首页 > 最新文献

Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing最新文献

英文 中文
Why prices need algorithms (invited talk) 为什么价格需要算法(特邀演讲)
Pub Date : 2017-06-19 DOI: 10.1145/3055399.3079077
T. Roughgarden, Inbal Talgam-Cohen
Computational complexity has already had plenty to say about the computation of economic equilibria. However, understanding when equilibria are guaranteed to exist is a central theme in economic theory, seemingly unrelated to computation. In this talk we survey our main results presented at EC'15, which show that the existence of equilibria in markets is inextricably connected to the computational complexity of related optimization problems, such as revenue or welfare maximization. We demonstrate how this relationship implies, under suitable complexity assumptions, a host of impossibility results. We also suggest a complexity-theoretic explanation for the lack of useful extensions of the Walrasian equilibrium concept: such extensions seem to require the invention of novel polynomial-time algorithms for welfare maximization.
关于经济均衡的计算,计算复杂性已经说了很多。然而,理解均衡何时保证存在是经济理论的中心主题,似乎与计算无关。在这次演讲中,我们将调查我们在EC'15上提出的主要结果,这些结果表明,市场均衡的存在与相关优化问题(如收入或福利最大化)的计算复杂性密不可分。我们证明了在适当的复杂性假设下,这种关系如何暗示了许多不可能的结果。对于瓦尔拉斯均衡概念缺乏有用的扩展,我们还提出了一种复杂性理论解释:这种扩展似乎需要发明新的多项式时间算法来实现福利最大化。
{"title":"Why prices need algorithms (invited talk)","authors":"T. Roughgarden, Inbal Talgam-Cohen","doi":"10.1145/3055399.3079077","DOIUrl":"https://doi.org/10.1145/3055399.3079077","url":null,"abstract":"Computational complexity has already had plenty to say about the computation of economic equilibria. However, understanding when equilibria are guaranteed to exist is a central theme in economic theory, seemingly unrelated to computation. In this talk we survey our main results presented at EC'15, which show that the existence of equilibria in markets is inextricably connected to the computational complexity of related optimization problems, such as revenue or welfare maximization. We demonstrate how this relationship implies, under suitable complexity assumptions, a host of impossibility results. We also suggest a complexity-theoretic explanation for the lack of useful extensions of the Walrasian equilibrium concept: such extensions seem to require the invention of novel polynomial-time algorithms for welfare maximization.","PeriodicalId":20615,"journal":{"name":"Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing","volume":"85 1-2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79782326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A polynomial restriction lemma with applications 一个多项式限制引理及其应用
Pub Date : 2017-06-19 DOI: 10.1145/3055399.3055470
Valentine Kabanets, D. Kane, Zhenjian Lu
A polynomial threshold function (PTF) of degree d is a boolean function of the form f=sgn(p), where p is a degree-d polynomial, and sgn is the sign function. The main result of the paper is an almost optimal bound on the probability that a random restriction of a PTF is not close to a constant function, where a boolean function g is called δ-close to constant if, for some vε{1,-1}, we have g(x)=v for all but at most δ fraction of inputs. We show for every PTF f of degree d≥ 1, and parameters 0<δ, r≤ 1/16, that Pr∾ Rr [fρ is not δ-close to constant] ≤ √ #183;(logr-1· logδ-1)O(d2), where ρ ∾ Rr is a random restriction leaving each variable, independently, free with probability r, and otherwise assigning it 1 or -1 uniformly at random. In fact, we show a more general result for random block restrictions: given an arbitrary partitioning of input variables into m blocks, a random block restriction picks a uniformly random block ℓΕ [m] and assigns 1 or -1, uniformly at random, to all variable outside the chosen block ℓ. We prove the Block Restriction Lemma saying that a PTF f of degree d becomes δ-close to constant when hit with a random block restriction, except with probability at most m-1/2 #183; (logm#183; logδ-1)O(d2). As an application of our Restriction Lemma, we prove lower bounds against constant-depth circuits with PTF gates of any degree 1≤ d≪ √logn/loglogn, generalizing the recent bounds against constant-depth circuits with linear threshold gates (LTF gates) proved by Kane and Williams (STOC, 2016) and Chen, Santhanam, and Srinivasan (CCC, 2016). In particular, we show that there is an n-variate boolean function Fn Ε P such that every depth-2 circuit with PTF gates of degree d≥ 1 that computes Fn must have at least (n3/2+1/d)#183; (logn)-O(d2) wires. For constant depths greater than 2, we also show average-case lower bounds for such circuits with super-linear number of wires. These are the first super-linear bounds on the number of wires for circuits with PTF gates. We also give short proofs of the optimal-exponent average sensitivity bound for degree-d PTFs due to Kane (Computational Complexity, 2014), and the Littlewood-Offord type anticoncentration bound for degree-d multilinear polynomials due to Meka, Nguyen, and Vu (Theory of Computing, 2016). Finally, we give derandomized versions of our Block Restriction Lemma and Littlewood-Offord type anticoncentration bounds, using a pseudorandom generator for PTFs due to Meka and Zuckerman (SICOMP, 2013).
d次的多项式阈值函数(PTF)是形式为f=sgn(p)的布尔函数,其中p是d次多项式,sgn是符号函数。本文的主要结果是一个关于PTF的随机约束不接近常数函数的概率的几乎最优界,其中布尔函数g被称为δ-接近常数,如果对于某些vε{1,-1},我们有g(x)=v,除了最多δ分数的输入。我们表明,对于每一个d度≥1,参数0<δ, r≤1/16的PTF f, Pr≈Rr [fρ不是δ-接近常数]≤√#183;(log -1·logδ-1)O(d2),其中ρ≈Rr是一个随机限制,使每个变量独立地以概率r自由,否则随机地均匀分配1或-1。事实上,我们展示了随机块限制的一个更一般的结果:给定输入变量的任意划分为m个块,随机块限制选择一个均匀随机块,并将1或-1均匀随机地分配给所选块之外的所有变量。Ε [m]我们证明了块限制引理,即d次的PTF f在被随机块限制击中时,除了概率不超过m-1/2 #183外,变得δ-接近常数;(logm # 183;日志δ1)O (d2)。作为我们的限制引理的应用,我们证明了具有任意阶1≤d≪√logn/loglogn的PTF门的定深电路的下界,推广了最近由Kane和Williams (STOC, 2016)以及Chen、Santhanam和Srinivasan (CCC, 2016)证明的具有线性阈值门(LTF门)的定深电路的下界。特别地,我们证明了存在一个n变量布尔函数Fn Ε P,使得每个计算Fn的深度2电路的PTF门的度数d≥1必须至少有(n2 /2+1/d)#183;(logn) - o (d2)电线。对于大于2的恒定深度,我们还给出了具有超线性导线数的这种电路的平均情况下界。这是具有PTF门的电路的导线数量的第一个超线性界限。我们还简要证明了Kane (Computational Complexity, 2014)提出的d度ptf的最佳指数平均灵敏度界,以及Meka、Nguyen和Vu提出的d度多线性多项式的littlewood - offford型反集中界(Theory of Computing, 2016)。最后,我们给出了块限制引理和littlewood - offford型反集中界的非随机化版本,使用Meka和Zuckerman (SICOMP, 2013)的伪随机ptf生成器。
{"title":"A polynomial restriction lemma with applications","authors":"Valentine Kabanets, D. Kane, Zhenjian Lu","doi":"10.1145/3055399.3055470","DOIUrl":"https://doi.org/10.1145/3055399.3055470","url":null,"abstract":"A polynomial threshold function (PTF) of degree d is a boolean function of the form f=sgn(p), where p is a degree-d polynomial, and sgn is the sign function. The main result of the paper is an almost optimal bound on the probability that a random restriction of a PTF is not close to a constant function, where a boolean function g is called δ-close to constant if, for some vε{1,-1}, we have g(x)=v for all but at most δ fraction of inputs. We show for every PTF f of degree d≥ 1, and parameters 0<δ, r≤ 1/16, that Pr∾ Rr [fρ is not δ-close to constant] ≤ √ #183;(logr-1· logδ-1)O(d2), where ρ ∾ Rr is a random restriction leaving each variable, independently, free with probability r, and otherwise assigning it 1 or -1 uniformly at random. In fact, we show a more general result for random block restrictions: given an arbitrary partitioning of input variables into m blocks, a random block restriction picks a uniformly random block ℓΕ [m] and assigns 1 or -1, uniformly at random, to all variable outside the chosen block ℓ. We prove the Block Restriction Lemma saying that a PTF f of degree d becomes δ-close to constant when hit with a random block restriction, except with probability at most m-1/2 #183; (logm#183; logδ-1)O(d2). As an application of our Restriction Lemma, we prove lower bounds against constant-depth circuits with PTF gates of any degree 1≤ d≪ √logn/loglogn, generalizing the recent bounds against constant-depth circuits with linear threshold gates (LTF gates) proved by Kane and Williams (STOC, 2016) and Chen, Santhanam, and Srinivasan (CCC, 2016). In particular, we show that there is an n-variate boolean function Fn Ε P such that every depth-2 circuit with PTF gates of degree d≥ 1 that computes Fn must have at least (n3/2+1/d)#183; (logn)-O(d2) wires. For constant depths greater than 2, we also show average-case lower bounds for such circuits with super-linear number of wires. These are the first super-linear bounds on the number of wires for circuits with PTF gates. We also give short proofs of the optimal-exponent average sensitivity bound for degree-d PTFs due to Kane (Computational Complexity, 2014), and the Littlewood-Offord type anticoncentration bound for degree-d multilinear polynomials due to Meka, Nguyen, and Vu (Theory of Computing, 2016). Finally, we give derandomized versions of our Block Restriction Lemma and Littlewood-Offord type anticoncentration bounds, using a pseudorandom generator for PTFs due to Meka and Zuckerman (SICOMP, 2013).","PeriodicalId":20615,"journal":{"name":"Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing","volume":"42 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81295156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Faster space-efficient algorithms for subset sum and k-sum 子集和k和的更快的空间效率算法
Pub Date : 2017-06-19 DOI: 10.1145/3055399.3055467
N. Bansal, S. Garg, Jesper Nederlof, Nikhil Vyas
We present randomized algorithms that solve Subset Sum and Knapsack instances with n items in O*(20.86n) time, where the O*(·) notation suppresses factors polynomial in the input size, and polynomial space, assuming random read-only access to exponentially many random bits. These results can be extended to solve Binary Linear Programming on n variables with few constraints in a similar running time. We also show that for any constant k≥ 2, random instances of k-Sum can be solved using O(nk-0.5(n)) time and O(logn) space, without the assumption of random access to random bits. Underlying these results is an algorithm that determines whether two given lists of length n with integers bounded by a polynomial in n share a common value. Assuming random read-only access to random bits, we show that this problem can be solved using O(logn) space significantly faster than the trivial O(n2) time algorithm if no value occurs too often in the same list.
我们提出了在O*(20.86n)时间内求解n个项目的子集和背包实例的随机算法,其中O*(·)符号抑制了输入大小和多项式空间中的多项式因子,假设随机只读访问指数级多的随机位。这些结果可以推广到在相似的运行时间内求解约束较少的n变量二元线性规划问题。我们还证明了对于任意常数k≥2,可以使用O(nk-0.5(n))时间和O(logn)空间求解k- sum的随机实例,而无需假设随机访问随机位。这些结果的基础是一个算法,该算法确定两个给定的长度为n的整数列表是否共享一个公共值。假设对随机位的随机只读访问,我们证明,如果同一个列表中没有经常出现的值,那么可以使用O(logn)空间比平凡的O(n2)时间算法更快地解决这个问题。
{"title":"Faster space-efficient algorithms for subset sum and k-sum","authors":"N. Bansal, S. Garg, Jesper Nederlof, Nikhil Vyas","doi":"10.1145/3055399.3055467","DOIUrl":"https://doi.org/10.1145/3055399.3055467","url":null,"abstract":"We present randomized algorithms that solve Subset Sum and Knapsack instances with n items in O*(20.86n) time, where the O*(·) notation suppresses factors polynomial in the input size, and polynomial space, assuming random read-only access to exponentially many random bits. These results can be extended to solve Binary Linear Programming on n variables with few constraints in a similar running time. We also show that for any constant k≥ 2, random instances of k-Sum can be solved using O(nk-0.5(n)) time and O(logn) space, without the assumption of random access to random bits. Underlying these results is an algorithm that determines whether two given lists of length n with integers bounded by a polynomial in n share a common value. Assuming random read-only access to random bits, we show that this problem can be solved using O(logn) space significantly faster than the trivial O(n2) time algorithm if no value occurs too often in the same list.","PeriodicalId":20615,"journal":{"name":"Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing","volume":"77 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83873595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Surviving in directed graphs: a quasi-polynomial-time polylogarithmic approximation for two-connected directed Steiner tree 在有向图中生存:二连通有向Steiner树的拟多项式时间多对数逼近
Pub Date : 2017-06-19 DOI: 10.1145/3055399.3055445
F. Grandoni, Bundit Laekhanukit
Real-word networks are often prone to failures. A reliable network needs to cope with this situation and must provide a backup communication channel. This motivates the study of survivable network design, which has been a focus of research for a few decades. To date, survivable network design problems on undirected graphs are well-understood. For example, there is a 2 approximation in the case of edge failures [Jain, FOCS'98/Combinatorica'01]. The problems on directed graphs, in contrast, have seen very little progress. Most techniques for the undirected case like primal-dual and iterative rounding methods do not seem to extend to the directed case. Almost no non-trivial approximation algorithm is known even for a simple case where we wish to design a network that tolerates a single failure. In this paper, we study a survivable network design problem on directed graphs, 2-Connected Directed Steiner Tree (2-DST): given an n-vertex weighted directed graph, a root r, and a set of h terminals S, find a min-cost subgraph H that has two edge/vertex disjoint paths from r to any tε S. 2-DST is a natural generalization of the classical Directed Steiner Tree problem (DST), where we have an additional requirement that the network must tolerate one failure. No non-trivial approximation is known for 2-DST. This was left as an open problem by Feldman et al., [SODA'09; JCSS] and has then been studied by Cheriyan et al. [SODA'12; TALG] and Laekhanukit [SODA'14]. However, no positive result was known except for the special case of a D-shallow instance [Laekhanukit, ICALP'16]. We present an O(D3logD#183; h2/D#183; logn) approximation algorithm for 2-DST that runs in time O(nO(D)), for any Dε[log2h]. This implies a polynomial-time O(hεlogn) approximation for any constant ε>0, and a poly-logarithmic approximation running in quasi-polynomial time. We remark that this is essentially the best-known even for the classical DST, and the latter problem is O(log2-εn)-hard to approximate [Halperin and Krauthgamer, STOC'03]. As a by product, we obtain an algorithm with the same approximation guarantee for the 2-Connected Directed Steiner Subgraph problem, where the goal is to find a min-cost subgraph such that every pair of terminals are 2-edge/vertex connected. Our approximation algorithm is based on a careful combination of several techniques. In more detail, we decompose an optimal solution into two (possibly not edge disjoint) divergent trees that induces two edge disjoint paths from the root to any given terminal. These divergent trees are then embedded into a shallow tree by means of Zelikovsky's height reduction theorem. On the latter tree we solve a 2-Connected Group Steiner Tree problem and then map back this solution to the original graph. Crucially, our tree embedding is achieved via a probabilistic mapping guided by an LP: This is the main technical novelty of our approach, and might be useful for future work.
现实世界的网络常常容易出现故障。一个可靠的网络需要应对这种情况,必须提供一个备份的通信通道。这激发了对可生存网络设计的研究,这是几十年来研究的焦点。迄今为止,无向图上的可生存网络设计问题已经得到了很好的理解。例如,在边缘失效的情况下有一个2近似[Jain, FOCS'98/Combinatorica'01]。相比之下,有向图的问题几乎没有进展。大多数用于无向情况的技术,如原始对偶和迭代舍入方法,似乎不能扩展到有向情况。几乎没有非平凡的近似算法是已知的,即使在一个简单的情况下,我们希望设计一个网络,容忍一次故障。在本文中,我们研究了一个有向图上的可生存网络设计问题,2-连通有向斯坦纳树(2-DST):给定一个n顶点加权有向图,一个根r和一组h端点S,找到一个最小代价子图h,该子图h具有从r到任意tε S的两条边/顶点不相交的路径。2-DST是经典有向斯坦纳树问题(DST)的自然推广,其中我们有一个额外的要求,即网络必须容忍一个故障。对于2-DST没有已知的非平凡近似。这是Feldman等人[SODA'09;JCSS],然后由Cheriyan等人进行了研究[SODA'12;TALG]和Laekhanukit [SODA'14]。然而,除了d -浅实例的特殊情况外,没有已知的阳性结果[Laekhanukit, ICALP'16]。我们提出了O(d3logd# 183;h2 / D # 183;对于任意Dε[log2h],运行时间为O(nO(D))的2-DST近似算法。这意味着对于任意常数ε>0的多项式时间O(hεlogn)近似,以及在拟多项式时间内运行的多对数近似。我们注意到,即使对于经典的DST,这基本上也是最著名的,而后者的问题是O(log2-εn)-难以近似[Halperin和Krauthgamer, STOC'03]。作为副产物,我们得到了一个具有相同近似保证的2连通有向Steiner子图问题的算法,该问题的目标是找到一个最小代价的子图,使得每一对终端都是2边/顶点连通的。我们的近似算法是基于几种技术的精心组合。更详细地说,我们将一个最优解分解成两个(可能不是边不相交的)发散树,这些树从根到任何给定的端点诱导出两条边不相交的路径。然后利用泽利科夫斯基高度约简定理将这些发散树嵌入到一个浅树中。在后一棵树上,我们求解了一个2连通群斯坦纳树问题,然后将该解映射回原图。至关重要的是,我们的树嵌入是通过LP指导的概率映射实现的:这是我们方法的主要技术新颖之处,可能对未来的工作有用。
{"title":"Surviving in directed graphs: a quasi-polynomial-time polylogarithmic approximation for two-connected directed Steiner tree","authors":"F. Grandoni, Bundit Laekhanukit","doi":"10.1145/3055399.3055445","DOIUrl":"https://doi.org/10.1145/3055399.3055445","url":null,"abstract":"Real-word networks are often prone to failures. A reliable network needs to cope with this situation and must provide a backup communication channel. This motivates the study of survivable network design, which has been a focus of research for a few decades. To date, survivable network design problems on undirected graphs are well-understood. For example, there is a 2 approximation in the case of edge failures [Jain, FOCS'98/Combinatorica'01]. The problems on directed graphs, in contrast, have seen very little progress. Most techniques for the undirected case like primal-dual and iterative rounding methods do not seem to extend to the directed case. Almost no non-trivial approximation algorithm is known even for a simple case where we wish to design a network that tolerates a single failure. In this paper, we study a survivable network design problem on directed graphs, 2-Connected Directed Steiner Tree (2-DST): given an n-vertex weighted directed graph, a root r, and a set of h terminals S, find a min-cost subgraph H that has two edge/vertex disjoint paths from r to any tε S. 2-DST is a natural generalization of the classical Directed Steiner Tree problem (DST), where we have an additional requirement that the network must tolerate one failure. No non-trivial approximation is known for 2-DST. This was left as an open problem by Feldman et al., [SODA'09; JCSS] and has then been studied by Cheriyan et al. [SODA'12; TALG] and Laekhanukit [SODA'14]. However, no positive result was known except for the special case of a D-shallow instance [Laekhanukit, ICALP'16]. We present an O(D3logD#183; h2/D#183; logn) approximation algorithm for 2-DST that runs in time O(nO(D)), for any Dε[log2h]. This implies a polynomial-time O(hεlogn) approximation for any constant ε>0, and a poly-logarithmic approximation running in quasi-polynomial time. We remark that this is essentially the best-known even for the classical DST, and the latter problem is O(log2-εn)-hard to approximate [Halperin and Krauthgamer, STOC'03]. As a by product, we obtain an algorithm with the same approximation guarantee for the 2-Connected Directed Steiner Subgraph problem, where the goal is to find a min-cost subgraph such that every pair of terminals are 2-edge/vertex connected. Our approximation algorithm is based on a careful combination of several techniques. In more detail, we decompose an optimal solution into two (possibly not edge disjoint) divergent trees that induces two edge disjoint paths from the root to any given terminal. These divergent trees are then embedded into a shallow tree by means of Zelikovsky's height reduction theorem. On the latter tree we solve a 2-Connected Group Steiner Tree problem and then map back this solution to the original graph. Crucially, our tree embedding is achieved via a probabilistic mapping guided by an LP: This is the main technical novelty of our approach, and might be useful for future work.","PeriodicalId":20615,"journal":{"name":"Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing","volume":"83 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76115583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Dynamic spanning forest with worst-case update time: adaptive, Las Vegas, and O(n1/2 - ε)-time 具有最坏更新时间的动态生成森林:自适应,拉斯维加斯和O(n1/2 - ε)时间
Pub Date : 2017-06-19 DOI: 10.1145/3055399.3055447
Danupon Nanongkai, Thatchaphol Saranurak
We present two algorithms for dynamically maintaining a spanning forest of a graph undergoing edge insertions and deletions. Our algorithms guarantee worst-case update time and work against an adaptive adversary, meaning that an edge update can depend on previous outputs of the algorithms. We provide the first polynomial improvement over the long-standing O(√n) bound of [Frederickson STOC'84, Eppstein, Galil, Italiano and Nissenzweig FOCS'92] for such type of algorithms. The previously best improvement was O(√n (loglogn)2/logn) [Kejlberg-Rasmussen, Kopelowitz, Pettie and Thorup ESA'16]. We note however that these bounds were obtained by deterministic algorithms while our algorithms are randomized. Our first algorithm is Monte Carlo and guarantees an O(n0.4+o(1)) worst-case update time, where the o(1) term hides the O(√loglogn/logn) factor. Our second algorithm is Las Vegas and guarantee an O(n0.49306) worst-case update time with high probability. Algorithms with better update time either needed to assume that the adversary is oblivious (e.g. [Kapron, King and Mountjoy SODA'13]) or can only guarantee an amortized update time. Our second result answers an open problem by Kapron et al. To the best of our knowledge, our algorithms are among a few non-trivial randomized dynamic algorithms that work against adaptive adversaries. The key to our results is a decomposition of graphs into subgraphs that either have high expansion or sparse. This decomposition serves as an interface between recent developments on (static) flow computation and many old ideas in dynamic graph algorithms: On the one hand, we can combine previous dynamic graph techniques to get faster dynamic spanning forest algorithms if such decomposition is given. On the other hand, we can adapt flow-related techniques (e.g. those from [Khandekar, Rao and Vazirani STOC'06], [Peng SODA'16], and [Orecchia and Zhu SODA'14]) to maintain such decomposition. To the best of our knowledge, this is the first time these flow techniques are used in fully dynamic graph algorithms.
我们提出了两种算法动态维护一个图的生成森林经历边缘插入和删除。我们的算法保证了最坏情况下的更新时间,并可以对抗自适应对手,这意味着边缘更新可以依赖于算法的先前输出。对于这类算法,我们在[Frederickson STOC'84, Eppstein, Galil, Italiano和Nissenzweig FOCS'92]的长期O(√n)界上提供了第一个多项式改进。以前的最佳改进是O(√n (loglogn)2/logn) [Kejlberg-Rasmussen, Kopelowitz, Pettie and Thorup ESA'16]。然而,我们注意到这些边界是由确定性算法获得的,而我们的算法是随机的。我们的第一个算法是蒙特卡罗算法,它保证了O(n0.4+ O(1))最坏情况下的更新时间,其中O(1)项隐藏了O(√loglog /logn)因子。我们的第二个算法是Las Vegas,并保证高概率的O(n0.49306)最坏情况更新时间。具有更好更新时间的算法要么需要假设对手是遗忘的(例如[Kapron, King和Mountjoy SODA'13]),要么只能保证平摊更新时间。我们的第二个结果回答了Kapron等人提出的一个公开问题。据我们所知,我们的算法是少数非平凡的随机动态算法之一,可以对抗自适应对手。我们的结果的关键是将图分解为具有高扩展或稀疏的子图。这种分解可以作为(静态)流计算的最新发展与动态图算法中许多旧思想之间的接口:一方面,如果给出这种分解,我们可以结合以前的动态图技术得到更快的动态生成森林算法。另一方面,我们可以采用与流相关的技术(例如[khanddekar, Rao和Vazirani STOC'06], [Peng SODA'16]和[Orecchia和Zhu SODA'14])来维持这种分解。据我们所知,这是第一次在完全动态图算法中使用这些流技术。
{"title":"Dynamic spanning forest with worst-case update time: adaptive, Las Vegas, and O(n1/2 - ε)-time","authors":"Danupon Nanongkai, Thatchaphol Saranurak","doi":"10.1145/3055399.3055447","DOIUrl":"https://doi.org/10.1145/3055399.3055447","url":null,"abstract":"We present two algorithms for dynamically maintaining a spanning forest of a graph undergoing edge insertions and deletions. Our algorithms guarantee worst-case update time and work against an adaptive adversary, meaning that an edge update can depend on previous outputs of the algorithms. We provide the first polynomial improvement over the long-standing O(√n) bound of [Frederickson STOC'84, Eppstein, Galil, Italiano and Nissenzweig FOCS'92] for such type of algorithms. The previously best improvement was O(√n (loglogn)2/logn) [Kejlberg-Rasmussen, Kopelowitz, Pettie and Thorup ESA'16]. We note however that these bounds were obtained by deterministic algorithms while our algorithms are randomized. Our first algorithm is Monte Carlo and guarantees an O(n0.4+o(1)) worst-case update time, where the o(1) term hides the O(√loglogn/logn) factor. Our second algorithm is Las Vegas and guarantee an O(n0.49306) worst-case update time with high probability. Algorithms with better update time either needed to assume that the adversary is oblivious (e.g. [Kapron, King and Mountjoy SODA'13]) or can only guarantee an amortized update time. Our second result answers an open problem by Kapron et al. To the best of our knowledge, our algorithms are among a few non-trivial randomized dynamic algorithms that work against adaptive adversaries. The key to our results is a decomposition of graphs into subgraphs that either have high expansion or sparse. This decomposition serves as an interface between recent developments on (static) flow computation and many old ideas in dynamic graph algorithms: On the one hand, we can combine previous dynamic graph techniques to get faster dynamic spanning forest algorithms if such decomposition is given. On the other hand, we can adapt flow-related techniques (e.g. those from [Khandekar, Rao and Vazirani STOC'06], [Peng SODA'16], and [Orecchia and Zhu SODA'14]) to maintain such decomposition. To the best of our knowledge, this is the first time these flow techniques are used in fully dynamic graph algorithms.","PeriodicalId":20615,"journal":{"name":"Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing","volume":"99 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81093573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 91
Answering FAQs in CSPs, probabilistic graphical models, databases, logic and matrix operations (invited talk) csp常见问题解答,概率图形模型,数据库,逻辑和矩阵运算(特邀演讲)
Pub Date : 2017-06-19 DOI: 10.1145/3055399.3079073
A. Rudra
In this talk we will discuss a general framework to solve certain sums of products of functions over semi-rings. This captures many well-known problems in disparate areas such as CSPs, Probabilistic Graphical Models, Databases, Logic and Matrix Operations. This talk is based on joint work titled FAQ: Questions Asked Frequently with Mahmoud Abo Khamis and Hung Q. Ngo, which appeared in PODS 2016.
在这个讲座中,我们将讨论求解半环上某些函数积和的一般框架。这抓住了许多不同领域的众所周知的问题,如csp、概率图形模型、数据库、逻辑和矩阵运算。本次演讲基于Mahmoud Abo Khamis和Hung Q. Ngo的合作作品《FAQ: Questions Asked often》,该作品曾出现在PODS 2016上。
{"title":"Answering FAQs in CSPs, probabilistic graphical models, databases, logic and matrix operations (invited talk)","authors":"A. Rudra","doi":"10.1145/3055399.3079073","DOIUrl":"https://doi.org/10.1145/3055399.3079073","url":null,"abstract":"In this talk we will discuss a general framework to solve certain sums of products of functions over semi-rings. This captures many well-known problems in disparate areas such as CSPs, Probabilistic Graphical Models, Databases, Logic and Matrix Operations. This talk is based on joint work titled FAQ: Questions Asked Frequently with Mahmoud Abo Khamis and Hung Q. Ngo, which appeared in PODS 2016.","PeriodicalId":20615,"journal":{"name":"Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing","volume":"25 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81094054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Time-space hardness of learning sparse parities 学习稀疏奇偶的时空硬度
Pub Date : 2017-06-19 DOI: 10.1145/3055399.3055430
Gillat Kol, R. Raz, Avishay Tal
We define a concept class ℱ to be time-space hard (or memory-samples hard) if any learning algorithm for ℱ requires either a memory of size super-linear in n or a number of samples super-polynomial in n, where n is the length of one sample. A recent work shows that the class of all parity functions is time-space hard [Raz, FOCS'16]. Building on [Raz, FOCS'16], we show that the class of all sparse parities of Hamming weight ℓ is time-space hard, as long as ℓ ≥ ω(logn / loglogn). Consequently, linear-size DNF Formulas, linear-size Decision Trees and logarithmic-size Juntas are all time-space hard. Our result is more general and provides time-space lower bounds for learning any concept class of parity functions. We give applications of our results in the field of bounded-storage cryptography. For example, for every ωlogn) ≤ k ≤ n, we obtain an encryption scheme that requires a private key of length k, and time complexity of n per encryption/decryption of each bit, and is provably and unconditionally secure as long as the attacker uses at most o(nk) memory bits and the scheme is used at most 2o(k) times. Previously, this was known only for k=n [Raz, FOCS'16].
我们定义一个概念类,如果任何一个学习算法需要n的超线性内存或n的超多项式样本数(其中n是一个样本的长度),那么它是时空难的(或内存-样本难的)。最近的一项研究表明,所有宇称函数的类都是时空难的[Raz, FOCS'16]。在[Raz, FOCS'16]的基础上,我们证明了只要r≥ω(logn / loglogn),所有Hamming权值r的稀疏奇偶都是时空难的。因此,线性大小的DNF公式,线性大小的决策树和对数大小的Juntas都是时空困难的。我们的结果更一般,并提供了学习任何奇偶函数概念类的时空下界。我们给出了我们的结果在有界存储密码学领域的应用。例如,对于每一个ωlogn)≤k≤n,我们得到了一个加密方案,它需要一个长度为k的私钥,并且每一个比特的加/解密的时间复杂度为n,只要攻击者使用最多o(nk)个内存位,并且该方案最多使用20 (k)次,该加密方案就可以证明是无条件安全的。以前,只有k=n才知道这一点[Raz, FOCS'16]。
{"title":"Time-space hardness of learning sparse parities","authors":"Gillat Kol, R. Raz, Avishay Tal","doi":"10.1145/3055399.3055430","DOIUrl":"https://doi.org/10.1145/3055399.3055430","url":null,"abstract":"We define a concept class ℱ to be time-space hard (or memory-samples hard) if any learning algorithm for ℱ requires either a memory of size super-linear in n or a number of samples super-polynomial in n, where n is the length of one sample. A recent work shows that the class of all parity functions is time-space hard [Raz, FOCS'16]. Building on [Raz, FOCS'16], we show that the class of all sparse parities of Hamming weight ℓ is time-space hard, as long as ℓ ≥ ω(logn / loglogn). Consequently, linear-size DNF Formulas, linear-size Decision Trees and logarithmic-size Juntas are all time-space hard. Our result is more general and provides time-space lower bounds for learning any concept class of parity functions. We give applications of our results in the field of bounded-storage cryptography. For example, for every ωlogn) ≤ k ≤ n, we obtain an encryption scheme that requires a private key of length k, and time complexity of n per encryption/decryption of each bit, and is provably and unconditionally secure as long as the attacker uses at most o(nk) memory bits and the scheme is used at most 2o(k) times. Previously, this was known only for k=n [Raz, FOCS'16].","PeriodicalId":20615,"journal":{"name":"Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing","volume":"59 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87922048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 48
Decremental single-source reachability in planar digraphs 平面有向图中的递减单源可达性
Pub Date : 2017-05-31 DOI: 10.1145/3055399.3055480
G. Italiano, Adam Karczmarz, Jakub Lacki, P. Sankowski
In this paper we show a new algorithm for the decremental single-source reachability problem in directed planar graphs. It processes any sequence of edge deletions in O(nlog2nloglogn) total time and explicitly maintains the set of vertices reachable from a fixed source vertex. Hence, if all edges are eventually deleted, the amortized time of processing each edge deletion is only O(log2 n loglogn), which improves upon a previously known O(√n) solution. We also show an algorithm for decremental maintenance of strongly connected components in directed planar graphs with the same total update time. These results constitute the first almost optimal (up to polylogarithmic factors) algorithms for both problems. To the best of our knowledge, these are the first dynamic algorithms with polylogarithmic update times on general directed planar graphs for non-trivial reachability-type problems, for which only polynomial bounds are known in general graphs.
本文给出了一种求解有向平面图中递减单源可达性问题的新算法。它在O(nlog2nloglogn)总时间内处理任何边删除序列,并显式维护从固定源顶点可到达的顶点集。因此,如果所有边最终都被删除,处理每条边删除的平摊时间仅为O(log2 n loglog),这比之前已知的O(√n)解决方案有所改进。我们还展示了一种具有相同总更新时间的有向平面图强连接分量的递减维护算法。这些结果构成了这两个问题的第一个几乎最优的算法(直到多对数因子)。据我们所知,这些是第一个在一般有向平面图上具有多对数更新时间的动态算法,用于非平凡可达型问题,在一般图中只有多项式界是已知的。
{"title":"Decremental single-source reachability in planar digraphs","authors":"G. Italiano, Adam Karczmarz, Jakub Lacki, P. Sankowski","doi":"10.1145/3055399.3055480","DOIUrl":"https://doi.org/10.1145/3055399.3055480","url":null,"abstract":"In this paper we show a new algorithm for the decremental single-source reachability problem in directed planar graphs. It processes any sequence of edge deletions in O(nlog2nloglogn) total time and explicitly maintains the set of vertices reachable from a fixed source vertex. Hence, if all edges are eventually deleted, the amortized time of processing each edge deletion is only O(log2 n loglogn), which improves upon a previously known O(√n) solution. We also show an algorithm for decremental maintenance of strongly connected components in directed planar graphs with the same total update time. These results constitute the first almost optimal (up to polylogarithmic factors) algorithms for both problems. To the best of our knowledge, these are the first dynamic algorithms with polylogarithmic update times on general directed planar graphs for non-trivial reachability-type problems, for which only polynomial bounds are known in general graphs.","PeriodicalId":20615,"journal":{"name":"Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing","volume":"10 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80316552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Homomorphisms are a good basis for counting small subgraphs 同态是计算小子图的良好基础
Pub Date : 2017-05-03 DOI: 10.1145/3055399.3055502
Radu Curticapean, Holger Dell, D. Marx
We introduce graph motif parameters, a class of graph parameters that depend only on the frequencies of constant-size induced subgraphs. Classical works by Lovász show that many interesting quantities have this form, including, for fixed graphs H, the number of H-copies (induced or not) in an input graph G, and the number of homomorphisms from H to G. We use the framework of graph motif parameters to obtain faster algorithms for counting subgraph copies of fixed graphs H in host graphs G. More precisely, for graphs H on k edges, we show how to count subgraph copies of H in time kO(k)· n0.174k + o(k) by a surprisingly simple algorithm. This improves upon previously known running times, such as O(n0.91k + c) time for k-edge matchings or O(n0.46k + c) time for k-cycles. Furthermore, we prove a general complexity dichotomy for evaluating graph motif parameters: Given a class C of such parameters, we consider the problem of evaluating f ε C on input graphs G, parameterized by the number of induced subgraphs that f depends upon. For every recursively enumerable class C, we prove the above problem to be either FPT or #W[1]-hard, with an explicit dichotomy criterion. This allows us to recover known dichotomies for counting subgraphs, induced subgraphs, and homomorphisms in a uniform and simplified way, together with improved lower bounds. Finally, we extend graph motif parameters to colored subgraphs and prove a complexity trichotomy: For vertex-colored graphs H and G, where H is from a fixed class of graphs, we want to count color-preserving H-copies in G. We show that this problem is either polynomial-time solvable or FPT or #W[1]-hard, and that the FPT cases indeed need FPT time under reasonable assumptions.
我们引入图基参数,这是一类只依赖于等大小诱导子图的频率的图参数。Lovász的经典著作表明,许多有趣的量都具有这种形式,包括对于固定图H,输入图G中的H拷贝(诱导或非诱导)的数量,以及从H到G的同态的数量。我们使用图基参数的框架来获得计算主图G中固定图H的子图拷贝的更快算法。我们展示了如何用一个非常简单的算法在kO(k)·n0.174k + o(k)时间内对H的子图副本计数。这改进了以前已知的运行时间,例如k条边匹配的O(n0.91k + c)时间或k个循环的O(n0.46k + c)时间。此外,我们证明了评估图基参数的一般复杂度二分法:给定一类这样的参数C,我们考虑在输入图G上评估f ε C的问题,该问题由f所依赖的诱导子图的数量参数化。对于每一个递归可枚举类C,我们证明了上面的问题要么是FPT要么是#W[1]-hard,具有显式二分准则。这允许我们以统一和简化的方式恢复已知的计数子图,诱导子图和同态的二分类,以及改进的下界。最后,我们将图基参数扩展到彩色子图,并证明了一个复杂度三分法:对于顶点彩色图H和G,其中H来自固定的图类,我们想要在G中计算保持颜色的H拷贝。我们证明了这个问题要么是多项式时间可解的,要么是FPT或#W[1]-困难的,并且在合理的假设下,FPT情况确实需要FPT时间。
{"title":"Homomorphisms are a good basis for counting small subgraphs","authors":"Radu Curticapean, Holger Dell, D. Marx","doi":"10.1145/3055399.3055502","DOIUrl":"https://doi.org/10.1145/3055399.3055502","url":null,"abstract":"We introduce graph motif parameters, a class of graph parameters that depend only on the frequencies of constant-size induced subgraphs. Classical works by Lovász show that many interesting quantities have this form, including, for fixed graphs H, the number of H-copies (induced or not) in an input graph G, and the number of homomorphisms from H to G. We use the framework of graph motif parameters to obtain faster algorithms for counting subgraph copies of fixed graphs H in host graphs G. More precisely, for graphs H on k edges, we show how to count subgraph copies of H in time kO(k)· n0.174k + o(k) by a surprisingly simple algorithm. This improves upon previously known running times, such as O(n0.91k + c) time for k-edge matchings or O(n0.46k + c) time for k-cycles. Furthermore, we prove a general complexity dichotomy for evaluating graph motif parameters: Given a class C of such parameters, we consider the problem of evaluating f ε C on input graphs G, parameterized by the number of induced subgraphs that f depends upon. For every recursively enumerable class C, we prove the above problem to be either FPT or #W[1]-hard, with an explicit dichotomy criterion. This allows us to recover known dichotomies for counting subgraphs, induced subgraphs, and homomorphisms in a uniform and simplified way, together with improved lower bounds. Finally, we extend graph motif parameters to colored subgraphs and prove a complexity trichotomy: For vertex-colored graphs H and G, where H is from a fixed class of graphs, we want to count color-preserving H-copies in G. We show that this problem is either polynomial-time solvable or FPT or #W[1]-hard, and that the FPT cases indeed need FPT time under reasonable assumptions.","PeriodicalId":20615,"journal":{"name":"Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing","volume":"9 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82107389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 115
Quantum algorithm for tree size estimation, with applications to backtracking and 2-player games 用于树大小估计的量子算法,应用于回溯和2人游戏
Pub Date : 2017-04-22 DOI: 10.1145/3055399.3055444
A. Ambainis, M. Kokainis
We study quantum algorithms on search trees of unknown structure, in a model where the tree can be discovered by local exploration. That is, we are given the root of the tree and access to a black box which, given a vertex v, outputs the children of v. We construct a quantum algorithm which, given such access to a search tree of depth at most n, estimates the size of the tree T within a factor of 1± δ in Õ(√nT) steps. More generally, the same algorithm can be used to estimate size of directed acyclic graphs (DAGs) in a similar model. We then show two applications of this result: a) We show how to transform a classical backtracking search algorithm which examines T nodes of a search tree into an Õ(√Tn3/2) time quantum algorithm, improving over an earlier quantum backtracking algorithm of Montanaro (arXiv:1509.02374). b)We give a quantum algorithm for evaluating AND-OR formulas in a model where the formula can be discovered by local exploration (modeling position trees in 2-player games) which evaluates formulas of size T and depth To(1) in time O(T1/2+o(1)). Thus, the quantum speedup is essentially the same as in the case when the formula is known in advance.
我们研究了未知结构的搜索树上的量子算法,在一个可以通过局部探索发现树的模型中。也就是说,我们给定树的根,并访问一个黑盒,该黑盒给定顶点v,输出v的子节点。我们构造了一个量子算法,给定对深度最多为n的搜索树的访问,该算法在Õ(√nT)步长中以1±δ为因子估计树T的大小。更一般地说,在类似的模型中,同样的算法可以用来估计有向无环图(dag)的大小。然后,我们展示了该结果的两个应用:a)我们展示了如何将检查搜索树的T个节点的经典回溯搜索算法转换为Õ(√Tn3/2)时间量子算法,改进了Montanaro (arXiv:1509.02374)的早期量子回溯算法。b)我们给出了一种量子算法,用于评估模型中的and - or公式,其中公式可以通过局部探索(在2人博弈中建模位置树)发现,该模型在时间O(T1/2+ O(1))中评估大小为T、深度为To(1)的公式。因此,量子加速本质上与公式事先已知的情况相同。
{"title":"Quantum algorithm for tree size estimation, with applications to backtracking and 2-player games","authors":"A. Ambainis, M. Kokainis","doi":"10.1145/3055399.3055444","DOIUrl":"https://doi.org/10.1145/3055399.3055444","url":null,"abstract":"We study quantum algorithms on search trees of unknown structure, in a model where the tree can be discovered by local exploration. That is, we are given the root of the tree and access to a black box which, given a vertex v, outputs the children of v. We construct a quantum algorithm which, given such access to a search tree of depth at most n, estimates the size of the tree T within a factor of 1± δ in Õ(√nT) steps. More generally, the same algorithm can be used to estimate size of directed acyclic graphs (DAGs) in a similar model. We then show two applications of this result: a) We show how to transform a classical backtracking search algorithm which examines T nodes of a search tree into an Õ(√Tn3/2) time quantum algorithm, improving over an earlier quantum backtracking algorithm of Montanaro (arXiv:1509.02374). b)We give a quantum algorithm for evaluating AND-OR formulas in a model where the formula can be discovered by local exploration (modeling position trees in 2-player games) which evaluates formulas of size T and depth To(1) in time O(T1/2+o(1)). Thus, the quantum speedup is essentially the same as in the case when the formula is known in advance.","PeriodicalId":20615,"journal":{"name":"Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74152392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
期刊
Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1