首页 > 最新文献

Theor. Comput. Sci.最新文献

英文 中文
A refinement on the structure of vertex-critical (P5, gem)-free graphs 顶点临界(P5, gem)无图结构的一种改进
Pub Date : 2022-12-09 DOI: 10.2139/ssrn.4303315
B. Cameron, C. Hoàng
We give a new, stronger proof that there are only finitely many $k$-vertex-critical ($P_5$,~gem)-free graphs for all $k$. Our proof further refines the structure of these graphs and allows for the implementation of a simple exhaustive computer search to completely list all $6$- and $7$-vertex-critical $(P_5$, gem)-free graphs. Our results imply the existence of polynomial-time certifying algorithms to decide the $k$-colourability of $(P_5$, gem)-free graphs for all $k$ where the certificate is either a $k$-colouring or a $(k+1)$-vertex-critical induced subgraph. Our complete lists for $kle 7$ allow for the implementation of these algorithms for all $kle 6$.
我们给出了一个新的,更强的证明,对于所有的$k$,只有有限多个$k$-顶点临界($P_5$,~gem)无图。我们的证明进一步细化了这些图的结构,并允许实现一个简单的穷举计算机搜索,以完全列出所有$6$和$7$顶点临界$(P_5$, gem)-free图。我们的结果表明存在多项式时间认证算法来决定所有$k$的$(P_5$, gem)无图的$k$-可着色性,其中证书要么是$k$-可着色,要么是$(k+1)$-顶点临界诱导子图。我们对于$kle 7$的完整列表允许对所有$kle 6$实现这些算法。
{"title":"A refinement on the structure of vertex-critical (P5, gem)-free graphs","authors":"B. Cameron, C. Hoàng","doi":"10.2139/ssrn.4303315","DOIUrl":"https://doi.org/10.2139/ssrn.4303315","url":null,"abstract":"We give a new, stronger proof that there are only finitely many $k$-vertex-critical ($P_5$,~gem)-free graphs for all $k$. Our proof further refines the structure of these graphs and allows for the implementation of a simple exhaustive computer search to completely list all $6$- and $7$-vertex-critical $(P_5$, gem)-free graphs. Our results imply the existence of polynomial-time certifying algorithms to decide the $k$-colourability of $(P_5$, gem)-free graphs for all $k$ where the certificate is either a $k$-colouring or a $(k+1)$-vertex-critical induced subgraph. Our complete lists for $kle 7$ allow for the implementation of these algorithms for all $kle 6$.","PeriodicalId":23063,"journal":{"name":"Theor. Comput. Sci.","volume":"101 1","pages":"113936"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85901760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Game theory analysis of biometric systems market: Users choice VS service providers revenue 生物识别系统市场的博弈论分析:用户选择VS服务提供商收益
Pub Date : 2022-12-01 DOI: 10.2139/ssrn.4230135
S. Nemmaoui, Mohamed Baslam, B. Bouikhalene
{"title":"Game theory analysis of biometric systems market: Users choice VS service providers revenue","authors":"S. Nemmaoui, Mohamed Baslam, B. Bouikhalene","doi":"10.2139/ssrn.4230135","DOIUrl":"https://doi.org/10.2139/ssrn.4230135","url":null,"abstract":"","PeriodicalId":23063,"journal":{"name":"Theor. Comput. Sci.","volume":"67 1","pages":"142-152"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73994498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tractability beyond β-acyclicity for conjunctive queries with negation and SAT 具有否定和SAT的连接查询超越β-不环的可追溯性
Pub Date : 2022-12-01 DOI: 10.2139/ssrn.4132993
Matthias Lanzinger
{"title":"Tractability beyond β-acyclicity for conjunctive queries with negation and SAT","authors":"Matthias Lanzinger","doi":"10.2139/ssrn.4132993","DOIUrl":"https://doi.org/10.2139/ssrn.4132993","url":null,"abstract":"","PeriodicalId":23063,"journal":{"name":"Theor. Comput. Sci.","volume":"1 1","pages":"276-296"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78712081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The family of generalized variational network of cube-connected cycles 立方连通环的广义变分网络族
Pub Date : 2022-12-01 DOI: 10.2139/ssrn.4140150
Weifeng Li, Longxin Lin, Zhenyu Zhang
{"title":"The family of generalized variational network of cube-connected cycles","authors":"Weifeng Li, Longxin Lin, Zhenyu Zhang","doi":"10.2139/ssrn.4140150","DOIUrl":"https://doi.org/10.2139/ssrn.4140150","url":null,"abstract":"","PeriodicalId":23063,"journal":{"name":"Theor. Comput. Sci.","volume":"1 1","pages":"113672"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82203166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FPGA based secure and noiseless image transmission using LEA and optimized bilateral filter 基于FPGA的基于LEA和优化双边滤波器的安全无噪声图像传输
Pub Date : 2022-11-08 DOI: 10.7494/csci.2022.23.4.4491
Sunil B. Hebbale, V. Akula, Parashuram Baraki
In today’s world, the transmission of secured and noiseless image is a difficult task. Therefore, effective strategies are important to secure the data or secret image from the attackers. Besides, denoising approaches are important to obtain noise-free images. For this, an effective crypto-steganography method based on Lightweight Encryption Algorithm (LEA) and Modified Least Significant Bit (MLSB) method for secured transmission is proposed. Moreover, a bilateral filter-based Whale Optimization Algorithm (WOA) is used for image denoising. Before image transmission, the secret image is encrypted by the LEA algorithm and embedded into the cover image using Discrete Wavelet Transform (DWT) and MLSB technique. After the image transmission, the extraction process is performed to recover the secret image. Finally, a bilateral filter-WOA is used to remove the noise from the secret image. The Verilog code for the proposed model is designed and simulated in Xilinx software. Finally, the simulation results show that the proposed filtering technique has superior performance than conventional bilateral filter and Gaussian filter in terms of Peak Signal to Noise Ratio (PSNR) and Structural Similarity Index Measure (SSIM).
在当今世界,安全无噪图像的传输是一项艰巨的任务。因此,有效的策略对于保护数据或秘密图像免受攻击者的攻击至关重要。此外,去噪方法是获得无噪声图像的重要方法。为此,提出了一种基于轻量级加密算法(LEA)和修正最小有效位(MLSB)方法的安全传输加密隐写方法。此外,采用基于双边滤波器的鲸鱼优化算法(WOA)进行图像去噪。在图像传输前,秘密图像通过LEA算法进行加密,并利用离散小波变换(DWT)和MLSB技术嵌入到封面图像中。图像传输完成后,进行提取过程,恢复秘密图像。最后,采用双向woa滤波器去除秘密图像中的噪声。设计了该模型的Verilog代码,并在Xilinx软件中进行了仿真。最后,仿真结果表明,该滤波技术在峰值信噪比(PSNR)和结构相似指数度量(SSIM)方面都优于传统双边滤波器和高斯滤波器。
{"title":"FPGA based secure and noiseless image transmission using LEA and optimized bilateral filter","authors":"Sunil B. Hebbale, V. Akula, Parashuram Baraki","doi":"10.7494/csci.2022.23.4.4491","DOIUrl":"https://doi.org/10.7494/csci.2022.23.4.4491","url":null,"abstract":"In today’s world, the transmission of secured and noiseless image is a difficult task. Therefore, effective strategies are important to secure the data or secret image from the attackers. Besides, denoising approaches are important to obtain noise-free images. For this, an effective crypto-steganography method based on Lightweight Encryption Algorithm (LEA) and Modified Least Significant Bit (MLSB) method for secured transmission is proposed. Moreover, a bilateral filter-based Whale Optimization Algorithm (WOA) is used for image denoising. Before image transmission, the secret image is encrypted by the LEA algorithm and embedded into the cover image using Discrete Wavelet Transform (DWT) and MLSB technique. After the image transmission, the extraction process is performed to recover the secret image. Finally, a bilateral filter-WOA is used to remove the noise from the secret image. The Verilog code for the proposed model is designed and simulated in Xilinx software. Finally, the simulation results show that the proposed filtering technique has superior performance than conventional bilateral filter and Gaussian filter in terms of Peak Signal to Noise Ratio (PSNR) and Structural Similarity Index Measure (SSIM).","PeriodicalId":23063,"journal":{"name":"Theor. Comput. Sci.","volume":"3 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74335039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Group Membership Management Framework for Decentralized Collaborative Systems 分布式协作系统的组成员管理框架
Pub Date : 2022-11-08 DOI: 10.7494/csci.2022.23.4.4642
Lukasz Opiola, Kamil Jarosz, L. Dutka, R. Słota, J. Kitowski
Scientific and commercial endeavors could benefit from cross-organizational, decentralized collaboration, which becomes the key to innovation. This work addresses one of its challenges, namely efficient access control to assets for distributed data processing among autonomous data centers. We propose a group membership management framework dedicated for realizing access control in decentralized environments. Its novelty lies in a synergy of two concepts: a decentralized knowledge base and an incremental indexing scheme, both assuming a P2P architecture, where each peer retains autonomy and has full control over the choice of peers it cooperates with. The extent of exchanged information is reduced to the minimum required for user collaboration and assumes limited trust between peers. The indexing scheme is optimized for read-intensive scenarios by offering fast queries -- look-ups in precomputed indices. The index precomputation increases the complexity of update operations, but their performance is arguably sufficient for large organizations, as shown by conducted tests. We believe that our framework is a major contribution towards decentralized, cross-organizational collaboration.
科学和商业的努力可以从跨组织、分散的合作中受益,这将成为创新的关键。这项工作解决了其中的一个挑战,即在自治数据中心之间对分布式数据处理的资产进行有效的访问控制。我们提出了一个专门用于在分散环境中实现访问控制的组成员管理框架。它的新颖之处在于两个概念的协同作用:一个分散的知识库和一个增量索引方案,两者都假设一个P2P架构,其中每个节点都保留自主权,并完全控制与之合作的节点的选择。交换信息的范围减少到用户协作所需的最小值,并假设对等体之间的信任有限。通过提供快速查询——在预先计算的索引中查找,索引方案针对读取密集型场景进行了优化。索引预计算增加了更新操作的复杂性,但是它们的性能对于大型组织来说是足够的,正如所进行的测试所示。我们相信我们的框架是对分散的、跨组织协作的主要贡献。
{"title":"Group Membership Management Framework for Decentralized Collaborative Systems","authors":"Lukasz Opiola, Kamil Jarosz, L. Dutka, R. Słota, J. Kitowski","doi":"10.7494/csci.2022.23.4.4642","DOIUrl":"https://doi.org/10.7494/csci.2022.23.4.4642","url":null,"abstract":"Scientific and commercial endeavors could benefit from cross-organizational, decentralized collaboration, which becomes the key to innovation. This work addresses one of its challenges, namely efficient access control to assets for distributed data processing among autonomous data centers. We propose a group membership management framework dedicated for realizing access control in decentralized environments. Its novelty lies in a synergy of two concepts: a decentralized knowledge base and an incremental indexing scheme, both assuming a P2P architecture, where each peer retains autonomy and has full control over the choice of peers it cooperates with. The extent of exchanged information is reduced to the minimum required for user collaboration and assumes limited trust between peers. The indexing scheme is optimized for read-intensive scenarios by offering fast queries -- look-ups in precomputed indices. The index precomputation increases the complexity of update operations, but their performance is arguably sufficient for large organizations, as shown by conducted tests. We believe that our framework is a major contribution towards decentralized, cross-organizational collaboration.","PeriodicalId":23063,"journal":{"name":"Theor. Comput. Sci.","volume":"23 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82779396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Metadata-driven Data Migration from Object-relational Database to NoSQL Document-oriented Database 元数据驱动的数据从对象关系数据库迁移到NoSQL面向文档数据库
Pub Date : 2022-11-08 DOI: 10.7494/csci.2022.23.4.4375
A. Aggoune, Mohamed Sofiane Namoune
The object-relational databases (ORDB) are powerful for managing complex data, but they suffer from problems of scalability and managing large-scale data. Therefore, the importance of the migration of ORDB to NoSQL derives from the fact that the large volume of data can be handled in the best way with high scalability and availability. This paper reports our metadata-driven approach for the migration of the ORDB to document-oriented NoSQL database. Our data migration approach involves three major stages: a preprocessing stage, to extract the data and the schema's components, a processing stage, to provide the data transformation, and a post-processing stage, to store the migrated data as BSON documents. The approach maintains the benefits of Oracle ORDB in NoSQL MongoDB by supporting integrity constraint checking. To validate our approach, we developed OR2DOD (Object Relational to Document-Oriented Databases) system, and the experimental results confirm the effectiveness of our proposal.
对象关系数据库(ORDB)在管理复杂数据方面非常强大,但它们存在可伸缩性和管理大规模数据的问题。因此,将ORDB迁移到NoSQL的重要性源于这样一个事实,即可以以具有高可伸缩性和可用性的最佳方式处理大量数据。本文报告了将ORDB迁移到面向文档的NoSQL数据库的元数据驱动方法。我们的数据迁移方法包括三个主要阶段:预处理阶段(提取数据和模式组件)、处理阶段(提供数据转换)和后处理阶段(将迁移的数据存储为BSON文档)。这种方法通过支持完整性约束检查,在NoSQL MongoDB中保持了Oracle ORDB的优势。为了验证我们的方法,我们开发了OR2DOD (Object Relational To Document-Oriented Databases)系统,实验结果证实了我们的建议的有效性。
{"title":"Metadata-driven Data Migration from Object-relational Database to NoSQL Document-oriented Database","authors":"A. Aggoune, Mohamed Sofiane Namoune","doi":"10.7494/csci.2022.23.4.4375","DOIUrl":"https://doi.org/10.7494/csci.2022.23.4.4375","url":null,"abstract":"The object-relational databases (ORDB) are powerful for managing complex data, but they suffer from problems of scalability and managing large-scale data. Therefore, the importance of the migration of ORDB to NoSQL derives from the fact that the large volume of data can be handled in the best way with high scalability and availability. This paper reports our metadata-driven approach for the migration of the ORDB to document-oriented NoSQL database. Our data migration approach involves three major stages: a preprocessing stage, to extract the data and the schema's components, a processing stage, to provide the data transformation, and a post-processing stage, to store the migrated data as BSON documents. The approach maintains the benefits of Oracle ORDB in NoSQL MongoDB by supporting integrity constraint checking. To validate our approach, we developed OR2DOD (Object Relational to Document-Oriented Databases) system, and the experimental results confirm the effectiveness of our proposal.","PeriodicalId":23063,"journal":{"name":"Theor. Comput. Sci.","volume":"242 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74971000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic Fuzzy Model to Detect Verbal Violence in Real Time 动态模糊模型实时检测语言暴力
Pub Date : 2022-11-08 DOI: 10.7494/csci.2022.23.4.4616
Obed Campos, Pablo Pancardo García, J. Hernández-Nolasco
The crime rates in Mexico have been increasing in recent years, every day there are news on social media and in the news where assaults and verbal aggressions by criminals can be seen. Public transportation units suffer from violence that authorities have not been able to reduce, despite their efforts. That is why we have developed a fuzzy logic model that can adapt to almost any scenario thanks to the dynamism that we have implemented in each one of its stages. We have obtained promising results that we believe will be of great help to the authorities in the police headquarters to detect in real time the exact moment in which a verbal aggression typical of a violent assault is happening. This is a tool to help the authorities, not a substitution; making use of the latest technologies available to us.
近年来,墨西哥的犯罪率一直在上升,社交媒体上每天都有新闻,新闻中可以看到罪犯的攻击和言语攻击。公共交通单位遭受暴力,尽管当局做出了努力,但仍无法减少暴力。这就是为什么我们开发了一个模糊逻辑模型,由于我们在每个阶段都实现了动态,它几乎可以适应任何场景。我们已经获得了很有希望的结果,我们相信这将对警察总部的当局有很大的帮助,以便实时发现典型的暴力攻击的言语攻击正在发生的确切时刻。这是一种帮助当局的工具,而不是替代品;充分利用我们所拥有的最新技术。
{"title":"Dynamic Fuzzy Model to Detect Verbal Violence in Real Time","authors":"Obed Campos, Pablo Pancardo García, J. Hernández-Nolasco","doi":"10.7494/csci.2022.23.4.4616","DOIUrl":"https://doi.org/10.7494/csci.2022.23.4.4616","url":null,"abstract":"The crime rates in Mexico have been increasing in recent years, every day there are news on social media and in the news where assaults and verbal aggressions by criminals can be seen. Public transportation units suffer from violence that authorities have not been able to reduce, despite their efforts. That is why we have developed a fuzzy logic model that can adapt to almost any scenario thanks to the dynamism that we have implemented in each one of its stages. We have obtained promising results that we believe will be of great help to the authorities in the police headquarters to detect in real time the exact moment in which a verbal aggression typical of a violent assault is happening. This is a tool to help the authorities, not a substitution; making use of the latest technologies available to us.","PeriodicalId":23063,"journal":{"name":"Theor. Comput. Sci.","volume":"15 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77981109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modeling and Analysis of Probabilistic Real-time Systems through Integrating Event-B and Probabilistic Model Checking 基于事件b和概率模型检验的概率实时系统建模与分析
Pub Date : 2022-11-08 DOI: 10.7494/csci.2022.23.4.4588
Hichem Debbi
Event-B is a formal method used in the development of safety critical systems. However, these systems may introduce uncertainty, and need also to meet real-time requirements, which make their modeling and analysis a challenging task. Existing works on extending Event-B with probability and time did not address both probability and time in a single framework. Besides, they did focus the most on extending the language itself, not on integrating the extended Event-B with verification. In this paper, we aim to represent both probability and time in the Event-B language, and we will show how such a representation can be automatically translated into Probabilistic Timed Automata (PTA) described in the language of the probabilistic model checker PRISM. This translation would allow us to analyze probabilistic, as well as time-bounded probabilistic reachability properties of probabilistic real-time systems through the Probabilistic Timed CTL (PTCTL) logic.
Event-B是一种用于安全关键系统开发的形式化方法。然而,这些系统可能会引入不确定性,并且还需要满足实时需求,这使得它们的建模和分析成为一项具有挑战性的任务。现有的关于用概率和时间扩展Event-B的工作没有在一个框架中同时处理概率和时间。此外,他们最关注的是扩展语言本身,而不是将扩展的Event-B与验证集成在一起。在本文中,我们的目标是在Event-B语言中表示概率和时间,我们将展示如何将这种表示自动转换为概率模型检查器PRISM语言中描述的概率时间自动机(PTA)。这种转换将使我们能够通过概率定时CTL (PTCTL)逻辑分析概率实时系统的概率性,以及时间有限的概率可达性属性。
{"title":"Modeling and Analysis of Probabilistic Real-time Systems through Integrating Event-B and Probabilistic Model Checking","authors":"Hichem Debbi","doi":"10.7494/csci.2022.23.4.4588","DOIUrl":"https://doi.org/10.7494/csci.2022.23.4.4588","url":null,"abstract":"Event-B is a formal method used in the development of safety critical systems. However, these systems may introduce uncertainty, and need also to meet real-time requirements, which make their modeling and analysis a challenging task. Existing works on extending Event-B with probability and time did not address both probability and time in a single framework. Besides, they did focus the most on extending the language itself, not on integrating the extended Event-B with verification. In this paper, we aim to represent both probability and time in the Event-B language, and we will show how such a representation can be automatically translated into Probabilistic Timed Automata (PTA) described in the language of the probabilistic model checker PRISM. This translation would allow us to analyze probabilistic, as well as time-bounded probabilistic reachability properties of probabilistic real-time systems through the Probabilistic Timed CTL (PTCTL) logic.","PeriodicalId":23063,"journal":{"name":"Theor. Comput. Sci.","volume":"59 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77717940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Project Games 项目比赛
Pub Date : 2022-11-01 DOI: 10.1007/978-3-030-17402-6_7
Vittorio Bilò, L. Gourvès, J. Monnot
{"title":"Project Games","authors":"Vittorio Bilò, L. Gourvès, J. Monnot","doi":"10.1007/978-3-030-17402-6_7","DOIUrl":"https://doi.org/10.1007/978-3-030-17402-6_7","url":null,"abstract":"","PeriodicalId":23063,"journal":{"name":"Theor. Comput. Sci.","volume":"1 1","pages":"97-111"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72675302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Theor. Comput. Sci.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1