Information Processing Letters

Papers
(The median citation count of Information Processing Letters is 0. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
About blockchain interoperability46
Bicriteria scheduling on an unbounded parallel-batch machine for minimizing makespan and maximum cost19
Threshold changeable secret sharing with secure secret reconstruction18
Tight binding number bound for P≥3-factor uniform graphs12
Instability results for Euclidean distance, nearest neighbor search on high dimensional Gaussian data11
Complexity and algorithms for injective edge-coloring in graphs10
Mutual exclusion in fully anonymous shared memory systems8
Quantum attacks on Sum of Even-Mansour pseudorandom functions7
Lengths of words accepted by nondeterministic finite automata7
Maximum-area triangle in a convex polygon, revisited7
On computing Pareto optimal paths in weighted time-dependent networks7
Tight efficiency lower bounds for strategy-proof mechanisms in two-opposite-facility location game7
On the correctness of Egalitarian Paxos7
Representations of stably continuous semi-lattices by information systems and abstract bases6
Online leasing strategy for depreciable equipment considering opportunity cost6
The first Zagreb index, reciprocal degree distance and Hamiltonian-connectedness of graphs6
List k-colouring P-free graphs: A Mim-width perspective5
Recognizing and realizing cactus metrics5
Security analysis of a dynamic threshold secret sharing scheme using linear subspace method5
A lower bound for the coverability problem in acyclic pushdown VAS5
Small cycles, generalized prisms and Hamiltonian cycles in the Bubble-sort graph5
Optimal-size problem kernels for d-Hitting Set in linear time and space5
Embedded edge connectivity of k-ary n-cubes5
Lot scheduling on a single machine to minimize the (weighted) number of tardy orders4
Signed coloring of 2-dimensional grids4
A refined approximation for Euclidean k-means4
Longest common subsequence in sublinear space4
A note on the concrete hardness of the shortest independent vector in lattices4
An answer to an open problem of Mesnager on bent functions4
An A⁎ search algorithm for the constrained longest common subsequence problem4
A polylogarithmic approximation algorithm for 2-edge-connected dominating set4
Tight bounds for reachability problems on one-counter and pushdown systems4
Faster parameterized algorithm for Bicluster Editing3
A note on matching-cut in P-free graphs3
Testing gap k-planarity is NP-complete3
Palindromic trees for a sliding window and its applications3
An asymptotically tight online algorithm for m-Steiner Traveling Salesman Problem3
An Algorithm for the Sequence Alignment with Gap Penalty Problem using Multiway Divide-and-Conquer and Matrix Transposition3
A faster parameterized algorithm for temporal matching3
The upper and lower bounds of R-conditional diagnosability of networks3
Super spanning connectivity of split-star networks3
Fast primal-dual update against local weight update in linear assignment problem and its application3
A constant approximation algorithm for the uniform a priori capacitated vehicle routing problem with unit demands3
Differentiators and detectors3
A non-clausal tableau calculus for MinSat3
Minimum projective linearizations of trees in linear time3
On the computational complexity of length- and neighborhood-constrained path problems3
Cluster deletion revisited3
Correcting the algorithm for the secure domination number of cographs by Jha, Pradhan, and Banerjee3
“The simplest protocol for oblivious transfer” revisited3
Catalan and Schröder permutations sortable by two restricted stacks3
On the probability of overlap of random subsequences of pseudorandom number generators3
Remark on subcodes of linear complementary dual codes3
Robust algorithms for preemptive scheduling on uniform machines of non-increasing job sizes3
Modified quadratic residue constructions and new extremal binary self-dual codes of lengths 64, 66 and 683
A queueing network-based distributed Laplacian solver for directed graphs3
On complementing unambiguous automata and graphs with many cliques and cocliques3
An improved exact algorithm for minimum dominating set in chordal graphs3
Strategies for generating tree spanners: Algorithms, heuristics and optimal graph classes2
A real polynomial for bipartite graph minimum weight perfect matchings2
Raiders of the lost equivalence: Probabilistic branching bisimilarity2
Computing the k densest subgraphs of a graph2
Robbins and Ardila meet Berstel2
On the (im)possibility of improving the round diffusion of generalized Feistel structures2
A competitive analysis for the Start-Gap algorithm for online memory wear leveling2
Packing batches of items into a single bin2
Distinguisher on full-round compression function of GOST R2
Surveying global verifiability2
The complexity of the vertex-minor problem2
Cryptanalysis and improvements of an efficient certificate-based proxy signature scheme for IIoT environments2
A note on VNP-completeness and border complexity2
Probabilistic weak bisimulation and axiomatization for probabilistic models2
Approximation algorithms for a virtual machine allocation problem with finite types2
Simpler FM-index for parameterized string matching2
An algorithm for reconstructing level-2 phylogenetic networks from trinets2
Faster algorithms for cograph edge modification problems2
Geometric separability using orthogonal objects2
Longest distance of a non-uniform dispersion process on the infinite line2
Sorting can exponentially speed up pure dynamic programming2
On the chromatic numbers of signed triangular and hexagonal grids2
Extending de Bruijn sequences to larger alphabets2
Runtime analysis of evolutionary algorithms via symmetry arguments2
Correct proof of the main result in “The number of spanning trees of a class of self-similar fractal models” by Ma and Yao2
Online single-machine scheduling to minimize the linear combination of makespans of two agents2
Independent domination versus weighted independent domination2
Kernel for K-free Edge Deletion2
End vertices of graph searches on bipartite graphs2
Hardness and tractability of the γ-Complete Subgraph problem2
On the k-means/median cost function2
NP-hardness of shortest path problems in networks with non-FIFO time-dependent travel times2
Space-efficient Huffman codes revisited2
A generalization of the Blind Rotating Table game2
Hard problems that quickly become very easy2
Online search for a hyperplane in high-dimensional Euclidean space2
Connectivity, super connectivity and generalized 3-connectivity of folded divide-and-swap cubes2
Thou shalt covet the average of thy neighbors' cakes1
Computing inductive vertex orderings1
A simple proof of QBF hardness1
On the complexity of detecting hazards1
Approximation and polynomial algorithms for the data mule scheduling with handling time and time span constraints1
Exact PPS sampling with bounded sample size1
Improved bounds for rectangular monotone Min-Plus Product and applications1
On clustering with discounts1
Verification and generation of unrefinable partitions1
Fault-tolerant Hamiltonicity of hypercubes with faulty subcubes1
The complexity of finding temporal separators under waiting time constraints1
Weighted automata are compact and actively learnable1
Annotated regular expressions and input-driven languages1
Upper bound for the number of closed and privileged words1
On computing the number of (BC-)subtrees, eccentric subtree number, and global and local means of trees1
On the non-efficient PAC learnability of conjunctive queries1
The envy-free matching problem with pairwise preferences1
Strong edge-colorings of sparse graphs with 3Δ − 1 colors1
Cyclic generators and an improved linear kernel for the rooted subtree prune and regraft distance1
Optimal circle search despite the presence of faulty robots1
Improved cube-attack-like cryptanalysis of reduced-round Ketje-Jr and Keccak-MAC1
A characterization of 3-γ-critical graphs which are not bicritical1
Reverse greedy is bad for k-center1
Randomized consensus with regular registers1
An improved kernel for the flip distance problem on simple convex polygons1
Horton-Strahler number, rooted pathwidth and upward drawings of trees1
A simple combinatorial algorithm for restricted 2-matchings in subcubic graphs - via half-edges1
A note on distance-preserving graph sparsification1
Online graph exploration on trees, unicyclic graphs and cactus graphs1
Improved algorithms for left factorial residues1
Approximating the minimal lookahead needed to win infinite games1
New network entropy: The domination entropy of graphs1
A note on algebraic techniques for subgraph detection1
Order-preserving pattern matching with scaling1
A constructive proof of a concentration bound for real-valued random variables1
Longest previous overlapping factor array1
Polynomial invariants for cactuses1
New results on pairwise compatibility graphs1
Grundy coloring in some subclasses of bipartite graphs and their complements1
Lazy or eager dynamic matching may not be fast1
Packing batches of cubes into a single bin1
On public-coin zero-error randomized communication complexity1
A polynomial algorithm for deciding the validity of an electrical distribution tree1
On the longest common subsequence of Thue-Morse words1
On the intractability of preemptive single-machine job scheduling with release times, deadlines, and family setup times1
Determining asynchronous test equivalence for probabilistic processes1
Improved entropy bounds for parity filtered self-timed ring based random number generators1
Polynomial kernels for tracking shortest paths1
A fast algorithm for multiprocessor speed-scaling problem minimizing completion time and energy consumption1
Hamiltonian cycles and paths in hypercubes with disjoint faulty edges1
Bounds and algorithms for generalized superimposed codes1
RAC drawings in subcubic area1
Tight FPT Approximation for Socially Fair Clustering1
On the preferred extensions of argumentation frameworks: Bijections with naive sets1
Resource allocation in rooted trees subject to sum constraints and nonlinear cost functions1
On cryptographic anonymity and unpredictability in secret sharing1
Strong security of linear ramp secret sharing schemes with general access structures1
Borders, palindrome prefixes, and square prefixes1
A constant-time sampling algorithm for binary Gaussian distribution over the integers1
There is no APTAS for 2-dimensional vector bin packing: Revisited1
Determining rate monotonic schedulability of real-time periodic tasks using continued fractions1
Faster counting empty convex polygons in a planar point set1
A new key recovery attack on a code-based signature from the Lyubashevsky framework1
Simplicity in Eulerian circuits: Uniqueness and safety1
A weakness in OCB3 used with short nonces allowing for a break of authenticity and confidentiality1
Results and conjectures on the role of the uniform distribution in the coupon collector's problem with group drawings1
Isomorphism for random k-uniform hypergraphs1
Linear threshold functions in decision lists, decision trees, and depth-2 circuits1
Constrained existence of weak subgame perfect equilibria in multiplayer Büchi games1
Deterministic treasure hunt and rendezvous in arbitrary connected graphs0
Faster deterministic algorithm for Co-Path Set0
Security weakness of a certificate-based proxy signature scheme for IIoT environments0
Quantitative controller synthesis for consumption Markov decision processes0
A diameter-revealing proof of the Bondy-Lovász lemma0
A simple approach to nondecreasing paths0
Vertex degrees and 2-cuts in graphs with many hamiltonian vertex-deleted subgraphs0
Faster deterministic algorithm for Cactus Vertex Deletion0
Kruskal with embedded C-semirings to solve MST problems with partially-ordered costs0
Editorial Board0
Slightly improved lower bounds for homogeneous formulas of bounded depth and bounded individual degree0
Guided blocks WOM codes0
Waypoint routing on bounded treewidth graphs0
A simple and improved parameterized algorithm for bicluster editing0
The odd chromatic number of a toroidal graph is at most 90
Two-level hub Steiner trees0
Editorial Board0
Optimal approximations made easy0
A note on the integrality gap of the configuration LP for restricted Santa Claus0
Editorial Board0
A note on integral generalized flows in directed partial 2-trees0
Finding (s,d)-hypernetworks in F-hypergraphs is NP-hard0
Editorial Board0
Statistical EL is ExpTime-complete0
Computing minimal solutions to the ring loading problem0
Editorial Board0
On product decomposition0
Editorial Board0
Comment on “An enhanced and secured RSA public cryptosystem algorithm using Chinese remainder theorem (ESRPKC)”0
Algorithms with improved delay for enumerating connected induced subgraphs of a large cardinality0
Polynomial recognition of vulnerable multi-commodities0
Editorial Board0
On the security of TrCBC0
Rank and select operations on a word0
The complexity of comparing optimal solutions0
On matrices potentially useful for tree codes0
Surveying definitions of election verifiability0
Unbiased estimation of inner product via higher order count sketch0
An Ore-type condition for the existence of two disjoint cycles0
A note on the network coloring game: A randomized distributed (Δ + 1)-coloring algorithm0
Erasure and error correcting ability of Parikh matrices0
An FPT algorithm for orthogonal buttons and scissors0
On the effectiveness of the genetic paradigm for polygonization0
Editorial Board0
QUIXO is EXPTIME-complete0
A note on the class of languages generated by F-systems over regular languages0
Variational networks of cube-connected cycles are recursive cubes of rings0
Randomized distributed online algorithms against adaptive offline adversaries0
Computability by monadic second-order logic0
Non-uniform birthday problem revisited: Refined analysis and applications to discrete logarithms0
Exploring the optimality of byte-wise permutations of a piccolo-type block cipher0
Approximation ratio of LD algorithm for multi-processor scheduling and the Coffman–Sethi conjecture0
A simple combinatorial proof for the small model property of two-variable logic0
Transforming plane triangulations by simultaneous diagonal flips0
Editorial Board0
Editorial Board0
The facility location problem with maximum distance constraint0
Spectral independence, coupling, and the spectral gap of the Glauber dynamics0
Recognizing well-dominated graphs is coNP-complete0
A note on the satisfactory partition problem: Constant size requirement0
Editorial Board0
Distributivity and residuation for lexicographic orders0
On the parameterized complexity of the Maximum Exposure Problem0
Local linear set on graphs with bounded twin cover number0
A note on the fine-grained complexity of MIS on regular graphs0
Strong hardness of approximation for tree transversals0
Algorithms for deletion problems on split graphs0
Tight lower bound for average number of terms in optimal double-base number system using information-theoretic tools0
On approximate near-neighbors search under the (continuous) Fréchet distance in higher dimensions0
On the additive chromatic number of several families of graphs0
Density of distinct squares in non-primitive words0
Grid straight-line embeddings of trees with a minimum number of bends per path0
On parallel time in population protocols0
A note on approximations of directed edge dominating set0
Approximation algorithms for connected maximum coverage problem for the discovery of mutated driver pathways in cancer0
New bounds on antipowers in words0
Weakest preconditioned goto axiom0
Corrigendum to “Revisiting reachability in polynomial interrupt timed automata” [Information Processing Letters 174 (2022) 106208]0
Editorial Board0
The complexity of computing (almost) orthogonal matrices with ε-copies of the Fourier transform0
Entailment is Undecidable for Symbolic Heap Separation Logic Formulæ with Non-Established Inductive Rules0
Ranking and unranking bordered and unbordered words0
On the complexity of finding a Caristi's fixed point0
The maximum linear arrangement problem for trees under projectivity and planarity0
Editorial Board0
Further results on the second relative greedy weight of 3-dimensional codes0
0.040339946746826