Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Purchase individual online access for 1 year to this journal.
Price: EUR 410.00Impact Factor 2024: 0.4
Fundamenta Informaticae is an international journal publishing original research results in all areas of theoretical computer science. Papers are encouraged contributing:
- solutions by mathematical methods of problems emerging in computer science
- solutions of mathematical problems inspired by computer science.
Topics of interest include (but are not restricted to): theory of computing, complexity theory, algorithms and data structures, computational aspects of combinatorics and graph theory, programming language theory, theoretical aspects of programming languages, computer-aided verification, computer science logic, database theory, logic programming, automated deduction, formal languages and automata theory, concurrency and distributed computing, cryptography and security, theoretical issues in artificial intelligence, machine learning, pattern recognition, algorithmic game theory, bioinformatics and computational biology, quantum computing, probabilistic methods, & algebraic and categorical methods.
Authors: Cattaneo, Gianpiero | Chiaselotti, Giampiero | Gentile, Tommaso | Oliverio, Paolo A.
Article Type: Research Article
Abstract: Signed partitions are used in order to describe a new discrete dynamical model whose configurations have fixed sum and whose evolution rules act in balancing from left and right on the configurations of the system. The resulting model can be considered as an extension to the case of signed partitions of the discrete dynamical system introduced by Brylawski in his classical paper concerning the dominance order of integer partitions. We provide a possible interpretation of our model as a simplified description of p – n junction between two semiconductors. We also show as our model can be embedded …in a specific Brylawski dynamical system by means of the introduction of a new evolution rule. Show more
Keywords: Discrete Dynamical Systems, Integer Partitions, Lattices, Evolution Rules
DOI: 10.3233/FI-2015-1261
Citation: Fundamenta Informaticae, vol. 141, no. 1, pp. 1-36, 2015
Authors: Kumar, Arun | Banerjee, Mohua
Article Type: Research Article
Abstract: A pair of approximation operators, based on the notion of granules in generalized approximation spaces, was studied in an earlier work by the authors. In this article, we investigate algebraic structures formed by the definable sets and also by the rough sets determined by this pair of approximation operators. The definable sets are open sets of an Alexandrov topological space, and form a completely distributive lattice in which the set of completely join irreducible elements is join dense. The collection of rough sets also forms a similar structure. Representation results for such classes of completely distributive lattices as well as …Heyting algebras in terms of definable and rough sets are obtained. Further, two unary operators on rough sets are considered, making the latter constitute a structure that is named a ‘rough lattice’. Representation results for rough lattices are proved. Show more
Keywords: Granules, Approximation operators, Definable sets, Rough Sets, Completely distributive lattices, Heyting algebras
DOI: 10.3233/FI-2015-1262
Citation: Fundamenta Informaticae, vol. 141, no. 1, pp. 37-55, 2015
Authors: Kuziak, Dorota | Yero, Ismael G. | Rodríguez-Velázquez, Juan A.
Article Type: Research Article
Abstract: A vertex w of a connected graph G strongly resolves two vertices u , v ∈ V (G ), if there exists some shortest u – w path containing v or some shortest v – w path containing u . A set S of vertices is a strong metric generator for G if every pair of vertices of G is strongly resolved by some vertex of S . The smallest cardinality of a strong metric generator for G is called the strong metric dimension of G . …In this paper we obtain several tight bounds or closed formulae for the strong metric dimension of the Cartesian sum of graphs in terms of the strong metric dimension, clique number or twins-free clique number of its factor graphs. Show more
Keywords: Strong metric dimension, strong metric basis, strong metric generator, Cartesian sum graphs
DOI: 10.3233/FI-2015-1263
Citation: Fundamenta Informaticae, vol. 141, no. 1, pp. 57-69, 2015
Authors: Peng, Xindong | Yang, Yong
Article Type: Research Article
Abstract: The soft set theory can be used as a newly mathematical tool to handle uncertainty. However, the classical soft sets are not appropriate to deal with imprecise and fuzzy parameters. In this paper, we propose the interval-valued hesitant fuzzy soft sets which are a combination of the interval-valued hesitant fuzzy sets and soft sets. Then, the complement, AND, OR, union, intersection, restricted union, extended intersection, difference, average, and geometric operations are defined on the interval-valued hesitant fuzzy soft sets, and some basic properties are also discussed in detail. Finally, by means of TOPSIS (Technique for Order Preference by Similarity to …Ideal Solution) and the maximizing deviation method, an algorithm is presented, and a comprehensive sensitivity analysis is employed, and the effectiveness is proved by a numerical example. Show more
Keywords: Interval-valued hesitant fuzzy soft sets, interval-valued hesitant fuzzy sets, TOPSIS, maximizing deviation
DOI: 10.3233/FI-2015-1264
Citation: Fundamenta Informaticae, vol. 141, no. 1, pp. 71-93, 2015
Authors: Shao, Zuhua | Gao, Yipeng
Article Type: Research Article
Abstract: This paper proposes the first optimistic protocol to accomplish the fair exchange of standard Schnorr signatures in the chosen-key model, in which each participant is allowed to choose his Schnorr key pair freely without showing his knowledge of the private key. Besides solving the authentication problem of public keys, the protocol relaxes excessive trust on the adjudicator since the adjudicator needs to be trusted only by the signer. The protocol is secure against three types of inside adversaries under the DL assumption in the random oracle model. It suits much more the actual circumstances of the Internet.
Keywords: Fair exchange protocol, Schnorr signatures, Certificate-based, Chosen-key model
DOI: 10.3233/FI-2015-1265
Citation: Fundamenta Informaticae, vol. 141, no. 1, pp. 95-114, 2015
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]