


default search action
Theoretical Computer Science, Volume 609
Volumes 609, Part 1, January 2016
- Leo van Iersel, Steven Kelk, Nela Lekic, Simone Linz

:
Satisfying ternary permutation constraints by multiple linear orders or phylogenetic trees. 1-21 - Bey-Chi Lin, Chin-Tau Lea

:
Repackable multi-Log2N networks. 22-31 - Jian Li

, Haitao Wang:
Range queries on uncertain data. 32-48 - Willy Susilo

, Fuchun Guo
, Yi Mu:
Efficient dynamic threshold identity-based encryption with constant-size ciphertext. 49-59 - Joe Sawada, Aaron Williams

:
Successor rules for flipping pancakes and burnt pancakes. 60-75 - Ken C. K. Fong, Minming Li

, Hongyu Liang, Linji Yang, Hao Yuan:
Average-case complexity of the min-sum matrix product problem. 76-86 - Jessica A. Enright

, Lorna Stewart:
Games on interval and permutation graph representations. 87-103 - Jan Kratochvíl

, Jan Arne Telle, Marek Tesar:
Computational complexity of covering three-vertex multigraphs. 104-117 - Eric Goles, Pedro Montealegre

, Ville Salo, Ilkka Törmä:
PSPACE-completeness of majority automata networks. 118-128 - Richard Beal, Donald A. Adjeroh:

Compressed parameterized pattern matching. 129-142 - Ching-Nung Yang

, Li-Zhe Sun, Song-Ruei Cai:
Extended color visual cryptography for black and white secret image. 143-161 - Cunquan Qu, Guanghui Wang, Jian-Liang Wu, Xiaowei Yu:

On the neighbor sum distinguishing total coloring of planar graphs. 162-170 - Shantanu Das

, Paola Flocchini, Giuseppe Prencipe
, Nicola Santoro
, Masafumi Yamashita:
Autonomous mobile robots with lights. 171-184 - Xin Han, Kazuhisa Makino:

Online minimization knapsack problem. 185-196 - Xi Wang, Jianxi Fan, Xiaohua Jia

, Cheng-Kuan Lin:
An efficient algorithm to construct disjoint path covers of DCell networks. 197-210 - Takuya Akiba, Yoichi Iwata:

Branch-and-reduce exponential/FPT algorithms in practice: A case study of vertex cover. 211-225 - Marie-Pierre Béal, Michel Blockelet, Catalin Dima

:
Sofic-Dyck shifts. 226-244 - Tiphaine Viard

, Matthieu Latapy, Clémence Magnien:
Computing maximal cliques in link streams. 245-252 - Linming Gong, Shundong Li, Qing Mao, Daoshun Wang, Jiawei Dou:

A homomorphic encryption scheme with adaptive chosen ciphertext security but without random oracle. 253-261 - Fei-Huang Chang, Ma-Lian Chia

, David Kuo, Sheng-Chyang Liaw, Jen-Chun Ling:
All-to-all broadcast problems on Cartesian product graphs. 262-271 - Christopher Hanrui Chak, Rusins Freivalds, Frank Stephan

, Henrietta Tan Wan Yik:
On block pumpable languages. 272-285
Volumes 609, Part 2, January 2016
- Fabrício Benevides

, Victor A. Campos, Mitre Costa Dourado, Rudini Menezes Sampaio
, Ana Silva
:
The maximum infection time in the geodesic and monophonic convexities. 287-295 - Kun-Tze Chen, Chi-Long Li, Hsien-Tai Chiu, Chin Lung Lu:

An efficient algorithm for one-sided block ordering problem under block-interchange distance. 296-305 - Thomas Bläsius

, Ignaz Rutter
:
A new perspective on clustered planarity as a combinatorial embedding problem. 306-315 - Mordecai J. Golin

, John Iacono
, Danny Krizanc, Rajeev Raman
, Srinivasa Rao Satti
, Sunil M. Shende:
Encoding 2D range maximum queries. 316-327 - Dieter Kratsch, Van Bang Le:

Algorithms solving the Matching Cut problem. 328-335 - Ran Gu, Xueliang Li, Zhongmei Qin:

Proper connection number of random graphs. 336-343 - Jing Tian, Xianzhong Zhao

, Yong Shao:
On structure and representations of cyclic automata. 344-360 - François Bonnet

, Xavier Défago
, Thanh Dang Nguyen
, Maria Potop-Butucaru:
Tight bound on mobile Byzantine Agreement. 361-373 - Ljiljana Brankovic

, Costas S. Iliopoulos, Ritu Kundu
, Manal Mohamed
, Solon P. Pissis
, Fatima Vayani
:
Linear-time superbubble identification algorithm for genome assembly. 374-383 - Sabina Zejnilovic

, Dieter Mitsche, João Gomes, Bruno Sinopoli:
Extending the metric dimension to graphs with missing edges. 384-394 - Ming Xu

, Cheng-Chao Huang, Zhi-Bin Li, Zhenbing Zeng:
Analyzing ultimate positivity for solvable systems. 395-412 - Rong-Xia Hao, Mei-Mei Gu

, Yan-Quan Feng
:
The pessimistic diagnosabilities of some general regular graphs. 413-420 - Shuming Zhou, Sulin Song

, Xiaoxue Yang, Lanxiang Chen:
On conditional fault tolerance and diagnosability of hierarchical cubic networks. 421-433 - Wenbin Chen, Nagiza F. Samatova, Matthias F. Stallmann

, William Hendrix, Weiqin Ying
:
On size-constrained minimum s-t cut problems and size-constrained dense subgraph problems. 434-442 - Zhongzhi Zhang

, Shunqi Wu, Mingyun Li, Francesc Comellas
:
The number and degree distribution of spanning trees in the Tower of Hanoi graph. 443-455 - James D. Currie

, Narad Rampersad
:
Growth rate of binary words avoiding xxxR. 456-468 - Emily Allen, Francine Blanchet-Sadri, Michelle Bodnar, Brian Bowers, Joe Hidakatsu, John Lensmire:

Combinatorics on partial word borders. 469-493 - Xie-Bin Chen:

Paired 2-disjoint path covers of faulty k-ary n-cubes. 494-499 - Qizhi Fang, Bo Li

, Xiaoming Sun, Jia Zhang, Jialin Zhang
:
Computing the least-core and nucleolus for threshold cardinality matching games. 500-510
- Luciano N. Grippo

, Martín Matamala
, Martín Darío Safe
, Maya J. Stein
:
Convex p-partitions of bipartite graphs. 511-514
Volumes 609, Part 3, January 2016
- Zhipeng Cai

, Alexander Zelikovsky
:
Special issue on Computing and Combinatorics Conference. 515
- Suman Kalyan Bera, Syamantak Das, Amit Kumar

:
Minimizing average flow-time under knapsack constraint. 516-525 - Xujin Chen

, Xiao-Dong Hu, Changjun Wang:
Approximation for the minimum cost doubly resolving set problem. 526-543 - Zhenhua Duan, Cong Tian, Nan Zhang:

A canonical form based decision procedure and model checking approach for propositional projection temporal logic. 544-560 - Minghui Jiang, Haitao Wang:

Shortest color-spanning intervals. 561-568 - François Le Gall, Harumichi Nishimura

, Seiichiro Tani
:
Quantum algorithms for finding constant-sized sub-hypergraphs. 569-582 - Xianmin Liu, Jianzhong Li, Hong Gao:

On the hardness of labeled correlation clustering problem: A parameterized complexity view. 583-593 - Dongjing Miao

, Xianmin Liu, Jianzhong Li:
On the complexity of sampling query feedback restricted database repair of functional dependency violations. 594-605 - Subhankar Mishra

, Thang N. Dinh
, My T. Thai, Jungtaek Seo
, Incheol Shin:
Optimal packet scan against malicious attacks in smart grids. 606-619 - Weitian Tong

, Randy Goebel, Guohui Lin:
Smoothed heights of tries and patricia tries. 620-626 - Di Wu, Zhao Zhang, Weili Wu:

Approximation algorithm for the balanced 2-connected k-partition problem. 627-638 - Nan Zhang, Zhenhua Duan, Cong Tian:

A complete axiom system for propositional projection temporal logic with cylinder computation model. 639-657 - Peng Zhang

:
A new approximation algorithm for the unbalanced Min s-t Cut problem. 658-665

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














