Stop the war!
Остановите войну!
for scientists:
default search action
Information Processing Letters, Volume 111
Volume 111, Number 1, December 2010
- Chin-Yang Lin, Ting-Wei Hou:
An efficient approach to cyclic reference counting based on a coarse-grained search. 1-10 - Pascal Schweitzer, Patrick Schweitzer:
Connecting face hitting sets in planar graphs. 11-15 - Harry Buhrman, David García-Soriano, Arie Matsliah:
Learning parities in the mistake-bound model. 16-21 - Jin-Xin Zhou, Yan-Quan Feng:
Super-connected but not super edge-connected graphs. 22-25 - Chenghua Li, Xinfang Zhang, H. Jin, Wen Xiang:
E-passport EAC scheme based on Identity-Based Cryptography. 26-30 - Jessen T. Havill:
Online malleable job scheduling for m<=3. 31-35 - Xindong Zhang, Juan Liu, Xing Chen, Jixiang Meng:
Domination number of Cartesian products of directed cycles. 36-39 - Chi Zhang:
An improved lower bound on query complexity for quantum PAC learning. 40-45 - Jean Marcel Pallo:
Root-restricted Kleenean rotations. 46-50
Volume 111, Number 2, December 2010
- Juliano B. Lima, Daniel Panario, Ricardo M. Campello de Souza:
Public-key encryption based on Chebyshev polynomials over GF(q). 51-56 - Akash Lal, G. Ramalingam:
Reference count analysis with shallow aliasing. 57-63 - Daniel Binkele-Raible, Henning Fernau, Serge Gaspers, Mathieu Liedloff:
Exact exponential-time algorithms for finding bicliques. 64-67 - Luca Aceto, Anna Ingólfsdóttir, Joshua Sack:
Resource bisimilarity and graded bisimilarity coincide. 68-76 - Byung-Cheon Choi, Joseph Y.-T. Leung, Michael L. Pinedo:
A note on makespan minimization in proportionate flow shops. 77-81 - Haifeng Qian, Shouhuai Xu:
Non-interactive multisignatures in the plain public-key model with efficient verification. 82-89 - Yiyuan Luo, Xuejia Lai, Zheng Gong:
Pseudorandomness analysis of the (extended) Lai-Massey scheme. 90-96 - Abdel Aziz Farrag:
Developing fault-tolerant distributed loops. 97-101
Volume 111, Number 3, January 2011
- Matthew J. Katz, Gila Morgenstern:
Settling the bound on the rectilinear link radius of a simple rectilinear polygon. 103-106 - Zoltán Ésik:
An undecidable property of context-free linear orders. 107-109 - Ján Katrenic, Ingo Schiermeyer:
Improved approximation bounds for the minimum rainbow subgraph problem. 110-114 - XueLin Xu, Zongsheng Gao, Ke Xu:
A tighter upper bound for random MAX 2-SAT. 115-119 - Van Bang Le, Nguyen Ngoc Tuy:
A good characterization of squares of strongly chordal split graphs. 120-123 - Xin Zhang, Jianliang Wu:
On edge colorings of 1-planar graphs. 124-128 - Rafael M. Duarte, Alexandre Mota, Augusto Sampaio:
Introducing concurrency in sequential Java via laws. 129-134 - Jae-Yoon Jung, Chang-Ho Chin, Jorge Cardoso:
An entropy-based uncertainty measure of process models. 135-141 - Fedor V. Fomin, Petr A. Golovach, Erik Jan van Leeuwen:
Spanners of bounded degree graphs. 142-144 - Mariano Zelke:
Intractability of min- and max-cut in streaming graphs. 145-150
Volume 111, Number 4, January 2011
- Beate Bollig, Marc Gillé:
Randomized OBDDs for the most significant bit of multiplication need exponential space. 151-155 - Ruilin Li, Bing Sun, Chao Li, Jianxiong You:
Differential Fault Analysis on SMS4 using a single fault. 156-163 - Martin Kochol, Nad'a Krivonáková, Silvia Smejová, Katarína Sranková:
Matrix reduction in a combinatorial computation. 164-168 - Tomás Feder, Carlos S. Subi:
Maximum gap labelings of graphs. 169-173 - Gur Mosheiov:
Proportionate flowshops with general position-dependent processing times. 174-177 - Paul Dütting, Monika Henzinger, Ingmar Weber:
Offline file assignments for online load balancing. 178-183 - Eyal Even-Dar, Asaf Shapira:
A note on maximizing the spread of influence in social networks. 184-187 - Erjie Yang, Xiaofan Yang, Qiang Dong, Jing Li:
Conditional diagnosability of hypermeshes under the comparison model. 188-193 - Sergio Arévalo, Ernesto Jiménez, Mikel Larrea, Luis Mengual:
Communication-efficient and crash-quiescent Omega with unknown membership. 194-199
Volume 111, Number 5, February 2011
- Taehyung Lee, Joong Chae Na, Kunsoo Park:
On-line construction of parameterized suffix trees for large alphabets. 201-207 - Bertrand M. T. Lin, F. J. Hwang:
Total completion time minimization in a 2-stage differentiation flowshop with fixed sequences per job type. 208-212 - Anna Gál, Jing-Tang Jang:
The size and depth of layered Boolean circuits. 213-217 - Hiroki Morizumi:
Improved approximation algorithms for minimum AND-circuits problem via k-set cover. 218-221 - Stephan Dominique Andres, Winfried Hochstättler:
The game chromatic number and the game colouring number of classes of oriented cactuses. 222-226 - Benjamin Doerr, Mahmoud Fouz:
Quasi-random rumor spreading: Reducing randomness can be costly. 227-230 - Francesco M. Malvestuto, Mauro Mezzini, Marina Moscarini:
Computing simple-path convex hulls in hypergraphs. 231-234 - Xie-Bin Chen:
Parallel construction of optimal independent spanning trees on Cartesian product of complete graphs. 235-238 - Pilu Crescenzi, Miriam Di Ianni, Andrea Marino, Donatella Merlini, Gianluca Rossi, Paola Vocca:
Smooth movement and Manhattan path based Random Waypoint mobility. 239-246 - Kishan Chand Gupta, Yassir Nawaz, Guang Gong:
Upper bound for algebraic immunity on a subclass of Maiorana McFarland class of bent functions. 247-249
Volume 111, Number 6, February 2011
- N. S. Narayanaswamy, C. R. Subramanian:
Dominating set based exact algorithms for 3-coloring. 251-255 - Yong Zhang, Weiguo Zhang, Weijun Xu, Hongyi Li:
A risk-reward model for the on-line leasing of depreciable equipment. 256-261 - Iratxe Soraluze Arriola, Roberto Cortiñas, Alberto Lafuente, Mikel Larrea, Felix C. Freiling:
Communication-efficient failure detection and consensus in omission environments. 262-268 - Guofeng Yan, Jianxin Wang, Shuhong Chen:
Performance analysis for (X, S)-bottleneck cell in large-scale wireless networks. 269-277 - Francisco Ortin, Miguel García:
Union and intersection types to support both dynamic and static typing. 278-286 - Anna Fiedorowicz:
Acyclic edge colourings of graphs with the number of edges linearly bounded by the number of vertices. 287-290 - Maxime Crochemore, German Tischler:
Computing Longest Previous non-overlapping Factors. 291-295 - Guy Even, Guy Kortsarz, Zeev Nutov:
A 1.5-approximation algorithm for augmenting edge-connectivity of a graph from 1 to 2. 296-300
Volume 111, Number 7, March 2011
- Heeheon Kim, Yookun Cho:
A new fair scheduling algorithm for periodic tasks on multiprocessors. 301-309 - Paolo Boldi, Sebastiano Vigna:
E=I+T: The internal extent formula for compacted tries. 310-313 - Dustin Moody:
Using 5-isogenies to quintuple points on elliptic curves. 314-317 - Yung-Hsing Peng, Chang-Biau Yang, Chiou-Ting Tseng, Chiou-Yi Hor:
The indexing for one-dimensional proportionally-scaled strings. 318-322 - Raphaël Clifford, Alexandru Popa:
Maximum subset intersection. 323-325 - Therese Biedl, Stephane Durocher, Holger H. Hoos, Shuang Luan, Jared Saia, Maxwell Young:
A note on improving the performance of approximation algorithms for radiation therapy. 326-333 - Moonju Park:
Comments on "Generalized rate monotonic schedulability bounds using relative period ratios". 334-337 - Martin Lange:
P-hardness of the emptiness problem for visibly pushdown languages. 338-341 - Adam Roman:
The NP-completeness of the Road Coloring Problem. 342-347 - Liyu Zhang:
Proof system representations of degrees of disjoint NP-pairs. 348-351
Volume 111, Number 8, March 2011
- T. Shafiei, Mohammad Reza Hoseiny Farahabady, Ali Movaghar, Hamid Sarbazi-Azad:
On pancyclicity properties of OTIS-mesh. 353-359 - Meijie Ma, Liying Zhu:
The super connectivity of exchanged hypercubes. 360-364 - Satoshi Hanamura, Shigeki Iwata:
Posets with seven linear extensions sortable by three comparisons. 365-369 - Jing Li, Shiying Wang, Di Liu:
Pancyclicity of ternary n-cube networks under the conditional fault model. 370-374 - Ping-Ying Tsai:
A note on an optimal result on fault-tolerant cycle-embedding in alternating group graphs. 375-378 - Jehn-Ruey Jiang:
Nondominated local coteries for resource allocation in grids and clouds. 379-384 - Petros Drineas, Anastasios Zouzias:
A note on element-wise matrix sparsification via a matrix-valued Bernstein inequality. 385-389 - Yin Li, Gongliang Chen, Jianhua Li:
Speedup of bit-parallel Karatsuba multiplier in GF(2m) generated by trinomials. 390-394 - Ha Quang Minh:
The regularized least squares algorithm and the problem of learning halfspaces. 395-401
Volume 111, Number 9, April 2011
- Sizhong Zhou, Jiashang Jiang:
Toughness and (a, b, k)-critical graphs. 403-407 - Luca Aceto, David de Frutos-Escrig, Carlos Gregorio-Rodríguez, Anna Ingólfsdóttir:
Complete and ready simulation semantics are not finitely based over BCCSP, even with a singleton alphabet. 408-413 - Dragana Bajic, Alister G. Burr:
Comments on "Integer SEC-DED codes for low power communications" [Inform. Process. Lett. 110 (2010) 518-520]. 414-415 - Fan Yang, Xiangwen Li:
Nowhere-zero 3-flows in dihedral Cayley graphs. 416-419 - Narad Rampersad, Jeffrey O. Shallit, Ming-wei Wang:
Inverse star, borders, and palstars. 420-422 - Xiao Min, Jing Liu, Yuqing Wang:
Optimal semi-online algorithms for scheduling problems with reassignment on two identical machines. 423-428 - Philippe Moser:
A zero-one SUBEXP-dimension law for BPP. 429-432 - Madars Virza:
Sensitivity versus block sensitivity of Boolean functions. 433-435 - Tomás Kulich, Miroslava Kemenová:
On the paper of Pascal Schweitzer concerning similarities between incompressibility methods and the Lovász Local Lemma. 436-439 - Min Gao, Zhongfu Wu, Feng Jiang:
Userrank for item-based collaborative filtering recommendation. 440-446 - Ajay D. Kshemkalyani:
Repeated detection of conjunctive predicates in distributed executions. 447-452
Volume 111, Number 10, April 2011
- Javier Herranz, Fabien Laguillaumie, Carla Ràfols:
Relations between semantic security and anonymity in identity-based encryption. 453-460 - Xu An Wang, Jian Weng, Xiaoyuan Yang, Yanjiang Yang:
Cryptanalysis of an identity based broadcast encryption scheme without random oracles. 461-464 - Yusuke Matsumoto, Naoyuki Kamiyama, Keiko Imai:
An approximation algorithm dependent on edge-coloring number for minimum maximal matching problem. 465-468 - Fanica Gavril:
Algorithms for induced biclique optimization problems. 469-473 - Jaechul Sung:
Differential cryptanalysis of eight-round SEED. 474-478 - Klaus Jansen, Roberto Solis-Oba:
A simple OPT+1 algorithm for cutting stock under the modified integer round-up property assumption. 479-482 - Carles Martínez-García, Guillermo Navarro-Arribas, Joan Borrell:
Fuzzy Role-Based Access Control. 483-487 - Tiancheng Lou, Xiaoming Sun, Christophe Tartary:
Bounds and trade-offs for Double-Base Number Systems. 488-493 - Chunming Tang, Maozhi Xu, Yanfeng Qi:
Faster pairing computation on genus 2 hyperelliptic curves. 494-499 - Daniel Kirsten, Karin Quaas:
Recognizability of the support of recognizable series over the semiring of the integers is undecidable. 500-502
Volume 111, Number 11, May 2011
- Meijiao Duan, Jing Xu:
An efficient location-based compromise-tolerant key management scheme for sensor networks. 503-507 - Anne Berry, Romain Pogorelcnik:
A simple algorithm to generate the minimal separators and the maximal cliques of a chordal graph. 508-511 - Jean-Philippe Aumasson, Raphael C.-W. Phan:
On the cryptanalysis of the hash function Fugue: Partitioning and inside-out distinguishers. 512-515 - Szymon Grabowski, Simone Faro, Emanuele Giaquinta:
String matching with inversions and translocations in linear average time (most of the time). 516-520 - Alberto Apostolico, Manuel Barbares, Cinzia Pizzi:
Speedup for a periodic subgraph miner. 521-523 - Xixian Han, Jianzhong Li, Donghua Yang:
Supporting early pruning in top-k query processing on massive data. 524-532 - Sven Oliver Krumke, Clemens Thielen:
Minimum cost flows with minimum quantities. 533-537 - Xiaozhou Li, Atri Rudra, Ram Swaminathan:
Flexible coloring. 538-540 - Toufik Mansour, Ghalib Nassar, Vincent Vajnovszki:
Loop-free Gray code algorithm for the e-restricted growth functions. 541-544 - Li Yan, Marek Chrobak:
Approximation algorithms for the Fault-Tolerant Facility Placement problem. 545-549 - Víctor Lavín Puente:
Learning a subclass of k-quasi-Horn formulas with membership queries. 550-555
Volume 111, Number 12, June 2011
- Zheng-Zhong Du, Jun-Ming Xu:
A note on cycle embedding in hypercubes with faulty vertices. 557-560 - Wujun Zhou, Jianxi Fan, Xiaohua Jia, Shukui Zhang:
The spined cube: A new hypercube variant with smaller diameter. 561-567 - Alexander Thomasian, Jun Xu:
X-code double parity array operation with two disk failures. 568-574 - Shisheng Li, Jinjiang Yuan, Baoqiang Fan:
Unbounded parallel-batch scheduling with family jobs and delivery coordination. 575-582 - Sajjad Mahmood, Azhar Khan:
An industrial study on the importance of software component documentation: A system integratorʼs perspective. 583-590 - Ruy Fabila Monroy, Clemens Huemer, Dolores Lara:
A combinatorial property on angular orders of plane point sets. 591-594 - Takashi Saso, Kojiro Kobayashi, Atsuyoshi Nakamura:
On the possible patterns of inputs for block sorting in the Burrows-Wheeler transformation. 595-599 - Alan Joseph J. Caceres, Samantha Daley, John DeJesus, Michael Hintze, Diquan Moore, Katherine St. John:
Walks in phylogenetic treespace. 600-604 - Eugen Zalinescu:
Shorter strings containing all k-element permutations. 605-608 - Jianghan Zhu, Xiaomin Zhu, Jianqing Jiang:
Improving adaptivity and fairness of processing real-time tasks with QoS requirements on clusters through dynamic scheduling. 609-613 - Javier Esparza, Pierre Ganty, Stefan Kiefer, Michael Luttenberger:
Parikhʼs theorem: A simple and direct automaton construction. 614-619
Volume 111, Number 13, July 2011
- Feng Wang, Wensong Lin:
Group path covering and distance two labeling of graphs. 621-625 - Rob J. van Glabbeek, Ursula Goltz, Jens-Wolfhard Schicke:
Abstract processes of place/transition systems. 626-633 - Yongge Wang, Yvo Desmedt:
Edge-colored graphs with applications to homogeneous faults. 634-641 - Jeroen Ketema:
Counterexamples in infinitary rewriting with non-fully-extended rules. 642-646 - Yian Xu:
On acyclic edge coloring of toroidal graphs. 647-649 - Vincent Vajnovszki, Rémi Vernay:
Restricted compositions and permutations: From old to new Gray codes. 650-655 - Andrey Bogdanov, Kyoji Shibutani:
Analysis of 3-line generalized Feistel networks with double SD-functions. 656-660 - Han-Yu Lin, Chien-Lung Hsu, Shih-Kun Huang:
Improved convertible authenticated encryption scheme with provable security. 661-666 - Katarína Cechlárová, Eva Jelínková:
An efficient implementation of the equilibrium algorithm for housing markets with duplicate houses. 667-670
Volume 111, Number 14, July 2011
- Oren Weimann, David Peleg:
A note on exact distance labeling. 671-673 - Mikhail J. Atallah, Timothy W. Duket:
Pattern matching in the Hamming distance with thresholds. 674-677 - Wenming Zhang, Yinfeng Xu, Feifeng Zheng, Ming Liu:
Online algorithms for the general k-search problem. 678-682 - Jianhua Tu, Wenli Zhou:
A factor 2 approximation algorithm for the vertex cover P3 problem. 683-686