首页 > 最新文献

ACM Transactions on Algorithms (TALG)最新文献

英文 中文
Generic Techniques for Building Top-k Structures 构建Top-k结构的通用技术
Pub Date : 2022-10-10 DOI: 10.1145/3546074
S. Rahul, Yufei Tao
A reporting query returns the objects satisfying a predicate q from an input set. In prioritized reporting, each object carries a real-valued weight (which can be query dependent), and a query returns the objects that satisfy q and have weights at least a threshold τ. A top-k query finds, among all the objects satisfying q, the k ones of the largest weights; a max query is a special instance with k = 1. We want to design data structures of small space to support queries (and possibly updates) efficiently. Previous work has shown that a top-k structure can also support max and prioritized queries with no performance deterioration. This article explores the opposite direction: do prioritized queries, possibly combined with max queries, imply top-k search? Subject to mild conditions, we provide affirmative answers with two reduction techniques. The first converts a prioritized structure into a static top-k structure with the same space complexity and only a logarithmic blowup in query time. If a max structure is available in addition, our second reduction yields a top-k structure with no degradation in expected performance (this holds for the space, query, and update complexities). Our techniques significantly simplify the design of top-k structures because structures for max and prioritized queries are often easier to obtain. We demonstrate this by developing top-k structures for interval stabbing, 3D dominance, halfspace reporting, linear ranking, and L∞ nearest neighbor search in the RAM and the external memory computation models.
报告查询从输入集中返回满足谓词q的对象。在优先级报告中,每个对象都带有实值权重(可以与查询相关),查询返回满足q且权重至少为阈值τ的对象。top-k查询在所有满足q的对象中,找出k个权值最大的对象;Max查询是k = 1的特殊实例。我们希望设计小空间的数据结构来有效地支持查询(和可能的更新)。以前的工作表明,top-k结构也可以支持最大和优先级查询,而不会导致性能下降。本文探讨了相反的方向:优先查询(可能与max查询结合使用)是否意味着top-k搜索?在温和的条件下,我们用两种还原技术给出肯定的答案。第一种方法将优先级结构转换为具有相同空间复杂度的静态top-k结构,并且查询时间只有对数级增长。如果还有一个max结构可用,我们的第二次缩减会产生top-k结构,而不会降低预期性能(这适用于空间、查询和更新复杂性)。我们的技术极大地简化了top-k结构的设计,因为用于最大和优先级查询的结构通常更容易获得。我们通过在RAM和外部存储器计算模型中开发用于区间刺入、3D优势、半空间报告、线性排序和L∞最近邻搜索的top-k结构来证明这一点。
{"title":"Generic Techniques for Building Top-k Structures","authors":"S. Rahul, Yufei Tao","doi":"10.1145/3546074","DOIUrl":"https://doi.org/10.1145/3546074","url":null,"abstract":"A reporting query returns the objects satisfying a predicate q from an input set. In prioritized reporting, each object carries a real-valued weight (which can be query dependent), and a query returns the objects that satisfy q and have weights at least a threshold τ. A top-k query finds, among all the objects satisfying q, the k ones of the largest weights; a max query is a special instance with k = 1. We want to design data structures of small space to support queries (and possibly updates) efficiently. Previous work has shown that a top-k structure can also support max and prioritized queries with no performance deterioration. This article explores the opposite direction: do prioritized queries, possibly combined with max queries, imply top-k search? Subject to mild conditions, we provide affirmative answers with two reduction techniques. The first converts a prioritized structure into a static top-k structure with the same space complexity and only a logarithmic blowup in query time. If a max structure is available in addition, our second reduction yields a top-k structure with no degradation in expected performance (this holds for the space, query, and update complexities). Our techniques significantly simplify the design of top-k structures because structures for max and prioritized queries are often easier to obtain. We demonstrate this by developing top-k structures for interval stabbing, 3D dominance, halfspace reporting, linear ranking, and L∞ nearest neighbor search in the RAM and the external memory computation models.","PeriodicalId":154047,"journal":{"name":"ACM Transactions on Algorithms (TALG)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131619578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deterministic Leader Election in Anonymous Radio Networks 匿名无线网络中的确定性领导人选举
Pub Date : 2022-03-26 DOI: 10.1145/3527171
Avery Miller, A. Pelc, R. Yadav
Leader election is a fundamental task in distributed computing. It is a symmetry breaking problem, calling for one node of the network to become the leader, and for all other nodes to become non-leaders. We consider leader election in anonymous radio networks modeled as simple undirected connected graphs. Nodes communicate in synchronous rounds. In each round, a node can either transmit a message to all its neighbours, or stay silent and listen. A node v hears a message from a neighbour w in a given round if v listens in this round and if w is its only neighbour transmitting in this round. If v listens in a round in which more than one neighbour transmits, then v hears noise that is different from any message and different from silence. We assume that nodes are identical (anonymous) and execute the same deterministic algorithm. Under this scenario, symmetry can be broken only in one way: by different wake-up times of the nodes. In which situations is it possible to break symmetry and elect a leader using time as symmetry breaker? In order to answer this question, we consider configurations. A configuration is the underlying graph with nodes tagged by non-negative integers with the following meaning. A node can either wake up spontaneously in the round shown on its tag, according to some global clock, or can be woken up hearing a message sent by one of its already awoken neighbours. The local clock of a node starts at its wakeup and nodes do not have access to the global clock determining their tags. A configuration is feasible if there exists a distributed algorithm that elects a leader for this configuration. Our main result is a complete algorithmic characterization of feasible configurations. More precisely, we design a centralized decision algorithm, working in polynomial time, whose input is a configuration and which decides if the configuration is feasible. Using this algorithm we also provide a dedicated deterministic distributed leader election algorithm for each feasible configuration that elects a leader for this configuration in time O(n2σ, where n is the number of nodes and σ is the difference between the largest and smallest tag of the configuration. We then ask the question whether there exists a universal deterministic distributed algorithm electing a leader for all feasible configurations. The answer turns out to be no, and we show that such a universal algorithm cannot exist even for the class of 4-node feasible configurations. We also prove that a distributed version of our decision algorithm cannot exist.
Leader选举是分布式计算的一项基本任务。这是一个对称破缺问题,要求网络中的一个节点成为领导节点,而所有其他节点都成为非领导节点。我们将匿名无线网络中的领导人选举建模为简单无向连接图。节点以同步轮进行通信。在每一轮中,一个节点可以向其所有邻居发送消息,也可以保持沉默并听取消息。如果节点v在此轮中侦听,并且w是其在此轮中唯一发送消息的邻居,则节点v在给定的轮中收到来自邻居w的消息。如果v在不止一个邻居发送的一轮中监听,那么v听到的噪音不同于任何消息,也不同于沉默。我们假设节点是相同的(匿名的),并执行相同的确定性算法。在这种情况下,对称性只能以一种方式被打破:节点的不同唤醒时间。在什么情况下可以打破对称,用时间作为对称破坏者来选举领导者?为了回答这个问题,我们考虑配置。配置是底层图,其节点用非负整数标记,具有以下含义。根据某种全局时钟,一个节点可以在其标签上显示的回合中自发醒来,也可以在听到已被唤醒的邻居发送的消息后被唤醒。节点的本地时钟在其唤醒时开始,节点无法访问确定其标记的全局时钟。如果存在为该配置选择领导者的分布式算法,则该配置是可行的。我们的主要结果是一个完整的算法表征可行的配置。更准确地说,我们设计了一个集中决策算法,在多项式时间内工作,其输入是一个配置,并决定该配置是否可行。利用该算法,我们还为每个可行配置提供了一个专用的确定性分布式领导者选举算法,该算法在O(n2) σ时间内为该配置选出一个领导者,其中n为节点数,σ为该配置的最大和最小标签之差。然后,我们提出了一个问题,即是否存在一个通用的确定性分布式算法,为所有可行的配置选择一个领导者。答案是否定的,并且我们证明了即使对于4节点可行配置类,也不存在这样的通用算法。我们还证明了我们的决策算法的分布式版本不可能存在。
{"title":"Deterministic Leader Election in Anonymous Radio Networks","authors":"Avery Miller, A. Pelc, R. Yadav","doi":"10.1145/3527171","DOIUrl":"https://doi.org/10.1145/3527171","url":null,"abstract":"Leader election is a fundamental task in distributed computing. It is a symmetry breaking problem, calling for one node of the network to become the leader, and for all other nodes to become non-leaders. We consider leader election in anonymous radio networks modeled as simple undirected connected graphs. Nodes communicate in synchronous rounds. In each round, a node can either transmit a message to all its neighbours, or stay silent and listen. A node v hears a message from a neighbour w in a given round if v listens in this round and if w is its only neighbour transmitting in this round. If v listens in a round in which more than one neighbour transmits, then v hears noise that is different from any message and different from silence. We assume that nodes are identical (anonymous) and execute the same deterministic algorithm. Under this scenario, symmetry can be broken only in one way: by different wake-up times of the nodes. In which situations is it possible to break symmetry and elect a leader using time as symmetry breaker? In order to answer this question, we consider configurations. A configuration is the underlying graph with nodes tagged by non-negative integers with the following meaning. A node can either wake up spontaneously in the round shown on its tag, according to some global clock, or can be woken up hearing a message sent by one of its already awoken neighbours. The local clock of a node starts at its wakeup and nodes do not have access to the global clock determining their tags. A configuration is feasible if there exists a distributed algorithm that elects a leader for this configuration. Our main result is a complete algorithmic characterization of feasible configurations. More precisely, we design a centralized decision algorithm, working in polynomial time, whose input is a configuration and which decides if the configuration is feasible. Using this algorithm we also provide a dedicated deterministic distributed leader election algorithm for each feasible configuration that elects a leader for this configuration in time O(n2σ, where n is the number of nodes and σ is the difference between the largest and smallest tag of the configuration. We then ask the question whether there exists a universal deterministic distributed algorithm electing a leader for all feasible configurations. The answer turns out to be no, and we show that such a universal algorithm cannot exist even for the class of 4-node feasible configurations. We also prove that a distributed version of our decision algorithm cannot exist.","PeriodicalId":154047,"journal":{"name":"ACM Transactions on Algorithms (TALG)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132302353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Learned Approach to Design Compressed Rank/Select Data Structures 设计压缩排名/选择数据结构的学习方法
Pub Date : 2022-03-17 DOI: 10.1145/3524060
A. Boffa, P. Ferragina, Giorgio Vinciguerra
We address the problem of designing, implementing, and experimenting with compressed data structures that support rank and select queries over a dictionary of integers. We shine a new light on this classical problem by showing a connection between the input integers and the geometry of a set of points in a Cartesian plane suitably derived from them. We then build upon some results in computational geometry to introduce the first compressed rank/select dictionary based on the idea of “learning” the distribution of such points via proper linear approximations (LA). We therefore call this novel data structure the la_vector. We prove time and space complexities of the la_vector in several scenarios: in the worst case, in the case of input distributions with finite mean and variance, and taking into account the kth order entropy of some of its building blocks. We also discuss improved hybrid data structures, namely, ones that suitably orchestrate known compressed rank/select dictionaries with the la_vector. We corroborate our theoretical results with a large set of experiments over datasets originating from a variety of applications (Web search, DNA sequencing, information retrieval, and natural language processing) and show that our approach provides new interesting space-time tradeoffs with respect to many well-established compressed rank/select dictionary implementations. In particular, we show that our select is the fastest, and our rank is on the space-time Pareto frontier.
我们解决了设计、实现和实验压缩数据结构的问题,这些压缩数据结构支持对整数字典的排序和选择查询。我们通过展示输入整数与笛卡尔平面上由它们适当导出的一组点的几何形状之间的联系,为这个经典问题提供了新的思路。然后,我们以计算几何中的一些结果为基础,引入了基于“学习”这些点的分布(通过适当的线性近似(LA))的思想的第一个压缩秩/选择字典。因此,我们称这种新的数据结构为la_vector。我们在几种情况下证明了la_vector的时间和空间复杂性:在最坏的情况下,在具有有限均值和方差的输入分布的情况下,并考虑到它的一些构建块的k阶熵。我们还讨论了改进的混合数据结构,即使用la_vector适当地编排已知压缩排名/选择字典的混合数据结构。我们通过对来自各种应用程序(Web搜索、DNA测序、信息检索和自然语言处理)的数据集进行的大量实验来证实我们的理论结果,并表明我们的方法提供了关于许多已建立的压缩排名/选择字典实现的新的有趣的时空权衡。特别地,我们证明了我们的选择是最快的,我们的秩在时空帕累托边界上。
{"title":"A Learned Approach to Design Compressed Rank/Select Data Structures","authors":"A. Boffa, P. Ferragina, Giorgio Vinciguerra","doi":"10.1145/3524060","DOIUrl":"https://doi.org/10.1145/3524060","url":null,"abstract":"We address the problem of designing, implementing, and experimenting with compressed data structures that support rank and select queries over a dictionary of integers. We shine a new light on this classical problem by showing a connection between the input integers and the geometry of a set of points in a Cartesian plane suitably derived from them. We then build upon some results in computational geometry to introduce the first compressed rank/select dictionary based on the idea of “learning” the distribution of such points via proper linear approximations (LA). We therefore call this novel data structure the la_vector. We prove time and space complexities of the la_vector in several scenarios: in the worst case, in the case of input distributions with finite mean and variance, and taking into account the kth order entropy of some of its building blocks. We also discuss improved hybrid data structures, namely, ones that suitably orchestrate known compressed rank/select dictionaries with the la_vector. We corroborate our theoretical results with a large set of experiments over datasets originating from a variety of applications (Web search, DNA sequencing, information retrieval, and natural language processing) and show that our approach provides new interesting space-time tradeoffs with respect to many well-established compressed rank/select dictionary implementations. In particular, we show that our select is the fastest, and our rank is on the space-time Pareto frontier.","PeriodicalId":154047,"journal":{"name":"ACM Transactions on Algorithms (TALG)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126545265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
k-apices of Minor-closed Graph Classes. II. Parameterized Algorithms 小闭图类的k-顶点。2参数化算法
Pub Date : 2022-03-07 DOI: 10.1145/3519028
Ignasi Sau, Giannos Stamoulis, D. Thilikos
Let 𝒢 be a minor-closed graph class. We say that a graph G is a k-apex of 𝒢 if G contains a set S of at most k vertices such that GS belongs to 𝒢. We denote by 𝒜k (𝒢) the set of all graphs that are k-apices of 𝒢. In the first paper of this series, we obtained upper bounds on the size of the graphs in the minor-obstruction set of 𝒜k (𝒢), i.e., the minor-minimal set of graphs not belonging to 𝒜k (𝒢). In this article, we provide an algorithm that, given a graph G on n vertices, runs in time 2poly(k) ⋅ n3 and either returns a set S certifying that G ∈ 𝒜k (𝒢), or reports that G ∉ 𝒜k (𝒢). Here poly is a polynomial function whose degree depends on the maximum size of a minor-obstruction of 𝒢. In the special case where 𝒢 excludes some apex graph as a minor, we give an alternative algorithm running in 2poly(k) ⋅ n2-time.
设𝒢是一个小闭图类。我们说一个图G是𝒢的k顶点,如果G包含一个集合S,它最多有k个顶点,使得GS属于𝒢。我们用𝒜k(𝒢)表示为𝒢的k顶点的所有图的集合。在本系列的第一篇论文中,我们得到了𝒜k(𝒢)的小阻塞集,即不属于𝒜k(𝒢)的图的小最小集的图的大小的上界。在本文中,我们提供了一个算法,给定n个顶点上的图G,在2poly(k)⋅n3时间内运行,并且返回一个集S证明G∈𝒜k(𝒢),或者报告G∈𝒜k(𝒢)。这里poly是一个多项式函数,其程度取决于𝒢的小阻塞的最大尺寸。在特殊情况下,𝒢排除了一些顶点图作为次要图,我们给出了一个在2poly(k)⋅n2-time内运行的替代算法。
{"title":"k-apices of Minor-closed Graph Classes. II. Parameterized Algorithms","authors":"Ignasi Sau, Giannos Stamoulis, D. Thilikos","doi":"10.1145/3519028","DOIUrl":"https://doi.org/10.1145/3519028","url":null,"abstract":"Let 𝒢 be a minor-closed graph class. We say that a graph G is a k-apex of 𝒢 if G contains a set S of at most k vertices such that GS belongs to 𝒢. We denote by 𝒜k (𝒢) the set of all graphs that are k-apices of 𝒢. In the first paper of this series, we obtained upper bounds on the size of the graphs in the minor-obstruction set of 𝒜k (𝒢), i.e., the minor-minimal set of graphs not belonging to 𝒜k (𝒢). In this article, we provide an algorithm that, given a graph G on n vertices, runs in time 2poly(k) ⋅ n3 and either returns a set S certifying that G ∈ 𝒜k (𝒢), or reports that G ∉ 𝒜k (𝒢). Here poly is a polynomial function whose degree depends on the maximum size of a minor-obstruction of 𝒢. In the special case where 𝒢 excludes some apex graph as a minor, we give an alternative algorithm running in 2poly(k) ⋅ n2-time.","PeriodicalId":154047,"journal":{"name":"ACM Transactions on Algorithms (TALG)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127321977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Fully Dynamic (Δ +1)-Coloring in O(1) Update Time 完全动态(Δ +1)-在0(1)更新时间着色
Pub Date : 2022-03-04 DOI: 10.1145/3494539
Sayan Bhattacharya, F. Grandoni, Janardhan Kulkarni, Quanquan C. Liu, Shay Solomon
The problem of (Δ +1)-vertex coloring a graph of maximum degree Δ has been extremely well studied over the years in various settings and models. Surprisingly, for the dynamic setting, almost nothing was known until recently. In SODA’18, Bhattacharya, Chakrabarty, Henzinger and Nanongkai devised a randomized algorithm for maintaining a (Δ +1)-coloring with O(log Δ) expected amortized update time. In this article, we present an improved randomized algorithm for (Δ +1)-coloring that achieves O(1) amortized update time and show that this bound holds not only in expectation but also with high probability. Our starting point is the state-of-the-art randomized algorithm for maintaining a maximal matching (Solomon, FOCS’16). We carefully build on the approach of Solomon, but, due to inherent differences between the maximal matching and (Δ +1)-coloring problems, we need to deviate significantly from it in several crucial and highly nontrivial points.1
(Δ +1)顶点对最大度Δ图的着色问题已经在各种设置和模型中得到了很好的研究。令人惊讶的是,直到最近,人们对动态环境几乎一无所知。在SODA’18中,Bhattacharya, Chakrabarty, Henzinger和Nanongkai设计了一种随机算法,用于维持(Δ +1)着色,期望平摊更新时间为O(log Δ)。本文提出了一种改进的(Δ +1)-着色的随机化算法,该算法实现了O(1)的平摊更新时间,并证明了该界不仅在期望上成立,而且具有高概率。我们的出发点是维持最大匹配的最先进的随机算法(Solomon, FOCS ' 16)。我们谨慎地建立在Solomon方法的基础上,但是,由于最大匹配和(Δ +1)-着色问题之间的内在差异,我们需要在几个关键和高度不平凡的点上明显偏离它
{"title":"Fully Dynamic (Δ +1)-Coloring in O(1) Update Time","authors":"Sayan Bhattacharya, F. Grandoni, Janardhan Kulkarni, Quanquan C. Liu, Shay Solomon","doi":"10.1145/3494539","DOIUrl":"https://doi.org/10.1145/3494539","url":null,"abstract":"The problem of (Δ +1)-vertex coloring a graph of maximum degree Δ has been extremely well studied over the years in various settings and models. Surprisingly, for the dynamic setting, almost nothing was known until recently. In SODA’18, Bhattacharya, Chakrabarty, Henzinger and Nanongkai devised a randomized algorithm for maintaining a (Δ +1)-coloring with O(log Δ) expected amortized update time. In this article, we present an improved randomized algorithm for (Δ +1)-coloring that achieves O(1) amortized update time and show that this bound holds not only in expectation but also with high probability. Our starting point is the state-of-the-art randomized algorithm for maintaining a maximal matching (Solomon, FOCS’16). We carefully build on the approach of Solomon, but, due to inherent differences between the maximal matching and (Δ +1)-coloring problems, we need to deviate significantly from it in several crucial and highly nontrivial points.1","PeriodicalId":154047,"journal":{"name":"ACM Transactions on Algorithms (TALG)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116454697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Quasipolynomial Multicut-mimicking Networks and Kernels for Multiway Cut Problems 多路切割问题的拟多项式多路模拟网络和核
Pub Date : 2022-03-04 DOI: 10.1145/3501304
Magnus Wahlström
We show the existence of an exact mimicking network of kO(log k) edges for minimum multicuts over a set of terminals in an undirected graph, where k is the total capacity of the terminals, i.e., the sum of the degrees of the terminal vertices. Furthermore, using the best available approximation algorithm for Small Set Expansion, we show that a mimicking network of kO(log3 k) edges can be computed in randomized polynomial time. As a consequence, we show quasipolynomial kernels for several problems, including Edge Multiway Cut, Group Feedback Edge Set for an arbitrary group, and Edge Multicut parameterized by the solution size and the number of cut requests. The result combines the matroid-based irrelevant edge approach used in the kernel for s-Multiway Cut with a recursive decomposition and sparsification of the graph along sparse cuts. This is the first progress on the kernelization of Multiway Cut problems since the kernel for s-Multiway Cut for constant value of s (Kratsch and Wahlström, FOCS 2012).
我们证明了无向图中一组终端上的最小多截点的精确模拟网络存在kO(log k)条边,其中k是终端的总容量,即终端顶点的度之和。此外,利用小集展开的最佳逼近算法,我们证明了kO(log3k)条边的模拟网络可以在随机多项式时间内计算出来。因此,我们展示了几个问题的拟多项式核,包括边缘多路切割,任意组的组反馈边缘集,以及由解决方案大小和切割请求数量参数化的边缘多路切割。该结果结合了s-多路切割核中使用的基于矩阵的不相关边缘方法,以及沿着稀疏切割的图的递归分解和稀疏化。这是自s-Multiway Cut (s为定值)的核以来,多路切割问题核化的第一个进展(Kratsch and Wahlström, FOCS 2012)。
{"title":"Quasipolynomial Multicut-mimicking Networks and Kernels for Multiway Cut Problems","authors":"Magnus Wahlström","doi":"10.1145/3501304","DOIUrl":"https://doi.org/10.1145/3501304","url":null,"abstract":"We show the existence of an exact mimicking network of kO(log k) edges for minimum multicuts over a set of terminals in an undirected graph, where k is the total capacity of the terminals, i.e., the sum of the degrees of the terminal vertices. Furthermore, using the best available approximation algorithm for Small Set Expansion, we show that a mimicking network of kO(log3 k) edges can be computed in randomized polynomial time. As a consequence, we show quasipolynomial kernels for several problems, including Edge Multiway Cut, Group Feedback Edge Set for an arbitrary group, and Edge Multicut parameterized by the solution size and the number of cut requests. The result combines the matroid-based irrelevant edge approach used in the kernel for s-Multiway Cut with a recursive decomposition and sparsification of the graph along sparse cuts. This is the first progress on the kernelization of Multiway Cut problems since the kernel for s-Multiway Cut for constant value of s (Kratsch and Wahlström, FOCS 2012).","PeriodicalId":154047,"journal":{"name":"ACM Transactions on Algorithms (TALG)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121122859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Constant-time Dynamic (Δ +1)-Coloring 恒时动态(Δ +1)-着色
Pub Date : 2022-03-04 DOI: 10.1145/3501403
M. Henzinger, Pan Peng
We give a fully dynamic (Las-Vegas style) algorithm with constant expected amortized time per update that maintains a proper (Δ +1)-vertex coloring of a graph with maximum degree at most Δ. This improves upon the previous O(log Δ)-time algorithm by Bhattacharya et al. (SODA 2018). Our algorithm uses an approach based on assigning random ranks to vertices and does not need to maintain a hierarchical graph decomposition. We show that our result does not only have optimal running time but is also optimal in the sense that already deciding whether a Δ-coloring exists in a dynamically changing graph with maximum degree at most Δ takes Ω (log n) time per operation.
我们给出了一个完全动态的(Las-Vegas风格)算法,每次更新的期望平摊时间为常数,该算法保持了图的适当(Δ +1)顶点着色,最大程度不超过Δ。这改进了Bhattacharya等人(SODA 2018)之前的O(log Δ)时间算法。我们的算法使用了一种基于给顶点分配随机秩的方法,并且不需要维护分层图分解。我们表明,我们的结果不仅具有最佳的运行时间,而且在决定Δ-coloring是否存在于最大程度为Δ的动态变化图中,每次操作花费Ω (log n)时间的意义上也是最优的。
{"title":"Constant-time Dynamic (Δ +1)-Coloring","authors":"M. Henzinger, Pan Peng","doi":"10.1145/3501403","DOIUrl":"https://doi.org/10.1145/3501403","url":null,"abstract":"We give a fully dynamic (Las-Vegas style) algorithm with constant expected amortized time per update that maintains a proper (Δ +1)-vertex coloring of a graph with maximum degree at most Δ. This improves upon the previous O(log Δ)-time algorithm by Bhattacharya et al. (SODA 2018). Our algorithm uses an approach based on assigning random ranks to vertices and does not need to maintain a hierarchical graph decomposition. We show that our result does not only have optimal running time but is also optimal in the sense that already deciding whether a Δ-coloring exists in a dynamically changing graph with maximum degree at most Δ takes Ω (log n) time per operation.","PeriodicalId":154047,"journal":{"name":"ACM Transactions on Algorithms (TALG)","volume":"212 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131407868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Exponential Separations in Local Privacy 指数分离在本地隐私
Pub Date : 2022-02-08 DOI: 10.1145/3459095
Matthew Joseph, Jieming Mao, Aaron Roth
We prove a general connection between the communication complexity of two-player games and the sample complexity of their multi-player locally private analogues. We use this connection to prove sample complexity lower bounds for locally differentially private protocols as straightforward corollaries of results from communication complexity. In particular, we (1) use a communication lower bound for the hidden layers problem to prove an exponential sample complexity separation between sequentially and fully interactive locally private protocols, and (2) use a communication lower bound for the pointer chasing problem to prove an exponential sample complexity separation between k-round and (k+1)-round sequentially interactive locally private protocols, for every k.
我们证明了两玩家游戏的通信复杂性与其多玩家局部私有模拟的样本复杂性之间的一般联系。我们使用这个连接来证明局部差分私有协议的样本复杂性下界,作为通信复杂性结果的直接推论。特别是,我们(1)使用隐层问题的通信下界来证明顺序交互和完全交互局部私有协议之间的指数样本复杂度分离,并且(2)使用指针跟踪问题的通信下界来证明k轮和(k+1)轮顺序交互局部私有协议之间的指数样本复杂度分离,对于每k。
{"title":"Exponential Separations in Local Privacy","authors":"Matthew Joseph, Jieming Mao, Aaron Roth","doi":"10.1145/3459095","DOIUrl":"https://doi.org/10.1145/3459095","url":null,"abstract":"We prove a general connection between the communication complexity of two-player games and the sample complexity of their multi-player locally private analogues. We use this connection to prove sample complexity lower bounds for locally differentially private protocols as straightforward corollaries of results from communication complexity. In particular, we (1) use a communication lower bound for the hidden layers problem to prove an exponential sample complexity separation between sequentially and fully interactive locally private protocols, and (2) use a communication lower bound for the pointer chasing problem to prove an exponential sample complexity separation between k-round and (k+1)-round sequentially interactive locally private protocols, for every k.","PeriodicalId":154047,"journal":{"name":"ACM Transactions on Algorithms (TALG)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123093610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Introduction to the ACM-SIAM Symposium on Discrete Algorithms (SODA) 2019 Special Issue ACM-SIAM离散算法研讨会(SODA) 2019特刊简介
Pub Date : 2022-01-22 DOI: 10.1145/3508460
M. Hoefer, T. Kopelowitz
We are delighted to present a Special Issue of ACM Transactions on Algorithms, containing full versions of six articles that were presented at the 30th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA) 2019 in San Diego, California, on January 6–9, 2019. These articles, selected on the basis of their high ratings by the conference program committee, have been thoroughly reviewed according to the journal’s highest standards. In “Polynomial-time algorithm for Maximum Weight Independent Set on P6-free graphs”, Andrzej Grzesik, Tereza Klimošová, Marcin Pilipczuk, and Michał Pilipczuk study the classic problem of max-weight independent set. They provide the first polynomial-time algorithm to solve the problem for the class of P6-free graphs, i.e., all graphs that contain no path on six vertices as an induced subgraph. The approach is based on a careful enumeration of vertex subsets that inherently characterize all maximal independent sets. The article “I/O-Efficient Algorithms for Topological Sort and Related Problems” by Nairen Cao, Jeremy Fineman, Katina Russell, and Eugene Yang, introduces the first randomized algorithms for topological sorting and for identifying the strongly connected components of a directed graph in the I/O model. These algorithms have a runtime of O (sort (E) · poly(logV )), where sort (E) is the time needed for sorting E elements in the I/O-model. The algorithms are based on a recursive approach, which iteratively updates a random labeling until vertices in the same strongly connected component have the same label and the labeling represents a topological sorting of the strongly connected components. These new algorithms also imply efficient I/O-algorithms for various reachability and shortest paths problems in directed acyclic graphs. In the article “SETH-Based Lower Bounds for Subset Sum and Bicriteria Path”, by Amir Abboud, Karl Bringmann, Danny Hermelin, and Dvir Shabtay, the authors introduce a reduction fromk-SAT to SUBSET SUM on dense instances. The new reduction proves that Bellman’s SUBSET SUM algorithm from 1969, which runs in O (Tn) time on n numbers and target T , cannot be improved to T 1−ε 2 (n) time for any constant ε > 0, unless the Strong Exponential Time Hypothesis (SETH) is false. The reduction is based on the results of Behrends (1946) about the existence of certain sequences of numbers, combined with clever partitioning and encoding. The authors also extend their techniques to prove SETH-based lower bounds for the BICRITERIA s, t-PATH problem. The article “Optimal Las Vegas Approximate Near Neighbors in p” by Alexander Wei presents Las Vegas data structures for solving approximate near neighbors in R under the p -norm. For 1 ≤ p ≤ 2, the author provides a data structure that matches the performance of optimal localitysensitive hashing. Moreover, using a locality-sensitive filter construction, the article gives the first
我们很高兴地发表《ACM算法汇刊》特刊,其中包含2019年1月6日至9日在加利福尼亚州圣地亚哥举行的第30届ACM- siam离散算法研讨会(SODA)上发表的六篇文章的完整版本。这些文章是由会议计划委员会根据其高评级选出的,并根据该杂志的最高标准进行了彻底的审查。Andrzej Grzesik、Tereza Klimošová、Marcin Pilipczuk和michaov Pilipczuk在“P6-free图上最大权独立集的多项式时间算法”中研究了最大权独立集的经典问题。他们提供了第一个多项式时间算法来解决P6-free图类的问题,即所有在六个顶点上不包含路径的图作为诱导子图。该方法基于顶点子集的仔细枚举,这些子集固有地表征所有最大独立集。Nairen Cao、Jeremy Fineman、Katina Russell和Eugene Yang撰写的文章“拓扑排序和相关问题的I/O高效算法”介绍了用于拓扑排序和识别I/O模型中有向图的强连接分量的第一个随机算法。这些算法的运行时间为O (sort (E)·poly(logV)),其中sort (E)是对I/O模型中的E个元素进行排序所需的时间。该算法基于递归方法,迭代更新随机标记,直到相同强连接组件中的顶点具有相同的标记,并且标记表示强连接组件的拓扑排序。这些新算法还隐含了有效的I/ o算法来解决有向无环图中的各种可达性和最短路径问题。在Amir Abboud, Karl Bringmann, Danny Hermelin和Dvir Shabtay的文章“基于seth的子集和双标准路径的下界”中,作者介绍了在密集实例上从k- sat到子集Sum的约简。新的约简证明了1969年的Bellman子集SUM算法,在n个数和目标T上运行O (Tn)时间,对于任意常数ε > 0,不能改进到t1−ε 2 (n)时间,除非强指数时间假设(SETH)是假的。这种约简是基于Behrends(1946)关于某些数列存在性的结果,并结合了巧妙的划分和编码。作者还扩展了他们的技术来证明基于seth的BICRITERIA s, t-PATH问题的下界。Alexander Wei的文章“Optimal Las Vegas Approximate Near Neighbors in p”提出了在p范数下求解R中的近似近邻的Las Vegas数据结构。对于1≤p≤2,作者提供了一种与最优位置敏感哈希性能相匹配的数据结构。此外,本文还采用了一种位置敏感滤波器结构,给出了第一种
{"title":"Introduction to the ACM-SIAM Symposium on Discrete Algorithms (SODA) 2019 Special Issue","authors":"M. Hoefer, T. Kopelowitz","doi":"10.1145/3508460","DOIUrl":"https://doi.org/10.1145/3508460","url":null,"abstract":"We are delighted to present a Special Issue of ACM Transactions on Algorithms, containing full versions of six articles that were presented at the 30th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA) 2019 in San Diego, California, on January 6–9, 2019. These articles, selected on the basis of their high ratings by the conference program committee, have been thoroughly reviewed according to the journal’s highest standards. In “Polynomial-time algorithm for Maximum Weight Independent Set on P6-free graphs”, Andrzej Grzesik, Tereza Klimošová, Marcin Pilipczuk, and Michał Pilipczuk study the classic problem of max-weight independent set. They provide the first polynomial-time algorithm to solve the problem for the class of P6-free graphs, i.e., all graphs that contain no path on six vertices as an induced subgraph. The approach is based on a careful enumeration of vertex subsets that inherently characterize all maximal independent sets. The article “I/O-Efficient Algorithms for Topological Sort and Related Problems” by Nairen Cao, Jeremy Fineman, Katina Russell, and Eugene Yang, introduces the first randomized algorithms for topological sorting and for identifying the strongly connected components of a directed graph in the I/O model. These algorithms have a runtime of O (sort (E) · poly(logV )), where sort (E) is the time needed for sorting E elements in the I/O-model. The algorithms are based on a recursive approach, which iteratively updates a random labeling until vertices in the same strongly connected component have the same label and the labeling represents a topological sorting of the strongly connected components. These new algorithms also imply efficient I/O-algorithms for various reachability and shortest paths problems in directed acyclic graphs. In the article “SETH-Based Lower Bounds for Subset Sum and Bicriteria Path”, by Amir Abboud, Karl Bringmann, Danny Hermelin, and Dvir Shabtay, the authors introduce a reduction fromk-SAT to SUBSET SUM on dense instances. The new reduction proves that Bellman’s SUBSET SUM algorithm from 1969, which runs in O (Tn) time on n numbers and target T , cannot be improved to T 1−ε 2 (n) time for any constant ε > 0, unless the Strong Exponential Time Hypothesis (SETH) is false. The reduction is based on the results of Behrends (1946) about the existence of certain sequences of numbers, combined with clever partitioning and encoding. The authors also extend their techniques to prove SETH-based lower bounds for the BICRITERIA s, t-PATH problem. The article “Optimal Las Vegas Approximate Near Neighbors in p” by Alexander Wei presents Las Vegas data structures for solving approximate near neighbors in R under the p -norm. For 1 ≤ p ≤ 2, the author provides a data structure that matches the performance of optimal localitysensitive hashing. Moreover, using a locality-sensitive filter construction, the article gives the first","PeriodicalId":154047,"journal":{"name":"ACM Transactions on Algorithms (TALG)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116885118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal Las Vegas Approximate Near Neighbors in ℓp 最优的拉斯维加斯近似近邻
Pub Date : 2022-01-22 DOI: 10.1145/3461777
Alexander Wei
We show that approximate near neighbor search in high dimensions can be solved in a Las Vegas fashion (i.e., without false negatives) for ℓp (1≤ p≤ 2) while matching the performance of optimal locality-sensitive hashing. Specifically, we construct a data-independent Las Vegas data structure with query time O(dnρ) and space usage O(dn1+ρ) for (r, c r)-approximate near neighbors in Rd under the ℓp norm, where ρ = 1/cp + o(1). Furthermore, we give a Las Vegas locality-sensitive filter construction for the unit sphere that can be used with the data-dependent data structure of Andoni et al. (SODA 2017) to achieve optimal space-time tradeoffs in the data-dependent setting. For the symmetric case, this gives us a data-dependent Las Vegas data structure with query time O(dnρ) and space usage O(dn1+ρ) for (r, c r)-approximate near neighbors in Rd under the ℓp norm, where ρ = 1/(2cp - 1) + o(1). Our data-independent construction improves on the recent Las Vegas data structure of Ahle (FOCS 2017) for ℓp when 1 < p≤ 2. Our data-dependent construction performs even better for ℓp for all pε [1, 2] and is the first Las Vegas approximate near neighbors data structure to make use of data-dependent approaches. We also answer open questions of Indyk (SODA 2000), Pagh (SODA 2016), and Ahle by showing that for approximate near neighbors, Las Vegas data structures can match state-of-the-art Monte Carlo data structures in performance for both the data-independent and data-dependent settings and across space-time tradeoffs.
我们证明了在符合最优位置敏感哈希性能的情况下,高维的近似近邻搜索可以用拉斯维加斯的方式(即没有假阴性)解决。具体来说,我们构造了一个数据无关的Las Vegas数据结构,对于(r, c r)-在Rd中的近似近邻,在p范数下,查询时间为O(dnρ),空间使用为O(dn1+ρ),其中ρ = 1/cp + O(1)。此外,我们为单位球体给出了拉斯维加斯位置敏感滤波器结构,该结构可与Andoni等人(SODA 2017)的数据依赖数据结构一起使用,以在数据依赖设置中实现最佳时空权衡。对于对称情况,这给了我们一个数据依赖的拉斯维加斯数据结构,查询时间为O(dnρ),空间使用为O(dn1+ρ),对于(r, c r)-在ldp范数下的近似近邻,其中ρ = 1/(2cp - 1) + O(1)。当1 < p≤2时,我们的数据独立结构改进了Ahle最近的拉斯维加斯数据结构(FOCS 2017)。我们的数据依赖结构对于所有的pε[1,2]在p上表现得更好,并且是第一个使用数据依赖方法的拉斯维加斯近似近邻数据结构。我们还回答了Indyk (SODA 2000)、Pagh (SODA 2016)和Ahle的开放式问题,表明对于近似近邻,拉斯维加斯数据结构可以在数据独立和数据依赖设置以及跨时空权衡的性能上与最先进的蒙特卡罗数据结构相匹配。
{"title":"Optimal Las Vegas Approximate Near Neighbors in ℓp","authors":"Alexander Wei","doi":"10.1145/3461777","DOIUrl":"https://doi.org/10.1145/3461777","url":null,"abstract":"We show that approximate near neighbor search in high dimensions can be solved in a Las Vegas fashion (i.e., without false negatives) for ℓp (1≤ p≤ 2) while matching the performance of optimal locality-sensitive hashing. Specifically, we construct a data-independent Las Vegas data structure with query time O(dnρ) and space usage O(dn1+ρ) for (r, c r)-approximate near neighbors in Rd under the ℓp norm, where ρ = 1/cp + o(1). Furthermore, we give a Las Vegas locality-sensitive filter construction for the unit sphere that can be used with the data-dependent data structure of Andoni et al. (SODA 2017) to achieve optimal space-time tradeoffs in the data-dependent setting. For the symmetric case, this gives us a data-dependent Las Vegas data structure with query time O(dnρ) and space usage O(dn1+ρ) for (r, c r)-approximate near neighbors in Rd under the ℓp norm, where ρ = 1/(2cp - 1) + o(1). Our data-independent construction improves on the recent Las Vegas data structure of Ahle (FOCS 2017) for ℓp when 1 < p≤ 2. Our data-dependent construction performs even better for ℓp for all pε [1, 2] and is the first Las Vegas approximate near neighbors data structure to make use of data-dependent approaches. We also answer open questions of Indyk (SODA 2000), Pagh (SODA 2016), and Ahle by showing that for approximate near neighbors, Las Vegas data structures can match state-of-the-art Monte Carlo data structures in performance for both the data-independent and data-dependent settings and across space-time tradeoffs.","PeriodicalId":154047,"journal":{"name":"ACM Transactions on Algorithms (TALG)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130843553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ACM Transactions on Algorithms (TALG)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1