Information Processing Letters

Papers
(The TQCC of Information Processing Letters is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
Tighter bound for generalized multiple discrete logarithm problem via MDS matrix method23
Editorial Board13
Polynomial invariants for cactuses12
A note on the satisfactory partition problem: Constant size requirement12
A note on the network coloring game: A randomized distributed (Δ + 1)-coloring algorithm9
Density of distinct squares in non-primitive words8
On computing the number of (BC-)subtrees, eccentric subtree number, and global and local means of trees7
Geometric separability using orthogonal objects7
Embedded edge connectivity of k-ary n-cubes7
On approximate near-neighbors search under the (continuous) Fréchet distance in higher dimensions7
A note on the method of equal shares7
Faster deterministic algorithm for Cactus Vertex Deletion6
The longest common subsequence problem for small alphabets in the word RAM model6
Recognizing well-dominated graphs is coNP-complete6
Tight inapproximability of Nash equilibria in public goods games5
Metric distortion of obnoxious distributed voting5
Recursion-free modular arithmetic in the lambda-calculus4
Editorial Board4
A short note on “A note on single-machine scheduling with job-dependent learning effects”4
Editorial Board4
Notes about the linear complexity of quaternary cyclotomic sequences of order four4
Bounds and algorithms for generalized superimposed codes4
Online delay management on a single train line with predictions4
Exact PPS sampling with bounded sample size4
Logical characterization of branching bisimilarity over random processes4
Heavy and light paths and Hamilton cycles4
Editorial Board4
Long paths in heterogeneous random subgraphs of graphs with large minimum degree3
String searching with mismatches using AVX2 and AVX-512 instructions3
The group factorization problem in finite groups of Lie type3
On public-coin zero-error randomized communication complexity3
Strong edge-colorings of sparse graphs with 3Δ − 1 colors3
Instability results for cosine-dissimilarity-based nearest neighbor search on high dimensional Gaussian data3
On Voronoi visibility maps of 1.5D terrains with multiple viewpoints3
Smoothness of Schatten norms and sliding-window matrix streams3
Simplicity in Eulerian circuits: Uniqueness and safety3
On-line exploration of rectangular cellular environments with a rectangular hole3
On conflict-free cuts: Algorithms and complexity3
On size-independent sample complexity of ReLU networks3
Exploring the optimality of byte-wise permutations of a piccolo-type block cipher3
Luby's MIS algorithms made self-stabilizing3
A new class of generalized almost perfect nonlinear monomial functions3
Order-preserving pattern matching with scaling3
Inapproximability of counting independent sets in linear hypergraphs3
A simple 4-approximation algorithm for maximum agreement forests on multiple unrooted binary trees3
A real polynomial for bipartite graph minimum weight perfect matchings3
Weighted fair division of indivisible items: A review3
A 22k-approximation 3
Robust scheduling for minimizing maximum lateness on a serial-batch processing machine3
Public-key encryption scheme with optimal continuous leakage resilience3
Thou shalt covet the average of thy neighbors' cakes3
The complexity of HyperQPTL3
Long directed detours: Reduction to 2-Disjoint Paths3
Analyzing Residual Random Greedy for monotone submodular maximization3
The first Zagreb index, reciprocal degree distance and Hamiltonian-connectedness of graphs3
A constant-time sampling algorithm for binary Gaussian distribution over the integers3
A refined approximation for Euclidean k-means2
A weakness in OCB3 used with short nonces allowing for a break of authenticity and confidentiality2
Static type checking without downcast operator2
Comparing approximate and probabilistic differential privacy parameters2
Computing the k densest subgraphs of a graph2
Corrigendum to “On the complexity of co-secure dominating set problem” [Inf. Process. Lett. 185 (2024) 106463]2
Cyclic generators and an improved linear kernel for the rooted subtree prune and regraft distance2
Synchronizing words under LTL constraints2
Relating planar graph drawings to planar satisfiability problems2
Security weakness of a certificate-based proxy signature scheme for IIoT environments2
Packing batches of cubes into a single bin2
An algorithm for reconstructing level-2 phylogenetic networks from trinets2
Improved kernels for tracking paths2
LR parsing for strings with placeholders2
Anti Tai mapping for unordered labeled trees2
Finding partite hypergraphs efficiently2
Algorithmic results in Roman dominating functions on graphs2
On some families of binary codes2
Determining rate monotonic schedulability of real-time periodic tasks using continued fractions2
On optimization problems in acyclic hypergraphs2
Bowties and Hourglasses: Intersections of Double-Wedges Or: Stabbing and Avoiding Line Segments2
The facility location problem with maximum distance constraint2
On the parameterized complexity of the Maximum Exposure Problem2
A nearly tight lower bound for the d-dimensional cow-path problem2
The loss of serving in the dark2
Domain-oriented masked bit-parallel finite-field multiplier against side-channel attacks2
Efficient linear-time ranking and unranking of derangements2
A note on matching-cut in P-free graphs2
On regularity of Max-CSPs and Min-CSPs2
An improved uniform convergence bound with fat-shattering dimension2
On some decidability questions concerning supports of rational series2
Friends-and-strangers is PSPACE-complete2
Editorial Board2
Tight FPT Approximation for Socially Fair Clustering2
0.10646414756775