We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 41-60 of 10,000 results
  1. Online Geometric Covering and Piercing

    We consider the online version of the piercing set problem, where geometric objects arrive one by one, and the online algorithm must maintain a valid...

    Minati De, Saksham Jain, ... Satyam Singh in Algorithmica
    Article 03 June 2024
  2. Slim Tree-Cut Width

    Tree-cut width is a parameter that has been introduced as an attempt to obtain an analogue of treewidth for edge cuts. Unfortunately, in spite of its...

    Robert Ganian, Viktoriia Korchemna in Algorithmica
    Article Open access 01 June 2024
  3. ZLR: a fast online authenticated encryption scheme achieving full security

    Online authenticated encryption has been considered of practical relevance in light-weight environments due to low latency and constant memory usage....

    Wonseok Choi, Seongha Hwang, ... Jooyoung Lee in Designs, Codes and Cryptography
    Article Open access 30 May 2024
  4. Approximating Long Cycle Above Dirac’s Guarantee

    Parameterization above (or below) a guarantee is a successful concept in parameterized algorithms. The idea is that many computational problems admit...

    Fedor V. Fomin, Petr A. Golovach, ... Kirill Simonov in Algorithmica
    Article Open access 30 May 2024
  5. New Algorithms for Steiner Tree Reoptimization

    Reoptimization is a setting in which we are given a good approximate solution of an optimization problem instance and a local modification that...

    Davide Bilò in Algorithmica
    Article Open access 29 May 2024
  6. Streaming approximation resistance of every ordering CSP

    Noah G. Singer, Madhu Sudan, Santhoshini Velusamy in computational complexity
    Article Open access 29 May 2024
  7. Algebraic Global Gadgetry for Surjective Constraint Satisfaction

    The constraint satisfaction problem (CSP) on a finite relational structure B is to decide, given a set of constraints on variables where the...

    Hubie Chen in computational complexity
    Article Open access 29 May 2024
  8. Approximation Algorithms for Covering Vertices by Long Paths

    Given a graph, the general problem to cover the maximum number of vertices by a collection of vertex-disjoint long paths seems to escape from the...

    Mingyang Gong, Brett Edgar, ... Eiji Miyano in Algorithmica
    Article 28 May 2024
  9. Constructions of t-strongly multimedia IPP codes with length \(t+1\)

    Strongly multimedia identifiable parent property code ( t -SMIPPC) was introduced for protecting multimedia contents from illegally redistributing...

    **g Jiang, Fenggui Pei, ... Henk D. L. Hollmann in Designs, Codes and Cryptography
    Article 28 May 2024
  10. Some new constructions of optimal linear codes and alphabet-optimal \((r,\delta )\)-locally repairable codes

    In distributed storage systems, an r -Locally Repairable Code ( r -LRC) ensures that a failed symbol can be recovered by accessing at most r other...

    **g Qiu, Fang-Wei Fu in Designs, Codes and Cryptography
    Article 24 May 2024
  11. Structure of CSS and CSS-T quantum codes

    We investigate CSS and CSS-T quantum error-correcting codes from the point of view of their existence, rarity, and performance. We give a lower bound...

    Elena Berardini, Alessio Caminata, Alberto Ravagnani in Designs, Codes and Cryptography
    Article 24 May 2024
  12. Bounds on data limits for all-to-all comparison from combinatorial designs

    In situations where every item in a data set must be compared with every other item in the set, it may be desirable to store the data across a number...

    Joanne Hall, Daniel Horsley, Douglas R. Stinson in Designs, Codes and Cryptography
    Article Open access 23 May 2024
  13. Limits of Preprocessing

    Yuval Filmus, Yuval Ishai, ... Guy Kindler in computational complexity
    Article Open access 23 May 2024
  14. Parity Permutation Pattern Matching

    Virginia Ardévol Martínez, Florian Sikora, Stéphane Vialette in Algorithmica
    Article 22 May 2024
  15. Efficient quantum algorithms for some instances of the semidirect discrete logarithm problem

    The semidirect discrete logarithm problem (SDLP) is the following analogue of the standard discrete logarithm problem in the semidirect product...

    Muhammad Imran, Gábor Ivanyos in Designs, Codes and Cryptography
    Article Open access 21 May 2024
  16. On duplication-free codes for disjoint or equal-length errors

    Motivated by applications in DNA storage, we study a setting in which strings are affected by tandem-duplication errors. In particular, we look at...

    Wenjun Yu, Moshe Schwartz in Designs, Codes and Cryptography
    Article 21 May 2024
  17. Improved Approximation Algorithms by Generalizing the Primal-Dual Method Beyond Uncrossable Functions

    We address long-standing open questions raised by Williamson, Goemans, Vazirani and Mihail pertaining to the design of approximation algorithms for...

    Ishan Bansal, Joseph Cheriyan, ... Sharat Ibrahimpur in Algorithmica
    Article 20 May 2024
Did you find what you were looking for? Share feedback.