首页 > 最新文献

Proceedings of the forty-seventh annual ACM symposium on Theory of Computing最新文献

英文 中文
Lp Row Sampling by Lewis Weights 用Lewis权值进行Lp行抽样
Pub Date : 2015-06-14 DOI: 10.1145/2746539.2746567
Michael B. Cohen, Richard Peng
We give a simple algorithm to efficiently sample the rows of a matrix while preserving the p-norms of its product with vectors. Given an n * d matrix A, we find with high probability and in input sparsity time an A' consisting of about d log d rescaled rows of A such that |Ax|1 is close to |A'x|1 for all vectors x. We also show similar results for all Lp that give nearly optimal sample bounds in input sparsity time. Our results are based on sampling by "Lewis weights", which can be viewed as statistical leverage scores of a reweighted matrix. We also give an elementary proof of the guarantees of this sampling process for L1.
我们给出了一个简单的算法来有效地采样矩阵的行,同时保持其与向量乘积的p范数。给定一个n * d矩阵A,我们在输入稀疏时间内高概率地发现A'由大约d log d重新缩放的A行组成,使得对所有向量x来说|Ax|1都接近|A'x|1。我们也展示了所有Lp的类似结果,在输入稀疏时间内给出了几乎最优的样本边界。我们的结果是基于“刘易斯权重”的抽样,这可以看作是一个重新加权矩阵的统计杠杆分数。对于L1,我们也给出了这个抽样过程的保证的初等证明。
{"title":"Lp Row Sampling by Lewis Weights","authors":"Michael B. Cohen, Richard Peng","doi":"10.1145/2746539.2746567","DOIUrl":"https://doi.org/10.1145/2746539.2746567","url":null,"abstract":"We give a simple algorithm to efficiently sample the rows of a matrix while preserving the p-norms of its product with vectors. Given an n * d matrix A, we find with high probability and in input sparsity time an A' consisting of about d log d rescaled rows of A such that |Ax|1 is close to |A'x|1 for all vectors x. We also show similar results for all Lp that give nearly optimal sample bounds in input sparsity time. Our results are based on sampling by \"Lewis weights\", which can be viewed as statistical leverage scores of a reweighted matrix. We also give an elementary proof of the guarantees of this sampling process for L1.","PeriodicalId":20566,"journal":{"name":"Proceedings of the forty-seventh annual ACM symposium on Theory of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73837868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 93
Analysis of a Classical Matrix Preconditioning Algorithm 一种经典矩阵预处理算法分析
Pub Date : 2015-06-14 DOI: 10.1145/2746539.2746556
L. Schulman, A. Sinclair
We study a classical iterative algorithm for the problem of balancing matrices in the L∞ norm via a scaling transformation. This algorithm, which goes back to Osborne and Parlett & Reinsch in the 1960s, is implemented as a standard preconditioner in many numerical linear algebra packages. Surprisingly, despite its widespread use over several decades, no bounds were known on its rate of convergence. In this paper we prove that, for a large class of irreducible n x n (real or complex) input matrices~$A$, a natural variant of the algorithm converges in O(n3 log(nρ/ε)) elementary balancing operations, where ρ measures the initial imbalance of A and ε is the target imbalance of the output matrix. (The imbalance of A is maxi |log(aiout/aiin)|, where aiout,aiin are the maximum entries in magnitude in the ith row and column respectively.) This bound is tight up to the log n factor. A balancing operation scales the ith row and column so that their maximum entries are equal, and requires O(m/n) arithmetic operations on average, where m is the number of non-zero elements in A. Thus the running time of the iterative algorithm is ~O(n2m). This is the first time bound of any kind on any variant of the Osborne-Parlett-Reinsch algorithm. The class of matrices for which the above analysis holds are those which satisfy a condition we call Unique Balance, meaning that the limit of the iterative balancing process does not depend on the order in which balancing operations are performed. We also prove a combinatorial characterization of the Unique Balance property, which had earlier been conjectured by Chen.
通过尺度变换,研究了L∞范数上矩阵平衡问题的一种经典迭代算法。该算法可以追溯到20世纪60年代的Osborne和Parlett & Reinsch,在许多数值线性代数软件包中作为标准前置条件实现。令人惊讶的是,尽管它被广泛使用了几十年,但它的收敛速度没有已知的界限。本文证明了对于一大类不可约n × n(实数或复数)输入矩阵~$ a $,该算法的一个自然变式收敛于O(n3 log(nρ/ε))初等平衡运算,其中ρ表示a的初始失衡,ε表示输出矩阵的目标失衡。(A的不平衡是maxi |log(aiout/aiin)|,其中aiout,aiin分别是第i行和第i列中最大的大小条目。)这个边界紧到log n。平衡操作对第i行和第i列进行缩放,使它们的最大条目相等,平均需要O(m/n)次算术运算,其中m为A中非零元素的个数,因此迭代算法的运行时间为~O(n2m)。这是osborn - parlett - reinsch算法的任何变体上的任何类型的第一个时间界限。上述分析成立的一类矩阵是那些满足我们称为唯一平衡的条件的矩阵,这意味着迭代平衡过程的极限不依赖于执行平衡操作的顺序。我们还证明了Chen先前猜想的唯一平衡性质的一个组合表征。
{"title":"Analysis of a Classical Matrix Preconditioning Algorithm","authors":"L. Schulman, A. Sinclair","doi":"10.1145/2746539.2746556","DOIUrl":"https://doi.org/10.1145/2746539.2746556","url":null,"abstract":"We study a classical iterative algorithm for the problem of balancing matrices in the L∞ norm via a scaling transformation. This algorithm, which goes back to Osborne and Parlett & Reinsch in the 1960s, is implemented as a standard preconditioner in many numerical linear algebra packages. Surprisingly, despite its widespread use over several decades, no bounds were known on its rate of convergence. In this paper we prove that, for a large class of irreducible n x n (real or complex) input matrices~$A$, a natural variant of the algorithm converges in O(n3 log(nρ/ε)) elementary balancing operations, where ρ measures the initial imbalance of A and ε is the target imbalance of the output matrix. (The imbalance of A is maxi |log(aiout/aiin)|, where aiout,aiin are the maximum entries in magnitude in the ith row and column respectively.) This bound is tight up to the log n factor. A balancing operation scales the ith row and column so that their maximum entries are equal, and requires O(m/n) arithmetic operations on average, where m is the number of non-zero elements in A. Thus the running time of the iterative algorithm is ~O(n2m). This is the first time bound of any kind on any variant of the Osborne-Parlett-Reinsch algorithm. The class of matrices for which the above analysis holds are those which satisfy a condition we call Unique Balance, meaning that the limit of the iterative balancing process does not depend on the order in which balancing operations are performed. We also prove a combinatorial characterization of the Unique Balance property, which had earlier been conjectured by Chen.","PeriodicalId":20566,"journal":{"name":"Proceedings of the forty-seventh annual ACM symposium on Theory of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80116157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Test-and-Set in Optimal Space 最优空间中的测试集
Pub Date : 2015-06-14 DOI: 10.1145/2746539.2746627
George Giakkoupis, Maryam Helmi, L. Higham, Philipp Woelfel
The test-and-set object is a fundamental synchronization primitive for shared memory systems. This paper addresses the number of registers (supporting atomic reads and writes) required to implement a one-shot test-and-set object in the standard asynchronous shared memory model with n processes. The best lower bound is log n - 1 [12,21] for obstruction-free and deadlock-free implementations, and recently a deterministic obstruction-free implementation using O(√ n) registers was presented [11]. This paper closes the gap between these existing upper and lower bounds by presenting a deterministic obstruction-free implementation of a one-shot test-and-set object from Θ(log n) registers of size Θ(log n) bits. Combining our obstruction-free algorithm with techniques from previous research [11,12], we also obtain a randomized wait-free test-and-set algorithm from Θ(log n) registers, with expected step-complexity Θ(log* n) against the oblivious adversary. The core tool in our algorithm is the implementation of a deterministic obstruction-free sifter object, using only 6 registers. If k processes access a sifter, then when they have terminated, at least one and at most ⌊(2k+1)/3⌋ processes return "win" and all others return "lose".
test-and-set对象是共享内存系统的基本同步原语。本文讨论了在具有n个进程的标准异步共享内存模型中实现一次测试和设置对象所需的寄存器(支持原子读和写)的数量。无阻塞和无死锁实现的最佳下界是log n- 1[12,21],最近提出了一种使用O(√n)寄存器的确定性无阻塞实现[11]。本文通过从大小为Θ(log n)位的Θ(log n)寄存器中提供一次性测试和设置对象的确定性无障碍实现,缩小了这些现有上界和下界之间的差距。将我们的无阻碍算法与先前研究[11,12]的技术相结合,我们还从Θ(log n)寄存器中获得了一种随机的无等待测试集算法,其预期步长复杂度为Θ(log* n)。我们算法的核心工具是实现一个确定性的无阻碍筛选对象,仅使用6个寄存器。如果k个进程访问一个筛子,则当它们终止时,至少有一个且最多⌊(2k+1)/3⌋进程返回“赢”,其他所有进程返回“输”。
{"title":"Test-and-Set in Optimal Space","authors":"George Giakkoupis, Maryam Helmi, L. Higham, Philipp Woelfel","doi":"10.1145/2746539.2746627","DOIUrl":"https://doi.org/10.1145/2746539.2746627","url":null,"abstract":"The test-and-set object is a fundamental synchronization primitive for shared memory systems. This paper addresses the number of registers (supporting atomic reads and writes) required to implement a one-shot test-and-set object in the standard asynchronous shared memory model with n processes. The best lower bound is log n - 1 [12,21] for obstruction-free and deadlock-free implementations, and recently a deterministic obstruction-free implementation using O(√ n) registers was presented [11]. This paper closes the gap between these existing upper and lower bounds by presenting a deterministic obstruction-free implementation of a one-shot test-and-set object from Θ(log n) registers of size Θ(log n) bits. Combining our obstruction-free algorithm with techniques from previous research [11,12], we also obtain a randomized wait-free test-and-set algorithm from Θ(log n) registers, with expected step-complexity Θ(log* n) against the oblivious adversary. The core tool in our algorithm is the implementation of a deterministic obstruction-free sifter object, using only 6 registers. If k processes access a sifter, then when they have terminated, at least one and at most ⌊(2k+1)/3⌋ processes return \"win\" and all others return \"lose\".","PeriodicalId":20566,"journal":{"name":"Proceedings of the forty-seventh annual ACM symposium on Theory of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87946182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Matching Triangles and Basing Hardness on an Extremely Popular Conjecture 匹配三角形和基于硬度的一个非常流行的猜想
Pub Date : 2015-06-14 DOI: 10.1145/2746539.2746594
Amir Abboud, V. V. Williams, Huacheng Yu
Due to the lack of unconditional polynomial lower bounds, it is now in fashion to prove conditional lower bounds in order to advance our understanding of the class P. The vast majority of these lower bounds are based on one of three famous hypotheses: the 3-SUM conjecture, the APSP conjecture, and the Strong Exponential Time Hypothesis. Only circumstantial evidence is known in support of these hypotheses, and no formal relationship between them is known. In hopes of obtaining "less conditional" and therefore more reliable lower bounds, we consider the conjecture that at least one of the above three hypotheses is true. We design novel reductions from 3-SUM, APSP, and CNF-SAT, and derive interesting consequences of this very plausible conjecture, including: Tight n3-o(1) lower bounds for purely-combinatorial problems about the triangles in unweighted graphs. New n1-o(1) lower bounds for the amortized update and query times of dynamic algorithms for single-source reachability, strongly connected components, and Max-Flow. New n1.5-o(1) lower bound for computing a set of n st-maximum-flow values in a directed graph with n nodes and ~O(n) edges. There is a hierarchy of natural graph problems on n nodes with complexity nc for c ∈ (2,3). Only slightly non-trivial consequences of this conjecture were known prior to our work. Along the way we also obtain new conditional lower bounds for the Single-Source-Max-Flow problem.
由于缺乏无条件多项式下界,现在流行证明条件下界,以提高我们对p类的理解。这些下界中的绝大多数是基于三个著名的假设之一:3-SUM猜想,APSP猜想和强指数时间假设。只有已知的间接证据支持这些假设,它们之间没有正式的关系。为了得到“条件更少”从而更可靠的下界,我们考虑上述三个假设中至少有一个为真的猜想。我们从3-SUM, APSP和CNF-SAT设计了新的约简,并得出了这个非常合理的猜想的有趣结果,包括:关于无加权图中三角形的纯组合问题的紧密n3-o(1)下界。单源可达性、强连接组件和Max-Flow的动态算法的平摊更新和查询次数的新n1-o(1)下界。新的n1.5-o(1)下界,用于计算n个节点~O(n)条边的有向图的n个st-maximum-flow值集。对于c∈(2,3),存在n个节点上的自然图问题的层次结构,其复杂度为nc。在我们工作之前,人们只知道这个猜想的一些不重要的结果。在此过程中,我们还得到了单源最大流问题的新的条件下界。
{"title":"Matching Triangles and Basing Hardness on an Extremely Popular Conjecture","authors":"Amir Abboud, V. V. Williams, Huacheng Yu","doi":"10.1145/2746539.2746594","DOIUrl":"https://doi.org/10.1145/2746539.2746594","url":null,"abstract":"Due to the lack of unconditional polynomial lower bounds, it is now in fashion to prove conditional lower bounds in order to advance our understanding of the class P. The vast majority of these lower bounds are based on one of three famous hypotheses: the 3-SUM conjecture, the APSP conjecture, and the Strong Exponential Time Hypothesis. Only circumstantial evidence is known in support of these hypotheses, and no formal relationship between them is known. In hopes of obtaining \"less conditional\" and therefore more reliable lower bounds, we consider the conjecture that at least one of the above three hypotheses is true. We design novel reductions from 3-SUM, APSP, and CNF-SAT, and derive interesting consequences of this very plausible conjecture, including: Tight n3-o(1) lower bounds for purely-combinatorial problems about the triangles in unweighted graphs. New n1-o(1) lower bounds for the amortized update and query times of dynamic algorithms for single-source reachability, strongly connected components, and Max-Flow. New n1.5-o(1) lower bound for computing a set of n st-maximum-flow values in a directed graph with n nodes and ~O(n) edges. There is a hierarchy of natural graph problems on n nodes with complexity nc for c ∈ (2,3). Only slightly non-trivial consequences of this conjecture were known prior to our work. Along the way we also obtain new conditional lower bounds for the Single-Source-Max-Flow problem.","PeriodicalId":20566,"journal":{"name":"Proceedings of the forty-seventh annual ACM symposium on Theory of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82731559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 119
Unifying and Strengthening Hardness for Dynamic Problems via the Online Matrix-Vector Multiplication Conjecture 基于在线矩阵-向量乘法猜想统一和增强动态问题的硬度
Pub Date : 2015-06-14 DOI: 10.1145/2746539.2746609
M. Henzinger, Sebastian Krinninger, Danupon Nanongkai, Thatchaphol Saranurak
Consider the following Online Boolean Matrix-Vector Multiplication problem: We are given an n x n matrix M and will receive n column-vectors of size n, denoted by v1, ..., vn, one by one. After seeing each vector vi, we have to output the product Mvi before we can see the next vector. A naive algorithm can solve this problem using O(n3) time in total, and its running time can be slightly improved to O(n3/log2 n) [Williams SODA'07]. We show that a conjecture that there is no truly subcubic (O(n3-ε)) time algorithm for this problem can be used to exhibit the underlying polynomial time hardness shared by many dynamic problems. For a number of problems, such as subgraph connectivity, Pagh's problem, d-failure connectivity, decremental single-source shortest paths, and decremental transitive closure, this conjecture implies tight hardness results. Thus, proving or disproving this conjecture will be very interesting as it will either imply several tight unconditional lower bounds or break through a common barrier that blocks progress with these problems. This conjecture might also be considered as strong evidence against any further improvement for these problems since refuting it will imply a major breakthrough for combinatorial Boolean matrix multiplication and other long-standing problems if the term "combinatorial algorithms" is interpreted as "Strassen-like algorithms" [Ballard et al. SPAA'11]. The conjecture also leads to hardness results for problems that were previously based on diverse problems and conjectures -- such as 3SUM, combinatorial Boolean matrix multiplication, triangle detection, and multiphase -- thus providing a uniform way to prove polynomial hardness results for dynamic algorithms; some of the new proofs are also simpler or even become trivial. The conjecture also leads to stronger and new, non-trivial, hardness results, e.g., for the fully-dynamic densest subgraph and diameter problems.
考虑下面的在线布尔矩阵向量乘法问题:我们给定一个n × n矩阵M,并将得到n个大小为n的列向量,记为v1,…, vn,一个接一个。在看到每个向量vi之后,我们必须在看到下一个向量之前输出乘积Mvi。一种朴素算法可以用总共O(n3)时间来解决这个问题,其运行时间可以略微提高到O(n3/log2 n) [Williams SODA'07]。我们证明了这个问题不存在真正的次三次(O(n3-ε))时间算法的猜想可以用来展示许多动态问题所共有的多项式时间硬度。对于许多问题,如子图连通性、Pagh问题、d-failure连通性、递减单源最短路径和递减传递闭包,这个猜想意味着紧硬度结果。因此,证明或反驳这个猜想将是非常有趣的,因为它要么暗示了几个严格的无条件下界,要么突破了阻碍这些问题进展的常见障碍。这一猜想也可能被认为是反对进一步改进这些问题的有力证据,因为反驳它将意味着组合布尔矩阵乘法和其他长期存在的问题的重大突破,如果术语“组合算法”被解释为“Strassen-like算法”[Ballard et al]。SPAA 11]。该猜想还导致以前基于不同问题和猜想的问题的硬度结果-例如3SUM,组合布尔矩阵乘法,三角形检测和多相-从而为证明动态算法的多项式硬度结果提供了统一的方法;一些新的证明也更简单,甚至变得微不足道。该猜想还导致更强的和新的,非平凡的,硬度的结果,例如,对于全动态密度子图和直径问题。
{"title":"Unifying and Strengthening Hardness for Dynamic Problems via the Online Matrix-Vector Multiplication Conjecture","authors":"M. Henzinger, Sebastian Krinninger, Danupon Nanongkai, Thatchaphol Saranurak","doi":"10.1145/2746539.2746609","DOIUrl":"https://doi.org/10.1145/2746539.2746609","url":null,"abstract":"Consider the following Online Boolean Matrix-Vector Multiplication problem: We are given an n x n matrix M and will receive n column-vectors of size n, denoted by v1, ..., vn, one by one. After seeing each vector vi, we have to output the product Mvi before we can see the next vector. A naive algorithm can solve this problem using O(n3) time in total, and its running time can be slightly improved to O(n3/log2 n) [Williams SODA'07]. We show that a conjecture that there is no truly subcubic (O(n3-ε)) time algorithm for this problem can be used to exhibit the underlying polynomial time hardness shared by many dynamic problems. For a number of problems, such as subgraph connectivity, Pagh's problem, d-failure connectivity, decremental single-source shortest paths, and decremental transitive closure, this conjecture implies tight hardness results. Thus, proving or disproving this conjecture will be very interesting as it will either imply several tight unconditional lower bounds or break through a common barrier that blocks progress with these problems. This conjecture might also be considered as strong evidence against any further improvement for these problems since refuting it will imply a major breakthrough for combinatorial Boolean matrix multiplication and other long-standing problems if the term \"combinatorial algorithms\" is interpreted as \"Strassen-like algorithms\" [Ballard et al. SPAA'11]. The conjecture also leads to hardness results for problems that were previously based on diverse problems and conjectures -- such as 3SUM, combinatorial Boolean matrix multiplication, triangle detection, and multiphase -- thus providing a uniform way to prove polynomial hardness results for dynamic algorithms; some of the new proofs are also simpler or even become trivial. The conjecture also leads to stronger and new, non-trivial, hardness results, e.g., for the fully-dynamic densest subgraph and diameter problems.","PeriodicalId":20566,"journal":{"name":"Proceedings of the forty-seventh annual ACM symposium on Theory of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76768309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 257
Online Submodular Welfare Maximization: Greedy Beats 1/2 in Random Order 在线次模块福利最大化:贪婪在随机顺序中击败1/2
Pub Date : 2015-06-14 DOI: 10.1145/2746539.2746626
Nitish Korula, V. Mirrokni, Morteza Zadimoghaddam
In the Submodular Welfare Maximization (SWM) problem, the input consists of a set of n items, each of which must be allocated to one of m agents. Each agent l has a valuation function vl, where vl(S) denotes the welfare obtained by this agent if she receives the set of items S. The functions vl are all submodular; as is standard, we assume that they are monotone and vl(∅) = 0. The goal is to partition the items into m disjoint subsets S1, S2, ... Sm in order to maximize the social welfare, defined as ∑l = 1m vl(Sl). A simple greedy algorithm gives a 1/2-approximation to SWM in the offline setting, and this was the best known until Vondrak's recent (1-1/e)-approximation algorithm [34]. In this paper, we consider the online version of SWM. Here, items arrive one at a time in an online manner; when an item arrives, the algorithm must make an irrevocable decision about which agent to assign it to before seeing any subsequent items. This problem is motivated by applications to Internet advertising, where user ad impressions must be allocated to advertisers whose value is a submodular function of the set of users / impressions they receive. There are two natural models that differ in the order in which items arrive. In the fully adversarial setting, an adversary can construct an arbitrary / worst-case instance, as well as pick the order in which items arrive in order to minimize the algorithm's performance. In this setting, the 1/2-competitive greedy algorithm is the best possible. To improve on this, one must weaken the adversary slightly: In the random order model, the adversary can construct a worst-case set of items and valuations, but does not control the order in which the items arrive; instead, they are assumed to arrive in a random order. The random order model has been well studied for online SWM and various special cases, but the best known competitive ratio (even for several special cases) is 1/2 + 1/n [9,10], barely better than the ratio for the adversarial order. Obtaining a competitive ratio of 1/2 + Ω(1) for the random order model has been an important open problem for several years. We solve this open problem by demonstrating that the greedy algorithm has a competitive ratio of at least 0.505 for online SWM in the random order model. This is the first result showing a competitive ratio bounded above 1/2 in the random order model, even for special cases such as the weighted matching or budgeted allocation problems (without the so-called 'large capacity' assumptions). For special cases of submodular functions including weighted matching, weighted coverage functions and a broader class of "second-order supermodular" functions, we provide a different analysis that gives a competitive ratio of 0.51. We analyze the greedy algorithm using a factor-revealing linear program, bounding how the assignment of one item can decrease potential welfare from assigning future items. We also formulate a natural conjecture which, if true, would improve the
在次模块福利最大化(Submodular Welfare Maximization, SWM)问题中,输入由一组n个项目组成,每个项目必须分配给m个代理中的一个。每个智能体l都有一个评估函数vl,其中vl(S)表示该智能体在接收项目S集合时所获得的福利。函数vl均为子模;作为标准,我们假定它们是单调的,且vl(∅)= 0。目标是将项目划分为m个不相交的子集S1, S2,…Sm以社会福利最大化,定义为∑l = 1m vl(Sl)。一个简单的贪心算法给出了离线环境下SWM的1/2近似,这是在Vondrak最近的(1-1/e)近似算法之前最著名的算法[34]。在本文中,我们考虑在线版本的SWM。在这里,物品以在线方式一次送达一件;当物品到达时,算法必须在看到任何后续物品之前,对将其分配给哪个代理做出不可撤销的决定。这个问题是由互联网广告的应用程序引起的,在互联网广告中,用户广告印象必须分配给广告商,广告商的价值是他们收到的用户/印象集的子模块函数。在物品到达的顺序上有两种不同的自然模型。在完全对抗的环境中,对手可以构建任意/最坏情况的实例,以及选择物品到达的顺序,以最小化算法的性能。在这种情况下,1/2竞争贪婪算法是最好的。为了改进这一点,我们必须稍微削弱对手:在随机顺序模型中,对手可以构建最坏情况下的物品和估值集合,但不能控制物品到达的顺序;相反,假设它们以随机顺序到达。随机顺序模型已经在在线SWM和各种特殊情况下得到了很好的研究,但最著名的竞争比(即使是在几个特殊情况下)是1/2 + 1/n[9,10],略好于对抗顺序的比率。获得1/2 + Ω(1)的随机排序模型的竞争比是多年来一个重要的开放问题。我们通过证明贪婪算法在随机顺序模型下对在线SWM具有至少0.505的竞争比来解决这个开放问题。这是在随机顺序模型中第一个显示竞争比率大于1/2的结果,即使对于特殊情况,如加权匹配或预算分配问题(没有所谓的“大容量”假设)也是如此。对于子模函数的特殊情况,包括加权匹配函数、加权覆盖函数和更广泛的一类“二阶超模”函数,我们提供了一个不同的分析,给出了0.51的竞争比。我们使用因子揭示线性规划分析贪婪算法,限定分配一个项目如何减少分配未来项目的潜在福利。我们还提出了一个自然猜想,如果成立,将贪婪算法的竞争比提高到至少0.567。除了我们在线SWM的新竞争比率之外,我们还做出了两个进一步的贡献:首先,我们定义了二阶模、超模和次模函数的类别,它们可能对次模优化有独立的兴趣。其次,我们通过一种称为增益线性化的技术获得了一个改进的竞争比,这在其他情况下可能很有用(见[26]):本质上,我们通过将最优解的增益划分为单个元素的增益来线性化子模块函数,在将一个元素分配给最优解的增益时比较增益,并且,至关重要的是,绑定分配元素对其他元素潜在增益的影响程度。
{"title":"Online Submodular Welfare Maximization: Greedy Beats 1/2 in Random Order","authors":"Nitish Korula, V. Mirrokni, Morteza Zadimoghaddam","doi":"10.1145/2746539.2746626","DOIUrl":"https://doi.org/10.1145/2746539.2746626","url":null,"abstract":"In the Submodular Welfare Maximization (SWM) problem, the input consists of a set of n items, each of which must be allocated to one of m agents. Each agent l has a valuation function vl, where vl(S) denotes the welfare obtained by this agent if she receives the set of items S. The functions vl are all submodular; as is standard, we assume that they are monotone and vl(∅) = 0. The goal is to partition the items into m disjoint subsets S1, S2, ... Sm in order to maximize the social welfare, defined as ∑l = 1m vl(Sl). A simple greedy algorithm gives a 1/2-approximation to SWM in the offline setting, and this was the best known until Vondrak's recent (1-1/e)-approximation algorithm [34]. In this paper, we consider the online version of SWM. Here, items arrive one at a time in an online manner; when an item arrives, the algorithm must make an irrevocable decision about which agent to assign it to before seeing any subsequent items. This problem is motivated by applications to Internet advertising, where user ad impressions must be allocated to advertisers whose value is a submodular function of the set of users / impressions they receive. There are two natural models that differ in the order in which items arrive. In the fully adversarial setting, an adversary can construct an arbitrary / worst-case instance, as well as pick the order in which items arrive in order to minimize the algorithm's performance. In this setting, the 1/2-competitive greedy algorithm is the best possible. To improve on this, one must weaken the adversary slightly: In the random order model, the adversary can construct a worst-case set of items and valuations, but does not control the order in which the items arrive; instead, they are assumed to arrive in a random order. The random order model has been well studied for online SWM and various special cases, but the best known competitive ratio (even for several special cases) is 1/2 + 1/n [9,10], barely better than the ratio for the adversarial order. Obtaining a competitive ratio of 1/2 + Ω(1) for the random order model has been an important open problem for several years. We solve this open problem by demonstrating that the greedy algorithm has a competitive ratio of at least 0.505 for online SWM in the random order model. This is the first result showing a competitive ratio bounded above 1/2 in the random order model, even for special cases such as the weighted matching or budgeted allocation problems (without the so-called 'large capacity' assumptions). For special cases of submodular functions including weighted matching, weighted coverage functions and a broader class of \"second-order supermodular\" functions, we provide a different analysis that gives a competitive ratio of 0.51. We analyze the greedy algorithm using a factor-revealing linear program, bounding how the assignment of one item can decrease potential welfare from assigning future items. We also formulate a natural conjecture which, if true, would improve the ","PeriodicalId":20566,"journal":{"name":"Proceedings of the forty-seventh annual ACM symposium on Theory of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74847207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 69
Random Permutations using Switching Networks 使用交换网络的随机排列
Pub Date : 2015-06-14 DOI: 10.1145/2746539.2746629
A. Czumaj
We consider the problem of designing a simple, oblivious scheme to generate (almost) random permutations. We use the concept of switching networks and show that almost every switching network of logarithmic depth can be used to almost randomly permute any set of (1-ε) n elements with any ε > 0 (that is, gives an almost (1-ε) n$-wise independent permutation). Furthermore, we show that the result still holds for every switching network of logarithmic depth that has some special expansion properties, leading to an explicit construction of such networks. Our result can be also extended to an explicit construction of a switching network of depth O(log2n) and with O(n log n) switches that almost randomly permutes any set of n elements. We also discuss basic applications of these results in cryptography. Our results are obtained using a non-trivial coupling approach to study mixing times of Markov chains which allows us to reduce the problem to some random walk-like problem on expanders.
我们考虑的问题是设计一个简单的,不经意的方案,以产生(几乎)随机排列。我们使用交换网络的概念,并证明了几乎每一个对数深度的交换网络都可以用来几乎随机地排列任何ε > 0的(1-ε) n个元素的集合(即给出了一个几乎(1-ε) n$明智的独立排列)。此外,我们证明了该结果仍然适用于具有某些特殊扩展性质的对数深度交换网络,从而导致此类网络的显式构造。我们的结果也可以推广到一个深度为O(log2n)且具有O(n log n)个开关的交换网络的显式构造,该交换网络几乎随机地排列任何n个元素的集合。我们还讨论了这些结果在密码学中的基本应用。用非平凡耦合方法研究了马尔可夫链的混合时间,从而使问题简化为展开式上的随机行走问题。
{"title":"Random Permutations using Switching Networks","authors":"A. Czumaj","doi":"10.1145/2746539.2746629","DOIUrl":"https://doi.org/10.1145/2746539.2746629","url":null,"abstract":"We consider the problem of designing a simple, oblivious scheme to generate (almost) random permutations. We use the concept of switching networks and show that almost every switching network of logarithmic depth can be used to almost randomly permute any set of (1-ε) n elements with any ε > 0 (that is, gives an almost (1-ε) n$-wise independent permutation). Furthermore, we show that the result still holds for every switching network of logarithmic depth that has some special expansion properties, leading to an explicit construction of such networks. Our result can be also extended to an explicit construction of a switching network of depth O(log2n) and with O(n log n) switches that almost randomly permutes any set of n elements. We also discuss basic applications of these results in cryptography. Our results are obtained using a non-trivial coupling approach to study mixing times of Markov chains which allows us to reduce the problem to some random walk-like problem on expanders.","PeriodicalId":20566,"journal":{"name":"Proceedings of the forty-seventh annual ACM symposium on Theory of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88580477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Rectangles Are Nonnegative Juntas 矩形是非负的集合
Pub Date : 2015-06-14 DOI: 10.1145/2746539.2746596
Mika Göös, Shachar Lovett, R. Meka, Thomas Watson, David Zuckerman
We develop a new method to prove communication lower bounds for composed functions of the form f o gn where f is any boolean function on n inputs and g is a sufficiently "hard" two-party gadget. Our main structure theorem states that each rectangle in the communication matrix of f o gn can be simulated by a nonnegative combination of juntas. This is the strongest yet formalization for the intuition that each low-communication randomized protocol can only "query" few inputs of f as encoded by the gadget g. Consequently, we characterize the communication complexity of f o gn in all known one-sided zero-communication models by a corresponding query complexity measure of f. These models in turn capture important lower bound techniques such as corruption, smooth rectangle bound, relaxed partition bound, and extended discrepancy. As applications, we resolve several open problems from prior work: We show that SBPcc (a class characterized by corruption) is not closed under intersection. An immediate corollary is that MAcc ≠ SBPcc. These results answer questions of Klauck (CCC 2003) and Bohler et al. (JCSS 2006). We also show that approximate nonnegative rank of partial boolean matrices does not admit efficient error reduction. This answers a question of Kol et al. (ICALP) for partial matrices.
我们提出了一种新的方法来证明形式为fgn的组合函数的通信下界,其中f是n个输入上的任意布尔函数,g是一个足够“硬”的两方小函数。我们的主要结构定理表明,fgn的通信矩阵中的每个矩形都可以用一个非负的组合来模拟。这是直觉上最强的形式,每个低通信随机协议只能“查询”由小部件g编码的f的少数输入。因此,我们通过相应的f的查询复杂度度量来表征所有已知的片面零通信模型中f的通信复杂度。这些模型反过来捕获重要的下界技术,如破坏,光滑矩形界,松弛分区界和扩展差异。作为应用程序,我们解决了先前工作中的几个开放问题:我们证明了SBPcc(一个以腐败为特征的类)在交叉下不是封闭的。一个直接的推论是MAcc≠SBPcc。这些结果回答了Klauck (CCC 2003)和Bohler等人(JCSS 2006)的问题。我们还证明了部分布尔矩阵的近似非负秩不能有效地减小误差。这回答了Kol等人(ICALP)关于部分矩阵的问题。
{"title":"Rectangles Are Nonnegative Juntas","authors":"Mika Göös, Shachar Lovett, R. Meka, Thomas Watson, David Zuckerman","doi":"10.1145/2746539.2746596","DOIUrl":"https://doi.org/10.1145/2746539.2746596","url":null,"abstract":"We develop a new method to prove communication lower bounds for composed functions of the form f o gn where f is any boolean function on n inputs and g is a sufficiently \"hard\" two-party gadget. Our main structure theorem states that each rectangle in the communication matrix of f o gn can be simulated by a nonnegative combination of juntas. This is the strongest yet formalization for the intuition that each low-communication randomized protocol can only \"query\" few inputs of f as encoded by the gadget g. Consequently, we characterize the communication complexity of f o gn in all known one-sided zero-communication models by a corresponding query complexity measure of f. These models in turn capture important lower bound techniques such as corruption, smooth rectangle bound, relaxed partition bound, and extended discrepancy. As applications, we resolve several open problems from prior work: We show that SBPcc (a class characterized by corruption) is not closed under intersection. An immediate corollary is that MAcc ≠ SBPcc. These results answer questions of Klauck (CCC 2003) and Bohler et al. (JCSS 2006). We also show that approximate nonnegative rank of partial boolean matrices does not admit efficient error reduction. This answers a question of Kol et al. (ICALP) for partial matrices.","PeriodicalId":20566,"journal":{"name":"Proceedings of the forty-seventh annual ACM symposium on Theory of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87300295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 108
An Improved Version of the Random-Facet Pivoting Rule for the Simplex Algorithm 单纯形算法中随机面旋转规则的改进版本
Pub Date : 2015-06-14 DOI: 10.1145/2746539.2746557
Thomas Dueholm Hansen, Uri Zwick
The Random-Facet pivoting rule of Kalai and of Matousek, Sharir and Welzl is an elegant randomized pivoting rule for the simplex algorithm, the classical combinatorial algorithm for solving linear programs (LPs). The expected number of pivoting steps performed by the simplex algorithm when using this rule, on any linear program involving n inequalities in d variables, is 2O(√{(n-d),log({d}/{√{n-d}}},), where log n=max{1,log n}. A dual version of the algorithm performs an expected number of at most 2O(√{d,log({(n-d)}/√d},) dual pivoting steps. This dual version is currently the fastest known combinatorial algorithm for solving general linear programs. Kalai also obtained a primal pivoting rule which performs an expected number of at most 2O(√d,log n) pivoting steps. We present an improved version of Kalai's pivoting rule for which the expected number of primal pivoting steps is at most min{2O(√(n-d),log(d/(n-d),)},2O(√{d,log((n-d)/d}},)}. This seemingly modest improvement is interesting for at least two reasons. First, the improved bound for the number of primal pivoting steps is better than the previous bounds for both the primal and dual pivoting steps. There is no longer any need to consider a dual version of the algorithm. Second, in the important case in which n=O(d), i.e., the number of linear inequalities is linear in the number of variables, the expected running time becomes 2O(√d) rather than 2O(√d log d). Our results, which extend previous results of Gartner, apply not only to LP problems, but also to LP-type problems, supplying in particular slightly improved algorithms for solving 2-player turn-based stochastic games and related problems.
Kalai和Matousek, Sharir和Welzl的Random-Facet枢轴规则是求解线性规划(lp)的经典组合算法单纯形算法的一个优雅的随机枢轴规则。当使用此规则时,单纯形算法在涉及d个变量的n个不等式的任何线性规划上执行的期望旋转步骤数为2O(√{(n-d),log({d}/{√{n-d}}},),其中log n=max{1,log n}。该算法的双版本执行最多20(√{d,log({(n-d)}/√d},)双旋转步骤的期望次数。这种对偶算法是目前已知的求解一般线性规划的最快的组合算法。Kalai还获得了一个原始的旋转规则,该规则执行最多20(√d,log n)个旋转步骤的期望次数。我们提出了Kalai枢轴规则的改进版本,其中原始枢轴步骤的期望数最多为最小{2O(√(n-d),log(d/(n-d),)},2O(√{d,log((n-d)/d}},)}。这种看似温和的改善至少有两个有趣的原因。首先,改进的原始旋转步数边界优于原始旋转步数和双旋转步数边界。不再需要考虑算法的双重版本。其次,在n=O(d)的重要情况下,即线性不等式的数量与变量的数量呈线性关系,预期运行时间变为2O(√d)而不是2O(√d log d)。我们的结果扩展了Gartner之前的结果,不仅适用于LP问题,也适用于LP类型的问题,特别提供了稍微改进的算法来解决2人回合制随机博弈和相关问题。
{"title":"An Improved Version of the Random-Facet Pivoting Rule for the Simplex Algorithm","authors":"Thomas Dueholm Hansen, Uri Zwick","doi":"10.1145/2746539.2746557","DOIUrl":"https://doi.org/10.1145/2746539.2746557","url":null,"abstract":"The Random-Facet pivoting rule of Kalai and of Matousek, Sharir and Welzl is an elegant randomized pivoting rule for the simplex algorithm, the classical combinatorial algorithm for solving linear programs (LPs). The expected number of pivoting steps performed by the simplex algorithm when using this rule, on any linear program involving n inequalities in d variables, is 2O(√{(n-d),log({d}/{√{n-d}}},), where log n=max{1,log n}. A dual version of the algorithm performs an expected number of at most 2O(√{d,log({(n-d)}/√d},) dual pivoting steps. This dual version is currently the fastest known combinatorial algorithm for solving general linear programs. Kalai also obtained a primal pivoting rule which performs an expected number of at most 2O(√d,log n) pivoting steps. We present an improved version of Kalai's pivoting rule for which the expected number of primal pivoting steps is at most min{2O(√(n-d),log(d/(n-d),)},2O(√{d,log((n-d)/d}},)}. This seemingly modest improvement is interesting for at least two reasons. First, the improved bound for the number of primal pivoting steps is better than the previous bounds for both the primal and dual pivoting steps. There is no longer any need to consider a dual version of the algorithm. Second, in the important case in which n=O(d), i.e., the number of linear inequalities is linear in the number of variables, the expected running time becomes 2O(√d) rather than 2O(√d log d). Our results, which extend previous results of Gartner, apply not only to LP problems, but also to LP-type problems, supplying in particular slightly improved algorithms for solving 2-player turn-based stochastic games and related problems.","PeriodicalId":20566,"journal":{"name":"Proceedings of the forty-seventh annual ACM symposium on Theory of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86336083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
The communication complexity of interleaved group products 交错群产品的通信复杂性
Pub Date : 2015-06-14 DOI: 10.1145/2746539.2746560
T. Gowers, Emanuele Viola
Alice receives a tuple (a1,...,at) of t elements from the group G = SL(2,q). Bob similarly receives a tuple of t elements (b1,...,bt). They are promised that the interleaved product prodi ≤ t ai bi equals to either g and h, for two fixed elements g,h ∈ G. Their task is to decide which is the case. We show that for every t ≥ 2 communication Ω(t log |G|) is required, even for randomized protocols achieving only an advantage ε = |G|-Ω(t) over random guessing. This bound is tight, improves on the previous lower bound of Ω(t), and answers a question of Miles and Viola (STOC 2013). An extension of our result to 8-party number-on-forehead protocols would suffice for their intended application to leakage-resilient circuits. Our communication bound is equivalent to the assertion that if (a1,...,at) and (b1,...,bt) are sampled uniformly from large subsets A and B of Gt then their interleaved product is nearly uniform over G = SL(2,q). This extends results by Gowers (Combinatorics, Probability & Computing, 2008) and by Babai, Nikolov, and Pyber (SODA 2008) corresponding to the independent case where A and B are product sets. We also obtain an alternative proof of their result that the product of three independent, high-entropy elements of G is nearly uniform. Unlike the previous proofs, ours does not rely on representation theory.
Alice收到一个元组(a1,…,at),包含来自组G = SL(2,q)的t个元素。Bob同样收到一个包含t个元素的元组(b1,…,bt)。给定两个固定元素g,h∈g,交错积product≤tbi等于g和h,他们的任务是决定哪一个是正确的。我们表明,对于每个t≥2通信Ω(t log |G|)是必需的,即使随机协议只实现ε = |G|-Ω(t)优于随机猜测。这个边界很紧,改进了之前Ω(t)的下界,并回答了Miles和Viola (STOC 2013)的问题。将我们的结果扩展到8方额上数字协议将足以满足其用于防漏电路的预期应用。我们的通信界等价于这样的断言:如果(a1,…,at)和(b1,…,bt)从Gt的大子集A和B中均匀采样,则它们的交错积在G = SL(2,q)上几乎均匀。这扩展了Gowers (Combinatorics, Probability & Computing, 2008)和Babai, Nikolov和Pyber (SODA 2008)的结果,这些结果对应于A和B是乘积集的独立情况。我们还得到了他们的结果的另一种证明,即G的三个独立的高熵元素的积几乎是均匀的。与之前的证明不同,我们的证明并不依赖于表征理论。
{"title":"The communication complexity of interleaved group products","authors":"T. Gowers, Emanuele Viola","doi":"10.1145/2746539.2746560","DOIUrl":"https://doi.org/10.1145/2746539.2746560","url":null,"abstract":"Alice receives a tuple (a1,...,at) of t elements from the group G = SL(2,q). Bob similarly receives a tuple of t elements (b1,...,bt). They are promised that the interleaved product prodi ≤ t ai bi equals to either g and h, for two fixed elements g,h ∈ G. Their task is to decide which is the case. We show that for every t ≥ 2 communication Ω(t log |G|) is required, even for randomized protocols achieving only an advantage ε = |G|-Ω(t) over random guessing. This bound is tight, improves on the previous lower bound of Ω(t), and answers a question of Miles and Viola (STOC 2013). An extension of our result to 8-party number-on-forehead protocols would suffice for their intended application to leakage-resilient circuits. Our communication bound is equivalent to the assertion that if (a1,...,at) and (b1,...,bt) are sampled uniformly from large subsets A and B of Gt then their interleaved product is nearly uniform over G = SL(2,q). This extends results by Gowers (Combinatorics, Probability & Computing, 2008) and by Babai, Nikolov, and Pyber (SODA 2008) corresponding to the independent case where A and B are product sets. We also obtain an alternative proof of their result that the product of three independent, high-entropy elements of G is nearly uniform. Unlike the previous proofs, ours does not rely on representation theory.","PeriodicalId":20566,"journal":{"name":"Proceedings of the forty-seventh annual ACM symposium on Theory of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76527505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
期刊
Proceedings of the forty-seventh annual ACM symposium on Theory of Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1