Ferdinando Cicalese

From MaRDI portal
(Redirected from Person:235728)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
On constrained intersection representations of graphs and digraphs2024-09-11Paper
Hardness and approximation of multiple sequence alignment with column score
Theoretical Computer Science
2023-02-01Paper
On the intractability landscape of digraph intersection representations2022-08-30Paper
On the redundancy of \(D\)-ary Fano codes2022-03-24Paper
The tandem duplication distance problem is hard over bounded alphabets
(available as arXiv preprint)
2022-03-22Paper
On the complexity of directed intersection representation of DAGs2021-04-21Paper
Information Theoretical Clustering Is Hard to Approximate
IEEE Transactions on Information Theory
2021-02-22Paper
On infinite prefix normal words
Theoretical Computer Science
2021-02-15Paper
On the star decomposition of a graph: hardness results and approximation for the max-min optimization problem
Discrete Applied Mathematics
2020-12-29Paper
On infinite prefix normal words
SOFSEM 2019: Theory and Practice of Computer Science
2020-10-22Paper
Optimal strategies for a model of combinatorial two-sided search2020-03-12Paper
On the multi-interval Ulam-Rényi game: for 3 lies 4 intervals suffice
Theoretical Computer Science
2020-01-29Paper
Minimum-Entropy Couplings and Their Applications
IEEE Transactions on Information Theory
2019-07-19Paper
scientific article; zbMATH DE number 7034309 (Why is no real title available?)2019-03-11Paper
Correction to: ``Trading off worst and expected cost in decision tree problems
Algorithmica
2019-01-11Paper
Bubble-flip -- a new generation algorithm for prefix normal words
Theoretical Computer Science
2018-08-23Paper
A Combinatorial Model of Two-Sided Search
International Journal of Foundations of Computer Science
2018-07-24Paper
Bounds on the Entropy of a Function of a Random Variable and Their Applications
IEEE Transactions on Information Theory
2018-06-27Paper
Bubble-flip -- a new generation algorithm for prefix normal words
Language and Automata Theory and Applications
2018-06-26Paper
Decision trees for function evaluation: simultaneous optimization of worst and expected cost
Algorithmica
2017-11-09Paper
Trading off worst and expected cost in decision tree problems
Algorithmica
2017-11-09Paper
Two Batch Search With Lie Cost
IEEE Transactions on Information Theory
2017-08-08Paper
On the tree search problem with non-uniform costs
Graph-Theoretic Concepts in Computer Science
2016-10-21Paper
On the tree search problem with non-uniform costs
Theoretical Computer Science
2016-09-01Paper
Trading off worst and expected cost in decision tree problems
Algorithms and Computation
2016-01-11Paper
On the complexity of the vector connectivity problem
Theoretical Computer Science
2015-07-13Paper
Spread of influence in weighted networks under time and budget constraints
Theoretical Computer Science
2015-05-26Paper
Approximating decision trees with value dependent testing costs
Information Processing Letters
2015-05-21Paper
Recent developments of feedback coding and its relations with many-valued logic
Proof, Computation and Agency
2015-04-17Paper
Perfect strategies for the Ulam-Rényi game with multi-interval questions
Theory of Computing Systems
2015-01-21Paper
Improved approximation algorithms for the average-case tree searching problem
Algorithmica
2014-12-02Paper
Latency-bounded target set selection in social networks
Theoretical Computer Science
2014-04-29Paper
Approximating the maximum consecutive subsums of a sequence
Theoretical Computer Science
2014-03-13Paper
Latency-bounded target set selection in social networks
Lecture Notes in Computer Science
2013-08-05Paper
On the approximability and exact algorithms for vector domination and related problems in graphs
Discrete Applied Mathematics
2013-04-18Paper
On approximate jumbled pattern matching in strings
Theory of Computing Systems
2012-12-06Paper
The binary identification problem for weighted trees
Theoretical Computer Science
2012-11-08Paper
A linear algorithm for string reconstruction in the reverse complement equivalence model
Journal of Discrete Algorithms
2012-09-13Paper
Algorithms for jumbled pattern matching in strings
International Journal of Foundations of Computer Science
2012-08-30Paper
Near Linear Time Construction of an Approximate Index for All Maximum Consecutive Sub-sums of a Sequence
Combinatorial Pattern Matching
2012-08-14Paper
Graphs of separability at most 2
Discrete Applied Mathematics
2012-05-11Paper
On the complexity of searching in trees and partially ordered structures
Theoretical Computer Science
2011-12-07Paper
Competitive evaluation of threshold functions in the priced information model
Annals of Operations Research
2011-11-17Paper
Hardness, approximability, and exact algorithms for vector domination and total vector domination in graphs
Fundamentals of Computation Theory
2011-08-19Paper
Binary identification problems for weighted trees
Lecture Notes in Computer Science
2011-08-12Paper
Competitive Boolean function evaluation: beyond monotonicity, and the symmetric case
Discrete Applied Mathematics
2011-08-10Paper
On the competitive ratio of evaluating priced functions
Journal of the ACM
2011-07-14Paper
Graphs of separability at most two: structural characterizations and their consequences
Lecture Notes in Computer Science
2011-05-19Paper
Efficient Reconstruction of RC-Equivalent Strings
Lecture Notes in Computer Science
2011-05-19Paper
Fault-tolerant search algorithms. Reliable computation with unreliable information
Monographs in Theoretical Computer Science. An EATCS Series
2011-02-14Paper
On greedy algorithms for decision trees
Algorithms and Computation
2010-12-09Paper
On the complexity of searching in trees: average-case minimization
Automata, Languages and Programming
2010-09-07Paper
Superselectors: efficient constructions and applications
Algorithms – ESA 2010
2010-09-06Paper
A new strategy for querying priced information
Proceedings of the thirty-seventh annual ACM symposium on Theory of computing
2010-08-16Paper
On the competitive ratio of evaluating priced functions
Proceedings of the seventeenth annual ACM-SIAM symposium on Discrete algorithm - SODA '06
2010-08-16Paper
Algorithms and Computation
Lecture Notes in Computer Science
2009-08-07Paper
Faster deterministic communication in radio networks
Algorithmica
2009-06-22Paper
Binary search with delayed and missing answers
Information Processing Letters
2009-03-23Paper
Computing with Priced Information: When the Value Makes the Price
Algorithms and Computation
2009-01-29Paper
Q-Ary Ulam-Renyi Game with Constrained Lies
Lecture Notes in Computer Science
2009-01-22Paper
Bounding the Average Length of Optimal Source Codes Via Majorization Theory
IEEE Transactions on Information Theory
2008-12-21Paper
A Note on Approximation of Uniform Distributions From Variable-to-Fixed Length Codes
IEEE Transactions on Information Theory
2008-12-21Paper
Searching with lies under error cost constraints
Discrete Applied Mathematics
2008-09-29Paper
Function Evaluation Via Linear Programming in the Priced Information Model
Automata, Languages and Programming
2008-08-28Paper
2-Stage Fault Tolerant Interval Group Testing
Algorithms and Computation
2008-05-27Paper
Faster Centralized Communication in Radio Networks
Algorithms and Computation
2008-04-24Paper
Q-ary Ulam-Rényi game with constrained lies
Electronic Notes in Discrete Mathematics
2007-05-29Paper
Searching with lies under error transition cost constraints
Electronic Notes in Discrete Mathematics
2007-05-29Paper
Overlaps help: Improved bounds for group testing with interval queries
Discrete Applied Mathematics
2007-03-02Paper
Perfect minimally adaptive \(q\)-ary search with unreliable tests
Journal of Statistical Planning and Inference
2006-10-30Paper
Algorithms – ESA 2005
Lecture Notes in Computer Science
2006-06-27Paper
Computing and Combinatorics
Lecture Notes in Computer Science
2006-01-11Paper
Computational Science – ICCS 2005
Lecture Notes in Computer Science
2005-11-30Paper
Computing and Combinatorics
Lecture Notes in Computer Science
2005-06-15Paper
Supermodularity and subadditivity properties of the entropy on the majorization lattice
IEEE Transactions on Information Theory
2005-05-11Paper
On searching strategies, parallel questions, and delayed answers
Discrete Applied Mathematics
2005-02-23Paper
scientific article; zbMATH DE number 2080238 (Why is no real title available?)2004-08-04Paper
scientific article; zbMATH DE number 1696632 (Why is no real title available?)2002-10-22Paper
An improved heuristic for the ``Ulam-Rényi game
Information Processing Letters
2002-07-25Paper
Least adaptive optimal search with unreliable tests
Theoretical Computer Science
2002-03-03Paper
scientific article; zbMATH DE number 1577986 (Why is no real title available?)2002-01-31Paper
scientific article; zbMATH DE number 1617287 (Why is no real title available?)2001-07-11Paper
scientific article; zbMATH DE number 1405795 (Why is no real title available?)2000-11-27Paper
Perfect two-fault tolerant search with minimum adaptiveness
Advances in Applied Mathematics
2000-11-16Paper
Optimal strategies against a liar
Theoretical Computer Science
2000-06-04Paper
Classifying through a fuzzy algebraic structure
Fuzzy Sets and Systems
1997-06-09Paper


Research outcomes over time


This page was built for person: Ferdinando Cicalese