首页 > 最新文献

Electron. Colloquium Comput. Complex.最新文献

英文 中文
Classical simulation of one-query quantum distinguishers 单查询量子区分符的经典模拟
Pub Date : 2023-01-01 DOI: 10.4230/LIPIcs.APPROX/RANDOM.2023.43
Andrej Bogdanov, T. Cheung, K. Dinesh, John C.S. Lui
We study the relative advantage of classical and quantum distinguishers of bounded query complexity over n -bit strings, focusing on the case of a single quantum query. A construction of Aaronson and Ambainis (STOC 2015) yields a pair of distributions that is ε -distinguishable by a one-query quantum algorithm, but O ( εk/ √ n )-indistinguishable by any non-adaptive k -query classical algorithm. We show that every pair of distributions that is ε -distinguishable by a one-query quantum algorithm is distinguishable with k classical queries and (1) advantage min { Ω( ε p k/n )) , Ω( ε 2 k 2 /n ) } non-adaptively (i.e., in one round), and (2) advantage Ω( ε 2 k/ √ n log n ) in two rounds. As part of our analysis, we introduce a general method for converting unbiased estimators into distinguishers.
我们研究了n位字符串上有界查询复杂度的经典区分符和量子区分符的相对优势,重点研究了单个量子查询的情况。Aaronson和Ambainis (STOC 2015)的构造得到了一对分布,ε -可被单查询量子算法区分,但O (εk/√n)-无法被任何非自适应k -查询经典算法区分。我们证明了每一对由单查询量子算法ε -可分辨的分布都可以用k个经典查询和(1)优势min {Ω(ε p k/n)), Ω(ε 2 k 2 /n)}非自适应(即一轮)和(2)优势Ω(ε 2 k/√n log n)在两轮中区分。作为分析的一部分,我们介绍了将无偏估计量转换为区分量的一般方法。
{"title":"Classical simulation of one-query quantum distinguishers","authors":"Andrej Bogdanov, T. Cheung, K. Dinesh, John C.S. Lui","doi":"10.4230/LIPIcs.APPROX/RANDOM.2023.43","DOIUrl":"https://doi.org/10.4230/LIPIcs.APPROX/RANDOM.2023.43","url":null,"abstract":"We study the relative advantage of classical and quantum distinguishers of bounded query complexity over n -bit strings, focusing on the case of a single quantum query. A construction of Aaronson and Ambainis (STOC 2015) yields a pair of distributions that is ε -distinguishable by a one-query quantum algorithm, but O ( εk/ √ n )-indistinguishable by any non-adaptive k -query classical algorithm. We show that every pair of distributions that is ε -distinguishable by a one-query quantum algorithm is distinguishable with k classical queries and (1) advantage min { Ω( ε p k/n )) , Ω( ε 2 k 2 /n ) } non-adaptively (i.e., in one round), and (2) advantage Ω( ε 2 k/ √ n log n ) in two rounds. As part of our analysis, we introduce a general method for converting unbiased estimators into distinguishers.","PeriodicalId":11639,"journal":{"name":"Electron. Colloquium Comput. Complex.","volume":"51 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82670662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Algorithmic Approach to Uniform Lower Bounds 统一下界的一种算法
Pub Date : 2023-01-01 DOI: 10.4230/LIPIcs.CCC.2023.35
R. Santhanam
We propose a new family of circuit-based sampling tasks, such that non-trivial algorithmic solutions to certain tasks from this family imply frontier uniform lower bounds such as “ NP is not in uniform ACC 0 ” and “ NP does not have uniform polynomial-size depth-two threshold circuits”. Indeed, the most general versions of our sampling tasks have implications for central open problems such as NP vs P and PSPACE vs P . We argue the soundness of our approach by showing that the non-trivial algorithmic solutions we require do follow from standard cryptographic assumptions. In addition, we give evidence that a version of our approach for uniform circuits is necessary in order to separate NP from P or PSPACE from P . We give an algorithmic characterization for the PSPACE vs P question: PSPACE ̸ = P iff either E has sub-exponential time non-uniform algorithms infinitely often or there are non-trivial space-efficient solutions to our sampling tasks for uniform Boolean circuits. We show how to use our framework to capture uniform versions of known non-uniform lower bounds, as well as classical uniform lower bounds such as the space hierarchy theorem and Allender’s uniform lower bound for the Permanent. We also apply our framework to prove new lower bounds: NP does not have polynomial-size uniform AC 0 circuits with a bottom layer of MOD 6 gates, nor does it have polynomial-size uniform AC 0 circuits with a bottom layer of threshold gates. Our proofs exploit recently defined probabilistic time-bounded variants of Kolmogorov complexity [36, 24, 34].
我们提出了一种新的基于电路的采样任务族,使得该族中某些任务的非平凡算法解意味着边界均匀下界,例如“NP不处于均匀的ACC 0”和“NP不具有均匀的多项式大小的深度-二阈值电路”。事实上,我们的抽样任务的最一般版本对中心开放问题(如NP vs P和PSPACE vs P)有影响。我们通过证明我们需要的非平凡算法解决方案确实遵循标准密码学假设来论证我们方法的合理性。此外,我们给出的证据表明,为了将NP从P或PSPACE从P分离出来,我们的方法的一个版本是必要的。我们给出了PSPACE vs P问题的一个算法表征:如果E具有次指数时间非均匀算法,或者对于均匀布尔电路的采样任务存在非平凡的空间高效解,则PSPACE = P。我们展示了如何使用我们的框架来捕获已知非均匀下界的均匀版本,以及经典的均匀下界,如空间层次定理和Allender的永久均匀下界。我们还应用我们的框架来证明新的下界:NP不具有底层为MOD 6门的多项式大小的均匀AC 0电路,也不具有底层为阈值门的多项式大小的均匀AC 0电路。我们的证明利用了最近定义的Kolmogorov复杂度的概率有界变体[36,24,34]。
{"title":"An Algorithmic Approach to Uniform Lower Bounds","authors":"R. Santhanam","doi":"10.4230/LIPIcs.CCC.2023.35","DOIUrl":"https://doi.org/10.4230/LIPIcs.CCC.2023.35","url":null,"abstract":"We propose a new family of circuit-based sampling tasks, such that non-trivial algorithmic solutions to certain tasks from this family imply frontier uniform lower bounds such as “ NP is not in uniform ACC 0 ” and “ NP does not have uniform polynomial-size depth-two threshold circuits”. Indeed, the most general versions of our sampling tasks have implications for central open problems such as NP vs P and PSPACE vs P . We argue the soundness of our approach by showing that the non-trivial algorithmic solutions we require do follow from standard cryptographic assumptions. In addition, we give evidence that a version of our approach for uniform circuits is necessary in order to separate NP from P or PSPACE from P . We give an algorithmic characterization for the PSPACE vs P question: PSPACE ̸ = P iff either E has sub-exponential time non-uniform algorithms infinitely often or there are non-trivial space-efficient solutions to our sampling tasks for uniform Boolean circuits. We show how to use our framework to capture uniform versions of known non-uniform lower bounds, as well as classical uniform lower bounds such as the space hierarchy theorem and Allender’s uniform lower bound for the Permanent. We also apply our framework to prove new lower bounds: NP does not have polynomial-size uniform AC 0 circuits with a bottom layer of MOD 6 gates, nor does it have polynomial-size uniform AC 0 circuits with a bottom layer of threshold gates. Our proofs exploit recently defined probabilistic time-bounded variants of Kolmogorov complexity [36, 24, 34].","PeriodicalId":11639,"journal":{"name":"Electron. Colloquium Comput. Complex.","volume":"354 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78954367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Radical Sylvester-Gallai Theorem for Tuples of Quadratics 二次元组的根Sylvester-Gallai定理
Pub Date : 2023-01-01 DOI: 10.4230/LIPIcs.CCC.2023.20
Abhibhav Garg, R. Oliveira, Shir Peleg, A. Sengupta
We prove a higher codimensional radical Sylvester-Gallai type theorem for quadratic polynomials, simultaneously generalizing [20, 36]. Hansen’s theorem is a high-dimensional version of the classical Sylvester-Gallai theorem in which the incidence condition is given by high-dimensional flats instead of lines. We generalize Hansen’s theorem to the setting of quadratic forms in a polynomial ring, where the incidence condition is given by radical membership in a high-codimensional ideal. Our main theorem is also a generalization of the quadratic Sylvester–Gallai Theorem of [36]. Our work is the first to prove a radical Sylvester–Gallai type theorem for arbitrary codimension k ≥ 2, whereas previous works [36, 29, 30, 28] considered the case of codimension 2 ideals. Our techniques combine algebraic geometric and combinatorial arguments. A key ingredient is a structural result for ideals generated by a constant number of quadratics, showing that such ideals must be radical whenever the quadratic forms are far apart. Using the wide algebras defined in [28], combined with results about integral ring extensions and dimension theory, we develop new techniques for studying such ideals generated by quadratic forms. One advantage of our approach is that it does not need the finer classification theorems for codimension 2 complete intersection of quadratics proved in [36, 16].
我们证明了二次多项式的一个高共维根式Sylvester-Gallai型定理,同时推广了[20,36]。Hansen定理是经典Sylvester-Gallai定理的高维版本,其中的关联条件由高维平面而不是直线给出。我们将Hansen定理推广到多项式环上的二次型集合,其中的关联条件由高协维理想中的根隶属性给出。我们的主要定理也是对[36]的二次Sylvester-Gallai定理的推广。我们的研究首次证明了任意余维k≥2的根本Sylvester-Gallai型定理,而之前的研究[36,29,30,28]考虑了余维2理想的情况。我们的技术结合了代数几何和组合论证。一个关键因素是由常数次二次生成的理想的结构结果,表明当二次形式相差很大时,这种理想必须是根式的。利用[28]中定义的宽代数,结合积分环扩展和维数理论的结果,我们开发了研究由二次型生成的理想的新技术。我们的方法的一个优点是它不需要在[36,16]中证明的余维数为2的二次函数的完全交的更精细的分类定理。
{"title":"Radical Sylvester-Gallai Theorem for Tuples of Quadratics","authors":"Abhibhav Garg, R. Oliveira, Shir Peleg, A. Sengupta","doi":"10.4230/LIPIcs.CCC.2023.20","DOIUrl":"https://doi.org/10.4230/LIPIcs.CCC.2023.20","url":null,"abstract":"We prove a higher codimensional radical Sylvester-Gallai type theorem for quadratic polynomials, simultaneously generalizing [20, 36]. Hansen’s theorem is a high-dimensional version of the classical Sylvester-Gallai theorem in which the incidence condition is given by high-dimensional flats instead of lines. We generalize Hansen’s theorem to the setting of quadratic forms in a polynomial ring, where the incidence condition is given by radical membership in a high-codimensional ideal. Our main theorem is also a generalization of the quadratic Sylvester–Gallai Theorem of [36]. Our work is the first to prove a radical Sylvester–Gallai type theorem for arbitrary codimension k ≥ 2, whereas previous works [36, 29, 30, 28] considered the case of codimension 2 ideals. Our techniques combine algebraic geometric and combinatorial arguments. A key ingredient is a structural result for ideals generated by a constant number of quadratics, showing that such ideals must be radical whenever the quadratic forms are far apart. Using the wide algebras defined in [28], combined with results about integral ring extensions and dimension theory, we develop new techniques for studying such ideals generated by quadratic forms. One advantage of our approach is that it does not need the finer classification theorems for codimension 2 complete intersection of quadratics proved in [36, 16].","PeriodicalId":11639,"journal":{"name":"Electron. Colloquium Comput. Complex.","volume":"2015 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73902005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On the Power of Regular and Permutation Branching Programs 正则和置换分支规划的威力
Pub Date : 2023-01-01 DOI: 10.4230/LIPIcs.APPROX/RANDOM.2023.44
Chin Ho Lee, Edward Pyne, Salil P. Vadhan
We give new upper and lower bounds on the power of several restricted classes of arbitrary-order read-once branching programs (ROBPs) and standard-order ROBPs (SOBPs) that have received significant attention in the literature on pseudorandomness for space-bounded computation. Regular SOBPs of length n and width ⌊ w ( n +1) / 2 ⌋ can exactly simulate general SOBPs of length n and width w , and moreover an n/ 2 − o ( n ) blow-up in width is necessary for such a simulation. Our result extends and simplifies prior average-case simulations (Reingold, Trevisan, and Vadhan (STOC 2006), Bogdanov, Hoza, Prakriya, and Pyne (CCC 2022)), in particular implying that weighted pseudorandom generators (Braverman, Cohen, and Garg (SICOMP 2020)) for regular SOBPs of width poly( n ) or larger automatically extend to general SOBPs. Furthermore, our simulation also extends to general (even read-many) oblivious branching programs. There exist natural functions computable by regular SOBPs of constant width that are average-case hard for permutation SOBPs of exponential width. Indeed, we show that Inner-Product mod 2 is average-case hard for arbitrary-order permutation ROBPs of exponential width. There exist functions computable by constant-width arbitrary-order permutation ROBPs that are worst-case hard for exponential-width SOBPs. Read-twice permutation branching programs of subexponential width can simulate polynomial-width arbitrary-order ROBPs.
本文给出了在空间有界计算的伪随机性方面受到广泛关注的若干受限类任意阶读一次分支程序(ROBPs)和标准阶分支程序(sobp)的幂的新的上界和下界。
{"title":"On the Power of Regular and Permutation Branching Programs","authors":"Chin Ho Lee, Edward Pyne, Salil P. Vadhan","doi":"10.4230/LIPIcs.APPROX/RANDOM.2023.44","DOIUrl":"https://doi.org/10.4230/LIPIcs.APPROX/RANDOM.2023.44","url":null,"abstract":"We give new upper and lower bounds on the power of several restricted classes of arbitrary-order read-once branching programs (ROBPs) and standard-order ROBPs (SOBPs) that have received significant attention in the literature on pseudorandomness for space-bounded computation. Regular SOBPs of length n and width ⌊ w ( n +1) / 2 ⌋ can exactly simulate general SOBPs of length n and width w , and moreover an n/ 2 − o ( n ) blow-up in width is necessary for such a simulation. Our result extends and simplifies prior average-case simulations (Reingold, Trevisan, and Vadhan (STOC 2006), Bogdanov, Hoza, Prakriya, and Pyne (CCC 2022)), in particular implying that weighted pseudorandom generators (Braverman, Cohen, and Garg (SICOMP 2020)) for regular SOBPs of width poly( n ) or larger automatically extend to general SOBPs. Furthermore, our simulation also extends to general (even read-many) oblivious branching programs. There exist natural functions computable by regular SOBPs of constant width that are average-case hard for permutation SOBPs of exponential width. Indeed, we show that Inner-Product mod 2 is average-case hard for arbitrary-order permutation ROBPs of exponential width. There exist functions computable by constant-width arbitrary-order permutation ROBPs that are worst-case hard for exponential-width SOBPs. Read-twice permutation branching programs of subexponential width can simulate polynomial-width arbitrary-order ROBPs.","PeriodicalId":11639,"journal":{"name":"Electron. Colloquium Comput. Complex.","volume":"51 1","pages":"44:1-44:22"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74723584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Protecting Single-Hop Radio Networks from Message Drops 保护单跳无线网络免受消息丢失
Pub Date : 2023-01-01 DOI: 10.4230/LIPIcs.ICALP.2023.53
K. Efremenko, Gillat Kol, Dmitry Paramonov, Raghuvansh R. Saxena
Single-hop radio networks (SHRN) are a well studied abstraction of communication over a wireless channel. In this model, in every round, each of the n participating parties may decide to broadcast a message to all the others, potentially causing collisions. We consider the SHRN model in the presence of stochastic message drops (i.e., erasures ), where in every round, the message received by each party is erased (replaced by ⊥ ) with some small constant probability, independently. Our main result is a constant rate coding scheme , allowing one to run protocols designed to work over the (noiseless) SHRN model over the SHRN model with erasures. Our scheme converts any protocol Π of length at most exponential in n over the SHRN model to a protocol Π ′ that is resilient to constant fraction of erasures and has length linear in the length of Π. We mention that for the special case where the protocol Π is non-adaptive , i.e., the order of communication is fixed in advance, such a scheme was known. Nevertheless, adaptivity is widely used and is known to hugely boost the power of wireless channels, which makes handling the general case of adaptive protocols Π both important and more challenging. Indeed, to the best of our knowledge, our result is the first constant rate scheme that converts adaptive protocols to noise resilient ones in any multi-party model.
单跳无线网络(SHRN)是一种经过深入研究的无线信道通信抽象。在这个模型中,在每一轮中,n个参与方中的每一个都可能决定向所有其他参与方广播一条消息,这可能会导致冲突。我们考虑随机消息下降(即擦除)存在的SHRN模型,其中在每一轮中,每一方接收到的消息都以一些小的常数概率独立地被擦除(由⊥取代)。我们的主要结果是一个恒定速率的编码方案,允许一个人在(无噪声的)SHRN模型上运行协议,而不是带有擦除的SHRN模型。我们的方案将任何协议Π的长度在SHRN模型上最多为n的指数级转换为协议Π ',该协议对常数分数的擦除具有弹性,并且在Π的长度中具有线性长度。我们提到,对于协议Π是非自适应的特殊情况,即通信顺序是预先确定的,这种方案是已知的。然而,自适应被广泛使用,并且被认为极大地提高了无线信道的能力,这使得处理自适应协议Π的一般情况既重要又更具挑战性。事实上,据我们所知,我们的结果是第一个在任何多方模型中将自适应协议转换为噪声弹性协议的恒定速率方案。
{"title":"Protecting Single-Hop Radio Networks from Message Drops","authors":"K. Efremenko, Gillat Kol, Dmitry Paramonov, Raghuvansh R. Saxena","doi":"10.4230/LIPIcs.ICALP.2023.53","DOIUrl":"https://doi.org/10.4230/LIPIcs.ICALP.2023.53","url":null,"abstract":"Single-hop radio networks (SHRN) are a well studied abstraction of communication over a wireless channel. In this model, in every round, each of the n participating parties may decide to broadcast a message to all the others, potentially causing collisions. We consider the SHRN model in the presence of stochastic message drops (i.e., erasures ), where in every round, the message received by each party is erased (replaced by ⊥ ) with some small constant probability, independently. Our main result is a constant rate coding scheme , allowing one to run protocols designed to work over the (noiseless) SHRN model over the SHRN model with erasures. Our scheme converts any protocol Π of length at most exponential in n over the SHRN model to a protocol Π ′ that is resilient to constant fraction of erasures and has length linear in the length of Π. We mention that for the special case where the protocol Π is non-adaptive , i.e., the order of communication is fixed in advance, such a scheme was known. Nevertheless, adaptivity is widely used and is known to hugely boost the power of wireless channels, which makes handling the general case of adaptive protocols Π both important and more challenging. Indeed, to the best of our knowledge, our result is the first constant rate scheme that converts adaptive protocols to noise resilient ones in any multi-party model.","PeriodicalId":11639,"journal":{"name":"Electron. Colloquium Comput. Complex.","volume":"11 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74067993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Query Complexity of Search Problems 搜索问题的查询复杂度
Pub Date : 2023-01-01 DOI: 10.4230/LIPIcs.MFCS.2023.34
A. Chattopadhyay, Yogesh Dahiya, M. Mahajan
We relate various complexity measures like sensitivity, block sensitivity, certificate complexity for multi-output functions to the query complexities of such functions. Using these relations, we show that the deterministic query complexity of total search problems is at most the third power of its pseudo-deterministic query complexity. Previously, a fourth-power relation was shown by Goldreich, Goldwasser and Ron (ITCS’13). Furthermore, we improve the known separation between pseudo-deterministic and randomized decision tree size for total search problems in two ways: (1) we exhibit an exp( e Ω( n 1 / 4 )) separation for the SearchCNF relation for random k -CNFs. This seems to be the first exponential lower bound on the pseudo-deterministic size complexity of SearchCNF associated with random k -CNFs. (2) we exhibit an exp(Ω( n )) separation for the ApproxHamWt relation. The previous best known separation for any relation was exp(Ω( n 1 / 2 )). We also separate pseudo-determinism from randomness in And and ( And , Or ) decision trees, and determinism from pseudo-determinism in Parity decision trees. For a hypercube colouring problem, that was introduced by Goldwasswer, Impagliazzo, Pitassi and Santhanam (CCC’21) to analyze the pseudo-deterministic complexity of a complete problem in TFNP dt , we prove that either the monotone block-sensitivity or the anti-monotone block sensitivity is Ω( n 1 / 3 ); Goldwasser et al. showed an Ω( n 1 / 2 ) bound for general block-sensitivity.
我们将各种复杂性度量,如敏感性、块敏感性、多输出函数的证书复杂性与这些函数的查询复杂性联系起来。利用这些关系,我们证明了总搜索问题的确定性查询复杂度最多是其伪确定性查询复杂度的三次方。先前,Goldreich, Goldwasser和Ron (ITCS ' 13)证明了四次幂关系。此外,我们通过两种方式改进了已知的总搜索问题的伪确定性和随机决策树大小之间的分离:(1)我们展示了随机k - cnf的SearchCNF关系的exp(e Ω(n 1 / 4))分离。这似乎是与随机k - cnf相关的SearchCNF的伪确定性大小复杂度的第一个指数下界。(2)我们展示了近似hamwt关系的exp(Ω(n))分离。之前最著名的关系分离是exp(Ω(n 1 / 2))。我们还分离了And和(And, Or)决策树中的伪决定论和随机性,奇偶性决策树中的决定论和伪决定论。对于Goldwasswer, Impagliazzo, Pitassi和Santhanam (CCC ' 21)为分析TFNP dt中完全问题的伪确定性复杂性而引入的超立方体着色问题,证明了单调块灵敏度或反单调块灵敏度为Ω(n 1 / 3);Goldwasser等人显示了一般块敏感性的Ω(n 1 / 2)界限。
{"title":"Query Complexity of Search Problems","authors":"A. Chattopadhyay, Yogesh Dahiya, M. Mahajan","doi":"10.4230/LIPIcs.MFCS.2023.34","DOIUrl":"https://doi.org/10.4230/LIPIcs.MFCS.2023.34","url":null,"abstract":"We relate various complexity measures like sensitivity, block sensitivity, certificate complexity for multi-output functions to the query complexities of such functions. Using these relations, we show that the deterministic query complexity of total search problems is at most the third power of its pseudo-deterministic query complexity. Previously, a fourth-power relation was shown by Goldreich, Goldwasser and Ron (ITCS’13). Furthermore, we improve the known separation between pseudo-deterministic and randomized decision tree size for total search problems in two ways: (1) we exhibit an exp( e Ω( n 1 / 4 )) separation for the SearchCNF relation for random k -CNFs. This seems to be the first exponential lower bound on the pseudo-deterministic size complexity of SearchCNF associated with random k -CNFs. (2) we exhibit an exp(Ω( n )) separation for the ApproxHamWt relation. The previous best known separation for any relation was exp(Ω( n 1 / 2 )). We also separate pseudo-determinism from randomness in And and ( And , Or ) decision trees, and determinism from pseudo-determinism in Parity decision trees. For a hypercube colouring problem, that was introduced by Goldwasswer, Impagliazzo, Pitassi and Santhanam (CCC’21) to analyze the pseudo-deterministic complexity of a complete problem in TFNP dt , we prove that either the monotone block-sensitivity or the anti-monotone block sensitivity is Ω( n 1 / 3 ); Goldwasser et al. showed an Ω( n 1 / 2 ) bound for general block-sensitivity.","PeriodicalId":11639,"journal":{"name":"Electron. Colloquium Comput. Complex.","volume":"243 1","pages":"34:1-34:15"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80546754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
One-Tape Turing Machine and Branching Program Lower Bounds for MCSP 单带图灵机与MCSP的分支程序下界
Pub Date : 2022-12-27 DOI: 10.4230/LIPIcs.STACS.2021.23
Mahdi Cheraghchi, Shuichi Hirahara, Dimitrios Myrisiotis, Yuichi Yoshida
For a size parameter s : N → N, the Minimum Circuit Size Problem (denoted by MCSP[s(n)]) is the problem of deciding whether the minimum circuit size of a given function f : {0, 1} → {0, 1} (represented by a string of length N := 2) is at most a threshold s(n). A recent line of work exhibited “hardness magnification” phenomena for MCSP: A very weak lower bound for MCSP implies a breakthrough result in complexity theory. For example, McKay, Murray, and Williams (STOC 2019) implicitly showed that, for some constant μ1 > 0, if MCSP[2μ1·n] cannot be computed by a one-tape Turing machine (with an additional one-way read-only input tape) running in time N1.01, then P 6= NP. In this paper, we present the following new lower bounds against one-tape Turing machines and branching programs: 1. A randomized two-sided error one-tape Turing machine (with an additional one-way read-only input tape) cannot compute MCSP[2μ2·n] in time N1.99, for some constant μ2 > μ1. 2. A non-deterministic (or parity) branching program of size o(N1.5/ logN) cannot compute MKTP, which is a time-bounded Kolmogorov complexity analogue of MCSP. This is shown by directly applying the Nechiporuk method to MKTP, which previously appeared to be difficult. These results are the first non-trivial lower bounds for MCSP and MKTP against one-tape Turing machines and non-deterministic branching programs, and essentially match the best-known lower bounds for any explicit functions against these computational models. The first result is based on recent constructions of pseudorandom generators for read-once oblivious branching programs (ROBPs) and combinatorial rectangles (Forbes and Kelley, FOCS 2018; Viola 2019). En route, we obtain several related results: 1. There exists a (local) hitting set generator with seed length Õ( √ N) secure against read-once polynomial-size non-deterministic branching programs on N -bit inputs. 2. Any read-once co-non-deterministic branching program computing MCSP must have size at least 2Ω̃(N). 2012 ACM Subject Classification Theory of computation → Circuit complexity; Theory of computation → Pseudorandomness and derandomization
对于大小参数s: N→N,最小电路大小问题(用MCSP[s(N)]表示)是判断给定函数f:{0,1}→{0,1}(由长度N:= 2的字符串表示)的最小电路大小是否至多为阈值s(N)的问题。最近的一项研究显示了MCSP的“硬度放大”现象:MCSP的一个非常弱的下界意味着复杂性理论的一个突破性结果。例如,McKay, Murray, and Williams (STOC 2019)隐式地表明,对于某个常数μ1 > 0,如果运行在时间N1.01的单磁带图灵机(带有额外的单向只读输入磁带)无法计算MCSP[2μ1·n],则p6 = NP。本文给出了关于单带图灵机和分支程序的新的下界:随机双侧误差单带图灵机(外加一条单向只读输入带)无法在N1.99时间内计算MCSP[2μ2·n],且该时间为某常数μ2 bb0 μ1。2. 一个大小为0 (N1.5/ logN)的非确定性(或奇偶性)分支程序不能计算MKTP, MKTP是MCSP的一个有时间限制的Kolmogorov复杂度模拟。这可以通过直接将Nechiporuk方法应用于MKTP来证明,这在以前看来是很困难的。这些结果是针对单带图灵机和非确定性分支程序的MCSP和MKTP的第一个非平凡下界,并且基本上与针对这些计算模型的任何显式函数的最著名的下界相匹配。第一个结果是基于最近构建的用于读取一次无关分支程序(robp)和组合矩形的伪随机生成器(Forbes和Kelley, FOCS 2018;中提琴2019)。在此过程中,我们得到了几个相关的结果:1。存在一个(局部)命中集生成器,其种子长度为Õ(√N),可以防止在N位输入上读取一次多项式大小的不确定性分支程序。2. 任何计算MCSP的一次读非确定性分支程序的大小必须至少为2Ω (N)。2012 ACM学科分类:计算理论→电路复杂性;计算理论→伪随机和非随机化
{"title":"One-Tape Turing Machine and Branching Program Lower Bounds for MCSP","authors":"Mahdi Cheraghchi, Shuichi Hirahara, Dimitrios Myrisiotis, Yuichi Yoshida","doi":"10.4230/LIPIcs.STACS.2021.23","DOIUrl":"https://doi.org/10.4230/LIPIcs.STACS.2021.23","url":null,"abstract":"For a size parameter s : N → N, the Minimum Circuit Size Problem (denoted by MCSP[s(n)]) is the problem of deciding whether the minimum circuit size of a given function f : {0, 1} → {0, 1} (represented by a string of length N := 2) is at most a threshold s(n). A recent line of work exhibited “hardness magnification” phenomena for MCSP: A very weak lower bound for MCSP implies a breakthrough result in complexity theory. For example, McKay, Murray, and Williams (STOC 2019) implicitly showed that, for some constant μ1 > 0, if MCSP[2μ1·n] cannot be computed by a one-tape Turing machine (with an additional one-way read-only input tape) running in time N1.01, then P 6= NP. In this paper, we present the following new lower bounds against one-tape Turing machines and branching programs: 1. A randomized two-sided error one-tape Turing machine (with an additional one-way read-only input tape) cannot compute MCSP[2μ2·n] in time N1.99, for some constant μ2 > μ1. 2. A non-deterministic (or parity) branching program of size o(N1.5/ logN) cannot compute MKTP, which is a time-bounded Kolmogorov complexity analogue of MCSP. This is shown by directly applying the Nechiporuk method to MKTP, which previously appeared to be difficult. These results are the first non-trivial lower bounds for MCSP and MKTP against one-tape Turing machines and non-deterministic branching programs, and essentially match the best-known lower bounds for any explicit functions against these computational models. The first result is based on recent constructions of pseudorandom generators for read-once oblivious branching programs (ROBPs) and combinatorial rectangles (Forbes and Kelley, FOCS 2018; Viola 2019). En route, we obtain several related results: 1. There exists a (local) hitting set generator with seed length Õ( √ N) secure against read-once polynomial-size non-deterministic branching programs on N -bit inputs. 2. Any read-once co-non-deterministic branching program computing MCSP must have size at least 2Ω̃(N). 2012 ACM Subject Classification Theory of computation → Circuit complexity; Theory of computation → Pseudorandomness and derandomization","PeriodicalId":11639,"journal":{"name":"Electron. Colloquium Comput. Complex.","volume":"101 1","pages":"23:1-23:19"},"PeriodicalIF":0.0,"publicationDate":"2022-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75169395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
On linear-algebraic notions of expansion 关于线性代数展开式的概念
Pub Date : 2022-12-26 DOI: 10.48550/arXiv.2212.13154
Yinan Li, Y. Qiao, A. Wigderson, Yuval Wigderson, Chuan-Hai Zhang
A fundamental fact about bounded-degree graph expanders is that three notions of expansion -- vertex expansion, edge expansion, and spectral expansion -- are all equivalent. In this paper, we study to what extent such a statement is true for linear-algebraic notions of expansion. There are two well-studied notions of linear-algebraic expansion, namely dimension expansion (defined in analogy to graph vertex expansion) and quantum expansion (defined in analogy to graph spectral expansion). Lubotzky and Zelmanov proved that the latter implies the former. We prove that the converse is false: there are dimension expanders which are not quantum expanders. Moreover, this asymmetry is explained by the fact that there are two distinct linear-algebraic analogues of graph edge expansion. The first of these is quantum edge expansion, which was introduced by Hastings, and which he proved to be equivalent to quantum expansion. We introduce a new notion, termed dimension edge expansion, which we prove is equivalent to dimension expansion and which is implied by quantum edge expansion. Thus, the separation above is implied by a finer one: dimension edge expansion is strictly weaker than quantum edge expansion. This new notion also leads to a new, more modular proof of the Lubotzky--Zelmanov result that quantum expanders are dimension expanders.
关于有界度图展开器的一个基本事实是,展开的三个概念——顶点展开、边缘展开和谱展开——都是等价的。在本文中,我们研究了这种说法在多大程度上对线性代数展开式的概念是正确的。线性代数展开有两个被广泛研究的概念,即维度展开(类似于图顶点展开)和量子展开(类似于图谱展开)。Lubotzky和Zelmanov证明了后者暗示了前者。我们证明了相反的命题是错误的:存在不是量子膨胀的维度膨胀器。此外,这种不对称性可以用图边展开的两个不同的线性代数类似物来解释。第一个是量子边缘膨胀,这是由黑斯廷斯提出的,他证明了它等同于量子膨胀。我们引入了一个新的概念,称为维度边缘展开,我们证明了它等价于维度展开,并隐含在量子边缘展开中。因此,上面的分离是由一个更精细的分离隐含的:维度边缘膨胀严格弱于量子边缘膨胀。这个新概念也导致了一个新的,更模块化的鲁博茨基-泽尔马诺夫结果的证明,即量子膨胀器是维度膨胀器。
{"title":"On linear-algebraic notions of expansion","authors":"Yinan Li, Y. Qiao, A. Wigderson, Yuval Wigderson, Chuan-Hai Zhang","doi":"10.48550/arXiv.2212.13154","DOIUrl":"https://doi.org/10.48550/arXiv.2212.13154","url":null,"abstract":"A fundamental fact about bounded-degree graph expanders is that three notions of expansion -- vertex expansion, edge expansion, and spectral expansion -- are all equivalent. In this paper, we study to what extent such a statement is true for linear-algebraic notions of expansion. There are two well-studied notions of linear-algebraic expansion, namely dimension expansion (defined in analogy to graph vertex expansion) and quantum expansion (defined in analogy to graph spectral expansion). Lubotzky and Zelmanov proved that the latter implies the former. We prove that the converse is false: there are dimension expanders which are not quantum expanders. Moreover, this asymmetry is explained by the fact that there are two distinct linear-algebraic analogues of graph edge expansion. The first of these is quantum edge expansion, which was introduced by Hastings, and which he proved to be equivalent to quantum expansion. We introduce a new notion, termed dimension edge expansion, which we prove is equivalent to dimension expansion and which is implied by quantum edge expansion. Thus, the separation above is implied by a finer one: dimension edge expansion is strictly weaker than quantum edge expansion. This new notion also leads to a new, more modular proof of the Lubotzky--Zelmanov result that quantum expanders are dimension expanders.","PeriodicalId":11639,"journal":{"name":"Electron. Colloquium Comput. Complex.","volume":"9 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90454013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Criticality of AC0 formulae AC0公式的临界性
Pub Date : 2022-12-16 DOI: 10.48550/arXiv.2212.08397
P. Harsha, Tulasimohan Molli, Ashutosh Shankar
Rossman [In $textit{Proc. $34$th Comput. Complexity Conf.}$, 2019] introduced the notion of $textit{criticality}$. The criticality of a Boolean function $f : {0,1}^n to {0,1}$ is the minimum $lambda geq 1$ such that for all positive integers $t$, [ Pr_{rho sim mathcal{R}_p}left[text{DT}_{text{depth}}(f|_{rho}) geq tright] leq (plambda)^t. ] H"astad's celebrated switching lemma shows that the criticality of any $k$-DNF is at most $O(k)$. Subsequent improvements to correlation bounds of $text{AC}^0$-circuits against parity showed that the criticality of any $text{AC}^0$-$textit{circuit}$ of size $S$ and depth $d+1$ is at most $O(log S)^d$ and any $textit{regular}$ $text{AC}^0$-$textit{formula}$ of size $S$ and depth $d+1$ is at most $Oleft(frac1d cdot log Sright)^d$. We strengthen these results by showing that the criticality of $textit{any}$ $text{AC}^0$-formula (not necessarily regular) of size $S$ and depth $d+1$ is at most $Oleft(frac1dcdot {log S}right)^d$, resolving a conjecture due to Rossman. This result also implies Rossman's optimal lower bound on the size of any depth-$d$ $text{AC}^0$-formula computing parity [$textit{Comput. Complexity, 27(2):209--223, 2018.}$]. Our result implies tight correlation bounds against parity, tight Fourier concentration results and improved $#$SAT algorithm for $text{AC}^0$-formulae.
Rossman[在$textit{Proc. $ 34 $th Comput. Complexity Conf.}$, 2019]介绍了$textit{criticality}$的概念。一个布尔函数$f : {0,1}^n to {0,1}$的临界值是最小的$lambda geq 1$,使得对于所有正整数$t$, [ Pr_{rho sim mathcal{R}_p}left[text{DT}_{text{depth}}(f|_{rho}) geq tright] leq (plambda)^t. ] Hästad著名的转换引理表明任何$k$ -DNF的临界值最多为$O(k)$。随后对$text{AC}^0$ -电路的奇偶性相关界的改进表明,$S$和深度$d+1$的任何$text{AC}^0$ - $textit{circuit}$的临界值最多为$O(log S)^d$, $S$和深度$d+1$的任何$textit{regular}$ - $text{AC}^0$ - $textit{formula}$的临界值最多为$Oleft(frac1d cdot log Sright)^d$。我们通过表明尺寸$S$和深度$d+1$的$textit{any}$$text{AC}^0$公式(不一定是规则的)的临界性最多为$Oleft(frac1dcdot {log S}right)^d$来加强这些结果,解决了由Rossman引起的猜想。这个结果也暗示了Rossman对任何深度大小的最优下界- $d$$text{AC}^0$ -公式计算奇偶校验[$textit{Comput. Complexity, 27(2):209--223, 2018.}$]。我们的结果意味着对宇称的紧密相关界限,紧密的傅立叶浓度结果和$text{AC}^0$ -公式的改进$#$ SAT算法。
{"title":"Criticality of AC0 formulae","authors":"P. Harsha, Tulasimohan Molli, Ashutosh Shankar","doi":"10.48550/arXiv.2212.08397","DOIUrl":"https://doi.org/10.48550/arXiv.2212.08397","url":null,"abstract":"Rossman [In $textit{Proc. $34$th Comput. Complexity Conf.}$, 2019] introduced the notion of $textit{criticality}$. The criticality of a Boolean function $f : {0,1}^n to {0,1}$ is the minimum $lambda geq 1$ such that for all positive integers $t$, [ Pr_{rho sim mathcal{R}_p}left[text{DT}_{text{depth}}(f|_{rho}) geq tright] leq (plambda)^t. ] H\"astad's celebrated switching lemma shows that the criticality of any $k$-DNF is at most $O(k)$. Subsequent improvements to correlation bounds of $text{AC}^0$-circuits against parity showed that the criticality of any $text{AC}^0$-$textit{circuit}$ of size $S$ and depth $d+1$ is at most $O(log S)^d$ and any $textit{regular}$ $text{AC}^0$-$textit{formula}$ of size $S$ and depth $d+1$ is at most $Oleft(frac1d cdot log Sright)^d$. We strengthen these results by showing that the criticality of $textit{any}$ $text{AC}^0$-formula (not necessarily regular) of size $S$ and depth $d+1$ is at most $Oleft(frac1dcdot {log S}right)^d$, resolving a conjecture due to Rossman. This result also implies Rossman's optimal lower bound on the size of any depth-$d$ $text{AC}^0$-formula computing parity [$textit{Comput. Complexity, 27(2):209--223, 2018.}$]. Our result implies tight correlation bounds against parity, tight Fourier concentration results and improved $#$SAT algorithm for $text{AC}^0$-formulae.","PeriodicalId":11639,"journal":{"name":"Electron. Colloquium Comput. Complex.","volume":"44 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82876074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantum Worst-Case to Average-Case Reductions for All Linear Problems 所有线性问题的量子最坏情况到平均情况约简
Pub Date : 2022-12-06 DOI: 10.48550/arXiv.2212.03348
Vahid R. Asadi, Alexander Golovnev, Tom Gur, Igor Shinkar, Sathyawageeswar Subramanian
We study the problem of designing worst-case to average-case reductions for quantum algorithms. For all linear problems, we provide an explicit and efficient transformation of quantum algorithms that are only correct on a small (even sub-constant) fraction of their inputs into ones that are correct on all inputs. This stands in contrast to the classical setting, where such results are only known for a small number of specific problems or restricted computational models. En route, we obtain a tight $Omega(n^2)$ lower bound on the average-case quantum query complexity of the Matrix-Vector Multiplication problem. Our techniques strengthen and generalise the recently introduced additive combinatorics framework for classical worst-case to average-case reductions (STOC 2022) to the quantum setting. We rely on quantum singular value transformations to construct quantum algorithms for linear verification in superposition and learning Bogolyubov subspaces from noisy quantum oracles. We use these tools to prove a quantum local correction lemma, which lies at the heart of our reductions, based on a noise-robust probabilistic generalisation of Bogolyubov's lemma from additive combinatorics.
我们研究了设计量子算法的最坏情况到平均情况约简的问题。对于所有线性问题,我们提供了一种明确而有效的量子算法转换,将其仅在其输入的一小部分(甚至次常数)上正确转换为在所有输入上正确的量子算法。这与经典设置形成对比,在经典设置中,只有少数特定问题或受限制的计算模型才知道这样的结果。在此过程中,我们获得了矩阵-向量乘法问题的平均情况量子查询复杂度的紧$Omega(n^2)$下界。我们的技术加强并推广了最近引入的用于经典最坏情况到平均情况约简(STOC 2022)的加性组合框架到量子设置。我们依靠量子奇异值变换来构建量子算法用于叠加中的线性验证和从噪声量子预言学习Bogolyubov子空间。我们使用这些工具来证明一个量子局部校正引理,这是我们约简的核心,基于来自加性组合学的Bogolyubov引理的噪声鲁棒概率推广。
{"title":"Quantum Worst-Case to Average-Case Reductions for All Linear Problems","authors":"Vahid R. Asadi, Alexander Golovnev, Tom Gur, Igor Shinkar, Sathyawageeswar Subramanian","doi":"10.48550/arXiv.2212.03348","DOIUrl":"https://doi.org/10.48550/arXiv.2212.03348","url":null,"abstract":"We study the problem of designing worst-case to average-case reductions for quantum algorithms. For all linear problems, we provide an explicit and efficient transformation of quantum algorithms that are only correct on a small (even sub-constant) fraction of their inputs into ones that are correct on all inputs. This stands in contrast to the classical setting, where such results are only known for a small number of specific problems or restricted computational models. En route, we obtain a tight $Omega(n^2)$ lower bound on the average-case quantum query complexity of the Matrix-Vector Multiplication problem. Our techniques strengthen and generalise the recently introduced additive combinatorics framework for classical worst-case to average-case reductions (STOC 2022) to the quantum setting. We rely on quantum singular value transformations to construct quantum algorithms for linear verification in superposition and learning Bogolyubov subspaces from noisy quantum oracles. We use these tools to prove a quantum local correction lemma, which lies at the heart of our reductions, based on a noise-robust probabilistic generalisation of Bogolyubov's lemma from additive combinatorics.","PeriodicalId":11639,"journal":{"name":"Electron. Colloquium Comput. Complex.","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72844546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Electron. Colloquium Comput. Complex.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1