International Journal of Foundations of Computer Science (INT J FOUND COMPUT S)
Journal description
The International Journal of Foundations of Computer Science publishes articles which contribute new theoretical results in all areas of the foundations of computer science. The theoretical and mathematical aspects covered include: Algebraic theory of computing and formal systems, Analysis and design of algorithms, Automata and formal languages, Categories in computer science, Combinatorics, Complexity theory, Computational biology and DNA computing, Computer theorem proving, Concurrency, Constructive logic, Crytography, Database theory, Logic and semantics of programs, Logic in artificial intelligence, Logic programming, Models of computation, Program verification and synthesis, Proof and specification in computer science, Quantum computing, Theories and models of internet computing, Theory of learning and inductive inference, Theory of parallel and distributed computing, and Type theory.
Current impact factor: 0.33
Impact Factor Rankings
2015 Impact Factor  Available summer 2015 

2013 / 2014 Impact Factor  0.326 
2012 Impact Factor  0.42 
2011 Impact Factor  0.379 
2010 Impact Factor  0.459 
2009 Impact Factor  0.512 
2008 Impact Factor  0.554 
2007 Impact Factor  0.656 
2006 Impact Factor  0.5 
Impact factor over time
Additional details
5year impact  0.43 

Cited halflife  6.60 
Immediacy index  0.01 
Eigenfactor  0.00 
Article influence  0.37 
Website  International Journal of Foundations of Computer Science website 
Other titles  International journal of foundations of computer science (Online), Foundations of computer science 
ISSN  01290541 
OCLC  47442835 
Material type  Document, Periodical, Internet resource 
Document type  Internet Resource, Computer File, Journal / Magazine / Newspaper 
Publisher details
 Preprint
 Author can archive a preprint version
 Postprint
 Author cannot archive a postprint version
 Restrictions
 12 months embargo
 Conditions
 Author's preprint on any website or open access repository
 Author's postprint on author's personal website, institutional repository, subject repository or funding agency designated repository
 Publisher's version/PDF cannot be used
 Set statement to accompany preprint and authors postprint  see policy
 Must link to publisher version with DOI
 Classification yellow
Publications in this journal
 International Journal of Foundations of Computer Science 06/2015; 26(04):523535. DOI:10.1142/S012905411550029X

Article: Soccer is Harder Than Football
International Journal of Foundations of Computer Science 06/2015; 26(04):477486. DOI:10.1142/S0129054115500264  International Journal of Foundations of Computer Science 06/2015; 26(04):465475. DOI:10.1142/S0129054115500252
 International Journal of Foundations of Computer Science 06/2015; 26(04):487497. DOI:10.1142/S0129054115500276
 International Journal of Foundations of Computer Science 06/2015; 26(04):441463. DOI:10.1142/S0129054115500240

Article: Efficient selfstabilizing algorithm for independent strong dominating sets in arbitrary graphs
[Show abstract] [Hide abstract]
ABSTRACT: In computer networks area, the minimal dominating sets (MDS) and maximal independent sets (MIS) structures are very useful for creating virtual network overlays. Often, these set structures are used for designing efficient protocols in wireless sensor and adhoc networks. In this paper, we give a particular interest to one kind of these sets, called Independent Strong Dominating Set (ISDset). In addition to its domination and independence properties, the ISDset considers also node’s degrees that make it very useful in practical applications where nodes with larger degrees play important role in the networks. For example, some network clustering protocols chose nodes with large degrees to be clusterheads, which is exactly the result obtained by an ISDset algorithm. Thence, we propose the first distributed selfstabilizing algorithm for computing an ISDset of an arbitrary graph (called ISDS). Then, we prove that ISDS algorithm operates under the unfair distributed scheduler and converges after at most (n + 1) rounds requiring only O(log ∆) space memory per node where ∆ is the maximum node degree. The complexity of ISDS algorithm in rounds has the same order as the best known selfstabilizing algorithms for finding MDS and MIS. Moreover, performed simulations and comparisons with wellknown selfstabilizing algorithms for MDS and MIS problems showed the efficiency of ISDS, especially for reducing the cardinality of dominating sets founded by the algorithms.International Journal of Foundations of Computer Science 04/2015;  [Show abstract] [Hide abstract]
ABSTRACT: The arrangement graph An,k is one of the attractive underlying topologies for distributed systems. Let fm(n, k) be the minimum number of faulty links that make every subarrangement graph Anm,km faulty in An,k under link failure model. In this paper, we proved that , , and for 2 ≤ m ≤ k − 2.International Journal of Foundations of Computer Science 02/2015; 26(02):241254. DOI:10.1142/s0129054115500148  [Show abstract] [Hide abstract]
ABSTRACT: This paper describes a random model for chemical graphs that captures the notion of valence along with algorithms to generate chemical graphs using this model. An approach for computing the probability that a particular chemical graph is generated under this model is provided. The model is also used to provide theoretical bounds on the accuracy of a class of canonical labeling algorithms for a class of hydrocarbons.International Journal of Foundations of Computer Science 02/2015; 26(02):269291. DOI:10.1142/s0129054115500161  [Show abstract] [Hide abstract]
ABSTRACT: In this paper, we propose two new selfstabilizing algorithms, MWCDSC and MWCDSD, for minimal weakly connected dominating sets in an arbitrary connected graph. Algorithm MWCDSC stabilizes in O(n4) steps using an unfair central daemon and space requirement at each node is O(log n) bits at each node for an arbitrary connected graph with n nodes; it uses a designated node while other nodes are identical and anonymous. Algorithm MWCDSD stabilizes using an unfair distributed daemon with identical time and space complexities, but it assumes unique node IDs. In the literature, the best reported stabilization time for a minimal weakly connected dominating set algorithm is O(nmA) under a distributed daemon [1], where m is the number of edges and A is the number of moves to construct a breadthfirst tree.International Journal of Foundations of Computer Science 02/2015; 26(02):229240. DOI:10.1142/s0129054115500136  [Show abstract] [Hide abstract]
ABSTRACT: We investigate the state complexity of multiple unions and of multiple intersections for prefixfree regular languages. Prefixfree deterministic finite automata have their own unique structural properties that are crucial for obtaining state complexity upper bounds that are improved from those for general regular languages. We present a tight lower bound construction for kunion using an alphabet of size k+1 and for kintersection using a binary alphabet. We prove that the state complexity upper bound for kunion cannot be reached by languages over an alphabet with less than k symbols. We also give a lower bound construction for kunion using a binary alphabet that is within a constant factor of the upper bound.International Journal of Foundations of Computer Science 02/2015; 26(02). DOI:10.1007/9783642393105_9  [Show abstract] [Hide abstract]
ABSTRACT: Given an undirected, connected, simple graph G = (V,E), two vertex labelings LV and L'V of the vertices of G, and a label flip operation that interchanges a pair of labels on adjacent vertices, the Vertex Relabeling Problem is to transform G from LV into L'V using the flip operation. Agnarsson et al. showed solving the Vertex Relabeling Problem on arbitrary graphs can be done in θ(n2), where n is the number of vertices in G. In this article we study the Vertex Relabeling Problem on graphs Km,m and introduce the concept of parity and precise labelings. We show that, when we consider the parity labeling, the problem on graphs Km,m can be solved quickly in O(log m) time using m processors on an EREW PRAM. Additionally, we also show that the number of processors can be further reduced to in this case while the time complexity does not change. When the labeling is precise, the parallel time complexity increases by a factor of log m while the processor complexities remain m and . We also show that, when graphs are restricted to Km,m, this problem can be solved optimally in O(m) time when the labeling is parity, and can be solved in O(m log m) time when the labeling is precise, thereby improving the result in Agnarsson et al. for this specific case. Moreover, we generalize the result in the case of precise labeling to the cases when LV and L'V can be any configuration. In the end we give a conclusion and a list of some interesting open problems.International Journal of Foundations of Computer Science 01/2015; 26(01):3350. DOI:10.1142/S0129054115500021  [Show abstract] [Hide abstract]
ABSTRACT: An Mautomaton is a finite automaton with a blind counter that mimics a monoid M. The finitely generated groups whose word problems (when viewed as formal languages) are accepted by Mautomata play a central role in understanding the family 𝔏(M) of all languages accepted by Mautomata. If G1 and G2 are finitely generated groups whose word problems are languages in 𝔏(M), in general, the word problem of the free product G1 * G2 is not necessarily in 𝔏(M). However, we show that if M is enlarged to the free product M*P2, where P2 is the polycyclic monoid of rank two, then this closure property holds. In fact, we show more generally that the special word problem of M1 * M2 lies in 𝔏(M * P2) whenever M1 and M2 are finitely generated monoids with special word problems in 𝔏(M * P2). We also observe that there is a monoid without zero, denoted by CF2, that can be used in place of P2 for this purpose. The monoid CF2 is the rank two case of what we call a monoid with right invertible basis and its Rees quotient by its maximal ideal is P2. The fundamental theory of monoids with right invertible bases is completely analogous to that of free groups, and thus they are very convenient to use. We also investigate the questions of whether there is a group that can be used instead of the monoid P2 in the above result and under what circumstances P1 (or the bicyclic monoid) is enough to do the job of P2.International Journal of Foundations of Computer Science 01/2015; 26(01):7998. DOI:10.1142/S0129054115500045  [Show abstract] [Hide abstract]
ABSTRACT: This paper investigates public key encryption that has a desirable feature of allowing the sender of a ciphertext to recover the original plaintext from the ciphertext without relying on a recipient's private decryption key (PKESR). We propose two efficient methods for converting KEM/DEM (key encapsulation mechanisms/data encapsulation mechanisms) to PKESR. The first method, called preKEM seeding, can be applied to a large class of KEM/DEM constructions including those based on the discrete logarithm problem. Following the idea of preKEM seeding, we propose an efficient PKESR using DHIES, which has only one more additional element of length 160bit in ciphertext than that of the original DHIES. Furthermore, we show that PKESR can be constructed from identity based encryptions using the method of preKEM seeding. The second method, called postKEM converging, is more powerful and can be employed to convert any secure KEM/DEM into a secure PKESR. PostKEM converging takes advantages of an interesting property, called collision accessibility, of sibling intractable hashing. For both methods, added costs in ciphertext length and computation are minimal, making them a particularly attractive “dropin” replacement in applications where plaintexts need to be recovered efficiently by the sender alone. We further explore the problem of constructing PKESR without redundancy and show such a construction for onebit encryptions.International Journal of Foundations of Computer Science 01/2015; 26(01):131. DOI:10.1142/S012905411550001X  [Show abstract] [Hide abstract]
ABSTRACT: In this paper, we study bounds for optimal constant dimension codes further. By revising the construction for constant dimension codes in [4], we improve some bounds on qary constant dimension codes in some cases. By combinatorial method, we show that there exists no optimal constant dimension code Aq[n, 2δ, k] meeting both WangXingSafaviNainiBound and the maximal distance separate bound simultaneously.International Journal of Foundations of Computer Science 01/2015; 26(01):143152. DOI:10.1142/S0129054115500070 
Article: Complexities of Some Problems Related to Synchronizing, NonSynchronizing and Monotonic Automata
[Show abstract] [Hide abstract]
ABSTRACT: In this study, we first introduce several problems related to finding reset words for deterministic finite automata, and present motivations for these problems for practical applications in areas such as robotics and bioengineering. We then analyse computational complexities of these problems. Second, we consider monotonic and partially specified automata. Monotonicity is known to be a feature simplyfing the synchronizability problems. On the other hand for partially specified automata, synchronizability problems are known to be harder than the completely specified automata. We investigate the complexity of some synchronizability problems for automata that are both monotonic and partially specified. We show that checking the existence, computing one, and computing a shortest reset word for a monotonic partially specified automaton is NPhard. We also show that finding a reset word that synchronizes 𝓚 number of states (or maximum number of states) of a given monotonic nonsynchronizable automaton to a given set of states is NPhard.International Journal of Foundations of Computer Science 01/2015; 26(01):99121. DOI:10.1142/S0129054115500057
Data provided are for informational purposes only. Although carefully collected, accuracy cannot be guaranteed. The impact factor represents a rough estimation of the journal's impact factor and does not reflect the actual current impact factor. Publisher conditions are provided by RoMEO. Differing provisions from the publisher's actual policy or licence agreement may be applicable.