Home > CAA home > Research > Profile > Publications
  1. 2018
  2. Forthcoming

    Multi-budgeted directed cuts

    Kratsch, S., Li, S., Marx, D., Pilipczuk, M. & Wahlstrom, M. 29 Jun 2018 IPEC 2018. (Leibniz International Proceedings in Informatics (LIPIcs))

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Directed Multicut is W[1]-hard, Even for Four Terminal Pairs

    Pilipczuk, M. & Wahlstrom, M. 23 May 2018 In : ACM Transactions on Computation Theory (TOCT). 10, 3, 18 p., 13

    Research output: Contribution to journalArticle

  4. Forthcoming

    Resolution with Counting: Dag and Tree-like Lower Bounds over Different Moduli

    Part, F. & Tzameret, I. 18 May 2018

    Research output: Contribution to conferenceAbstract

  5. Forthcoming

    Characterizing Propositional Proofs as Non-commutative Formulas

    Li, F., Tzameret, I. & Wang, Z. 7 May 2018 In : SIAM Journal on Computing. 40 p.

    Research output: Contribution to journalArticle

  6. E-pub ahead of print

    Designing deterministic polynomial-space algorithms by color-coding multivariate polynomials

    Gutin, G., Reidl, F., Wahlstrom, M. & Zehavi, M. 30 Apr 2018 In : Journal of Computer and System Sciences. 95, p. 69-85

    Research output: Contribution to journalArticle

  7. E-pub ahead of print

    k-distinct in- and out-branchings in digraphs

    Gutin, G., Reidl, F. & Wahlstrom, M. 7 Mar 2018 In : Journal of Computer and System Sciences. 95, p. 86-97

    Research output: Contribution to journalArticle

  8. Published

    Witnessing matrix identities and proof complexity

    Li, F. & Tzameret, I. 26 Feb 2018 In : International Journal of Algebra and Computation. 28, 2, p. 217–256 40 p.

    Research output: Contribution to journalArticle

  9. Submitted

    Binary Constraint Satisfaction Problems Defined by Excluded Topological Minor

    Cohen, D., Cooper, M. C., Jeavons, P. G. & Zivny, . S. 2018 In : Infor. and Computation. 23 p.

    Research output: Contribution to journalArticle

  10. Published

    Parameterized Algorithms for Zero Extension and Metric Labelling Problems

    Reidl, F. & Wahlstrom, M. 2018 ICALP 2018 Track A. (Leibniz International Proceedings in Informatics )

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. 2017
  12. Published

    Binarisation for Valued Constraint Satisfaction Problems

    Cohen, D., Zivny, . S., Cooper, M., Jeavons, P., Krokhin, A. & Robert, P. 27 Oct 2017 In : SIAM Journal on Discrete Mathematics. 31, 4, p. 2279-2300 22 p.

    Research output: Contribution to journalArticle

  13. Published

    Proof Complexity Lower Bounds from Algebraic Circuit Complexity

    Forbes, M., Shpilka, A., Tzameret, I. & Wigderson, A. 1 Oct 2017 Theory of Computation (ToC) . p. 1 78 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  14. Published

    Path-contractions, edge deletions and connectivity preservation

    Gutin, G., Ramanujan, M. S., Reidl, F. & Wahlstrom, M. 3 Sep 2017 The 25th Annual European Symposium on Algorithms (ESA 2017). p. 1-13 13 p. (LIPICS; vol. 87)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Kernelization of Constraint Satisfaction Problems: A Study through Universal Algebra

    Lagerkvist, V. & Wahlstrom, M. 23 Aug 2017 Principles and Practice of Constraint Programming: 23rd International Conference, CP 2017, Melbourne, VIC, Australia, August 28 – September 1, 2017, Proceedings. Springer, p. 157-171 15 p. (Lecture Notes in Computer Science; vol. 10416)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    On the Satisfiability of Workflows with Release Points

    Gutin, G., Crampton, J. & Watrigant, R. 21 Jun 2017 Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies. ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    A Framework for the Cryptographic Enforcement of Information Flow Policies

    Alderman, J., Crampton, J. & Farley, N. 7 Jun 2017 Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies. ACM, p. 143-154 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Attribute Expressions, Policy Tables and Attribute-Based Access Control

    Crampton, J. & Williams, C. 7 Jun 2017 SACMAT'17 : Proceedings of the 22nd ACM Symposium on Access Control Models and Technologies. ACM Press, p. 79-90 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Uniform, Integral and Efficient Proofs for the Determinant Identities

    Tzameret, I. & Cook, S. 1 Jun 2017 Logic in Computer Science (LICS), 2017 32nd Annual ACM/IEEE Symposium on. IEEE, Vol. 32

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Cryptographic Enforcement of Information Flow Policies without Public Information via Tree Partitions

    Crampton, J., Farley, N., Gutin, G., Jones, M. & Poettering, B. 31 May 2017 In : Journal of Computer Security. p. 1-25 25 p.

    Research output: Contribution to journalArticle

  21. E-pub ahead of print

    Parameterized Resiliency Problems via Integer Linear Programming

    Crampton, J., Gutin, G., Koutecky, M. & Watrigant, R. 14 Apr 2017 CIAC 2017, 10th International Conference on Algorithms and Complexity May 26, 2017 - May 28, 2017. Springer, Vol. 10236, p. 164-176 13 p. (Lecture Notes in Computer Science; vol. 10236)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Odd Properly Colored Cycles in Edge-Colored Graphs

    Gutin, G., Sheng, B. & Wahlstrom, M. 1 Apr 2017 In : Discrete Mathematics. 340, 4, p. 817–821 5 p.

    Research output: Contribution to journalArticle

  23. E-pub ahead of print

    Canonical Completeness in Lattice-Based Languages for Attribute-Based Access Control

    Williams, C. & Crampton, J. 22 Mar 2017 7th ACM Conference on Data and Application Security and Privacy. ACM Press, p. 47-58 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    The bi-objective workflow satisfiability problem and workflow resiliency

    Crampton, J., Gutin, G., Karapetyan, D. & Watrigant, R. 16 Mar 2017 In : Journal of Computer Security. 25, p. 83-115 33 p.

    Research output: Contribution to journalArticle

  25. Published

    Parameterized Complexity of the k-Arc Chinese Postman Problem

    Gutin, G., Jones, M. & Sheng, B. 1 Mar 2017 In : Journal of Computer and System Sciences. 84, p. 107–119 13 p.

    Research output: Contribution to journalArticle

  26. Published

    Acyclicity in Edge-Colored Graphs

    Gutin, G., Jones, M., Sheng, B., Wahlstrom, M. & Yeo, A. 6 Feb 2017 In : Discrete Mathematics. 340, 2, p. 1-8 8 p.

    Research output: Contribution to journalArticle

  27. Published

    Rural Postman Parameterized by the Number of Components of Required Edges

    Gutin, G., Wahlström, M. & Yeo, A. 1 Feb 2017 In : Journal of Computer and System Sciences. 83, 1, p. 121-131 11 p.

    Research output: Contribution to journalArticle

  28. Published

    Chinese Postman Problem on Edge­-Colored Multigraphs

    Gutin, G., Jones, M., Sheng, B., Wahlstrom, M. & Yeo, A. 30 Jan 2017 In : Discrete Applied Mathematics. 217, p. 196-202 7 p.

    Research output: Contribution to journalArticle

  29. Published

    Adversarial resilience of matchings in bipartite random graphs

    Balister, P., Gerke, S. & McDowell, A. 1 Jan 2017 In : Journal of Combinatorics. 8, 1, p. 79-92 13 p.

    Research output: Contribution to journalArticle

  30. Published

    The power of propagation: when GAC is enough.

    Cohen, D. & Jeavons, P. Jan 2017 In : Constraints. 22, 1, p. 3-23 21 p.

    Research output: Contribution to journalArticle

  31. Published

    Algebraic Proof Complexity: Progress, Frontiers and Challenges

    Pitassi, T. & Tzameret, I. 2017 Electronic Colloquium on Computation Complexity .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    k-Distinct In- and Out-Branchings in Digraphs

    Gutin, G., Reidl, F. & Wahlstrom, M. 2017 44th International Colloquium on Automata, Languages, and Programming: ICALP 2017. Dagstuhl, p. 1-13 13 p. (Leibniz International Proceedings in Informatics ; vol. 80)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    LP-branching algorithms based on biased graphs

    Wahlström, M. 2017 Proceedings of the Twenty-Eighth Annual ACM-SIAM Symposium on Discrete Algorithms. SIAM, Vol. PRDA17, p. 1559-1570 12 p. (Proceedings)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Submitted

    On Singleton Arc Consistency for Natural CSPs Defined by Forbidden Patterns

    Cohen, D., Carbonnel, C., Cooper, M. & Živný, S. 2017 27 p.

    Research output: Contribution to conferencePaper

  35. Published

    Parameterized Complexity of the Workflow Satisfiability Problem

    Cohen, D., Crampton, J., Gutin, Z. & Wahlstrom, M. 2017 Combinatorial Optimization and Graph Algorithms. Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingChapter

  36. 2016
  37. Published

    On the Workflow Satisfiability Problem with Class-Independent Constraints for Hierarchical Organizations

    Crampton, J., Gagarin, A., Gutin, G., Jones, M. & Wahlstrom, M. 1 Dec 2016 In : ACM Transactions on Privacy and Security. 19, 3, p. 1-29 29 p.

    Research output: Contribution to journalArticle

  38. E-pub ahead of print

    Parameterized and Approximation Algorithms for the Load Coloring Problem

    Barbero, F., Gutin, G., Jones, M. & Sheng, B. 30 Nov 2016 In : Algorithmica. p. 1-19 19 p.

    Research output: Contribution to journalArticle

  39. Published

    The Mixed Chinese Postman Problem Parameterized by Pathwidth and Treedepth

    Gutin, G., Jones, M. & Wahlstrom, M. 29 Nov 2016 In : SIAM Journal on Discrete Mathematics. 30, 4, p. 2177-2205 29 p.

    Research output: Contribution to journalArticle

  40. Published

    Half-integrality, LP-branching and FPT algorithms

    Iwata, Y., Wahlstrom, M. & Yoshida, Y. 9 Aug 2016 In : SIAM Journal on Computing. 45, 4, p. 1377–1411 35 p.

    Research output: Contribution to journalArticle

  41. Published

    Algebraic Proof Complexity: Progress, Frontiers and Challenges

    Pitassi, T. & Tzameret, I. 8 Jul 2016 ACM SIGLOG News. Immerman, N. (ed.). New York: ACM, Vol. 3, p. 21-43 23 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  42. Published

    Inter-ReBAC: Inter-operation of Relationship-based Access Control Model Instances

    Crampton, J. & Sellwood, J. 2 Jul 2016 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer-Verlag, Vol. 9766, p. 96-105 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9766)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. E-pub ahead of print

    Note on Perfect Forests in Digraphs

    Gutin, G. & Yeo, A. 17 Jun 2016 In : Journal of Graph Theory.

    Research output: Contribution to journalArticle

  44. Published

    On Completeness in Languages for Attribute-base Access Control

    Crampton, J. & Williams, C. 6 Jun 2016 SACMAT'16 : Proceedings of the 21st ACM Symposium on Access Control Models and Technologies. New York: ACM Press, p. 149-160 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Forthcoming

    The Power of Propagation: When GAC is Enough

    Cohen, D. & Jeavons, P. 6 Jun 2016 15 p.

    Research output: Contribution to conferencePaper

  46. Published

    Linear-Vertex Kernel for the Problem of Packing r-Stars into a Graph without Long Induced Paths

    Barbero, F., Gutin, G., Jones, M., Sheng, B. & Yeo, A. 1 Jun 2016 In : Information Processing Letters. 116, 6, p. 433–436 4 p.

    Research output: Contribution to journalArticle

  47. Published

    Proof complexity lower bounds from algebraic circuit complexity

    Forbes, M., Shpilka, A., Tzameret, I. & Wigderson, A. 18 May 2016 31st Conference on Computational Complexity (CCC 2016). Dagstuhl, Germany: Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, Vol. 50, p. 32:1--32:17 17 p. (Leibniz International Proceedings in Informatics (LIPIcs); vol. 50)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    A Theoretical Framework for Constraint Propagator Triggering

    Cohen, D., Petrie, K. & Jefferson, C. 12 May 2016 9 p.

    Research output: Contribution to conferencePaper

  49. Published

    The power of primitive positive definitions with polynomially many variables

    Lagerkvist, V. & Wahlstrom, M. 19 Mar 2016 In : Journal of Logic and Computation. p. 1-21 21 p.

    Research output: Contribution to journalArticle

  50. Published

    ARPPM: Administration in the RPPM model

    Crampton, J. & Sellwood, J. 9 Mar 2016 CODASPY 2016 - Proceedings of the 6th ACM Conference on Data and Application Security and Privacy. ACM, p. 219-230 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Tight Lower Bounds for the Workflow Satisfiability Problem Based on the Strong Exponential Time Hypothesis

    Gutin, G. & Wahlstrom, M. 1 Mar 2016 In : Information Processing Letters. 116, 3, p. 223-226 4 p.

    Research output: Contribution to journalArticle

  52. E-pub ahead of print

    Parameterized Traveling Salesman Problem: Beating the Average

    Gutin, G. & Patel, V. 4 Feb 2016 In : SIAM Journal on Discrete Mathematics. 30, 1, p. 220-238 19 p.

    Research output: Contribution to journalArticle

  53. Published

    Hybrid Publicly Verifiable Computation

    Alderman, J., Janson, C., Crampton, J. & Cid, C. 2 Feb 2016 Topics in Cryptology - CT-RSA 2016. Sako, K. (ed.). Springer, Vol. 9610, p. 147-163 17 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Published

    A Multivariate Approach for Checking Resiliency in Access Control

    Crampton, J., Gutin, G. & Watrigant, R. 2016 Proceedings of AAIM 2016. Springer-Verlag, (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingChapter

  55. Published

    Cryptographic Tools for Cloud Environments

    Alderman, J., Crampton, J. & Martin, K. 2016 Guide to Security Assurance for Cloud Computing. Zhu, S. Y., Hill, R. & Trovati, M. (eds.). Springer, Vol. Guide to Security Assurance for Cloud Computing

    Research output: Chapter in Book/Report/Conference proceedingChapter

  56. Published

    Directed multicut is W[1]-hard, even for four terminal pairs

    Pilipczuk, M. & Wahlstrom, M. 2016 Proceedings of SODA 2016. Krauthgamer, R. (ed.). SIAM, p. 1167-1178 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Forthcoming

    Resiliency Policies in Access Control Revisited

    Crampton, J., Gutin, G. & Watrigant, R. 2016 Proceedings of 21st ACM Symposium on Access Control Models and Technologies (SACMAT 2016). ACM

    Research output: Chapter in Book/Report/Conference proceedingChapter

  58. 2015
  59. Published

    Obligations in PTaCL

    Williams, C. & Crampton, J. 22 Sep 2015 Security and Trust Management. Springer, Vol. 9331, p. 220 235 p. (Lecture Notes in Computer Science; vol. 9331)

    Research output: Chapter in Book/Report/Conference proceedingChapter

  60. Forthcoming

    Provably Pointless Propagator Calls

    Cohen, D., Jefferson, C. & Petrie, K. Aug 2015

    Research output: Contribution to conferencePaper

  61. Forthcoming

    Tractable Classes of Binary CSPs Defined by Excluded Topological Minors

    Cohen, D., Cooper, M., Zivny, . S. & Jeavons, P. Jul 2015 p. 1945-1951 7 p.

    Research output: Contribution to conferencePaper

  62. Published
  63. Published

    Relationship-based Access Control for an Open-source Medical Records System

    Rizvi, S. Z. R., Fong, P. W. L., Crampton, J. & Sellwood, J. 1 Jun 2015 Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT. ACM, Vol. 2015-June, p. 113-124 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    Relationships, Paths and Principal Matching: A New Approach to Access Control

    Crampton, J. & Sellwood, J. 29 May 2015 In : ArXiv.org.

    Research output: Contribution to journalArticle

  65. Forthcoming

    Parameterized complexity and kernelizability of Max Ones and Exact Ones problems

    Kratsch, S., Marx, D. & Wahlstrom, M. 1 Feb 2015 In : ACM Transactions on Computation Theory (TOCT). 8, 1, p. 1-28 28 p.

    Research output: Contribution to journalArticle

  66. Published

    Maximizing the minimum load for random processing times

    Gerke, S., Panagiotou, K., Schwartz, J. & Steger, A. 13 Jan 2015 In : ACM Transactions on Algorithms (TALG). 11, 3, 19 p., 17

    Research output: Contribution to journalArticle

  67. Published

    Access Control in Publicly Verifiable Outsourced Computation

    Alderman, J., Janson, C., Cid, C. & Crampton, J. 2015 Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security - ASIACCS 2015. ACM, p. 657-662

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. Published

    Controllability and matchings in random bipartite graphs

    Balister, P. & Gerke, S. 2015 Surveys in combinatorics 2015. Cambridge University Press, Vol. 424, p. 119-145 (London Math. Soc. Lecture Series)

    Research output: Chapter in Book/Report/Conference proceedingChapter

  69. Forthcoming

    Cryptographic Enforcement of Information Flow Policies without Public Information

    Crampton, J., Farley, N., Gutin, G., Jones, M. & Poettering, B. 2015 13th International Conference on Applied Cryptography and Network Security (ACNS 2015) . (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Unpublished

    Håstad‘s Separation of Constant-Depth Circuits Using Sipser Functions

    Tzameret, I. 2015 Expository Note. 15 p.

    Research output: Book/ReportOther report

  71. Published

    Note on Perfect Forests

    Gutin, G. 2015 In : Journal of Graph Theory. p. 1-3 3 p.

    Research output: Contribution to journalArticle

  72. Forthcoming

    On Missing Attributes in Access Control: Non-deterministic and Probabilistic Attribute Retrieval

    Crampton, J., Morisset, C. & Zannone, N. 2015 20th ACM Symposium on Access Control Models and Technologies. ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Forthcoming

    On the Workflow Satisfiability Problem with Class-Independent Constraints

    Crampton, J., Gagarin, A., Gutin, G. & Jones, M. 2015 10th International Symposium on Parameterized and Exact Computation. Schloss Dagstuhl –Leibniz Center for Informatics, (LIPIcs)

    Research output: Chapter in Book/Report/Conference proceedingChapter

  74. Forthcoming

    Optimal Constructions for Chain-based Cryptographic Enforcement of Information Flow Policies

    Crampton, J., Farley, N., Gutin, G. & Jones, M. 2015 29th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy: DBSec 2015. Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingChapter

  75. Forthcoming

    Parameterized and Approximation Algorithms for the Load Coloring Problem

    Barbero, F., Gutin, G., Jones, M. & Sheng, B. 2015 10th International Symposium on Parameterized and Exact Computation. Schloss Dagstuhl –Leibniz Center for Informatics, (LIPIcs)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Forthcoming

    Pattern Backtracking Algorithm for the Workflow Satisfiability Problem with User-Independent Constraints

    Karapetyan, D., Gagarin, A. & Gutin, G. 2015 FAW 2015, Lecture Notes in Computer Science.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  77. Published

    Polynomial Kernels and User Reductions for the Workflow Satisfiability Problem

    Gutin, G., Kratsch, S. & Wahlström, M. 2015 In : Algorithmica. p. 1-20 20 p.

    Research output: Contribution to journalArticle

  78. Published

    Short Proofs for the Determinant Identities

    Hrubes, P. & Tzameret, I. 2015 In : SIAM Journal on Computing. 44, 2, p. 340–383 44 p.

    Research output: Contribution to journalArticle

  79. Published

    Structural Parameterizations of the Mixed Chinese Postman Problem

    Gutin, G., Jones, M. & Wahlstrom, M. 2015 23rd Europ. Symp. Algorithms (ESA 2015). Springer-Verlag, Vol. 9294, p. 668-679 (Lect. Notes Comput. Sci.)

    Research output: Chapter in Book/Report/Conference proceedingChapter

  80. Published

    Valued Workflow Satisfiability Problem

    Crampton, J., Gutin, G. & Karapetyan, D. 2015 20th ACM SACMAT . p. 3-13

    Research output: Chapter in Book/Report/Conference proceedingChapter

  81. 2014
  82. Published

    Non-commutative Formulas and Frege Lower Bounds: a New Characterization of Propositional Proofs

    Li, F., Tzameret, I. & Wang, Z. 30 Dec 2014 ArXiV. p. 1 32 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  83. Published

    Iterative Plan Construction for the Workflow Satisfiability Problem

    Cohen, D., Crampton, J., Gagarin, A., Gutin, G. & Jones, M. 21 Nov 2014 In : Journal of Artificial Intelligence Research. 51, p. 555-577 23 p.

    Research output: Contribution to journalArticle

  84. Published

    Randomized Rounding in the Presence of a Cardinality Constraint

    Doerr, B. & Wahlström, M. 1 Sep 2014 In : ACM Journal of Experimental Algorithmics. 19, 2

    Research output: Contribution to journalArticle

  85. Published

    Attribute-Based Encryption for Access Control Using Elementary Operations

    Crampton, J. & Pinto, A. 2014 27th Computer Security Foundations Symposium. IEEE, p. 125-139

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Published

    Authorized workflow schemas: deciding realizability through $\mathsf{LTL }(\mathsf{F })$ model checking

    Crampton, J., Huth, M. & Huan-Pu Kuo, J. 2014 In : International Journal on Software Tools for Technology Transfer. 16, 1, p. 31-48

    Research output: Contribution to journalArticle

  87. Published

    Caching and Auditing in the RPPM Model

    Crampton, J. & Sellwood, J. 2014 Security and Trust Management - 10th International Workshop. Springer, p. 49-64 16 p. (Lecture Notes in Computer Science; vol. 8743)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. Published

    Calculation of Discrepancy Measures and Applications

    Doerr, C., Gnewuch, M. & Wahlström, M. 2014 A Panorama of Discrepancy Theory. Springer, (Lecture Notes in Mathematics; vol. 2107)

    Research output: Chapter in Book/Report/Conference proceedingChapter

  89. Forthcoming

    Clique cover and graph separation: New incompressibility results

    Cygan, M., Kratsch, S., Pilipczuk, M., Pilipczuk, M. & Wahlström, M. 2014 In : ACM Transactions on Computation Theory (TOCT). 6, 2

    Research output: Contribution to journalArticle

  90. Forthcoming

    Compression via Matroids: A Randomized Polynomial Kernel for Odd Cycle Transversal

    Kratsch, S. & Wahlström, M. 2014 In : ACM Transactions on Algorithms (TALG). 10, 4, 20 p.

    Research output: Contribution to journalArticle

  91. Published

    Engineering Algorithms for Workflow Satisfiability Problem with User-Independent Constraints

    Cohen, D., Crampton, J., Gagarin, A., Gutin, G. & Jones, M. 2014 FAW 2014. (Lecture Notes in Computer Science; vol. 8497)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. Published

    Half-integrality, LP-branching and FPT Algorithms

    Wahlström, M. 2014 SODA. Chekuri, C. (ed.). SIAM, p. 1762-1781 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  93. Published

    Kernelization, Matroid Methods

    Wahlström, M. 2014 Encyclopedia of Algorithms. Springer, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  94. Published

    Monotonicity and Completeness in Attribute-Based Access Control

    Crampton, J. & Morisset, C. 2014 Security and Trust Management - 10th International Workshop. Springer, p. 33-48

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    Parameterized Directed k-Chinese Postman Problem and k Arc-Disjoint Cycles Problem on Euler Digraphs

    Gutin, G., Jones, M., Sheng, B. & Wahlström, M. 2014 Proceedings of WG 2014.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Published

    Path Conditions and Principal Matching: A New Approach to Access Control

    Crampton, J. & Sellwood, J. 2014 19th ACM Symposium on Access Control Models and Technologies. ACM, p. 187-198

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. Published

    Polynomial Kernels and User Reductions for the Workflow Satisfiability Problem

    Gutin, G., Kratsch, S. & Wahlström, M. 2014 Proceedings of IPEC 2014.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    Polynomially Closed Co-clones

    Lagerkvist, V. & Wahlström, M. 2014 Proceedings of ISMVL 2014: IEEE 44th International Symposium on Multiple-Valued Logic. IEEE, p. 85-90 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. Published

    Satisfying More Than Half of a System of Linear Equations Over GF(2): A Multivariate Approach

    Crowston, R., Fellows, M., Gutin, G., Jones, M., Kim, E. J., Rosamond, F., Ruzsa, I. Z., Thomasse, S. & Yeo, A. 2014 In : Journal of Computer and System Sciences. 80, p. 687-696

    Research output: Contribution to journalArticle

  100. 2013
  101. Published

    COMMODITY12: A smart e-health environment for diabetes management

    Kafali, O., Bromuri, S., Sindlar, M., van der Weide, T., Aguilar Pelaez, E., Schaechtle, U., Alves, B., Zufferey, D., Rodriguez-Villegas, E., Schumacher, M. & Stathis, K. Oct 2013 In : Journal of Ambient Intelligence and Smart Environments. 5, 5, p. 479-502

    Research output: Contribution to journalArticle

  102. Published

    Refuting Random 3CNF Formulas in Propositional Logic

    Muller, S. & Tzameret, I. Oct 2013 p. 201 208 p.

    Research output: Contribution to conferencePaper

  103. Published

    Multi-Dimensional Causal Discovery

    Schaechtle, U., Stathis, K. & Bromuri, S. 3 Aug 2013 Proceedings of the Twenty-Third International Joint Conference on Artificial Intelligence: Beijing, China, 3-9 August 2013. Rossi, F. (ed.). p. 1649-1655

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  104. Published

    On the Parameterized Complexity and Kernelization of the Workflow Satisfiability Problem

    Crampton, J., Gutin, G. & Yeo, A. Jun 2013 In : ACM Transactions on Information and System Security. 16, 1, 4

    Research output: Contribution to journalArticle

  105. Published

    Coercive subtyping: theory and implementation

    Luo, Z., Soloviev, S. & Xue, T. Feb 2013 In : Information and Computation. 223, p. 18-42

    Research output: Contribution to journalArticle

  106. Published

    (Non-)existence of Polynomial Kernels for the Test Cover Problem

    Gutin, G., Muciaccia, G. & Yeo, A. 2013 In : Information Processing Letters. 113, p. 123-126

    Research output: Contribution to journalArticle

Previous 1 2 3 4 5 Next