首页 > 最新文献

[Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science最新文献

英文 中文
Combinatorial complexity bounds for arrangements of curves and surfaces 曲线与曲面排列的组合复杂度界
Pub Date : 2015-09-04 DOI: 10.1109/SFCS.1988.21973
K. Clarkson, M. Sharir
The authors study both the incidence counting and the many-faces problem for various kinds of curves, including lines, pseudolines, unit circles, general circles, and pseudocircles. They also extend the analysis to three dimensions, where they concentrate on the case of spheres, which is relevant for the three-dimensional unit-distance problem. They obtain upper bounds for certain quantities. The authors believe that the techniques they use are of independent interest.<>
研究了直线、伪直线、单位圆、一般圆和伪圆等各种曲线的发生率计数和多面问题。他们还将分析扩展到三维,在那里他们专注于球体的情况,这与三维单位距离问题有关。他们得到了某些量的上界。作者认为,他们使用的技术是独立的兴趣。
{"title":"Combinatorial complexity bounds for arrangements of curves and surfaces","authors":"K. Clarkson, M. Sharir","doi":"10.1109/SFCS.1988.21973","DOIUrl":"https://doi.org/10.1109/SFCS.1988.21973","url":null,"abstract":"The authors study both the incidence counting and the many-faces problem for various kinds of curves, including lines, pseudolines, unit circles, general circles, and pseudocircles. They also extend the analysis to three dimensions, where they concentrate on the case of spheres, which is relevant for the three-dimensional unit-distance problem. They obtain upper bounds for certain quantities. The authors believe that the techniques they use are of independent interest.<<ETX>>","PeriodicalId":113255,"journal":{"name":"[Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129650411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 111
Polynomial algorithm for the k-cut problem k-切问题的多项式算法
Pub Date : 1988-10-24 DOI: 10.1109/SFCS.1988.21960
O. Goldschmidt, D. Hochbaum
The k-cut problem is to find a partition of an edge weighted graph into k nonempty components, such that the total edge weight between components is minimum. This problem is NP-complete for arbitrary k and its version involving fixing a vertex in each component is NP hard even for k=3. A polynomial algorithm for the case of a fixed k is presented.<>
k切问题是将一个边加权图划分为k个非空分量,使各分量之间的总边权最小。这个问题对于任意k来说是NP完全的,它的版本包括在每个组件中固定一个顶点,即使对于k=3也是NP困难的。对于k固定的情况,给出了一种多项式算法。
{"title":"Polynomial algorithm for the k-cut problem","authors":"O. Goldschmidt, D. Hochbaum","doi":"10.1109/SFCS.1988.21960","DOIUrl":"https://doi.org/10.1109/SFCS.1988.21960","url":null,"abstract":"The k-cut problem is to find a partition of an edge weighted graph into k nonempty components, such that the total edge weight between components is minimum. This problem is NP-complete for arbitrary k and its version involving fixing a vertex in each component is NP hard even for k=3. A polynomial algorithm for the case of a fixed k is presented.<<ETX>>","PeriodicalId":113255,"journal":{"name":"[Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123715263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 202
Lower bounds for integer greatest common divisor computations 整数最大公约数计算的下界
Pub Date : 1988-10-24 DOI: 10.1145/103516.103522
Y. Mansour, B. Schieber, Prasoon Tiwari
An Omega (log log n) lower bound is proved on the depth of any computation tree with operations (+, -, /, mod, >
在任意运算(+,-,/,mod, >)的计算树的深度上证明了(log log n)下界
{"title":"Lower bounds for integer greatest common divisor computations","authors":"Y. Mansour, B. Schieber, Prasoon Tiwari","doi":"10.1145/103516.103522","DOIUrl":"https://doi.org/10.1145/103516.103522","url":null,"abstract":"An Omega (log log n) lower bound is proved on the depth of any computation tree with operations (+, -, /, mod, <or=) that computes the greatest common divisor (GCD) of all pairs of n-bit integers. A novel technique for handling the truncation operation is implicit in the proof. Also proved is a Theta (n) bound on the depth of any algebraic computation trees with operations (+, -, *, /, <or=) (where \"/\" stands for exact division) that solve many simple problems, e.g. testing if an n-bit integer is odd or computing the GCD of two n-bit integers.<<ETX>>","PeriodicalId":113255,"journal":{"name":"[Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133179585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Increasing the size of a network by a constant factor can increase performance by more than a constant factor 将网络的大小增加一个常数因子可以提高性能,而不仅仅是增加一个常数因子
Pub Date : 1988-10-24 DOI: 10.1109/SFCS.1988.21939
R.R. Kock
In one routing scheme which has been implemented on a parallel architecture based on the butterfly graph, messages are sometimes destroyed. It is shown that if messages are sent to random destinations, the expected number of messages that reach their destinations is Theta (n(log n)-1/q), where n is the size of the butterfly graph and q is the number of messages that can move through one edge (or, equivalently, vertex) in one time step. In the analysis of this problem, interesting techniques for solving nonlinear systems of difference equations are developed that could have applications to other problems.<>
在一种基于蝴蝶图并行架构的路由方案中,消息有时会被破坏。结果表明,如果消息被发送到随机目的地,则到达目的地的消息的期望数量为Theta (n(log n)-1/q),其中n是蝴蝶图的大小,q是在一个时间步长内可以通过一条边(或等价的顶点)的消息的数量。在对这个问题的分析中,开发了求解非线性差分方程组的有趣技术,这些技术可以应用于其他问题。
{"title":"Increasing the size of a network by a constant factor can increase performance by more than a constant factor","authors":"R.R. Kock","doi":"10.1109/SFCS.1988.21939","DOIUrl":"https://doi.org/10.1109/SFCS.1988.21939","url":null,"abstract":"In one routing scheme which has been implemented on a parallel architecture based on the butterfly graph, messages are sometimes destroyed. It is shown that if messages are sent to random destinations, the expected number of messages that reach their destinations is Theta (n(log n)-1/q), where n is the size of the butterfly graph and q is the number of messages that can move through one edge (or, equivalently, vertex) in one time step. In the analysis of this problem, interesting techniques for solving nonlinear systems of difference equations are developed that could have applications to other problems.<<ETX>>","PeriodicalId":113255,"journal":{"name":"[Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133186551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
Learning via queries 通过查询学习
Pub Date : 1988-10-24 DOI: 10.1109/SFCS.1988.21931
W. Gasarch, Carl H. Smith
The power of various query languages is compared along two dimensions, namely the inherent power of the language and the number of alternations of quantizers. Learning by asking questions is compared to learning by passively reading data. It is found that the extent of what can be learned by queries is largely dependent on the language used by the inference mechanism to formulate questions to ask of its trainer. It is proved that inference machines that are allowed to ask first-order questions with plus and times can be used to solve the halting problem and therefore can learn all the recursive functions. Learning languages are also considered.<>
在两个维度上比较了各种查询语言的能力,即语言的固有能力和量化器的替代数量。通过提问来学习与被动地阅读数据来学习相比。研究发现,查询可以学到的东西的程度在很大程度上取决于推理机制用来向训练器提出问题的语言。证明了允许提出带加号和时间的一阶问题的推理机可以用来解决停机问题,因此可以学习所有的递归函数。学习语言也在考虑之列。
{"title":"Learning via queries","authors":"W. Gasarch, Carl H. Smith","doi":"10.1109/SFCS.1988.21931","DOIUrl":"https://doi.org/10.1109/SFCS.1988.21931","url":null,"abstract":"The power of various query languages is compared along two dimensions, namely the inherent power of the language and the number of alternations of quantizers. Learning by asking questions is compared to learning by passively reading data. It is found that the extent of what can be learned by queries is largely dependent on the language used by the inference mechanism to formulate questions to ask of its trainer. It is proved that inference machines that are allowed to ask first-order questions with plus and times can be used to solve the halting problem and therefore can learn all the recursive functions. Learning languages are also considered.<<ETX>>","PeriodicalId":113255,"journal":{"name":"[Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133732796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 48
Effect of connectivity in associative memory models 联想记忆模型中连通性的影响
Pub Date : 1988-10-24 DOI: 10.1109/SFCS.1988.21932
J. Komlos, R. Paturi
The authors investigate how good connectivity properties translate into good error-correcting behavior in sparse networks of threshold elements. They determine how the eigenvalues of the interconnection graph (which in turn reflect connectivity properties) relate to the quantities, number of items stored, amount of error-correction, radius of attraction, and rate of convergence in an associative memory model consisting of a sparse network of threshold elements or neurons.<>
作者研究了在阈值元素稀疏网络中,良好的连通性如何转化为良好的纠错行为。它们决定了互连图的特征值(反过来反映了连通性属性)如何与数量、存储的项目数量、纠错量、吸引力半径和由阈值元素或神经元组成的稀疏网络组成的联想记忆模型中的收敛速度相关。
{"title":"Effect of connectivity in associative memory models","authors":"J. Komlos, R. Paturi","doi":"10.1109/SFCS.1988.21932","DOIUrl":"https://doi.org/10.1109/SFCS.1988.21932","url":null,"abstract":"The authors investigate how good connectivity properties translate into good error-correcting behavior in sparse networks of threshold elements. They determine how the eigenvalues of the interconnection graph (which in turn reflect connectivity properties) relate to the quantities, number of items stored, amount of error-correction, radius of attraction, and rate of convergence in an associative memory model consisting of a sparse network of threshold elements or neurons.<<ETX>>","PeriodicalId":113255,"journal":{"name":"[Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115809765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Genus g graphs have pagenumber O( square root g) g属图的页数为0(平方根g)
Pub Date : 1988-10-24 DOI: 10.1109/SFCS.1988.21962
S. Malitz
A book embedding of a graph consists of a linear ordering of the vertices along the spine of a book and an assignment of edges to pages so that edges on the same page do not intersect. The minimum number of pages in which a graph can be embedded is its pagenumber. The following results are presented: (1) any graph of genus g has pagenumber O( square root g); and (2) most n-vertex d-regular graphs have pagenumber Omega ( square root dn/sup 1/2-1/d/).<>
图的图书嵌入包括沿书脊的顶点的线性排序和对页的边的分配,以便同一页上的边不相交。图可以嵌入的最小页数是它的页码。得到如下结果:(1)g属的任意图的页数为0(平方根g);(2)大多数n顶点d正则图的页数为Omega(√dn/sup 1/2-1/d/)。
{"title":"Genus g graphs have pagenumber O( square root g)","authors":"S. Malitz","doi":"10.1109/SFCS.1988.21962","DOIUrl":"https://doi.org/10.1109/SFCS.1988.21962","url":null,"abstract":"A book embedding of a graph consists of a linear ordering of the vertices along the spine of a book and an assignment of edges to pages so that edges on the same page do not intersect. The minimum number of pages in which a graph can be embedded is its pagenumber. The following results are presented: (1) any graph of genus g has pagenumber O( square root g); and (2) most n-vertex d-regular graphs have pagenumber Omega ( square root dn/sup 1/2-1/d/).<<ETX>>","PeriodicalId":113255,"journal":{"name":"[Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114619672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Speeding up dynamic programming 加速动态规划
Pub Date : 1988-10-24 DOI: 10.1109/SFCS.1988.21965
D. Eppstein, Z. Galil, R. Giancarlo
A number of important computational problems in molecular biology, geology, speech recognition, and other areas can be expressed as recurrences which have typically been solved with dynamic programming. By using more sophisticated data structures, and by taking advantage of further structure from the applications, the authors speed up the computation of several of these recurrences by one or two orders of magnitude. The algorithms used are simple and practical.<>
分子生物学、地质学、语音识别和其他领域的许多重要计算问题都可以用递归来表示,而递归通常是用动态规划来解决的。通过使用更复杂的数据结构,并利用应用程序的进一步结构,作者将其中一些递归的计算速度提高了一到两个数量级。所使用的算法简单实用
{"title":"Speeding up dynamic programming","authors":"D. Eppstein, Z. Galil, R. Giancarlo","doi":"10.1109/SFCS.1988.21965","DOIUrl":"https://doi.org/10.1109/SFCS.1988.21965","url":null,"abstract":"A number of important computational problems in molecular biology, geology, speech recognition, and other areas can be expressed as recurrences which have typically been solved with dynamic programming. By using more sophisticated data structures, and by taking advantage of further structure from the applications, the authors speed up the computation of several of these recurrences by one or two orders of magnitude. The algorithms used are simple and practical.<<ETX>>","PeriodicalId":113255,"journal":{"name":"[Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116928575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 70
Reachability is harder for directed than for undirected finite graphs 有向有限图的可达性比无向有限图更难
M. Ajtai, Ronald Fagin
It is shown that for directed graphs, reachability can not be expressed by an existential monadic second-order sentence. The proof makes use of Ehrenfeucht-Fraisse games, along with probabilistic. However, it is shown that for directed graphs with degree at most k, reachability is expressible by an existential monadic second-order sentence. One reason for the interest in the main result is that while there is considerable empirical evidence (in terms of the efficiency of algorithms that have been discovered) that reachability in directed graphs is 'harder' than reachability in undirected graphs, this is the first proof in a precise technical sense that this is so.<>
证明了有向图的可达性不能用存在一元二阶句来表示。证明使用了Ehrenfeucht-Fraisse游戏,以及概率。然而,证明了对于度数最多为k的有向图,可达性可以用存在一元二阶句来表示。对主要结果感兴趣的一个原因是,虽然有相当多的经验证据(就已发现的算法的效率而言)表明有向图的可达性比无向图的可达性“更难”,但这是第一次在精确的技术意义上证明这一点
{"title":"Reachability is harder for directed than for undirected finite graphs","authors":"M. Ajtai, Ronald Fagin","doi":"10.2307/2274958","DOIUrl":"https://doi.org/10.2307/2274958","url":null,"abstract":"It is shown that for directed graphs, reachability can not be expressed by an existential monadic second-order sentence. The proof makes use of Ehrenfeucht-Fraisse games, along with probabilistic. However, it is shown that for directed graphs with degree at most k, reachability is expressible by an existential monadic second-order sentence. One reason for the interest in the main result is that while there is considerable empirical evidence (in terms of the efficiency of algorithms that have been discovered) that reachability in directed graphs is 'harder' than reachability in undirected graphs, this is the first proof in a precise technical sense that this is so.<<ETX>>","PeriodicalId":113255,"journal":{"name":"[Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129820590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 151
Coordinated traversal: (t+1)-round Byzantine agreement in polynomial time 协调遍历:(t+1)-轮拜占庭协议在多项式时间
Pub Date : 1988-10-24 DOI: 10.1109/SFCS.1988.21941
Y. Moses, Orli Waarts
The problem of efficiently performing Byzantine agreement in t+1 rounds in the face of arbitrarily malicious failures is treated. A communication-efficient polynomial-time protocol is presented for n>8t. The protocol is an early stopping protocol, halting in min(t+1, f+2) rounds in the worst case, where f is the number of processors that fail during the run. This is provably optimal. The protocol is based on a careful combination of early stopping, fault masking, and a technique called coordinated traversal. The combination of the three provides a powerful method for restricting the damage that a faulty processor, however malicious, can do. One of the byproducts of this protocol is a polynomial-time (t+1)-round protocol for the Byzantine firing squad problem.<>
处理了在t+1轮中面对任意恶意故障时有效执行拜占庭协议的问题。提出了一种n>8t的通信高效多项式时间协议。该协议是一个早期停止协议,在最坏的情况下,在min(t+1, f+2)轮中停止,其中f是运行期间失败的处理器数量。这可以证明是最优的。该协议基于提前停止、故障屏蔽和一种称为协调遍历的技术的精心组合。这三者的结合提供了一种强大的方法来限制有缺陷的处理器可能造成的损害,无论它是多么恶意。该协议的副产品之一是拜占庭行刑队问题的多项式时间(t+1)轮协议。
{"title":"Coordinated traversal: (t+1)-round Byzantine agreement in polynomial time","authors":"Y. Moses, Orli Waarts","doi":"10.1109/SFCS.1988.21941","DOIUrl":"https://doi.org/10.1109/SFCS.1988.21941","url":null,"abstract":"The problem of efficiently performing Byzantine agreement in t+1 rounds in the face of arbitrarily malicious failures is treated. A communication-efficient polynomial-time protocol is presented for n>8t. The protocol is an early stopping protocol, halting in min(t+1, f+2) rounds in the worst case, where f is the number of processors that fail during the run. This is provably optimal. The protocol is based on a careful combination of early stopping, fault masking, and a technique called coordinated traversal. The combination of the three provides a powerful method for restricting the damage that a faulty processor, however malicious, can do. One of the byproducts of this protocol is a polynomial-time (t+1)-round protocol for the Byzantine firing squad problem.<<ETX>>","PeriodicalId":113255,"journal":{"name":"[Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127444085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 55
期刊
[Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1