


default search action
Theoretical Computer Science, Volume 939
Volume 939, January 2023
- Konstantinos Georgiou, Jesse Lucier:
Weighted group search on a line & implications to the priority evacuation problem. 1-17 - Francesco Dolce
, L'ubomíra Dvoráková
, Edita Pelantová:
On balanced sequences and their critical exponent. 18-47 - Chunying Ren, Zijun Wu, Dachuan Xu
, Wenqing Xu:
A game-theoretic perspective of deep neural networks. 48-62 - Quentin Bramas, Anissa Lamani, Sébastien Tixeuil:
Stand up indulgent gathering. 63-77 - Guilhem Castagnos, Dario Catalano, Fabien Laguillaumie, Federico Savasta, Ida Tucker:
Bandwidth-efficient threshold EC-DSA revisited: Online/offline extensions, identifiable aborts proactive and adaptive security. 78-104 - Julien Bensmail, Hervé Hocquard, Dimitri Lajou:
On the algorithmic complexity of determining the AVD and NSD chromatic indices of graphs. 105-118 - Karam Aloui, Damien Jamet, Hajime Kaneko, Steffen Kopecki, Pierre Popoli
, Thomas Stoll
:
On the binary digits of n and n2. 119-139 - Esther Galby
, Paloma T. Lima, Felix Mann
, Bernard Ries
:
Using edge contractions to reduce the semitotal domination number. 140-160 - Yuxing Yang
, Ningning Song:
Fault-free Hamiltonian paths passing through prescribed linear forests in balanced hypercubes with faulty links. 161-169 - Yo-Sub Han, Sang-Ki Ko, Kai Salomaa:
Deciding path size of nondeterministic (and input-driven) pushdown automata. 170-181 - Barnaby Martin, Daniël Paulusma
, Siani Smith
, Erik Jan van Leeuwen:
Few induced disjoint paths for H-free graphs. 182-193 - Andreas Galanis, Leslie Ann Goldberg
, Daniel Stefankovic:
Implementations and the independent set polynomial below the Shearer threshold. 194-215 - Ko Minamisawa, Ryuhei Uehara
, Masao Hara:
Mathematical characterizations and computational complexity of anti-slide puzzles. 216-226 - Dora V. Bulgakova, Nicolas Buzhinsky, Yegor O. Goncharov
:
On balanced and abelian properties of circular words over a ternary alphabet. 227-236 - Xiaojia Xu, Yongcai Wang
, Yu Zhang, Deying Li:
A fault diagnosis method to defend scapegoating attack in network tomography. 237-249 - Jianxiong Guo
, Xingjian Ding
, Tian Wang, Weijia Jia:
Theoretical design of decentralized auction framework under mobile crowdsourcing environment. 250-260 - Jannik Castenow
, Jonas Harbig
, Daniel Jung, Till Knollmann, Friedhelm Meyer auf der Heide:
Gathering a Euclidean closed chain of robots in linear time and improved algorithms for chain-formation. 261-291 - Mingyu Xiao
:
Upper and lower bounds on approximating weighted mixed domination. 292-302

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.