scispace - formally typeset
Search or ask a question

Showing papers in "Information Processing Letters in 1996"


Journal ArticleDOI
TL;DR: The problem of deciding whether a graph can be made into a chordal graph by adding a fixed number k of edges is shown to be solvable in 0( 4’( k + 1) --3’2 (m + n) ) time, and is thus fixed-parameter tractable.

431 citations


Journal ArticleDOI
TL;DR: A polynomial-time algorithm is demonstrated for calculating the block-interchange distance of a permutation (i.e. the minimum number of block- interchanges required to transform the permutation to the identity).

172 citations


Journal ArticleDOI
TL;DR: An application to multilevel statistical computation is presented, namely classified retrieval of exact statistics from unclassified computation on disclosure-protected (perturbed) data.

153 citations


Journal ArticleDOI
TL;DR: This paper investigates how the re-construction could be achieved with two dividing strategies to optimize a test suite with divide-and-conquer techniques.

146 citations


Journal ArticleDOI
Tomio Hirata1
TL;DR: This paper gives a simple unified algorithm for computing distance maps in O(N 2 ) time for an imput of N×N binary image.

146 citations


Journal ArticleDOI
TL;DR: A simple theorem is proved that provides a lower bound on the size of nondeterministic finite automata which accept a given regular language.

133 citations


Journal ArticleDOI
TL;DR: B branching bisimilarity can equivalently be defined in terms of semi-branching bisimulations; the results suggest that such a definition is more intuitive than the original definition of Van Glabbeek and Weijland (1989).

120 citations


Journal ArticleDOI
TL;DR: This work presents an algorithm for string matching with mismatches based in arithmetical operations that runs in linear worst case time for most practical cases and presents a new approach to string searching.

115 citations


Journal ArticleDOI
TL;DR: The pairwise comparison methodology introduced by Thurston in 1927 can be used as a powerful inference tool and knowledge acquisition technique in knowledge-based systems and should be considered as an empirical experiment using a Monte Carlo approach.

107 citations


Journal ArticleDOI
TL;DR: It is proved that for any ϵ > 0 it is NP-hard (even for bipartite graphs) to approximate the maximum balance of the connected partition for G = (V, E) with an absolute error guarantee of ¦V¦1 − e.

94 citations


Journal ArticleDOI
TL;DR: Experimental results on a Silicon Graphics Challenge multiprocessor demonstrate good overall performance for the new algorithm on small heaps, and significant performance improvements over known alternatives on large heaps with mixed insertion/deletion workloads.

Journal ArticleDOI
TL;DR: This work presents a simple self-stabilizing leader election protocol that recovers in O(1) time from a state with a single transient fault on oriented rings, and reveals the effect of a single fault is tightly contained around the fault.

Journal ArticleDOI
TL;DR: In this note the makespan scheduling problem on a single processor is considered and several polynomial-time algorithms for finding an optimal schedule are given.

Journal ArticleDOI
Helmut Seidl1
TL;DR: This paper gives an alternative proof of the result of Long et al. (1994) that nested fixpoint expressions e of alternation depth d > 1 can be evaluated over a complete lattice of height h in time O (d · h · ¦e¦ (d − 1 )) ⌜ d 2 ⌝+1 .

Journal ArticleDOI
TL;DR: A simple proof shows that BPP is contained in a complexity class that presumably lies even lower in this Polynomial-time Hierarchy than was previously known.

Journal ArticleDOI
TL;DR: This paper shows a general lower bound of Ω(log( 1 δ ) e(1 − 2η) 2 ) on the number of examples required for PAC learning in the presence of classification noise and demonstrates the optimality of the generalLower bound by providing a noise-tolerant learning algorithm for the class of symmetric Boolean functions which uses a sample size within a constant factor of this bound.

Journal ArticleDOI
TL;DR: This work studies the tree 3-spanner problem for some special classes of graphs namely interval graphs, permutation graphs and regular bipartite graphs.

Journal ArticleDOI
TL;DR: The dynamic version of this problem is considered, and simple algorithms and data structures achieving O( n ) amortized time per edge insertion starting from an empty graph are provided, which favorably compares to the trivial O( m + n ) time bound per operation obtained applying the off-line algorithm.

Journal ArticleDOI
TL;DR: An approximation-preserving reduction from MINSAT to the minimum vertex cover (MINVC) problem is presented, and it is observed thatMINSAT remains NP-complete even when restricted to planar instances.


Journal ArticleDOI
TL;DR: It is shown that two cryptographic schemes for encrypting 2-D gray scale images by using a large family of fractals can easily be broken with a pair of plain-image and cipher-sequential data.

Journal ArticleDOI
TL;DR: It is shown that given a binary n -cube with f e ⩽ n − 4 faulty edges and f v n − 1 faulty vertices, a ring of length at least 2 n − 2 f v can be obtained.

Journal ArticleDOI
TL;DR: Algorithms for finding the clique transversal number and theClique independence number for a comparability graph of n nodes are presented, where M ( n ) is the complexity of multiplying two n × n matrices.

Journal ArticleDOI
TL;DR: It is shown that the work function algorithm for the 2-evader problem has competitive ratio m − 2 for all metric spaces with m points, which settles the k-server conjecture for metric Spaces with k + 2 points.

Journal ArticleDOI
TL;DR: This paper shrinks the gap for the Max 3- set Splitting problem and its generalization Max k-Set Splitting from both ends, finding new lower bounds and new upper bounds.

Journal ArticleDOI
TL;DR: The effect of local changes in variable ordering is studied and a simulated annealing algorithm for the computation of good variable orderings is presented.

Journal ArticleDOI
TL;DR: A formal proof of convergence of a class of algorithms for reducing inconsistency of pairwise comparisons (pc) method and making an inference that iterated modifications of the pc matrix made by human experts should also converge is presented.

Journal ArticleDOI
TL;DR: By proposing a general solution for all the authenticated encryption schemes based on the discrete logarithm problem, the recipient can easily determine the missing message blocks, and then acknowledge the sender to send only these blocks again.

Journal ArticleDOI
TL;DR: In this article, the authors present distributed algorithms for constructing a depth-first search tree for a communication network, which are more efficient than previous methods and achieve the best performance in the worst case.

Journal ArticleDOI
TL;DR: This paper addresses the preemptive case of deterministic scheduling parallel applications in a multiprogrammed multiprocessor system and proposes a low-order polynomial time algorithm for the makespan optimality criterion and tasks with different release times.