


default search action
Theoretical Computer Science, Volume 795
Volume 795, November 2019
- Do Le Paul Minh, Truong Thi Thuy Duong:

Bayesian networks: The minimal triangulations of a graph. 1-8 - Sebastián González Hermosillo de la Maza, César Hernández-Cruz

:
On the complexity of the k-kernel problem on cyclically k-partite digraphs. 9-19 - Ming Zeng, Jie Chen, Kai Zhang

, Haifeng Qian:
Public key encryption with equality test via hash proof system. 20-35 - Yanze Huang, Limei Lin, Li Xu, Xiaoding Wang

:
Extra diagnosability and good-neighbor diagnosability of n-dimensional alternating group graph AGn under the PMC model. 36-49 - Muhammad S. Akhtar, Usman Ali

, Ghulam Abbas, Mutahira Batool:
On the game chromatic number of splitting graphs of path and cycle. 50-56 - Lin Lyu

, Shengli Liu, Dawu Gu:
Structure-preserving public-key encryption with leakage-resilient CCA security. 57-80 - Shlomi Dolev, Niv Gilboa, Ximing Li

:
Accumulating automata and cascaded equations automata for communicationless information theoretically secure multi-party computation. 81-99 - Frank Gurski

, Carolin Rehs
, Jochen Rethmann:
On the hardness of palletizing bins using FIFO queues. 100-107 - Jørgen Bang-Jensen

, Kristine Vitting Klinkby
, Saket Saurabh, Meirav Zehavi:
The parameterized complexity landscape of finding 2-partitions of digraphs. 108-114 - Che-Nan Kuo

, Yu-Huei Cheng:
Cycles in folded hypercubes with two adjacent faulty vertices. 115-118 - Van Huy Pham

, Kien Trung Nguyen:
Inverse 1-median problem on trees under mixed rectilinear and Chebyshev norms. 119-127 - Nina Chiarelli, Tatiana Romina Hartinger, Valeria Alejandra Leoni, María Inés Lopez Pujato, Martin Milanic:

New algorithms for weighted k-domination and total k-domination problems in proper interval graphs. 128-141 - Boris Brimkov, Joshua Carlson, Illya V. Hicks

, Rutvik Patel, Logan A. Smith:
Power domination throttling. 142-153 - Yining Hu, Guoniu Wei-Han:

On the automaticity of the Hankel determinants of a family of automatic sequences. 154-164 - C. Ramya

, B. V. Raghavendra Rao
:
Linear projections of the Vandermonde polynomial. 165-182 - Pierre Bergé, Arpad Rimmel, Joanna Tomasik:

On the parameterized complexity of separating certain sources from the target. 183-193 - Véronique Terrier:

Communication complexity tools on recognizable picture languages. 194-203 - Nicollas M. Sdroievski, Murilo V. G. da Silva

, André Luís Vignatti:
The Hidden Subgroup Problem and MKTP. 204-212 - Lu Miao, Shurong Zhang, Rong-Hua Li, Weihua Yang:

Structure fault tolerance of k-ary n-cube networks. 213-218 - Dongqin Cheng:

Vertex-disjoint paths joining adjacent vertices in faulty hypercubes. 219-224 - Mojtaba Khalili, Mohammad Dakhilalian

, Carla Ràfols
:
Short tightly secure signatures for signing a vector of group elements: A new approach. 225-239 - Michel Latteux, Yves Roos

:
On prefixal one-rule string rewrite systems. 240-256 - Friedrich Otto:

On deterministic ordered restart-delete automata. 257-274 - Leizhen Cai, Junjie Ye:

Two edge-disjoint paths with length constraints. 275-284 - Gruia Calinescu

, Guy Kortsarz, Zeev Nutov:
Improved approximation algorithms for minimum power covering problems. 285-300 - Amy Glen, Jamie Simpson, W. F. Smyth:

More properties of the Fibonacci word on an infinite alphabet. 301-311 - Stephan Dominique Andres, Melissa A. Huggan, Fionn Mc Inerney

, Richard J. Nowakowski:
The orthogonal colouring game. 312-325 - Xiao Zhang, Shengli Liu, Jiaxin Pan

, Dawu Gu:
Tightly secure signature schemes from the LWE and subset sum assumptions. 326-344 - Diodato Ferraioli, Carmine Ventre

:
Social pressure in opinion dynamics. 345-361 - Jurek Czyzowicz, Krzysztof Diks, Jean Moussi, Wojciech Rytter:

Energy-optimal broadcast and exploration in a tree using mobile agents. 362-374 - Patrizio Angelini

, Michael A. Bekos, Walter Didimo, Luca Grilli
, Philipp Kindermann
, Tamara Mchedlidze
, Roman Prutkin, Antonios Symvonis
, Alessandra Tappini
:
Greedy rectilinear drawings. 375-397 - Mohammad Ali Abam, Mahnaz Sadat Qafari:

Geometric spanner games. 398-407 - Michael A. Bekos, Felice De Luca, Walter Didimo, Tamara Mchedlidze

, Martin Nöllenburg, Antonios Symvonis
, Ioannis G. Tollis:
Planar drawings of fixed-mobile bigraphs. 408-419 - Samir Khuller, Jingling Li, Pascal Sturmfels, Kevin Sun, Prayaag Venkat:

Select and permute: An improved online framework for scheduling to minimize weighted completion time. 420-431 - Liqiang Peng, Atsushi Takayasu

:
Generalized cryptanalysis of small CRT-exponent RSA. 432-458 - Michael Amir, Alfred M. Bruckstein

:
Probabilistic pursuits on graphs. 459-477 - Jason Crampton, Gregory Z. Gutin, Martin Koutecký

, Rémi Watrigant:
Parameterized resiliency problems. 478-491 - Pawel Garncarek

, Tomasz Jurdzinski
, Dariusz R. Kowalski, Krzysztof Lorys
:
Online packet scheduling under adversarial errors. 492-509 - Naoyuki Kamiyama:

Discrete Newton methods for the evacuation problem. 510-519 - Bart M. P. Jansen, Jesper Nederlof:

Computing the chromatic number using graph decompositions via matrix rank. 520-539 - Min Xu, Yulong Wei:

The h-edge tolerable diagnosability of balanced hypercubes. 540-546 - Jan Legerský

, Milena Svobodová
:
Construction of algorithms for parallel addition in expanding bases via Extending Window Method. 547-569 - Keisuke Hara, Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka:

Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions. 570-597

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














