首页 > 最新文献

International Journal of Foundations of Computer Science最新文献

英文 中文
A note on a Code-Based Signature Scheme 关于基于代码的签名方案的说明
IF 0.8 4区 计算机科学 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-06-29 DOI: 10.1142/S0129054123500132
Giuseppe D'Alconzo
This paper analyzes two schemes from a 2019 work by Liu, Yang, Han and Wang, namely, adapting the McEliece cryptosystem to obtain a new public-key encryption scheme, and designing an efficient CFS-like digital signature. It is shown that the new encryption scheme based on McEliece, even if it has longer public keys, is not more secure than the standard one. The security gap between the original scheme and its modification is presented. Moreover, while the proposed parameters for the digital signature scheme lead to a significant performance improvement, however, they introduce a vulnerability in the protocol. A key-forgery attack using the Support Splitting Algorithm as a subroutine is described, with a study of the computational cost of retrieving the secret key from the public one.
本文分析了Liu, Yang, Han和Wang在2019年的工作中的两个方案,即采用McEliece密码系统获得新的公钥加密方案,以及设计一个高效的类cfs数字签名。结果表明,基于McEliece的新加密方案即使拥有更长的公钥,也不会比标准加密方案更安全。给出了原方案与修改方案之间的安全差距。此外,虽然所提出的数字签名方案参数带来了显著的性能改进,但它们在协议中引入了漏洞。描述了一种利用支持分割算法作为子程序的密钥伪造攻击,并研究了从公开密钥中检索密钥的计算代价。
{"title":"A note on a Code-Based Signature Scheme","authors":"Giuseppe D'Alconzo","doi":"10.1142/S0129054123500132","DOIUrl":"https://doi.org/10.1142/S0129054123500132","url":null,"abstract":"This paper analyzes two schemes from a 2019 work by Liu, Yang, Han and Wang, namely, adapting the McEliece cryptosystem to obtain a new public-key encryption scheme, and designing an efficient CFS-like digital signature. It is shown that the new encryption scheme based on McEliece, even if it has longer public keys, is not more secure than the standard one. The security gap between the original scheme and its modification is presented. Moreover, while the proposed parameters for the digital signature scheme lead to a significant performance improvement, however, they introduce a vulnerability in the protocol. A key-forgery attack using the Support Splitting Algorithm as a subroutine is described, with a study of the computational cost of retrieving the secret key from the public one.","PeriodicalId":50323,"journal":{"name":"International Journal of Foundations of Computer Science","volume":"abs/2206.14560 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2022-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"64087922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Steganography Embedding Method Based on CDF-DWT Technique for Reversible Data Hiding Application Using Elgamal Algorithm 一种基于CDF-DWT技术的隐写嵌入方法,用于利用Elgamal算法进行可逆数据隐藏
IF 0.8 4区 计算机科学 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-06-10 DOI: 10.1142/s0129054122420011
K. Raju, A. Nagarajan
Steganography is a data hiding method mainly used in the security purposes. While hiding more data in the embedding process the data may be lost and also cause some security problems. To avoid this problem a Steganography Embedding method is used. In this manuscript, Steganography Embedding method based on Cohen–Daubechies–Feauveau Discrete Wavelet Transform (CDF-DWT) technique to data hiding application using Elgamal algorithm is proposed. In this the cover image is taken for hiding the secret data. Then the cover image edges are detected and filtered with Speeded-Up Robust Features (SURF) method. Then the input secret data is encrypted with Elgamal algorithm. Then the secret data is hided under cover image for obtaining the stego image by process of Embedding using CDF DWT technique. In this data in the stego images are unreadable. To get readable secured data is extracted from the stego image and the data’s are decrypted to get secured secret data. The objective of this method is to safe guard the secret using Steganography method and to increase embedding efficiency, Embedding capacity and carrier capacity and to reduce the execution time. The MATLAB simulation results of the proposed CDF DWT technique with Elgamal algorithm portrays better outcomes such as Peak to Signal Noise Ratio (PSNR), Mean Square Error (MSE) (lower), Bit Error Rate (BER) was Lower, Execution time provides is lower, Carrier Capacity and Embedding Capacity are much higher and the values are compared with the existing method such as Elliptic Galois in cryptography and in the Steganography method with Adaptive Firefly Algorithm (EGC-AFA), Reversible Data hiding within Encrypted images Via Adaptive Embedding Strategy with block selection (RDHEI-AES), Double Linear Regression Prediction based Reversible Data Hiding in Encrypted Image (DLRP-RDHEI) respectively.
隐写术是一种主要用于安全目的的数据隐藏方法。在嵌入过程中隐藏了更多的数据,但数据可能会丢失,也会造成一些安全问题。为了避免这个问题,采用隐写嵌入方法。本文将基于Cohen-Daubechies-Feauveau离散小波变换(CDF-DWT)技术的隐写嵌入方法应用于Elgamal算法的数据隐藏。在这种情况下,拍摄封面图像是为了隐藏秘密数据。然后采用SURF方法对图像边缘进行检测和滤波。然后用Elgamal算法对输入的秘密数据进行加密。然后将秘密数据隐藏在掩蔽图像下,利用CDF - DWT技术进行嵌入处理,得到隐写图像。在这种情况下,隐写图像中的数据是不可读的。为了获得可读的安全数据,从隐写图像中提取安全数据,并对数据进行解密以获得安全的秘密数据。该方法的目的是利用隐写技术对秘密进行安全保护,提高嵌入效率、嵌入容量和载体容量,缩短执行时间。采用Elgamal算法的CDF DWT技术的MATLAB仿真结果显示,与现有密码学中的椭圆伽罗瓦和自适应萤火虫算法的隐写法(EGC-AFA)相比,其峰值信噪比(PSNR)、均方误差(MSE)(较低)、误码率(BER)(较低)、执行时间(较低)、载波容量(Carrier Capacity)和嵌入容量(Embedding Capacity)都有较大提高。基于块选择自适应嵌入策略的加密图像可逆数据隐藏(RDHEI-AES)和基于双线性回归预测的加密图像可逆数据隐藏(DLRP-RDHEI)。
{"title":"A Steganography Embedding Method Based on CDF-DWT Technique for Reversible Data Hiding Application Using Elgamal Algorithm","authors":"K. Raju, A. Nagarajan","doi":"10.1142/s0129054122420011","DOIUrl":"https://doi.org/10.1142/s0129054122420011","url":null,"abstract":"Steganography is a data hiding method mainly used in the security purposes. While hiding more data in the embedding process the data may be lost and also cause some security problems. To avoid this problem a Steganography Embedding method is used. In this manuscript, Steganography Embedding method based on Cohen–Daubechies–Feauveau Discrete Wavelet Transform (CDF-DWT) technique to data hiding application using Elgamal algorithm is proposed. In this the cover image is taken for hiding the secret data. Then the cover image edges are detected and filtered with Speeded-Up Robust Features (SURF) method. Then the input secret data is encrypted with Elgamal algorithm. Then the secret data is hided under cover image for obtaining the stego image by process of Embedding using CDF DWT technique. In this data in the stego images are unreadable. To get readable secured data is extracted from the stego image and the data’s are decrypted to get secured secret data. The objective of this method is to safe guard the secret using Steganography method and to increase embedding efficiency, Embedding capacity and carrier capacity and to reduce the execution time. The MATLAB simulation results of the proposed CDF DWT technique with Elgamal algorithm portrays better outcomes such as Peak to Signal Noise Ratio (PSNR), Mean Square Error (MSE) (lower), Bit Error Rate (BER) was Lower, Execution time provides is lower, Carrier Capacity and Embedding Capacity are much higher and the values are compared with the existing method such as Elliptic Galois in cryptography and in the Steganography method with Adaptive Firefly Algorithm (EGC-AFA), Reversible Data hiding within Encrypted images Via Adaptive Embedding Strategy with block selection (RDHEI-AES), Double Linear Regression Prediction based Reversible Data Hiding in Encrypted Image (DLRP-RDHEI) respectively.","PeriodicalId":50323,"journal":{"name":"International Journal of Foundations of Computer Science","volume":"33 1","pages":"489-512"},"PeriodicalIF":0.8,"publicationDate":"2022-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"64087654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Special Issue – 15th International Conference on Automata and Formal Languages: Preface 第十五届自动机与形式语言国际会议:序言
IF 0.8 4区 计算机科学 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-04-18 DOI: 10.1142/s0129054122020014
E. Csuhaj-Varjú, P. Dömösi, György Vaszil
{"title":"Special Issue – 15th International Conference on Automata and Formal Languages: Preface","authors":"E. Csuhaj-Varjú, P. Dömösi, György Vaszil","doi":"10.1142/s0129054122020014","DOIUrl":"https://doi.org/10.1142/s0129054122020014","url":null,"abstract":"","PeriodicalId":50323,"journal":{"name":"International Journal of Foundations of Computer Science","volume":"1 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2022-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"64087587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Author Index Volume 32 (2021) 作者索引第32卷(2021)
IF 0.8 4区 计算机科学 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-12-01 DOI: 10.1142/s012905412199001x
{"title":"Author Index Volume 32 (2021)","authors":"","doi":"10.1142/s012905412199001x","DOIUrl":"https://doi.org/10.1142/s012905412199001x","url":null,"abstract":"","PeriodicalId":50323,"journal":{"name":"International Journal of Foundations of Computer Science","volume":" ","pages":""},"PeriodicalIF":0.8,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46347134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hamiltonian Cycle in K1,r-Free Split Graphs — A Dichotomy K1,r-Free分裂图中的哈密顿循环-二分法
IF 0.8 4区 计算机科学 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-10-20 DOI: 10.1142/s0129054121500337
P. Renjith, N. Sadagopan
For an optimization problem known to be NP-Hard, the dichotomy study investigates the reduction instances to determine the line separating polynomial-time solvable vs NP-Hard instances (easy vs hard instances). In this paper, we investigate the well-studied Hamiltonian cycle problem (HCYCLE), and present an interesting dichotomy result on split graphs. T. Akiyama et al. (1980) have shown that HCYCLE is NP-complete on planar bipartite graphs with maximum degree [Formula: see text]. We use this result to show that HCYCLE is NP-complete for [Formula: see text]-free split graphs. Further, we present polynomial-time algorithms for Hamiltonian cycle in [Formula: see text]-free and [Formula: see text]-free split graphs. We believe that the structural results presented in this paper can be used to show similar dichotomy result for Hamiltonian path problem and other variants of Hamiltonian cycle (path) problems.
对于一个已知为NP难的优化问题,二分法研究研究了归约实例,以确定线分离多项式时间可解实例与NP难实例(易实例与难实例)。在本文中,我们研究了研究得很好的哈密顿循环问题(HCYCLE),并在分裂图上给出了一个有趣的二分法结果。T.Akiyama等人(1980)已经证明了HCYCLE在具有最大度的平面二分图上是NP完全的[公式:见正文]。我们用这个结果证明了HCYCLE对于[公式:见正文]-自由分裂图是NP完全的。此外,我们在[公式:见文本]-自由和[公式:见文]-自由分裂图中提出了哈密顿循环的多项式时间算法。我们相信,本文给出的结构结果可以用来显示哈密顿路径问题和哈密顿循环(路径)问题的其他变体的类似二分法结果。
{"title":"Hamiltonian Cycle in K1,r-Free Split Graphs — A Dichotomy","authors":"P. Renjith, N. Sadagopan","doi":"10.1142/s0129054121500337","DOIUrl":"https://doi.org/10.1142/s0129054121500337","url":null,"abstract":"For an optimization problem known to be NP-Hard, the dichotomy study investigates the reduction instances to determine the line separating polynomial-time solvable vs NP-Hard instances (easy vs hard instances). In this paper, we investigate the well-studied Hamiltonian cycle problem (HCYCLE), and present an interesting dichotomy result on split graphs. T. Akiyama et al. (1980) have shown that HCYCLE is NP-complete on planar bipartite graphs with maximum degree [Formula: see text]. We use this result to show that HCYCLE is NP-complete for [Formula: see text]-free split graphs. Further, we present polynomial-time algorithms for Hamiltonian cycle in [Formula: see text]-free and [Formula: see text]-free split graphs. We believe that the structural results presented in this paper can be used to show similar dichotomy result for Hamiltonian path problem and other variants of Hamiltonian cycle (path) problems.","PeriodicalId":50323,"journal":{"name":"International Journal of Foundations of Computer Science","volume":"1 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2021-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43431064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Author Index Volume 31 (2020) 作者索引第31卷(2020)
IF 0.8 4区 计算机科学 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-12-01 DOI: 10.1142/s0129054120990014
{"title":"Author Index Volume 31 (2020)","authors":"","doi":"10.1142/s0129054120990014","DOIUrl":"https://doi.org/10.1142/s0129054120990014","url":null,"abstract":"","PeriodicalId":50323,"journal":{"name":"International Journal of Foundations of Computer Science","volume":"1 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47737001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Linear Time Solution for N-Queens Problem Using Generalized Networks of Evolutionary Polarized Processors 演化极化处理器广义网络N-Queens问题的线性时间解
IF 0.8 4区 计算机科学 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-01-29 DOI: 10.1142/S0129054120400018
F. Montoro, S. Gómez-Canaval, Karina Jiménez Vega, A. O. D. L. Puente
In this paper we consider a new variant of Networks of Polarized Evolutionary Processors (NPEP) named Generalized Networks of Evolutionary Polarized Processors (GNPEP) and propose them as solvers of combinatorial optimization problems. Unlike the NPEP model, GNPEP uses its numerical evaluation over the processed data from a quantitative perspective, hence this model might be more suitable to solve specific hard problems in a more efficient and economic way. In particular, we propose a GNPEP network to solve a well-known NP-hard problem, namely the [Formula: see text]-queens. We prove that this GNPEP algorithm requires a linear time in the size of a given instance. This result suggests that the GNPEP model is more suitable to address problems related to combinatorial optimization in which integer restrictions have a relevant role.
在本文中,我们考虑了一种新的极化进化处理器网络(NPEP)变体,称为进化极化处理器广义网络(GNPEP),并将其作为求解器。。。
{"title":"A Linear Time Solution for N-Queens Problem Using Generalized Networks of Evolutionary Polarized Processors","authors":"F. Montoro, S. Gómez-Canaval, Karina Jiménez Vega, A. O. D. L. Puente","doi":"10.1142/S0129054120400018","DOIUrl":"https://doi.org/10.1142/S0129054120400018","url":null,"abstract":"In this paper we consider a new variant of Networks of Polarized Evolutionary Processors (NPEP) named Generalized Networks of Evolutionary Polarized Processors (GNPEP) and propose them as solvers of combinatorial optimization problems. Unlike the NPEP model, GNPEP uses its numerical evaluation over the processed data from a quantitative perspective, hence this model might be more suitable to solve specific hard problems in a more efficient and economic way. In particular, we propose a GNPEP network to solve a well-known NP-hard problem, namely the [Formula: see text]-queens. We prove that this GNPEP algorithm requires a linear time in the size of a given instance. This result suggests that the GNPEP model is more suitable to address problems related to combinatorial optimization in which integer restrictions have a relevant role.","PeriodicalId":50323,"journal":{"name":"International Journal of Foundations of Computer Science","volume":"31 1","pages":"7-21"},"PeriodicalIF":0.8,"publicationDate":"2020-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1142/S0129054120400018","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48425231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Author Index Volume 30 (2019) 作者索引第30卷(2019)
IF 0.8 4区 计算机科学 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2019-12-01 DOI: 10.1142/s0129054119990016
{"title":"Author Index Volume 30 (2019)","authors":"","doi":"10.1142/s0129054119990016","DOIUrl":"https://doi.org/10.1142/s0129054119990016","url":null,"abstract":"","PeriodicalId":50323,"journal":{"name":"International Journal of Foundations of Computer Science","volume":"1 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1142/s0129054119990016","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"64087544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Author Index Volume 29 (2018) 作者索引第29卷(2018)
IF 0.8 4区 计算机科学 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2018-12-01 DOI: 10.1142/s0129054118990010
{"title":"Author Index Volume 29 (2018)","authors":"","doi":"10.1142/s0129054118990010","DOIUrl":"https://doi.org/10.1142/s0129054118990010","url":null,"abstract":"","PeriodicalId":50323,"journal":{"name":"International Journal of Foundations of Computer Science","volume":"1 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1142/s0129054118990010","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42117753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Computational Complexity of and Approximation Algorithms for Variants of the Component Selection Problem 部件选择问题变体的计算复杂度及逼近算法
IF 0.8 4区 计算机科学 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2018-11-01 DOI: 10.1142/s0129054118500314
Mostafa Nouri-Baygi
In the past decades, there has been a burst of activity to simplify implementation of complex software systems. The solution framework in software engineering community for this problem is called component-based software design (CBSD), whereas in the modeling and simulation community it is called composability. Composability is a complex feature due to the challenges of creating components, selecting combinations of components, and integrating the selected components. In this paper, we address the challenge through the analysis of Component Selection (CS), the NP-complete process of selecting a minimal set of components to satisfy a set of objectives. Due to the computational complexity of CS, we consider approximation algorithms that make the component selection process practical. We define three variations of CS and present good approximation algorithms to find near optimal solutions. In spite of our creation of approximable variants of Component Selection, we prove that the general Component Selection problem is inapproximable.
在过去的几十年里,出现了大量简化复杂软件系统实现的活动。在软件工程社区中,这个问题的解决方案框架被称为基于组件的软件设计(CBSD),而在建模和仿真社区中,它被称为可组合性。由于创建组件、选择组件组合以及集成所选组件的挑战,可组合性是一个复杂的特性。在本文中,我们通过分析组件选择(CS)来解决这一挑战,选择最小组件集以满足一组目标的np完全过程。由于CS的计算复杂性,我们考虑了使组件选择过程实用的近似算法。我们定义了CS的三种变体,并给出了很好的近似算法来寻找近最优解。尽管我们创建了组件选择的近似变体,但我们证明了一般组件选择问题是不可近似的。
{"title":"The Computational Complexity of and Approximation Algorithms for Variants of the Component Selection Problem","authors":"Mostafa Nouri-Baygi","doi":"10.1142/s0129054118500314","DOIUrl":"https://doi.org/10.1142/s0129054118500314","url":null,"abstract":"In the past decades, there has been a burst of activity to simplify implementation of complex software systems. The solution framework in software engineering community for this problem is called component-based software design (CBSD), whereas in the modeling and simulation community it is called composability. Composability is a complex feature due to the challenges of creating components, selecting combinations of components, and integrating the selected components. In this paper, we address the challenge through the analysis of Component Selection (CS), the NP-complete process of selecting a minimal set of components to satisfy a set of objectives. Due to the computational complexity of CS, we consider approximation algorithms that make the component selection process practical. We define three variations of CS and present good approximation algorithms to find near optimal solutions. In spite of our creation of approximable variants of Component Selection, we prove that the general Component Selection problem is inapproximable.","PeriodicalId":50323,"journal":{"name":"International Journal of Foundations of Computer Science","volume":"1 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86975087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Foundations of Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1