximate isomorphisms between Boolean functions
241 -- 244Dmitry Kosolobov. Computing runs on a general alphabet
245 -- 251Gabriele Fici, Tomasz Kociumaka, Jakub Radoszewski, Wojciech Rytter, Tomasz Walen. On the greedy algorithm for the Shortest Common Superstring problem with reversals
252 -- 255Leah Epstein, Hanan Zebedat-Haider. Online scheduling of unit jobs on three machines with rejection: A tight result
256 -- 258Meena Mahajan, Anil Shukla. Level-ordered Q-resolution and tree-like Q-resolution are incomparable
259 -- 266Yu Liu, Kai Fu, Wei Wang 0035, Ling Sun, Meiqin Wang. Linear cryptanalysis of reduced-round SPECK

Volume 116, Issue 2

71 -- 74Tamanna Chhabra, Jorma Tarhio. A filtration method for order-preserving matching
75 -- 79Patricia Bouyer, Patrick Gardy, Nicolas Markey. On the semantics of Strategy Logic
80 -- 84Wantao Ning. The super connectivity of exchanged crossed cube
85 -- 92Martin Manak, Ivana Kolingerová. Extension of the edge tracing algorithm to disconnected Voronoi skeletons
93 -- 99Shuliang Sun. k correction and Huffman encoding
100 -- 106Warut Suksompong, Charles E. Leiserson, Tao B. Schardl. On the efficiency of localized work stealing
107 -- 110Xie-Bin Chen. Paired 2-disjoint path covers of multidimensional torus networks with faulty edges
111 -- 115Christoph Haase, Stefan Kiefer. The complexity of the Kth largest subset problem and related problems
116 -- 119Chik-How Tan, Theo Fanuela Prabowo, Duc-Phong Le. Breaking an ID-based encryption based on discrete logarithm and factorization problems
120 -- 124Ilario Bonacina, Navid Talebanfard. Improving resolution width lower bounds for k-CNFs with applications to the Strong Exponential Time Hypothesis
125 -- 127Pawel Parys. Weak containment for partial words is coNP-complete
128 -- 135Mohamed Tolba, Amr M. Youssef. Generalized MitM attacks on full TWINE
136 -- 143Cihangir Tezcan, Ali Aydin Selçuk. Improved improbable differential attacks on ISO standard CLEFIA: Expansion technique revisited
144 -- 146Jethro G. Beekman. A Denial of Service attack against fair computations using Bitcoin deposits
147 -- 152Robert Bredereck, Nimrod Talmon. NP-hardness of two edge cover generalizations with applications to control and bribery for approval voting
153 -- 156Vladimir Edemskiy, A. Palvinskiy. The linear complexity of binary sequences of length 2p with optimal three-level autocorrelation
157 -- 162Sergey Kitaev, Vincent Vajnovszki. Mahonian STAT on words
163 -- 167Jun Yuan, Aixia Liu. Sufficient conditions for triangle-free graphs to be super k-restricted edge-connected
168 -- 170Mun-Kyu Lee, Pierre Michaud, Jeong Seop Sim, DaeHun Nyang. A simple proof of optimality for the MIN cache replacement policy
171 -- 174Gelin Zhou. Two-dimensional range successor in optimal time and almost linear space
175 -- 178Yuki Kobayashi, Yuya Higashikawa, Naoki Katoh, Adnan Sljoka. Characterizing redundant rigidity and redundant global rigidity of body-hinge graphs
179 -- 182Meena Mahajan, Nitin Saurabh, Sébastien Tavenas. VNP=VP in the multilinear world
183 -- 191Wen-Chung Kuo, Chun-Cheng Wang, Hong-Ching Hou. Signed digit data hiding scheme
192 -- 196Oualid Benamara, Fatiha Merazka, Kamel Betina. An improvement of a cryptanalysis algorithm
197 -- 202Sukhamay Kundu, Subhashis Majumder. A linear time algorithm for optimal k-hop dominating set of a tree
203 -- 215Sheng-Yi Jiang, Lian-xi Wang. Efficient feature selection based on correlation measure between continuous and discrete features
216 -- 0Alexander Chane Shiau, Tzong-Huei Shiau, Yue-Li Wang. Corrigendum to "Incidence coloring of Cartesian product graphs" [Inf. Process. Lett. (2015) 765-768]

Volume 116, Issue 12

735 -- 738Chuan Guo, Jeffrey Shallit, Arseny M. Shur. Palindromic rich words and run-length encodings
739 -- 743Faisal N. Abu-Khzam, Pinar Heggernes. Enumerating minimal dominating sets in chordal graphs
744 -- 749Toan Thang Ta, Cheng-Yao Lin, Chin Lung Lu. An efficient algorithm for computing non-overlapping inversion and transposition distance
750 -- 756Meng Zhang, Yi Zhang, Chen Hou. Compact representations of automata for regular expression matching
757 -- 759Zohir Bouzid, Damien Imbs, Michel Raynal. A necessary condition for Byzantine k-set agreement

Volume 116, Issue 11

653 -- 659Yalin Song, Yaoru Sun, Hong Zhang, Fang Wang. Activity testing model for automatic correction of hand pointing
660 -- 667Ali Dehghan 0001, Mohammad-Reza Sadeghi 0001. On the algorithmic complexity of zero-sum edge-coloring
668 -- 673Junqing Cai, Yuzhong Zhang. Fan-type implicit-heavy subgraphs for hamiltonicity of implicit claw-heavy graphs
674 -- 681Lingfeng Liu, Suoxia Miao, Mengfan Cheng, Xiaojing Gao. A pseudorandom bit generator based on new multi-delayed Chebyshev map
682 -- 688Michael Mitzenmacher, Vikram Nathan. Hardness of peeling with stashes
689 -- 693Kung-Jui Pai, Jou-Ming Chang, Jinn-Shyong Yang. Vertex-transitivity on folded crossed cubes
694 -- 700Tero Laihonen. The metric dimension for resolving several objects
701 -- 705Alexandre Mota, Juliano Iyoda, Heitor Maranhão. Program synthesis by model finding
706 -- 709Ehab Morsy. An extension of Hall's theorem for partitioned bipartite graphs
710 -- 717Rafal Kapelko, Evangelos Kranakis. On the displacement for covering a unit interval with randomly placed sensors
718 -- 722Anke van Zuylen, James Bieron, Frans Schalekamp, Gexin Yu. A tight upper bound on the number of cyclically adjacent transpositions to sort a permutation
723 -- 728Chao Wang, René Sitters. On some special cases of the restricted assignment problem
729 -- 734Christopher S. Henry. The (nested) word problem

Volume 116, Issue 10

595 -- 602Fan Guo, Hui Peng, Jin Tang. Genetic algorithm-based parameter selection approach to single image defogging
603 -- 610Jia Sun, Shiheng Wang, Ke Wang. Zhang neural networks for a set of linear matrix inequalities with time-varying coefficient matrix
611 -- 617Jong Min Park, Hyung Jeong Yang, Jae Dong Yang, Dong-Hoon Choi. A technique for the concept-based detection of functional modules in an interaction network
618 -- 622Hoda Jannati, Behnam Bahrak. Security analysis of an RFID tag search protocol
623 -- 627Liang Yang, Bin Liu 0001, Hongfei Lin, Yuan Lin. Combining local and global information for product feature extraction in opinion documents
628 -- 630Michele Borassi. A note on the complexity of computing the number of reachable vertices in a digraph
631 -- 637Divesh Aggarwal, Chandan K. Dubey. Improved hardness results for unique shortest vector problem
638 -- 643Arnaud Carayol, Olivier Serre. Marking shortest paths on pushdown graphs does not preserve MSO decidability
644 -- 648Xia Hong, Qinghai Liu. Degree condition for completely independent spanning trees
649 -- 652Gregory J. Puleo. Complexity of a disjoint matching problem on bipartite graphs

Volume 116, Issue 1

1 -- 14Rui Wang, Yongquan Zhou, Shilei Qiao, Kang Huang. Flower Pollination Algorithm with Bee Pollinator for cluster analysis
15 -- 21Defu Zhang, Leyuan Shi, Stephen C. H. Leung, Tao Wu. A priority heuristic for the guillotine rectangular packing problem
22 -- 25Najmeh Sadat Jaddi, Salwani Abdullah, Abdul Razak Hamdan. A solution representation of genetic algorithm for neural network weights and structure
26 -- 32Robert Janczewski, Krzysztof Turowski. On the hardness of computing span of subcubic graphs
33 -- 40Zheng Yang, Shuangqing Li. On security analysis of an after-the-fact leakage resilient key exchange protocol
41 -- 46Zhi Hu, Guoliang Zhang, MaoZhi Xu. Some techniques for faster scalar multiplication on GLS curves
47 -- 52David J. Pearce. A space-efficient algorithm for finding strongly connected components
53 -- 64Minh Tan Nguyen, Quang Hai Truong, Tran Khanh Dang. Enhance fuzzy vault security using nonrandom chaff point generator
65 -- 69Yan Lan, Xin Han, Zongtao Wu, He Guo, Xin Chen. max