default search action
Theoretical Computer Science, Volume 943
Volume 943, January 2023
- Shu-Li Zhao, Jou-Ming Chang:
Reliability assessment of the divide-and-swap cube in terms of generalized connectivity. 1-15 - Toni Böhnlein, Oliver Schaudt, Joachim Schauer:
Stackelberg packing games. 16-35 - B. S. Panda, Juhi Chaudhary:
Acyclic matching in some subclasses of graphs. 36-49 - Murphy Berzish, Joel D. Day, Vijay Ganesh, Mitja Kulczynski, Florin Manea, Federico Mora, Dirk Nowotka:
Towards more efficient methods for solving regular-expression heavy string constraints. 50-72 - Oswin Aichholzer, Matias Korman, Yoshio Okamoto, Irene Parada, Daniel Perz, André van Renssen, Birgit Vogtenhuber:
Graphs with large total angular resolution. 73-88 - Liam Roditty, Roei Tov:
Approximate distance oracles with improved stretch for sparse graphs. 89-101 - Julien Bensmail, Foivos Fioravantes, Fionn Mc Inerney, Nicolas Nisse, Nacim Oijid:
The Maker-Breaker Largest Connected Subgraph game. 102-120 - Ali Çivril:
A new approximation algorithm for the minimum 2-edge-connected spanning subgraph problem. 121-130 - Takehiro Ito, Yuni Iwamasa, Yasuaki Kobayashi, Yu Nakahata, Yota Otachi, Kunihiro Wasa:
Reconfiguring (non-spanning) arborescences. 131-141 - Saadia Nemmaoui, Mohamed Baslam, Belaid Bouikhalene:
Game theory analysis of biometric systems market: Users choice VS service providers revenue. 142-152
- Depeng Liu, Bow-Yaw Wang, Chen Fu, Lijun Zhang:
Model checking differentially private properties. 153-170 - Nils Köpp, Helmut Schwichtenberg:
Lookahead analysis in exact real arithmetic with logical methods. 171-186 - Guram Bezhanishvili, John Harding, Patrick J. Morandi:
Remarks on hyperspaces for Priestley spaces. 187-202
- M. Anand, Kishan Bhushan Sahay, Mohammed Altaf Ahmed, Daniyar Sultan, Radha Raman Chandan, Bharat Singh:
Deep learning and natural language processing in computation for offensive language detection in online social networks by feature selection and ensemble classification techniques. 203-218 - Takkolu Sree Lakshmi, Muthukumarasamy Govindarajan, Asadi Sreenivasulu:
Malware visual resemblance analysis with minimum losses using Siamese neural networks. 219-229 - (Withdrawn) Optimizing Scalability and Availability of Cloud Based Software Services Using Modified Scale Rate Limiting Algorithm. 230-240
- Chao Qian, Dan-Xuan Liu, Chao Feng, Ke Tang:
Multi-objective evolutionary algorithms are generally good: Maximizing monotone submodular functions over sequences. 241-266
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.