首页 > 最新文献

2010 IEEE 51st Annual Symposium on Foundations of Computer Science最新文献

英文 中文
Strong Fault-Tolerance for Self-Assembly with Fuzzy Temperature 模糊温度自组装的强容错性
Pub Date : 2010-04-06 DOI: 10.1109/FOCS.2010.47
David Doty, Matthew J. Patitz, D. Reishus, R. Schweller, Scott M. Summers
We consider the problem of fault-tolerance in nanoscale algorithmic self-assembly. We employ a standard variant of Winfree’s abstract Tile Assembly Model (aTAM), the two-handed aTAM, in which square “tiles” – a model of molecules constructed from DNA for the purpose of engineering self-assembled nanostructures – aggregate according to specific binding sites of varying strengths, and in which large aggregations of tiles may attach to each other, in contrast to the seeded aTAM, in which tiles aggregate one at a time to a single specially designated “seed” assembly. We focus on a major cause of errors in tile-based self-assembly: that of unintended growth due to “weak” strength-1 bonds, which if allowed to persist, may be stabilized by subsequent attachment of neighboring tiles in the sense that at least energy 2 is now required to break apart the resulting assembly, i.e., the errant assembly is stable at temperature 2. We study a common self-assembly benchmark problem, that of assembling an n×n square using O(log n) unique tile types, under the two-handed model of self-assembly. Our main result achieves a much stronger notion of fault-tolerance than those achieved previously. Arbitrary strength-1 growth is allowed, however, any assembly that grows sufficiently to become stable at temperature 2 is guaranteed to assemble into the correct final assembly of an n×n square. In other words, errors due to insufficient attachment, which is the cause of errors studied in earlier papers on fault-tolerance, are prevented absolutely in our main construction, rather than only with high probability and for sufficiently small structures, as in previous fault tolerance studies.
研究了纳米尺度算法自组装中的容错问题。我们采用了Winfree抽象瓷砖组装模型(aTAM)的一个标准变体,即双手aTAM,其中方形“瓷砖”——一种由DNA构建的分子模型,用于工程自组装纳米结构——根据不同强度的特定结合位点聚集,其中大块的瓷砖可以相互附着,与种子aTAM相反,在种子aTAM中,瓷砖一次聚集一个,形成一个专门指定的“种子”组装。我们关注基于瓷砖的自组装错误的主要原因:由于“弱”强度-1键而导致的意外增长,如果允许其持续存在,可能会通过随后的相邻瓷砖的附着来稳定,因为现在至少需要能量2来分解产生的组装,即错误的组装在温度2下是稳定的。我们研究了一个常见的自组装基准问题,即在自组装的双手模型下,使用O(log n)个唯一瓦片类型组装一个n×n正方形的问题。我们的主要结果实现了比以前更强的容错概念。允许任意强度-1的增长,但是,任何在温度- 2下足够稳定的组件都可以保证组装成n×n方形的正确最终组件。换句话说,在我们的主结构中,完全可以避免由于连接不足而导致的错误,而不是像以前的容错研究那样,只有高概率和足够小的结构才会发生错误。
{"title":"Strong Fault-Tolerance for Self-Assembly with Fuzzy Temperature","authors":"David Doty, Matthew J. Patitz, D. Reishus, R. Schweller, Scott M. Summers","doi":"10.1109/FOCS.2010.47","DOIUrl":"https://doi.org/10.1109/FOCS.2010.47","url":null,"abstract":"We consider the problem of fault-tolerance in nanoscale algorithmic self-assembly. We employ a standard variant of Winfree’s abstract Tile Assembly Model (aTAM), the two-handed aTAM, in which square “tiles” – a model of molecules constructed from DNA for the purpose of engineering self-assembled nanostructures – aggregate according to specific binding sites of varying strengths, and in which large aggregations of tiles may attach to each other, in contrast to the seeded aTAM, in which tiles aggregate one at a time to a single specially designated “seed” assembly. We focus on a major cause of errors in tile-based self-assembly: that of unintended growth due to “weak” strength-1 bonds, which if allowed to persist, may be stabilized by subsequent attachment of neighboring tiles in the sense that at least energy 2 is now required to break apart the resulting assembly, i.e., the errant assembly is stable at temperature 2. We study a common self-assembly benchmark problem, that of assembling an n×n square using O(log n) unique tile types, under the two-handed model of self-assembly. Our main result achieves a much stronger notion of fault-tolerance than those achieved previously. Arbitrary strength-1 growth is allowed, however, any assembly that grows sufficiently to become stable at temperature 2 is guaranteed to assemble into the correct final assembly of an n×n square. In other words, errors due to insufficient attachment, which is the cause of errors studied in earlier papers on fault-tolerance, are prevented absolutely in our main construction, rather than only with high probability and for sufficiently small structures, as in previous fault tolerance studies.","PeriodicalId":228365,"journal":{"name":"2010 IEEE 51st Annual Symposium on Foundations of Computer Science","volume":"20 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126939197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
Approaching Optimality for Solving SDD Linear Systems 求解SDD线性系统的逼近最优性
Pub Date : 2010-03-15 DOI: 10.1137/110845914
I. Koutis, G. Miller, Richard Peng
We present an algorithm that on input of an $n$-vertex $m$-edge weighted graph $G$ and a value $k$, produces an {em incremental sparsifier} $hat{G}$ with $n-1 + m/k$ edges, such that the condition number of $G$ with $hat{G}$ is bounded above by $tilde{O}(klog^2 n) $, with probability $1-p$. The algorithm runs in time $$tilde{O}((m log{n} + nlog^2{n})log(1/p)).$$ As a result, we obtain an algorithm that on input of an $ntimes n$ symmetric diagonally dominant matrix $A$ with $m$ non-zero entries and a vector $b$, computes a vector ${x}$ satisfying $| |{x}-A^{+}b| |_A
我们提出了一种算法,当输入一个$n$-顶点$m$-边加权图$G$和一个值$k$时,产生一个$n-1 + m/k$边的$hat{G}$,使得$G$具有$hat{G}$的条件数在$tilde{O}(klog^ 2n) $上有界,其概率为$1-p$。算法运行时间为$$tilde{O}((m log{n} + nlog^2{n})log(1/p))。结果,我们得到了一个算法,该算法在输入$n乘以n$对称对角占优矩阵$ a $时,具有$m$非零项和一个向量$b$,计算出一个满足$| |{x}-A^{+}b| |_A的向量${x}$
{"title":"Approaching Optimality for Solving SDD Linear Systems","authors":"I. Koutis, G. Miller, Richard Peng","doi":"10.1137/110845914","DOIUrl":"https://doi.org/10.1137/110845914","url":null,"abstract":"We present an algorithm that on input of an $n$-vertex $m$-edge weighted graph $G$ and a value $k$, produces an {em incremental sparsifier} $hat{G}$ with $n-1 + m/k$ edges, such that the condition number of $G$ with $hat{G}$ is bounded above by $tilde{O}(klog^2 n) $, with probability $1-p$. The algorithm runs in time $$tilde{O}((m log{n} + nlog^2{n})log(1/p)).$$ As a result, we obtain an algorithm that on input of an $ntimes n$ symmetric diagonally dominant matrix $A$ with $m$ non-zero entries and a vector $b$, computes a vector ${x}$ satisfying $| |{x}-A^{+}b| |_A","PeriodicalId":228365,"journal":{"name":"2010 IEEE 51st Annual Symposium on Foundations of Computer Science","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124601554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 286
Min st-cut Oracle for Planar Graphs with Near-Linear Preprocessing Time 具有近线性预处理时间的平面图的最小切割Oracle
Pub Date : 2010-03-05 DOI: 10.1145/2684068
G. Borradaile, P. Sankowski, Christian Wulff-Nilsen
For an undirected $n$-vertex planar graph $G$ with non-negative edge-weights, we consider the following type of query: given two vertices $s$ and $t$ in $G$, what is the weight of a min $st$-cut in $G$? We show how to answer such queries in constant time with $O(nlog^5n)$ preprocessing time and $O(nlog n)$ space. We use a Gomory-Hu tree to represent all the pair wise min $st$-cuts implicitly. Previously, no sub quadratic time algorithm was known for this problem. Our oracle can be extended to report the min $st$-cuts in time proportional to their size. Since all-pairs min $st$-cut and the minimum cycle basis are dual problems in planar graphs, we also obtain an implicit representation of a minimum cycle basis in $O(nlog^5n)$ time and $O(nlog n)$ space and an explicit representation with additional $O(C)$ time and space where $C$ is the size of the basis. To obtain our results, we require that shortest paths be unique, this assumption can be removed deterministically with an additional $O(log^2 n)$ running-time factor.
对于一个有n个顶点的无向平面图G$,我们考虑以下类型的查询:给定G$中的两个顶点s$和t$,在G$中最小st$切割的权值是多少?我们将展示如何在常数时间内用$O(nlog^5n)$预处理时间和$O(nlog n)$空间回答这样的查询。我们使用Gomory-Hu树来隐式地表示所有对最小$st$-切。在此之前,没有已知的次二次时间算法来解决这个问题。我们的oracle可以扩展到报告与它们的大小成比例的最小$st$-cuts。由于所有对min $st$-cut和最小循环基是平面图中的对偶问题,我们也得到了最小循环基在$O(nlog^5n)$时间和$O(nlog n)$空间中的隐式表示,以及附加$O(C)$时间和空间的显式表示,其中$C$是基的大小。为了获得我们的结果,我们要求最短路径是唯一的,这个假设可以通过额外的$O(log^2 n)$运行时间因子确定性地消除。
{"title":"Min st-cut Oracle for Planar Graphs with Near-Linear Preprocessing Time","authors":"G. Borradaile, P. Sankowski, Christian Wulff-Nilsen","doi":"10.1145/2684068","DOIUrl":"https://doi.org/10.1145/2684068","url":null,"abstract":"For an undirected $n$-vertex planar graph $G$ with non-negative edge-weights, we consider the following type of query: given two vertices $s$ and $t$ in $G$, what is the weight of a min $st$-cut in $G$? We show how to answer such queries in constant time with $O(nlog^5n)$ preprocessing time and $O(nlog n)$ space. We use a Gomory-Hu tree to represent all the pair wise min $st$-cuts implicitly. Previously, no sub quadratic time algorithm was known for this problem. Our oracle can be extended to report the min $st$-cuts in time proportional to their size. Since all-pairs min $st$-cut and the minimum cycle basis are dual problems in planar graphs, we also obtain an implicit representation of a minimum cycle basis in $O(nlog^5n)$ time and $O(nlog n)$ space and an explicit representation with additional $O(C)$ time and space where $C$ is the size of the basis. To obtain our results, we require that shortest paths be unique, this assumption can be removed deterministically with an additional $O(log^2 n)$ running-time factor.","PeriodicalId":228365,"journal":{"name":"2010 IEEE 51st Annual Symposium on Foundations of Computer Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130505672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
Budget Feasible Mechanisms 预算可行机制
Pub Date : 2010-02-11 DOI: 10.1109/FOCS.2010.78
Yaron Singer
We study a novel class of mechanism design problems in which the outcomes are constrained by the payments. This basic class of mechanism design problems captures many common economic situations, and yet it has not been studied, to our knowledge, in the past. We focus on the case of procurement auctions in which sellers have private costs, and the auctioneer aims to maximize a utility function on subsets of items, under the constraint that the sum of the payments provided by the mechanism does not exceed a given budget. Standard mechanism design ideas such as the VCG mechanism and its variants are not applicable here. We show that, for general functions, the budget constraint can render mechanisms arbitrarily bad in terms of the utility of the buyer. However, our main result shows that for the important class of sub modular functions, a bounded approximation ratio is achievable. Better approximation results are obtained for subclasses of the sub modular functions. We explore the space of budget feasible mechanisms in other domains and give a characterization under more restricted conditions.
我们研究了一类新的机制设计问题,其中结果受支付的约束。这类基本的机制设计问题涵盖了许多常见的经济状况,但据我们所知,过去还没有人研究过。我们关注的是采购拍卖的情况,在这种情况下,卖家有私人成本,而拍卖人的目标是在该机制提供的支付总额不超过给定预算的约束下,最大化物品子集上的效用函数。标准的机构设计思想,如VCG机构及其变体,在这里不适用。我们表明,对于一般函数,预算约束可以使机制在买方效用方面任意恶化。然而,我们的主要结果表明,对于一类重要的子模函数,有界近似比是可以实现的。对子模函数的子类得到了较好的逼近结果。我们探索了预算可行机制在其他领域的空间,并给出了在更有限条件下的表征。
{"title":"Budget Feasible Mechanisms","authors":"Yaron Singer","doi":"10.1109/FOCS.2010.78","DOIUrl":"https://doi.org/10.1109/FOCS.2010.78","url":null,"abstract":"We study a novel class of mechanism design problems in which the outcomes are constrained by the payments. This basic class of mechanism design problems captures many common economic situations, and yet it has not been studied, to our knowledge, in the past. We focus on the case of procurement auctions in which sellers have private costs, and the auctioneer aims to maximize a utility function on subsets of items, under the constraint that the sum of the payments provided by the mechanism does not exceed a given budget. Standard mechanism design ideas such as the VCG mechanism and its variants are not applicable here. We show that, for general functions, the budget constraint can render mechanisms arbitrarily bad in terms of the utility of the buyer. However, our main result shows that for the important class of sub modular functions, a bounded approximation ratio is achievable. Better approximation results are obtained for subclasses of the sub modular functions. We explore the space of budget feasible mechanisms in other domains and give a characterization under more restricted conditions.","PeriodicalId":228365,"journal":{"name":"2010 IEEE 51st Annual Symposium on Foundations of Computer Science","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131137882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 255
Constructive Algorithms for Discrepancy Minimization 差异最小化的构造算法
Pub Date : 2010-02-11 DOI: 10.1109/FOCS.2010.7
N. Bansal
Given a set system $(V,mathcal{S})$, $V={1,ldots,n}$ and $mathcal{S}={S_1,ldots,S_m}$, the minimum discrepancy problem is to find a 2-coloring $mathcal{X}:V right arrow {-1,+1}$, such that each set is colored as evenly as possible, i.e. find $mathcal{X}$ to minimize $max_{j in [m]} left|sum_{i in S_j} mathcal{X}(i)right|$. In this paper we give the first polynomial time algorithms for discrepancy minimization that achieve bounds similar to those known existentially using the so-called Entropy Method. We also give a first approximation-like result for discrepancy. Specifically we give efficient randomized algorithms to: 1. Construct an $O(n^{1/2})$ discrepancy coloring for general sets systems when $m=O(n)$, matching the celebrated result of Spencer up to $O(1)$ factors. More generally, for $mgeq n$, we obtain a discrepancy of $O(n^{1/2} log (2m/n))$. 2. Construct a coloring with discrepancy $O(t^{1/2} log n)$, if each element lies in at most $t$ sets. This matches the (non-constructive) result of Srinivasan. 3. Construct a coloring with discrepancy $O( lambdalog (nm))$, where $lambda$ is the hereditary discrepancy of the set system. The main idea in our algorithms is to produce a coloring over time by letting the color of the elements perform a random walk (with tiny increments) starting from 0 until they reach $pm 1$. At each step the random hops for various elements are correlated by a solution to a semi definite program, where this program is determined by the current state and the entropy method.
给定一个集合系统$(V,mathcal{S})$, $V={1,ldots,n}$和$mathcal{S}={S_1,ldots,S_m}$,最小差异问题是找到一个2着色的$mathcal{X}:V right arrow {-1,+1}$,使每个集合的着色尽可能均匀,即找到$mathcal{X}$以最小化$max_{j in [m]} left|sum_{i in S_j} mathcal{X}(i)right|$。在本文中,我们给出了第一个多项式时间算法的差异最小化,达到界类似于那些已知的存在使用所谓的熵方法。对于差异,我们也给出了一个近似的第一近似结果。具体来说,我们给出了高效的随机化算法:1。对于一般集系统,当$m=O(n)$时,构造一个$O(n^{1/2})$差异着色,将Spencer的著名结果匹配到$O(1)$因子。更一般地说,对于$mgeq n$,我们得到了$O(n^{1/2} log (2m/n))$的差异。2. 如果每个元素最多位于$t$集中,则构造一个差异为$O(t^{1/2} log n)$的着色。这与Srinivasan的(非建设性)结果相匹配。构造一个偏差$O( lambdalog (nm))$的着色,其中$lambda$为集合系统的遗传偏差。我们算法的主要思想是通过让元素的颜色执行从0开始的随机游走(以微小的增量),直到它们到达$pm 1$,从而随着时间的推移产生颜色。在每一步中,各种元素的随机跳数通过半确定程序的解相关联,其中该程序由当前状态和熵法决定。
{"title":"Constructive Algorithms for Discrepancy Minimization","authors":"N. Bansal","doi":"10.1109/FOCS.2010.7","DOIUrl":"https://doi.org/10.1109/FOCS.2010.7","url":null,"abstract":"Given a set system $(V,mathcal{S})$, $V={1,ldots,n}$ and $mathcal{S}={S_1,ldots,S_m}$, the minimum discrepancy problem is to find a 2-coloring $mathcal{X}:V right arrow {-1,+1}$, such that each set is colored as evenly as possible, i.e. find $mathcal{X}$ to minimize $max_{j in [m]} left|sum_{i in S_j} mathcal{X}(i)right|$. In this paper we give the first polynomial time algorithms for discrepancy minimization that achieve bounds similar to those known existentially using the so-called Entropy Method. We also give a first approximation-like result for discrepancy. Specifically we give efficient randomized algorithms to: 1. Construct an $O(n^{1/2})$ discrepancy coloring for general sets systems when $m=O(n)$, matching the celebrated result of Spencer up to $O(1)$ factors. More generally, for $mgeq n$, we obtain a discrepancy of $O(n^{1/2} log (2m/n))$. 2. Construct a coloring with discrepancy $O(t^{1/2} log n)$, if each element lies in at most $t$ sets. This matches the (non-constructive) result of Srinivasan. 3. Construct a coloring with discrepancy $O( lambdalog (nm))$, where $lambda$ is the hereditary discrepancy of the set system. The main idea in our algorithms is to produce a coloring over time by letting the color of the elements perform a random walk (with tiny increments) starting from 0 until they reach $pm 1$. At each step the random hops for various elements are correlated by a solution to a semi definite program, where this program is determined by the current state and the entropy method.","PeriodicalId":228365,"journal":{"name":"2010 IEEE 51st Annual Symposium on Foundations of Computer Science","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127851426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 174
From Sylvester-Gallai Configurations to Rank Bounds: Improved Black-Box Identity Test for Depth-3 Circuits 从Sylvester-Gallai配置到秩界:深度3电路的改进黑盒恒等检验
Pub Date : 2010-01-31 DOI: 10.1145/2528403
Nitin Saxena, C. Seshadhri
We study the problem of identity testing for depth-3 circuits of top fanin k and degree d. We give a new structure theorem for such identities. A direct application of our theorem improves the known deterministic d^{k^k}-time black-box identity test over rationals (Kayal & Saraf, FOCS 2009) to one that takes d^{k^2}-time. Our structure theorem essentially says that the number of independent variables in a real depth-3 identity is very small. This theorem affirmatively settles the strong rank conjecture posed by Dvir & Shpilka (STOC 2005). We devise a powerful algebraic framework and develop tools to study depth-3 identities. We use these tools to show that any depth-3 identity contains a much smaller nucleus identity that contains most of the "complexity" of the main identity. The special properties of this nucleus allow us to get almost optimal rank bounds for depth-3 identities.
研究了k次和d次的深度3电路的恒等式检验问题,给出了这种恒等式的一个新的结构定理。我们定理的直接应用将已知的确定性d^{k^k}时间的有理数黑盒恒等式检验(Kayal & Saraf, FOCS 2009)改进为需要d^{k^2}时间的黑盒恒等式检验。我们的结构定理本质上是说在一个实深度为3的恒等式中自变量的数量是非常小的。该定理肯定地解决了Dvir & Shpilka (STOC 2005)提出的强秩猜想。我们设计了一个强大的代数框架和开发工具来研究深度3恒等式。我们使用这些工具来表明,任何深度-3恒等式都包含一个小得多的核心恒等式,它包含了主恒等式的大部分“复杂性”。这个核的特殊性质使我们能够得到深度为3的恒等式的几乎最优的秩界。
{"title":"From Sylvester-Gallai Configurations to Rank Bounds: Improved Black-Box Identity Test for Depth-3 Circuits","authors":"Nitin Saxena, C. Seshadhri","doi":"10.1145/2528403","DOIUrl":"https://doi.org/10.1145/2528403","url":null,"abstract":"We study the problem of identity testing for depth-3 circuits of top fanin k and degree d. We give a new structure theorem for such identities. A direct application of our theorem improves the known deterministic d^{k^k}-time black-box identity test over rationals (Kayal & Saraf, FOCS 2009) to one that takes d^{k^2}-time. Our structure theorem essentially says that the number of independent variables in a real depth-3 identity is very small. This theorem affirmatively settles the strong rank conjecture posed by Dvir & Shpilka (STOC 2005). We devise a powerful algebraic framework and develop tools to study depth-3 identities. We use these tools to show that any depth-3 identity contains a much smaller nucleus identity that contains most of the \"complexity\" of the main identity. The special properties of this nucleus allow us to get almost optimal rank bounds for depth-3 identities.","PeriodicalId":228365,"journal":{"name":"2010 IEEE 51st Annual Symposium on Foundations of Computer Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131246695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 63
New Constructive Aspects of the Lovasz Local Lemma Lovasz局部引理的新构造方面
Pub Date : 2010-01-08 DOI: 10.1145/2049697.2049702
Bernhard Haeupler, B. Saha, A. Srinivasan
The Lov'{a}sz Local Lemma (LLL) is a powerful tool that gives sufficient conditions for avoiding all of a given set of ``bad'' events, with positive probability. A series of results have provided algorithms to efficiently construct structures whose existence is non-constructively guaranteed by the LLL, culminating in the recent breakthrough of Moser & Tardos. We show that the output distribution of the Moser-Tardos algorithm well-approximates the emph{conditional LLL-distribution} – the distribution obtained by conditioning on all bad events being avoided. We show how a known bound on the probabilities of events in this distribution can be used for further probabilistic analysis and give new constructive and non-constructive results. We also show that when an LLL application provides a small amount of slack, the number of resamplings of the Moser-Tardos algorithm is nearly linear in the number of underlying independent variables (not events!), and can thus be used to give efficient constructions in cases where the underlying proof applies the LLL to super-polynomially many events. Even in cases where finding a bad event that holds is computationally hard, we show that applying the algorithm to avoid a polynomial-sized ``core'' subset of bad events leads to a desired outcome with high probability. We demonstrate this idea on several applications. We give the first constant-factor approximation algorithm for the Santa Claus problem by making an LLL-based proof of Feige constructive. We provide Monte Carlo algorithms for acyclic edge coloring, non-repetitive graph colorings, and Ramsey-type graphs. In all these applications the algorithm falls directly out of the non-constructive LLL-based proof. Our algorithms are very simple, often provide better bounds than previous algorithms, and are in several cases the first efficient algorithms known. As a second type of application we consider settings beyond the critical dependency threshold of the LLL: avoiding all bad events is impossible in these cases. As the first (even non-constructive) result of this kind, we show that by sampling from the LLL-distribution of a selected smaller core, we can avoid a fraction of bad events that is higher than the expectation. MAX $k$-SAT is an example of this.
Lovász局部引理(LLL)是一个强大的工具,它给出了避免所有给定的“坏”事件集的充分条件,具有正概率。一系列的结果提供了有效地构建结构的算法,这些结构的存在是由ll保证的,最终在Moser和Tardos最近的突破中达到高潮。我们证明了Moser-Tardos算法的输出分布很好地近似于emph{条件ll-分布},即在避免所有不良事件的条件下得到的分布。我们展示了如何将该分布中事件概率的已知界用于进一步的概率分析,并给出新的建设性和非建设性结果。我们还表明,当LLL应用程序提供少量的松弛时,Moser-Tardos算法的重采样次数在底层自变量(而不是事件!)的数量上几乎是线性的,因此可以用于在底层证明将LLL应用于超多项式多事件的情况下给出有效的构造。即使在发现一个存在的坏事件在计算上很困难的情况下,我们也表明,应用该算法来避免一个多项式大小的坏事件的“核心”子集,会导致高概率的期望结果。我们在几个应用程序中演示了这个想法。通过基于lll的Feige构造性证明,给出了求解圣诞老人问题的第一个常因子逼近算法。我们提供了蒙特卡罗算法的无环边着色,非重复图着色,和拉姆齐型图。在所有这些应用中,该算法直接脱离了非建设性的基于lll的证明。我们的算法非常简单,通常比以前的算法提供更好的边界,并且在一些情况下是已知的第一个有效算法。作为第二种类型的应用程序,我们考虑超出ll的关键依赖阈值的设置:在这些情况下,避免所有不良事件是不可能的。作为这类的第一个(甚至是非建设性的)结果,我们表明,通过从选定的较小核心的ll -分布中抽样,我们可以避免高于预期的一小部分坏事件。MAX $k$ -SAT就是一个例子。
{"title":"New Constructive Aspects of the Lovasz Local Lemma","authors":"Bernhard Haeupler, B. Saha, A. Srinivasan","doi":"10.1145/2049697.2049702","DOIUrl":"https://doi.org/10.1145/2049697.2049702","url":null,"abstract":"The Lov'{a}sz Local Lemma (LLL) is a powerful tool that gives sufficient conditions for avoiding all of a given set of ``bad'' events, with positive probability. A series of results have provided algorithms to efficiently construct structures whose existence is non-constructively guaranteed by the LLL, culminating in the recent breakthrough of Moser & Tardos. We show that the output distribution of the Moser-Tardos algorithm well-approximates the emph{conditional LLL-distribution} – the distribution obtained by conditioning on all bad events being avoided. We show how a known bound on the probabilities of events in this distribution can be used for further probabilistic analysis and give new constructive and non-constructive results. We also show that when an LLL application provides a small amount of slack, the number of resamplings of the Moser-Tardos algorithm is nearly linear in the number of underlying independent variables (not events!), and can thus be used to give efficient constructions in cases where the underlying proof applies the LLL to super-polynomially many events. Even in cases where finding a bad event that holds is computationally hard, we show that applying the algorithm to avoid a polynomial-sized ``core'' subset of bad events leads to a desired outcome with high probability. We demonstrate this idea on several applications. We give the first constant-factor approximation algorithm for the Santa Claus problem by making an LLL-based proof of Feige constructive. We provide Monte Carlo algorithms for acyclic edge coloring, non-repetitive graph colorings, and Ramsey-type graphs. In all these applications the algorithm falls directly out of the non-constructive LLL-based proof. Our algorithms are very simple, often provide better bounds than previous algorithms, and are in several cases the first efficient algorithms known. As a second type of application we consider settings beyond the critical dependency threshold of the LLL: avoiding all bad events is impossible in these cases. As the first (even non-constructive) result of this kind, we show that by sampling from the LLL-distribution of a selected smaller core, we can avoid a fraction of bad events that is higher than the expectation. MAX $k$-SAT is an example of this.","PeriodicalId":228365,"journal":{"name":"2010 IEEE 51st Annual Symposium on Foundations of Computer Science","volume":"289 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122303044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 149
Backyard Cuckoo Hashing: Constant Worst-Case Operations with a Succinct Representation 后院布谷鸟哈希:具有简洁表示的常数最坏情况操作
Pub Date : 2009-12-29 DOI: 10.1109/FOCS.2010.80
Yuriy Arbitman, M. Naor, G. Segev
The performance of a dynamic dictionary is measured mainly by its update time, lookup time, and space consumption. In terms of update time and lookup time there are known constructions that guarantee constant-time operations in the worst case with high probability, and in terms of space consumption there are known constructions that use essentially optimal space. However, although the first analysis of a dynamic dictionary dates back more than 45 years ago (when Knuth analyzed linear probing in 1963), the trade-off between these aspects of performance is still not completely understood. In this paper we settle two fundamental open problems: begin{itemize} item We construct the first dynamic dictionary that enjoys the best of both worlds: it stores $boldsymbol{n}$ elements using $boldsymbol{(1 + epsilon) n}$ memory words, and guarantees constant-time operations in the worst case with high probability. Specifically, for any boldsymbol{epsilon = Omega ( (log log n / log n)^{1/2} )}$ and for any sequence of polynomially many operations, with high probability over the randomness of the initialization phase, all operations are performed in constant time which is independent of $boldsymbol{epsilon}$. The construction is a two-level variant of cuckoo hashing, augmented with a ``backyard'' that handles a large fraction of the elements, together with a de-amortized perfect hashing scheme for eliminating the dependency on $boldsymbol{epsilon}$. item We present a variant of the above construction that uses only $boldsymbol{(1 + o(1))B}$ bits, where $boldsymbol{B}$ is the information-theoretic lower bound for representing a set of size $boldsymbol{n}$ taken from a universe of size $boldsymbol{u}$, and guarantees constant-time operations in the worst case with high probability, as before. This problem was open even in the {em amortized} setting. One of the main ingredients of our construction is a permutation-based variant of cuckoo hashing, which significantly improves the space consumption of cuckoo hashing when dealing with a rather small universe. end{itemize}
动态字典的性能主要通过其更新时间、查找时间和空间消耗来衡量。就更新时间和查找时间而言,有一些已知的结构可以在最坏的情况下以高概率保证恒定时间的操作,而就空间消耗而言,有一些已知的结构使用本质上最优的空间。然而,尽管对动态字典的第一次分析可以追溯到45年前(当时Knuth在1963年分析了线性探测),但性能的这些方面之间的权衡仍然没有完全理解。本文解决了两个基本的开放问题:我们构造了第一个具有两方面优点的动态字典:它使用$boldsymbol{(1 + epsilon) n}$存储$boldsymbol{n}$元素,并保证在最坏情况下以高概率进行恒定时间操作。具体来说,对于任何boldsymbol{epsilon = Omega ((log log n / log n)^{1/2})}$,以及对于任何多项式多个操作的序列,在初始化阶段的随机性上具有高概率,所有操作都在常数时间内执行,这与$boldsymbol{epsilon}$无关。该构造是布谷鸟哈希的两级变体,增加了一个处理大部分元素的“后院”,以及一个消除对$boldsymbol{epsilon}$依赖的非平摊完美哈希方案。我们给出了上述结构的一种变体,它只使用$boldsymbol{(1 + o(1))B}$位,其中$boldsymbol{B}$是表示大小为$boldsymbol{n}$的集合的信息论下界,该集合来自大小为$boldsymbol{u}$的集合,并保证在最坏情况下具有高概率的恒定时间操作,如前所示。即使在{em平摊}设置中,这个问题也是开放的。我们构建的主要成分之一是基于排列的布谷鸟哈希变体,它在处理较小的宇宙时显著提高了布谷鸟哈希的空间消耗。结束{逐条列记}
{"title":"Backyard Cuckoo Hashing: Constant Worst-Case Operations with a Succinct Representation","authors":"Yuriy Arbitman, M. Naor, G. Segev","doi":"10.1109/FOCS.2010.80","DOIUrl":"https://doi.org/10.1109/FOCS.2010.80","url":null,"abstract":"The performance of a dynamic dictionary is measured mainly by its update time, lookup time, and space consumption. In terms of update time and lookup time there are known constructions that guarantee constant-time operations in the worst case with high probability, and in terms of space consumption there are known constructions that use essentially optimal space. However, although the first analysis of a dynamic dictionary dates back more than 45 years ago (when Knuth analyzed linear probing in 1963), the trade-off between these aspects of performance is still not completely understood. In this paper we settle two fundamental open problems: begin{itemize} item We construct the first dynamic dictionary that enjoys the best of both worlds: it stores $boldsymbol{n}$ elements using $boldsymbol{(1 + epsilon) n}$ memory words, and guarantees constant-time operations in the worst case with high probability. Specifically, for any boldsymbol{epsilon = Omega ( (log log n / log n)^{1/2} )}$ and for any sequence of polynomially many operations, with high probability over the randomness of the initialization phase, all operations are performed in constant time which is independent of $boldsymbol{epsilon}$. The construction is a two-level variant of cuckoo hashing, augmented with a ``backyard'' that handles a large fraction of the elements, together with a de-amortized perfect hashing scheme for eliminating the dependency on $boldsymbol{epsilon}$. item We present a variant of the above construction that uses only $boldsymbol{(1 + o(1))B}$ bits, where $boldsymbol{B}$ is the information-theoretic lower bound for representing a set of size $boldsymbol{n}$ taken from a universe of size $boldsymbol{u}$, and guarantees constant-time operations in the worst case with high probability, as before. This problem was open even in the {em amortized} setting. One of the main ingredients of our construction is a permutation-based variant of cuckoo hashing, which significantly improves the space consumption of cuckoo hashing when dealing with a rather small universe. end{itemize}","PeriodicalId":228365,"journal":{"name":"2010 IEEE 51st Annual Symposium on Foundations of Computer Science","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121854045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 88
Frugal Mechanism Design via Spectral Techniques 基于谱技术的节约型机制设计
Pub Date : 2009-12-17 DOI: 10.1109/FOCS.2010.77
Ning Chen, E. Elkind, N. Gravin, F. Petrov
We study the design of truthful mechanisms for set systems, i.e., scenarios where a customer needs to hire a team of agents to perform a complex task. In this setting, frugality [2] provides a measure to evaluate the "cost of truthfulness", that is, the overpayment of a truthful mechanism relative to the "fair" payment. We propose a uniform scheme for designing frugal truthful mechanisms for general set systems. Our scheme is based on scaling the agents' bids using the eigenvector of a matrix that encodes the interdependencies between the agents. We demonstrate that the $r$-out-of-$k$-system mechanism and the $^{sqrt{ }}$-mechanism for buying a path in a graph [18] can be viewed as instantiations of our scheme. We then apply our scheme to two other classes of set systems, namely, vertex cover systems and $k$-path systems, in which a customer needs to purchase $k$ edge-disjoint source-sink paths. For both settings, we bound the frugality of our mechanism in terms of the largest eigenvalue of the respective interdependency matrix. We show that our mechanism is optimal for a large subclass of vertex cover systems satisfying a simple local sparsity condition. For $k$-path systems, our mechanism is within a factor of $k+1$ from optimal, moreover, we show that it is, in fact, optimal, when one uses a modified definition of frugality proposed in [10]. Our lower bound argument combines spectral techniques and Young's inequality, and is applicable to all set systems. As both $r$-out-of-$k$ systems and single path systems can be viewed as special cases of $k$-path systems, our result improves the lower bounds of [18] and answers several open questions proposed in [18].
我们研究了集合系统的真实机制设计,即客户需要雇佣一组代理来执行复杂任务的场景。在这种情况下,节俭bbb提供了一种评估“诚实成本”的措施,即相对于“公平”支付而言,诚实机制的超额支付。我们提出了一般集系统的节约真实机制设计的统一方案。我们的方案是基于使用编码代理之间相互依赖关系的矩阵的特征向量来缩放代理的出价。我们证明了$r$-out-of-$k$-system机制和$^{sqrt{}}$-机制在图[18]中购买路径可以看作是我们方案的实例。然后,我们将我们的方案应用于另外两类集合系统,即顶点覆盖系统和$k$路径系统,其中客户需要购买$k$边不相交的源-汇路径。对于这两种设置,我们根据各自相互依赖矩阵的最大特征值约束了我们机制的节俭性。我们证明了我们的机制是最优的一个大子类顶点覆盖系统满足一个简单的局部稀疏性条件。对于$k$路径系统,我们的机制离最优值在$k+1$的范围内,此外,我们表明,当我们使用[10]中提出的改进的节俭定义时,它实际上是最优的。我们的下界论证结合了谱技术和杨氏不等式,适用于所有集合系统。由于$r$-out- $k$系统和单路径系统都可以看作$k$-path系统的特殊情况,我们的结果改进了[18]的下界,并回答了[18]中提出的几个开放问题。
{"title":"Frugal Mechanism Design via Spectral Techniques","authors":"Ning Chen, E. Elkind, N. Gravin, F. Petrov","doi":"10.1109/FOCS.2010.77","DOIUrl":"https://doi.org/10.1109/FOCS.2010.77","url":null,"abstract":"We study the design of truthful mechanisms for set systems, i.e., scenarios where a customer needs to hire a team of agents to perform a complex task. In this setting, frugality [2] provides a measure to evaluate the \"cost of truthfulness\", that is, the overpayment of a truthful mechanism relative to the \"fair\" payment. We propose a uniform scheme for designing frugal truthful mechanisms for general set systems. Our scheme is based on scaling the agents' bids using the eigenvector of a matrix that encodes the interdependencies between the agents. We demonstrate that the $r$-out-of-$k$-system mechanism and the $^{sqrt{ }}$-mechanism for buying a path in a graph [18] can be viewed as instantiations of our scheme. We then apply our scheme to two other classes of set systems, namely, vertex cover systems and $k$-path systems, in which a customer needs to purchase $k$ edge-disjoint source-sink paths. For both settings, we bound the frugality of our mechanism in terms of the largest eigenvalue of the respective interdependency matrix. We show that our mechanism is optimal for a large subclass of vertex cover systems satisfying a simple local sparsity condition. For $k$-path systems, our mechanism is within a factor of $k+1$ from optimal, moreover, we show that it is, in fact, optimal, when one uses a modified definition of frugality proposed in [10]. Our lower bound argument combines spectral techniques and Young's inequality, and is applicable to all set systems. As both $r$-out-of-$k$ systems and single path systems can be viewed as special cases of $k$-path systems, our result improves the lower bounds of [18] and answers several open questions proposed in [18].","PeriodicalId":228365,"journal":{"name":"2010 IEEE 51st Annual Symposium on Foundations of Computer Science","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134221737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Frugal and Truthful Auctions for Vertex Covers, Flows and Cuts 顶点覆盖、流和切割的节俭和真实拍卖
Pub Date : 2009-12-16 DOI: 10.1109/FOCS.2010.76
D. Kempe, Mahyar Salek, Cristopher Moore
We study truthful mechanisms for hiring a team of agents in three classes of set systems: Vertex Cover auctions, k-???ow auctions, and cut auctions. For Vertex Cover auctions, the vertices are owned by selfish and rational agents, and the auctioneer wants to purchase a vertex cover from them. For k-???ow auctions, the edges are owned by the agents, and the auctioneer wants to purchase k edge-disjoint s-t paths, for given s and t. In the same setting, for cut auctions, the auctioneer wants to purchase an s-t cut. Only the agents know their costs, and the auctioneer needs to select a feasible set and payments based on bids made by the agents. We present constant-competitive truthful mechanisms for all three set systems. That is, the maximum overpayment of the mechanism is within a constant factor of the maximum overpayment of any truthful mechanism, for every set system in the class. The mechanism for Vertex Cover is based on scaling each bid by a multiplier derived from the dominant eigenvector of a certain matrix. The mechanism for k-???ows prunes the graph to be minimally (k + 1)-connected, and then applies the Vertex Cover mechanism. Similarly, the mechanism for cuts contracts the graph until all s-t paths have length exactly 2, and then applies the Vertex Cover mechanism.
我们研究了在三类集合系统中雇佣代理团队的真实机制:顶点覆盖拍卖、k-??现在拍卖,削减拍卖。对于顶点覆盖拍卖,顶点由自私和理性的代理人所有,拍卖人想从他们那里购买顶点覆盖。k - ? ?在拍卖中,对于给定的s和t,拍卖师想要购买k条边不相交的s-t条路径。在相同的设置中,对于切割拍卖,拍卖师想要购买一条s-t条切割。只有代理商知道他们的成本,拍卖商需要根据代理商的出价选择一个可行的集合和付款。我们提出了这三个集合系统的恒定竞争真实机制。也就是说,对于类中的每一个集合系统,该机制的最大超额支付在任何真实机制的最大超额支付的一个常数因子之内。顶点覆盖的机制是基于从某个矩阵的优势特征向量衍生出的乘数来缩放每个出价。k-??的反应机理ows将图修剪为最小(k + 1)连通,然后应用顶点覆盖机制。类似地,用于切割的机制收缩图,直到所有s-t路径的长度正好为2,然后应用顶点覆盖机制。
{"title":"Frugal and Truthful Auctions for Vertex Covers, Flows and Cuts","authors":"D. Kempe, Mahyar Salek, Cristopher Moore","doi":"10.1109/FOCS.2010.76","DOIUrl":"https://doi.org/10.1109/FOCS.2010.76","url":null,"abstract":"We study truthful mechanisms for hiring a team of agents in three classes of set systems: Vertex Cover auctions, k-???ow auctions, and cut auctions. For Vertex Cover auctions, the vertices are owned by selfish and rational agents, and the auctioneer wants to purchase a vertex cover from them. For k-???ow auctions, the edges are owned by the agents, and the auctioneer wants to purchase k edge-disjoint s-t paths, for given s and t. In the same setting, for cut auctions, the auctioneer wants to purchase an s-t cut. Only the agents know their costs, and the auctioneer needs to select a feasible set and payments based on bids made by the agents. We present constant-competitive truthful mechanisms for all three set systems. That is, the maximum overpayment of the mechanism is within a constant factor of the maximum overpayment of any truthful mechanism, for every set system in the class. The mechanism for Vertex Cover is based on scaling each bid by a multiplier derived from the dominant eigenvector of a certain matrix. The mechanism for k-???ows prunes the graph to be minimally (k + 1)-connected, and then applies the Vertex Cover mechanism. Similarly, the mechanism for cuts contracts the graph until all s-t paths have length exactly 2, and then applies the Vertex Cover mechanism.","PeriodicalId":228365,"journal":{"name":"2010 IEEE 51st Annual Symposium on Foundations of Computer Science","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128815471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
期刊
2010 IEEE 51st Annual Symposium on Foundations of Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1