Journal: Inf. Process. Lett.

Volume 83, Issue 6

295 -- 299Shahrokh Saeednia. An identity-based society oriented signature scheme with anonymous signers
301 -- 306Chang-Hsiung Tsai, Jimmy J. M. Tan, Tyne Liang, Lih-Hsing Hsu. Fault-tolerant hamiltonian laceability of hypercubes
307 -- 314Ora Arbell, Gad M. Landau, Joseph S. B. Mitchell. Edit distance of run-length encoded strings
315 -- 321Chor Ping Low. An efficient retrieval selection algorithm for video servers with random duplicated assignment storage technique
323 -- 329Zhiyi Tan, Yong He. Optimal online algorithm for scheduling on two identical machines with machine availability constraints
331 -- 336Loren Schwiebert. There is no optimal routing policy for the torus
337 -- 344Sheng-Tzong Cheng, Ing-Ray Chen. A self-adjusting quality of service control scheme
345 -- 351Carles Padró, Germán Sáez. Lower bounds on the information rate of secret sharing schemes with homogeneous access structure

Volume 83, Issue 5

237 -- 241Benny K. Nielsen, Pawel Winter, Martin Zachariasen. On the location of Steiner points in uniformly-oriented Steiner trees
243 -- 249Francesco Quaglia. A restriction of the elastic time algorithm
251 -- 261Ph. Schnoebelen. Verifying lossy channel systems has nonprimitive recursive complexity
263 -- 266Steven D. Galbraith, John Malone-Lee, Nigel P. Smart. Public key signatures in the multi-user setting
267 -- 274Amnon Ta-Shma. Storing information with extractors
275 -- 280Ioannis Caragiannis, Christos Kaklamanis, Panagiotis Kanellopoulos. New bounds on the size of the minimum feedback vertex set in meshes and butterflies
281 -- 286Subhamoy Maitra. Highly nonlinear balanced Boolean functions with good local and global avalanche characteristics
287 -- 291Funda Ergün, Rakesh K. Sinha, Lisa Zhang. An improved FPTAS for Restricted Shortest Path
293 -- 0Gerard J. Chang. Corrigendum to The path-partition problem in block graphs

Volume 83, Issue 4

183 -- 185Boris Aronov. A lower bound on Voronoi diagram complexity
187 -- 194Fabian Schwarzer, Achim Schweikard. On the complexity of one-shot translational separability
195 -- 200Clemens Gröpl, Stefan Hougardy, Till Nierhoff, Hans Jürgen Prömel. Steiner trees in uniformly quasi-bipartite graphs
201 -- 204Jean-Luc Fouquet. No odd pairs in minimal imperfect NP::5:: graphs
205 -- 209Eduardo Sany Laber, Leonardo Gomes Holanda. Improved bounds for asymmetric communication protocols
211 -- 220John D. Holt, Soon Myoung Chung. Mining association rules using inverted hashing and pruning
221 -- 227Paul C. Attie. Wait-free Byzantine consensus
229 -- 235Mikhail Y. Kovalyov, Marcus Pattloch, Günter Schmidt. A polynomial algorithm for lot-size scheduling of two type tasks

Volume 83, Issue 3

125 -- 128Matthieu Latapy, Clémence Magnien. Coding distributive lattices with Edge Firing Games
129 -- 134Marek Piotrów. A note on constructing binary heaps with periodic networks
135 -- 140L. Paul Chew, Haggai David, Matthew J. Katz, Klara Kedem. Walking around fat obstacles
141 -- 144Francis Y. L. Chin, Fu Lee Wang. Efficient algorithm for transversal of disjoint convex polygons
145 -- 150Rafael Dueire Lins. An efficient algorithm for cyclic reference counting
151 -- 157Ricardo A. Baeza-Yates, Hector Soza-Pollman. Optimal bounded disorder
159 -- 161Alberto Apostolico, Stefano Lonardi. A speed-up for the commute between subword trees and DAWGs
163 -- 166Mohammad Taghi Hajiaghayi, Yashar Ganjali. A note on the Consecutive Ones Submatrix problem
167 -- 172Pierre Yves Schobbens, Gunter Saake, Amílcar Sernadas, Cristina Sernadas. A two-level temporal logic for evolving specifications
173 -- 174Claudio Arbib, Alberto Caprara. On the stability number of the edge intersection of two graphs
175 -- 180Navneet Malpani, Jianer Chen. A note on practical construction of maximum bandwidth paths

Volume 83, Issue 2

57 -- 62Fedor V. Fomin, Andrzej Lingas. Approximation algorithms for time-dependent orienteering
63 -- 70Bruno Carpentieri. Sending compressed messages to a learned receiver on a bidirectional line
71 -- 77Tatsuhiro Tsuchiya, Tohru Kikuno. Byzantine quorum systems with maximum availability
79 -- 88Byeong-Mo Chang. Managing the granularity of constraint-based analyses by rule transformation
89 -- 93Leszek Gasieniec, Andrzej Lingas. On adaptive deterministic gossiping in ad hoc radio networks
95 -- 99Wei-Hua He. Weaknesses in some multisignature schemes for specified group of verifiers
101 -- 108Roberto Barbuti, Cinzia Bernardeschi, Nicoletta De Francesco. Abstract interpretation of operational semantics for secure information flow
109 -- 113Igor Shparlinski. Security of most significant bits of g:::x:::2::::::
115 -- 123Dong-Ho Lee, Shin Heu, Hyoung-Joo Kim. An efficient algorithm for hyperspherical range query processing in high-dimensional data space

Volume 83, Issue 1

1 -- 6Arnaud Lefebvre, Thierry Lecroq. Compror: On-line lossless data compression with a factor oracle
7 -- 12Harald Fecher, Mila E. Majster-Cederbaum, Jinzhao Wu. Bundle event structures: A revised cpo approach
13 -- 16Alan J. Hoffman, Kate Jenkins, Tim Roughgarden. On a game in directed graphs
17 -- 19Ingo Wegener. A simplified correctness proof for a well-known algorithm computing strongly connected components
21 -- 26Atsushi Sasaki. A time-optimal distributed sorting algorithm on a line network
27 -- 32Ivan D. Baev, Waleed Meleis, Alexandre E. Eichenberger. Lower bounds on precedence-constrained scheduling for parallel processors
33 -- 39Amihood Amir, Moshe Lewenstein, Ely Porat. Approximate swapped matching
41 -- 48Maharaj Mukherjee, Kanad Chakraborty. A polynomial-time optimization algorithm for a rectilinear partitioning problem with applications in VLSI design automation
49 -- 55Haengrae Cho. Database recovery using incomplete page versions in a multisystem data sharing environment