Theoretical Computer Science

Papers
(The median citation count of Theoretical Computer Science is 0. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-06-01 to 2025-06-01.)
ArticleCitations
Deterministic rendezvous in infinite trees47
An optimal algorithm for 2-bounded delay buffer management with lookahead42
Algorithms for energy conservation in heterogeneous data centers37
The parameterized complexity of welfare guarantees in Schelling segregation33
A 5k-vertex kernel for 3-path vertex cover33
Closed subsets in Bishop topological groups31
On the power of threshold-based algorithms for detecting cycles in the CONGEST model29
A new dynamic programming algorithm for the simplified partial digest problem27
Parameterised approximation of the fixation probability of the dominant mutation in the multi-type Moran process25
On the solution bound of two-sided scaffold filling21
An algorithm for the secure total domination problem in proper interval graphs19
CPA/CCA2-secure PKE with squared-exponential DFR from low-noise LPN18
New (k,l,m)-verifiable multi-secret sharing schemes based on XTR public key system18
Partial key exposure attacks on Prime Power RSA with non-consecutive blocks18
Finer-grained reductions in fine-grained hardness of approximation16
Editorial Board16
A generalization of a theorem of Rothschild and van Lint16
Editorial Board16
A data structure for substring-substring LCS length queries15
Editorial Board15
Editorial Board15
Editorial Board14
An array P system based on a new variant of pure 2D context-free grammars14
A parametric worst-case approach to fairness in cooperative games with transferable utility14
Editorial14
Improved upper bound for sorting permutations by prefix transpositions14
Complexity issues for timeline-based planning over dense time under future and minimal semantics14
Editorial Board14
Preface13
An algorithmic construction of union-intersection-bounded families13
Towards a general methodology for formal verification on spiking neural P systems13
Editorial Board13
Oracle separations for non-adaptive collapse-free quantum computing13
Editorial Board13
Network control games played on graphs13
Complexity and algorithms for neighbor-sum-2-distinguishing {1,3}-edge-weighting of graphs12
On 1-planar graphs with bounded cop-number12
Reliability evaluation of complete graph-based recursive networks12
Physical ZKP protocols for Nurimisaki and Kurodoko12
Integer k-matching preclusion of some interconnection networks12
Notes on Smyth-completes and local Yoneda-completes12
On the binary digits of n and n212
Factorisation in the semiring of finite dynamical systems11
Sublinear P system solutions to NP-complete problems11
A linear time algorithm for connected p-centdian problem on block graphs11
Distributed coloring and the local structure of unit-disk graphs11
How real is incomputability in physics?11
Cellular automata and bootstrap percolation11
A linkable ring signature scheme with unconditional anonymity in the standard model11
Maximal degenerate palindromes with gaps and mismatches11
A tighter proof for CCA secure inner product functional encryption: Genericity meets efficiency11
Improvements in the computing efficiency of the probabilities of the LIL test for the PRNG evaluation11
Call admission problems on grids with advice11
Wildcarded identity-based encryption from lattices11
Updatable searchable symmetric encryption: Definitions and constructions10
Single- and multi-objective evolutionary algorithms for the knapsack problem with dynamically changing constraints10
Powers of low rank sparse matrices10
Three remarks on W graphs10
Beyond pointwise submodularity: Non-monotone adaptive submodular maximization subject to knapsack and k-system constraints10
Linear Programming complementation10
Identity-based matchmaking encryption with stronger security and instantiation on lattices10
Reliability measure of the n-th cartesian product of complete graph K4 on h-extra edge-connectivity10
On some FPT problems without polynomial Turing compressions10
A strongly polynomial time approximation algorithm for the min-max clustered cycle cover problem10
Fast and simple (1 + ε)Δ-edge-coloring of dense graphs9
NP-hardness of m-dimensional weighted matching problems9
Editorial Board9
Editorial Board9
Dormancy-aware timed branching bisimilarity with an application to communication protocol analysis9
Gacs – Kucera theorem9
Editorial Board9
Editorial Board9
The computational complexity of forced capture Hnefatafl9
Editorial Board9
Complexity of Scorpion Solitaire and applications to Klondike9
Polynomial kernels for paw-free edge modification problems9
On additive approximate submodularity8
Robustly reusable fuzzy extractor from isogeny8
Generative abstraction of Markov population processes8
Hierarchical decompositions of implicational bases for the enumeration of meet-irreducible elements8
On computable numbers, with an application to the Druckproblem8
Enumeration of subtrees and BC-subtrees with maximum degree no more than k in trees8
Upper powerdomains of quasicontinuous dcpos8
New approximation algorithms for RNA secondary structures prediction problems by local search8
Embedding algorithm of spined cube into grid structure and its wirelength computation8
On the complexity of nucleolus computation for bipartite b-matching games8
The balanced connected subgraph problem for geometric intersection graphs8
Near-optimal clustering in the k-machine model8
A Myhill-Nerode theorem for register automata and symbolic trace languages8
Local fairness in hedonic games via individual threshold coalitions8
Computational complexity of normalizing constants for the product of determinantal point processes8
Disjoint paths and connected subgraphs for H-free graphs8
A substructure based lower bound for eternal vertex cover number8
Generating Java code pairing with ChatGPT8
Complexity and approximation algorithms for two parallel dedicated machine scheduling with conflict constraints8
Algorithmic results in secure total dominating sets on graphs8
The impact of core constraints on truthful bidding in combinatorial auctions8
Connectivity and diagnosability of the complete Josephus cube networks under h-extra fault-tolerant model8
Grouped domination parameterized by vertex cover, twin cover, and beyond8
Investigation of E-voting system using face recognition using convolutional neural network (CNN)7
Encoding Boolean networks into reaction systems for investigating causal dependencies in gene regulation7
On minimal critical exponent of balanced sequences7
Editorial Board7
Differential logical relations, part II increments and derivatives7
Boundary sketching with asymptotically optimal distance and rotation7
Cascade products and Wheeler automata7
(k,p)-planarity: A relaxation of hybrid planarity7
Streaming approximation scheme for minimizing total completion time on parallel machines subject to varying processing capacity7
Bisimilarity on Basic Parallel Processes7
Algebraic properties and transformations of monographs7
The classes PPA-k: Existence from arguments modulo k7
Relating randomized right-hand sides to communicating rewriting rules7
The g-component connectivity of graphs7
Computational task offloading algorithm based on deep reinforcement learning and multi-task dependency7
An accelerated deterministic algorithm for maximizing monotone submodular minus modular function with cardinality constraint7
Verifiable Crowd Computing: Coping with bounded rationality7
Editorial Board7
Modelling of DNA mismatch repair with a reversible process calculus7
Parallel Contextual Array Insertion Deletion Grammars, Pure 2D Context-Free Grammars and Associated P Systems7
The existence and efficiency of PMMS allocations7
Building bridges – Honoring Nataša Jonoska on the occasion of her 60th birthday7
Exhaustive generation of some lattice paths and their prefixes7
Editorial Board7
An approximate cost recovery scheme for the k-product facility location game with penalties7
Online coloring of disk graphs7
A categorial approach to reaction systems: First steps7
Eliciting truthful reports with partial signals in repeated games7
Nearly k-universal words – Investigating a part of Simon's congruence7
Role colouring graphs in hereditary classes7
On the complexity of local-equitable coloring of graphs6
Self-stabilizing spanner topology control solutions in wireless ad hoc networks6
A new fast root-finder for black box polynomials6
Component conditional fault tolerance of hierarchical folded cubic networks6
Optimization on the smallest eigenvalue of grounded Laplacian matrix via edge addition6
Greedy+Singleton: An efficient approximation algorithm for k-submodular knapsack maximization6
Order based algorithms for the core maintenance problem on edge-weighted graphs6
Extensional proofs in a propositional logic modulo isomorphisms6
Diagonal of pseudoinverse of graph Laplacian: Fast estimation and exact results6
Certification of an exact worst-case self-stabilization time6
On a vertex-capturing game6
Approximation algorithm for prize-collecting sweep cover with base stations6
Asynchronous fully-decentralized SGD in the cluster-based model6
Taming the knight's tour: Minimizing turns and crossings6
Complexity results on register context-free grammars and related formalisms6
Almost envy-freeness for groups: Improved bounds via discrepancy theory6
Editorial Board6
Fixed points and attractors of reactantless and inhibitorless reaction systems6
Exploring the gap between treedepth and vertex cover through vertex integrity6
Process-commutative distributed objects: From cryptocurrencies to Byzantine-Fault-Tolerant CRDTs6
Capacity planning for dependable services6
Threshold-based network structural dynamics6
Enhancing fault tolerance of balanced hypercube networks by the edge partition method6
How bad is the merger paradox?6
A categorical model for organic chemistry6
Disjunctive sums of quasi-nimbers6
A simple rounding scheme for multistage optimization6
Securing data in the cloud using pairing-free inner product functional encryption with unbounded vector size6
Multi-stage Proof-of-Works: Properties and vulnerabilities6
Unified graphical co-modeling, analysis and verification of cyber-physical systems by combining AADL and Simulink/Stateflow6
Cutting bamboo down to size6
On algorithmic applications of sim-width and mim-width of (H1,H2)-free graphs6
Improved unbounded inner-product functional encryption6
Decision algorithms for reversibility of 1D cellular automata under reflective boundary conditions6
Mutual witness Gabriel drawings of complete bipartite graphs6
Improved algorithms for bandit with graph feedback via regret decomposition6
Protocols with constant local storage and unreliable communication6
Range minimum queries in minimal space6
Editorial Board5
TCS special issue: Combinatorics on Words – WORDS 20215
Preface for the special issue of Theoretical Computer Science in honor of the 60th birthday of Yuxi Fu5
Editorial Board5
Computational power of autonomous robots: Transparency vs. opaqueness5
Refined computational complexities of Hospitals/Residents problem with regional caps5
Approximate ridesharing of personal vehicles problem5
On the power of local graph expansion grammars with and without additional restrictions5
Editorial Board5
Corrigendum to “Complexity and approximability of the happy set problem” [Theor. Comput. Sci. 866 (2021) 123–144]5
Theoretical design of decentralized auction framework under mobile crowdsourcing environment5
MODRED: A code-based non-interactive key exchange protocol5
How majority-vote crossover and estimation-of-distribution algorithms cope with fitness valleys5
Linear-space S-table algorithms for the longest common subsequence problem5
Space efficient algorithm for solving reachability using tree decomposition and separators5
Combinatorics of minimal absent words for a sliding window5
A fault diagnosis method to defend scapegoating attack in network tomography5
A certifying and dynamic algorithm for the recognition of proper circular-arc graphs5
PSPACE-hardness of variants of the graph coloring game5
Approximation of the Double Traveling Salesman Problem with Multiple Stacks5
Editorial Board5
Editorial Board5
The complexity of bicriteria tree-depth5
Kolmogorov-Loveland betting strategies lose the Betting game on open sets5
Languages generated by numerical P systems with thresholds5
Model checking differentially private properties5
Algorithmic aspects of paired disjunctive domination in graphs5
Using edge contractions to reduce the semitotal domination number5
Connectivity and constructive algorithms of disjoint paths in dragonfly networks5
Optimal L-algorithms for rendezvous of asynchronous mobile robots with extern5
On finding maximum disjoint paths with different colors: Computational complexity and practical LP-based algorithms5
Sorting via shuffles with a cut after the longest increasing prefix5
Distributed transformations of Hamiltonian shapes based on line moves5
Learning algebraic structures with the help of Borel equivalence relations5
D_PSNI: Delimited persistent stochastic non-interference5
Efficiency and inefficiency of Nash equilibrium for scheduling games on batching-machines with activation cost5
Editorial5
Editorial Board5
Centralised connectivity-preserving transformations for programmable matter: A minimal seed approach5
In memory of Jérôme Monnot5
Constant amortized time enumeration of Eulerian trails5
From multivalued to Boolean functions: Preservation of soft nested canalization5
Transactions and contracts based on reaction systems5
Maximizing the ratio of cluster split to cluster diameter without and with cardinality constraints5
Self-similarity of communities of the ABCD model5
Weighted forward looking adaptive coding5
On the connectedness of arithmetic hyperplanes5
An anomaly-based intrusion detection system using recursive feature elimination technique for improved attack detection5
Mutual visibility of luminous robots despite angular inaccuracy5
Undecidability of the universal support problem for weighted automata over zero-sum-free commutative semirings5
On the complexity of fair coin flipping5
Do additional target points speed up evolutionary algorithms?5
The unpaired many-to-many k-disjoint paths in bipartite hypercube-like networks5
Location functions for self-stabilizing byzantine tolerant swarms5
The n-trigles, a new variant in the SameSum family4
Rewriting systems, plain groups, and geodetic graphs4
A decomposition theorem for number-conserving multi-state cellular automata on triangular grids4
Decision on block size in blockchain systems by evolutionary equilibrium analysis4
Stand up indulgent gathering4
Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification4
The t/k-diagnosability of m-ary n-cube networks4
Quantum circuits with classical channels and the principle of deferred measurements4
Optimal 2-traceability codes of length 44
Finding geometric representations of apex graphs is NP-hard4
2-colored point-set embeddings of partial 2-trees4
Query answering over inconsistent knowledge bases: A probabilistic approach4
Feasibility assessments of a dynamical approach to compartmental modelling on graphs: Scaling limits and performance analysis4
Revisiting RSA-polynomial problem and semiprime factorization4
Physical zero-knowledge proof for Ripple Effect4
Reducing the local alphabet size in tiling systems by means of 2D comma-free codes4
The Exact Subset MultiCover problem4
Doubly adaptive zero-knowledge proofs4
On the linearity of the periods of subtraction games4
Unpaired set-to-set disjoint path routings in recursive match networks4
Multi-key fully homomorphic encryption from NTRU and (R)LWE with faster bootstrapping4
AbU: A calculus for distributed event-driven programming with attribute-based interaction4
Chess is hard even for a single player4
Flow shop scheduling problems with transportation constraints revisited4
Deep learning and natural language processing in computation for offensive language detection in online social networks by feature selection and ensemble classification techniques4
For rational numbers with Suppes-Ono division, equational validity is one-one equivalent with Diophantine unsolvability4
Parking problem by oblivious mobile robots in infinite grids4
Succinct navigational oracles for families of intersection graphs on a circle4
Editorial Board4
0.076905965805054