Information Processing Letters

Papers
(The median citation count of Information Processing Letters is 0. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
Bicriteria scheduling on an unbounded parallel-batch machine for minimizing makespan and maximum cost20
Tight binding number bound for P≥3-factor uniform graphs16
Complexity and algorithms for injective edge-coloring in graphs13
Instability results for Euclidean distance, nearest neighbor search on high dimensional Gaussian data11
On computing Pareto optimal paths in weighted time-dependent networks10
Quantum attacks on Sum of Even-Mansour pseudorandom functions9
The first Zagreb index, reciprocal degree distance and Hamiltonian-connectedness of graphs8
Representations of stably continuous semi-lattices by information systems and abstract bases8
Tight efficiency lower bounds for strategy-proof mechanisms in two-opposite-facility location game8
A polylogarithmic approximation algorithm for 2-edge-connected dominating set6
List k-colouring P-free graphs: A Mim-width perspective5
A note on matching-cut in P-free graphs5
A lower bound for the coverability problem in acyclic pushdown VAS5
Security analysis of a dynamic threshold secret sharing scheme using linear subspace method5
An improved exact algorithm for minimum dominating set in chordal graphs5
Optimal-size problem kernels for d-Hitting Set in linear time and space5
Hardness and tractability of the γ-Complete Subgraph problem5
Lot scheduling on a single machine to minimize the (weighted) number of tardy orders5
Longest common subsequence in sublinear space5
Embedded edge connectivity of k-ary n-cubes5
Strategies for generating tree spanners: Algorithms, heuristics and optimal graph classes4
Small cycles, generalized prisms and Hamiltonian cycles in the Bubble-sort graph4
A refined approximation for Euclidean k-means4
On complementing unambiguous automata and graphs with many cliques and cocliques4
Catalan and Schröder permutations sortable by two restricted stacks4
An A⁎ search algorithm for the constrained longest common subsequence problem4
An asymptotically tight online algorithm for m-Steiner Traveling Salesman Problem4
A note on the concrete hardness of the shortest independent vector in lattices4
Correcting the algorithm for the secure domination number of cographs by Jha, Pradhan, and Banerjee4
Faster parameterized algorithm for Bicluster Editing4
Differentiators and detectors4
NP-hardness of shortest path problems in networks with non-FIFO time-dependent travel times4
Tight bounds for reachability problems on one-counter and pushdown systems4
Super spanning connectivity of split-star networks4
A real polynomial for bipartite graph minimum weight perfect matchings3
A queueing network-based distributed Laplacian solver for directed graphs3
Online graph exploration on trees, unicyclic graphs and cactus graphs3
Runtime analysis of evolutionary algorithms via symmetry arguments3
Simpler FM-index for parameterized string matching3
Palindromic trees for a sliding window and its applications3
An Algorithm for the Sequence Alignment with Gap Penalty Problem using Multiway Divide-and-Conquer and Matrix Transposition3
Online search for a hyperplane in high-dimensional Euclidean space3
The upper and lower bounds of R-conditional diagnosability of networks3
Improved entropy bounds for parity filtered self-timed ring based random number generators3
Tight FPT Approximation for Socially Fair Clustering3
A non-clausal tableau calculus for MinSat3
Connectivity, super connectivity and generalized 3-connectivity of folded divide-and-swap cubes3
A faster parameterized algorithm for temporal matching3
Cluster deletion revisited3
Fast primal-dual update against local weight update in linear assignment problem and its application3
Robust algorithms for preemptive scheduling on uniform machines of non-increasing job sizes3
Minimum projective linearizations of trees in linear time3
There is no APTAS for 2-dimensional vector bin packing: Revisited2
Geometric separability using orthogonal objects2
The envy-free matching problem with pairwise preferences2
On semi-transitive orientability of split graphs2
Hard problems that quickly become very easy2
Simplified Chernoff bounds with powers-of-two probabilities2
A note on VNP-completeness and border complexity2
Computing the k densest subgraphs of a graph2
Online single-machine scheduling to minimize the linear combination of makespans of two agents2
Thou shalt covet the average of thy neighbors' cakes2
Kernel for K-free Edge Deletion2
Probabilistic weak bisimulation and axiomatization for probabilistic models2
On the (im)possibility of improving the round diffusion of generalized Feistel structures2
Linear threshold functions in decision lists, decision trees, and depth-2 circuits2
End vertices of graph searches on bipartite graphs2
A characterization of 3-γ-critical graphs which are not bicritical2
A competitive analysis for the Start-Gap algorithm for online memory wear leveling2
Packing batches of items into a single bin2
Surveying global verifiability2
Weighted automata are compact and actively learnable2
The complexity of the vertex-minor problem2
Testing gap k-planarity is NP-complete2
Approximation algorithms for a virtual machine allocation problem with finite types2
Fault-tolerant Hamiltonicity of hypercubes with faulty subcubes2
Polynomial kernels for tracking shortest paths2
Robbins and Ardila meet Berstel2
Correct proof of the main result in “The number of spanning trees of a class of self-similar fractal models” by Ma and Yao2
The complexity of finding temporal separators under waiting time constraints2
The odd chromatic number of a toroidal graph is at most 92
Space-efficient Huffman codes revisited2
Longest distance of a non-uniform dispersion process on the infinite line2
On the preferred extensions of argumentation frameworks: Bijections with naive sets2
On computing the number of (BC-)subtrees, eccentric subtree number, and global and local means of trees2
Order-preserving pattern matching with scaling2
Approximation error of single hidden layer neural networks with fixed weights2
On radio k-labeling of the power of the infinite path2
On clustering with discounts2
New network entropy: The domination entropy of graphs2
Optimizing the evaluation of ℓ-isogenous curve for isogeny-based cryptography2
Bounds and algorithms for generalized superimposed codes2
Cryptanalysis and improvements of an efficient certificate-based proxy signature scheme for IIoT environments2
On the k-means/median cost function2
Extending de Bruijn sequences to larger alphabets2
An algorithm for reconstructing level-2 phylogenetic networks from trinets2
Determining asynchronous test equivalence for probabilistic processes1
Horton-Strahler number, rooted pathwidth and upward drawings of trees1
Optimal circle search despite the presence of faulty robots1
Discrete and mixed two-center problems for line segments1
On the longest common subsequence of Thue-Morse words1
Entailment is Undecidable for Symbolic Heap Separation Logic Formulæ with Non-Established Inductive Rules1
Correcting matrix products over the ring of integers1
Improved algorithms for left factorial residues1
Strong security of linear ramp secret sharing schemes with general access structures1
Local linear set on graphs with bounded twin cover number1
Worst-case analysis of LPT scheduling on a small number of non-identical processors1
Spectral independence, coupling, and the spectral gap of the Glauber dynamics1
Approximating the minimal lookahead needed to win infinite games1
Grundy coloring in some subclasses of bipartite graphs and their complements1
A note on the satisfactory partition problem: Constant size requirement1
Longest previous overlapping factor array1
Revisiting lower dimension lattice attacks on NTRU1
Hamiltonian cycles and paths in hypercubes with disjoint faulty edges1
Improved cube-attack-like cryptanalysis of reduced-round Ketje-Jr and Keccak-MAC1
Strong edge-colorings of sparse graphs with 3Δ − 1 colors1
Cyclic generators and an improved linear kernel for the rooted subtree prune and regraft distance1
A new key recovery attack on a code-based signature from the Lyubashevsky framework1
Results and conjectures on the role of the uniform distribution in the coupon collector's problem with group drawings1
An improved kernel for the flip distance problem on simple convex polygons1
A note on distance-preserving graph sparsification1
Improved bounds for rectangular monotone Min-Plus Product and applications1
Resource allocation in rooted trees subject to sum constraints and nonlinear cost functions1
On the non-efficient PAC learnability of conjunctive queries1
Tight lower bound for average number of terms in optimal double-base number system using information-theoretic tools1
A constant-time sampling algorithm for binary Gaussian distribution over the integers1
Ranking and unranking bordered and unbordered words1
Efficient linear-time ranking and unranking of derangements1
On approximate near-neighbors search under the (continuous) Fréchet distance in higher dimensions1
A generalization of the Blind Rotating Table game1
Kruskal with embedded C-semirings to solve MST problems with partially-ordered costs1
Packing batches of cubes into a single bin1
On d-distance m-tuple (ℓ,r)-domination in graphs1
Randomized consensus with regular registers1
A simple combinatorial algorithm for restricted 2-matchings in subcubic graphs - via half-edges1
Computing inductive vertex orderings1
On public-coin zero-error randomized communication complexity1
A polynomial algorithm for deciding the validity of an electrical distribution tree1
A weakness in OCB3 used with short nonces allowing for a break of authenticity and confidentiality1
Constrained existence of weak subgame perfect equilibria in multiplayer Büchi games1
A simple proof of QBF hardness1
A note on algebraic techniques for subgraph detection1
Approximation and polynomial algorithms for the data mule scheduling with handling time and time span constraints1
Exact PPS sampling with bounded sample size1
Verification and generation of unrefinable partitions1
Borders, palindrome prefixes, and square prefixes1
Determining rate monotonic schedulability of real-time periodic tasks using continued fractions1
Faster counting empty convex polygons in a planar point set1
New results on pairwise compatibility graphs1
Polynomial invariants for cactuses1
On the chromatic numbers of signed triangular and hexagonal grids1
Isomorphism for random k-uniform hypergraphs1
Generalized cuckoo hashing with a stash, revisited1
Checking in polynomial time whether or not a regular tree language is deterministic top-down1
Simplicity in Eulerian circuits: Uniqueness and safety1
Public-key encryption scheme with optimal continuous leakage resilience1
On the intractability of preemptive single-machine job scheduling with release times, deadlines, and family setup times1
Recursion-free modular arithmetic in the lambda-calculus0
Editorial Board0
On the effectiveness of the genetic paradigm for polygonization0
Comment on “An enhanced and secured RSA public cryptosystem algorithm using Chinese remainder theorem (ESRPKC)”0
A nearly tight lower bound for the d-dimensional cow-path problem0
Vertex degrees and 2-cuts in graphs with many hamiltonian vertex-deleted subgraphs0
A sharper lower bound on Rankin's constant0
Smaller kernels for two vertex deletion problems0
Quantitative controller synthesis for consumption Markov decision processes0
Unbiased estimation of inner product via higher order count sketch0
On parallel time in population protocols0
Editorial Board0
The group factorization problem in finite groups of Lie type0
Editorial Board0
Further results on the second relative greedy weight of 3-dimensional codes0
On the complexity of finding a Caristi's fixed point0
Robust scheduling for minimizing maximum lateness on a serial-batch processing machine0
Non-uniform birthday problem revisited: Refined analysis and applications to discrete logarithms0
Algorithms for deletion problems on split graphs0
The complexity of comparing optimal solutions0
Finding (s,d)-hypernetworks in F-hypergraphs is NP-hard0
Editorial Board0
Waypoint routing on bounded treewidth graphs0
Surveying definitions of election verifiability0
Recognizing LBFS trees of bipartite graphs0
Transforming plane triangulations by simultaneous diagonal flips0
Algorithms with improved delay for enumerating connected induced subgraphs of a large cardinality0
FPT approximation and subexponential algorithms for covering few or many edges0
Guided blocks WOM codes0
Relating planar graph drawings to planar satisfiability problems0
The facility location problem with maximum distance constraint0
Maximal elements with minimal logic0
Corrigendum to “Revisiting reachability in polynomial interrupt timed automata” [Information Processing Letters 174 (2022) 106208]0
Editorial Board0
Editorial Board0
Density of distinct squares in non-primitive words0
Synchronizing words under LTL constraints0
On matrices potentially useful for tree codes0
Sparsifying Count Sketch0
On product decomposition0
Algorithmic results in Roman dominating functions on graphs0
The maximum linear arrangement problem for trees under projectivity and planarity0
A note on approximations of directed edge dominating set0
On the parameterized complexity of the Maximum Exposure Problem0
Editorial Board0
Skolem and positivity completeness of ergodic Markov chains0
On some decidability questions concerning supports of rational series0
Polynomial recognition of vulnerable multi-commodities0
Corrigendum to “Mutual exclusion in fully anonymous shared memory systems” [Inf. Process. Lett. 158 (2020) 105938]0
Computing minimal solutions to the ring loading problem0
A simple and improved parameterized algorithm for bicluster editing0
The complexity of computing (almost) orthogonal matrices with ε-copies of the Fourier transform0
Erasure and error correcting ability of Parikh matrices0
Editorial Board0
Learning-augmented maximum flow0
Rank and select operations on a word0
Two-level hub Steiner trees0
Editorial Board0
Computability by monadic second-order logic0
Recognizing well-dominated graphs is coNP-complete0
The effect of iterativity on adversarial opinion forming0
Faster deterministic algorithm for Cactus Vertex Deletion0
The computational complexity of some explainable clustering problems0
Editorial Board0
A note on integral generalized flows in directed partial 2-trees0
Distributivity and residuation for lexicographic orders0
A simple combinatorial proof for the small model property of two-variable logic0
A diameter-revealing proof of the Bondy-Lovász lemma0
On optimization problems in acyclic hypergraphs0
The autocorrelation of a class of quaternary sequences of length pq with high complexity0
Editorial Board0
Regular resolution effectively simulates resolution0
On the security of TrCBC0
Strong hardness of approximation for tree transversals0
A note on the network coloring game: A randomized distributed (Δ + 1)-coloring algorithm0
Optimal approximations made easy0
Faster deterministic algorithm for Co-Path Set0
Statistical EL is ExpTime-complete0
Expressive completeness by separation for discrete time interval temporal logic with expanding modalities0
Editorial Board0
A note on the integrality gap of the configuration LP for restricted Santa Claus0
New bounds on antipowers in words0
Exploring the optimality of byte-wise permutations of a piccolo-type block cipher0
Editorial Board0
An FPT algorithm for orthogonal buttons and scissors0
Grid straight-line embeddings of trees with a minimum number of bends per path0
Tight inapproximability of Nash equilibria in public goods games0
A note on the fine-grained complexity of MIS on regular graphs0
Editorial Board0
Splitting NP-complete sets infinitely0
Security weakness of a certificate-based proxy signature scheme for IIoT environments0
Vertex-connectivity for node failure identification in Boolean Network Tomography0
Deterministic treasure hunt and rendezvous in arbitrary connected graphs0
0.12499594688416