Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Purchase individual online access for 1 year to this journal.
Price: EUR 410.00Impact Factor 2024: 0.4
Fundamenta Informaticae is an international journal publishing original research results in all areas of theoretical computer science. Papers are encouraged contributing:
- solutions by mathematical methods of problems emerging in computer science
- solutions of mathematical problems inspired by computer science.
Topics of interest include (but are not restricted to): theory of computing, complexity theory, algorithms and data structures, computational aspects of combinatorics and graph theory, programming language theory, theoretical aspects of programming languages, computer-aided verification, computer science logic, database theory, logic programming, automated deduction, formal languages and automata theory, concurrency and distributed computing, cryptography and security, theoretical issues in artificial intelligence, machine learning, pattern recognition, algorithmic game theory, bioinformatics and computational biology, quantum computing, probabilistic methods, & algebraic and categorical methods.
Authors: Kasjan, Stanisław | Niwiński, Damian
Article Type: Obituary
DOI: 10.3233/FI-222131
Citation: Fundamenta Informaticae, vol. 187, no. 1, pp. v-vii, 2022
Authors: Bhagat, Subhash | Chakraborty, Abhinav | Das, Bibhuti | Mukhopadhyaya, Krishnendu
Article Type: Research Article
Abstract: The gathering over meeting nodes problem asks the robots to gather at one of the pre-defined meeting nodes . The robots are deployed on the nodes of an anonymous two-dimensional infinite grid, which has a subset of nodes marked as meeting nodes . Robots are identical, autonomous, anonymous and oblivious. They operate under an asynchronous scheduler. They do not have any agreement on a global coordinate system . All the initial configurations for which the problem is deterministically unsolvable have been characterized. A deterministic distributed algorithm has been proposed to solve the problem for the remaining configurations. The …efficiency of the proposed algorithm is studied in terms of the number of moves required for gathering . A lower bound concerning the total number of moves required to solve the gathering problem has been derived. Show more
Keywords: Swarm Robotics, Gathering, Meeting Nodes, Asynchronous, Look-Compute-Move Cycle
DOI: 10.3233/FI-222128
Citation: Fundamenta Informaticae, vol. 187, no. 1, pp. 1-30, 2022
Authors: Redeker, Markus
Article Type: Research Article
Abstract: A number-conserving cellular automaton is a simplified model for a system of interacting particles. This paper contains two related constructions by which one can find all one-dimensional number-conserving cellular automata with one kind of particle. The output of both methods is a “flow function”, which describes the movement of the particles. In the first method, one puts increasingly stronger restrictions on the particle flow until a single flow function is specified. There are no dead ends, every choice of restriction steps ends with a flow. The second method uses the fact that the flow functions can be ordered …and then form a lattice. This method consists of a recipe for the slowest flow that enforces a given minimal particle speed in one given neighbourhood. All other flow functions are then maxima of sets of these flows. Other questions, like that about the nature of non-deterministic number-conserving rules, are treated briefly at the end. Show more
DOI: 10.3233/FI-222129
Citation: Fundamenta Informaticae, vol. 187, no. 1, pp. 31-59, 2022
Authors: Zhou, Sizhong
Article Type: Research Article
Abstract: In communication networks, the binding numbers of graphs (or networks) are often used to measure the vulnerability and robustness of graphs (or networks). Furthermore, the fractional factors of graphs and the fractional ID-[a , b ]-factor-critical covered graphs have a great deal of important applications in the data transmission networks. In this paper, we investigate the relationship between the binding numbers of graphs and the fractional ID-[a , b ]-factor-critical covered graphs, and derive a binding number condition for a graph to be fractional ID-[a , b ]-factor-critical covered, which is an extension of Zhou’s previous result [S. Zhou, Binding …numbers for fractional ID-k -factor-critical graphs, Acta Mathematica Sinica, English Series 30(1)(2014)181–186]. Show more
Keywords: network, graph, binding number, fractional [a, b]-factor, fractional ID-[a, b]-factor-critical covered graph
DOI: 10.3233/FI-222130
Citation: Fundamenta Informaticae, vol. 187, no. 1, pp. 61-69, 2022
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]