当前期刊: Information Processing Letters Go to current issue    加入关注   
显示样式:        排序: IF: - GO 导出
我的关注
我的收藏
您暂时未登录!
登录
  • Isomorphism for random k-uniform hypergraphs
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-10-19
    Debsoumya Chakraborti; Alan Frieze; Simi Haber; Mihir Hasabnis

    We study the isomorphism problem for random hypergraphs. We show that it is solvable in polynomial time for the binomial random k-uniform hypergraph Hn,p;k, for a wide range of p. We also show that it is solvable w.h.p. for random r-regular, k-uniform hypergraphs Hn,r;k,r=O(1).

    更新日期:2020-10-19
  • Super spanning connectivity of split-star networks
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-10-08
    Jing Li; Xujing Li; Eddie Cheng

    A k-container of a graph G is a set of k internally disjoint paths between two distinct vertices. A k-container of G is a k⁎-container if it contains all vertices of G. Graph G is k⁎-connected if there exists a k⁎-container between any two distinct vertices. A k-connected graph G is super spanning connected if G is k⁎-connected for every r with 1≤r≤k. This study demonstrates that the split-star network

    更新日期:2020-10-08
  • Representations of Stably Continuous Semi-lattices by Information Systems and Abstract Bases
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-10-06
    Longchun Wang; Qingguo Li

    In this paper, we introduce two new notions of S-continuous information systems and S-abstract bases which provide concrete representations of stably continuous semi-lattices. We shed light on how the states of an S-continuous information system and the round ideal completion of an S-abstract basis form a stably continuous semi-lattice, respectively. Then we obtain two representation theorems for stably

    更新日期:2020-10-06
  • A note on the strong matching preclusion problem for data center networks
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-07-29
    Tianlong Ma; Yaping Mao; Eddie Cheng; Ping Han

    The strong matching preclusion number of a graph is the minimum number of vertices and edges whose deletion results in a graph that has neither perfect matchings nor almost perfect matchings. The class of data center networks has been proposed as a good class of models in the design of computer networks. Such a data center network can be viewed as a server-centric interconnection network structure

    更新日期:2020-09-22
  • Longest distance of a non-uniform dispersion process on the infinite line
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-07-21
    Yilun Shang

    The non-uniform dispersion process on the infinite integer line is a synchronous process where n particles are placed at the origin initially, and any particle not exclusively occupying an integer site will move at the next time step to the right adjacent integer with probability pn and to the left with probability 1−pn independently. We characterize the longest distance from the origin when the dispersion

    更新日期:2020-09-22
  • Lot scheduling on a single machine to minimize the (weighted) number of tardy orders
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-07-21
    Baruch Mor; Gur Mosheiov; Dana Shapira

    We consider a single machine lot scheduling problem. A number of customer orders of different sizes may be processed in the same lot. We consider first the setting that splitting orders between consecutive lots is allowed. We focus on minimizing the number of tardy orders. A polynomial time solution algorithm is introduced for this problem. We then study the extension to minimizing the weighted number

    更新日期:2020-09-22
  • Strong security of linear ramp secret sharing schemes with general access structures
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-08-05
    Reo Eriguchi; Noboru Kunihiro

    A secret sharing scheme is a cryptographic technique to protect a secret from loss and leakage by dividing it into shares. A ramp secret sharing scheme can improve efficiency in terms of the information ratio by allowing partial information about the secret which is composed of several sub-secrets to leak out. The notion of strong security has been introduced to control the amount of information on

    更新日期:2020-09-22
  • 2-Dimensional palindromes with k mismatches
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-08-06
    Dina Sokol

    This paper extends the problem of 2-dimensional palindrome search into the area of approximate matching. Using the Hamming distance as the measure, we search for 2D palindromes that allow up to k mismatches. We consider two different definitions of 2D palindromes and describe efficient algorithms for both of them. The first definition implies a square, while the second definition (also known as a centrosymmetric

    更新日期:2020-09-22
  • On the longest common subsequence of Thue-Morse words
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-08-06
    Joakim Blikstad

    The length a(n) of the longest common subsequence of the nth Thue-Morse word and its bitwise complement is studied. An open problem suggested by Jean Berstel in 2006 is to find a formula for a(n). In this paper we prove new lower bounds on a(n) by explicitly constructing a common subsequence between the Thue-Morse words and their bitwise complement. We obtain the lower bound a(n)=2n(1−o(1)), saying

    更新日期:2020-09-22
  • A note on the integrality gap of the configuration LP for restricted Santa Claus
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-09-14
    Klaus Jansen; Lars Rohwedder

    In the restricted Santa Claus problem we are given resources R and players P. Every resource j∈R has a value vj and every player i∈P desires a set of resources R(i). We are interested in distributing the resources to players that desire them. The quality of a solution is measured by the least happy player, i.e., the lowest sum of resource values. This value should be maximized. The local search algorithm

    更新日期:2020-09-22
  • New bounds on antipowers in words
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-08-17
    Lukas Fleischer; Samin Riasat; Jeffrey Shallit

    Fici et al. defined a word to be a k-power if it is the concatenation of k consecutive identical blocks, and an r-antipower if it is the concatenation of r pairwise distinct blocks of the same size. They defined N(k,r) as the smallest ℓ such that every binary word of length ℓ contains either a k-power or an r-antipower. In this note we obtain some new upper and lower bounds on N(k,r). We also consider

    更新日期:2020-09-22
  • Counting the number of crossings in geometric graphs
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-09-18
    Frank Duque; Ruy Fabila-Monroy; César Hernández-Vélez; Carlos Hidalgo-Toscano

    A geometric graph is a graph whose vertices are points in general position in the plane and its edges are straight line segments joining these points. In this paper we give an O(n2log⁡n) time algorithm to compute the number of pairs of edges that cross in a geometric graph on n vertices. For layered graphs and convex geometric graphs the algorithm takes O(n2) time.

    更新日期:2020-09-20
  • Borders, palindrome prefixes, and square prefixes
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-09-18
    Daniel Gabric; Jeffrey Shallit

    We show that the number of length-n words over a k-letter alphabet having no even palindromic prefix is the same as the number of length-n unbordered words, by constructing an explicit bijection between the two sets. A slightly different but analogous result holds for those words having no odd palindromic prefix. Using known results on borders, we get an asymptotic enumeration for the number of words

    更新日期:2020-09-20
  • The complexity of computing (almost) orthogonal matrices with ε-copies of the Fourier transform
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-09-14
    Nir Ailon; Gal Yehuda

    The complexity of computing the Fourier transform is a longstanding open problem. Very recently, Ailon (2013, 2014, 2015) showed in a collection of papers that, roughly speaking, a speedup of the Fourier transform computation implies numerical ill-condition. The papers also quantify this tradeoff. The main method for proving these results is via a potential function called quasi-entropy, reminiscent

    更新日期:2020-09-14
  • Simpler FM-index for parameterized string matching
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-09-07
    Sung-Hwan Kim; Hwan-Gue Cho

    In parameterized string matching, a string comprises static and parameterized symbols. Two strings are said to be matched if there exists a one-to-one mapping of parameterized symbols onto itself such that it transforms one string into the other. Traditionally, to construct a full-text index for this problem, suffixes are transformed in a manner referred to as previous occurrence encoding. Although

    更新日期:2020-09-08
  • A simple deterministic algorithm for symmetric submodular maximization subject to a knapsack constraint
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-07-22
    Georgios Amanatidis, Georgios Birmpas, Evangelos Markakis

    We obtain a polynomial-time deterministic (2ee−1+ϵ)-approximation algorithm for maximizing symmetric submodular functions under a budget constraint. Although there exist randomized algorithms with better expected performance, our algorithm achieves the best known factor achieved by a deterministic algorithm, improving on the previously known factor of 6. Furthermore, it is simple, combining two elegant

    更新日期:2020-07-22
  • A note on the relation between XOR and Selective XOR lemmas
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-07-21
    Ragesh Jaiswal

    Given an unpredictable Boolean function f:{0,1}n→{0,1}, the standard Yao's XOR lemma is a statement about the unpredictability of computing ⊕i∈[k]f(xi) given x1,...,xk∈{0,1}n, whereas the Selective XOR lemma is a statement about the unpredictability of computing ⊕i∈Sf(xi) given x1,...,xk∈{0,1}n and S⊆{1,...,k}. We give a reduction from the Selective XOR lemma to the standard XOR lemma. Our reduction

    更新日期:2020-07-21
  • Surveying global verifiability
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-07-10
    Ben Smyth

    We explore global verifiability; discovering that voting systems vulnerable to attack can be proven to satisfy that security notion, whereas many secure systems cannot. We conclude that current definitions are unsuitable for the analysis of voting systems, fuelling the exploration for a suitable definition.

    更新日期:2020-07-10
  • Security analysis of a dynamic threshold secret sharing scheme using linear subspace method
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-07-09
    Sadegh Jamshidpour, Zahra Ahmadian

    A dealer-free and non-interactive dynamic threshold secret sharing scheme has been proposed by Harn and Hsu in Information Processing Letters in 2015. In this scheme, a (t,n) secret sharing scheme in secret sharing phase can turn into a (m,n) scheme in secret reconstruction phase, where m is the number of participating shareholders. It has been claimed that the secrecy of shares and the secrecy of

    更新日期:2020-07-09
  • Constrained existence of weak subgame perfect equilibria in multiplayer Büchi games
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-07-03
    Aline Goeminne

    In turn-based games played on graphs, the constrained existence problem of equilibria is a well studied problem. This problem is already known to be decidable in P for weak subgame perfect equilibria in Boolean games with Büchi objectives. In this paper, we prove that this problem is P-complete.

    更新日期:2020-07-03
  • Optimal-size problem kernels for d-Hitting Set in linear time and space
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-07-03
    René van Bevern, Pavel V. Smirnov

    The known linear-time kernelizations for d-Hitting Set guarantee linear worst-case running times using a quadratic-size data structure (that is not fully initialized). Getting rid of this data structure, we show that problem kernels of asymptotically optimal size O(kd) for d-Hitting Set are computable in linear time and space. Additionally, we experimentally compare the linear-time kernelizations for

    更新日期:2020-07-03
  • Grundy coloring in some subclasses of bipartite graphs and their complements
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-07-03
    Shaily Verma, B.S. Panda

    A vertex v is a Grundy vertex with respect to a proper k-coloring c of a graph G=(V,E) if v has a neighbor of color j for every j (1≤j

    更新日期:2020-07-03
  • Lengths of words accepted by nondeterministic finite automata
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-07-02
    Aaron Potechin, Jeffrey Shallit

    We consider two natural problems about nondeterministic finite automata (NFA). First, given an NFA M of n states, and a length ℓ, does M accept a word of length ℓ? We show that the classic problem of triangle-free graph recognition reduces to this problem, and give an O(nω(log⁡n)1+ϵlog⁡ℓ)-time algorithm to solve it, where ω is the optimal exponent for matrix multiplication. Second, provided L(M) is

    更新日期:2020-07-02
  • An FPT algorithm for orthogonal buttons and scissors
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-07-02
    Dekel Tsur

    We study the puzzle game Buttons and Scissors in which the goal is to remove all buttons from an n×m grid by a series of horizontal and vertical cuts. We show that the corresponding decision problem has an algorithm with time complexity 2O(k2log⁡k)+(n+m)O(1), where k is an upper bound on the number of cuts.

    更新日期:2020-07-02
  • QUIXO is EXPTIME-complete
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-07-02
    Shohei Mishiba, Yasuhiko Takenaga

    QUIXO is a two-player strategic board game played on a 5×5 game board. Players alternately move cubes on the game board, and the player who first made a line of five cubes with the player's symbol wins the game. In this paper, we prove EXPTIME-completeness of deciding the winner on generalized QUIXO played on an n×n game board.

    更新日期:2020-07-02
  • A simple approach to nondecreasing paths
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-07-01
    Mirosław Kowaluk, Andrzej Lingas

    We present a simple reduction of the problem of nondecreasing paths (with minimal last edge weight) in a directed edge-weighted graph to a reachability problem in a directed unweighted graph. The reduction yields an alternative simple method of solving the single-source nondecreasing paths problem in almost linear time. If the edge weights are integers then our algorithm can be implemented in O((n+m)log⁡log⁡n)

    更新日期:2020-07-01
  • Dynamic planar range skyline queries in log logarithmic expected time
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-06-30
    K. Doka, A. Kosmatopoulos, A. Papadopoulos, S. Sioutas, K. Tsichlas, D. Tsoumakos

    The skyline of a set P of points consists of the “best” points with respect to minimization or maximization of the attribute values. A point p dominates another point q if p is as good as q in all dimensions and it is strictly better than q in at least one dimension. In this work, we focus on the 2-d space and provide expected performance guarantees for dynamic (insertions and deletions) 3-sided range

    更新日期:2020-06-30
  • A note on the complexity of manipulating weighted Schulze voting
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-06-20
    Julian Müller, Sven Kosub

    We prove that the constructive weighted coalitional manipulation problem for the Schulze voting rule can be solved in polynomial time for an unbounded number of candidates and an unbounded number of manipulators.

    更新日期:2020-06-20
  • A fast algorithm for multiprocessor speed-scaling problem minimizing completion time and energy consumption
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-06-20
    Yusei Fujimori, Yasushi Kawase, Tomomi Matsui, Akiyoshi Shioura

    In this paper, we consider a scheduling problem on multiple speed-scalable processors, where the objective is to minimize a weighted sum of total completion times of jobs and total energy consumption on processors. We propose a simple algorithm for the scheduling problem that runs faster than the existing algorithm.

    更新日期:2020-06-20
  • Lazy or eager dynamic matching may not be fast
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-06-16
    Manas Jyoti Kashyop, N.S. Narayanaswamy

    We consider two sub-classes of fully dynamic algorithms for maintaining a maximal matching, which we define as lazy algorithms and eager algorithms. We prove a conditional lower bound which is sub-linear in the number of edges for the update time of lazy algorithms and eager algorithms. Our result is conditioned on the well known conjecture about the hardness of triangle detection in a graph.

    更新日期:2020-06-16
  • Online leasing strategy for depreciable equipment considering opportunity cost
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-06-11
    Yong Zhang, Jiayi Xian, Menghu Huang

    There are two options for the leasing problem, buying at a high price or leasing at a low price. Once you choose to purchase the resources, you lose the opportunity to invest in other financial assets for additional benefits, such as a risk-free return of the interest rate. Thus, opportunity cost is an important factor to consider in the leasing problem. Accounting for opportunity cost, this paper

    更新日期:2020-06-11
  • On the complexity of detecting hazards
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-06-04
    Balagopal Komarath, Nitin Saurabh

    Detecting and eliminating logic hazards in Boolean circuits is a fundamental problem in logic circuit design. We show that there is no O(3(1−ϵ)npoly(s)) time algorithm, for any ϵ>0, that detects logic hazards in Boolean circuits of size s on n variables under the assumption that the strong exponential time hypothesis is true. This lower bound holds even when the input circuits are restricted to be

    更新日期:2020-06-04
  • “The simplest protocol for oblivious transfer” revisited
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-06-04
    Ziya Alper Genç, Vincenzo Iovino, Alfredo Rial

    In 2015, Chou and Orlandi presented an oblivious transfer protocol that already drew a lot of attention both from theorists and practitioners due to its extreme simplicity and high efficiency. Chou and Orlandi claimed that their protocol is universally composable secure (UC-secure) in the random oracle model under dynamic corruptions. UC-security is a very strong security guarantee that assures that

    更新日期:2020-06-04
  • Linear time distributed swap edge algorithms
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-06-02
    A.K. Datta, P. Ferragina, L. Larmore, L. Pagli, G. Prencipe

    In this paper, we consider the all best swap edges problem in a distributed environment. We are given a 2-edge connected positively weighted network X, where all communication is routed through a rooted spanning tree T of X. If a tree edge e={x,y} fails, the communication network will be disconnected. However, since X is 2-edge connected, communication can be restored by replacing e by non-tree edge

    更新日期:2020-06-02
  • Incremental distance products via faulty shortest paths
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-06-01
    Oren Weimann, Raphael Yuster

    Given a constant number d of n×n matrices with total m non-infinity entries, we show how to construct in (essentially optimal) O˜(mn+n2) time a data structure that can compute in (essentially optimal) O˜(n2) time the distance product of these matrices after incrementing the value (possibly to infinity) of a constant number k of entries. Our result is obtained by designing an oracle for single source

    更新日期:2020-06-01
  • About blockchain interoperability
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-05-27
    Pascal Lafourcade, Marius Lombard-Platet

    A blockchain is designed to be a self-sufficient decentralised ledger: a peer verifying the validity of past transactions only needs to download the blockchain (the ledger) and nothing else. However, it might be of interest to make two different blockchains interoperable, i.e., to allow one to transmit information from one blockchain to another blockchain. In this paper, we give a formalisation of

    更新日期:2020-05-27
  • An answer to an open problem of Mesnager on bent functions
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-05-14
    Yanjun Li, Jie Peng, Chik How Tan

    In 2014, Mesnager proposed two open problems in [4] on the construction of bent functions. One problem has been settled by Tang et al. in 2017. However, the other is still outstanding, which is solved in this letter by considering a class of PS− vectorial bent functions.

    更新日期:2020-05-14
  • On cryptographic anonymity and unpredictability in secret sharing
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-05-11
    Anat Paskin-Cherniavsky, Ruxandra F. Olimid

    We revisit the notions of cryptographic anonymity and share unpredictability in secret sharing, introducing more systematic and fine grained definitions. We derive tight negative and positive results characterizing access structures with respect to the generalized definitions.

    更新日期:2020-05-11
  • Randomized distributed online algorithms against adaptive offline adversaries
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-05-07
    Joan Boyar, Faith Ellen, Kim S. Larsen

    In the sequential setting, a decades-old fundamental result in online algorithms states that if there is a c-competitive randomized online algorithm against an adaptive, offline adversary, then there is a c-competitive deterministic algorithm. The adaptive, offline adversary is the strongest adversary among the ones usually considered, so the result states that if one has to be competitive against

    更新日期:2020-05-07
  • A characterization of König-Egerváry graphs with extendable vertex covers
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-05-06
    Venkatesh Raman, M.S. Ramanujan, Saket Saurabh

    It is well known that in a bipartite (and more generally in a König-Egerváry) graph, the size of the minimum vertex cover is equal to the size of the maximum matching. We first address the question whether (and if not, when) this property still holds in a König-Egerváry graph if we consider vertex covers containing a given subset of vertices. We characterize such graphs using the classic notions of

    更新日期:2020-05-06
  • Maximum-area triangle in a convex polygon, revisited
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-05-05
    Ivor van der Hoog, Vahideh Keikha, Maarten Löffler, Ali Mohades, Jérôme Urhausen

    We revisit the following problem: Given a convex polygon P, find the largest-area inscribed triangle. We prove by counterexample that the linear-time algorithm presented in 1979 by Dobkin and Snyder [5] for solving this problem fails, as well as a renewed analysis of the problem. We also provide a counterexample proving that their algorithm fails finding the largest-area inscribed quadrilateral. Combined

    更新日期:2020-05-05
  • Remark on subcodes of linear complementary dual codes
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-04-16
    Masaaki Harada, Ken Saito

    We show that any ternary Euclidean (resp. quaternary Hermitian) linear complementary dual [n,k] code contains a Euclidean (resp. Hermitian) linear complementary dual [n,k−1] subcode for 2≤k≤n. As a consequence, we derive a bound on the largest minimum weights among ternary Euclidean linear complementary dual codes and quaternary Hermitian linear complementary dual codes.

    更新日期:2020-04-16
  • Sorting can exponentially speed up pure dynamic programming
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-04-10
    Stasys Jukna, Hannes Seiwert

    Many discrete minimization problems, including various versions of the shortest path problem, can be efficiently solved by dynamic programming (DP) algorithms that are “pure” in that they only perform basic operations, as min, max, +, but no conditional branchings via if-then-else in their recursion equations. It is known that any pure (min⁡,+) DP algorithm solving the minimum weight spanning tree

    更新日期:2020-04-10
  • Practical forgeries for ORANGE
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-04-08
    Christoph Dobraunig, Florian Mendel, Bart Mennink

    We analyze the authenticated encryption algorithm of ORANGE, a submission to the NIST lightweight cryptography standardization process. We show that it is practically possible to craft forgeries out of two observed transmitted messages that encrypt the same plaintext. The authors of ORANGE have confirmed the attack, and they discuss a fix for this attack in their second-round submission of ORANGE to

    更新日期:2020-04-08
  • A constant approximation algorithm for the uniform a priori capacitated vehicle routing problem with unit demands
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-04-08
    Finn Fernstrøm, Teresa Anna Steiner

    In this paper we introduce an a priori variant of the capacitated vehicle routing problem and provide a constant factor approximation algorithm, when the demands of customers are independent and identically distributed Bernoulli experiments. In the capacitated vehicle routing problem (CVRP) a vehicle, starting at a depot, must visit a set of customers to deliver the requested quantity of some item

    更新日期:2020-04-08
  • An Ore-type condition for the existence of two disjoint cycles
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-03-31
    Maoqun Wang, Jianguo Qian

    Let n1 and n2 be two integers with n1,n2≥3 and G a graph of order n=n1+n2. As a variation of Ore's degree condition for the existence of Hamilton cycle in G, El-Zahar proved that if δ(G)≥⌈n12⌉+⌈n22⌉, then G contains two disjoint cycles of length n1 and n2. Recently, Yan et al. considered the problem by extending the degree condition to degree sum condition and proved that if d(u)+d(v)≥n+4 for any pair

    更新日期:2020-03-31
  • Annotated regular expressions and input-driven languages
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-03-31
    Alexander Sakharov

    Regular expressions are extended by splitting the terminals into left brackets, right brackets, and neutral terminals and by adding terminal annotations. These extended expressions define the set of well-nested input-driven languages. They are parsed in linear time in the size of the input. The parse trees are based on brackets and operator priorities.

    更新日期:2020-03-31
  • Approximation ratio of LD algorithm for multi-processor scheduling and the Coffman–Sethi conjecture
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-03-31
    Peruvemba Sundaram Ravi, Levent Tunçel

    Coffman and Sethi proposed a heuristic algorithm, called LD (Longest Decreasing), for multi-processor scheduling, to minimize makespan over flowtime-optimal schedules. The LD algorithm is an extension of a very well-known list scheduling algorithm, Longest Processing Time (LPT) list scheduling, to this bicriteria scheduling problem. Coffman and Sethi conjectured (in 1976) that the LD algorithm has

    更新日期:2020-03-31
  • Raiders of the lost equivalence: Probabilistic branching bisimilarity
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-03-25
    Valentina Castiglioni, Simone Tini

    Probabilistic branching bisimilarity allows us to compare process behaviour with respect to their branching structure and probabilistic features, while abstracting away from those computation steps that can be marked as irrelevant to the analysis at hand. To the best of our knowledge, in the context of nondeterministic probabilistic processes, no proof of probabilistic branching bisimilarity being

    更新日期:2020-03-25
  • RAC drawings in subcubic area
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-03-24
    Zahed Rahmati, Fatemeh Emami

    In this paper, we study tradeoffs between curve complexity and area of Right Angle Crossing drawings (RAC drawings), which is a challenging theoretical problem in graph drawing. Given a graph with n vertices and m edges, we provide a RAC drawing algorithm with curve complexity 6 and area O(n2.75), which takes time O(n+m). Our algorithm improves the previous upper bound O(n3), by Di Giacomo et al.,

    更新日期:2020-03-24
  • Faster algorithms for cograph edge modification problems
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-03-23
    Dekel Tsur

    In the Cograph Deletion (resp., Cograph Editing) problem the input is a graph G and an integer k, and the goal is to decide whether there is a set of edges of size at most k whose removal from G (resp., removal and addition to G) results in a graph that does not contain an induced path with four vertices. In this paper we give algorithms for Cograph Deletion and Cograph Editing whose running times

    更新日期:2020-03-23
  • Covering graphs with convex sets and partitioning graphs into convex sets
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-03-13
    Lucía M. González, Luciano N. Grippo, Martín D. Safe, Vinicius F. dos Santos

    We present some complexity results concerning the problems of covering a graph with p convex sets and of partitioning a graph into p convex sets. The following convexities are considered: digital convexity, monophonic convexity, P3-convexity, and P3⁎-convexity.

    更新日期:2020-03-13
  • Reverse greedy is bad for k-center
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-03-10
    D. Ellis Hershkowitz, Gregory Kehne

    We show the reverse greedy algorithm is between a (2k−2)- and a 2k-approximation for k-center.

    更新日期:2020-03-10
  • A constructive proof of a concentration bound for real-valued random variables
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-02-27
    Wolfgang Mulzer, Natalia Shenkman

    Almost 10 years ago, Impagliazzo and Kabanets [5] gave a new combinatorial proof of Chernoff's bound for sums of bounded independent random variables. Unlike previous methods, their proof is constructive. This means that it provides an efficient randomized algorithm for the following task: given a set of Boolean random variables whose sum is not concentrated around its expectation, find a subset of

    更新日期:2020-02-27
  • Approximation algorithms for connected maximum coverage problem for the discovery of mutated driver pathways in cancer
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-02-26
    Dorit S. Hochbaum, Xu Rao

    This paper addresses the connected maximum coverage problem, motivated by the detection of mutated driver pathways in cancer. The connected maximum coverage problem is NP-hard and therefore approximation algorithms are of interest. We provide here an approximation algorithm for the problem with an approximation bound that strictly improves on previous results. A second approximation algorithm with

    更新日期:2020-02-26
  • On the additive chromatic number of several families of graphs
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-02-26
    Daniel Severín

    The Additive Coloring Problem is a variation of the Coloring Problem where labels of {1,…,k} are assigned to the vertices of a graph G so that the sum of labels over the neighborhood of each vertex is a proper coloring of G. The least value k for which G admits such labeling is called additive chromatic number of G. This problem was first presented by Czerwiński, Grytczuk and Żelazny who also proposed

    更新日期:2020-02-26
  • On the probability of overlap of random subsequences of pseudorandom number generators
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-02-25
    Sebastiano Vigna

    We analyze in detail the probability that sequences of equal length generated by a pseudorandom number generator starting from random points of the state space overlap, providing for the first time an exact result and manageable bounds. While the computation of the probability is almost elementary, the value has been reported erroneously several times in the literature.

    更新日期:2020-02-25
  • Mutual exclusion in fully anonymous shared memory systems
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-02-25
    Michel Raynal, Gadi Taubenfeld

    Process anonymity has been studied for a long time. Memory anonymity is more recent. In an anonymous memory system, there is no a priori agreement among the processes on the names of the shared registers. As an example, a shared register named A by a process p and a shared register named B by another process q may correspond to the very same register X, while the same name C may correspond to different

    更新日期:2020-02-25
  • Threshold changeable secret sharing with secure secret reconstruction
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-02-11
    Keju Meng, Fuyou Miao, Wenchao Huang, Yan Xiong

    (t,n) threshold secret sharing (SS) is an important cryptographic primitive in which a secret is divided into n shares, and then any t or more shareholders can exchange shares to reconstruct the secret without help of any trusted third party. However, if an illegal participant, without any valid share, impersonates a shareholder to recover the secret with m (m≥t) legal shareholders in a traditional

    更新日期:2020-02-11
  • Modified quadratic residue constructions and new extremal binary self-dual codes of lengths 64, 66 and 68
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-02-10
    Joe Gildea, Holly Hamilton, Abidin Kaya, Bahattin Yildiz

    In this work we consider modified versions of quadratic double circulant and quadratic bordered double circulant constructions over the binary field and the rings F2+uF2 and F4+uF4 for different prime values of p. Using these constructions with extensions and neighbors we are able to construct a number of extremal binary self-dual codes of different lengths with new parameters in their weight enumerators

    更新日期:2020-02-10
Contents have been reproduced by permission of the publishers.
导出
全部期刊列表>>
Springer 纳米技术权威期刊征稿
全球视野覆盖
施普林格·自然新
chemistry
3分钟学术视频演讲大赛
物理学研究前沿热点精选期刊推荐
自然职位线上招聘会
欢迎报名注册2020量子在线大会
化学领域亟待解决的问题
材料学研究精选新
GIANT
ACS ES&T Engineering
ACS ES&T Water
屿渡论文,编辑服务
ACS Publications填问卷
阿拉丁试剂right
麻省大学
西北大学
湖南大学
华东师范大学
王要兵
化学所
隐藏1h前已浏览文章
课题组网站
新版X-MOL期刊搜索和高级搜索功能介绍
ACS材料视界
天合科研
x-mol收录
陆军军医大学
杨财广
廖矿标
试剂库存
down
wechat
bug