首页 > 最新文献

2010 IEEE 51st Annual Symposium on Foundations of Computer Science最新文献

英文 中文
Approximating Maximum Weight Matching in Near-Linear Time 在近线性时间内逼近最大权值匹配
Pub Date : 2010-10-23 DOI: 10.1109/FOCS.2010.70
Ran Duan, S. Pettie
Given a weighted graph, the {em maximum weight matching} problem (MWM) is to find a set of vertex-disjoint edges with maximum weight. In the 1960s Edmonds showed that MWMs can be found in polynomial time. At present the fastest MWM algorithm, due to Gabow and Tarjan, runs in $tilde{O}(msqrt{n})$ time, where $m$ and $n$ are the number of edges and vertices in the graph. Surprisingly, restricted versions of the problem, such as computing $(1-epsilon)$-approximate MWMs or finding maximum cardinality matchings, are not known to be much easier (on sparse graphs). The best algorithms for these problems also run in $tilde{O}(msqrt{n})$ time. In this paper we present the first near-linear time algorithm for computing $(1-epsilon)$-approximate MWMs. Specifically, given an arbitrary real-weighted graph and $epsilon>0$, our algorithm computes such a matching in $O(mepsilon^{-2}log^3 n)$ time. The previous best approximate MWM algorithm with comparable running time could only guarantee a $(2/3-epsilon)$-approximate solution. In addition, we present a faster algorithm, running in $O(mlog nlogepsilon^{-1})$ time, that computes a $(3/4-epsilon)$-approximate MWM.
给定一个加权图,{em最大权值匹配}问题(MWM)是寻找一组权值最大的顶点不相交边。在20世纪60年代,Edmonds证明了可以在多项式时间内找到MWMs。目前最快的MWM算法,由于Gabow和Tarjan,运行时间为$tilde{O}(msqrt{n})$,其中$m$和$n$是图中边和顶点的数量。令人惊讶的是,这个问题的限制版本,比如计算$(1-epsilon)$ -近似MWMs或找到最大基数匹配,并不容易(在稀疏图上)。这些问题的最佳算法也运行在$tilde{O}(msqrt{n})$时间内。在本文中,我们提出了计算$(1-epsilon)$ -近似MWMs的第一个近线性时间算法。具体来说,给定一个任意的实加权图和$epsilon>0$,我们的算法在$O(mepsilon^{-2}log^3 n)$时间内计算出这样的匹配。以往运行时间相当的最佳近似MWM算法只能保证$(2/3-epsilon)$ -近似解。此外,我们提出了一个更快的算法,运行在$O(mlog nlogepsilon^{-1})$时间,计算一个$(3/4-epsilon)$ -近似的MWM。
{"title":"Approximating Maximum Weight Matching in Near-Linear Time","authors":"Ran Duan, S. Pettie","doi":"10.1109/FOCS.2010.70","DOIUrl":"https://doi.org/10.1109/FOCS.2010.70","url":null,"abstract":"Given a weighted graph, the {em maximum weight matching} problem (MWM) is to find a set of vertex-disjoint edges with maximum weight. In the 1960s Edmonds showed that MWMs can be found in polynomial time. At present the fastest MWM algorithm, due to Gabow and Tarjan, runs in $tilde{O}(msqrt{n})$ time, where $m$ and $n$ are the number of edges and vertices in the graph. Surprisingly, restricted versions of the problem, such as computing $(1-epsilon)$-approximate MWMs or finding maximum cardinality matchings, are not known to be much easier (on sparse graphs). The best algorithms for these problems also run in $tilde{O}(msqrt{n})$ time. In this paper we present the first near-linear time algorithm for computing $(1-epsilon)$-approximate MWMs. Specifically, given an arbitrary real-weighted graph and $epsilon>0$, our algorithm computes such a matching in $O(mepsilon^{-2}log^3 n)$ time. The previous best approximate MWM algorithm with comparable running time could only guarantee a $(2/3-epsilon)$-approximate solution. In addition, we present a faster algorithm, running in $O(mlog nlogepsilon^{-1})$ time, that computes a $(3/4-epsilon)$-approximate MWM.","PeriodicalId":228365,"journal":{"name":"2010 IEEE 51st Annual Symposium on Foundations of Computer Science","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116158090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 61
Black-Box, Round-Efficient Secure Computation via Non-malleability Amplification 基于非延展性放大的黑盒、轮效安全计算
Pub Date : 2010-10-23 DOI: 10.1109/FOCS.2010.87
H. Wee
We present round-efficient protocols for secure multi-party computation with a dishonest majority that rely on black-box access to the underlying primitives. Our main contributions are as follows: * a O(log^∗ n)-round protocol that relies on black-box access to dense cryptosystems, homomorphic encryption schemes, or lossy encryption schemes. This improves upon the recent O(1)^{log∗ n} -round protocol of Lin, Pass and Venkitasubramaniam (STOC 2009) that relies on non-black-box access to a smaller class of primitives. * a O(1)-round protocol requiring in addition, black-box access to a one-way function with sub-exponential hardness, improving upon the recent work of Pass and Wee (Euro crypt 2010). These are the first black-box constructions for secure computation with sub linear round complexity. Our constructions build on and improve upon the work of Lin and Pass (STOC 2009) on non-malleability amplification, as well as that of Ishai et al. (STOC 2006) on black-box secure computation. In addition to the results on secure computation, we also obtain a simple construction of a O(log^∗ n)-round non-malleable commitment scheme based on one-way functions, improving upon the recent O(1)^{log∗ n}-round protocol of Lin and Pass (STOC 2009). Our construction uses a novel transformation for handling arbitrary man-in-the-middle scheduling strategies which improves upon a previous construction of Barak (FOCS 2002).
我们提出了安全多方计算的循环高效协议,该协议具有不诚实的多数,依赖于对底层原语的黑盒访问。我们的主要贡献如下:*一个O(log^ * n)-round协议,它依赖于对密集密码系统、同态加密方案或有损加密方案的黑盒访问。这改进了Lin, Pass和Venkitasubramaniam (STOC 2009)最近的O(1)^{log∗n}轮协议,该协议依赖于对较小的原语类的非黑盒访问。*一个O(1)轮协议,需要另外的黑盒访问具有次指数硬度的单向函数,改进了Pass和Wee最近的工作(Euro crypt 2010)。这是第一个用于次线性循环复杂度安全计算的黑箱结构。我们的构建建立在Lin和Pass (STOC 2009)关于非延展性放大的工作以及Ishai等人(STOC 2006)关于黑盒安全计算的工作的基础上并对其进行了改进。除了安全计算的结果外,我们还得到了基于单向函数的O(log^∗n)轮非延展性承诺方案的简单构造,改进了最近的Lin和Pass (STOC 2009)的O(1)^{log∗n}轮协议。我们的结构使用了一种新颖的转换来处理任意的中间人调度策略,该策略改进了先前的巴拉克结构(FOCS 2002)。
{"title":"Black-Box, Round-Efficient Secure Computation via Non-malleability Amplification","authors":"H. Wee","doi":"10.1109/FOCS.2010.87","DOIUrl":"https://doi.org/10.1109/FOCS.2010.87","url":null,"abstract":"We present round-efficient protocols for secure multi-party computation with a dishonest majority that rely on black-box access to the underlying primitives. Our main contributions are as follows: * a O(log^∗ n)-round protocol that relies on black-box access to dense cryptosystems, homomorphic encryption schemes, or lossy encryption schemes. This improves upon the recent O(1)^{log∗ n} -round protocol of Lin, Pass and Venkitasubramaniam (STOC 2009) that relies on non-black-box access to a smaller class of primitives. * a O(1)-round protocol requiring in addition, black-box access to a one-way function with sub-exponential hardness, improving upon the recent work of Pass and Wee (Euro crypt 2010). These are the first black-box constructions for secure computation with sub linear round complexity. Our constructions build on and improve upon the work of Lin and Pass (STOC 2009) on non-malleability amplification, as well as that of Ishai et al. (STOC 2006) on black-box secure computation. In addition to the results on secure computation, we also obtain a simple construction of a O(log^∗ n)-round non-malleable commitment scheme based on one-way functions, improving upon the recent O(1)^{log∗ n}-round protocol of Lin and Pass (STOC 2009). Our construction uses a novel transformation for handling arbitrary man-in-the-middle scheduling strategies which improves upon a previous construction of Barak (FOCS 2002).","PeriodicalId":228365,"journal":{"name":"2010 IEEE 51st Annual Symposium on Foundations of Computer Science","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132694899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 93
Stability Yields a PTAS for k-Median and k-Means Clustering 稳定性产生k-Median和k-Means聚类的PTAS
Pub Date : 2010-10-23 DOI: 10.1109/FOCS.2010.36
Pranjal Awasthi, Avrim Blum, Or Sheffet
We consider $k$-median clustering in finite metric spaces and $k$-means clustering in Euclidean spaces, in the setting where $k$ is part of the input (not a constant). For the $k$-means problem, Ostrovsky et al. show that if the optimal $(k-1)$-means clustering of the input is more expensive than the optimal $k$-means clustering by a factor of $1/epsilon^2$, then one can achieve a $(1+f(epsilon))$-approximation to the $k$-means optimal in time polynomial in $n$ and $k$ by using a variant of Lloyd's algorithm. In this work we substantially improve this approximation guarantee. We show that given only the condition that the $(k-1)$-means optimal is more expensive than the $k$-means optimal by a factor $1+alpha$ for {em some} constant $alpha>0$, we can obtain a PTAS. In particular, under this assumption, for any $eps>0$ we achieve a $(1+eps)$-approximation to the $k$-means optimal in time polynomial in $n$ and $k$, and exponential in $1/eps$ and $1/alpha$. We thus decouple the strength of the assumption from the quality of the approximation ratio. We also give a PTAS for the $k$-median problem in finite metrics under the analogous assumption as well. For $k$-means, we in addition give a randomized algorithm with improved running time of $n^{O(1)}(k log n)^{poly(1/epsilon,1/alpha)}$. Our technique also obtains a PTAS under the assumption of Balcan et al. that all $(1+alpha)$ approximations are $delta$-close to a desired target clustering, in the case that all target clusters have size greater than $delta n$ and $alpha>0$ is constant. Note that the motivation of Balcan et al. is that for many clustering problems, the objective function is only a proxy for the true goal of getting close to the target. From this perspective, our improvement is that for $k$-means in Euclidean spaces we reduce the distance of the clustering found to the target from $O(delta)$ to $delta$ when all target clusters are large, and for $k$-median we improve the ``largeness'' condition needed in the work of Balcan et al. to get exactly $delta$-close from $O(delta n)$ to $delta n$. Our results are based on a new notion of clustering stability.
我们考虑$k$ -有限度量空间中的中位数聚类和$k$ -欧几里德空间中的均值聚类,其中$k$是输入的一部分(不是常数)。对于$k$ -means问题,Ostrovsky等人表明,如果输入的最优$(k-1)$ -means聚类比最优$k$ -means聚类代价高$1/epsilon^2$倍,则可以通过使用Lloyd算法的变体来实现$n$和$k$中$k$ -means最优时间多项式的$(1+f(epsilon))$ -近似。在这项工作中,我们大大改进了这种近似保证。我们证明,仅给定对于常数$alpha>0$, $(k-1)$ -均值最优比$k$ -均值最优贵一个因子{em}$1+alpha$的条件,我们就可以得到PTAS。特别是,在这个假设下,对于任何$eps>0$,我们在$n$和$k$中实现了$k$ -均值最优时间多项式的$(1+eps)$ -近似,在$1/eps$和$1/alpha$中实现了指数。因此,我们将假设的强度与近似比率的质量解耦。在类似的假设下,我们也给出了有限度量下$k$ -中值问题的PTAS。对于$k$ -means,我们还给出了一个随机化算法,改进了$n^{O(1)}(k log n)^{poly(1/epsilon,1/alpha)}$的运行时间。我们的技术还在Balcan等人的假设下获得了PTAS,即在所有目标聚类的大小大于$delta n$且$alpha>0$为常数的情况下,所有$(1+alpha)$近似都是$delta$ -接近期望的目标聚类。请注意,Balcan等人的动机是,对于许多聚类问题,目标函数只是接近目标这一真实目标的代理。从这个角度来看,我们的改进是,对于欧几里得空间中的$k$ -means,当所有目标簇都很大时,我们减少了发现的聚类到目标的距离,从$O(delta)$到$delta$,对于$k$ -median,我们改进了Balcan等人的工作所需的“大”条件,以便从$O(delta n)$到$delta n$精确地获得$delta$ -接近。我们的结果是基于聚类稳定性的新概念。
{"title":"Stability Yields a PTAS for k-Median and k-Means Clustering","authors":"Pranjal Awasthi, Avrim Blum, Or Sheffet","doi":"10.1109/FOCS.2010.36","DOIUrl":"https://doi.org/10.1109/FOCS.2010.36","url":null,"abstract":"We consider $k$-median clustering in finite metric spaces and $k$-means clustering in Euclidean spaces, in the setting where $k$ is part of the input (not a constant). For the $k$-means problem, Ostrovsky et al. show that if the optimal $(k-1)$-means clustering of the input is more expensive than the optimal $k$-means clustering by a factor of $1/epsilon^2$, then one can achieve a $(1+f(epsilon))$-approximation to the $k$-means optimal in time polynomial in $n$ and $k$ by using a variant of Lloyd's algorithm. In this work we substantially improve this approximation guarantee. We show that given only the condition that the $(k-1)$-means optimal is more expensive than the $k$-means optimal by a factor $1+alpha$ for {em some} constant $alpha>0$, we can obtain a PTAS. In particular, under this assumption, for any $eps>0$ we achieve a $(1+eps)$-approximation to the $k$-means optimal in time polynomial in $n$ and $k$, and exponential in $1/eps$ and $1/alpha$. We thus decouple the strength of the assumption from the quality of the approximation ratio. We also give a PTAS for the $k$-median problem in finite metrics under the analogous assumption as well. For $k$-means, we in addition give a randomized algorithm with improved running time of $n^{O(1)}(k log n)^{poly(1/epsilon,1/alpha)}$. Our technique also obtains a PTAS under the assumption of Balcan et al. that all $(1+alpha)$ approximations are $delta$-close to a desired target clustering, in the case that all target clusters have size greater than $delta n$ and $alpha>0$ is constant. Note that the motivation of Balcan et al. is that for many clustering problems, the objective function is only a proxy for the true goal of getting close to the target. From this perspective, our improvement is that for $k$-means in Euclidean spaces we reduce the distance of the clustering found to the target from $O(delta)$ to $delta$ when all target clusters are large, and for $k$-median we improve the ``largeness'' condition needed in the work of Balcan et al. to get exactly $delta$-close from $O(delta n)$ to $delta n$. Our results are based on a new notion of clustering stability.","PeriodicalId":228365,"journal":{"name":"2010 IEEE 51st Annual Symposium on Foundations of Computer Science","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127615553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 93
On the Computational Complexity of Coin Flipping 论抛硬币的计算复杂度
Pub Date : 2010-10-23 DOI: 10.1109/FOCS.2010.64
H. K. Maji, M. Prabhakaran, A. Sahai
Coin flipping is one of the most fundamental tasks in cryptographic protocol design. Informally, a coin flipping protocol should guarantee both (1) Completeness: an honest execution of the protocol by both parties results in a fair coin toss, and (2) Security: a cheating party cannot increase the probability of its desired outcome by any significant amount. Since its introduction by Blum~cite{Blum82}, coin flipping has occupied a central place in the theory of cryptographic protocols. In this paper, we explore what are the implications of the existence of secure coin flipping protocols for complexity theory. As exposited recently by Impagliazzo~cite{Impagliazzo09talk}, surprisingly little is known about this question. Previous work has shown that if we interpret the Security property of coin flipping protocols very strongly, namely that nothing beyond a negligible bias by cheating parties is allowed, then one-way functions must exist~cite{ImpagliazzoLu89}. However, for even a slight weakening of this security property (for example that cheating parties cannot bias the outcome by any additive constant $epsilon>0$), the only complexity-theoretic implication that was known was that $PSPACE nsubseteq BPP$. We put forward a new attack to establish our main result, which shows that, informally speaking, the existence of any (weak) coin flipping protocol that prevents a cheating adversary from biasing the output by more than $frac14 - epsilon$ implies that $NP nsubseteq BPP$. Furthermore, for constant-round protocols, we show that the existence of any (weak) coin flipping protocol that allows an honest party to maintain any noticeable chance of prevailing against a cheating party implies the existence of (infinitely often) one-way functions.
抛硬币是加密协议设计中最基本的任务之一。非正式地,抛硬币协议应该保证(1)完整性:双方诚实地执行协议会导致公平的抛硬币,以及(2)安全性:作弊方不能显著增加其期望结果的概率。自Blum cite{Blum82}引入以来,抛硬币在加密协议理论中占据了中心位置。在本文中,我们探讨了安全抛硬币协议的存在对复杂性理论的影响。正如Impagliazzo cite{Impagliazzo09talk}最近所阐述的那样,令人惊讶的是,我们对这个问题知之甚少。以前的工作表明,如果我们非常强烈地解释抛硬币协议的安全属性,即作弊方除了可以忽略不计的偏差之外什么都不允许,那么单向函数必须存在cite{ImpagliazzoLu89}。然而,即使是对这种安全属性的轻微削弱(例如,作弊方不能通过任何附加常数$epsilon>0$使结果产生偏差),已知的唯一复杂性理论含义是$PSPACE nsubseteq BPP$。我们提出了一个新的攻击来建立我们的主要结果,它表明,非正式地说,任何(弱)抛硬币协议的存在都可以防止作弊对手的输出偏差超过$frac14 - epsilon$,这意味着$NP nsubseteq BPP$。此外,对于恒轮协议,我们证明了任何(弱)抛硬币协议的存在性,它允许诚实方保持任何明显的战胜欺骗方的机会,这意味着存在(无限经常)单向函数。
{"title":"On the Computational Complexity of Coin Flipping","authors":"H. K. Maji, M. Prabhakaran, A. Sahai","doi":"10.1109/FOCS.2010.64","DOIUrl":"https://doi.org/10.1109/FOCS.2010.64","url":null,"abstract":"Coin flipping is one of the most fundamental tasks in cryptographic protocol design. Informally, a coin flipping protocol should guarantee both (1) Completeness: an honest execution of the protocol by both parties results in a fair coin toss, and (2) Security: a cheating party cannot increase the probability of its desired outcome by any significant amount. Since its introduction by Blum~cite{Blum82}, coin flipping has occupied a central place in the theory of cryptographic protocols. In this paper, we explore what are the implications of the existence of secure coin flipping protocols for complexity theory. As exposited recently by Impagliazzo~cite{Impagliazzo09talk}, surprisingly little is known about this question. Previous work has shown that if we interpret the Security property of coin flipping protocols very strongly, namely that nothing beyond a negligible bias by cheating parties is allowed, then one-way functions must exist~cite{ImpagliazzoLu89}. However, for even a slight weakening of this security property (for example that cheating parties cannot bias the outcome by any additive constant $epsilon>0$), the only complexity-theoretic implication that was known was that $PSPACE nsubseteq BPP$. We put forward a new attack to establish our main result, which shows that, informally speaking, the existence of any (weak) coin flipping protocol that prevents a cheating adversary from biasing the output by more than $frac14 - epsilon$ implies that $NP nsubseteq BPP$. Furthermore, for constant-round protocols, we show that the existence of any (weak) coin flipping protocol that allows an honest party to maintain any noticeable chance of prevailing against a cheating party implies the existence of (infinitely often) one-way functions.","PeriodicalId":228365,"journal":{"name":"2010 IEEE 51st Annual Symposium on Foundations of Computer Science","volume":"11 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114100962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Dependent Randomized Rounding via Exchange Properties of Combinatorial Structures 基于组合结构交换性质的依赖随机舍入
Pub Date : 2010-10-23 DOI: 10.1109/FOCS.2010.60
C. Chekuri, J. Vondrák, R. Zenklusen
We consider the problem of randomly rounding a fractional solution $x$ in an integer polytope $P subseteq [0,1]^n$ to a vertex $X$ of $P$, so that $E[X] = x$. Our goal is to achieve {em concentration properties} for linear and sub modular functions of the rounded solution. Such dependent rounding techniques, with concentration bounds for linear functions, have been developed in the past for two polytopes: the assignment polytope (that is, bipartite matchings and $b$-matchings)~cite{S01, GKPS06, KMPS09}, and more recently for the spanning tree polytope~cite{AGMGS10}. These schemes have led to a number of new algorithmic results. In this paper we describe a new {em swap rounding} technique which can be applied in a variety of settings including {em matroids} and {em matroid intersection}, while providing Chernoff-type concentration bounds for linear and sub modular functions of the rounded solution. In addition to existing techniques based on negative correlation, we use a martingale argument to obtain an exponential tail estimate for monotone sub modular functions. The rounding scheme explicitly exploits {em exchange properties} of the underlying combinatorial structures, and highlights these properties as the basis for concentration bounds. Matroids and matroid intersection provide a unifying framework for several known applications~cite{GKPS06, KMPS09, CCPV09, KST09, AGMGS10} as well as new ones, and their generality allows a richer set of constraints to be incorporated easily. We give some illustrative examples, with a more comprehensive discussion deferred to a later version of the paper.
我们考虑一个整数多面体$P subseteq [0,1]^n$中的分数解$x$随机四舍五入到$P$的顶点$X$的问题,使得$E[X] = x$。我们的目标是实现圆形解的线性和子模函数的{em集中特性}。这种依赖的四舍五入技术,具有线性函数的集中边界,在过去已经开发了两个多面体:分配多面体(即二部匹配和$b$ -匹配)cite{S01, GKPS06, KMPS09},以及最近的生成树多面体cite{AGMGS10}。这些方案产生了许多新的算法结果。本文描述了一种新的{em交换舍入}技术,该技术可以应用于包括{em拟阵和拟阵}相交{em在内的各种设置,同时提供了舍入解的线性函数和子模函数的chernoff型浓度界。除了现有的基于负相关的技术外,我们还使用鞅参数来获得单调子模函数的指数尾估计。舍入方案显式地利用底层组合结构的}交换特性{em,并突出这些特性作为集中边界的基础。拟阵和拟阵交集为一些已知的应用程序(}cite{GKPS06, KMPS09, CCPV09, KST09, AGMGS10})和新应用程序提供了统一的框架,它们的通用性允许更丰富的约束集被轻松地合并。我们给出一些说明性的例子,更全面的讨论推迟到论文的后一版本。
{"title":"Dependent Randomized Rounding via Exchange Properties of Combinatorial Structures","authors":"C. Chekuri, J. Vondrák, R. Zenklusen","doi":"10.1109/FOCS.2010.60","DOIUrl":"https://doi.org/10.1109/FOCS.2010.60","url":null,"abstract":"We consider the problem of randomly rounding a fractional solution $x$ in an integer polytope $P subseteq [0,1]^n$ to a vertex $X$ of $P$, so that $E[X] = x$. Our goal is to achieve {em concentration properties} for linear and sub modular functions of the rounded solution. Such dependent rounding techniques, with concentration bounds for linear functions, have been developed in the past for two polytopes: the assignment polytope (that is, bipartite matchings and $b$-matchings)~cite{S01, GKPS06, KMPS09}, and more recently for the spanning tree polytope~cite{AGMGS10}. These schemes have led to a number of new algorithmic results. In this paper we describe a new {em swap rounding} technique which can be applied in a variety of settings including {em matroids} and {em matroid intersection}, while providing Chernoff-type concentration bounds for linear and sub modular functions of the rounded solution. In addition to existing techniques based on negative correlation, we use a martingale argument to obtain an exponential tail estimate for monotone sub modular functions. The rounding scheme explicitly exploits {em exchange properties} of the underlying combinatorial structures, and highlights these properties as the basis for concentration bounds. Matroids and matroid intersection provide a unifying framework for several known applications~cite{GKPS06, KMPS09, CCPV09, KST09, AGMGS10} as well as new ones, and their generality allows a richer set of constraints to be incorporated easily. We give some illustrative examples, with a more comprehensive discussion deferred to a later version of the paper.","PeriodicalId":228365,"journal":{"name":"2010 IEEE 51st Annual Symposium on Foundations of Computer Science","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123175363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 239
Distance Oracles beyond the Thorup-Zwick Bound 距离神谕在Thorup-Zwick边界之外
Pub Date : 2010-10-23 DOI: 10.1137/11084128X
M. Patrascu, L. Roditty
We give the first improvement to the space/approximation trade-off of distance oracles since the seminal result of Thorup and Zwick [STOC'01]. For unweighted graphs, our distance oracle has size $O(n^{5/3}) = O(n^{1.66cdots})$ and, when queried about vertices at distance $d$, returns a path of length $2d+1$. For weighted graphs with $m=n^2/alpha$ edges, our distance oracle has size $O(n^2 / sqrt[3]{alpha})$ and returns a factor 2 approximation. Based on a plausible conjecture about the hardness of set intersection queries, we show that a 2-approximate distance oracle requires space $tOmega(n^2 / sqrt{alpha})$. For unweighted graphs, this implies a $tOmega(n^{1.5})$ space lower bound to achieve approximation $2d+1$.
自Thorup和Zwick [STOC'01]的开创性结果以来,我们首次改进了距离预言器的空间/近似权衡。对于未加权的图,我们的距离oracle的大小为$O(n^{5/3}) = O(n^{1.66cdots})$,当查询距离$d$处的顶点时,返回长度为$2d+1$的路径。对于具有$m=n^2/alpha$边的加权图,我们的距离oracle的大小为$O(n^2 / sqrt[3]{alpha})$,并返回因子2的近似值。基于一个关于集合交集查询的硬度的合理猜想,我们证明了一个2-近似距离的oracle需要空间$tOmega(n^2 / sqrt{alpha})$。对于未加权的图,这意味着一个$tOmega(n^{1.5})$空间下界来实现近似$2d+1$。
{"title":"Distance Oracles beyond the Thorup-Zwick Bound","authors":"M. Patrascu, L. Roditty","doi":"10.1137/11084128X","DOIUrl":"https://doi.org/10.1137/11084128X","url":null,"abstract":"We give the first improvement to the space/approximation trade-off of distance oracles since the seminal result of Thorup and Zwick [STOC'01]. For unweighted graphs, our distance oracle has size $O(n^{5/3}) = O(n^{1.66cdots})$ and, when queried about vertices at distance $d$, returns a path of length $2d+1$. For weighted graphs with $m=n^2/alpha$ edges, our distance oracle has size $O(n^2 / sqrt[3]{alpha})$ and returns a factor 2 approximation. Based on a plausible conjecture about the hardness of set intersection queries, we show that a 2-approximate distance oracle requires space $tOmega(n^2 / sqrt{alpha})$. For unweighted graphs, this implies a $tOmega(n^{1.5})$ space lower bound to achieve approximation $2d+1$.","PeriodicalId":228365,"journal":{"name":"2010 IEEE 51st Annual Symposium on Foundations of Computer Science","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125100730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 124
A Separator Theorem in Minor-Closed Classes 小闭类中的一个分隔定理
Pub Date : 2010-10-23 DOI: 10.1109/FOCS.2010.22
K. Kawarabayashi, B. Reed
It is shown that for each $t$, there is a separator of size $O(t sqrt{n})$ in any $n$-vertex graph $G$ with no $K_t$-minor. This settles a conjecture of Alon, Seymour and Thomas (J. Amer. Math. Soc., 1990 and STOC'90), and generalizes a result of Djidjev (1981), and Gilbert, Hutchinson and Tarjan (J. Algorithm, 1984), independently, who proved that every graph with $n$ vertices and genus $g$ has a separator of order $O(sqrt{gn})$, because $K_t$ has genus $Omega(t^2)$. The bound $O(t sqrt{n})$ is best possible because every 3-regular expander graph with $n$ vertices is a graph with no $K_t$-minor for $t=cn^{1/2}$, and with no separator of size $dn$ for appropriately chosen positive constants $c,d$. In addition, we give an $O(n^2)$ time algorithm to obtain such a separator, and then give a sketch how to obtain such a separator in $O(n^{1+epsilon})$ time for any $epsilon > 0$. Finally, we discuss several algorithm aspects of our separator theorem, including a possibility to obtain a separator of order $g(t)sqrt{n}$, for some function $g$ of $t$, in an $n$-vertex graph $G$ with no $K_t$-minor in $O(n)$ time.
结果表明,对于每个$t$,在任何$n$ -顶点图$G$中都有一个大小为$O(t sqrt{n})$的分隔符,没有$K_t$ -次分隔符。这就解决了阿隆、西摩和托马斯的一个猜想。数学。Soc。, 1990和STOC'90),并独立推广了Djidjev(1981)和Gilbert, Hutchinson和Tarjan (J. Algorithm, 1984)的结果,他们证明了每个具有$n$顶点和$g$属的图都有一个$O(sqrt{gn})$阶分隔符,因为$K_t$有$Omega(t^2)$属。绑定$O(t sqrt{n})$是最好的选择,因为每个具有$n$顶点的3-正则扩展图对于$t=cn^{1/2}$都是一个没有$K_t$ -次元的图,对于适当选择的正常量$c,d$也没有大小为$dn$的分隔符。此外,我们给出了一个$O(n^2)$时间算法来获得这样的分隔符,然后给出了如何在$O(n^{1+epsilon})$时间内对任意$epsilon > 0$获得这样的分隔符的草图。最后,我们讨论了分隔符定理的几个算法方面,包括对于$t$的某个函数$g$,在$n$ -顶点图$G$中获得阶为$g(t)sqrt{n}$的分隔符的可能性,在$O(n)$时间内没有$K_t$ -次元。
{"title":"A Separator Theorem in Minor-Closed Classes","authors":"K. Kawarabayashi, B. Reed","doi":"10.1109/FOCS.2010.22","DOIUrl":"https://doi.org/10.1109/FOCS.2010.22","url":null,"abstract":"It is shown that for each $t$, there is a separator of size $O(t sqrt{n})$ in any $n$-vertex graph $G$ with no $K_t$-minor. This settles a conjecture of Alon, Seymour and Thomas (J. Amer. Math. Soc., 1990 and STOC'90), and generalizes a result of Djidjev (1981), and Gilbert, Hutchinson and Tarjan (J. Algorithm, 1984), independently, who proved that every graph with $n$ vertices and genus $g$ has a separator of order $O(sqrt{gn})$, because $K_t$ has genus $Omega(t^2)$. The bound $O(t sqrt{n})$ is best possible because every 3-regular expander graph with $n$ vertices is a graph with no $K_t$-minor for $t=cn^{1/2}$, and with no separator of size $dn$ for appropriately chosen positive constants $c,d$. In addition, we give an $O(n^2)$ time algorithm to obtain such a separator, and then give a sketch how to obtain such a separator in $O(n^{1+epsilon})$ time for any $epsilon > 0$. Finally, we discuss several algorithm aspects of our separator theorem, including a possibility to obtain a separator of order $g(t)sqrt{n}$, for some function $g$ of $t$, in an $n$-vertex graph $G$ with no $K_t$-minor in $O(n)$ time.","PeriodicalId":228365,"journal":{"name":"2010 IEEE 51st Annual Symposium on Foundations of Computer Science","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125246151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 77
On the Insecurity of Parallel Repetition for Leakage Resilience 泄漏弹性并行重复的不安全性研究
Pub Date : 2010-10-23 DOI: 10.1109/FOCS.2010.57
Allison Bishop, Brent Waters
A fundamental question in leakage-resilient cryptography is: can leakage resilience always be amplified by parallel repetition? It is natural to expect that if we have a leakage-resilient primitive tolerating $ell$ bits of leakage, we can take $n$ copies of it to form a system tolerating $nell$ bits of leakage. In this paper, we show that this is not always true. We construct a public key encryption system which is secure when at most $ell$ bits are leaked, but if we take $n$ copies of the system and encrypt a share of the message under each using an $n$-out-of-$n$ secret-sharing scheme, leaking $nell$ bits renders the system insecure. Our results hold either in composite order bilinear groups under a variant of the subgroup decision assumption emph{or} in prime order bilinear groups under the decisional linear assumption. We note that the $n$ copies of our public key systems share a common reference parameter.
防泄漏密码学的一个基本问题是:是否可以通过并行重复来放大防泄漏能力?我们很自然地期望,如果我们有一个能够容忍$ell$位泄漏的具有泄漏弹性的原语,那么我们可以将其复制$n$个副本,以形成一个能够容忍$nell$位泄漏的系统。在本文中,我们证明这并不总是正确的。我们构建了一个公钥加密系统,该系统在最多$ell$位泄露时是安全的,但是如果我们获取系统的$n$个副本,并使用$n$ -out- $n$秘密共享方案加密每个副本下的消息共享,则泄漏$nell$位会使系统不安全。我们的结果既适用于子群决策假设的一种变体下的复合阶双线性群,emph{也}适用于决策线性假设下的素阶双线性群。我们注意到,公钥系统的$n$副本共享一个公共引用参数。
{"title":"On the Insecurity of Parallel Repetition for Leakage Resilience","authors":"Allison Bishop, Brent Waters","doi":"10.1109/FOCS.2010.57","DOIUrl":"https://doi.org/10.1109/FOCS.2010.57","url":null,"abstract":"A fundamental question in leakage-resilient cryptography is: can leakage resilience always be amplified by parallel repetition? It is natural to expect that if we have a leakage-resilient primitive tolerating $ell$ bits of leakage, we can take $n$ copies of it to form a system tolerating $nell$ bits of leakage. In this paper, we show that this is not always true. We construct a public key encryption system which is secure when at most $ell$ bits are leaked, but if we take $n$ copies of the system and encrypt a share of the message under each using an $n$-out-of-$n$ secret-sharing scheme, leaking $nell$ bits renders the system insecure. Our results hold either in composite order bilinear groups under a variant of the subgroup decision assumption emph{or} in prime order bilinear groups under the decisional linear assumption. We note that the $n$ copies of our public key systems share a common reference parameter.","PeriodicalId":228365,"journal":{"name":"2010 IEEE 51st Annual Symposium on Foundations of Computer Science","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132823039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Minimum-Cost Network Design with (Dis)economies of Scale 具有(非)规模经济的最小成本网络设计
Pub Date : 2010-10-23 DOI: 10.1137/110825959
M. Andrews, S. Antonakopoulos, Lisa Zhang
Given a network, a set of demands and a cost function f(.), the min-cost network design problem is to route all demands with the objective of minimizing sum_e f(l_e), where l_e is the total traffic load under the routing. We focus on cost functions of the form f(x) = s + x^a for x >, 0, with f(0) = 0. For a 1 with a positive startup cost s >, 0. Now, the cost function f(.) is neither sub additive nor super additive. This is motivated by minimizing network-wide energy consumption when supporting a set of traffic demands. It is commonly accepted that, for some computing and communication devices, doubling processing speed more than doubles the energy consumption. Hence, in Economics parlance, such a cost function reflects diseconomies of scale. We begin by discussing why existing routing techniques such as randomized rounding and tree-metric embedding fail to generalize directly. We then present our main contribution, which is a polylogarithmic approximation algorithm. We obtain this result by first deriving a bicriteria approximation for a related capacitated min-cost flow problem that we believe is interesting in its own right. Our approach for this problem builds upon the well-linked decomposition due to Chekuri-Khanna-Shepherd, the construction of expanders via matchings due to Khandekar-Rao-Vazirani, and edge-disjoint routing in well-connected graphs due to Rao-Zhou. However, we also develop new techniques that allow us to keep a handle on the total cost, which was not a concern in the aforementioned literature.
给定一个网络,一组需求和一个代价函数f(.),最小代价网络设计问题是以最小化sum_e f(l_e)为目标路由所有需求,其中l_e为路由下的总流量负载。我们关注f(x) = s + x^a的形式的成本函数,对于x >, 0,当f(0) = 0。对于正启动成本为s >的1。代价函数f(。)既不是亚加性的也不是超加性的。这样做的动机是在支持一组流量需求时最大限度地减少整个网络的能源消耗。人们普遍认为,对于某些计算和通信设备,处理速度翻倍会导致能耗翻倍。因此,用经济学的说法,这样的成本函数反映了规模不经济。我们首先讨论为什么现有的路由技术,如随机舍入和树度量嵌入不能直接泛化。然后,我们提出了我们的主要贡献,这是一个多对数近似算法。我们通过首先推导相关的有能力最小成本流问题的双准则近似得到这个结果,我们认为这个问题本身就很有趣。我们解决这个问题的方法建立在Chekuri-Khanna-Shepherd的良好连接分解,Khandekar-Rao-Vazirani的通过匹配构造展开器,以及Rao-Zhou的良好连接图中的边不相交路由的基础上。然而,我们也开发了新的技术,使我们能够控制总成本,这在前面的文献中不是一个问题。
{"title":"Minimum-Cost Network Design with (Dis)economies of Scale","authors":"M. Andrews, S. Antonakopoulos, Lisa Zhang","doi":"10.1137/110825959","DOIUrl":"https://doi.org/10.1137/110825959","url":null,"abstract":"Given a network, a set of demands and a cost function f(.), the min-cost network design problem is to route all demands with the objective of minimizing sum_e f(l_e), where l_e is the total traffic load under the routing. We focus on cost functions of the form f(x) = s + x^a for x &gt, 0, with f(0) = 0. For a 1 with a positive startup cost s &gt, 0. Now, the cost function f(.) is neither sub additive nor super additive. This is motivated by minimizing network-wide energy consumption when supporting a set of traffic demands. It is commonly accepted that, for some computing and communication devices, doubling processing speed more than doubles the energy consumption. Hence, in Economics parlance, such a cost function reflects diseconomies of scale. We begin by discussing why existing routing techniques such as randomized rounding and tree-metric embedding fail to generalize directly. We then present our main contribution, which is a polylogarithmic approximation algorithm. We obtain this result by first deriving a bicriteria approximation for a related capacitated min-cost flow problem that we believe is interesting in its own right. Our approach for this problem builds upon the well-linked decomposition due to Chekuri-Khanna-Shepherd, the construction of expanders via matchings due to Khandekar-Rao-Vazirani, and edge-disjoint routing in well-connected graphs due to Rao-Zhou. However, we also develop new techniques that allow us to keep a handle on the total cost, which was not a concern in the aforementioned literature.","PeriodicalId":228365,"journal":{"name":"2010 IEEE 51st Annual Symposium on Foundations of Computer Science","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127893744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
Solving Linear Systems through Nested Dissection 通过嵌套分解求解线性系统
Pub Date : 2010-10-23 DOI: 10.1109/FOCS.2010.28
N. Alon, R. Yuster
The generalized nested dissection method, developed by Lipton, Rose, and Tarjan, is a seminal method for solving a linear system Ax=b where A is a symmetric positive definite matrix. The method runs extremely fast whenever A is a well-separable matrix (such as matrices whose underlying support is planar or avoids a fixed minor). In this work we extend the nested dissection method to apply to any non-singular well-separable matrix over any field. The running times we obtain essentially match those of the nested dissection method.
由Lipton, Rose和Tarjan开发的广义嵌套解剖方法是求解线性系统Ax=b的一种开创性方法,其中a是对称正定矩阵。当A是可分离矩阵时(例如底层支持是平面的或避免了固定次元的矩阵),该方法运行得非常快。本文将嵌套分解方法推广到适用于任意域上的任意非奇异可分矩阵。我们得到的运行时间与嵌套分解方法基本匹配。
{"title":"Solving Linear Systems through Nested Dissection","authors":"N. Alon, R. Yuster","doi":"10.1109/FOCS.2010.28","DOIUrl":"https://doi.org/10.1109/FOCS.2010.28","url":null,"abstract":"The generalized nested dissection method, developed by Lipton, Rose, and Tarjan, is a seminal method for solving a linear system Ax=b where A is a symmetric positive definite matrix. The method runs extremely fast whenever A is a well-separable matrix (such as matrices whose underlying support is planar or avoids a fixed minor). In this work we extend the nested dissection method to apply to any non-singular well-separable matrix over any field. The running times we obtain essentially match those of the nested dissection method.","PeriodicalId":228365,"journal":{"name":"2010 IEEE 51st Annual Symposium on Foundations of Computer Science","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116483790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
期刊
2010 IEEE 51st Annual Symposium on Foundations of Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1