Information Processing Letters

Papers
(The median citation count of Information Processing Letters is 0. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
Tighter bound for generalized multiple discrete logarithm problem via MDS matrix method23
Editorial Board13
Polynomial invariants for cactuses12
A note on the satisfactory partition problem: Constant size requirement12
A note on the network coloring game: A randomized distributed (Δ + 1)-coloring algorithm9
Density of distinct squares in non-primitive words8
On computing the number of (BC-)subtrees, eccentric subtree number, and global and local means of trees7
Geometric separability using orthogonal objects7
Embedded edge connectivity of k-ary n-cubes7
On approximate near-neighbors search under the (continuous) Fréchet distance in higher dimensions7
A note on the method of equal shares7
Recognizing well-dominated graphs is coNP-complete6
Faster deterministic algorithm for Cactus Vertex Deletion6
The longest common subsequence problem for small alphabets in the word RAM model6
Metric distortion of obnoxious distributed voting5
Tight inapproximability of Nash equilibria in public goods games5
Heavy and light paths and Hamilton cycles4
Editorial Board4
Recursion-free modular arithmetic in the lambda-calculus4
Editorial Board4
A short note on “A note on single-machine scheduling with job-dependent learning effects”4
Editorial Board4
Notes about the linear complexity of quaternary cyclotomic sequences of order four4
Bounds and algorithms for generalized superimposed codes4
Online delay management on a single train line with predictions4
Exact PPS sampling with bounded sample size4
Logical characterization of branching bisimilarity over random processes4
Long directed detours: Reduction to 2-Disjoint Paths3
Analyzing Residual Random Greedy for monotone submodular maximization3
The first Zagreb index, reciprocal degree distance and Hamiltonian-connectedness of graphs3
A constant-time sampling algorithm for binary Gaussian distribution over the integers3
Long paths in heterogeneous random subgraphs of graphs with large minimum degree3
String searching with mismatches using AVX2 and AVX-512 instructions3
The group factorization problem in finite groups of Lie type3
On public-coin zero-error randomized communication complexity3
Strong edge-colorings of sparse graphs with 3Δ − 1 colors3
Instability results for cosine-dissimilarity-based nearest neighbor search on high dimensional Gaussian data3
On Voronoi visibility maps of 1.5D terrains with multiple viewpoints3
Smoothness of Schatten norms and sliding-window matrix streams3
Simplicity in Eulerian circuits: Uniqueness and safety3
On-line exploration of rectangular cellular environments with a rectangular hole3
On conflict-free cuts: Algorithms and complexity3
On size-independent sample complexity of ReLU networks3
Exploring the optimality of byte-wise permutations of a piccolo-type block cipher3
Luby's MIS algorithms made self-stabilizing3
A new class of generalized almost perfect nonlinear monomial functions3
Order-preserving pattern matching with scaling3
Inapproximability of counting independent sets in linear hypergraphs3
A simple 4-approximation algorithm for maximum agreement forests on multiple unrooted binary trees3
A real polynomial for bipartite graph minimum weight perfect matchings3
Weighted fair division of indivisible items: A review3
A 22k-approximation 3
Robust scheduling for minimizing maximum lateness on a serial-batch processing machine3
Public-key encryption scheme with optimal continuous leakage resilience3
Thou shalt covet the average of thy neighbors' cakes3
The complexity of HyperQPTL3
On some decidability questions concerning supports of rational series2
Friends-and-strangers is PSPACE-complete2
Editorial Board2
Tight FPT Approximation for Socially Fair Clustering2
A refined approximation for Euclidean k-means2
A weakness in OCB3 used with short nonces allowing for a break of authenticity and confidentiality2
Computing the k densest subgraphs of a graph2
Static type checking without downcast operator2
Comparing approximate and probabilistic differential privacy parameters2
Corrigendum to “On the complexity of co-secure dominating set problem” [Inf. Process. Lett. 185 (2024) 106463]2
Cyclic generators and an improved linear kernel for the rooted subtree prune and regraft distance2
Synchronizing words under LTL constraints2
Relating planar graph drawings to planar satisfiability problems2
Security weakness of a certificate-based proxy signature scheme for IIoT environments2
Packing batches of cubes into a single bin2
An algorithm for reconstructing level-2 phylogenetic networks from trinets2
Improved kernels for tracking paths2
LR parsing for strings with placeholders2
Algorithmic results in Roman dominating functions on graphs2
Anti Tai mapping for unordered labeled trees2
Finding partite hypergraphs efficiently2
On some families of binary codes2
Determining rate monotonic schedulability of real-time periodic tasks using continued fractions2
On optimization problems in acyclic hypergraphs2
Bowties and Hourglasses: Intersections of Double-Wedges Or: Stabbing and Avoiding Line Segments2
The facility location problem with maximum distance constraint2
On the parameterized complexity of the Maximum Exposure Problem2
A nearly tight lower bound for the d-dimensional cow-path problem2
The loss of serving in the dark2
Domain-oriented masked bit-parallel finite-field multiplier against side-channel attacks2
Efficient linear-time ranking and unranking of derangements2
A note on matching-cut in P-free graphs2
On regularity of Max-CSPs and Min-CSPs2
An improved uniform convergence bound with fat-shattering dimension2
Worst-case analysis of LPT scheduling on a small number of non-identical processors1
On product decomposition1
Robust probabilistic temporal logics1
The effect of iterativity on adversarial opinion forming1
Faster algorithms and a smaller kernel for Cliques or Trees Vertex Deletion1
Spectral independence, coupling, and the spectral gap of the Glauber dynamics1
Improved hardness of approximation for Geometric Bin Packing1
Comment on “An enhanced and secured RSA public cryptosystem algorithm using Chinese remainder theorem (ESRPKC)”1
On the security of TrCBC1
Simplified Chernoff bounds with powers-of-two probabilities1
Smaller kernels for two vertex deletion problems1
Monochromatic partitioning of colored points by lines1
There is no APTAS for 2-dimensional vector bin packing: Revisited1
A note for approximating the submodular cover problem over integer lattice with low adaptive and query complexities1
On the preferred extensions of argumentation frameworks: Bijections with naive sets1
Editorial Board1
New results on pairwise compatibility graphs1
Efficient Implementations of Square-root Vélu's Formulas1
Online search for a hyperplane in high-dimensional Euclidean space1
Effective data reduction for strongly stable matching in very sparse graphs1
Discrete and mixed two-center problems for line segments1
The harmonious coloring game1
Steiner connectivity problems in hypergraphs1
Insertion depth in power-weight trees1
Lower bound proof for the size of BDDs representing a shifted addition1
Revisiting lower dimension lattice attacks on NTRU1
Fair and truthful allocations under leveled valuations1
Escaping Braess's paradox through approximate Caratheodory's theorem1
A note on the complexity of one-sided crossing minimization of trees1
Reachability in graphs having linear 2-arboricity two is 1
New sharp lower bound for the quorum coloring number of trees1
Approximating the minimal lookahead needed to win infinite games1
A simple supercritical tradeoff between size and height in resolution1
Editorial Board1
Special issue on Economics and Computation1
An efficient algorithm for identifying rainbow ortho-convex 4-sets in k-colored point sets1
Learning from positive and negative examples: New proof for binary alphabets1
Tighter bounds on non-clairvoyant parallel machine scheduling with prediction to minimize makespan1
A class of cubic polynomial semi-bent functions over 1
NP-hardness of shortest path problems in networks with non-FIFO time-dependent travel times1
Reducing the space used by the sieve of Eratosthenes when factoring1
On radio k-labeling of the power of the infinite path1
On approximate reconfigurability of label cover1
On the intractability of preemptive single-machine job scheduling with release times, deadlines, and family setup times1
On the k-means/median cost function1
Spanners under the Hausdorff and Fréchet distances1
Branching bisimulation semantics for quantum processes1
Hamiltonian cycles of balanced hypercube with disjoint faulty edges0
A lower bound for the Quickhull convex hull algorithm that disproves the Quickhull precision conjecture0
A generalization of the Blind Rotating Table game0
Maximal elements with minimal logic0
Globally minimal defensive alliances0
Generalized cuckoo hashing with a stash, revisited0
Deterministic treasure hunt and rendezvous in arbitrary connected graphs0
All-pairs suffix/prefix in optimal time using Aho-Corasick space0
The complexity of comparing optimal solutions0
Editorial Board0
The complexity of computing the period and the exponent of a digraph0
Corrigendum to “Mutual exclusion in fully anonymous shared memory systems” [Inf. Process. Lett. 158 (2020) 105938]0
Ranking and unranking bordered and unbordered words0
On the hardness of inclusion-wise minimal separators enumeration0
A note on the class of languages generated by F-systems over regular languages0
Skolem and positivity completeness of ergodic Markov chains0
A simple division-free algorithm for computing Pfaffians0
Approximation and polynomial algorithms for the data mule scheduling with handling time and time span constraints0
Improved bounds for rectangular monotone Min-Plus Product and applications0
Distributivity and residuation for lexicographic orders0
Strategies for generating tree spanners: Algorithms, heuristics and optimal graph classes0
Total variation distance for product distributions is 0
Quantitative controller synthesis for consumption Markov decision processes0
On parallel time in population protocols0
An undecidability result for Separation Logic with theory reasoning0
An information theoretic proof of the Chernoff-Hoeffding inequality0
Faster and simpler online computation of string net frequency0
Editorial Board0
A new key recovery attack on a code-based signature from the Lyubashevsky framework0
Note on pancake sorting0
The computational complexity of some explainable clustering problems0
Editorial Board0
Polynomial kernels for tracking shortest paths0
A note on VNP-completeness and border complexity0
Counter abstraction for regular open teams0
Editorial Board0
Guided blocks WOM codes0
Algorithms with improved delay for enumerating connected induced subgraphs of a large cardinality0
New bounds for the number of lightest cycles in undirected graphs0
On clustering with discounts0
FPT approximation and subexponential algorithms for covering few or many edges0
Cryptanalysis of multivariate threshold ring signature schemes0
Strong hardness of approximation for tree transversals0
Dispersion problem on a convex polygon0
Mesosome avoidance0
Approximation error of single hidden layer neural networks with fixed weights0
A note on approximations of directed edge dominating set0
Covering segments on a line with drones0
A linear-time algorithm for the two-color one-dimensional buttons & scissors0
Vertex-connectivity for node failure identification in Boolean Network Tomography0
A polynomial algorithm for deciding the validity of an electrical distribution tree0
The Steiner path aggregation problem0
On reversing arcs to improve arc-connectivity0
Fast primal-dual update against local weight update in linear assignment problem and its application0
Finding (s,d)-hypernetworks in F-hypergraphs is NP-hard0
Modifying an instance of the super-stable matching problem0
Editorial Board0
Prenex universal first-order safety properties0
Editorial Board0
On the complexity of some restricted variants of Quotient Pigeon and a weak variant of Kőnig0
The maximum linear arrangement problem for trees under projectivity and planarity0
Rank-2 module-LIP with special matrices0
A note on improved results for one round distributed clique listing0
The autocorrelation of a class of quaternary sequences of length pq with high complexity0
Connectivity, super connectivity and generalized 3-connectivity of folded divide-and-swap cubes0
Editorial Board0
Faster deterministic algorithm for Co-Path Set0
An improved kernel for the flip distance problem on simple convex polygons0
Geometric systems of unbiased representatives0
Universal approximation theorem for neural networks with inputs from a topological vector space0
Determining asynchronous test equivalence for probabilistic processes0
On the “majority is least stable” conjecture0
Improving compressed matrix multiplication using control variate method0
Splitting NP-complete sets infinitely0
A note on algebraic techniques for subgraph detection0
Satisfying the restricted isometry property with the optimal number of rows and slightly less randomness0
Word automatic groups of nilpotency class 20
Airports and railways with unsplittable demand0
Editorial Board0
Lower and upper bounds on graph communicabilities0
Semantic flowers for good-for-games and deterministic automata0
Optimal approximations made easy0
Approximation algorithms for a virtual machine allocation problem with finite types0
On the non-efficient PAC learnability of conjunctive queries0
EvenPath in directed single-crossing graphs0
Algorithms for subgraph complementation to some classes of graphs0
Recognizing LBFS trees of bipartite graphs0
Is this network proper forest-based?0
Editorial Board0
On maximum bipartite matching with separation0
On the Tractability Landscape of the Conditional Minisum Approval Voting Rule0
On semi-transitive orientability of split graphs0
On the hull number on cycle convexity of graphs0
Regular resolution effectively simulates resolution0
Connected equitable cake division via Sperner's lemma0
Output bounds for conjunctions of path queries0
Space-efficient Huffman codes revisited0
Further results on the second relative greedy weight of 3-dimensional codes0
Weakest preconditioned goto axiom0
Polynomial recognition of vulnerable multi-commodities0
Unbiased estimation of inner product via higher order count sketch0
Editorial Board0
An improved spectral lower bound of treewidth0
Red Blue Set Cover problem on axis-parallel hyperplanes and other objects0
A sharper lower bound on Rankin's constant0
Practical committing attacks against Rocca-S0
Checking in polynomial time whether or not a regular tree language is deterministic top-down0
Deciding origin equivalence of weakly self-nesting macro tree transducers0
The upper and lower bounds of R-conditional diagnosability of networks0
Linear threshold functions in decision lists, decision trees, and depth-2 circuits0
Finding the cyclic covers of a string0
Improved lower bound for differentially private facility location0
4/3 rectangle tiling lower bound0
0.24406790733337