


default search action
Theoretical Computer Science, Volume 943
Volume 943, January 2023
- Shu-Li Zhao, Jou-Ming Chang
:
Reliability assessment of the divide-and-swap cube in terms of generalized connectivity. 1-15 - Toni Böhnlein, Oliver Schaudt, Joachim Schauer:
Stackelberg packing games. 16-35 - B. S. Panda, Juhi Chaudhary
:
Acyclic matching in some subclasses of graphs. 36-49 - Murphy Berzish, Joel D. Day, Vijay Ganesh, Mitja Kulczynski
, Florin Manea, Federico Mora, Dirk Nowotka
:
Towards more efficient methods for solving regular-expression heavy string constraints. 50-72 - Oswin Aichholzer
, Matias Korman, Yoshio Okamoto, Irene Parada, Daniel Perz
, André van Renssen, Birgit Vogtenhuber:
Graphs with large total angular resolution. 73-88 - Liam Roditty, Roei Tov:
Approximate distance oracles with improved stretch for sparse graphs. 89-101 - Julien Bensmail, Foivos Fioravantes
, Fionn Mc Inerney
, Nicolas Nisse, Nacim Oijid
:
The Maker-Breaker Largest Connected Subgraph game. 102-120 - Ali Çivril
:
A new approximation algorithm for the minimum 2-edge-connected spanning subgraph problem. 121-130 - Takehiro Ito, Yuni Iwamasa, Yasuaki Kobayashi
, Yu Nakahata
, Yota Otachi, Kunihiro Wasa:
Reconfiguring (non-spanning) arborescences. 131-141 - Saadia Nemmaoui
, Mohamed Baslam, Belaid Bouikhalene:
Game theory analysis of biometric systems market: Users choice VS service providers revenue. 142-152
- Depeng Liu
, Bow-Yaw Wang, Chen Fu, Lijun Zhang:
Model checking differentially private properties. 153-170 - Nils Köpp, Helmut Schwichtenberg:
Lookahead analysis in exact real arithmetic with logical methods. 171-186 - Guram Bezhanishvili, John Harding, Patrick J. Morandi:
Remarks on hyperspaces for Priestley spaces. 187-202
- M. Anand, Kishan Bhushan Sahay, Mohammed Altaf Ahmed
, Daniyar Sultan
, Radha Raman Chandan, Bharat Singh:
Deep learning and natural language processing in computation for offensive language detection in online social networks by feature selection and ensemble classification techniques. 203-218 - Takkolu Sree Lakshmi, Muthukumarasamy Govindarajan, Asadi Sreenivasulu:
Malware visual resemblance analysis with minimum losses using Siamese neural networks. 219-229 - (Withdrawn) Optimizing Scalability and Availability of Cloud Based Software Services Using Modified Scale Rate Limiting Algorithm. 230-240
- Chao Qian, Dan-Xuan Liu, Chao Feng, Ke Tang:
Multi-objective evolutionary algorithms are generally good: Maximizing monotone submodular functions over sequences. 241-266

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.