首页 > 最新文献

Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science最新文献

英文 中文
Faster circuits and shorter formulae for multiple addition, multiplication and symmetric Boolean functions 更快的电路和更短的公式为多个加法,乘法和对称布尔函数
Pub Date : 1990-10-22 DOI: 10.1109/FSCS.1990.89586
M. Paterson, N. Pippenger, Uri Zwick
A general theory is developed for constructing the shallowest possible circuits and the shortest possible formulas for the carry-save addition of n numbers using any given basic addition unit. More precisely, it is shown that if BA is a basic addition unit with occurrence matrix N, then the shortest multiple carry-save addition formulas that could be obtained by composing BA units are of size n/sup 1/p+o(1)/, where p is the unique real number for which the L/sub p/ norm of the matrix N equals 1. An analogous result connects the delay matrix M of the basic addition unit BA and the minimal q such that multiple carry-save addition circuits of depth (q+o(1)) log n could be constructed by combining BA units. On the basis of these optimal constructions of multiple carry-save adders, the shallowest known multiplication circuits are constructed.<>
给出了用任意给定的基本加法单元构造n个数的免进位加法的最浅的可能电路和最短的可能公式的一般理论。更精确地说,如果BA是一个具有出现矩阵N的基本加法单元,则由BA单元组成的最短多重免进位加法公式的大小为N /sup 1/p+o(1)/,其中p为矩阵N的L/sub p/范数等于1的唯一实数。类似的结果将基本加法单元BA的延迟矩阵M与最小值q连接起来,使得通过组合BA单元可以构造深度为(q+o(1)) log n的多个免进位加法电路。基于这些最优的多个免进位加法器结构,构造了已知最浅的乘法电路。
{"title":"Faster circuits and shorter formulae for multiple addition, multiplication and symmetric Boolean functions","authors":"M. Paterson, N. Pippenger, Uri Zwick","doi":"10.1109/FSCS.1990.89586","DOIUrl":"https://doi.org/10.1109/FSCS.1990.89586","url":null,"abstract":"A general theory is developed for constructing the shallowest possible circuits and the shortest possible formulas for the carry-save addition of n numbers using any given basic addition unit. More precisely, it is shown that if BA is a basic addition unit with occurrence matrix N, then the shortest multiple carry-save addition formulas that could be obtained by composing BA units are of size n/sup 1/p+o(1)/, where p is the unique real number for which the L/sub p/ norm of the matrix N equals 1. An analogous result connects the delay matrix M of the basic addition unit BA and the minimal q such that multiple carry-save addition circuits of depth (q+o(1)) log n could be constructed by combining BA units. On the basis of these optimal constructions of multiple carry-save adders, the shallowest known multiplication circuits are constructed.<<ETX>>","PeriodicalId":271949,"journal":{"name":"Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1990-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134370702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Uniform memory hierarchies 统一的内存层次结构
Pub Date : 1990-10-22 DOI: 10.1109/FSCS.1990.89581
B. Alpern, L. Carter, E. Feig
The authors introduce a model, called the uniform memory hierarchy (UMH) model, which reflects the hierarchical nature of computer memory more accurately than the RAM (random-access-machine) model, which assumes that any item in memory can be accessed with unit cost. In the model memory occurs as a sequence of increasingly large levels. Data are transferred between levels in fixed-size blocks (the size is level dependent). Within a level blocks are random access. The model is easily extended to handle parallelism. The UMH model is really a family of models parameterized by the rate at which the bandwidth decays as one travels up the hierarchy. A program is parsimonious on a UMH if the leading terms of the program's (time) complexity on the UMH and on a RAM are identical. If these terms differ by more than a constant factor, then the program is inefficient. The authors analyze two standard FFT programs with the same RAM complexity. One is efficient; the other is not.<>
该模型比随机存取机(RAM)模型更准确地反映了计算机存储器的层次特性,随机存取机假设存储器中的任何项目都可以以单位成本访问。在模型中,记忆是一个越来越大的层次序列。数据以固定大小的块在级别之间传输(大小取决于级别)。关卡中的方块是随机访问的。该模型易于扩展以处理并行性。UMH模型实际上是一系列模型的参数化,这些模型的参数化是随着层次结构的上升,带宽衰减的速率。如果程序在UMH和RAM上的(时间)复杂度的领先项相同,则程序在UMH上是节俭的。如果这些项相差超过一个常数因子,则程序是低效的。作者分析了两个具有相同内存复杂度的标准FFT程序。一个是效率;另一个则不是。
{"title":"Uniform memory hierarchies","authors":"B. Alpern, L. Carter, E. Feig","doi":"10.1109/FSCS.1990.89581","DOIUrl":"https://doi.org/10.1109/FSCS.1990.89581","url":null,"abstract":"The authors introduce a model, called the uniform memory hierarchy (UMH) model, which reflects the hierarchical nature of computer memory more accurately than the RAM (random-access-machine) model, which assumes that any item in memory can be accessed with unit cost. In the model memory occurs as a sequence of increasingly large levels. Data are transferred between levels in fixed-size blocks (the size is level dependent). Within a level blocks are random access. The model is easily extended to handle parallelism. The UMH model is really a family of models parameterized by the rate at which the bandwidth decays as one travels up the hierarchy. A program is parsimonious on a UMH if the leading terms of the program's (time) complexity on the UMH and on a RAM are identical. If these terms differ by more than a constant factor, then the program is inefficient. The authors analyze two standard FFT programs with the same RAM complexity. One is efficient; the other is not.<<ETX>>","PeriodicalId":271949,"journal":{"name":"Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science","volume":"438 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1990-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134390277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 69
Matrix decomposition problem is complete for the average case 对于一般情况,矩阵分解问题是完整的
Pub Date : 1990-10-22 DOI: 10.1109/FSCS.1990.89603
Y. Gurevich
The first algebraic average-case complete problem is presented. The focus of attention is the modular group, i.e., the multiplicative group SL/sub 2/(Z) of two-by-two integer matrices of determinant 1. By default, in this study matrices are elements of the modular group. The problem is arguably the simplest natural average-case complete problem to date.<>
给出了第一个代数平均情形完备问题。注意的焦点是模群,即行列式为1的二乘二整数矩阵的乘法群SL/sub 2/(Z)。在本研究中,默认情况下,矩阵是模群的元素。这个问题可以说是迄今为止最简单的自然平均情况完全问题
{"title":"Matrix decomposition problem is complete for the average case","authors":"Y. Gurevich","doi":"10.1109/FSCS.1990.89603","DOIUrl":"https://doi.org/10.1109/FSCS.1990.89603","url":null,"abstract":"The first algebraic average-case complete problem is presented. The focus of attention is the modular group, i.e., the multiplicative group SL/sub 2/(Z) of two-by-two integer matrices of determinant 1. By default, in this study matrices are elements of the modular group. The problem is arguably the simplest natural average-case complete problem to date.<<ETX>>","PeriodicalId":271949,"journal":{"name":"Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1990-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128837193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
A characterization of Hash P by arithmetic straight line programs 用算术直线程序描述哈希P
Pub Date : 1990-10-22 DOI: 10.1109/FSCS.1990.89521
L. Babai, L. Fortnow
Hash P functions are characterized by certain straight-line programs of multivariate polynomials. The power of this characterization is illustrated by a number of consequences. These include a somewhat simplified proof of S. Toda's (1989) theorem that PH contained in P/sup Hash P/, as well as an infinite class of potentially inequivalent checkable functions.<>
哈希P函数由多元多项式的某些直线规划来表征。这种描述的力量可以通过一系列结果来说明。其中包括对S. Toda(1989)定理的一个稍微简化的证明,该定理证明PH包含在P/sup哈希P/中,以及无限类潜在不等价的可检查函数。
{"title":"A characterization of Hash P by arithmetic straight line programs","authors":"L. Babai, L. Fortnow","doi":"10.1109/FSCS.1990.89521","DOIUrl":"https://doi.org/10.1109/FSCS.1990.89521","url":null,"abstract":"Hash P functions are characterized by certain straight-line programs of multivariate polynomials. The power of this characterization is illustrated by a number of consequences. These include a somewhat simplified proof of S. Toda's (1989) theorem that PH contained in P/sup Hash P/, as well as an infinite class of potentially inequivalent checkable functions.<<ETX>>","PeriodicalId":271949,"journal":{"name":"Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1990-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133805752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Simplifying nested radicals and solving polynomials by radicals in minimum depth 简化嵌套根和用最小深度根求解多项式
Pub Date : 1990-10-22 DOI: 10.1109/FSCS.1990.89607
G. Horng, Ming-Deh A. Huang
The notion of pure nested radicals and its field-theoretic counterpart, pure root extensions, are defined and used for investigating exact radical solutions.<>
定义了纯嵌套根的概念及其对应的场理论,纯根扩展,并用于研究精确根解。
{"title":"Simplifying nested radicals and solving polynomials by radicals in minimum depth","authors":"G. Horng, Ming-Deh A. Huang","doi":"10.1109/FSCS.1990.89607","DOIUrl":"https://doi.org/10.1109/FSCS.1990.89607","url":null,"abstract":"The notion of pure nested radicals and its field-theoretic counterpart, pure root extensions, are defined and used for investigating exact radical solutions.<<ETX>>","PeriodicalId":271949,"journal":{"name":"Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1990-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132300508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Markovian extension of Valiant's learning model Valiant学习模型的马尔可夫扩展
Pub Date : 1990-10-22 DOI: 10.1109/FSCS.1990.89558
D. Aldous, U. Vazirani
A model of learning that expands on the Valiant model is introduced. The point of departure from the Valiant model is that the learner is placed in a Markovian environment. The environment of the learner is a (exponentially large) graph, and the examples reside on the vertices of the graph, one example on each vertex. The learner obtains the examples while performing a random walk on the graph. At each step, the learning algorithm guesses the classification of the example on the current vertex using its current hypothesis. If its guess is incorrect, the learning algorithm updates its current working hypothesis. The performance of the learning algorithm in a given environment is judged by the expected number of mistakes made as a function of the number of steps in the random walk. The predictive value of Occam algorithms under this weaker probabilistic model of the learner's environment is studied.<>
介绍了在Valiant模型基础上扩展的学习模型。与Valiant模型不同的一点是,学习者被置于一个马尔可夫环境中。学习器的环境是一个(指数大的)图,示例位于图的顶点上,每个顶点上有一个示例。学习者在图上进行随机漫步时获得示例。在每一步中,学习算法使用当前的假设猜测当前顶点上的示例的分类。如果它的猜测是不正确的,学习算法更新其当前的工作假设。在给定的环境中,学习算法的性能是通过预期的错误数量作为随机行走步数的函数来判断的。研究了Occam算法在学习者环境这种较弱概率模型下的预测价值
{"title":"A Markovian extension of Valiant's learning model","authors":"D. Aldous, U. Vazirani","doi":"10.1109/FSCS.1990.89558","DOIUrl":"https://doi.org/10.1109/FSCS.1990.89558","url":null,"abstract":"A model of learning that expands on the Valiant model is introduced. The point of departure from the Valiant model is that the learner is placed in a Markovian environment. The environment of the learner is a (exponentially large) graph, and the examples reside on the vertices of the graph, one example on each vertex. The learner obtains the examples while performing a random walk on the graph. At each step, the learning algorithm guesses the classification of the example on the current vertex using its current hypothesis. If its guess is incorrect, the learning algorithm updates its current working hypothesis. The performance of the learning algorithm in a given environment is judged by the expected number of mistakes made as a function of the number of steps in the random walk. The predictive value of Occam algorithms under this weaker probabilistic model of the learner's environment is studied.<<ETX>>","PeriodicalId":271949,"journal":{"name":"Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1990-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130950507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 56
Are wait-free algorithms fast? 无等待算法快吗?
Pub Date : 1990-10-22 DOI: 10.1109/FSCS.1990.89524
H. Attiya, N. Lynch, N. Shavit
The time complexity of wait-free algorithms in so-called normal executions, where no failures occur and processes operate at approximately the same speed, is considered. A lower bound of log n on the time complexity of any wait-free algorithm that achieves approximate agreement among n processes is proved. In contrast, there exists a non-wait-free algorithm that solves this problem in constant time. This implies an Omega (log n)-time separation between the wait-free and non-wait-free computation models. An O(log n)-time wait-free approximate agreement algorithm is presented. Its complexity is within a small constant of the lower bound.<>
在所谓的正常执行中,无等待算法的时间复杂性被考虑在内,在正常执行中,没有故障发生,进程以大致相同的速度运行。证明了在n个进程之间达到近似一致的任意无等待算法的时间复杂度有log n的下界。相反,存在一种非无等待算法,可以在常数时间内解决该问题。这意味着无等待和非无等待计算模型之间的时间间隔为Omega (log n)。提出了一种O(log n)时间的无等待近似协议算法。它的复杂度在下界的一个小常数范围内。
{"title":"Are wait-free algorithms fast?","authors":"H. Attiya, N. Lynch, N. Shavit","doi":"10.1109/FSCS.1990.89524","DOIUrl":"https://doi.org/10.1109/FSCS.1990.89524","url":null,"abstract":"The time complexity of wait-free algorithms in so-called normal executions, where no failures occur and processes operate at approximately the same speed, is considered. A lower bound of log n on the time complexity of any wait-free algorithm that achieves approximate agreement among n processes is proved. In contrast, there exists a non-wait-free algorithm that solves this problem in constant time. This implies an Omega (log n)-time separation between the wait-free and non-wait-free computation models. An O(log n)-time wait-free approximate agreement algorithm is presented. Its complexity is within a small constant of the lower bound.<<ETX>>","PeriodicalId":271949,"journal":{"name":"Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1990-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134078579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Multiple non-interactive zero knowledge proofs based on a single random string 基于单个随机字符串的多个非交互式零知识证明
Pub Date : 1990-10-22 DOI: 10.1109/FSCS.1990.89549
U. Feige, D. Lapidot, A. Shamir
The authors solve the two major open problems associated with noninteractive zero-knowledge proofs: how to enable polynomially many provers to prove in writing polynomially many theorems based on the basis of a single random string, and how to construct such proofs under general (rather than number-theoretic) assumptions. The constructions can be used in cryptographic applications in which the prover is restricted to polynomial time, and they are much simpler than earlier (and less capable) proposals.<>
作者解决了与非交互零知识证明相关的两个主要开放问题:如何使多项式多个证明者能够基于单个随机字符串以多项式形式证明多个定理,以及如何在一般(而不是数论)假设下构造这样的证明。这些构造可以用于证明者限于多项式时间的密码学应用中,并且它们比以前的(功能较差的)建议简单得多
{"title":"Multiple non-interactive zero knowledge proofs based on a single random string","authors":"U. Feige, D. Lapidot, A. Shamir","doi":"10.1109/FSCS.1990.89549","DOIUrl":"https://doi.org/10.1109/FSCS.1990.89549","url":null,"abstract":"The authors solve the two major open problems associated with noninteractive zero-knowledge proofs: how to enable polynomially many provers to prove in writing polynomially many theorems based on the basis of a single random string, and how to construct such proofs under general (rather than number-theoretic) assumptions. The constructions can be used in cryptographic applications in which the prover is restricted to polynomial time, and they are much simpler than earlier (and less capable) proposals.<<ETX>>","PeriodicalId":271949,"journal":{"name":"Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1990-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114340186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 276
Simple construction of almost k-wise independent random variables 几乎k-独立随机变量的简单构造
Pub Date : 1990-10-22 DOI: 10.1109/FSCS.1990.89575
N. Alon, Oded Goldreich, J. Håstad, R. Peralta
The authors present three alternative simple constructions of small probability spaces on n bits for which any k bits are almost independent. The number of bits used to specify a point in the sample space is O(log log n+k+log 1/ epsilon ), where epsilon is the statistical difference between the distribution induced on any k-bit locations and the uniform distribution. This is asymptotically comparable to the construction recently presented by J. Naor and M. Naor (1990). An advantage of the present constructions is their simplicity. Two of the constructions are based on bit sequences that are widely believed to possess randomness properties, and the results can be viewed as an explanation and establishment of these beliefs.<>
作者提出了n位上任意k位几乎独立的小概率空间的三种可选的简单构造。用于指定样本空间中一个点的位数为O(log log n+k+log 1/ epsilon),其中epsilon是任意k位位置上的分布与均匀分布之间的统计差。这与J. Naor和M. Naor(1990)最近提出的构造是渐进的。现在时结构的一个优点是简单。其中两种结构是基于比特序列的,人们普遍认为比特序列具有随机性,结果可以被视为对这些信念的解释和建立。
{"title":"Simple construction of almost k-wise independent random variables","authors":"N. Alon, Oded Goldreich, J. Håstad, R. Peralta","doi":"10.1109/FSCS.1990.89575","DOIUrl":"https://doi.org/10.1109/FSCS.1990.89575","url":null,"abstract":"The authors present three alternative simple constructions of small probability spaces on n bits for which any k bits are almost independent. The number of bits used to specify a point in the sample space is O(log log n+k+log 1/ epsilon ), where epsilon is the statistical difference between the distribution induced on any k-bit locations and the uniform distribution. This is asymptotically comparable to the construction recently presented by J. Naor and M. Naor (1990). An advantage of the present constructions is their simplicity. Two of the constructions are based on bit sequences that are widely believed to possess randomness properties, and the results can be viewed as an explanation and establishment of these beliefs.<<ETX>>","PeriodicalId":271949,"journal":{"name":"Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1990-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114448743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 426
Finite-memory automata 有限记忆自动机
Pub Date : 1990-10-22 DOI: 10.1109/FSCS.1990.89590
M. Kaminski, N. Francez
A model of computation dealing with infinite alphabets is proposed. The model is based on replacing the equality test by unification. It appears to be a natural generalization of the classical Rabin-Scott finite-state automata and possesses many of their properties.<>
提出了一种处理无限字母的计算模型。该模型以统一检验代替等式检验为基础。它似乎是经典的Rabin-Scott有限状态自动机的自然推广,并具有它们的许多性质
{"title":"Finite-memory automata","authors":"M. Kaminski, N. Francez","doi":"10.1109/FSCS.1990.89590","DOIUrl":"https://doi.org/10.1109/FSCS.1990.89590","url":null,"abstract":"A model of computation dealing with infinite alphabets is proposed. The model is based on replacing the equality test by unification. It appears to be a natural generalization of the classical Rabin-Scott finite-state automata and possesses many of their properties.<<ETX>>","PeriodicalId":271949,"journal":{"name":"Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1990-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114796345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 422
期刊
Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1