scispace - formally typeset
Search or ask a question

Showing papers in "Information Processing Letters in 2020"


Journal ArticleDOI
TL;DR: In this paper, the authors prove that blockchain interoperability is impossible according to the classical definition of a blockchain and show that having interoperability requires a 2-in-1 blockchain containing both ledgers.

38 citations


Journal ArticleDOI
TL;DR: A bivariate symmetry polynomial is utilized to propose a basic threshold changeable secret sharing (TCSS) scheme which is cheating immune and thwarts the above illegal participant attack.

18 citations


Journal ArticleDOI
Pierre Sutra1
TL;DR: This paper identifies a problem in both the TLA+ specification and the implementation of the E egalitarian Paxos protocol related to how replicas switch from one ballot to another when computing the dependencies of a command.

16 citations


Journal ArticleDOI
TL;DR: It is proved by counterexample that the linear-time algorithm presented in 1979 by Dobkin and Snyder for solving the largest-area inscribed triangle fails, as well as a renewed analysis of the problem.

15 citations


Journal ArticleDOI
TL;DR: This article introduces the full anonymous model, namely a model in which both the processes and the registers are anonymous, and presents a deadlock-free mutual exclusion algorithm in such a fully anonymous model where the anonymous registers are read/modify/write registers.

10 citations


Journal ArticleDOI
TL;DR: The classic problem of triangle-free graph recognition reduces to the problem of does M accept a word of length l, and an O(n^{\omega} (log n) 1+{\epsilon}} log l)-time algorithm is given to solve it, where {\omega] is the optimal exponent for matrix multiplication.

10 citations


Journal ArticleDOI
TL;DR: The Hierarchical Overlap Graph (HOG) is an alternative graph that also encodes all maximal overlaps, but uses a space that is linear in the sum of the lengths of the input words.

10 citations


Journal ArticleDOI
TL;DR: In this article, the authors consider finding a path with some constraints on its length and the number of vertices neighboring the path, that is, being outside of and incident with the path.

8 citations


Journal ArticleDOI
TL;DR: In this paper, the authors introduce a new type of metric called a cactus metric, which is a metric that can be realized by a Cactus graph and describe an algorithm that can recognize whether or not a metric is acactus metric and, if so, compute its optimal realization in O(n3) time, where n is the number of points in the space.

8 citations


Journal ArticleDOI
TL;DR: This work shows that problem kernels of asymptotically optimal size O ( k d ) for d-Hitting Set are computable in linear time and space and experimentally compares the linear-time kernelizations to each other and to a classical data reduction algorithm due to Weihe.

8 citations


Journal ArticleDOI
TL;DR: In this paper, the binary reachability relation of a timed automaton is definable in linear arithmetic and a new proof of the result of Comon and Jurski is given.

Journal ArticleDOI
TL;DR: The approach is a generic construction based on the identity-based lossy trapdoor functions (IB-LTDF), and it also can be extended to design CCA secure deterministic identity- based encryption schemes (D-IBE).

Journal ArticleDOI
TL;DR: In this paper, it was shown that any ternary Euclidean (resp. quaternary Hermitian) linear complementary dual [n, k ] code contains a Euclideans (resp., Hermitians) LHD subcode for 2 ≤ k ≤ n.

Journal ArticleDOI
TL;DR: Accounting for opportunity cost is extended to the online leasing strategy for depreciable equipment and shows that a smaller competitive ratio can be obtained when considering opportunity cost, which illustrates that the introduction of the opportunity cost has a significant influence on both the deterministic and randomized strategies.

Journal ArticleDOI
TL;DR: The eccentricities of all vertices of a chordal graph G can be computed in linear time with an additive one-sided error of at most 2 after a linear time preprocessing.

Journal ArticleDOI
TL;DR: This work analyzes in detail the probability that sequences of equal length generated by a pseudorandom number generator starting from random points of the state space overlap, providing for the first time an exact result and manageable bounds.

Journal ArticleDOI
TL;DR: Modified versions of quadratic double circulant and quadratically bordered doublecirculant constructions over the binary field and the rings F 2 + u F 2 and F 4 - u F 4 for different prime values of p are considered.

Journal ArticleDOI
TL;DR: PSMF2 is described, a program synthesizer that combines model finder and genetic programming that has allowed PSMF2 to synthesize 7 programs found in the SyGuS competition, the iJava and IntroClass, and the Genetic programming communities.

Journal ArticleDOI
TL;DR: The signed chromatic number for the class G of all 2-dimensional grids lies between 5 and 6 and the coloring of signed graphs is defined through homomorphism.

Journal ArticleDOI
TL;DR: A dealer-free and non-interactive dynamic threshold secret sharing scheme has been proposed by Harn and Hsu in Information Processing Letters in 2015 as discussed by the authors, where it has been claimed that the secrecy of shares and the secret of the secret are unconditionally preserved if m ∈ ( t, 1 + t ( t + 1 ) / 2 ].

Journal ArticleDOI
TL;DR: The problem of minimizing the number of tardy orders in this context is proved to be strongly NP-hard, and an efficient heuristic is introduced.

Journal ArticleDOI
TL;DR: The probabilistic analogue to the notion of semi-branching bisimilarity and to van Glabbeek and Weijland's Stuttering Lemma are introduced to prove that Probabilistic branching bis similarity is indeed an equivalence relation.

Journal ArticleDOI
TL;DR: In this article, the authors give algorithms for Cograph Deletion and Cograph Editing whose running times are O ⁎ ( 2.303 k ) and O ε ( 4.329 k ), respectively.

Journal ArticleDOI
TL;DR: In this paper, a decisional security proof for the case of a corrupt sender was provided and it was shown that the protocol of Chou and Orlandi cannot be instantiated securely with groups for which their decisional problem cannot be solved correctly with overwhelming probability.

Journal ArticleDOI
TL;DR: Two open problems on the construction of bent functions are proposed, one of which is solved by considering a class of PS − vectorial bent functions, and the other is still outstanding, which has been settled by Tang et al. in 2017.

Journal ArticleDOI
TL;DR: It is shown that the minimum weight spanning tree problem on undirected n-vertex graphs can be solved by a pure DP algorithm performing only O ( n 3 ) operations, and the presence of both min and max operations means that now DP algorithms can sort.

Journal ArticleDOI
TL;DR: In this paper, the authors give necessary conditions and sufficient conditions for a graph to be in PCG based on cut-vertices and twins, which provide reductions among PCGs and imply that complete k-partite graphs, cacti, and some other graph classes are subsets of PCG.

Journal ArticleDOI
TL;DR: A novel technique is presented that addresses the all best swap edges problem in a distributed environment from a time perspective that works in linear time with respect to the height h of T for a number of different criteria, while retaining the optimal number of messages.

Journal ArticleDOI
TL;DR: An algorithm is provided, which takes as input an a priori TSP solution with approximation factor γ, and gives a solution to the aPriori CVRP with unit demands, whose cost is at most ( 1 + k / N + γ ) times the value of the optimal solution.

Journal ArticleDOI
TL;DR: A better analysis is presented that shows the integrality gap is not worse than $3 + 5/6 \approx 3.8333$ and is shown to be non-constructive since the local search has not been shown to terminate in polynomial time.