Theoretical Computer Science

Papers
(The TQCC of Theoretical Computer Science is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
An algorithm for the secure total domination problem in proper interval graphs64
Finer-grained reductions in fine-grained hardness of approximation53
An algorithmic construction of union-intersection-bounded families49
Oracle separations for non-adaptive collapse-free quantum computing39
Maximal degenerate palindromes with gaps and mismatches38
Sublinear P system solutions to NP-complete problems37
A tighter proof for CCA secure inner product functional encryption: Genericity meets efficiency32
A linkable ring signature scheme with unconditional anonymity in the standard model28
Matching cut and variants on bipartite graphs of bounded radius and diameter28
Editorial Board24
How real is incomputability in physics?24
Editorial Board24
On CNF formulas irredundant with respect to unit clause propagation24
Preface23
Parameterised approximation of the fixation probability of the dominant mutation in the multi-type Moran process22
The 1-good-neighbour diagnosability of modified bubblesort graphs under the PMC and 20
Reliability measure of the n-th cartesian product of complete graph K4 on h-extra edge-connectivity20
On 1-planar graphs with bounded cop-number19
The parameterized complexity of welfare guarantees in Schelling segregation19
Editorial Board19
Axiomatising weak bisimulation congruences over CCS with left merge and communication merge18
Partial key exposure attacks on Prime Power RSA with non-consecutive blocks18
A linear time algorithm for connected p-centdian problem on block graphs17
On the power of threshold-based algorithms for detecting cycles in the CONGEST model17
Closed subsets in Bishop topological groups17
A parametric worst-case approach to fairness in cooperative games with transferable utility16
A generalization of a theorem of Rothschild and van Lint16
A new dynamic programming algorithm for the simplified partial digest problem16
Integer k-matching preclusion of some interconnection networks15
Editorial Board15
Editorial Board15
Editorial Board15
Editorial Board14
Three remarks on W graphs14
Cellular automata and bootstrap percolation14
Editorial Board13
Editorial Board13
Deterministic rendezvous in infinite trees13
Network control games played on graphs13
Reliability evaluation of complete graph-based recursive networks13
Distributed coloring and the local structure of unit-disk graphs13
On the binary digits of n and n213
Towards a general methodology for formal verification on spiking neural P systems13
Factorisation in the semiring of finite dynamical systems12
Weakly leveled planarity with bounded span12
Dynamic debt swapping in financial networks12
Decreasing verification radius in local certification12
Editorial Board12
Physical ZKP protocols for Nurimisaki and Kurodoko12
An array P system based on a new variant of pure 2D context-free grammars12
Call admission problems on grids with advice12
On the Weisfeiler algorithm of depth-1 stabilization12
The g-good-neighbor diagnosability of lexicographic product networks under the PMC model12
Editorial Board12
A 5k-vertex kernel for 3-path vertex cover12
Notes on Smyth-completes and local Yoneda-completes12
Investigation of E-voting system using face recognition using convolutional neural network (CNN)12
Linear Programming complementation12
Approximation algorithms for maximum weighted throughput on unrelated machines12
On the existence of EFX (and Pareto-optimal) allocations for binary chores11
Editorial Board11
A strongly polynomial time approximation algorithm for the min-max clustered cycle cover problem11
On properties of languages accepted by deterministic pushdown automata with translucent input letters11
Generating Java code pairing with ChatGPT11
Dormancy-aware timed branching bisimilarity with an application to communication protocol analysis11
Identity-based matchmaking encryption with stronger security and instantiation on lattices11
A categorical approach to reversible Turing machines and Brin-Thompson groups11
Hypergraph burning, matchings, and zero forcing11
The computational complexity of forced capture Hnefatafl11
Computational complexity of normalizing constants for the product of determinantal point processes10
On the complexity of winner determination and strategic control in conditional approval voting10
Generative abstraction of Markov population processes10
The impact of core constraints on truthful bidding in combinatorial auctions10
New approximation algorithms for RNA secondary structures prediction problems by local search10
Connectivity and diagnosability of the complete Josephus cube networks under h-extra fault-tolerant model10
On the detection of local and global amoebas: Theoretical insights and practical algorithms10
Gacs – Kucera theorem10
Editorial Board10
Powers of low rank sparse matrices10
On the complexity of nucleolus computation for bipartite b-matching games10
Updatable searchable symmetric encryption: Definitions and constructions10
The balanced connected subgraph problem for geometric intersection graphs10
Analysis of key reuse security for Aigis.KEM9
Subtyping context-free session types9
Hierarchical decompositions of implicational bases for the enumeration of meet-irreducible elements9
On additive approximate submodularity9
Grouped domination parameterized by vertex cover, twin cover, and beyond9
A weak inverse of language neighborhoods and its properties9
Fast and simple (1 + ε)Δ-edge-coloring of dense graphs9
Complexity and approximation algorithms for two parallel dedicated machine scheduling with conflict constraints9
Editorial Board9
Beyond pointwise submodularity: Non-monotone adaptive submodular maximization subject to knapsack and k-system constraints9
Turing video-based cognitive tests to handle entangled concepts9
Robustly reusable fuzzy extractor from isogeny9
On computable numbers, with an application to the Druckproblem9
Algorithmic results in secure total dominating sets on graphs9
NP-hardness of m-dimensional weighted matching problems9
Single- and multi-objective evolutionary algorithms for the knapsack problem with dynamically changing constraints9
Editorial Board8
Threshold-based network structural dynamics8
Approximation algorithm for prize-collecting sweep cover with base stations8
How bad is the merger paradox?8
Editorial Board8
Self-stabilizing spanner topology control solutions in wireless ad hoc networks8
The existence and efficiency of PMMS allocations8
Parallel Contextual Array Insertion Deletion Grammars, Pure 2D Context-Free Grammars and Associated P Systems8
Relating randomized right-hand sides to communicating rewriting rules8
Complexity results on register context-free grammars and related formalisms8
Certification of an exact worst-case self-stabilization time8
Protocols with constant local storage and unreliable communication8
On minimal critical exponent of balanced sequences8
Algebraic properties and transformations of monographs8
Optimization on the smallest eigenvalue of grounded Laplacian matrix via edge addition8
Improved algorithms for bandit with graph feedback via regret decomposition8
Almost envy-freeness for groups: Improved bounds via discrepancy theory8
Extensional proofs in a propositional logic modulo isomorphisms8
Streaming approximation scheme for minimizing total completion time on parallel machines subject to varying processing capacity8
Upper powerdomains of quasicontinuous dcpos8
Lower bounds for the sum of small-size algebraic branching programs8
Boundary sketching with asymptotically optimal distance and rotation7
Cascade products and Wheeler automata7
Capacity planning for dependable services7
Online coloring of disk graphs7
Diagonal of pseudoinverse of graph Laplacian: Fast estimation and exact results7
Nearly k-universal words – Investigating a part of Simon's congruence7
Disjunctive sums of quasi-nimbers7
Verifiable Crowd Computing: Coping with bounded rationality7
An accelerated deterministic algorithm for maximizing monotone submodular minus modular function with cardinality constraint7
Exploring the gap between treedepth and vertex cover through vertex integrity7
Eliciting truthful reports with partial signals in repeated games7
Greedy+Singleton: An efficient approximation algorithm for k-submodular knapsack maximization7
Decision algorithms for reversibility of 1D cellular automata under reflective boundary conditions7
(Definitely not) Boring interaction abstract machines7
Fixed points and attractors of reactantless and inhibitorless reaction systems7
Editorial Board7
An approximate cost recovery scheme for the k-product facility location game with penalties7
Asynchronous fully-decentralized SGD in the cluster-based model7
Multi-stage Proof-of-Works: Properties and vulnerabilities7
Mutual witness Gabriel drawings of complete bipartite graphs7
A categorical model for organic chemistry7
Securing data in the cloud using pairing-free inner product functional encryption with unbounded vector size7
On a vertex-capturing game7
A new fast root-finder for black box polynomials7
Improved unbounded inner-product functional encryption7
Editorial Board6
Order based algorithms for the core maintenance problem on edge-weighted graphs6
On algorithmic applications of sim-width and mim-width of (H1,H2)-free graphs6
Computational task offloading algorithm based on deep reinforcement learning and multi-task dependency6
Approximate distance oracles with improved stretch for sparse graphs6
Partial and constrained level planarity6
Editorial Board6
Refined computational complexities of Hospitals/Residents problem with regional caps6
Editorial Board6
Linear-space S-table algorithms for the longest common subsequence problem6
The complexity of bicriteria tree-depth6
Efficiency and inefficiency of Nash equilibrium for scheduling games on batching-machines with activation cost6
MODRED: A code-based non-interactive key exchange protocol6
Quantum collision search for ternary LWE keys6
Process-commutative distributed objects: From cryptocurrencies to Byzantine-Fault-Tolerant CRDTs6
Remarks on hyperspaces for Priestley spaces6
Editorial Board6
On the connectedness of arithmetic hyperplanes6
Combinatorics of minimal absent words for a sliding window6
Sorting via shuffles with a cut after the longest increasing prefix6
Location functions for self-stabilizing byzantine tolerant swarms6
Using edge contractions to reduce the semitotal domination number6
TCS special issue: Combinatorics on Words – WORDS 20216
Space efficient algorithm for solving reachability using tree decomposition and separators6
On the power of local graph expansion grammars with and without additional restrictions6
Editorial Board6
Modelling of DNA mismatch repair with a reversible process calculus6
Renaming in distributed certification6
Enhancing fault tolerance of balanced hypercube networks by the edge partition method6
Preface for the special issue of Theoretical Computer Science in honor of the 60th birthday of Yuxi Fu6
Kolmogorov-Loveland betting strategies lose the Betting game on open sets6
From multivalued to Boolean functions: Preservation of soft nested canalization6
Undecidability of the universal support problem for weighted automata over zero-sum-free commutative semirings6
Editorial Board6
In memory of Jérôme Monnot6
Constant amortized time enumeration of Eulerian trails6
Algorithmic aspects of paired disjunctive domination in graphs6
Threshold sampling5
Editorial Board5
Constrained flows in networks5
Clustering under a knapsack constraint: Parameterized approximation for the knapsack median problem5
Quantum and classical query complexities for generalized Simon's problem5
Distributed transformations of Hamiltonian shapes based on line moves5
Random generation of source vectors with a fixed preponderant property5
Editorial Board5
Intrinsic universality in automata networks III: On symmetry versus asynchrony5
Self-similarity of communities of the ABCD model5
Elastic founder graphs improved and enhanced5
Theoretical design of decentralized auction framework under mobile crowdsourcing environment5
Integer-valued martingales and cl-Turing reductions5
Support preorder on finitely supported Cb 5
A decomposition theorem for number-conserving multi-state cellular automata on triangular grids5
Connectivity and constructive algorithms of disjoint paths in dragonfly networks5
Perfectly matched sets in graphs: Parameterized and exact computation5
Resource efficient stabilization for local tasks despite unknown capacity links5
Editorial5
Computational power of autonomous robots: Transparency vs. opaqueness5
Varieties of contextuality based on probability and structural nonembeddability5
The Convex Set Forming Game5
Query answering over inconsistent knowledge bases: A probabilistic approach5
Subnetwork reliability analysis about complete-transposition graph networks5
The work function algorithm for the paging problem5
Chess is hard even for a single player5
Do additional target points speed up evolutionary algorithms?5
Move-optimal arbitrary pattern formation by mobile robots on rectangular grid using near-optimal spatial area5
#P-Hardness proofs of matrix immanants evaluated on restricted matrices5
A logarithmic-sized accountable ring signature scheme in the standard model5
Searching in trees with monotonic query times5
An efficient PMC model-based local diagnosis structure and algorithm5
Centralised connectivity-preserving transformations for programmable matter: A minimal seed approach5
Weighted forward looking adaptive coding5
On the complexity of distance-d independent set reconfiguration5
On the traceability of group signatures: Uncorrupted user must exist5
Linear-time computation of DAWGs, symmetric indexing structures, and MAWs for integer alphabets5
On the complexity of fair coin flipping5
Visibility extension via reflection5
Mutual visibility of luminous robots despite angular inaccuracy5
Better guarantees for k-median with service installation costs5
How majority-vote crossover and estimation-of-distribution algorithms cope with fitness valleys5
Signatures of knowledge for Boolean circuits under standard assumptions5
A fault diagnosis method to defend scapegoating attack in network tomography5
Repeatedly matching items to agents fairly and efficiently5
Model checking differentially private properties5
Tractability beyond β-acyclicity for conjunctive queries with negation and SAT5
The equivalence between Galois and Fibonacci NFSRs5
Learning algebraic structures with the help of Borel equivalence relations5
On monochromatic arithmetic progressions in binary words associated with pattern sequences5
The non-inclusive diagnosability of a kind of networks5
A Java-like calculus with heterogeneous coeffects5
Corrigendum to “Complexity and approximability of the happy set problem” [Theor. Comput. Sci. 866 (2021) 123–144]5
Finitely ambiguous and finitely sequential weighted automata over fields5
Optimal L-algorithms for rendezvous of asynchronous mobile robots with extern5
Efficient and reliable post-quantum authentication5
Languages generated by numerical P systems with thresholds5
Decision on block size in blockchain systems by evolutionary equilibrium analysis5
Sign-then-encrypt with security enhancement and compressed ciphertext5
Fast computations on ordered nominal sets5
An anomaly-based intrusion detection system using recursive feature elimination technique for improved attack detection5
The Voting algorithm is robust to various noise models5
Approximating power node-deletion problems5
Removing algorithmic discrimination (with minimal individual error)5
Time and energy driven online scheduling problem in EV charging5
Editorial Board5
Stagnation detection meets fast mutation4
An FPT algorithm for node-disjoint subtrees problems parameterized by treewidth4
Parking problem by oblivious mobile robots in infinite grids4
0.14318585395813