首页 > 最新文献

ACM Transactions on Computation Theory (TOCT)最新文献

英文 中文
Point-hyperplane Incidence Geometry and the Log-rank Conjecture 点-超平面关联几何与Log-rank猜想
Pub Date : 2021-01-23 DOI: 10.1145/3543684
Noah G. Singer, M. Sudan
We study the log-rank conjecture from the perspective of point-hyperplane incidence geometry. We formulate the following conjecture: Given a point set in ℝd that is covered by constant-sized sets of parallel hyperplanes, there exists an affine subspace that accounts for a large (i.e., 2–polylog(d)) fraction of the incidences, in the sense of containing a large fraction of the points and being contained in a large fraction of the hyperplanes. In other words, the point-hyperplane incidence graph for such configurations has a large complete bipartite subgraph. Alternatively, our conjecture may be interpreted linear-algebraically as follows: Any rank-d matrix containing at most O(1) distinct entries in each column contains a submatrix of fractional size 2–polylog(d), in which each column is constant. We prove that our conjecture is equivalent to the log-rank conjecture; the crucial ingredient of this proof is a reduction from bounds for parallel k-partitions to bounds for parallel (k-1)-partitions. We also introduce an (apparent) strengthening of the conjecture, which relaxes the requirements that the sets of hyperplanes be parallel. Motivated by the connections above, we revisit well-studied questions in point-hyperplane incidence geometry without structural assumptions (i.e., the existence of partitions). We give an elementary argument for the existence of complete bipartite subgraphs of density Ω (ε 2d/d) in any d-dimensional configuration with incidence density ε, qualitatively matching previous results proved using sophisticated geometric techniques. We also improve an upper-bound construction of Apfelbaum and Sharir [2], yielding a configuration whose complete bipartite subgraphs are exponentially small and whose incidence density is Ω (1/√ d). Finally, we discuss various constructions (due to others) of products of Boolean matrices which yield configurations with incidence density Ω (1) and complete bipartite subgraph density 2-Ω (√ d), and pose several questions for this special case in the alternative language of extremal set combinatorics. Our framework and results may help shed light on the difficulty of improving Lovett’s Õ(√ rank(f)) bound [20] for the log-rank conjecture. In particular, any improvement on this bound would imply the first complete bipartite subgraph size bounds for parallel 3-partitioned configurations which beat our generic bounds for unstructured configurations.
从点-超平面入射几何的角度研究了对数秩猜想。我们给出了以下猜想:给定一个由常数大小的平行超平面集合覆盖的点集,存在一个仿射子空间,该空间占入射的很大一部分(即2-polylog (d)),在包含很大一部分点和被包含在很大一部分超平面的意义上。换句话说,这种构型的点-超平面关联图有一个大的完全二部子图。或者,我们的猜想可以线性代数地解释如下:任何在每列中最多包含O(1)个不同条目的秩d矩阵都包含一个分数大小的2-polylog (d)的子矩阵,其中每列都是常数。我们证明了我们的猜想等价于对数秩猜想;这个证明的关键部分是从并行k分区的边界简化到并行(k-1)分区的边界。我们还引入了一个(明显的)强化猜想,它放宽了超平面集合平行的要求。在上述联系的激励下,我们在没有结构假设(即分区的存在)的情况下重新审视点-超平面入射几何中研究得很好的问题。我们给出了密度Ω (ε 2d/d)的完全二部子图在任何具有入射密度ε的d维构型中的存在性的初等论证,定性地匹配了先前使用复杂几何技术证明的结果。我们还改进了Apfelbaum和Sharir[2]的上界构造,得到了一个完全二部子图指数小且关联密度为Ω(1/√d)的构型。最后,我们讨论了布尔矩阵乘积的各种构造(由于其他构造),这些构造产生了关联密度为Ω(1)和完全二部子图密度为2-Ω(√d)的构型。用极值集合组合的另一种语言对这种特殊情况提出几个问题。我们的框架和结果可能有助于揭示改进logrank猜想的Lovett的Õ(√rank(f))界[20]的困难。特别地,在这个边界上的任何改进都意味着并行3分区构型的第一个完整的二部子图大小边界,它优于非结构化构型的一般边界。
{"title":"Point-hyperplane Incidence Geometry and the Log-rank Conjecture","authors":"Noah G. Singer, M. Sudan","doi":"10.1145/3543684","DOIUrl":"https://doi.org/10.1145/3543684","url":null,"abstract":"We study the log-rank conjecture from the perspective of point-hyperplane incidence geometry. We formulate the following conjecture: Given a point set in ℝd that is covered by constant-sized sets of parallel hyperplanes, there exists an affine subspace that accounts for a large (i.e., 2–polylog(d)) fraction of the incidences, in the sense of containing a large fraction of the points and being contained in a large fraction of the hyperplanes. In other words, the point-hyperplane incidence graph for such configurations has a large complete bipartite subgraph. Alternatively, our conjecture may be interpreted linear-algebraically as follows: Any rank-d matrix containing at most O(1) distinct entries in each column contains a submatrix of fractional size 2–polylog(d), in which each column is constant. We prove that our conjecture is equivalent to the log-rank conjecture; the crucial ingredient of this proof is a reduction from bounds for parallel k-partitions to bounds for parallel (k-1)-partitions. We also introduce an (apparent) strengthening of the conjecture, which relaxes the requirements that the sets of hyperplanes be parallel. Motivated by the connections above, we revisit well-studied questions in point-hyperplane incidence geometry without structural assumptions (i.e., the existence of partitions). We give an elementary argument for the existence of complete bipartite subgraphs of density Ω (ε 2d/d) in any d-dimensional configuration with incidence density ε, qualitatively matching previous results proved using sophisticated geometric techniques. We also improve an upper-bound construction of Apfelbaum and Sharir [2], yielding a configuration whose complete bipartite subgraphs are exponentially small and whose incidence density is Ω (1/√ d). Finally, we discuss various constructions (due to others) of products of Boolean matrices which yield configurations with incidence density Ω (1) and complete bipartite subgraph density 2-Ω (√ d), and pose several questions for this special case in the alternative language of extremal set combinatorics. Our framework and results may help shed light on the difficulty of improving Lovett’s Õ(√ rank(f)) bound [20] for the log-rank conjecture. In particular, any improvement on this bound would imply the first complete bipartite subgraph size bounds for parallel 3-partitioned configurations which beat our generic bounds for unstructured configurations.","PeriodicalId":198744,"journal":{"name":"ACM Transactions on Computation Theory (TOCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121590111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Fine-Grained Time Complexity of Constraint Satisfaction Problems 约束满足问题的细粒度时间复杂度
Pub Date : 2021-01-21 DOI: 10.1145/3434387
P. Jonsson, Victor Lagerkvist, Biman Roy
We study the constraint satisfaction problem (CSP) parameterized by a constraint language Γ (CSPΓ) and how the choice of Γ affects its worst-case time complexity. Under the exponential-time hypothesis (ETH), we rule out the existence of subexponential algorithms for finite-domain NP-complete CSPΓ problems. This extends to certain infinite-domain CSPs and structurally restricted problems. For CSPs with finite domain D and where all unary relations are available, we identify a relation SD such that the time complexity of the NP-complete problem CSP({SD}) is a lower bound for all NP-complete CSPs of this kind. We also prove that the time complexity of CSP({SD}) strictly decreases when |D| increases (unless the ETH is false) and provide stronger complexity results in the special case when |D|=3.
研究了由约束语言Γ (CSPΓ)参数化的约束满足问题,以及Γ的选择对其最坏情况时间复杂度的影响。在指数时间假设(ETH)下,我们排除了有限域np完全CSPΓ问题的次指数算法的存在性。这扩展到某些无限域csp和结构受限问题。对于具有有限域D且所有一元关系可用的CSP,我们确定了一个关系SD,使得np -完全问题CSP({SD})的时间复杂度是该类所有np -完全CSP的下界。我们还证明了CSP({SD})的时间复杂度在|D|增加时严格降低(除非ETH为假),并在|D|=3的特殊情况下给出了更强的复杂度结果。
{"title":"Fine-Grained Time Complexity of Constraint Satisfaction Problems","authors":"P. Jonsson, Victor Lagerkvist, Biman Roy","doi":"10.1145/3434387","DOIUrl":"https://doi.org/10.1145/3434387","url":null,"abstract":"We study the constraint satisfaction problem (CSP) parameterized by a constraint language Γ (CSPΓ) and how the choice of Γ affects its worst-case time complexity. Under the exponential-time hypothesis (ETH), we rule out the existence of subexponential algorithms for finite-domain NP-complete CSPΓ problems. This extends to certain infinite-domain CSPs and structurally restricted problems. For CSPs with finite domain D and where all unary relations are available, we identify a relation SD such that the time complexity of the NP-complete problem CSP({SD}) is a lower bound for all NP-complete CSPs of this kind. We also prove that the time complexity of CSP({SD}) strictly decreases when |D| increases (unless the ETH is false) and provide stronger complexity results in the special case when |D|=3.","PeriodicalId":198744,"journal":{"name":"ACM Transactions on Computation Theory (TOCT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115135551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Computational and Proof Complexity of Partial String Avoidability 部分字符串可避免性的计算和证明复杂性
Pub Date : 2021-01-21 DOI: 10.1145/3442365
D. Itsykson, A. Okhotin, V. Oparin
The partial string avoidability problem is stated as follows: given a finite set of strings with possible “holes” (wildcard symbols), determine whether there exists a two-sided infinite string containing no substrings from this set, assuming that a hole matches every symbol. The problem is known to be NP-hard and in PSPACE, and this article establishes its PSPACE-completeness. Next, string avoidability over the binary alphabet is interpreted as a version of conjunctive normal form satisfiability problem, where each clause has infinitely many shifted variants. Non-satisfiability of these formulas can be proved using variants of classical propositional proof systems, augmented with derivation rules for shifting proof lines (such as clauses, inequalities, polynomials, etc.). First, it is proved that there is a particular formula that has a short refutation in Resolution with a shift rule but requires classical proofs of exponential size. At the same time, it is shown that exponential lower bounds for classical proof systems can be translated for their shifted versions. Finally, it is shown that superpolynomial lower bounds on the size of shifted proofs would separate NP from PSPACE; a connection to lower bounds on circuit complexity is also established.
部分字符串可避免性问题表述如下:给定一个有限的字符串集合,其中可能存在“洞”(通配符符号),确定是否存在一个双面无限字符串,其中不包含该集合中的子字符串,假设每个符号都有一个洞匹配。这个问题已知是NP-hard的,并且在PSPACE中,本文建立了它的PSPACE完备性。其次,将二元字母表上的字符串可避免性解释为合取范式可满足性问题的一个版本,其中每个子句具有无限多个移位变体。这些公式的非可满足性可以用经典命题证明系统的变体来证明,并用移动证明线(如子句、不等式、多项式等)的推导规则进行扩充。首先,证明了有一个特殊的公式,它在分辨率中有一个移位规则的简短反驳,但需要指数大小的经典证明。同时,还证明了经典证明系统的指数下界可以被平移到它们的移位版本。最后,证明了移位证明大小的超多项式下界将把NP从PSPACE中分离出来;还建立了电路复杂度下界的连接。
{"title":"Computational and Proof Complexity of Partial String Avoidability","authors":"D. Itsykson, A. Okhotin, V. Oparin","doi":"10.1145/3442365","DOIUrl":"https://doi.org/10.1145/3442365","url":null,"abstract":"The partial string avoidability problem is stated as follows: given a finite set of strings with possible “holes” (wildcard symbols), determine whether there exists a two-sided infinite string containing no substrings from this set, assuming that a hole matches every symbol. The problem is known to be NP-hard and in PSPACE, and this article establishes its PSPACE-completeness. Next, string avoidability over the binary alphabet is interpreted as a version of conjunctive normal form satisfiability problem, where each clause has infinitely many shifted variants. Non-satisfiability of these formulas can be proved using variants of classical propositional proof systems, augmented with derivation rules for shifting proof lines (such as clauses, inequalities, polynomials, etc.). First, it is proved that there is a particular formula that has a short refutation in Resolution with a shift rule but requires classical proofs of exponential size. At the same time, it is shown that exponential lower bounds for classical proof systems can be translated for their shifted versions. Finally, it is shown that superpolynomial lower bounds on the size of shifted proofs would separate NP from PSPACE; a connection to lower bounds on circuit complexity is also established.","PeriodicalId":198744,"journal":{"name":"ACM Transactions on Computation Theory (TOCT)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129026447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Erasure-Resilient Sublinear-Time Graph Algorithms 擦除弹性亚线性时间图算法
Pub Date : 2020-11-29 DOI: 10.1145/3488250
Amit Levi, R. Pallavoor, Sofya Raskhodnikova, Nithin M. Varma
We investigate sublinear-time algorithms that take partially erased graphs represented by adjacency lists as input. Our algorithms make degree and neighbor queries to the input graph and work with a specified fraction of adversarial erasures in adjacency entries. We focus on two computational tasks: testing if a graph is connected or ε-far from connected and estimating the average degree. For testing connectedness, we discover a threshold phenomenon: when the fraction of erasures is less than ε, this property can be tested efficiently (in time independent of the size of the graph); when the fraction of erasures is at least ε, then a number of queries linear in the size of the graph representation is required. Our erasure-resilient algorithm (for the special case with no erasures) is an improvement over the previously known algorithm for connectedness in the standard property testing model and has optimal dependence on the proximity parameter ε. For estimating the average degree, our results provide an “interpolation” between the query complexity for this computational task in the model with no erasures in two different settings: with only degree queries, investigated by Feige (SIAM J. Comput. ‘06), and with degree queries and neighbor queries, investigated by Goldreich and Ron (Random Struct. Algorithms ‘08) and Eden et al. (ICALP ‘17). We conclude with a discussion of our model and open questions raised by our work.
我们研究了采用由邻接表表示的部分擦除图作为输入的亚线性时间算法。我们的算法对输入图进行度查询和邻居查询,并在邻接条目中使用指定比例的对抗性擦除。我们关注两个计算任务:测试图是否连通或ε-远不连通以及估计平均程度。对于连通性的测试,我们发现了一个阈值现象:当擦除的比例小于ε时,可以有效地测试该属性(与图的大小无关);当擦除的比例至少为ε时,则需要在图表示的大小上进行一定数量的线性查询。我们的擦除弹性算法(对于没有擦除的特殊情况)是对先前已知的标准属性测试模型中连通性算法的改进,并且对邻近参数ε具有最佳依赖性。为了估计平均度,我们的结果在两种不同的设置下为模型中该计算任务的查询复杂性提供了一个“插值”,在没有擦除的情况下:只有度查询,由Feige (SIAM J. Comput)研究。' 06),以及由Goldreich和Ron(随机结构)研究的度查询和邻居查询。算法' 08)和Eden et al. (ICALP ' 17)。最后,我们讨论了我们的模型和我们工作中提出的开放性问题。
{"title":"Erasure-Resilient Sublinear-Time Graph Algorithms","authors":"Amit Levi, R. Pallavoor, Sofya Raskhodnikova, Nithin M. Varma","doi":"10.1145/3488250","DOIUrl":"https://doi.org/10.1145/3488250","url":null,"abstract":"We investigate sublinear-time algorithms that take partially erased graphs represented by adjacency lists as input. Our algorithms make degree and neighbor queries to the input graph and work with a specified fraction of adversarial erasures in adjacency entries. We focus on two computational tasks: testing if a graph is connected or ε-far from connected and estimating the average degree. For testing connectedness, we discover a threshold phenomenon: when the fraction of erasures is less than ε, this property can be tested efficiently (in time independent of the size of the graph); when the fraction of erasures is at least ε, then a number of queries linear in the size of the graph representation is required. Our erasure-resilient algorithm (for the special case with no erasures) is an improvement over the previously known algorithm for connectedness in the standard property testing model and has optimal dependence on the proximity parameter ε. For estimating the average degree, our results provide an “interpolation” between the query complexity for this computational task in the model with no erasures in two different settings: with only degree queries, investigated by Feige (SIAM J. Comput. ‘06), and with degree queries and neighbor queries, investigated by Goldreich and Ron (Random Struct. Algorithms ‘08) and Eden et al. (ICALP ‘17). We conclude with a discussion of our model and open questions raised by our work.","PeriodicalId":198744,"journal":{"name":"ACM Transactions on Computation Theory (TOCT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116139103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A ZPPNP[1] Lifting Theorem 一个ZPPNP[1]提升定理
Pub Date : 2020-11-08 DOI: 10.1145/3428673
Thomas Watson
The complexity class ZPPNP[1] (corresponding to zero-error randomized algorithms with access to one NP oracle query) is known to have a number of curious properties. We further explore this class in the settings of time complexity, query complexity, and communication complexity. • For starters, we provide a new characterization: ZPPNP[1] equals the restriction of BPPNP[1] where the algorithm is only allowed to err when it forgoes the opportunity to make an NP oracle query. • Using the above characterization, we prove a query-to-communication lifting theorem, which translates any ZPPNP[1] decision tree lower bound for a function f into a ZPPNP[1] communication lower bound for a two-party version of f. • As an application, we use the above lifting theorem to prove that the ZPPNP[1] communication lower bound technique introduced by Göös, Pitassi, and Watson (ICALP 2016) is not tight. We also provide a “primal” characterization of this lower bound technique as a complexity class.
已知复杂性类ZPPNP[1](对应于访问一个NP oracle查询的零错误随机算法)具有许多奇怪的属性。我们将在时间复杂度、查询复杂度和通信复杂度的设置下进一步探讨这个类。•对于初学者,我们提供了一个新的特征:ZPPNP[1]等于BPPNP[1]的限制,其中算法只允许在放弃进行NP oracle查询的机会时出错。•使用上述表征,我们证明了一个查询到通信的提升定理,该定理将函数f的任何ZPPNP[1]决策树下界转换为f的两方版本的ZPPNP[1]通信下界。•作为一个应用,我们使用上述提升定理来证明由Göös, Pitassi和Watson (ICALP 2016)引入的ZPPNP[1]通信下界技术并不严格。我们还提供了这种下界技术作为复杂度类的“原始”表征。
{"title":"A ZPPNP[1] Lifting Theorem","authors":"Thomas Watson","doi":"10.1145/3428673","DOIUrl":"https://doi.org/10.1145/3428673","url":null,"abstract":"The complexity class ZPPNP[1] (corresponding to zero-error randomized algorithms with access to one NP oracle query) is known to have a number of curious properties. We further explore this class in the settings of time complexity, query complexity, and communication complexity. • For starters, we provide a new characterization: ZPPNP[1] equals the restriction of BPPNP[1] where the algorithm is only allowed to err when it forgoes the opportunity to make an NP oracle query. • Using the above characterization, we prove a query-to-communication lifting theorem, which translates any ZPPNP[1] decision tree lower bound for a function f into a ZPPNP[1] communication lower bound for a two-party version of f. • As an application, we use the above lifting theorem to prove that the ZPPNP[1] communication lower bound technique introduced by Göös, Pitassi, and Watson (ICALP 2016) is not tight. We also provide a “primal” characterization of this lower bound technique as a complexity class.","PeriodicalId":198744,"journal":{"name":"ACM Transactions on Computation Theory (TOCT)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129638220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
On Existential MSO and Its Relation to ETH 论存在MSO及其与ETH的关系
Pub Date : 2020-09-30 DOI: 10.1145/3417759
R. Ganian, Ronald de Haan, Iyad A. Kanj, Stefan Szeider
Impagliazzo et al. proposed a framework, based on the logic fragment defining the complexity class SNP, to identify problems that are equivalent to k-CNF-Sat modulo subexponential-time reducibility (serf-reducibility). The subexponential-time solvability of any of these problems implies the failure of the Exponential Time Hypothesis (ETH). In this article, we extend the framework of Impagliazzo et al. and identify a larger set of problems that are equivalent to k-CNF-Sat modulo serf-reducibility. We propose a complexity class, referred to as Linear Monadic NP, that consists of all problems expressible in existential monadic second-order logic whose expressions have a linear measure in terms of a complexity parameter, which is usually the universe size of the problem. This research direction can be traced back to Fagin’s celebrated theorem stating that NP coincides with the class of problems expressible in existential second-order logic. Monadic NP, a well-studied class in the literature, is the restriction of the aforementioned logic fragment to existential monadic second-order logic. The proposed class Linear Monadic NP is then the restriction of Monadic NP to problems whose expressions have linear measure in the complexity parameter. We show that Linear Monadic NP includes many natural complete problems such as the satisfiability of linear-size circuits, dominating set, independent dominating set, and perfect code. Therefore, for any of these problems, its subexponential-time solvability is equivalent to the failure of ETH. We prove, using logic games, that the aforementioned problems are inexpressible in the monadic fragment of SNP, and hence, are not captured by the framework of Impagliazzo et al. Finally, we show that Feedback Vertex Set is inexpressible in existential monadic second-order logic, and hence is not in Linear Monadic NP, and investigate the existence of certain reductions between Feedback Vertex Set (and variants of it) and 3-CNF-Sat.
Impagliazzo等人提出了一个框架,基于定义复杂度类SNP的逻辑片段,来识别等价于k-CNF-Sat模次指数时间可约性(自可约性)的问题。这些问题的亚指数时间可解性意味着指数时间假设(ETH)的失效。在本文中,我们扩展了Impagliazzo等人的框架,并确定了一组更大的问题,这些问题等价于k-CNF-Sat模自约性。我们提出了一个复杂性类,称为线性一元NP,它由所有可在存在一元二阶逻辑中表达的问题组成,这些问题的表达式在复杂度参数方面具有线性度量,通常是问题的宇宙大小。这一研究方向可以追溯到费金的著名定理,即NP与存在二阶逻辑中可表达的一类问题重合。一元NP是文献中研究较多的一类,它是上述逻辑片段对存在一元二阶逻辑的限制。所提出的线性一元NP类是一元NP对其表达式在复杂度参数上具有线性测度的问题的约束。我们证明了线性一元NP包含许多自然完备问题,如线性大小电路的可满足性、支配集、独立支配集和完美码。因此,对于这些问题中的任何一个,其次指数时间可解性等同于ETH的失效。我们使用逻辑游戏证明,上述问题在SNP的一元片段中是无法表达的,因此,Impagliazzo等人的框架无法捕获。最后,我们证明了反馈顶点集在存在一元二阶逻辑中是不可表示的,因此不在线性一元NP中,并研究了反馈顶点集(及其变体)与3-CNF-Sat之间存在某些约简。
{"title":"On Existential MSO and Its Relation to ETH","authors":"R. Ganian, Ronald de Haan, Iyad A. Kanj, Stefan Szeider","doi":"10.1145/3417759","DOIUrl":"https://doi.org/10.1145/3417759","url":null,"abstract":"Impagliazzo et al. proposed a framework, based on the logic fragment defining the complexity class SNP, to identify problems that are equivalent to k-CNF-Sat modulo subexponential-time reducibility (serf-reducibility). The subexponential-time solvability of any of these problems implies the failure of the Exponential Time Hypothesis (ETH). In this article, we extend the framework of Impagliazzo et al. and identify a larger set of problems that are equivalent to k-CNF-Sat modulo serf-reducibility. We propose a complexity class, referred to as Linear Monadic NP, that consists of all problems expressible in existential monadic second-order logic whose expressions have a linear measure in terms of a complexity parameter, which is usually the universe size of the problem. This research direction can be traced back to Fagin’s celebrated theorem stating that NP coincides with the class of problems expressible in existential second-order logic. Monadic NP, a well-studied class in the literature, is the restriction of the aforementioned logic fragment to existential monadic second-order logic. The proposed class Linear Monadic NP is then the restriction of Monadic NP to problems whose expressions have linear measure in the complexity parameter. We show that Linear Monadic NP includes many natural complete problems such as the satisfiability of linear-size circuits, dominating set, independent dominating set, and perfect code. Therefore, for any of these problems, its subexponential-time solvability is equivalent to the failure of ETH. We prove, using logic games, that the aforementioned problems are inexpressible in the monadic fragment of SNP, and hence, are not captured by the framework of Impagliazzo et al. Finally, we show that Feedback Vertex Set is inexpressible in existential monadic second-order logic, and hence is not in Linear Monadic NP, and investigate the existence of certain reductions between Feedback Vertex Set (and variants of it) and 3-CNF-Sat.","PeriodicalId":198744,"journal":{"name":"ACM Transactions on Computation Theory (TOCT)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132894642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Lower Bound for Sampling Disjoint Sets 抽样不相交集的下界
Pub Date : 2020-07-20 DOI: 10.1145/3404858
Thomas Watson
Suppose Alice and Bob each start with private randomness and no other input, and they wish to engage in a protocol in which Alice ends up with a set x⊆ [n] and Bob ends up with a set y⊆ [n], such that (x,y) is uniformly distributed over all pairs of disjoint sets. We prove that for some constant β < 1, this requires Ω (n) communication even to get within statistical distance 1− βn of the target distribution. Previously, Ambainis, Schulman, Ta-Shma, Vazirani, and Wigderson (FOCS 1998) proved that Ω (√n) communication is required to get within some constant statistical distance ɛ > 0 of the uniform distribution over all pairs of disjoint sets of size √n.
假设Alice和Bob都从私有随机性出发,没有其他输入,并且他们希望参与一个协议,其中Alice最终得到一个x倍于[n], Bob最终得到一个y倍于[n]的集合,使得(x,y)均匀分布在所有不相交的集合对上。我们证明了对于某些常数β < 1,这需要Ω (n)通信,即使在目标分布的统计距离1−βn内。此前,Ambainis, Schulman, Ta-Shma, Vazirani, and Wigderson (FOCS 1998)证明了Ω(√n)通信需要在大小为√n的所有对不相交集的均匀分布的某一恒定统计距离内得到。
{"title":"A Lower Bound for Sampling Disjoint Sets","authors":"Thomas Watson","doi":"10.1145/3404858","DOIUrl":"https://doi.org/10.1145/3404858","url":null,"abstract":"Suppose Alice and Bob each start with private randomness and no other input, and they wish to engage in a protocol in which Alice ends up with a set x⊆ [n] and Bob ends up with a set y⊆ [n], such that (x,y) is uniformly distributed over all pairs of disjoint sets. We prove that for some constant β < 1, this requires Ω (n) communication even to get within statistical distance 1− βn of the target distribution. Previously, Ambainis, Schulman, Ta-Shma, Vazirani, and Wigderson (FOCS 1998) proved that Ω (√n) communication is required to get within some constant statistical distance ɛ > 0 of the uniform distribution over all pairs of disjoint sets of size √n.","PeriodicalId":198744,"journal":{"name":"ACM Transactions on Computation Theory (TOCT)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122833040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Circuit Lower Bounds for MCSP from Local Pseudorandom Generators 基于局部伪随机发生器的MCSP电路下界
Pub Date : 2020-07-20 DOI: 10.1145/3404860
Mahdi Cheraghchi, Valentine Kabanets, Zhenjian Lu, Dimitrios Myrisiotis
The Minimum Circuit Size Problem (MCSP) asks if a given truth table of a Boolean function f can be computed by a Boolean circuit of size at most θ, for a given parameter θ. We improve several circuit lower bounds for MCSP, using pseudorandom generators (PRGs) that are local; a PRG is called local if its output bit strings, when viewed as the truth table of a Boolean function, can be computed by a Boolean circuit of small size. We get new and improved lower bounds for MCSP that almost match the best-known lower bounds against several circuit models. Specifically, we show that computing MCSP, on functions with a truth table of length N, requires • N3−o(1)-size de Morgan formulas, improving the recent N2−o(1) lower bound by Hirahara and Santhanam (CCC, 2017), • N2−o(1)-size formulas over an arbitrary basis or general branching programs (no non-trivial lower bound was known for MCSP against these models), and • 2Ω(N1/(d+1.01))-size depth-d AC0 circuits, improving the (implicit, in their work) exponential size lower bound by Allender et al. (SICOMP, 2006). The AC0 lower bound stated above matches the best-known AC0 lower bound (for PARITY) up to a small additive constant in the depth. Also, for the special case of depth-2 circuits (i.e., CNFs or DNFs), we get an optimal lower bound of 2Ω(N) for MCSP.
最小电路尺寸问题(MCSP)问的是,对于给定参数θ,布尔函数f的给定真值表是否可以由一个最大为θ的布尔电路来计算。我们使用局部伪随机发生器(prg)改进了MCSP的几个电路下界;如果一个PRG的输出位串作为布尔函数的真值表,可以用小尺寸的布尔电路计算,则称为局部PRG。我们得到了新的和改进的MCSP下界,几乎与几种电路模型中最著名的下界相匹配。具体来说,我们表明,在长度为N的真值表上计算MCSP,需要•N3−o(1)个大小的de Morgan公式,改进了Hirahara和Santhanam (CCC, 2017)最近的N2−o(1)个下界,•N2−o(1)个大小的公式在任意基或一般分支程序上(针对这些模型,MCSP没有非平凡下界已知),以及•2Ω(N1/(d+1.01))-大小的深度d AC0电路,改进了(隐式,Allender等人的指数大小下界(SICOMP, 2006)。上面所述的AC0下界与最著名的AC0下界(对于奇偶性)匹配,直到深度的一个小的附加常数。此外,对于深度2电路的特殊情况(即CNFs或DNFs),我们得到了MCSP的最优下界2Ω(N)。
{"title":"Circuit Lower Bounds for MCSP from Local Pseudorandom Generators","authors":"Mahdi Cheraghchi, Valentine Kabanets, Zhenjian Lu, Dimitrios Myrisiotis","doi":"10.1145/3404860","DOIUrl":"https://doi.org/10.1145/3404860","url":null,"abstract":"The Minimum Circuit Size Problem (MCSP) asks if a given truth table of a Boolean function f can be computed by a Boolean circuit of size at most θ, for a given parameter θ. We improve several circuit lower bounds for MCSP, using pseudorandom generators (PRGs) that are local; a PRG is called local if its output bit strings, when viewed as the truth table of a Boolean function, can be computed by a Boolean circuit of small size. We get new and improved lower bounds for MCSP that almost match the best-known lower bounds against several circuit models. Specifically, we show that computing MCSP, on functions with a truth table of length N, requires • N3−o(1)-size de Morgan formulas, improving the recent N2−o(1) lower bound by Hirahara and Santhanam (CCC, 2017), • N2−o(1)-size formulas over an arbitrary basis or general branching programs (no non-trivial lower bound was known for MCSP against these models), and • 2Ω(N1/(d+1.01))-size depth-d AC0 circuits, improving the (implicit, in their work) exponential size lower bound by Allender et al. (SICOMP, 2006). The AC0 lower bound stated above matches the best-known AC0 lower bound (for PARITY) up to a small additive constant in the depth. Also, for the special case of depth-2 circuits (i.e., CNFs or DNFs), we get an optimal lower bound of 2Ω(N) for MCSP.","PeriodicalId":198744,"journal":{"name":"ACM Transactions on Computation Theory (TOCT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133594028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
On the Parameterized Approximability of Contraction to Classes of Chordal Graphs 弦图类收缩的参数化逼近性
Pub Date : 2020-06-18 DOI: 10.1145/3470869
Spoorthy Gunda, P. Jain, D. Lokshtanov, Saket Saurabh, P. Tale
A graph operation that contracts edges is one of the fundamental operations in the theory of graph minors. Parameterized Complexity of editing to a family of graphs by contracting k edges has recently gained substantial scientific attention, and several new results have been obtained. Some important families of graphs, namely, the subfamilies of chordal graphs, in the context of edge contractions, have proven to be significantly difficult than one might expect. In this article, we study the F-Contraction problem, where F is a subfamily of chordal graphs, in the realm of parameterized approximation. Formally, given a graph G and an integer k, F-Contraction asks whether there exists X ⊆ E(G) such that G/X ∈ F and |X| ≤ k. Here, G/X is the graph obtained from G by contracting edges in X. We obtain the following results for the F-Contraction problem: • Clique Contraction is known to be FPT. However, unless NP⊆ coNP/poly, it does not admit a polynomial kernel. We show that it admits a polynomial-size approximate kernelization scheme (PSAKS). That is, it admits a (1 + ε)-approximate kernel with O(kf(ε)) vertices for every ε > 0. • Split Contraction is known to be W[1]-Hard. We deconstruct this intractability result in two ways. First, we give a (2+ε)-approximate polynomial kernel for Split Contraction (which also implies a factor (2+ε)-FPT-approximation algorithm for Split Contraction). Furthermore, we show that, assuming Gap-ETH, there is no (5/4-δ)-FPT-approximation algorithm for Split Contraction. Here, ε, δ > 0 are fixed constants. • Chordal Contraction is known to be W[2]-Hard. We complement this result by observing that the existing W[2]-hardness reduction can be adapted to show that, assuming FPT≠ W[1], there is no F(k)-FPT-approximation algorithm for Chordal Contraction. Here, F(k) is an arbitrary function depending on k alone. We say that an algorithm is an h(k)-FPT-approximation algorithm for the F-Contraction problem, if it runs in FPT time, and on any input (G, k) such that there exists X ⊆ E(G) satisfying G/X ∈ F and |X| ≤ k, it outputs an edge set Y of size at most h(k) ċ k for which G/Y is in F.
图的缩边运算是图子理论中的基本运算之一。通过压缩k条边来编辑图族的参数化复杂性问题近年来得到了大量的科学关注,并获得了一些新的结果。一些重要的图族,即弦图的亚族,在边缩的背景下,已经被证明比人们想象的要困难得多。本文研究了参数化逼近领域中的F-收缩问题,其中F是弦图的一个子族。形式上,给定一个图G和一个整数k, F-Contraction问是否存在X≥E(G),使得G/X∈F且|X|≤k。这里,G/X是通过收缩X中的边从G得到的图。对于F-Contraction问题,我们得到以下结果:但是,除非NP≤coNP/poly,否则不存在多项式核。我们证明了它允许一个多项式大小的近似核化方案(PSAKS)。也就是说,对于每个ε > 0,它承认一个(1 + ε)-近似核,具有O(kf(ε))个顶点。•分裂收缩被认为是W[1]-Hard。我们以两种方式解构这个棘手的结果。首先,我们给出了Split Contraction的一个(2+ε)-近似多项式核(这也暗示了Split Contraction的一个因子(2+ε)- fpt -近似算法)。此外,我们证明,假设Gap-ETH,分裂收缩不存在(5/4-δ)- fpt近似算法。其中ε、δ > 0是固定常数。•已知脊索收缩为W[2]-Hard。我们通过观察现有的W[2]-硬度约简可以证明,假设FPT≠W[1],弦缩不存在F(k)-FPT逼近算法来补充这一结果。这里,F(k)是一个只依赖于k的任意函数。我们说一个算法是F-收缩问题的h(k)-FPT逼近算法,如果它在FPT时间内运行,并且在任意输入(G, k)上存在X≤E(G)满足G/X∈F且|X|≤k,则它输出一个最大为h(k) * k的边集Y,且G/Y在F中。
{"title":"On the Parameterized Approximability of Contraction to Classes of Chordal Graphs","authors":"Spoorthy Gunda, P. Jain, D. Lokshtanov, Saket Saurabh, P. Tale","doi":"10.1145/3470869","DOIUrl":"https://doi.org/10.1145/3470869","url":null,"abstract":"A graph operation that contracts edges is one of the fundamental operations in the theory of graph minors. Parameterized Complexity of editing to a family of graphs by contracting k edges has recently gained substantial scientific attention, and several new results have been obtained. Some important families of graphs, namely, the subfamilies of chordal graphs, in the context of edge contractions, have proven to be significantly difficult than one might expect. In this article, we study the F-Contraction problem, where F is a subfamily of chordal graphs, in the realm of parameterized approximation. Formally, given a graph G and an integer k, F-Contraction asks whether there exists X ⊆ E(G) such that G/X ∈ F and |X| ≤ k. Here, G/X is the graph obtained from G by contracting edges in X. We obtain the following results for the F-Contraction problem: • Clique Contraction is known to be FPT. However, unless NP⊆ coNP/poly, it does not admit a polynomial kernel. We show that it admits a polynomial-size approximate kernelization scheme (PSAKS). That is, it admits a (1 + ε)-approximate kernel with O(kf(ε)) vertices for every ε > 0. • Split Contraction is known to be W[1]-Hard. We deconstruct this intractability result in two ways. First, we give a (2+ε)-approximate polynomial kernel for Split Contraction (which also implies a factor (2+ε)-FPT-approximation algorithm for Split Contraction). Furthermore, we show that, assuming Gap-ETH, there is no (5/4-δ)-FPT-approximation algorithm for Split Contraction. Here, ε, δ > 0 are fixed constants. • Chordal Contraction is known to be W[2]-Hard. We complement this result by observing that the existing W[2]-hardness reduction can be adapted to show that, assuming FPT≠ W[1], there is no F(k)-FPT-approximation algorithm for Chordal Contraction. Here, F(k) is an arbitrary function depending on k alone. We say that an algorithm is an h(k)-FPT-approximation algorithm for the F-Contraction problem, if it runs in FPT time, and on any input (G, k) such that there exists X ⊆ E(G) satisfying G/X ∈ F and |X| ≤ k, it outputs an edge set Y of size at most h(k) ċ k for which G/Y is in F.","PeriodicalId":198744,"journal":{"name":"ACM Transactions on Computation Theory (TOCT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131200428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Complexity of Unordered CNF Games 无序CNF游戏的复杂性
Pub Date : 2020-06-01 DOI: 10.1145/3397478
Md Lutfar Rahman, Thomas Watson
The classic TQBF problem is to determine who has a winning strategy in a game played on a given conjunctive normal form formula (CNF), where the two players alternate turns picking truth values for the variables in a given order, and the winner is determined by whether the CNF gets satisfied. We study variants of this game in which the variables may be played in any order, and each turn consists of picking a remaining variable and a truth value for it. For the version where the set of variables is partitioned into two halves and each player may only pick variables from his or her half, we prove that the problem is PSPACE-complete for 5-CNFs and in P for 2-CNFs. Previously, it was known to be PSPACE-complete for unbounded-width CNFs (Schaefer, STOC 1976). For the general unordered version (where each variable can be picked by either player), we also prove that the problem is PSPACE-complete for 5-CNFs and in P for 2-CNFs. Previously, it was known to be PSPACE-complete for 6-CNFs (Ahlroth and Orponen, MFCS 2012) and PSPACE-complete for positive 11-CNFs (Schaefer, STOC 1976).
经典的TQBF问题是确定在给定的合取范式公式(CNF)上进行的博弈中谁具有获胜策略,其中两个参与者轮流以给定的顺序为变量选择真值,并且获胜者取决于CNF是否得到满足。我们研究了这个游戏的变体,其中变量可以以任何顺序进行,每个回合包括选择一个剩余的变量和它的真值。对于变量集被分成两半且每个参与者只能从自己的一半中选择变量的版本,我们证明了问题对于5-CNFs是pspace完全的,对于2-CNFs是P完全的。以前,已知对于无边界宽度cnf是pspace完全的(Schaefer, STOC 1976)。对于一般的无序版本(其中每个变量都可以由任何参与者选择),我们也证明了问题对于5- cnf是pspace完全的,对于2- cnf是P完全的。此前,已知6-CNFs为PSPACE-complete (Ahlroth和Orponen, MFCS 2012),阳性11-CNFs为PSPACE-complete (Schaefer, STOC 1976)。
{"title":"Complexity of Unordered CNF Games","authors":"Md Lutfar Rahman, Thomas Watson","doi":"10.1145/3397478","DOIUrl":"https://doi.org/10.1145/3397478","url":null,"abstract":"The classic TQBF problem is to determine who has a winning strategy in a game played on a given conjunctive normal form formula (CNF), where the two players alternate turns picking truth values for the variables in a given order, and the winner is determined by whether the CNF gets satisfied. We study variants of this game in which the variables may be played in any order, and each turn consists of picking a remaining variable and a truth value for it. For the version where the set of variables is partitioned into two halves and each player may only pick variables from his or her half, we prove that the problem is PSPACE-complete for 5-CNFs and in P for 2-CNFs. Previously, it was known to be PSPACE-complete for unbounded-width CNFs (Schaefer, STOC 1976). For the general unordered version (where each variable can be picked by either player), we also prove that the problem is PSPACE-complete for 5-CNFs and in P for 2-CNFs. Previously, it was known to be PSPACE-complete for 6-CNFs (Ahlroth and Orponen, MFCS 2012) and PSPACE-complete for positive 11-CNFs (Schaefer, STOC 1976).","PeriodicalId":198744,"journal":{"name":"ACM Transactions on Computation Theory (TOCT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124443752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
ACM Transactions on Computation Theory (TOCT)
全部 Geobiology Appl. Clay Sci. Geochim. Cosmochim. Acta J. Hydrol. Org. Geochem. Carbon Balance Manage. Contrib. Mineral. Petrol. Int. J. Biometeorol. IZV-PHYS SOLID EART+ J. Atmos. Chem. Acta Oceanolog. Sin. Acta Geophys. ACTA GEOL POL ACTA PETROL SIN ACTA GEOL SIN-ENGL AAPG Bull. Acta Geochimica Adv. Atmos. Sci. Adv. Meteorol. Am. J. Phys. Anthropol. Am. J. Sci. Am. Mineral. Annu. Rev. Earth Planet. Sci. Appl. Geochem. Aquat. Geochem. Ann. Glaciol. Archaeol. Anthropol. Sci. ARCHAEOMETRY ARCT ANTARCT ALP RES Asia-Pac. J. Atmos. Sci. ATMOSPHERE-BASEL Atmos. Res. Aust. J. Earth Sci. Atmos. Chem. Phys. Atmos. Meas. Tech. Basin Res. Big Earth Data BIOGEOSCIENCES Geostand. Geoanal. Res. GEOLOGY Geosci. J. Geochem. J. Geochem. Trans. Geosci. Front. Geol. Ore Deposits Global Biogeochem. Cycles Gondwana Res. Geochem. Int. Geol. J. Geophys. Prospect. Geosci. Model Dev. GEOL BELG GROUNDWATER Hydrogeol. J. Hydrol. Earth Syst. Sci. Hydrol. Processes Int. J. Climatol. Int. J. Earth Sci. Int. Geol. Rev. Int. J. Disaster Risk Reduct. Int. J. Geomech. Int. J. Geog. Inf. Sci. Isl. Arc J. Afr. Earth. Sci. J. Adv. Model. Earth Syst. J APPL METEOROL CLIM J. Atmos. Oceanic Technol. J. Atmos. Sol. Terr. Phys. J. Clim. J. Earth Sci. J. Earth Syst. Sci. J. Environ. Eng. Geophys. J. Geog. Sci. Mineral. Mag. Miner. Deposita Mon. Weather Rev. Nat. Hazards Earth Syst. Sci. Nat. Clim. Change Nat. Geosci. Ocean Dyn. Ocean and Coastal Research npj Clim. Atmos. Sci. Ocean Modell. Ocean Sci. Ore Geol. Rev. OCEAN SCI J Paleontol. J. PALAEOGEOGR PALAEOCL PERIOD MINERAL PETROLOGY+ Phys. Chem. Miner. Polar Sci. Prog. Oceanogr. Quat. Sci. Rev. Q. J. Eng. Geol. Hydrogeol. RADIOCARBON Pure Appl. Geophys. Resour. Geol. Rev. Geophys. Sediment. Geol.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1