


default search action
Information Processing Letters, Volume 113
Volume 113, Numbers 1-2, January 2013
- Andreas Björklund, Petteri Kaski:

Counting closed trails. 1-3 - Vincenzo Bonifaci

:
Physarum can compute shortest paths: A short proof. 4-7 - Yiguang Liu, Stan Z. Li, Wei Wu

, Ronggang Huang:
Dynamics of a mean-shift-like algorithm and its applications on clustering. 8-16 - Jean-Luc Baril:

Statistics-preserving bijections between classical and cyclic permutations. 17-22 - Adam Kasperski

, Adam Kurpisz
, Pawel Zielinski
:
Approximating the min-max (regret) selecting items problem. 23-29 - Xiangqian Zhou, Bing Yao, Xiangen Chen:

Every lobster is odd-elegant. 30-33 - Michal Zawidzki

, Renate A. Schmidt
, Dmitry Tishkovsky:
Satisfiability problem for modal logic with global counting operators coded in binary is NExpTime-complete. 34-38 - Stavros G. Kolliopoulos, Yannis Moysoglou:

The 2-valued case of makespan minimization with assignment constraints. 39-43 - Yang Gao, Ming Xu, Naijun Zhan, Lijun Zhang:

Model checking conditional CSL for continuous-time Markov chains. 44-50
Volume 113, Number 3, February 2013
- Hervé Fournier, Antoine Vigneron

:
A deterministic algorithm for fitting a step function to a weighted point-set. 51-54 - Panagiotis D. Alevizos:

An optimal algorithm for computing the non-trivial circuits of a union of iso-oriented rectangles. 55-59 - Mario Lamberger, Elmar Teufl:

Memoryless near-collisions, revisited. 60-66 - Paul Dütting, Monika Henzinger

, Ingmar Weber
:
Sponsored search, market equilibria, and the Hungarian Method. 67-73 - Maxime Crochemore

, Costas S. Iliopoulos, Tomasz Kociumaka
, Marcin Kubica, Jakub Pachocki, Jakub Radoszewski, Wojciech Rytter, Wojciech Tyczynski, Tomasz Walen
:
A note on efficient computation of all Abelian periods in a string. 74-77 - Kalpesh Kapoor, Himadri Nayak

:
On multiset of factors of a word. 78-80 - Tess Avitabile, Claire Mathieu, Laura H. Parkinson:

Online constrained optimization with recourse. 81-86 - Yunjian Wu:

An improvement on Vizing's conjecture. 87-88 - Raffaele Mosca:

Maximum weight independent sets in (P6, co-banner)-free graphs. 89-93 - Lech Duraj

:
A linear algorithm for 3-letter longest common weakly increasing subsequence. 94-99
Volume 113, Number 4, February 2013
- Stefan Kiefer:

BPA bisimilarity is EXPTIME-hard. 101-106 - Petr A. Golovach

, Pinar Heggernes
, Pim van 't Hof
, Daniël Paulusma
:
Choosability on H-free graphs. 107-110 - Sun-Mi Park, Ku-Young Chang, Dowon Hong

:
Parallel GF(3m) multiplier for trinomials. 111-115 - Tomoyuki Yamakami, Yuichi Kato:

The dissecting power of regular languages. 116-122 - Gregory Z. Gutin, Gabriele Muciaccia, Anders Yeo

:
(Non-)existence of polynomial kernels for the Test Cover problem. 123-126 - Xin Chen, Zhenzhen Xu, György Dósa, Xin Han, He Jiang:

Semi-online hierarchical scheduling problems with buffer or rearrangements. 127-131 - Yong-Jin Liu, Kai Tang

:
The complexity of geodesic Voronoi diagrams on triangulated 2-manifold surfaces. 132-136 - Xi Peng

, Zhang Yi, Xiao-Yong Wei
, Dezhong Peng, Yongsheng Sang:
Free-gram phrase identification for modeling Chinese text. 137-144 - Kamal Al-Bawani, Alexander Souza:

Buffer overflow management with class segregation. 145-150
Volume 113, Numbers 5-6, March 2013
- Giuseppe Ateniese

, Alfredo De Santis
, Anna Lisa Ferrara, Barbara Masucci
:
A note on time-bound hierarchical key assignment schemes. 151-155 - Luigi Acerbi, Alberto Dennunzio, Enrico Formenti

:
Surjective multidimensional cellular automata are non-wandering: A combinatorial proof. 156-159 - Sung-Il Pae:

Exact output rate of Peres's algorithm for random number generation. 160-164 - Sudipta Das, Lawrence Jenkins, Debasis Sengupta:

Loss ratio of the EDF scheduling policy with early discarding technique. 165-170 - George Barmpalias

, Rupert Hölzl, Andrew E. M. Lewis, Wolfgang Merkle:
Analogues of Chaitin's Omega in the computably enumerable sets. 171-178 - Marek Cygan

, Marcin Pilipczuk
:
Split Vertex Deletion meets Vertex Cover: New fixed-parameter and exact exponential-time algorithms. 179-182 - Romeo Rizzi

, Alexandru I. Tomescu
:
Ranking, unranking and random generation of extensional acyclic digraphs. 183-187 - Haiyan Yu, Yinfeng Xu, Tengyu Wu:

Online inventory replenishment scheduling of temporary orders. 188-192 - Jaroslaw Grytczuk

, Piotr Szafruga
, Michal Zmarz:
Online version of the theorem of Thue. 193-195 - Jelena Govorcin, Martin Knor, Riste Skrekovski

:
Line graph operation and small worlds. 196-200
Volume 113, Number 7, April 2013
- Fabrizio Luccio, Linda Pagli

:
Chain rotations: A new look at tree distance. 201-204 - Zahra Ahmadian, Mahmoud Salmasizadeh, Mohammad Reza Aref:

Desynchronization attack on RAPP ultralightweight authentication protocol. 205-209 - Taolue Chen

, Tingting Han, Marta Z. Kwiatkowska:
On the complexity of model checking interval-valued discrete time Markov chains. 210-216 - Lucy Small, Oliver Mason

:
Nash Equilibria for competitive information diffusion on trees. 217-219 - Yong Chen, An Zhang, Guangting Chen, Jianming Dong:

Approximation algorithms for parallel open shop scheduling. 220-224 - Michael Viderman:

LP decoding of codes with expansion parameter above 2/3. 225-228 - Osman Karaahmetoglu, Muharrem Tolga Sakalli, Ercan Bulus

, Ion Tutanescu:
A new method to determine algebraic expression of power mapping based S-boxes. 229-235 - Walter Didimo:

Density of straight-line 1-planar graph drawings. 236-240 - Jens M. Schmidt

:
A simple test on 2-vertex- and 2-edge-connectivity. 241-244 - Alessandro Barenghi

, Stefano Crespi-Reghizzi
, Dino Mandrioli, Matteo Pradella
:
Parallel parsing of operator precedence grammars. 245-249
Volume 113, Number 8, April 2013
- Li Guan, Jianping Li:

Coordination mechanism for selfish scheduling under a grade of service provision. 251-254 - Sizhong Zhou, Zhiren Sun, Hui Ye:

A toughness condition for fractional (k, m)-deleted graphs. 255-259 - Hao Liang, Jun-Ming Xu:

Minimum feedback arc set of m-free digraphs. 260-264 - Amit Kumar Dutta, Masud Hasan, M. Sohel Rahman

:
Prefix transpositions on binary and ternary strings. 265-270 - Qi Cheng

, Jincheng Zhuang:
On certain computations of Pisot numbers. 271-275 - Marcin Krzywkowski:

Trees having many minimal dominating sets. 276-279 - Lan Lin, Yixun Lin:

Machine scheduling with contiguous processing constraints. 280-284 - Arnaud Carayol, Zoltán Ésik:

The FC-rank of a context-free language. 285-287 - Ching-Lueh Chang:

Deterministic sublinear-time approximations for metric 1-median selection. 288-292 - Marcos Lordello Chaim

, Roberto Paulo Andrioli de Araujo:
An efficient bitwise algorithm for intra-procedural data-flow testing coverage. 293-300 - Gaoli Wang, Yanzhao Shen:

Preimage and pseudo-collision attacks on step-reduced SM3 hash function. 301-306
Volume 113, Number 9, May 2013
- Shailesh Vaya:

Round complexity of leader election and gossiping in bidirectional radio networks. 307-312 - Vadim V. Lozin

, Christopher Purcell
:
Boundary properties of the satisfiability problems. 313-317 - Leo van Iersel, Simone Linz

:
A quadratic kernel for computing the hybridization number of multiple trees. 318-323 - Aleksandr Cariow

, Galina Cariowa
:
An algorithm for fast multiplication of sedenions. 324-331 - Nina Brandstätter, Wilfried Meidl, Arne Winterhof

:
Addendum to Sidel'nikov sequences over nonprime fields. 332-336 - Manuel Schmitt, Rolf Wanka

:
Exploiting independent subformulas: A faster approximation scheme for #k-SAT. 337-344 - Brian C. Dean, Raghuveer Mohan:

Building Cartesian trees from free trees with k leaves. 345-349 - Ben C. Moszkowski:

Interconnections between classes of sequentially compositional temporal formulas. 350-353 - Haihui Zhang:

Corrigendum to "On 3-choosability of planar graphs with neither adjacent triangles nor 5-, 6- and 9-cycles" [Information Processing Letters 110 (24) (2010) 1084-1087]. 354-356
Volume 113, Numbers 10-11, May - June 2013
- Yoo-Jin Baek:

Scalar recoding and regular 2w-ary right-to-left EC scalar multiplication algorithm. 357-360 - Tiziana Calamoneri

:
Optimal L(δ1, δ2, 1)-labeling of eight-regular grids. 361-364 - Saïd Yahiaoui

, Yacine Belhoul, Mohammed Haddad, Hamamache Kheddouci:
Self-stabilizing algorithms for minimal global powerful alliance sets in graphs. 365-370 - Amihood Amir, Haim Paryenty, Liam Roditty:

On the hardness of the Consensus String problem. 371-374 - Chandrashekhar Meshram, Suchitra A. Meshram:

An identity-based cryptographic model for discrete logarithm and integer factoring based cryptosystem. 375-380 - Javier Esparza

, Andreas Gaiser, Stefan Kiefer:
A strongly polynomial algorithm for criticality of branching processes and consistency of stochastic context-free grammars. 381-385 - Qingxuan Yang, John A. Ellis, Khalegh Mamakani, Frank Ruskey

:
In-place permuting and perfect shuffling using involutions. 386-391 - Pawel Morawiecki, Marian Srebrny:

A SAT-based preimage analysis of reduced Keccak hash functions. 392-397 - Aleksandar Ilic:

Efficient algorithm for the vertex connectivity of trapezoid graphs. 398-404
Volume 113, Number 12, June 2013
- Jun Feng

, Xueming Wang, Hong Sun
:
Efficiently computable endomorphism for genus 3 hyperelliptic curve cryptosystems. 405-408 - Alexander Kantor, Kobbi Nissim

:
Attacks on statistical databases: The highly noisy case. 409-413 - Igor E. Shparlinski

:
Correcting noisy exponentiation black-boxes modulo a prime. 414-417 - Arpita Maitra, Goutam Paul:

Eavesdropping in semiquantum key distribution protocol. 418-422 - Ferhat Karakoç

, Hüseyin Demirci
, A. Emre Harmanci:
Biclique cryptanalysis of LBlock and TWINE. 423-429 - Marcin Kubica, Tomasz Kulczynski, Jakub Radoszewski, Wojciech Rytter, Tomasz Walen

:
A linear time algorithm for consecutive permutation pattern matching. 430-433 - Hongyang Sun

, Rui Fan:
Improved semi-online makespan scheduling with a reordering buffer. 434-439 - Dekel Tsur

:
Top-k document retrieval in optimal space. 440-443 - Debashis Ghosh

, Lakshmi Kanta Dey
:
A new upper bound on the parameters of quasi-symmetric designs. 444-446 - Marek Karpinski, Andrzej Lingas, Dzmitry Sledneu:

Optimal cuts and partitions in tree metrics in polynomial time. 447-451 - Eddie Cheng

, László Lipták, Daniel E. Steffy:
Strong local diagnosability of (n, k)(n, k)-star graphs and Cayley graphs generated by 2-trees with missing edges. 452-456
Volume 113, Number 13, July 2013
- Yuval Filmus:

Inequalities on submodular functions via term rewriting. 457-464 - Long Wan, Xiaofang Deng, Zhiyi Tan:

Inefficiency of Nash equilibria with parallel processing policy. 465-469 - Muhammad Rashed Alam, M. Sohel Rahman

:
A divide and conquer approach and a work-optimal parallel algorithm for the LIS problem. 470-476 - Edith Elkind, James B. Orlin

:
On the hardness of finding subsets with equal average. 477-480 - Jianhua Tu

, Fengmei Yang:
The vertex cover P3P3 problem in cubic graphs. 481-485 - Yuan Feng

, Lijun Zhang:
A tighter bound for the self-stabilization time in Herman's algorithm. 486-488 - Riadh Khennoufa, Hamida Seba, Hamamache Kheddouci:

Edge coloring total k-labeling of generalized Petersen graphs. 489-494 - Laurent Alonso, Edward M. Reingold:

Analysis of Boyer and Moore's MJRTY algorithm. 495-497 - Daniel Rotter, Jens Vygen:

d-dimensional arrangement revisited. 498-505
Volume 113, Numbers 14-16, July - August 2013
- Leandro Soares de Sousa, Julius Cesar Barreto Leite, Orlando Loques:

Green data centers: Using hierarchies for scalable energy efficiency in large web clusters. 507-515 - Július Czap

:
A note on total colorings of 1-planar graphs. 516-517 - Danny Z. Chen, Haitao Wang:

A note on searching line arrangements and applications. 518-521 - Abishek Gopalan, Srinivasan Ramasubramanian:

A counterexample for the proof of implication conjecture on independent spanning trees. 522-526 - Jung-Heum Park

, Insung Ihm:
Single-source three-disjoint path covers in cubes of connected graphs. 527-532 - Xiang-Jun Li

, Jun-Ming Xu:
Generalized measures of fault tolerance in exchanged hypercubes. 533-537 - Emanuele Giaquinta

, Szymon Grabowski
:
New algorithms for binary jumbled pattern matching. 538-542 - Ali Çivril

:
A note on the hardness of sparse approximation. 543-545 - John M. Hitchcock

, Elvira Mayordomo
:
Base invariance of feasible dimension. 546-551 - J. Mark Keil, Dinabandhu Pradhan

:
Computing a minimum outer-connected dominating set for the class of chordal graphs. 552-561 - Vasin Suttichaya, Pattarasinee Bhattarakosol:

Solving the learning parity with noise's open question. 562-566 - Qichun Wang, Chik How Tan:

A new method to construct Boolean functions with good cryptographic properties. 567-571 - Javier Herranz

, Alexandre Ruiz, Germán Sáez:
Sharing many secrets with computational provable security. 572-579 - Ji-Jian Chin

, Syh-Yuan Tan, Swee-Huay Heng
, Raphael C.-W. Phan
:
On the security of a modified Beth identity-based identification scheme. 580-583 - Beate Bollig, Michael Capelle:

Priority functions for the approximation of the metric TSP. 584-591
Volume 113, Number 17, August 2013
- Ran Ma, Jinjiang Yuan:

Online scheduling on a single machine with rejection under an agreeable condition to minimize the total completion time plus the total rejection cost. 593-598 - Parvathi Rangasamy, Muhammad Akram

, S. Thilagavathi:
Intuitionistic fuzzy shortest hyperpath in a network. 599-603 - Golnaz Badkobeh, Gabriele Fici

, Steve Kroon
, Zsuzsanna Lipták
:
Binary jumbled string matching for highly run-length compressible texts. 604-608 - Jianfeng Ren, Donglei Du

, Dachuan Xu
:
The complexity of two supply chain scheduling problems. 609-612 - Toufik Mansour

, Vincent Vajnovszki:
Efficient generation of restricted growth words. 613-616 - Shmuel T. Klein

:
On the connection between Hamming codes, Heapsort and other methods. 617-620 - Qi Chen, Dingyi Pei, Chunming Tang, Gansen Zhao:

Efficient integer span program for hierarchical threshold access structure. 621-627 - D. R. Simões, Jaime Portugheis, Valdemar Cardoso da Rocha Jr.

:
Universal homophonic coding scheme using differential encoding and interleaving. 628-633 - Linzhen Lu, Shaozhen Chen:

A compress slide attack on the full GOST block cipher. 634-639 - Jinsoo Oh, Jin Kim, Byung Ro Moon:

On the inequivalence of bilinear algorithms for 3×33×3 matrix multiplication. 640-645 - Shinya Fujita, Linda M. Lesniak:

Revisit of Erdős-Gallai's theorem on the circumference of a graph. 646-648
Volume 113, Number 18, September 2013
- Flavia Bonomo, Monia Giandomenico, Fabrizio Rossi

:
A note on the Cornaz-Jost transformation to solve the graph coloring problem. 649-652 - Yan-Hong Zhang, Wei Hao, Tao Xiang:

Independent spanning trees in crossed cubes. 653-658 - Yingqian Wang

, Jinghan Xu:
Planar graphs with cycles of length neither 4 nor 6 are (2, 0, 0)(2, 0, 0)-colorable. 659-663 - Yun Feng, Wensong Lin:

A concise proof for total coloring subcubic graphs. 664-665 - Olaf Beyersdorff

, Nicola Galesi, Massimo Lauria
:
A characterization of tree-like Resolution size. 666-671 - Y. Asnath Victy Phamila, Ramachandran Amutha:

Low complexity energy efficient very low bit-rate image compression scheme for wireless sensor network. 672-676 - Cui Yu, Xiaofan Yang, Jing Zhang, Li He:

Routing and wavelength assignment for 3-ary n-cube communication patterns in linear array optical networks for n communication rounds. 677-680 - Bart Steyaert, Dieter Claeys, Herwig Bruneel:

The burst factor and its impact on buffer performance. 681-684 - Tomás Feder, Carlos S. Subi:

Edge-coloring almost bipartite multigraphs. 685-689 - Mikhail J. Atallah, Elena Grigorescu

, Yi Wu:
A lower-variance randomized algorithm for approximate string matching. 690-692
Volume 113, Numbers 19-21, September - October 2013
- Emanuele Giaquinta

, Szymon Grabowski
, Kimmo Fredriksson:
Approximate pattern matching with k-mismatches in packed text. 693-697 - Ondrej Cepek

, Petr Kucera
, Stanislav Kurik:
Boolean functions with long prime implicants. 698-703 - Benqiu Dai, Wensong Lin:

On (s, t)(s, t)-relaxed L(2, 1)L(2, 1)-labelings of the square lattice. 704-709 - Qiaoping Guo, Shengjia Li, Gaokui Xu, Yubao Guo:

Notes on vertex pancyclicity of graphs. 710-713 - Daniel Lokshtanov, Neeldhara Misra, Saket Saurabh:

Imbalance is fixed parameter tractable. 714-718 - Apoloniusz Tyszka

:
Conjecturally computable functions which unconditionally do not have any finite-fold Diophantine representation. 719-722 - Lei Wang, Xiaodong Wang, Yingjie Wu, Daxin Zhu

:
A dynamic programming solution to a generalized LCS problem. 723-728 - Markus L. Schmid:

A note on the complexity of matching patterns with variables. 729-733 - Min-Sheng Lin, Chao-Chun Ting:

Computing K-terminal reliability of d-trapezoid graphs. 734-738 - Ilker Kocabas, Bekir Taner Dinçer:

A new statistical strategy for pooling: ELI. 739-746 - Benjamin Doerr:

Improved approximation algorithms for the Min-Max Selecting Items problem. 747-749 - Danupon Nanongkai:

Simple FPTAS for the subset-sums ratio problem. 750-753 - Enrique Gerstl

, Gur Mosheiov:
An improved algorithm for due-window assignment on parallel identical machines with unit-time jobs. 754-759 - Xiang-Jun Li

, Jun-Ming Xu:
Edge-fault tolerance of hypercube-like networks. 760-763 - Riham AlTawy, Aleksandar Kircanski, Amr M. Youssef:

Second order collision for the 42-step reduced DHA-256 hash function. 764-770 - Volker Turau:

Self-stabilizing algorithms for efficient sets of graphs and trees. 771-776 - Biswajit Sanyal, Prosenjit Gupta, Subhashis Majumder:

Colored top-K range-aggregate queries. 777-784 - Andrzej Dudek, Alan M. Frieze

, Andrzej Rucinski
, Matas Sileikis
:
Approximate counting of regular hypergraphs. 785-788 - Liaojun Pang

, Huixian Li, Qingqi Pei, Yumin Wang:
Improvement on Meshram et al.'s ID-based cryptographic mechanism. 789-792 - Zahra Farzanyar, Mohammad Reza Kangavari, Nick Cercone:

P2P-FISM: Mining (recently) frequent item sets from distributed data streams over P2P network. 793-798 - Arash Ahadi, Ali Dehghan

:
The complexity of the proper orientation number. 799-803 - Hailiang Zhang

, Rongfei Lin, Guanglong Yu:
The largest matching root of unicyclic graphs. 804-806 - Dragisa Zunic

, Jovisa D. Zunic:
Shape ellipticity based on the first Hu moment invariant. 807-810 - Pinhui Ke, Wanghong Yu, Zuling Chang:

A note on binary sequence pairs with two-level correlation. 811-814 - B. S. Panda, Subhabrata Paul:

A linear time algorithm for liar's domination problem in proper interval graphs. 815-822 - Bo Ning

:
Fan-type degree condition restricted to triples of induced subgraphs ensuring Hamiltonicity. 823-826 - Orhun Kara

:
Square reflection cryptanalysis of 5-round Feistel networks with permutations. 827-831 - Andrew V. Sokolov

, A. V. Drac:
The linked list representation of n LIFO-stacks and/or FIFO-queues in the single-level memory. 832-835 - Hervé Hocquard, Pascal Ochem, Petru Valicov:

Strong edge-colouring and induced matchings. 836-843 - Toshihiro Fujito, Takayoshi Sakamaki:

How to guard a graph against tree moves. 844-847
Volume 113, Numbers 22-24, November - December 2013
- R. Krithika

, N. S. Narayanaswamy:
Another disjoint compression algorithm for odd cycle transversal. 849-851 - Maw-Shang Chang

, Chuang-Chieh Lin
, Peter Rossmanith:
Testing consistency of quartet topologies: a parameterized approach. 852-857 - Daniel W. Cranston

, Suil O
:
Hamiltonicity in connected regular graphs. 858-860 - Gerard Jennhwa Chang, Chan-Wei Chang, David Kuo, Sheung-Hung Poon

:
Algorithmic aspect of stratified domination in graphs. 861-865 - Deshuai Dong, Xue Zhang, Longjiang Qu, Shaojing Fu:

A note on vectorial bent functions. 866-870 - Chan-Su Shin

:
A note on minimum-sum coverage by aligned disks. 871-875 - Yuhuan Chen, Chenfu Yi, Dengyu Qiao:

Improved neural solution for the Lyapunov matrix equation based on gradient search. 876-881 - Masud Hasan:

On fixed size projection of simplicial polyhedra. 882-887 - Satya Gautam Vadlamudi, Sandip Aine, P. P. Chakrabarti:

Incremental Beam search. 888-893 - Ionut Tutu:

Comorphisms of structured institutions. 894-900 - Guy Avni, Orna Kupferman:

When does abstraction help? 901-905 - Sylvain Guillemot, Dániel Marx

:
A faster FPT algorithm for Bipartite Contraction. 906-912 - David Galindo

:
A note on an IND-CCA2 secure Paillier-based cryptosystem. 913-914 - Gregory Kucherov

, Lilla Tóthmérész
, Stéphane Vialette:
On the combinatorics of suffix arrays. 915-920 - Carola Winzen

:
Direction-reversing quasi-random rumor spreading with restarts. 921-926

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














