首页 > 最新文献

Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing最新文献

英文 中文
A (5/3 + ε)-approximation for unsplittable flow on a path: placing small tasks into boxes 路径上不可分割流的(5/3 + ε)近似:将小任务放入盒子中
Pub Date : 2018-06-20 DOI: 10.1145/3188745.3188894
F. Grandoni, Tobias Mömke, Andreas Wiese, Hang Zhou
In the unsplittable flow on a path problem (UFP) we are given a path with edge capacities and a collection of tasks. Each task is characterized by a subpath, a profit, and a demand. Our goal is to compute a maximum profit subset of tasks such that, for each edge e, the total demand of selected tasks that use e does not exceed the capacity of e. The current best polynomial-time approximation factor for this problem is 2+є for any constant є>0 [Anagostopoulos et al.-SODA 2014]. This is the best known factor even in the case of uniform edge capacities [Călinescu et al.-IPCO 2002, TALG 2011]. These results, likewise most prior work, are based on a partition of tasks into large and small depending on their ratio of demand to capacity over their respective edges: these algorithms invoke (1+є)-approximations for large and small tasks separately. The known techniques do not seem to be able to combine a big fraction of large and small tasks together (apart from some special cases and quasi-polynomial-time algorithms). The main contribution of this paper is to overcome this critical barrier. Namely, we present a polynomial-time algorithm that obtains roughly all profit from the optimal large tasks plus one third of the profit from the optimal small tasks. In combination with known results, this implies a polynomial-time (5/3+є)-approximation algorithm for UFP. Our algorithm is based on two main ingredients. First, we prove that there exist certain sub-optimal solutions where, roughly speaking, small tasks are packed into boxes. To prove that such solutions can yield high profit we introduce a horizontal slicing lemma which yields a novel geometric interpretation of certain solutions. The resulting boxed structure has polynomial complexity, hence cannot be guessed directly. Therefore, our second contribution is a dynamic program that guesses this structure (plus a packing of large and small tasks) on the fly, while losing at most one third of the profit of the remaining small tasks.
在路径问题上的不可分割流(UFP)中,我们给出了一条具有边缘容量的路径和一组任务。每个任务都有一个子路径、一个利润和一个需求。我们的目标是计算任务的最大利润子集,这样,对于每个边e,使用e的选定任务的总需求不超过e的容量。对于任何常数_ >0,该问题的当前最佳多项式时间近似因子为2+ _对于任何常数_ >0 [Anagostopoulos et al.-SODA 2014]。即使在统一边缘容量的情况下,这也是最著名的因素[ccillinescu等人- ipco 2002, TALG 2011]。这些结果,类似于大多数先前的工作,是基于将任务划分为大任务和小任务,这取决于它们在各自边缘上的需求与容量的比例:这些算法分别对大任务和小任务调用(1+ _)-近似。已知的技术似乎无法将大任务和小任务的大部分组合在一起(除了一些特殊情况和准多项式时间算法)。本文的主要贡献就是克服了这一关键障碍。也就是说,我们提出了一个多项式时间算法,该算法大致从最优大任务中获得所有利润加上最优小任务的三分之一利润。结合已知结果,这意味着UFP的多项式时间(5/3+ n)近似算法。我们的算法基于两个主要成分。首先,我们证明存在某些次优解,粗略地说,小任务被打包到盒子里。为了证明这样的解可以产生高的利润,我们引入了一个水平切片引理,它产生了对某些解的一种新的几何解释。所得到的盒子结构具有多项式复杂度,因此不能直接猜测。因此,我们的第二个贡献是一个动态程序,它在运行中猜测这个结构(加上大小任务的打包),而最多损失剩余小任务的三分之一的利润。
{"title":"A (5/3 + ε)-approximation for unsplittable flow on a path: placing small tasks into boxes","authors":"F. Grandoni, Tobias Mömke, Andreas Wiese, Hang Zhou","doi":"10.1145/3188745.3188894","DOIUrl":"https://doi.org/10.1145/3188745.3188894","url":null,"abstract":"In the unsplittable flow on a path problem (UFP) we are given a path with edge capacities and a collection of tasks. Each task is characterized by a subpath, a profit, and a demand. Our goal is to compute a maximum profit subset of tasks such that, for each edge e, the total demand of selected tasks that use e does not exceed the capacity of e. The current best polynomial-time approximation factor for this problem is 2+є for any constant є>0 [Anagostopoulos et al.-SODA 2014]. This is the best known factor even in the case of uniform edge capacities [Călinescu et al.-IPCO 2002, TALG 2011]. These results, likewise most prior work, are based on a partition of tasks into large and small depending on their ratio of demand to capacity over their respective edges: these algorithms invoke (1+є)-approximations for large and small tasks separately. The known techniques do not seem to be able to combine a big fraction of large and small tasks together (apart from some special cases and quasi-polynomial-time algorithms). The main contribution of this paper is to overcome this critical barrier. Namely, we present a polynomial-time algorithm that obtains roughly all profit from the optimal large tasks plus one third of the profit from the optimal small tasks. In combination with known results, this implies a polynomial-time (5/3+є)-approximation algorithm for UFP. Our algorithm is based on two main ingredients. First, we prove that there exist certain sub-optimal solutions where, roughly speaking, small tasks are packed into boxes. To prove that such solutions can yield high profit we introduce a horizontal slicing lemma which yields a novel geometric interpretation of certain solutions. The resulting boxed structure has polynomial complexity, hence cannot be guessed directly. Therefore, our second contribution is a dynamic program that guesses this structure (plus a packing of large and small tasks) on the fly, while losing at most one third of the profit of the remaining small tasks.","PeriodicalId":20593,"journal":{"name":"Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87920927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
The art gallery problem is ∃ ℝ-complete 美术馆问题是∃∈完全的
Pub Date : 2018-06-20 DOI: 10.1145/3188745.3188868
Mikkel Abrahamsen, Anna Adamaszek, Tillmann Miltzow
We prove that the art gallery problem is equivalent under polynomial time reductions to deciding whether a system of polynomial equations over the real numbers has a solution. The art gallery problem is a classic problem in computational geometry, introduced in 1973 by Victor Klee. Given a simple polygon P and an integer k, the goal is to decide if there exists a set G of k guards within P such that every point p ∈ P is seen by at least one guard g∈ G. Each guard corresponds to a point in the polygon P, and we say that a guard g sees a point p if the line segment pg is contained in P. The art gallery problem has stimulated extensive research in geometry and in algorithms. However, the complexity status of the art gallery problem has not been resolved. It has long been known that the problem is NP-hard, but no one has been able to show that it lies in NP. Recently, the computational geometry community became more aware of the complexity class ∃ ℝ, which has been studied earlier by other communities. The class ∃ ℝ consists of problems that can be reduced in polynomial time to the problem of deciding whether a system of polynomial equations with integer coefficients and any number of real variables has a solution. It can be easily seen that NP ⊆ ∃ ℝ. We prove that the art gallery problem is ∃ ℝ-complete, implying that (1) any system of polynomial equations over the real numbers can be encoded as an instance of the art gallery problem, and (2) the art gallery problem is not in the complexity class NP unless NP=∃ ℝ. As an illustration of our techniques, we can show that for every compact semi-algebraic set S⊂ [0,1]2 there exists a polygon with rational coordinates that enforces one of the guards to be at any position p∈ S, in any optimal guarding. As a corollary of our construction, we prove that for any real algebraic number α there is an instance of the art gallery problem where one of the coordinates of the guards equals α in any guard set of minimum cardinality. That rules out many natural geometric approaches to the problem, as it shows that any approach based on constructing a finite set of candidate points for placing guards has to include points with coordinates being roots of polynomials with arbitrary degree. In the ∃ ℝ-hardness proof for the art gallery problem we introduce a new ∃ ℝ-complete problem ETR-INV. We believe that this problem is of independent interest, as it can be used to obtain ∃ ℝ-hardness proofs for other problems. In particular, ETR-INV has been very recently used to prove ∃ ℝ-hardness of other geometric problems.
证明了美术馆问题在多项式时间约简下等价于判定实数上的多项式方程组是否有解。美术馆问题是计算几何中的一个经典问题,由Victor Klee于1973年提出。给出一个简单多边形P和整数k,目的是决定是否存在一组G k的警卫在这样每点∈P被至少一个后卫G∈G .每个后卫都对应于一个点在多边形P,和我们说一个警卫G看到点P如果线段pg包含在P .艺术画廊的问题激发了几何领域的广泛研究和算法。然而,美术馆的复杂性现状问题一直没有得到解决。人们早就知道这个问题是NP困难的,但没有人能够证明它是NP困难的。最近,计算几何团体开始更多地意识到其他团体较早研究过的复杂性类∃∈。类∃∈由可以在多项式时间内简化为确定具有整数系数和任意实数变量的多项式方程系统是否有解的问题组成。可以很容易地看出,NP的∃∈。我们证明美术馆问题是∃∈完全的,这意味着(1)任何实数上的多项式方程组都可以被编码为美术馆问题的一个实例,并且(2)美术馆问题不属于复杂度类NP,除非NP=∃。作为对我们技术的一个说明,我们可以证明,对于每一个紧半代数集合S∧[0,1]2,存在一个具有有理坐标的多边形,它使得任意一个守卫在任意位置p∈S,在任意最优守卫中。作为我们构造的一个推论,我们证明了对于任意实数α,存在一个美术馆问题的实例,其中任意最小基数的任意守卫集合中守卫的一个坐标等于α。这排除了许多自然几何方法来解决问题,因为它表明,任何基于构建有限候选点集来放置保护的方法都必须包括坐标为任意次多项式根的点。在美术馆问题的∃∃硬度证明中,我们引入了一个新的∃∃完全问题etri - inv。我们相信这个问题具有独立的意义,因为它可以用来获得其他问题的∃∃-硬度证明。特别是,最近已使用e - inv来证明其他几何问题的∃∃-硬度。
{"title":"The art gallery problem is ∃ ℝ-complete","authors":"Mikkel Abrahamsen, Anna Adamaszek, Tillmann Miltzow","doi":"10.1145/3188745.3188868","DOIUrl":"https://doi.org/10.1145/3188745.3188868","url":null,"abstract":"We prove that the art gallery problem is equivalent under polynomial time reductions to deciding whether a system of polynomial equations over the real numbers has a solution. The art gallery problem is a classic problem in computational geometry, introduced in 1973 by Victor Klee. Given a simple polygon P and an integer k, the goal is to decide if there exists a set G of k guards within P such that every point p ∈ P is seen by at least one guard g∈ G. Each guard corresponds to a point in the polygon P, and we say that a guard g sees a point p if the line segment pg is contained in P. The art gallery problem has stimulated extensive research in geometry and in algorithms. However, the complexity status of the art gallery problem has not been resolved. It has long been known that the problem is NP-hard, but no one has been able to show that it lies in NP. Recently, the computational geometry community became more aware of the complexity class ∃ ℝ, which has been studied earlier by other communities. The class ∃ ℝ consists of problems that can be reduced in polynomial time to the problem of deciding whether a system of polynomial equations with integer coefficients and any number of real variables has a solution. It can be easily seen that NP ⊆ ∃ ℝ. We prove that the art gallery problem is ∃ ℝ-complete, implying that (1) any system of polynomial equations over the real numbers can be encoded as an instance of the art gallery problem, and (2) the art gallery problem is not in the complexity class NP unless NP=∃ ℝ. As an illustration of our techniques, we can show that for every compact semi-algebraic set S⊂ [0,1]2 there exists a polygon with rational coordinates that enforces one of the guards to be at any position p∈ S, in any optimal guarding. As a corollary of our construction, we prove that for any real algebraic number α there is an instance of the art gallery problem where one of the coordinates of the guards equals α in any guard set of minimum cardinality. That rules out many natural geometric approaches to the problem, as it shows that any approach based on constructing a finite set of candidate points for placing guards has to include points with coordinates being roots of polynomials with arbitrary degree. In the ∃ ℝ-hardness proof for the art gallery problem we introduce a new ∃ ℝ-complete problem ETR-INV. We believe that this problem is of independent interest, as it can be used to obtain ∃ ℝ-hardness proofs for other problems. In particular, ETR-INV has been very recently used to prove ∃ ℝ-hardness of other geometric problems.","PeriodicalId":20593,"journal":{"name":"Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90373654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 73
Simulation beats richness: new data-structure lower bounds 模拟胜过丰富:新的数据结构下限
Pub Date : 2018-06-20 DOI: 10.1145/3188745.3188874
A. Chattopadhyay, M. Koucký, B. Loff, Sagnik Mukhopadhyay
We develop a new technique for proving lower bounds in the setting of asymmetric communication, a model that was introduced in the famous works of Miltersen (STOC’94) and Miltersen, Nisan, Safra and Wigderson (STOC’95). At the core of our technique is the first simulation theorem in the asymmetric setting, where Alice gets a p × n matrix x over F2 and Bob gets a vector y ∈ F2n. Alice and Bob need to evaluate f(x· y) for a Boolean function f: {0,1}p → {0,1}. Our simulation theorems show that a deterministic/randomized communication protocol exists for this problem, with cost C· n for Alice and C for Bob, if and only if there exists a deterministic/randomized *parity decision tree* of cost Θ(C) for evaluating f. As applications of this technique, we obtain the following results: 1. The first strong lower-bounds against randomized data-structure schemes for the Vector-Matrix-Vector product problem over F2. Moreover, our method yields strong lower bounds even when the data-structure scheme has tiny advantage over random guessing. 2. The first lower bounds against randomized data-structures schemes for two natural Boolean variants of Orthogonal Vector Counting. 3. We construct an asymmetric communication problem and obtain a deterministic lower-bound for it which is provably better than any lower-bound that may be obtained by the classical Richness Method of Miltersen et al. (STOC ’95). This seems to be the first known limitation of the Richness Method in the context of proving deterministic lower bounds.
我们开发了一种新的技术来证明非对称通信设置中的下界,该模型在Miltersen (STOC ' 94)和Miltersen, Nisan, Safra和Wigderson (STOC ' 95)的着作中引入。我们技术的核心是非对称设置中的第一个模拟定理,其中Alice得到一个p × n矩阵x / F2, Bob得到一个向量y∈F2n。Alice和Bob需要对布尔函数f: {0,1}p→{0,1}求值f(x·y)。我们的模拟定理表明,对于这个问题存在一个确定性/随机通信协议,Alice的成本为C·n, Bob的成本为C,当且仅当存在一个成本为Θ(C)的确定性/随机*奇偶性决策树*来评估f。作为该技术的应用,我们获得了以下结果:F2上向量-矩阵-向量积问题的随机数据结构方案的第一个强下界。此外,即使当数据结构方案比随机猜测具有微小优势时,我们的方法也会产生强大的下界。2. 正交向量计数的两种自然布尔型随机数据结构方案的第一下界。我们构造了一个非对称通信问题,并得到了它的确定性下界,证明它比Miltersen等人(STOC ' 95)的经典丰富度方法得到的任何下界都要好。这似乎是丰富性方法在证明确定性下界方面的第一个已知限制。
{"title":"Simulation beats richness: new data-structure lower bounds","authors":"A. Chattopadhyay, M. Koucký, B. Loff, Sagnik Mukhopadhyay","doi":"10.1145/3188745.3188874","DOIUrl":"https://doi.org/10.1145/3188745.3188874","url":null,"abstract":"We develop a new technique for proving lower bounds in the setting of asymmetric communication, a model that was introduced in the famous works of Miltersen (STOC’94) and Miltersen, Nisan, Safra and Wigderson (STOC’95). At the core of our technique is the first simulation theorem in the asymmetric setting, where Alice gets a p × n matrix x over F2 and Bob gets a vector y ∈ F2n. Alice and Bob need to evaluate f(x· y) for a Boolean function f: {0,1}p → {0,1}. Our simulation theorems show that a deterministic/randomized communication protocol exists for this problem, with cost C· n for Alice and C for Bob, if and only if there exists a deterministic/randomized *parity decision tree* of cost Θ(C) for evaluating f. As applications of this technique, we obtain the following results: 1. The first strong lower-bounds against randomized data-structure schemes for the Vector-Matrix-Vector product problem over F2. Moreover, our method yields strong lower bounds even when the data-structure scheme has tiny advantage over random guessing. 2. The first lower bounds against randomized data-structures schemes for two natural Boolean variants of Orthogonal Vector Counting. 3. We construct an asymmetric communication problem and obtain a deterministic lower-bound for it which is provably better than any lower-bound that may be obtained by the classical Richness Method of Miltersen et al. (STOC ’95). This seems to be the first known limitation of the Richness Method in the context of proving deterministic lower bounds.","PeriodicalId":20593,"journal":{"name":"Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80442511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
The query complexity of graph isomorphism: bypassing distribution testing lower bounds 图同构的查询复杂度:绕过分布测试下界
Pub Date : 2018-06-20 DOI: 10.1145/3188745.3188952
Krzysztof Onak, Xiaorui Sun
We study the query complexity of graph isomorphism in the property testing model for dense graphs. We give an algorithm that makes n1+o(1) queries, improving on the previous best bound of Õ(n5/4). Since the problem is known to require Ω(n) queries, our algorithm is optimal up to a subpolynomial factor. While trying to extend a known connection to distribution testing, discovered by Fischer and Matsliah (SICOMP 2008), one encounters a natural obstacle presented by sampling lower bounds such as the Ω(n2/3)-sample lower bound for distribution closeness testing (Valiant, SICOMP 2011). In the context of graph isomorphism testing, these bounds lead to an n1+Ω(1) barrier for Fischer and Matsliah’s approach. We circumvent this and other limitations by exploiting a geometric representation of the connectivity of vertices. An approximate representation of similarities between vertices can be learned with a near-linear number of queries and allows relaxed versions of sampling and distribution testing problems to be solved more efficiently.
研究了密集图属性检验模型中图同构的查询复杂度问题。我们给出了一个算法,使n1+o(1)个查询,改进了先前的最佳界Õ(n5/4)。由于已知问题需要Ω(n)个查询,因此我们的算法在次多项式因子范围内是最优的。当试图将Fischer和Matsliah (SICOMP 2008)发现的已知连接扩展到分布测试时,人们会遇到一个自然障碍,即采样下界,例如分布紧密性测试的Ω(n2/3)样本下界(Valiant, SICOMP 2011)。在图同构检验的背景下,这些界限导致Fischer和Matsliah的方法存在n1+Ω(1)障碍。我们通过利用顶点连通性的几何表示来规避这个限制和其他限制。顶点之间相似性的近似表示可以通过近似线性的查询次数来学习,并允许更有效地解决抽样和分布测试问题的宽松版本。
{"title":"The query complexity of graph isomorphism: bypassing distribution testing lower bounds","authors":"Krzysztof Onak, Xiaorui Sun","doi":"10.1145/3188745.3188952","DOIUrl":"https://doi.org/10.1145/3188745.3188952","url":null,"abstract":"We study the query complexity of graph isomorphism in the property testing model for dense graphs. We give an algorithm that makes n1+o(1) queries, improving on the previous best bound of Õ(n5/4). Since the problem is known to require Ω(n) queries, our algorithm is optimal up to a subpolynomial factor. While trying to extend a known connection to distribution testing, discovered by Fischer and Matsliah (SICOMP 2008), one encounters a natural obstacle presented by sampling lower bounds such as the Ω(n2/3)-sample lower bound for distribution closeness testing (Valiant, SICOMP 2011). In the context of graph isomorphism testing, these bounds lead to an n1+Ω(1) barrier for Fischer and Matsliah’s approach. We circumvent this and other limitations by exploiting a geometric representation of the connectivity of vertices. An approximate representation of similarities between vertices can be learned with a near-linear number of queries and allows relaxed versions of sampling and distribution testing problems to be solved more efficiently.","PeriodicalId":20593,"journal":{"name":"Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75514335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Explicit binary tree codes with polylogarithmic size alphabet 显式二叉树代码与多对数大小的字母表
Pub Date : 2018-06-20 DOI: 10.1145/3188745.3188928
Gil Cohen, Bernhard Haeupler, L. Schulman
This paper makes progress on the problem of explicitly constructing a binary tree code with constant distance and constant alphabet size. We give an explicit binary tree code with constant distance and alphabet size poly(logn), where n is the depth of the tree. This is the first improvement over a two-decade-old construction that has an exponentially larger alphabet of size poly(n). At the core of our construction is the first explicit tree code with constant rate and constant distance, though with non-constant arity - a result of independent interest. This construction adapts the polynomial interpolation framework to the online setting.
本文在显式构造具有等距离和等字母大小的二叉树码问题上取得了进展。我们给出了一个明确的二叉树代码,具有恒定的距离和字母表大小poly(logn),其中n是树的深度。这是对20年前的结构的第一次改进,该结构具有大小为poly(n)的指数级较大的字母表。我们构建的核心是第一个具有恒定速率和恒定距离的显式树代码,尽管具有非恒定的密度-这是独立兴趣的结果。这种结构使多项式插值框架适应于在线设置。
{"title":"Explicit binary tree codes with polylogarithmic size alphabet","authors":"Gil Cohen, Bernhard Haeupler, L. Schulman","doi":"10.1145/3188745.3188928","DOIUrl":"https://doi.org/10.1145/3188745.3188928","url":null,"abstract":"This paper makes progress on the problem of explicitly constructing a binary tree code with constant distance and constant alphabet size. We give an explicit binary tree code with constant distance and alphabet size poly(logn), where n is the depth of the tree. This is the first improvement over a two-decade-old construction that has an exponentially larger alphabet of size poly(n). At the core of our construction is the first explicit tree code with constant rate and constant distance, though with non-constant arity - a result of independent interest. This construction adapts the polynomial interpolation framework to the online setting.","PeriodicalId":20593,"journal":{"name":"Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76468554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Circuit lower bounds for nondeterministic quasi-polytime: an easy witness lemma for NP and NQP 不确定拟多时的电路下界:NP和NQP的一个简单的证明引理
Pub Date : 2018-06-20 DOI: 10.1145/3188745.3188910
Cody Murray, Richard Ryan Williams
We prove that if every problem in NP has nk-size circuits for a fixed constant k, then for every NP-verifier and every yes-instance x of length n for that verifier, the verifier’s search space has an nO(k3)-size witness circuit: a witness for x that can be encoded with a circuit of only nO(k3) size. An analogous statement is proved for nondeterministic quasi-polynomial time, i.e., NQP = NTIME[nlogO(1) n]. This significantly extends the Easy Witness Lemma of Impagliazzo, Kabanets, and Wigderson [JCSS’02] which only held for larger nondeterministic classes such as NEXP. As a consequence, the connections between circuit-analysis algorithms and circuit lower bounds can be considerably sharpened: algorithms for approximately counting satisfying assignments to given circuits which improve over exhaustive search can imply circuit lower bounds for functions in NQP or even NP. To illustrate, applying known algorithms for satisfiability of ACC ∘ THR circuits [R. Williams, STOC 2014] we conclude that for every fixed k, NQP does not have nlogk n-size ACC ∘ THR circuits.
我们证明,如果NP中的每个问题对于固定常数k都有nk大小的电路,那么对于该验证者的每个NP-验证者和每个长度为n的yes-instance x,验证者的搜索空间具有nO(k3)大小的见证电路:x的见证电路可以用nO(k3)大小的电路编码。对于非确定性拟多项式时间,证明了一个类似的命题,即NQP = NTIME[nlogO(1) n]。这大大扩展了Impagliazzo, Kabanets和Wigderson [JCSS ' 02]的Easy Witness引理,该引理仅适用于较大的不确定性类,如NEXP。因此,电路分析算法和电路下界之间的联系可以大大加强:对于给定电路的近似计数满足分配的算法,它优于穷举搜索,可以暗示NQP甚至NP中的函数的电路下界。为了说明,应用已知算法求解ACC°THR电路的可满足性[R]。我们得出结论,对于每一个固定k, NQP没有nlogn个大小的ACC°THR电路。
{"title":"Circuit lower bounds for nondeterministic quasi-polytime: an easy witness lemma for NP and NQP","authors":"Cody Murray, Richard Ryan Williams","doi":"10.1145/3188745.3188910","DOIUrl":"https://doi.org/10.1145/3188745.3188910","url":null,"abstract":"We prove that if every problem in NP has nk-size circuits for a fixed constant k, then for every NP-verifier and every yes-instance x of length n for that verifier, the verifier’s search space has an nO(k3)-size witness circuit: a witness for x that can be encoded with a circuit of only nO(k3) size. An analogous statement is proved for nondeterministic quasi-polynomial time, i.e., NQP = NTIME[nlogO(1) n]. This significantly extends the Easy Witness Lemma of Impagliazzo, Kabanets, and Wigderson [JCSS’02] which only held for larger nondeterministic classes such as NEXP. As a consequence, the connections between circuit-analysis algorithms and circuit lower bounds can be considerably sharpened: algorithms for approximately counting satisfying assignments to given circuits which improve over exhaustive search can imply circuit lower bounds for functions in NQP or even NP. To illustrate, applying known algorithms for satisfiability of ACC ∘ THR circuits [R. Williams, STOC 2014] we conclude that for every fixed k, NQP does not have nlogk n-size ACC ∘ THR circuits.","PeriodicalId":20593,"journal":{"name":"Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82722130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
Breaking the circuit-size barrier in secret sharing 打破电路大小的秘密共享障碍
Pub Date : 2018-06-20 DOI: 10.1145/3188745.3188936
Tianren Liu, V. Vaikuntanathan
We study secret sharing schemes for general (non-threshold) access structures. A general secret sharing scheme for n parties is associated to a monotone function F:{0,1}n→{0,1}. In such a scheme, a dealer distributes shares of a secret s among n parties. Any subset of parties T ⊆ [n] should be able to put together their shares and reconstruct the secret s if F(T)=1, and should have no information about s if F(T)=0. One of the major long-standing questions in information-theoretic cryptography is to minimize the (total) size of the shares in a secret-sharing scheme for arbitrary monotone functions F. There is a large gap between lower and upper bounds for secret sharing. The best known scheme for general F has shares of size 2n−o(n), but the best lower bound is Ω(n2/logn). Indeed, the exponential share size is a direct result of the fact that in all known secret-sharing schemes, the share size grows with the size of a circuit (or formula, or monotone span program) for F. Indeed, several researchers have suggested the existence of a representation size barrier which implies that the right answer is closer to the upper bound, namely, 2n−o(n). In this work, we overcome this barrier by constructing a secret sharing scheme for any access structure with shares of size 20.994n and a linear secret sharing scheme for any access structure with shares of size 20.999n. As a contribution of independent interest, we also construct a secret sharing scheme with shares of size 2Õ(√n) for 2n n/2 monotone access structures, out of a total of 2n n/2· (1+O(logn/n)) of them. Our construction builds on recent works that construct better protocols for the conditional disclosure of secrets (CDS) problem.
我们研究了一般(非阈值)访问结构的秘密共享方案。一个通用的n方秘密共享方案与单调函数F:{0,1}n→{0,1}相关联。在这种方案中,一个交易商将秘密股份分配给n个参与方。各方T的任何子集[n]应能将其股份组合起来,在F(T)=1时重构出秘密s,在F(T)=0时不知道秘密s。对于任意单调函数f,如何使秘密共享方案中共享的(总)大小最小是信息论密码学中一个长期存在的主要问题。秘密共享的下界和上界之间存在很大的差距。对于一般F,最著名的方案是2n−o(n),但最好的下界是Ω(n2/logn)。事实上,指数份额大小是一个事实的直接结果,在所有已知的秘密共享方案中,份额大小随着f的电路(或公式,或单调跨度程序)的大小而增长。实际上,一些研究人员已经提出存在一个表示大小障碍,这意味着正确答案更接近上界,即2n−o(n)。在这项工作中,我们通过构建一个用于任何访问结构的秘密共享方案和一个用于任何访问结构的线性秘密共享方案来克服这一障碍,共享大小为20.994n。作为独立兴趣的贡献,我们还构建了一个共享大小为2Õ(√n)的秘密共享方案,用于2n个n/2个单调访问结构,其中共有2n个n/2·(1+O(logn/n))。我们的构建基于最近的工作,这些工作为有条件的秘密披露(CDS)问题构建了更好的协议。
{"title":"Breaking the circuit-size barrier in secret sharing","authors":"Tianren Liu, V. Vaikuntanathan","doi":"10.1145/3188745.3188936","DOIUrl":"https://doi.org/10.1145/3188745.3188936","url":null,"abstract":"We study secret sharing schemes for general (non-threshold) access structures. A general secret sharing scheme for n parties is associated to a monotone function F:{0,1}n→{0,1}. In such a scheme, a dealer distributes shares of a secret s among n parties. Any subset of parties T ⊆ [n] should be able to put together their shares and reconstruct the secret s if F(T)=1, and should have no information about s if F(T)=0. One of the major long-standing questions in information-theoretic cryptography is to minimize the (total) size of the shares in a secret-sharing scheme for arbitrary monotone functions F. There is a large gap between lower and upper bounds for secret sharing. The best known scheme for general F has shares of size 2n−o(n), but the best lower bound is Ω(n2/logn). Indeed, the exponential share size is a direct result of the fact that in all known secret-sharing schemes, the share size grows with the size of a circuit (or formula, or monotone span program) for F. Indeed, several researchers have suggested the existence of a representation size barrier which implies that the right answer is closer to the upper bound, namely, 2n−o(n). In this work, we overcome this barrier by constructing a secret sharing scheme for any access structure with shares of size 20.994n and a linear secret sharing scheme for any access structure with shares of size 20.999n. As a contribution of independent interest, we also construct a secret sharing scheme with shares of size 2Õ(√n) for 2n n/2 monotone access structures, out of a total of 2n n/2· (1+O(logn/n)) of them. Our construction builds on recent works that construct better protocols for the conditional disclosure of secrets (CDS) problem.","PeriodicalId":20593,"journal":{"name":"Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89976606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
Improved pseudorandomness for unordered branching programs through local monotonicity 利用局部单调性改进无序分支程序的伪随机性
Pub Date : 2018-06-20 DOI: 10.1145/3188745.3188800
Eshan Chattopadhyay, P. Hatami, Omer Reingold, Avishay Tal
We present an explicit pseudorandom generator with seed length Õ((logn)w+1) for read-once, oblivious, width w branching programs that can read their input bits in any order. This improves upon the work of Impagliazzo, Meka and Zuckerman (FOCS’12) where they required seed length n1/2+o(1). A central ingredient in our work is the following bound that we prove on the Fourier spectrum of branching programs. For any width w read-once, oblivious branching program B:{0,1}n→ {0,1}, any k ∈ {1,…,n}, [complex formula not displayed] This settles a conjecture posed by Reingold, Steinke and Vadhan (RANDOM’13). Our analysis crucially uses a notion of local monotonicity on the edge labeling of the branching program. We carry critical parts of our proof under the assumption of local monotonicity and show how to deduce our results for unrestricted branching programs.
我们提出了一个显式伪随机生成器,其种子长度为Õ((logn)w+1),用于读取一次,无关的,宽度为w的分支程序,可以以任何顺序读取其输入位。这改进了Impagliazzo, Meka和Zuckerman (FOCS ' 12)的工作,他们要求种子长度为n1/2+o(1)。我们工作中的一个核心成分是我们在分支程序的傅立叶谱上证明的下一个界。对于任意宽度w读一次,无关分支程序B:{0,1}n→{0,1},任意k∈{1,…,n},[复公式未显示],这解决了Reingold, Steinke和Vadhan (RANDOM ' 13)提出的一个猜想。我们的分析关键是在分支程序的边缘标记上使用了局部单调性的概念。我们在局部单调假设下给出了证明的关键部分,并给出了如何推导出无限制分支规划的结果。
{"title":"Improved pseudorandomness for unordered branching programs through local monotonicity","authors":"Eshan Chattopadhyay, P. Hatami, Omer Reingold, Avishay Tal","doi":"10.1145/3188745.3188800","DOIUrl":"https://doi.org/10.1145/3188745.3188800","url":null,"abstract":"We present an explicit pseudorandom generator with seed length Õ((logn)w+1) for read-once, oblivious, width w branching programs that can read their input bits in any order. This improves upon the work of Impagliazzo, Meka and Zuckerman (FOCS’12) where they required seed length n1/2+o(1). A central ingredient in our work is the following bound that we prove on the Fourier spectrum of branching programs. For any width w read-once, oblivious branching program B:{0,1}n→ {0,1}, any k ∈ {1,…,n}, [complex formula not displayed] This settles a conjecture posed by Reingold, Steinke and Vadhan (RANDOM’13). Our analysis crucially uses a notion of local monotonicity on the edge labeling of the branching program. We carry critical parts of our proof under the assumption of local monotonicity and show how to deduce our results for unrestricted branching programs.","PeriodicalId":20593,"journal":{"name":"Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86203928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Monotone circuit lower bounds from resolution 单调电路的下界从分辨率
Pub Date : 2018-06-20 DOI: 10.1145/3188745.3188838
A. Garg, Mika Göös, Pritish Kamath, Dmitry Sokolov
For any unsatisfiable CNF formula F that is hard to refute in the Resolution proof system, we show that a gadget-composed version of F is hard to refute in any proof system whose lines are computed by efficient communication protocols—or, equivalently, that a monotone function associated with F has large monotone circuit complexity. Our result extends to monotone real circuits, which yields new lower bounds for the Cutting Planes proof system.
对于在分辨率证明系统中难以反驳的任何不满足的CNF公式F,我们证明了在任何由有效通信协议计算线路的证明系统中难以反驳一个由小工具组成的F版本-或者,等价地,与F相关的单调函数具有较大的单调电路复杂度。我们的结果推广到单调实电路中,为切面证明系统提供了新的下界。
{"title":"Monotone circuit lower bounds from resolution","authors":"A. Garg, Mika Göös, Pritish Kamath, Dmitry Sokolov","doi":"10.1145/3188745.3188838","DOIUrl":"https://doi.org/10.1145/3188745.3188838","url":null,"abstract":"For any unsatisfiable CNF formula F that is hard to refute in the Resolution proof system, we show that a gadget-composed version of F is hard to refute in any proof system whose lines are computed by efficient communication protocols—or, equivalently, that a monotone function associated with F has large monotone circuit complexity. Our result extends to monotone real circuits, which yields new lower bounds for the Cutting Planes proof system.","PeriodicalId":20593,"journal":{"name":"Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84827207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
Nonlinear dimension reduction via outer Bi-Lipschitz extensions 通过外Bi-Lipschitz扩展的非线性降维
Pub Date : 2018-06-20 DOI: 10.1145/3188745.3188828
S. Mahabadi, K. Makarychev, Yury Makarychev, Ilya P. Razenshteyn
We introduce and study the notion of *an outer bi-Lipschitz extension* of a map between Euclidean spaces. The notion is a natural analogue of the notion of *a Lipschitz extension* of a Lipschitz map. We show that for every map f there exists an outer bi-Lipschitz extension f′ whose distortion is greater than that of f by at most a constant factor. This result can be seen as a counterpart of the classic Kirszbraun theorem for outer bi-Lipschitz extensions. We also study outer bi-Lipschitz extensions of near-isometric maps and show upper and lower bounds for them. Then, we present applications of our results to prioritized and terminal dimension reduction problems, described next. We prove a *prioritized* variant of the Johnson–Lindenstrauss lemma: given a set of points X⊂ ℝd of size N and a permutation (”priority ranking”) of X, there exists an embedding f of X into ℝO(logN) with distortion O(loglogN) such that the point of rank j has only O(log3 + ε j) non-zero coordinates – more specifically, all but the first O(log3+ε j) coordinates are equal to 0; the distortion of f restricted to the first j points (according to the ranking) is at most O(loglogj). The result makes a progress towards answering an open question by Elkin, Filtser, and Neiman about prioritized dimension reductions. We prove that given a set X of N points in ℜd, there exists a *terminal* dimension reduction embedding of ℝd into ℝd′, where d′ = O(logN/ε4), which preserves distances ||x−y|| between points x∈ X and y ∈ ℝd, up to a multiplicative factor of 1 ± ε. This improves a recent result by Elkin, Filtser, and Neiman. The dimension reductions that we obtain are nonlinear, and this nonlinearity is necessary.
引入并研究了欧几里德空间间映射的外bi-Lipschitz扩展的概念。这个概念是李普希茨映射的李普希茨扩展的一个自然类比。我们证明了对于每一个映射f存在一个外双利普希茨扩展f ',它的畸变比f的畸变大一个常数因子。这个结果可以看作是经典柯兹布劳恩定理对应物的外双利普希茨扩展。我们还研究了近等距映射的外bi-Lipschitz扩展,并给出了它们的上界和下界。然后,我们将我们的结果应用于优先级和终端降维问题,下面将进行描述。我们证明了Johnson-Lindenstrauss引理的一个*优先化的*变体:给定大小为N的点集合X∧∈(N)和X的置换(“优先级排序”),存在一个以O(loggn)畸变将f (X)嵌入到0 (logN)中,使得秩为j的点只有O(log3+ε j)个非零坐标——更具体地说,除了第一个O(log3+ε j)坐标外,其他所有坐标都等于0;限制在前j个点(根据排序)的f的失真不超过O(loglogj)。这个结果在回答Elkin、Filtser和Neiman提出的关于优先降维的开放性问题方面取得了进展。我们证明了给定一个由N个点组成的集合X,存在一个*终端*降维嵌入到∈d '中,其中d ' = O(logN/ε4),使得点X∈X与y∈λ d之间的距离保持在1±ε范围内。这改进了Elkin, Filtser和Neiman最近的结果。我们得到的降维是非线性的,这种非线性是必要的。
{"title":"Nonlinear dimension reduction via outer Bi-Lipschitz extensions","authors":"S. Mahabadi, K. Makarychev, Yury Makarychev, Ilya P. Razenshteyn","doi":"10.1145/3188745.3188828","DOIUrl":"https://doi.org/10.1145/3188745.3188828","url":null,"abstract":"We introduce and study the notion of *an outer bi-Lipschitz extension* of a map between Euclidean spaces. The notion is a natural analogue of the notion of *a Lipschitz extension* of a Lipschitz map. We show that for every map f there exists an outer bi-Lipschitz extension f′ whose distortion is greater than that of f by at most a constant factor. This result can be seen as a counterpart of the classic Kirszbraun theorem for outer bi-Lipschitz extensions. We also study outer bi-Lipschitz extensions of near-isometric maps and show upper and lower bounds for them. Then, we present applications of our results to prioritized and terminal dimension reduction problems, described next. We prove a *prioritized* variant of the Johnson–Lindenstrauss lemma: given a set of points X⊂ ℝd of size N and a permutation (”priority ranking”) of X, there exists an embedding f of X into ℝO(logN) with distortion O(loglogN) such that the point of rank j has only O(log3 + ε j) non-zero coordinates – more specifically, all but the first O(log3+ε j) coordinates are equal to 0; the distortion of f restricted to the first j points (according to the ranking) is at most O(loglogj). The result makes a progress towards answering an open question by Elkin, Filtser, and Neiman about prioritized dimension reductions. We prove that given a set X of N points in ℜd, there exists a *terminal* dimension reduction embedding of ℝd into ℝd′, where d′ = O(logN/ε4), which preserves distances ||x−y|| between points x∈ X and y ∈ ℝd, up to a multiplicative factor of 1 ± ε. This improves a recent result by Elkin, Filtser, and Neiman. The dimension reductions that we obtain are nonlinear, and this nonlinearity is necessary.","PeriodicalId":20593,"journal":{"name":"Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87407417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
期刊
Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1