Information Processing Letters

Papers
(The TQCC of Information Processing Letters is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-01-01 to 2026-01-01.)
ArticleCitations
Tighter bound for generalized multiple discrete logarithm problem via MDS matrix method23
Editorial Board12
Polynomial invariants for cactuses12
A note on the satisfactory partition problem: Constant size requirement11
Density of distinct squares in non-primitive words10
A note on the network coloring game: A randomized distributed (Δ + 1)-coloring algorithm10
Geometric separability using orthogonal objects10
On matrices potentially useful for tree codes9
Embedded edge connectivity of k-ary n-cubes7
On approximate near-neighbors search under the (continuous) Fréchet distance in higher dimensions7
Recognizing well-dominated graphs is coNP-complete7
A note on the method of equal shares7
On computing the number of (BC-)subtrees, eccentric subtree number, and global and local means of trees7
Waypoint routing on bounded treewidth graphs7
Grid straight-line embeddings of trees with a minimum number of bends per path6
Metric distortion of obnoxious distributed voting6
Faster deterministic algorithm for Cactus Vertex Deletion6
The longest common subsequence problem for small alphabets in the word RAM model6
Editorial Board6
Logical characterization of branching bisimilarity over random processes5
Exact PPS sampling with bounded sample size5
Tight inapproximability of Nash equilibria in public goods games5
Bounds and algorithms for generalized superimposed codes5
Recursion-free modular arithmetic in the lambda-calculus5
Analyzing Residual Random Greedy for monotone submodular maximization4
Online delay management on a single train line with predictions4
Editorial Board4
Editorial Board4
Weighted well-covered graphs without cycles of lengths 5, 6 and 74
A constant-time sampling algorithm for binary Gaussian distribution over the integers4
Notes about the linear complexity of quaternary cyclotomic sequences of order four4
Heavy and light paths and Hamilton cycles4
Editorial Board4
Smoothness of Schatten norms and sliding-window matrix streams4
The first Zagreb index, reciprocal degree distance and Hamiltonian-connectedness of graphs4
Simplicity in Eulerian circuits: Uniqueness and safety4
A short note on “A note on single-machine scheduling with job-dependent learning effects”4
A simple 4-approximation algorithm for maximum agreement forests on multiple unrooted binary trees4
Order-preserving pattern matching with scaling3
On Voronoi visibility maps of 1.5D terrains with multiple viewpoints3
Instability results for cosine-dissimilarity-based nearest neighbor search on high dimensional Gaussian data3
Public-key encryption scheme with optimal continuous leakage resilience3
On the parameterized complexity of the Maximum Exposure Problem3
Packing batches of cubes into a single bin3
The group factorization problem in finite groups of Lie type3
Long paths in heterogeneous random subgraphs of graphs with large minimum degree3
On public-coin zero-error randomized communication complexity3
Discrete load balancing on complete bipartite graphs3
Inapproximability of counting independent sets in linear hypergraphs3
Thou shalt covet the average of thy neighbors' cakes3
A new class of generalized almost perfect nonlinear monomial functions3
A refined approximation for Euclidean k-means3
Packing batches of items into a single bin3
Luby's MIS algorithms made self-stabilizing3
On size-independent sample complexity of ReLU networks3
A real polynomial for bipartite graph minimum weight perfect matchings3
Long directed detours: Reduction to 2-Disjoint Paths3
Strong edge-colorings of sparse graphs with 3Δ − 1 colors3
Weighted fair division of indivisible items: A review3
Editorial Board3
On conflict-free cuts: Algorithms and complexity3
Robust scheduling for minimizing maximum lateness on a serial-batch processing machine3
A 22k-approximation 3
On-line exploration of rectangular cellular environments with a rectangular hole3
On optimization problems in acyclic hypergraphs2
String searching with mismatches using AVX2 and AVX-512 instructions2
The loss of serving in the dark2
Security weakness of a certificate-based proxy signature scheme for IIoT environments2
Friends-and-strangers is PSPACE-complete2
Reducing the space used by the sieve of Eratosthenes when factoring2
The facility location problem with maximum distance constraint2
Monochromatic partitioning of colored points by lines2
Comparing approximate and probabilistic differential privacy parameters2
Domain-oriented masked bit-parallel finite-field multiplier against side-channel attacks2
Determining rate monotonic schedulability of real-time periodic tasks using continued fractions2
Corrigendum to “On the complexity of co-secure dominating set problem” [Inf. Process. Lett. 185 (2024) 106463]2
On some decidability questions concerning supports of rational series2
Entailment is Undecidable for Symbolic Heap Separation Logic Formulæ with Non-Established Inductive Rules2
A nearly tight lower bound for the d-dimensional cow-path problem2
Algorithmic results in Roman dominating functions on graphs2
Relating planar graph drawings to planar satisfiability problems2
Palindromic trees for a sliding window and its applications2
On regularity of Max-CSPs and Min-CSPs2
Smaller kernels for two vertex deletion problems2
Exploring the optimality of byte-wise permutations of a piccolo-type block cipher2
Escaping Braess's paradox through approximate Caratheodory's theorem2
A weakness in OCB3 used with short nonces allowing for a break of authenticity and confidentiality2
Static type checking without downcast operator2
A note on matching-cut in P-free graphs2
Efficient linear-time ranking and unranking of derangements2
Online single-machine scheduling to minimize the linear combination of makespans of two agents2
Synchronizing words under LTL constraints2
Tight FPT Approximation for Socially Fair Clustering2
An algorithm for reconstructing level-2 phylogenetic networks from trinets2
Improved kernels for tracking paths2
Two-level hub Steiner trees2
Cyclic generators and an improved linear kernel for the rooted subtree prune and regraft distance2
On approximate reconfigurability of label cover2
Insertion depth in power-weight trees2
Fair and truthful allocations under leveled valuations2
Anti Tai mapping for unordered labeled trees2
The complexity of the vertex-minor problem2
Computing the k densest subgraphs of a graph2
On some families of binary codes2
An improved uniform convergence bound with fat-shattering dimension2
0.089407920837402