Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2024
Towards declarative comparabilities: Application to functional dependencies
Journal of Computer and System Sciences (JCSS), Volume 146, Issue Chttps://doi.org/10.1016/j.jcss.2024.103576AbstractIn real life, data are often of poor quality as a result, for instance, of uncertainty, mismeasurements, missing values or bad inputs. This issue hampers an implicit yet crucial operation of every database management system: equality testing. ...
- research-articleNovember 2024
The impact of state merging on predictive accuracy in probabilistic tree automata: Dietze's conjecture revisited
Journal of Computer and System Sciences (JCSS), Volume 146, Issue Chttps://doi.org/10.1016/j.jcss.2024.103563AbstractDietze's conjecture concerns the problem of equipping a tree automaton M with weights to make it probabilistic, in such a way that the resulting automaton N predicts a given corpus C as accurately as possible. The conjecture states that the ...
- research-articleFebruary 2024
Wireless IoT sensors data collection reward maximization by leveraging multiple energy- and storage-constrained UAVs
Journal of Computer and System Sciences (JCSS), Volume 139, Issue Chttps://doi.org/10.1016/j.jcss.2023.103475AbstractWe consider Internet of Things (IoT) sensors deployed inside an area to be monitored. Drones can be used to collect the data from the sensors, but they are constrained in energy and storage. Therefore, all drones need to select a subset of ...
- research-articleMay 2023
Improved IP lookup technology for trie-based data structures
Journal of Computer and System Sciences (JCSS), Volume 133, Issue CPages 41–55https://doi.org/10.1016/j.jcss.2022.10.003AbstractMany Internet protocol (IP) lookup algorithms have been formulated to improve network performance. This study reviewed and experimentally evaluated technologies for trie-based methods that reduce memory access, memory consumption and ...
- research-articleFebruary 2023
Faster compressed quadtrees
Journal of Computer and System Sciences (JCSS), Volume 131, Issue CPages 86–104https://doi.org/10.1016/j.jcss.2022.09.001AbstractReal-world point sets tend to be clustered, so using a machine word for each point is wasteful. In this paper we first show how a compact representation of quadtrees using O ( 1 ) bits per node can break this bound on clustered point sets, while ...
-
- research-articleJune 2022
A secure searchable encryption scheme for cloud using hash-based indexing
Journal of Computer and System Sciences (JCSS), Volume 126, Issue CPages 119–137https://doi.org/10.1016/j.jcss.2021.12.004AbstractCloud service for data outsourcing has triggered security and privacy needs that can be satisfied by encrypting data prior to outsourcing to the cloud. Searchable Encryption that uses methods like homomorphic encryption is inefficient ...
- research-articleMarch 2022
Efficiently enumerating hitting sets of hypergraphs arising in data profiling
Journal of Computer and System Sciences (JCSS), Volume 124, Issue CPages 192–213https://doi.org/10.1016/j.jcss.2021.10.002AbstractThe transversal hypergraph problem asks to enumerate the minimal hitting sets of a hypergraph. If the solutions have bounded size, Eiter and Gottlob [SICOMP'95] gave an algorithm running in output-polynomial time, but whose space ...
- research-articleMarch 2022
Single-source shortest paths and strong connectivity in dynamic planar graphs
Journal of Computer and System Sciences (JCSS), Volume 124, Issue CPages 97–111https://doi.org/10.1016/j.jcss.2021.09.008AbstractWe give a fully dynamic single-source shortest paths data structure for planar weighted digraphs with O ˜ ( n 4 / 5 ) worst-case update time and O ( log 2 n ) query time. Here, a single update can either change the graph by inserting ...
- research-articleMay 2020
Learning the truth vector in high dimensions
Journal of Computer and System Sciences (JCSS), Volume 109, Issue CPages 78–94https://doi.org/10.1016/j.jcss.2019.12.002AbstractTruth Discovery is an important learning problem arising in data analytics related fields. It concerns about finding the most trustworthy information from a dataset acquired from a number of unreliable sources. The ...
- research-articleFebruary 2020
On decidability and complexity of low-dimensional robot games
Journal of Computer and System Sciences (JCSS), Volume 107, Issue CPages 124–141https://doi.org/10.1016/j.jcss.2019.08.003AbstractA robot game, also known as a Z-VAS game, is a two-player vector addition game played on the integer lattice Z n, where one of the players, Adam, aims to avoid the origin while the other player, Eve, aims to reach the origin. The ...
- research-articleFebruary 2020
Contextuality in multipartite pseudo-telepathy graph games
Journal of Computer and System Sciences (JCSS), Volume 107, Issue CPages 156–165https://doi.org/10.1016/j.jcss.2019.06.005AbstractAnalyzing pseudo-telepathy graph games, we propose a way to build contextuality scenarios exhibiting the quantum supremacy using graph states. We consider the combinatorial structures generating equivalent scenarios. We introduce a new ...
- research-articleNovember 2019
Calculi for symmetric queries
Journal of Computer and System Sciences (JCSS), Volume 105, Issue CPages 54–86https://doi.org/10.1016/j.jcss.2019.04.003AbstractSymmetric queries are introduced as queries on a sequence of sets of objects the result of which does not depend on the order of the sets. An appropriate data model is proposed, and two query languages are introduced, ...
- research-articleNovember 2019
Deterministic regular expressions with back-references
Journal of Computer and System Sciences (JCSS), Volume 105, Issue CPages 1–39https://doi.org/10.1016/j.jcss.2019.04.001AbstractMost modern libraries for regular expression matching allow back-references (i.e., repetition operators) that substantially increase expressive power, but also lead to intractability. In order to find a better balance between ...
- research-articleSeptember 2019
Logics for unordered trees with data constraints
Journal of Computer and System Sciences (JCSS), Volume 104, Issue CPages 149–164https://doi.org/10.1016/j.jcss.2018.11.004AbstractWe study monadic second-order logics with counting constraints (CMso) for unordered data trees. Our objective is to enhance this logic with data constraints for comparing string data values. Comparisons between data values at arbitrary ...
- research-articleSeptember 2019
Linking indexing data structures to de Bruijn graphs: Construction and update
Journal of Computer and System Sciences (JCSS), Volume 104, Issue CPages 165–183https://doi.org/10.1016/j.jcss.2016.06.008AbstractDNA sequencing technologies have tremendously increased their throughput, and hence complicated DNA assembly. Numerous assembly programs use de Bruijn graphs (dBG) built from short reads to merge these into contigs, which represent ...
- research-articleJune 2019
Gaussian-Gamma collaborative filtering: A hierarchical Bayesian model for recommender systems
Journal of Computer and System Sciences (JCSS), Volume 102, Issue CPages 42–56https://doi.org/10.1016/j.jcss.2017.03.007AbstractThe traditional collaborative filtering (CF) suffers from two key challenges, namely, the normal assumption that it is not robust, and it is difficult to set in advance the penalty terms of the latent features. We therefore propose a hierarchical ...
Highlights- The Gamma-Gaussian assumption on the ratings. It is a heavy tail distribution so the model is more robust.
- The Gamma-Gaussian assumption on the latent features. Hence we do not need to specify the regularization term manually.
- The ...
- research-articleDecember 2017
Secure outsourcing of modular exponentiations under single untrusted programme model
Journal of Computer and System Sciences (JCSS), Volume 90, Issue CPages 1–13https://doi.org/10.1016/j.jcss.2016.11.005Cloud computing gathers a lot of computing resources together, and provides cheap, efficient and convenient services. With the development of cloud computing, the importance of security issues is increasing. Modular exponentiations are one of the basic ...
- research-articleJune 2017
TARD
Journal of Computer and System Sciences (JCSS), Volume 86, Issue CPages 59–69https://doi.org/10.1016/j.jcss.2016.07.002Many cryptographic protocols were developed to support efficient group membership operations. Although those schemes can be extensively used for controlling temporary access with guest devices which do occur in many real world situations, those schemes ...
- research-articleMay 2017
Inclusion dependencies and their interaction with functional dependencies in SQL
Journal of Computer and System Sciences (JCSS), Volume 85, Issue CPages 104–131https://doi.org/10.1016/j.jcss.2016.11.004Driven by the SQL standard, we investigate simple and partial inclusion dependencies (INDs) with not null constraints. Implication of simple INDs and not null constraints is not finitely axiomatizable. We propose not null inclusion dependencies (NNINDs) ...
- research-articleMarch 2017
Solving parity games in big steps
Journal of Computer and System Sciences (JCSS), Volume 84, Issue CPages 243–262https://doi.org/10.1016/j.jcss.2016.10.002This article proposes a new algorithm that improves the complexity bound for solving parity games. Our approach combines McNaughton's iterated fixed point algorithm with a preprocessing step, which is called prior to every recursive call. The ...