Theoretical Computer Science

Papers
(The median citation count of Theoretical Computer Science is 0. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-11-01 to 2025-11-01.)
ArticleCitations
An algorithm for the secure total domination problem in proper interval graphs52
Finer-grained reductions in fine-grained hardness of approximation49
Network control games played on graphs42
An algorithmic construction of union-intersection-bounded families37
Oracle separations for non-adaptive collapse-free quantum computing33
Editorial Board32
Preface22
Editorial Board22
Parameterised approximation of the fixation probability of the dominant mutation in the multi-type Moran process22
Factorisation in the semiring of finite dynamical systems21
Matching cut and variants on bipartite graphs of bounded radius and diameter19
Towards a general methodology for formal verification on spiking neural P systems19
Decreasing verification radius in local certification19
Maximal degenerate palindromes with gaps and mismatches18
A tighter proof for CCA secure inner product functional encryption: Genericity meets efficiency18
A linkable ring signature scheme with unconditional anonymity in the standard model18
Notes on Smyth-completes and local Yoneda-completes17
Partial key exposure attacks on Prime Power RSA with non-consecutive blocks16
The parameterized complexity of welfare guarantees in Schelling segregation16
Axiomatising weak bisimulation congruences over CCS with left merge and communication merge16
How real is incomputability in physics?16
On 1-planar graphs with bounded cop-number16
On the binary digits of n and n215
On the power of threshold-based algorithms for detecting cycles in the CONGEST model15
Improved upper bound for sorting permutations by prefix transpositions15
Distributed coloring and the local structure of unit-disk graphs15
Deterministic rendezvous in infinite trees15
Editorial Board15
A parametric worst-case approach to fairness in cooperative games with transferable utility14
A generalization of a theorem of Rothschild and van Lint14
A linear time algorithm for connected p-centdian problem on block graphs14
Closed subsets in Bishop topological groups14
A new dynamic programming algorithm for the simplified partial digest problem14
A 5k-vertex kernel for 3-path vertex cover14
Complexity issues for timeline-based planning over dense time under future and minimal semantics13
Sublinear P system solutions to NP-complete problems13
Call admission problems on grids with advice13
Editorial Board13
New (k,l,m)-verifiable multi-secret sharing schemes based on XTR public key system13
Editorial Board12
Three remarks on W graphs12
A data structure for substring-substring LCS length queries12
Improvements in the computing efficiency of the probabilities of the LIL test for the PRNG evaluation12
Cellular automata and bootstrap percolation12
Complexity and algorithms for neighbor-sum-2-distinguishing {1,3}-edge-weighting of graphs12
Editorial Board12
Algorithms for energy conservation in heterogeneous data centers12
An optimal algorithm for 2-bounded delay buffer management with lookahead12
Editorial Board12
Reliability evaluation of complete graph-based recursive networks12
Wildcarded identity-based encryption from lattices11
Linear Programming complementation11
Robustly reusable fuzzy extractor from isogeny11
Grouped domination parameterized by vertex cover, twin cover, and beyond11
Integer k-matching preclusion of some interconnection networks11
On the Weisfeiler algorithm of depth-1 stabilization11
An array P system based on a new variant of pure 2D context-free grammars11
Editorial Board11
Editorial Board11
Editorial Board11
Reliability measure of the n-th cartesian product of complete graph K4 on h-extra edge-connectivity11
On the existence of EFX (and Pareto-optimal) allocations for binary chores11
Approximation algorithms for maximum weighted throughput on unrelated machines11
Physical ZKP protocols for Nurimisaki and Kurodoko11
Fast and simple (1 + ε)Δ-edge-coloring of dense graphs10
A strongly polynomial time approximation algorithm for the min-max clustered cycle cover problem10
Identity-based matchmaking encryption with stronger security and instantiation on lattices10
On computable numbers, with an application to the Druckproblem10
Complexity and approximation algorithms for two parallel dedicated machine scheduling with conflict constraints10
Dormancy-aware timed branching bisimilarity with an application to communication protocol analysis10
Powers of low rank sparse matrices10
On the complexity of winner determination and strategic control in conditional approval voting10
Upper powerdomains of quasicontinuous dcpos10
On the complexity of nucleolus computation for bipartite b-matching games10
The computational complexity of forced capture Hnefatafl10
Turing video-based cognitive tests to handle entangled concepts10
Connectivity and diagnosability of the complete Josephus cube networks under h-extra fault-tolerant model10
Computational complexity of normalizing constants for the product of determinantal point processes10
The impact of core constraints on truthful bidding in combinatorial auctions9
Single- and multi-objective evolutionary algorithms for the knapsack problem with dynamically changing constraints9
Editorial Board9
Beyond pointwise submodularity: Non-monotone adaptive submodular maximization subject to knapsack and k-system constraints9
New approximation algorithms for RNA secondary structures prediction problems by local search9
Gacs – Kucera theorem9
On additive approximate submodularity9
Editorial Board9
Updatable searchable symmetric encryption: Definitions and constructions9
Editorial Board9
Generative abstraction of Markov population processes9
NP-hardness of m-dimensional weighted matching problems9
The balanced connected subgraph problem for geometric intersection graphs9
On algorithmic applications of sim-width and mim-width of (H1,H2)-free graphs8
Hypergraph burning, matchings, and zero forcing8
On minimal critical exponent of balanced sequences8
Hierarchical decompositions of implicational bases for the enumeration of meet-irreducible elements8
Algorithmic results in secure total dominating sets on graphs8
Polynomial kernels for paw-free edge modification problems8
Algebraic properties and transformations of monographs8
Parallel Contextual Array Insertion Deletion Grammars, Pure 2D Context-Free Grammars and Associated P Systems8
Near-optimal clustering in the k-machine model8
Investigation of E-voting system using face recognition using convolutional neural network (CNN)8
A Myhill-Nerode theorem for register automata and symbolic trace languages8
Disjoint paths and connected subgraphs for H-free graphs8
Generating Java code pairing with ChatGPT8
Lower bounds for the sum of small-size algebraic branching programs8
Optimization on the smallest eigenvalue of grounded Laplacian matrix via edge addition8
The existence and efficiency of PMMS allocations8
Embedding algorithm of spined cube into grid structure and its wirelength computation8
Enumeration of subtrees and BC-subtrees with maximum degree no more than k in trees8
Enhancing fault tolerance of balanced hypercube networks by the edge partition method8
On some FPT problems without polynomial Turing compressions8
Cutting bamboo down to size7
Nearly k-universal words – Investigating a part of Simon's congruence7
Mutual witness Gabriel drawings of complete bipartite graphs7
Threshold-based network structural dynamics7
(k,p)-planarity: A relaxation of hybrid planarity7
Disjunctive sums of quasi-nimbers7
Bisimilarity on Basic Parallel Processes7
On the complexity of local-equitable coloring of graphs7
Self-stabilizing spanner topology control solutions in wireless ad hoc networks7
Relating randomized right-hand sides to communicating rewriting rules7
Extensional proofs in a propositional logic modulo isomorphisms7
How bad is the merger paradox?7
Capacity planning for dependable services7
Differential logical relations, part II increments and derivatives7
Exploring the gap between treedepth and vertex cover through vertex integrity7
Streaming approximation scheme for minimizing total completion time on parallel machines subject to varying processing capacity7
On a vertex-capturing game7
Approximation algorithm for prize-collecting sweep cover with base stations7
Complexity results on register context-free grammars and related formalisms7
Taming the knight's tour: Minimizing turns and crossings7
Fixed points and attractors of reactantless and inhibitorless reaction systems7
Editorial Board7
Building bridges – Honoring Nataša Jonoska on the occasion of her 60th birthday7
Computational task offloading algorithm based on deep reinforcement learning and multi-task dependency7
Eliciting truthful reports with partial signals in repeated games7
Multi-stage Proof-of-Works: Properties and vulnerabilities7
Protocols with constant local storage and unreliable communication7
Certification of an exact worst-case self-stabilization time7
A simple rounding scheme for multistage optimization7
Almost envy-freeness for groups: Improved bounds via discrepancy theory7
Editorial Board7
Range minimum queries in minimal space7
Greedy+Singleton: An efficient approximation algorithm for k-submodular knapsack maximization7
Improved algorithms for bandit with graph feedback via regret decomposition7
Model checking differentially private properties6
Approximate distance oracles with improved stretch for sparse graphs6
Computational power of autonomous robots: Transparency vs. opaqueness6
Time and energy driven online scheduling problem in EV charging6
On the power of local graph expansion grammars with and without additional restrictions6
Asynchronous fully-decentralized SGD in the cluster-based model6
An approximate cost recovery scheme for the k-product facility location game with penalties6
Cascade products and Wheeler automata6
Unified graphical co-modeling, analysis and verification of cyber-physical systems by combining AADL and Simulink/Stateflow6
Securing data in the cloud using pairing-free inner product functional encryption with unbounded vector size6
Modelling of DNA mismatch repair with a reversible process calculus6
Editorial Board6
Decision algorithms for reversibility of 1D cellular automata under reflective boundary conditions6
Clustering under a knapsack constraint: Parameterized approximation for the knapsack median problem6
Partial and constrained level planarity6
Remarks on hyperspaces for Priestley spaces6
Kolmogorov-Loveland betting strategies lose the Betting game on open sets6
Sorting via shuffles with a cut after the longest increasing prefix6
The Convex Set Forming Game6
A categorical model for organic chemistry6
Boundary sketching with asymptotically optimal distance and rotation6
Editorial Board6
Verifiable Crowd Computing: Coping with bounded rationality6
Editorial Board6
MODRED: A code-based non-interactive key exchange protocol6
Improved unbounded inner-product functional encryption6
Mutual visibility of luminous robots despite angular inaccuracy6
Subnetwork reliability analysis about complete-transposition graph networks6
Self-similarity of communities of the ABCD model6
How majority-vote crossover and estimation-of-distribution algorithms cope with fitness valleys6
Editorial Board6
Undecidability of the universal support problem for weighted automata over zero-sum-free commutative semirings6
Online coloring of disk graphs6
An accelerated deterministic algorithm for maximizing monotone submodular minus modular function with cardinality constraint6
Diagonal of pseudoinverse of graph Laplacian: Fast estimation and exact results6
On the connectedness of arithmetic hyperplanes6
Order based algorithms for the core maintenance problem on edge-weighted graphs6
Process-commutative distributed objects: From cryptocurrencies to Byzantine-Fault-Tolerant CRDTs6
A new fast root-finder for black box polynomials6
Do additional target points speed up evolutionary algorithms?6
Query answering over inconsistent knowledge bases: A probabilistic approach5
Learning algebraic structures with the help of Borel equivalence relations5
Tractability beyond β-acyclicity for conjunctive queries with negation and SAT5
Connectivity and constructive algorithms of disjoint paths in dragonfly networks5
Finitely ambiguous and finitely sequential weighted automata over fields5
Editorial Board5
Integer-valued martingales and cl-Turing reductions5
Using edge contractions to reduce the semitotal domination number5
TCS special issue: Combinatorics on Words – WORDS 20215
Visibility extension via reflection5
The complexity of bicriteria tree-depth5
Efficient and reliable post-quantum authentication5
Preface for the special issue of Theoretical Computer Science in honor of the 60th birthday of Yuxi Fu5
On monochromatic arithmetic progressions in binary words associated with pattern sequences5
Centralised connectivity-preserving transformations for programmable matter: A minimal seed approach5
Chess is hard even for a single player5
Languages generated by numerical P systems with thresholds5
Resource efficient stabilization for local tasks despite unknown capacity links5
In memory of Jérôme Monnot5
Editorial5
Query minimization under stochastic uncertainty5
Combinatorics of minimal absent words for a sliding window5
A Java-like calculus with heterogeneous coeffects5
The unpaired many-to-many k-disjoint paths in bipartite hypercube-like networks5
The work function algorithm for the paging problem5
Location functions for self-stabilizing byzantine tolerant swarms5
Signatures of knowledge for Boolean circuits under standard assumptions5
Editorial Board5
Approximating power node-deletion problems5
Efficiency and inefficiency of Nash equilibrium for scheduling games on batching-machines with activation cost5
Weighted forward looking adaptive coding5
On the complexity of distance-d independent set reconfiguration5
Space efficient algorithm for solving reachability using tree decomposition and separators5
Revisiting RSA-polynomial problem and semiprime factorization5
Distributed transformations of Hamiltonian shapes based on line moves5
Intrinsic universality in automata networks III: On symmetry versus asynchrony5
An anomaly-based intrusion detection system using recursive feature elimination technique for improved attack detection5
Constant amortized time enumeration of Eulerian trails5
From multivalued to Boolean functions: Preservation of soft nested canalization5
AbU: A calculus for distributed event-driven programming with attribute-based interaction5
Editorial Board5
Varieties of contextuality based on probability and structural nonembeddability5
Editorial Board5
PSPACE-hardness of variants of the graph coloring game5
Repeatedly matching items to agents fairly and efficiently5
Refined computational complexities of Hospitals/Residents problem with regional caps5
Move-optimal arbitrary pattern formation by mobile robots on rectangular grid using near-optimal spatial area5
Linear-space S-table algorithms for the longest common subsequence problem5
An efficient PMC model-based local diagnosis structure and algorithm5
Theoretical design of decentralized auction framework under mobile crowdsourcing environment5
Maximizing the ratio of cluster split to cluster diameter without and with cardinality constraints5
Threshold sampling5
Corrigendum to “Complexity and approximability of the happy set problem” [Theor. Comput. Sci. 866 (2021) 123–144]5
Constrained flows in networks5
Algorithmic aspects of paired disjunctive domination in graphs5
Polynomial-time checking of generalized Sahlqvist syntactic shape5
Optimal L-algorithms for rendezvous of asynchronous mobile robots with extern5
The equivalence between Galois and Fibonacci NFSRs5
On the complexity of fair coin flipping5
Sign-then-encrypt with security enhancement and compressed ciphertext5
Editorial Board5
Removing algorithmic discrimination (with minimal individual error)5
Physical zero-knowledge proof for Ripple Effect5
A fault diagnosis method to defend scapegoating attack in network tomography5
Relativized depth4
0.11494994163513