Theoretical Computer Science

Papers
(The TQCC of Theoretical Computer Science is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-05-01 to 2025-05-01.)
ArticleCitations
How real is incomputability in physics?46
Factorisation in the semiring of finite dynamical systems38
Three remarks on W graphs34
An optimal algorithm for 2-bounded delay buffer management with lookahead32
Deterministic rendezvous in infinite trees32
Algorithms for energy conservation in heterogeneous data centers29
The parameterized complexity of welfare guarantees in Schelling segregation28
A 5k-vertex kernel for 3-path vertex cover26
Closed subsets in Bishop topological groups24
On the power of threshold-based algorithms for detecting cycles in the CONGEST model18
A new dynamic programming algorithm for the simplified partial digest problem18
Parameterised approximation of the fixation probability of the dominant mutation in the multi-type Moran process17
An algorithm for the secure total domination problem in proper interval graphs17
On the solution bound of two-sided scaffold filling17
Partial key exposure attacks on Prime Power RSA with non-consecutive blocks16
A generalization of a theorem of Rothschild and van Lint15
New (k,l,m)-verifiable multi-secret sharing schemes based on XTR public key system15
CPA/CCA2-secure PKE with squared-exponential DFR from low-noise LPN15
Sublinear P system solutions to NP-complete problems14
Finer-grained reductions in fine-grained hardness of approximation14
Editorial Board14
Improvements in the computing efficiency of the probabilities of the LIL test for the PRNG evaluation14
Editorial Board14
Distributed coloring and the local structure of unit-disk graphs14
Editorial Board13
Improved upper bound for sorting permutations by prefix transpositions13
A data structure for substring-substring LCS length queries13
Editorial Board13
Wildcarded identity-based encryption from lattices13
A linear time algorithm for connected p-centdian problem on block graphs12
Maximal degenerate palindromes with gaps and mismatches12
A parametric worst-case approach to fairness in cooperative games with transferable utility12
Complexity issues for timeline-based planning over dense time under future and minimal semantics12
On the binary digits of n and n212
Editorial Board12
Editorial Board11
Editorial11
An array P system based on a new variant of pure 2D context-free grammars11
An algorithmic construction of union-intersection-bounded families11
Cellular automata and bootstrap percolation11
Oracle separations for non-adaptive collapse-free quantum computing11
A linkable ring signature scheme with unconditional anonymity in the standard model10
Preface10
Call admission problems on grids with advice10
Notes on Smyth-completes and local Yoneda-completes10
Network control games played on graphs10
Editorial Board10
On 1-planar graphs with bounded cop-number10
Reliability evaluation of complete graph-based recursive networks10
Towards a general methodology for formal verification on spiking neural P systems10
Editorial Board10
Complexity and algorithms for neighbor-sum-2-distinguishing {1,3}-edge-weighting of graphs10
Physical ZKP protocols for Nurimisaki and Kurodoko10
Reliability measure of the n-th cartesian product of complete graph K4 on h-extra edge-connectivity10
Linear Programming complementation9
Grouped domination parameterized by vertex cover, twin cover, and beyond9
Integer k-matching preclusion of some interconnection networks9
Encoding Boolean networks into reaction systems for investigating causal dependencies in gene regulation9
A tighter proof for CCA secure inner product functional encryption: Genericity meets efficiency9
Dormancy-aware timed branching bisimilarity with an application to communication protocol analysis9
A strongly polynomial time approximation algorithm for the min-max clustered cycle cover problem9
Investigation of E-voting system using face recognition using convolutional neural network (CNN)9
A substructure based lower bound for eternal vertex cover number9
Generative abstraction of Markov population processes9
Powers of low rank sparse matrices9
On some FPT problems without polynomial Turing compressions9
Identity-based matchmaking encryption with stronger security and instantiation on lattices9
Computational complexity of normalizing constants for the product of determinantal point processes8
Beyond pointwise submodularity: Non-monotone adaptive submodular maximization subject to knapsack and k-system constraints8
The computational complexity of forced capture Hnefatafl8
NP-hardness of m-dimensional weighted matching problems8
Connectivity and diagnosability of the complete Josephus cube networks under h-extra fault-tolerant model8
Algorithmic results in secure total dominating sets on graphs8
Complexity of Scorpion Solitaire and applications to Klondike8
Gacs – Kucera theorem8
Editorial Board8
Robustly reusable fuzzy extractor from isogeny8
On additive approximate submodularity8
Polynomial kernels for paw-free edge modification problems8
On minimal critical exponent of balanced sequences8
Near-optimal clustering in the k-machine model8
The balanced connected subgraph problem for geometric intersection graphs8
Fast and simple (1 + ε)Δ-edge-coloring of dense graphs8
Complexity and approximation algorithms for two parallel dedicated machine scheduling with conflict constraints8
Editorial Board8
The classes PPA-k: Existence from arguments modulo k8
Editorial Board8
Editorial Board8
Editorial Board8
Generating Java code pairing with ChatGPT7
Rational elements of summation semirings7
Hierarchical decompositions of implicational bases for the enumeration of meet-irreducible elements7
Embedding algorithm of spined cube into grid structure and its wirelength computation7
Parallel Contextual Array Insertion Deletion Grammars, Pure 2D Context-Free Grammars and Associated P Systems7
Relating randomized right-hand sides to communicating rewriting rules7
Enhancing fault tolerance of balanced hypercube networks by the edge partition method7
On computable numbers, with an application to the Druckproblem7
The impact of core constraints on truthful bidding in combinatorial auctions7
New approximation algorithms for RNA secondary structures prediction problems by local search7
Disjoint paths and connected subgraphs for H-free graphs7
Updatable searchable symmetric encryption: Definitions and constructions7
Process-commutative distributed objects: From cryptocurrencies to Byzantine-Fault-Tolerant CRDTs7
Greedy+Singleton: An efficient approximation algorithm for k-submodular knapsack maximization7
Unified graphical co-modeling, analysis and verification of cyber-physical systems by combining AADL and Simulink/Stateflow7
Optimization on the smallest eigenvalue of grounded Laplacian matrix via edge addition7
Upper powerdomains of quasicontinuous dcpos7
Alternation in two-way finite automata7
Local fairness in hedonic games via individual threshold coalitions7
Single- and multi-objective evolutionary algorithms for the knapsack problem with dynamically changing constraints7
Enumeration of subtrees and BC-subtrees with maximum degree no more than k in trees7
The existence and efficiency of PMMS allocations7
Streaming approximation scheme for minimizing total completion time on parallel machines subject to varying processing capacity7
On algorithmic applications of sim-width and mim-width of (H1,H2)-free graphs7
Algebraic properties and transformations of monographs7
On the complexity of nucleolus computation for bipartite b-matching games7
A Myhill-Nerode theorem for register automata and symbolic trace languages7
Modelling of DNA mismatch repair with a reversible process calculus6
Nearly k-universal words – Investigating a part of Simon's congruence6
Verifiable Crowd Computing: Coping with bounded rationality6
Cascade products and Wheeler automata6
Taming the knight's tour: Minimizing turns and crossings6
Online coloring of disk graphs6
Cutting bamboo down to size6
Boundary sketching with asymptotically optimal distance and rotation6
Exploring the gap between treedepth and vertex cover through vertex integrity6
Differential logical relations, part II increments and derivatives6
(k,p)-planarity: A relaxation of hybrid planarity6
Building bridges – Honoring Nataša Jonoska on the occasion of her 60th birthday6
Bisimilarity on Basic Parallel Processes6
A categorial approach to reaction systems: First steps6
Capacity planning for dependable services6
Disjunctive sums of quasi-nimbers6
A simple rounding scheme for multistage optimization6
Component conditional fault tolerance of hierarchical folded cubic networks6
Computational task offloading algorithm based on deep reinforcement learning and multi-task dependency6
Fixed points and attractors of reactantless and inhibitorless reaction systems6
Eliciting truthful reports with partial signals in repeated games6
Multi-stage Proof-of-Works: Properties and vulnerabilities6
Editorial Board6
Exhaustive generation of some lattice paths and their prefixes6
Extensional proofs in a propositional logic modulo isomorphisms6
Editorial Board6
Role colouring graphs in hereditary classes6
Range minimum queries in minimal space6
Self-stabilizing spanner topology control solutions in wireless ad hoc networks6
On the complexity of local-equitable coloring of graphs6
An approximate cost recovery scheme for the k-product facility location game with penalties6
Editorial Board6
An accelerated deterministic algorithm for maximizing monotone submodular minus modular function with cardinality constraint6
Mutual witness Gabriel drawings of complete bipartite graphs6
The g-component connectivity of graphs6
Combinatorics of minimal absent words for a sliding window5
Algorithmic aspects of paired disjunctive domination in graphs5
Mutual visibility of luminous robots despite angular inaccuracy5
Protocols with constant local storage and unreliable communication5
Remarks on hyperspaces for Priestley spaces5
Improved algorithms for bandit with graph feedback via regret decomposition5
On the complexity of fair coin flipping5
Almost envy-freeness for groups: Improved bounds via discrepancy theory5
Location functions for self-stabilizing byzantine tolerant swarms5
A categorical model for organic chemistry5
Editorial Board5
Order based algorithms for the core maintenance problem on edge-weighted graphs5
From multivalued to Boolean functions: Preservation of soft nested canalization5
Editorial Board5
Self-similarity of communities of the ABCD model5
Editorial Board5
Approximation of the Double Traveling Salesman Problem with Multiple Stacks5
Editorial Board5
The complexity of bicriteria tree-depth5
Linear-space S-table algorithms for the longest common subsequence problem5
Sorting via shuffles with a cut after the longest increasing prefix5
On finding maximum disjoint paths with different colors: Computational complexity and practical LP-based algorithms5
Decision algorithms for reversibility of 1D cellular automata under reflective boundary conditions5
Weighted forward looking adaptive coding5
On a vertex-capturing game5
Editorial Board5
Approximation algorithm for prize-collecting sweep cover with base stations5
TCS special issue: Combinatorics on Words – WORDS 20215
Securing data in the cloud using pairing-free inner product functional encryption with unbounded vector size5
Editorial Board5
Preface for the special issue of Theoretical Computer Science in honor of the 60th birthday of Yuxi Fu5
A certifying and dynamic algorithm for the recognition of proper circular-arc graphs5
A new fast root-finder for black box polynomials5
Undecidability of the universal support problem for weighted automata over zero-sum-free commutative semirings5
Editorial Board5
Distributed transformations of Hamiltonian shapes based on line moves5
Asynchronous fully-decentralized SGD in the cluster-based model5
The unpaired many-to-many k-disjoint paths in bipartite hypercube-like networks5
Complexity results on register context-free grammars and related formalisms5
MODRED: A code-based non-interactive key exchange protocol5
Threshold-based network structural dynamics5
On the connectedness of arithmetic hyperplanes5
How bad is the merger paradox?5
Using edge contractions to reduce the semitotal domination number5
Diagonal of pseudoinverse of graph Laplacian: Fast estimation and exact results5
Languages generated by numerical P systems with thresholds5
Editorial5
Space efficient algorithm for solving reachability using tree decomposition and separators5
Improved unbounded inner-product functional encryption5
D_PSNI: Delimited persistent stochastic non-interference5
Certification of an exact worst-case self-stabilization time5
A weak semantic approach to bisimulation metrics in models with nondeterminism and continuous state spaces5
In memory of Jérôme Monnot5
Centralised connectivity-preserving transformations for programmable matter: A minimal seed approach5
Linear-time computation of DAWGs, symmetric indexing structures, and MAWs for integer alphabets4
Fast computations on ordered nominal sets4
A decomposition theorem for number-conserving multi-state cellular automata on triangular grids4
On the power of local graph expansion grammars with and without additional restrictions4
Physical zero-knowledge proof for Ripple Effect4
How majority-vote crossover and estimation-of-distribution algorithms cope with fitness valleys4
Comparing reactions in reaction systems4
Approximate distance oracles with improved stretch for sparse graphs4
Visibility extension via reflection4
2-colored point-set embeddings of partial 2-trees4
Subnetwork reliability analysis of bubble-sort graph networks4
Secret handshakes: Full dynamicity, deniability and lattice-based design4
Varieties of contextuality based on probability and structural nonembeddability4
Multi-key fully homomorphic encryption from NTRU and (R)LWE with faster bootstrapping4
A Java-like calculus with heterogeneous coeffects4
AbU: A calculus for distributed event-driven programming with attribute-based interaction4
Repeatedly matching items to agents fairly and efficiently4
Query answering over inconsistent knowledge bases: A probabilistic approach4
Resource efficient stabilization for local tasks despite unknown capacity links4
Constant amortized time enumeration of Eulerian trails4
Better guarantees for k-median with service installation costs4
Do additional target points speed up evolutionary algorithms?4
Approximating power node-deletion problems4
Corrigendum to “Complexity and approximability of the happy set problem” [Theor. Comput. Sci. 866 (2021) 123–144]4
Stand up indulgent gathering4
The work function algorithm for the paging problem4
The equivalence between Galois and Fibonacci NFSRs4
The Voting algorithm is robust to various noise models4
On monochromatic arithmetic progressions in binary words associated with pattern sequences4
On the complexity of distance-d independent set reconfiguration4
Constrained flows in networks4
A model of random industrial SAT4
Tractability beyond β-acyclicity for conjunctive queries with negation and SAT4
Sign-then-encrypt with security enhancement and compressed ciphertext4
Query-competitive sorting with uncertainty4
A tight bound for shortest augmenting paths on trees4
Model checking differentially private properties4
Threshold sampling4
Query minimization under stochastic uncertainty4
Decision on block size in blockchain systems by evolutionary equilibrium analysis4
Removing algorithmic discrimination (with minimal individual error)4
Intrinsic universality in automata networks III: On symmetry versus asynchrony4
Signatures of knowledge for Boolean circuits under standard assumptions4
Polynomial-time checking of generalized Sahlqvist syntactic shape4
Quantum and classical query complexities for generalized Simon's problem4
0.12949109077454