Browse Publications

  1. Publications content icon
    Published

    Parameterized complexity of the anchored k-core problem for directed graphs

    Rajesh Chitnis, & , 1 Apr 2016, In: Information and Computation. 247, p. 11-22

    Research output: Contribution to journalArticlepeer-review

  2. Publications content icon
    Published

    Brief announcement: New streaming algorithms for parameterized maximal matching & beyond

    Rajesh Chitnis, , , & , 13 Jun 2015, SPAA 2015: Proceedings of the 27th ACM Symposium on Parallelism in Algorithms and Architectures. Association for Computing Machinery , p. 56-58 (Annual ACM Symposium on Parallelism in Algorithms and Architectures).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Publications content icon
    Published

    A Tight Algorithm for Strongly Connected Steiner Subgraph on Two Terminals with Demands (Extended Abstract)

    Rajesh Chitnis, , , , & , 3 Dec 2014, Parameterized and Exact Computation : 9th International Symposium, IPEC 2014, Wroclaw, Poland, September 10-12, 2014. Revised Selected Papers. Cygan, M. & Heggernes, P. (eds.). Springer Verlag, p. 159-171 (Lecture Notes in Computer Science ; vol. 8894).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Publications content icon
    Published

    Tight bounds for Gomory-Hu-like cut counting

    Rajesh Chitnis, & , 28 Sep 2016, Graph-Theoretic Concepts in Computer Science : 42nd International Workshop, WG 2016, Istanbul, Turkey, June 22-24, 2016, Revised Selected Papers. Heggernes, P. (ed.). Springer Verlag, p. 133-144 (Lecture Notes in Computer Science ; vol. 9941).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Publications content icon
    Published

    Can we create large k-cores by adding few edges?

    Rajesh Chitnis & , 25 Apr 2018, Computer Science - Theory and Applications : 13th International Computer Science Symposium in Russia, CSR 2018, Moscow, Russia, June 6–10, 2018, Proceedings. Podolskii, V. V. & Fomin, F. V. (eds.). Springer Verlag, p. 78-89 11 p. (Lecture Notes in Computer Science ; vol. 10846).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Publications content icon
    Published

    Faster exact algorithms for some terminal set problems

    Rajesh Chitnis, , , , & , 1 Sep 2017, In: Journal of Computer and System Sciences. 88, September, p. 195-207 13 p.

    Research output: Contribution to journalArticlepeer-review

  7. Publications content icon
    Published

    A tight lower bound for steiner orientation

    Rajesh Chitnis & , 25 Apr 2018, Computer Science - Theory and Applications : 13th International Computer Science Symposium in Russia, CSR 2018, Moscow, Russia, June 6–10, 2018, Proceedings. Podolskii, V. V. & Fomin, F. V. (eds.). Springer Verlag, p. 65-77 13 p. (Lecture Notes in Computer Science ; vol. 10846 ).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Publications content icon
    Published

    A tool for estimating information leakage

    Tom Chothia, Yusuke Kawamoto & , 12 Aug 2013, Computer Aided Verification - 25th International Conference, CAV 2013, Proceedings. p. 690-695 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8044 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Publications content icon
    Published

    Automatically calculating quantitative integrity measures for imperative programs

    Tom Chothia, Chris Novakovic & , 2015, Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance : 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers. Garcia-Alfaro, J., Herrera-Joancomartí, J. & Lupu, E. (eds.). Springer, Vol. 8872. p. 250-265 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8872).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  10. Publications content icon
    Published

    LeakWatch: Estimating information leakage from java programs

    Tom Chothia, & , 2014, Computer Security - ESORICS 2014 : 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II. Kutyłowski, M. & Vaidya, J. (eds.). PART 2 ed. Springer, Vol. 8713 LNCS. p. 219-236 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8713 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 12 3 4 5 6 7 8 9 ...25 Next