


default search action
Information Processing Letters, Volume 111
Volume 111, Number 1, December 2010
- Chin-Yang Lin, Ting-Wei Hou:
An efficient approach to cyclic reference counting based on a coarse-grained search. 1-10 - Pascal Schweitzer
, Patrick Schweitzer:
Connecting face hitting sets in planar graphs. 11-15 - Harry Buhrman, David García-Soriano
, Arie Matsliah:
Learning parities in the mistake-bound model. 16-21 - Jin-Xin Zhou
, Yan-Quan Feng
:
Super-connected but not super edge-connected graphs. 22-25 - Chenghua Li, Xinfang Zhang, H. Jin, Wen Xiang:
E-passport EAC scheme based on Identity-Based Cryptography. 26-30 - Jessen T. Havill:
Online malleable job scheduling for m<=3. 31-35 - Xindong Zhang, Juan Liu, Xing Chen, Jixiang Meng:
Domination number of Cartesian products of directed cycles. 36-39 - Chi Zhang:
An improved lower bound on query complexity for quantum PAC learning. 40-45 - Jean Marcel Pallo:
Root-restricted Kleenean rotations. 46-50
Volume 111, Number 2, December 2010
- Juliano B. Lima
, Daniel Panario
, Ricardo M. Campello de Souza:
Public-key encryption based on Chebyshev polynomials over GF(q). 51-56 - Akash Lal, G. Ramalingam:
Reference count analysis with shallow aliasing. 57-63 - Daniel Binkele-Raible, Henning Fernau
, Serge Gaspers, Mathieu Liedloff:
Exact exponential-time algorithms for finding bicliques. 64-67 - Luca Aceto, Anna Ingólfsdóttir, Joshua Sack
:
Resource bisimilarity and graded bisimilarity coincide. 68-76 - Byung-Cheon Choi
, Joseph Y.-T. Leung, Michael L. Pinedo:
A note on makespan minimization in proportionate flow shops. 77-81 - Haifeng Qian, Shouhuai Xu:
Non-interactive multisignatures in the plain public-key model with efficient verification. 82-89 - Yiyuan Luo, Xuejia Lai, Zheng Gong:
Pseudorandomness analysis of the (extended) Lai-Massey scheme. 90-96 - Abdel Aziz Farrag:
Developing fault-tolerant distributed loops. 97-101
Volume 111, Number 3, January 2011
- Matthew J. Katz, Gila Morgenstern:
Settling the bound on the rectilinear link radius of a simple rectilinear polygon. 103-106 - Zoltán Ésik:
An undecidable property of context-free linear orders. 107-109 - Ján Katrenic, Ingo Schiermeyer:
Improved approximation bounds for the minimum rainbow subgraph problem. 110-114 - XueLin Xu, Zongsheng Gao, Ke Xu:
A tighter upper bound for random MAX 2-SAT. 115-119 - Van Bang Le, Nguyen Ngoc Tuy:
A good characterization of squares of strongly chordal split graphs. 120-123 - Xin Zhang
, Jianliang Wu:
On edge colorings of 1-planar graphs. 124-128 - Rafael M. Duarte, Alexandre Mota, Augusto Sampaio:
Introducing concurrency in sequential Java via laws. 129-134 - Jae-Yoon Jung, Chang-Ho Chin
, Jorge Cardoso
:
An entropy-based uncertainty measure of process models. 135-141 - Fedor V. Fomin
, Petr A. Golovach
, Erik Jan van Leeuwen:
Spanners of bounded degree graphs. 142-144 - Mariano Zelke:
Intractability of min- and max-cut in streaming graphs. 145-150
Volume 111, Number 4, January 2011
- Beate Bollig, Marc Gillé:
Randomized OBDDs for the most significant bit of multiplication need exponential space. 151-155 - Ruilin Li, Bing Sun, Chao Li, Jianxiong You:
Differential Fault Analysis on SMS4 using a single fault. 156-163 - Martin Kochol, Nad'a Krivonáková, Silvia Smejová, Katarína Sranková:
Matrix reduction in a combinatorial computation. 164-168 - Tomás Feder, Carlos S. Subi:
Maximum gap labelings of graphs. 169-173 - Gur Mosheiov:
Proportionate flowshops with general position-dependent processing times. 174-177 - Paul Dütting, Monika Henzinger, Ingmar Weber
:
Offline file assignments for online load balancing. 178-183 - Eyal Even-Dar, Asaf Shapira:
A note on maximizing the spread of influence in social networks. 184-187 - Erjie Yang, Xiaofan Yang, Qiang Dong
, Jing Li:
Conditional diagnosability of hypermeshes under the comparison model. 188-193 - Sergio Arévalo
, Ernesto Jiménez
, Mikel Larrea
, Luis Mengual
:
Communication-efficient and crash-quiescent Omega with unknown membership. 194-199
Volume 111, Number 5, February 2011
- Taehyung Lee, Joong Chae Na, Kunsoo Park:
On-line construction of parameterized suffix trees for large alphabets. 201-207 - Bertrand M. T. Lin
, F. J. Hwang
:
Total completion time minimization in a 2-stage differentiation flowshop with fixed sequences per job type. 208-212 - Anna Gál, Jing-Tang Jang:
The size and depth of layered Boolean circuits. 213-217 - Hiroki Morizumi:
Improved approximation algorithms for minimum AND-circuits problem via k-set cover. 218-221 - Stephan Dominique Andres, Winfried Hochstättler:
The game chromatic number and the game colouring number of classes of oriented cactuses. 222-226 - Benjamin Doerr, Mahmoud Fouz:
Quasi-random rumor spreading: Reducing randomness can be costly. 227-230 - Francesco M. Malvestuto, Mauro Mezzini
, Marina Moscarini
:
Computing simple-path convex hulls in hypergraphs. 231-234 - Xie-Bin Chen:
Parallel construction of optimal independent spanning trees on Cartesian product of complete graphs. 235-238 - Pilu Crescenzi
, Miriam Di Ianni, Andrea Marino
, Donatella Merlini
, Gianluca Rossi
, Paola Vocca
:
Smooth movement and Manhattan path based Random Waypoint mobility. 239-246 - Kishan Chand Gupta, Yassir Nawaz, Guang Gong:
Upper bound for algebraic immunity on a subclass of Maiorana McFarland class of bent functions. 247-249
Volume 111, Number 6, February 2011
- N. S. Narayanaswamy, C. R. Subramanian:
Dominating set based exact algorithms for 3-coloring. 251-255 - Yong Zhang, Weiguo Zhang, Weijun Xu, Hongyi Li:
A risk-reward model for the on-line leasing of depreciable equipment. 256-261 - Iratxe Soraluze Arriola
, Roberto Cortiñas
, Alberto Lafuente, Mikel Larrea
, Felix C. Freiling:
Communication-efficient failure detection and consensus in omission environments. 262-268 - Guofeng Yan, Jianxin Wang, Shuhong Chen:
Performance analysis for (X, S)-bottleneck cell in large-scale wireless networks. 269-277 - Francisco Ortin
, Miguel García:
Union and intersection types to support both dynamic and static typing. 278-286 - Anna Fiedorowicz
:
Acyclic edge colourings of graphs with the number of edges linearly bounded by the number of vertices. 287-290 - Maxime Crochemore
, German Tischler:
Computing Longest Previous non-overlapping Factors. 291-295 - Guy Even, Guy Kortsarz, Zeev Nutov:
A 1.5-approximation algorithm for augmenting edge-connectivity of a graph from 1 to 2. 296-300
Volume 111, Number 7, March 2011
- Heeheon Kim, Yookun Cho:
A new fair scheduling algorithm for periodic tasks on multiprocessors. 301-309 - Paolo Boldi
, Sebastiano Vigna
:
E=I+T: The internal extent formula for compacted tries. 310-313 - Dustin Moody
:
Using 5-isogenies to quintuple points on elliptic curves. 314-317 - Yung-Hsing Peng, Chang-Biau Yang, Chiou-Ting Tseng, Chiou-Yi Hor:
The indexing for one-dimensional proportionally-scaled strings. 318-322 - Raphaël Clifford
, Alexandru Popa
:
Maximum subset intersection. 323-325 - Therese Biedl, Stephane Durocher, Holger H. Hoos
, Shuang Luan, Jared Saia, Maxwell Young:
A note on improving the performance of approximation algorithms for radiation therapy. 326-333 - Moonju Park:
Comments on "Generalized rate monotonic schedulability bounds using relative period ratios". 334-337 - Martin Lange:
P-hardness of the emptiness problem for visibly pushdown languages. 338-341 - Adam Roman:
The NP-completeness of the Road Coloring Problem. 342-347 - Liyu Zhang:
Proof system representations of degrees of disjoint NP-pairs. 348-351
Volume 111, Number 8, March 2011
- T. Shafiei, Mohammad Reza Hoseiny Farahabady
, Ali Movaghar
, Hamid Sarbazi-Azad:
On pancyclicity properties of OTIS-mesh. 353-359 - Meijie Ma
, Liying Zhu:
The super connectivity of exchanged hypercubes. 360-364 - Satoshi Hanamura, Shigeki Iwata:
Posets with seven linear extensions sortable by three comparisons. 365-369 - Jing Li, Shiying Wang, Di Liu:
Pancyclicity of ternary n-cube networks under the conditional fault model. 370-374 - Ping-Ying Tsai:
A note on an optimal result on fault-tolerant cycle-embedding in alternating group graphs. 375-378 - Jehn-Ruey Jiang:
Nondominated local coteries for resource allocation in grids and clouds. 379-384 - Petros Drineas
, Anastasios Zouzias:
A note on element-wise matrix sparsification via a matrix-valued Bernstein inequality. 385-389 - Yin Li, Gongliang Chen, Jianhua Li:
Speedup of bit-parallel Karatsuba multiplier in GF(2m) generated by trinomials. 390-394 - Ha Quang Minh
:
The regularized least squares algorithm and the problem of learning halfspaces. 395-401
Volume 111, Number 9, April 2011
- Sizhong Zhou, Jiashang Jiang:
Toughness and (a, b, k)-critical graphs. 403-407 - Luca Aceto, David de Frutos-Escrig
, Carlos Gregorio-Rodríguez
, Anna Ingólfsdóttir:
Complete and ready simulation semantics are not finitely based over BCCSP, even with a singleton alphabet. 408-413 - Dragana Bajic
, Alister G. Burr
:
Comments on "Integer SEC-DED codes for low power communications" [Inform. Process. Lett. 110 (2010) 518-520]. 414-415 - Fan Yang, Xiangwen Li:
Nowhere-zero 3-flows in dihedral Cayley graphs. 416-419 - Narad Rampersad, Jeffrey O. Shallit, Ming-wei Wang:
Inverse star, borders, and palstars. 420-422 - Xiao Min, Jing Liu, Yuqing Wang:
Optimal semi-online algorithms for scheduling problems with reassignment on two identical machines. 423-428 - Philippe Moser:
A zero-one SUBEXP-dimension law for BPP. 429-432 - Madars Virza:
Sensitivity versus block sensitivity of Boolean functions. 433-435 - Tomás Kulich, Miroslava Kemenová:
On the paper of Pascal Schweitzer concerning similarities between incompressibility methods and the Lovász Local Lemma. 436-439 - Min Gao
, Zhongfu Wu, Feng Jiang:
Userrank for item-based collaborative filtering recommendation. 440-446 - Ajay D. Kshemkalyani:
Repeated detection of conjunctive predicates in distributed executions. 447-452
Volume 111, Number 10, April 2011
- Javier Herranz
, Fabien Laguillaumie, Carla Ràfols
:
Relations between semantic security and anonymity in identity-based encryption. 453-460 - Xu An Wang
, Jian Weng
, Xiaoyuan Yang, Yanjiang Yang:
Cryptanalysis of an identity based broadcast encryption scheme without random oracles. 461-464 - Yusuke Matsumoto, Naoyuki Kamiyama, Keiko Imai:
An approximation algorithm dependent on edge-coloring number for minimum maximal matching problem. 465-468 - Fanica Gavril:
Algorithms for induced biclique optimization problems. 469-473 - Jaechul Sung
:
Differential cryptanalysis of eight-round SEED. 474-478 - Klaus Jansen, Roberto Solis-Oba:
A simple OPT+1 algorithm for cutting stock under the modified integer round-up property assumption. 479-482 - Carles Martínez-García, Guillermo Navarro-Arribas
, Joan Borrell
:
Fuzzy Role-Based Access Control. 483-487 - Tiancheng Lou, Xiaoming Sun
, Christophe Tartary:
Bounds and trade-offs for Double-Base Number Systems. 488-493 - Chunming Tang, Maozhi Xu, Yanfeng Qi:
Faster pairing computation on genus 2 hyperelliptic curves. 494-499 - Daniel Kirsten, Karin Quaas:
Recognizability of the support of recognizable series over the semiring of the integers is undecidable. 500-502
Volume 111, Number 11, May 2011
- Meijiao Duan, Jing Xu:
An efficient location-based compromise-tolerant key management scheme for sensor networks. 503-507 - Anne Berry, Romain Pogorelcnik:
A simple algorithm to generate the minimal separators and the maximal cliques of a chordal graph. 508-511 - Jean-Philippe Aumasson, Raphael C.-W. Phan
:
On the cryptanalysis of the hash function Fugue: Partitioning and inside-out distinguishers. 512-515 - Szymon Grabowski
, Simone Faro
, Emanuele Giaquinta
:
String matching with inversions and translocations in linear average time (most of the time). 516-520 - Alberto Apostolico, Manuel Barbares, Cinzia Pizzi:
Speedup for a periodic subgraph miner. 521-523 - Xixian Han, Jianzhong Li, Donghua Yang:
Supporting early pruning in top-k query processing on massive data. 524-532 - Sven Oliver Krumke, Clemens Thielen
:
Minimum cost flows with minimum quantities. 533-537 - Xiaozhou Li, Atri Rudra, Ram Swaminathan:
Flexible coloring. 538-540 - Toufik Mansour
, Ghalib Nassar, Vincent Vajnovszki:
Loop-free Gray code algorithm for the e-restricted growth functions. 541-544 - Li Yan, Marek Chrobak:
Approximation algorithms for the Fault-Tolerant Facility Placement problem. 545-549 - Víctor Lavín Puente
:
Learning a subclass of k-quasi-Horn formulas with membership queries. 550-555
Volume 111, Number 12, June 2011
- Zheng-Zhong Du, Jun-Ming Xu:
A note on cycle embedding in hypercubes with faulty vertices. 557-560 - Wujun Zhou, Jianxi Fan, Xiaohua Jia
, Shukui Zhang:
The spined cube: A new hypercube variant with smaller diameter. 561-567 - Alexander Thomasian, Jun Xu:
X-code double parity array operation with two disk failures. 568-574 - Shisheng Li, Jinjiang Yuan, Baoqiang Fan:
Unbounded parallel-batch scheduling with family jobs and delivery coordination. 575-582 - Sajjad Mahmood
, Azhar Khan:
An industrial study on the importance of software component documentation: A system integratorʼs perspective. 583-590 - Ruy Fabila Monroy, Clemens Huemer
, Dolores Lara:
A combinatorial property on angular orders of plane point sets. 591-594 - Takashi Saso, Kojiro Kobayashi, Atsuyoshi Nakamura
:
On the possible patterns of inputs for block sorting in the Burrows-Wheeler transformation. 595-599 - Alan Joseph J. Caceres, Samantha Daley, John DeJesus, Michael Hintze, Diquan Moore, Katherine St. John:
Walks in phylogenetic treespace. 600-604 - Eugen Zalinescu:
Shorter strings containing all k-element permutations. 605-608 - Jianghan Zhu, Xiaomin Zhu, Jianqing Jiang:
Improving adaptivity and fairness of processing real-time tasks with QoS requirements on clusters through dynamic scheduling. 609-613 - Javier Esparza
, Pierre Ganty, Stefan Kiefer, Michael Luttenberger:
Parikhʼs theorem: A simple and direct automaton construction. 614-619
Volume 111, Number 13, July 2011
- Feng Wang, Wensong Lin:
Group path covering and distance two labeling of graphs. 621-625 - Rob J. van Glabbeek, Ursula Goltz, Jens-Wolfhard Schicke:
Abstract processes of place/transition systems. 626-633 - Yongge Wang
, Yvo Desmedt:
Edge-colored graphs with applications to homogeneous faults. 634-641 - Jeroen Ketema:
Counterexamples in infinitary rewriting with non-fully-extended rules. 642-646 - Yian Xu:
On acyclic edge coloring of toroidal graphs. 647-649 - Vincent Vajnovszki, Rémi Vernay:
Restricted compositions and permutations: From old to new Gray codes. 650-655 - Andrey Bogdanov
, Kyoji Shibutani:
Analysis of 3-line generalized Feistel networks with double SD-functions. 656-660 - Han-Yu Lin, Chien-Lung Hsu, Shih-Kun Huang
:
Improved convertible authenticated encryption scheme with provable security. 661-666 - Katarína Cechlárová
, Eva Jelínková
:
An efficient implementation of the equilibrium algorithm for housing markets with duplicate houses. 667-670
Volume 111, Number 14, July 2011
- Oren Weimann
, David Peleg:
A note on exact distance labeling. 671-673 - Mikhail J. Atallah, Timothy W. Duket:
Pattern matching in the Hamming distance with thresholds. 674-677 - Wenming Zhang, Yinfeng Xu, Feifeng Zheng, Ming Liu
:
Online algorithms for the general k-search problem. 678-682 - Jianhua Tu
, Wenli Zhou:
A factor 2 approximation algorithm for the vertex cover P3 problem. 683-686 - Peter Nose:
Security weaknesses of authenticated key agreement protocols. 687-696 - Konstanty Junosza-Szaniawski
, Pawel Rzazewski
:
On the complexity of exact algorithm for L(2, 1)-labeling of graphs. 697-701 - Jinshan Zhang
, Heng Liang, Fengshan Bai:
Approximating partition functions of the two-state spin system. 702-710 - Manfred Schmidt-Schauß, David Sabel
, Elena Machkasova:
Counterexamples to applicative simulation and extensionality in non-deterministic call-by-need lambda-calculi with letrec. 711-716 - Sebastian Böcker
, Peter Damaschke:
Even faster parameterized cluster deletion and cluster editing. 717-721
Volume 111, Number 15, August 2011
- Debajyoti Bera:
A lower bound method for quantum circuits. 723-726 - Marek Cygan
, Lukasz Kowalik:
Channel assignment via fast zeta transform. 727-730 - Marek Adamczyk:
Improved analysis of the greedy algorithm for stochastic matching. 731-737 - Olivia Oanea:
Boundedness of adaptive nets is decidable. 738-743 - Qiang Tang
, Liqun Chen
:
Extended KCI attack against two-party key establishment protocols. 744-747 - Hervé Hocquard:
Graphs with maximum degree 6 are acyclically 11-colorable. 748-753 - Foto N. Afrati, Sara Cohen
, Gabriel M. Kuper:
On the complexity of tree pattern containment with arithmetic comparisons. 754-760 - Chen Yuan
, Haibin Kan:
Holographic reduction for some counting problems. 761-766 - Qian Wu, Qiuli Lu, Yingqian Wang:
(Δ+1)-total-colorability of plane graphs of maximum degree Δ≥6 with neither chordal 5-cycle nor chordal 6-cycle. 767-772
Volume 111, Number 16, August 2011
- Yong Zhang, Zhuo Chang, Francis Y. L. Chin, Hing-Fung Ting, Yung H. Tsin:
Uniformly inserting points on square grid. 773-779 - Chenfu Yi, Yuhuan Chen, Zhongliang Lu:
Improved gradient-based neural networks for online solution of Lyapunov matrix equation. 780-786 - Alberto Policriti
, Alexandru I. Tomescu
:
Counting extensional acyclic digraphs. 787-791 - S. Geetha
, V. Kabilan, S. P. Chockalingam, N. Kamaraj:
Varying radix numeral system based adaptive image steganography. 792-797 - Cuixia Miao, Yuzhong Zhang, Zhigang Cao:
Bounded parallel-batch scheduling on single and multi machines for deteriorating jobs. 798-803 - Matei David, Periklis A. Papakonstantinou, Anastasios Sidiropoulos:
How strong is Nisanʼs pseudo-random generator? 804-808 - Mengshi Li, W. J. Tang, Q. H. Wu, Jon R. Saunders:
Paired-bacteria optimiser - A simple and fast algorithm. 809-813 - Fedor V. Fomin
, Daniel Lokshtanov, Venkatesh Raman, Saket Saurabh:
Subexponential algorithms for partial cover problems. 814-818 - Giorgio Lucarelli
, Ioannis Milis:
Improved approximation algorithms for the Max Edge-Coloring problem. 819-823
Volume 111, Number 17, September 2011
- Christos Koukouvinos, Veronika Pillwein, Dimitris E. Simos, Zafeirakis Zafeirakopoulos
:
On the average complexity for the verification of compatible sequences. 825-830 - Haifeng Xu, Lin Chen
, Deshi Ye, Guochuan Zhang
:
Scheduling on two identical machines with a speed-up resource. 831-835 - Jianfeng Hou, Nicolas Roussel, Jianliang Wu:
Acyclic chromatic index of planar graphs with triangles. 836-840 - Hoda Taheri
, Peyman Neamatollahi
, Mahmoud Naghibzadeh
:
A hybrid token-based distributed mutual exclusion algorithm using wraparound two-dimensional array logical topology. 841-847 - Alan M. Frieze
, Páll Melsted
:
Randomly coloring simple hypergraphs. 848-853 - Domingo Gómez
, Jaime Gutierrez
, Álvar Ibeas:
On the linear complexity of the Naor-Reingold sequence. 854-856 - Yu Zong, Guandong Xu, Ping Jin, Yanchun Zhang, Enhong Chen:
HC_AB: A new heuristic clustering algorithm based on Approximate Backbone. 857-863 - Rena Bakhshi
, Jörg Endrullis
, Wan J. Fokkink
, Jun Pang:
Fast leader election in anonymous rings with bounded expected delay. 864-870 - Weifeng Gao, Sanyang Liu:
Improved artificial bee colony algorithm for global optimization. 871-882
Volume 111, Number 18, September 2011
- Zhenfu Cao
, Ivan Visconti, Zongyang Zhang:
On constant-round concurrent non-malleable proof systems. 883-890 - Hirotoshi Honma, Kodai Abe, Shigeru Masuyama:
Erratum and addendum to "A linear time algorithm for finding all hinge vertices of a permutation graph" [Information Processing Letters 59 (2) (1996) 103-107]. 891-894 - Yuval Filmus:
Lower bounds for context-free grammars. 895-898 - Xiang-Lan Cao, Spela Brglez
, Simon Spacapan, Elkin Vumar:
On edge connectivity of direct products of graphs. 899-902 - Guiqing Zhang, Chung Keung Poon
, Yinfeng Xu:
The ski-rental problem with multiple discount options. 903-906 - Wenhua Li, Jinjiang Yuan:
Online scheduling on unbounded parallel-batch machines to minimize maximum flow-time. 907-911 - Shlomi Dolev
, Swan Dubois
, Maria Potop-Butucaru, Sébastien Tixeuil:
Stabilizing data-link over non-FIFO channels with optimal fault-resilience. 912-920 - Micheal Arockiaraj
, Paul D. Manuel
, Indra Rajasingh, Bharati Rajan:
Wirelength of 1-fault hamiltonian graphs into wheels and fans. 921-925 - Haizhong Shi, Pan-feng Niu, Jian-bo Lu:
One conjecture of bubble-sort graphs. 926-929 - Verónica Becher
, Pablo Ariel Heiber:
On extending de Bruijn sequences. 930-932
Volume 111, Number 19, October 2011
- Gerold Jäger, Marcin Peczarski:
The number of pessimistic guesses in Generalized Black-peg Mastermind. 933-940 - Rafael Grimson, Joos Heintz, Bart Kuijpers
:
Efficient evaluation of specific queries in constraint databases. 941-944 - Palash Sarkar:
Tweakable enciphering schemes using only the encryption function of a block cipher. 945-955 - Dae Hyun Yum, Pil Joong Lee:
On the average cost of order-preserving encryption based on hypergeometric distribution. 956-959 - R. B. Sandeep:
Perfectly colorable graphs. 960-961 - Daniel Oron:
Scheduling a batching machine with convex resource consumption functions. 962-967 - Víctor Lavín Puente
, Montserrat Hermo
:
Negative results on learning multivalued dependencies with queries. 968-972 - Ching-Lueh Chang:
Triggering cascades on undirected connected graphs. 973-978 - Zhenpeng Xu, Chaoguang Men, Weiwei Li, Xiang Li:
Checkpoint scheduling model for optimality. 979-984
Volume 111, Number 20, October 2011
- Chunyan Zhao, Zhiming Zheng:
Threshold behaviors of a random constraint satisfaction problem with exact phase transitions. 985-988 - Mnacho Echenim, Nicolas Peltier:
Modular instantiation schemes. 989-993 - Manoj G. Dixit, S. Ramesh, Pallab Dasgupta:
Some results on Parametric Temporal Logic. 994-998 - Barnaby Martin
:
Low-level dichotomy for quantified constraint satisfaction problems. 999-1003 - Xia Zhang, Guizhen Liu:
On edge covering colorings of graphs. 1004-1006 - Helmut Seidl, Andreas Reuß:
Extending H1-clauses with disequalities. 1007-1013 - Chih-Jen Wu, Yu-Wei Chen, Yue-Li Wang:
The minimum bandwidth required at each time slot of the fast broadcasting scheme. 1014-1018 - Bing Wang, Jianliang Wu:
Total coloring of planar graphs with maximum degree 7. 1019-1021 - Kejia Zhang, Hong Gao, Jianzhong Li:
Finding multiple induced disjoint paths in general graphs. 1022-1026 - Paola Flocchini, David Ilcinkas, Andrzej Pelc, Nicola Santoro
:
How many oblivious robots can explore a line. 1027-1031
Volume 111, Numbers 21-22, November 2011
- Andreas Björklund, Thore Husfeldt, Petteri Kaski, Mikko Koivisto
:
Covering and packing in linear space. 1033-1036 - Shuming Zhou, Jun-Ming Xu:
Conditional fault tolerance of arrangement graphs. 1037-1043 - Che Wun Chiou, Chiou-Yng Lee
, Yun-Chi Yeh:
Multiplexer implementation of low-complexity polynomial basis multiplier in GF(m2) using all one polynomial. 1044-1047 - Ji Tian, Ruyan Fu, Jinjiang Yuan:
An on-line algorithm for the single machine unbounded parallel-batching scheduling with large delivery times. 1048-1053 - Rudolf Fleischer, Xiaoming Xu:
Computing minimum diameter color-spanning sets is hard. 1054-1056 - Raphael Yuster:
A shortest cycle for each vertex of a graph. 1057-1061 - Hao Fan, Hal A. Kierstead, Guizhen Liu, Theodore Molla, Jianliang Wu, Xin Zhang
:
A note on relaxed equitable coloring of graphs. 1062-1066 - Bo-Yi Wang, Hsueh-I Lu:
Two-dimensional homing sort. 1067-1071 - Richard S. Bird:
A simple division-free algorithm for computing determinants. 1072-1074 - Jens Vygen:
Faster algorithm for optimum Steiner trees. 1075-1079
Volume 111, Numbers 23-24, December 2011
- Kazuyuki Amano:
Minterm-transitive functions with asymptotically smallest block sensitivity. 1081-1084 - Hong-Jian Lai, Hao Li, Ping Li, Yanting Liang, Senmei Yao:
Mod (2p+1)-orientations in line graphs. 1085-1088 - Michael Lampis:
A kernel of order 2 k-c log k for vertex cover. 1089-1091 - Erlin Yao, Yungang Bao, Mingyu Chen:
What Hill-Marty model learn from and break through Amdahlʼs law? 1092-1095 - Guillaume Chapuy, Ines Klimann:
On the supports of recognizable series over a field and a single letter alphabet. 1096-1098 - Marek Cygan
, Marcin Pilipczuk
, Jakub Onufry Wojtaszczyk:
Capacitated domination faster than O(n2). 1099-1103 - Zuosong Liang, Erfang Shan:
Approximation algorithms for clique-transversal sets and clique-independent sets in cubic graphs. 1104-1107 - Maria Patricia Dobson, Valeria A. Leoni, Graciela L. Nasini:
The multiple domination and limited packing problems in graphs. 1108-1113 - Marzieh Malekimajd
, Mohammad Reza Hoseiny Farahabady
, Ali Movaghar
, Hamid Sarbazi-Azad:
Pancyclicity of OTIS (swapped) networks based on properties of the factor graph. 1114-1119 - Anil Maheshwari, Michiel H. M. Smid, Norbert Zeh:
Low-interference networks in metric spaces of bounded doubling dimension. 1120-1123 - Xiaofeng Gu, Hong-Jian Lai, Senmei Yao:
Characterization of minimally (2, l)-connected graphs. 1124-1129

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.