scispace - formally typeset
Search or ask a question

Showing papers in "Information Processing Letters in 2015"


Journal ArticleDOI
TL;DR: These tools for solving MWIS efficiently on odd-hole- and co-chair-free graphs are combined by showing that atoms of prime odd-holes-and-co-Chair- free graphs are nearly perfect and atoms ofprime hole- and- co- chair-free graph are nearly weakly chordal.

68 citations


Journal ArticleDOI
TL;DR: It is shown that in general, the PageRank of an undirected graph is not exactly proportional to the degree distribution of the graph: the main theorem gives an upper and a lower bound to the L 1 norm of the difference of thePageRank and thedegree distribution vectors.

66 citations


Journal ArticleDOI
TL;DR: It is shown that hyperbolicity at a fixed base-point cannot be computed in O ( n 2.05 ) time, unless there exists a faster algorithm for (max,min) matrix multiplication than currently known.

60 citations


Journal ArticleDOI
TL;DR: A method of deciding the order-isomorphism between two strings even when there are same characters is presented and it is shown that the bad character rule of the Horspool algorithm for generic pattern matching problems can be applied to the OPPM problem and a space-efficient algorithm for computing shift tables for text search is presented.

54 citations


Journal ArticleDOI

[...]

TL;DR: A proportionate flow shop problem to maximize the weighted number of Just-in-Time jobs is solved with a pseudo-polynomial algorithm which is faster than the one known in the literature.

53 citations


Journal ArticleDOI
TL;DR: This work considers the following decision problem: given a finite Markov chain with distinguished source and target states, and given a rational number r, does there exist an integer n such that the probability to reach the target from the source in n steps is r?

52 citations


Journal ArticleDOI
TL;DR: This paper restricts its attention to the VCP 3 problem and presents a fixed-parameter algorithm with runtime O ( 2 k k 3.376 + n 4 m ) for the V CP 3 problem.

52 citations


Journal ArticleDOI
TL;DR: The secure domination number γ s ( G) equals the minimum cardinality of a secure dominating set of G, which answers the question posed by Mynhardt at the 22nd Clemson mini-Conference, 2007.

49 citations


Journal ArticleDOI
TL;DR: It is shown that, over a k-letter alphabet, the number of words modulo ~ n is in 2 ? ( n k - 1 log ? n ) .

45 citations


Journal ArticleDOI
TL;DR: The security of dPEKS against KG attacks is redefined with the attacker being the server and the IND-KGA-SERVER security model is proposed to describe security against the server.

44 citations


Journal ArticleDOI
TL;DR: This paper proposes a new construction of ID-based encryption scheme based on integer factorization problem and discrete logarithm problem that is semantically secure against chosen plaintext attack (CPA) in random oracle model and outperforms the other existing schemes in terms of security, computational cost and the length of public key.

Journal ArticleDOI
TL;DR: A practical O ( n m ) time and O ( 1 ) space solution for the longest common substring with k-mismatches problem, and a theoretical solution for one mismatch which runs in quasilinear time.

Journal ArticleDOI
TL;DR: A novel general-form Zhang function (NGFZF) is proposed, developed and investigated, based on the NGFZF, which can be readily generated by successively selecting the different values of its parameters and the notion of infinitely many ZFs is proposed for the first time.

Journal ArticleDOI
TL;DR: In this article, the authors considered a quantum version of the Winternitz-Hellman related-key attack model and showed that for a quantum adversary such attacks are quite powerful: if the secret key is determined by a small number of plaintext-ciphertext pairs, the block cipher can be evaluated efficiently, and a superposition of related keys can be queried, then the key can be extracted efficiently.

Journal ArticleDOI
TL;DR: In this article, the authors studied the decidability of almost sure disclosure in Markov decision processes with partial or complete observation hypotheses for the schedulers and showed that all questions are decidable with complete observation and ω-regular secrets.

Journal ArticleDOI
TL;DR: In this article, the authors build upon a previously proposed formal framework to certify the correctness of impossibility results regarding distributed algorithms that are dedicated to autonomous mobile robots evolving in a continuous space.

Journal ArticleDOI
TL;DR: The correctness of the Certified Propagation Algorithm (CPA) in solving broadcast with locally bounded Byzantine faults is explored and a tight necessary and sufficient condition on the network topology is identified.

Journal ArticleDOI
TL;DR: A polylogarithmic approximation algorithm is proposed for the Arc Orienteering Problem in directed graphs and a constant factor approximation algorithm for the AOP in undirected graphs is presented.

Journal ArticleDOI
TL;DR: A framework for solving the minimum weighted efficient domination (Min-WED) problem is developed based on a reduction to the maximum weight independent set problem in the square of the input graph.

Journal ArticleDOI
TL;DR: A stochastic gradient algorithm and a particle swarm optimization algorithm are proposed to estimate all the unknown parameters of the Hammerstein system and the Weierstrass approximation theorem is introduced to simplify the nonlinearity.

Journal ArticleDOI
TL;DR: Experimental results show that the proposed mechanism achieves a significant reduction of the computational complexity by comparing with the original HEVC, while still maintaining high video quality.

Journal ArticleDOI
TL;DR: A linear-time algorithm for computing the metric dimension for chain graphs, which are bipartite graphs whose vertices can be ordered by neighborhood inclusion, and order-theoretic arguments may be useful for other problems, as well.

Journal ArticleDOI
TL;DR: This paper proposes a dynamic threshold SS based on a bivariate polynomial in which shares generated by the dealer can be used to reconstruct the secret but having a larger threshold which is equivalent to the exact number of participated shareholders in the process.

Journal ArticleDOI
TL;DR: It's illustrated that such model can satisfied the requirement of data fusion in time domain and proper and solid decision can be made by this approach.

Journal ArticleDOI
TL;DR: A new formulation requiring only O (k ) instead of O ( k 2 ) additional variables is proposed, where k is the number of criteria, and is shown to outperform the previously proposed formulation in computational experiments.

Journal ArticleDOI
TL;DR: A single machine scheduling problem in which the processing time of a job is a linear function of its starting time and a variable maintenance on the machine must be performed prior to a given deadline is investigated, it is proved that both problems are NP-hard.

Journal ArticleDOI
TL;DR: It is proved that if velocities of the mobile sensors are different, it is impossible to give any constant factor approximation algorithm to solve the sweep coverage problem unless P = NP, and a 3-approximation algorithm is proposed to guarantee sweep coverage of vertices of a graph.

Journal ArticleDOI
TL;DR: In this paper, the affine-evasive set construction was used to obtain efficient non-malleable codes against affine tampering over F p, where p is a prime.

Journal ArticleDOI
TL;DR: The pessimistic diagnosability of an n-dimensional alternating group graph, denoted by AG n, is determined and is shown to have the strong diagnosable property.

Journal ArticleDOI
TL;DR: The proposed polynomial-time approximation scheme (PTAS) for the maximum independent set problem for a unit disk graph produces a solution of size 1 ( 1 + 1 k ) | OPT | in O ( 2 2 σ k n k + n log ⁡ n ) time using O ( 1 σ + n ) space.