首页 > 最新文献

2011 IEEE 52nd Annual Symposium on Foundations of Computer Science最新文献

英文 中文
Separator Theorems for Minor-Free and Shallow Minor-Free Graphs with Applications 无次图和浅次图的分隔定理及其应用
Pub Date : 2011-07-06 DOI: 10.1109/FOCS.2011.15
Christian Wulff-Nilsen
Alon, Seymour, and Thomas generalized Lipton and Tarjan's planar separator theorem and showed that a $K_h$-minor free graph with $n$ vertices has a separator of size at most $h^{3/2}sqrt n$. They gave an algorithm that, given a graph $G$ with $m$ edges and $n$ vertices and given an integer $hgeq 1$, outputs in $O(sqrt{hn}m)$ time such a separator or a $K_h$-minor of $G$. Plot kin, Rao, and Smith gave an $O(hmsqrt{nlog n})$ time algorithm to find a separator of size $O(hsqrt{nlog n})$. Kawara bayashi and Reed improved the bound on the size of the separator to $hsqrt n$ and gave an algorithm that finds such a separator in $O(n^{1 + epsilon})$ time for any constant $epsilon >, 0$, assuming $h$ is constant. This algorithm has an extremely large dependency on $h$ in the running time (some power tower of $h$ whose height is itself a function of $h$), making it impractical even for small $h$. We are interested in a small polynomial time dependency on $h$ and we show how to find an $O(hsqrt{nlog n})$-size separator or report that $G$ has a $K_h$-minor in $O(poly(h)n^{5/4 + epsilon})$ time for any constant $epsilon >, 0$. We also present the first $O(poly(h)n)$ time algorithm to find a separator of size $O(n^c)$ for a constant $c
Alon, Seymour和Thomas推广了Lipton和Tarjan的平面分隔定理,证明了具有n个顶点的K_h -次自由图的分隔符的大小不超过$h^{3/2}sqrt n$。他们给出了一个算法,给定一个有$m$边和$n$顶点的图$G$,给定一个整数$hgeq $ 1$,输出$O(sqrt{hn}m)$ time这样的分隔符或$G$的$K_h$-次元。Plot kin, Rao和Smith给出了一个$O(hmsqrt{nlog n})$ time算法来寻找大小为$O(hsqrt{nlog n})$的分隔符。Kawara bayashi和Reed将分隔符大小的界限改进为$hsqrt n$,并给出了一个算法,该算法可以在$O(n^{1 + epsilon})$时间内对任意常数$epsilon >, 0$找到这样一个分隔符,假设$h$为常数。该算法在运行时间上对$h$有极大的依赖性($h$的一些功率塔,其高度本身就是$h$的函数),使得它即使对于较小的$h$也是不切实际的。我们对一个小的多项式时间依赖于$h$感兴趣,我们展示了如何找到一个$O(hsqrt{nlog n})$-大小的分隔符,或者报告$G$在$O(poly(h)n^{5/4 + epsilon})$时间中有一个$K_h$-次元对于任意常数$epsilon >, 0$。我们还提出了第一个$O(poly(h)n)$ time算法,用于为常数$c找到大小为$O(n^c)$的分隔符
{"title":"Separator Theorems for Minor-Free and Shallow Minor-Free Graphs with Applications","authors":"Christian Wulff-Nilsen","doi":"10.1109/FOCS.2011.15","DOIUrl":"https://doi.org/10.1109/FOCS.2011.15","url":null,"abstract":"Alon, Seymour, and Thomas generalized Lipton and Tarjan's planar separator theorem and showed that a $K_h$-minor free graph with $n$ vertices has a separator of size at most $h^{3/2}sqrt n$. They gave an algorithm that, given a graph $G$ with $m$ edges and $n$ vertices and given an integer $hgeq 1$, outputs in $O(sqrt{hn}m)$ time such a separator or a $K_h$-minor of $G$. Plot kin, Rao, and Smith gave an $O(hmsqrt{nlog n})$ time algorithm to find a separator of size $O(hsqrt{nlog n})$. Kawara bayashi and Reed improved the bound on the size of the separator to $hsqrt n$ and gave an algorithm that finds such a separator in $O(n^{1 + epsilon})$ time for any constant $epsilon &gt, 0$, assuming $h$ is constant. This algorithm has an extremely large dependency on $h$ in the running time (some power tower of $h$ whose height is itself a function of $h$), making it impractical even for small $h$. We are interested in a small polynomial time dependency on $h$ and we show how to find an $O(hsqrt{nlog n})$-size separator or report that $G$ has a $K_h$-minor in $O(poly(h)n^{5/4 + epsilon})$ time for any constant $epsilon &gt, 0$. We also present the first $O(poly(h)n)$ time algorithm to find a separator of size $O(n^c)$ for a constant $c","PeriodicalId":326048,"journal":{"name":"2011 IEEE 52nd Annual Symposium on Foundations of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125110062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Bayesian Combinatorial Auctions: Expanding Single Buyer Mechanisms to Many Buyers 贝叶斯组合拍卖:将单一买家机制扩展到多买家
Pub Date : 2011-06-05 DOI: 10.1137/120878422
S. Alaei
For Bayesian combinatorial auctions, we present a general framework for approximately reducing the mechanism design problem for multiple buyers to the mechanism design problem for each individual buyer. Our framework can be applied to any setting which roughly satisfies the following assumptions: (i) The buyer's types must be distributed independently (not necessarily identically). (ii) The objective function must be linearly separable over the set of buyers (iii) The supply constraints must be the only constraints involving more than one buyer. Our framework is general in the sense that it makes no explicit assumption about any of the following: (i) The buyer's valuations (e.g., sub modular, additive, etc). (ii) The distribution of types for each buyer. (iii) The other constraints involving individual buyers (e.g., budget constraints, etc). We present two generic $n$-buyer mechanisms that use $1$-buyer mechanisms as black boxes. Assuming that we have an$alpha$-approximate $1$-buyer mechanism for each buyerfootnote{Note that we can use different $1$-buyer mechanisms to accommodate different classes of buyers.} and assuming that no buyer ever needs more than $frac{1}{k}$ of all copies of each item for some integer $k ge 1$, then our generic $n$-buyer mechanisms are $gamma_kcdotalpha$-approximation of the optimal$n$-buyer mechanism, in which $gamma_k$ is a constant which is at least $1-frac{1}{sqrt{k+3}}$. Observe that $gamma_k$ is at least $frac{1}{2}$ (for $k=1$) and approaches $1$ as $k$ increases. As a byproduct of our construction, we improve a generalization of prophet inequalities. Furthermore, as applications of our main theorem, we improve several results from the literature.
对于贝叶斯组合拍卖,我们提出了一个将多买家的机制设计问题近似化为单个买家的机制设计问题的一般框架。我们的框架可以适用于大致满足以下假设的任何设置:(i)买方的类型必须独立分布(不一定相同)。(ii)目标函数在购买者集合上必须是线性可分的(iii)供应约束必须是涉及一个以上购买者的唯一约束。我们的框架是通用的,因为它对以下任何情况都没有明确的假设:(i)买方的估值(例如,子模块,加法等)。(ii)每个买方的型号分配。(iii)涉及个人购买者的其他限制(例如,预算限制等)。我们提出了两种通用的$n$ -买方机制,它们使用$1$ -买方机制作为黑盒。假设每个买家footnote{请注意,我们可以使用不同的$1$ -buyer机制来容纳不同类别的买家。}都有一个$alpha$ -近似$1$ -买家机制,并且假设没有买家需要超过$frac{1}{k}$的每个项目的所有副本来获得某个整数$k ge 1$,那么我们的通用$n$ -买家机制是$gamma_kcdotalpha$ -最优$n$ -买家机制的近似,其中$gamma_k$是一个常数,至少是$1-frac{1}{sqrt{k+3}}$。观察到$gamma_k$至少是$frac{1}{2}$(对于$k=1$),并且随着$k$的增加而接近$1$。作为我们构造的副产品,我们改进了先知不等式的一般化。此外,作为我们主要定理的应用,我们改进了文献中的几个结果。
{"title":"Bayesian Combinatorial Auctions: Expanding Single Buyer Mechanisms to Many Buyers","authors":"S. Alaei","doi":"10.1137/120878422","DOIUrl":"https://doi.org/10.1137/120878422","url":null,"abstract":"For Bayesian combinatorial auctions, we present a general framework for approximately reducing the mechanism design problem for multiple buyers to the mechanism design problem for each individual buyer. Our framework can be applied to any setting which roughly satisfies the following assumptions: (i) The buyer's types must be distributed independently (not necessarily identically). (ii) The objective function must be linearly separable over the set of buyers (iii) The supply constraints must be the only constraints involving more than one buyer. Our framework is general in the sense that it makes no explicit assumption about any of the following: (i) The buyer's valuations (e.g., sub modular, additive, etc). (ii) The distribution of types for each buyer. (iii) The other constraints involving individual buyers (e.g., budget constraints, etc). We present two generic $n$-buyer mechanisms that use $1$-buyer mechanisms as black boxes. Assuming that we have an$alpha$-approximate $1$-buyer mechanism for each buyerfootnote{Note that we can use different $1$-buyer mechanisms to accommodate different classes of buyers.} and assuming that no buyer ever needs more than $frac{1}{k}$ of all copies of each item for some integer $k ge 1$, then our generic $n$-buyer mechanisms are $gamma_kcdotalpha$-approximation of the optimal$n$-buyer mechanism, in which $gamma_k$ is a constant which is at least $1-frac{1}{sqrt{k+3}}$. Observe that $gamma_k$ is at least $frac{1}{2}$ (for $k=1$) and approaches $1$ as $k$ increases. As a byproduct of our construction, we improve a generalization of prophet inequalities. Furthermore, as applications of our main theorem, we improve several results from the literature.","PeriodicalId":326048,"journal":{"name":"2011 IEEE 52nd Annual Symposium on Foundations of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129352258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 220
Quadratic Goldreich-Levin Theorems 二次Goldreich-Levin定理
Pub Date : 2011-05-22 DOI: 10.1137/12086827X
Madhur Tulsiani, J. Wolf
Decomposition theorems in classical Fourier analysis enable us to express a bounded function in terms of few linear phases with large Fourier coefficients plus a part that is pseudorandom with respect to linear phases. The Gold Reich-Levin algorithm can be viewed as an algorithmic analogue of such a decomposition as it gives a way to efficiently find the linear phases associated with large Fourier coefficients. In the study of & quot; quadratic Fourier analysis & quot;, higher-degree analogues of such decompositions have been developed in which the pseudorandomness property is stronger but the structured part correspondingly weaker. For example, it has previously been shown that it is possible to express a bounded function as a sum of a few quadratic phases plus a part that is small in the $U^3$ norm, defined by Gowers for the purpose of counting arithmetic progressions of length 4. We give a polynomial time algorithm for computing such a decomposition. A key part of the algorithm is a local self-correction procedure for Reed-Muller codes of order 2 (over $F_2^n$) for a function at distance $1/2-epsilon$ from a codeword. Given a function $f:F_2^n to {-1,1}$ at fractional Hamming distance $1/2-epsilon$ from a quadratic phase (which is a codeword of Reed-Muller code of order 2), we give an algorithm that runs in time polynomial in $n$ and finds a codeword at distance at most $1/2-eta$ for $eta = eta(epsilon)$. This is an algorithmic analogue of Samorodnitsky's result, which gave a tester for the above problem. To our knowledge, it represents the first instance of a correction procedure for any class of codes, beyond the list-decoding radius. In the process, we give algorithmic versions of results from additive combinatorics used in Samorodnitsky's proof and a refined version of the inverse theorem for the Gowers $U^3$ norm over $F_2^n$ or a function at distance 1/2 -- episilon from a codeword. Given a function f : $F_2^n$ right arrow { -- 1, 1} at fractional Hamming distance 1/2 -- epsilon " from a quadratic phase (which is a codeword of Reed-Muller code of order 2), we give an algorithm that runs in time polynomial in n and finds a codeword at distance at most 1.2 -- n for n = n (epsilon). This is an algorithmic analogue of Samorodnitsky's result [17], which gave a tester for the above problem. To our knowledge, it represents the first instance of a correction procedure for any class of codes, beyond the list-decoding radius..
经典傅立叶分析中的分解定理使我们能够用几个具有大傅立叶系数的线性相加上相对于线性相的伪随机部分来表示有界函数。Gold Reich-Levin算法可以看作是这种分解的算法模拟,因为它提供了一种有效地找到与大傅立叶系数相关的线性相位的方法。在研究& quot;二次傅立叶分析& quot;,这种分解的高阶类似物已经发展起来,其中伪随机性更强,而结构部分相应较弱。例如,以前已经证明可以将有界函数表示为几个二次相加上U^3$范数中较小的部分的和,U^3$范数是由Gowers定义的,用于计数长度为4的等差数列。我们给出了计算这种分解的多项式时间算法。该算法的关键部分是对于距离码字$1/2- $ epsilon$的函数的2阶(/ $F_2^n$) Reed-Muller码的局部自校正过程。给定函数$f:F_2^n 到{-1,1}$在分数汉明距离$1/2-epsilon$的二次相位(这是一个2阶Reed-Muller码字),我们给出了一个算法,该算法在$n$中以时间多项式运行,并在$eta = eta(epsilon)$中找到距离不超过$1/2-eta$的码字。这是Samorodnitsky的结果的算法模拟,它为上述问题提供了一个测试。据我们所知,它表示超出列表解码半径的任何类型的代码的纠正过程的第一个实例。在此过程中,我们给出了Samorodnitsky证明中使用的加性组合结果的算法版本,以及Gowers $U^3$范数在$F_2^n$上或距码字1/2—episiln的函数的反定理的改进版本。给定函数f: $F_2^n$右箭头{- 1,1}在分数汉明距离1/2—epsilon”处与二次相位(这是一个2阶Reed-Muller码字),我们给出了一个算法,该算法以n为时间多项式运行,并在n = n (epsilon)时找到距离不超过1.2—n的码字。这是Samorodnitsky的结果[17]的算法模拟,它为上述问题提供了一个测试。据我们所知,它代表了任何类型的代码的纠正过程的第一个实例,超出了列表解码半径。
{"title":"Quadratic Goldreich-Levin Theorems","authors":"Madhur Tulsiani, J. Wolf","doi":"10.1137/12086827X","DOIUrl":"https://doi.org/10.1137/12086827X","url":null,"abstract":"Decomposition theorems in classical Fourier analysis enable us to express a bounded function in terms of few linear phases with large Fourier coefficients plus a part that is pseudorandom with respect to linear phases. The Gold Reich-Levin algorithm can be viewed as an algorithmic analogue of such a decomposition as it gives a way to efficiently find the linear phases associated with large Fourier coefficients. In the study of & quot; quadratic Fourier analysis & quot;, higher-degree analogues of such decompositions have been developed in which the pseudorandomness property is stronger but the structured part correspondingly weaker. For example, it has previously been shown that it is possible to express a bounded function as a sum of a few quadratic phases plus a part that is small in the $U^3$ norm, defined by Gowers for the purpose of counting arithmetic progressions of length 4. We give a polynomial time algorithm for computing such a decomposition. A key part of the algorithm is a local self-correction procedure for Reed-Muller codes of order 2 (over $F_2^n$) for a function at distance $1/2-epsilon$ from a codeword. Given a function $f:F_2^n to {-1,1}$ at fractional Hamming distance $1/2-epsilon$ from a quadratic phase (which is a codeword of Reed-Muller code of order 2), we give an algorithm that runs in time polynomial in $n$ and finds a codeword at distance at most $1/2-eta$ for $eta = eta(epsilon)$. This is an algorithmic analogue of Samorodnitsky's result, which gave a tester for the above problem. To our knowledge, it represents the first instance of a correction procedure for any class of codes, beyond the list-decoding radius. In the process, we give algorithmic versions of results from additive combinatorics used in Samorodnitsky's proof and a refined version of the inverse theorem for the Gowers $U^3$ norm over $F_2^n$ or a function at distance 1/2 -- episilon from a codeword. Given a function f : $F_2^n$ right arrow { -- 1, 1} at fractional Hamming distance 1/2 -- epsilon \" from a quadratic phase (which is a codeword of Reed-Muller code of order 2), we give an algorithm that runs in time polynomial in n and finds a codeword at distance at most 1.2 -- n for n = n (epsilon). This is an algorithmic analogue of Samorodnitsky's result [17], which gave a tester for the above problem. To our knowledge, it represents the first instance of a correction procedure for any class of codes, beyond the list-decoding radius..","PeriodicalId":326048,"journal":{"name":"2011 IEEE 52nd Annual Symposium on Foundations of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127366200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Delays and the Capacity of Continuous-Time Channels 延迟和连续时间信道的容量
Pub Date : 2011-05-17 DOI: 10.1109/FOCS.2011.60
S. Khanna, M. Sudan
Any physical channel of communication offers two potential reasons why its capacity (the number of bits it can transmit in a unit of time) might be unbounded: (1) (Uncountably) infinitely many choices of signal strength at any given instant of time, and (2) (Uncountably) infinitely many instances of time at which signals may be sent. However channel noise cancels out the potential unboundedness of the first aspect, leaving typical channels with only a finite capacity per instant of time. The latter source of infinity seems less extensively studied. A potential source of unreliability that might restrict the capacity also from the second aspect is ``delay'': Signals transmitted by the sender at a given point of time may not be received with a predictable delay at the receiving end. In this work we examine this source of uncertainty by considering a simple discrete model of delay errors. In our model the communicating parties get to subdivide time as microscopically finely as they wish, but still have to cope with communication delays that are macroscopic and variable. The continuous process becomes the limit of our process as the time subdivision becomes infinitesimal. We taxonomize this class of communication channels based on whether the delays and noise are stochastic or adversarial, and based on how much information each aspect has about the other when introducing its errors. We analyze the limits of such channels and reach somewhat surprising conclusions: The capacity of a physical channel is finitely bounded only if at least one of the two sources of error (signal noise or delay noise) is adversarial. In particular the capacity is finitely bounded only if the delay is adversarial, or the noise is adversarial and acts with knowledge of the stochastic delay. If both error sources are stochastic, or if the noise is adversarial and independent of the stochastic delay, then the capacity of the associated physical channel is infinite!
任何物理通信信道的容量(单位时间内可以传输的比特数)可能是无界的,这有两个潜在的原因:(1)在任何给定的时刻,(不可数)有无限多的信号强度选择,(2)(不可数)有无限多的信号可以发送。然而,信道噪声抵消了第一个方面的潜在无界性,使典型的信道每瞬间只有有限的容量。后一种无限来源似乎没有得到广泛的研究。可能从第二个方面限制容量的潜在不可靠性来源是“延迟”:发送者在给定时间点发送的信号在接收端可能不会以可预测的延迟接收。在这项工作中,我们通过考虑一个简单的离散延迟误差模型来检查这种不确定性的来源。在我们的模型中,通信各方可以按照自己的意愿在微观上细分时间,但仍然需要处理宏观和可变的通信延迟。随着时间的细分变得无限小,连续的过程成为我们过程的极限。我们根据延迟和噪声是随机的还是对抗性的,以及在引入其误差时每个方面对另一个方面的信息的多少来对这类通信信道进行分类。我们分析了这些信道的极限,并得出了一些令人惊讶的结论:只有当两个误差源(信号噪声或延迟噪声)中至少有一个是对抗性的,物理信道的容量才有有限界限。特别是,只有当延迟是对抗性的,或者噪声是对抗性的,并且随随机延迟的知识而起作用时,容量才有有限界。如果两个误差源都是随机的,或者如果噪声是对抗的并且独立于随机延迟,那么相关的物理信道的容量是无限的!
{"title":"Delays and the Capacity of Continuous-Time Channels","authors":"S. Khanna, M. Sudan","doi":"10.1109/FOCS.2011.60","DOIUrl":"https://doi.org/10.1109/FOCS.2011.60","url":null,"abstract":"Any physical channel of communication offers two potential reasons why its capacity (the number of bits it can transmit in a unit of time) might be unbounded: (1) (Uncountably) infinitely many choices of signal strength at any given instant of time, and (2) (Uncountably) infinitely many instances of time at which signals may be sent. However channel noise cancels out the potential unboundedness of the first aspect, leaving typical channels with only a finite capacity per instant of time. The latter source of infinity seems less extensively studied. A potential source of unreliability that might restrict the capacity also from the second aspect is ``delay'': Signals transmitted by the sender at a given point of time may not be received with a predictable delay at the receiving end. In this work we examine this source of uncertainty by considering a simple discrete model of delay errors. In our model the communicating parties get to subdivide time as microscopically finely as they wish, but still have to cope with communication delays that are macroscopic and variable. The continuous process becomes the limit of our process as the time subdivision becomes infinitesimal. We taxonomize this class of communication channels based on whether the delays and noise are stochastic or adversarial, and based on how much information each aspect has about the other when introducing its errors. We analyze the limits of such channels and reach somewhat surprising conclusions: The capacity of a physical channel is finitely bounded only if at least one of the two sources of error (signal noise or delay noise) is adversarial. In particular the capacity is finitely bounded only if the delay is adversarial, or the noise is adversarial and acts with knowledge of the stochastic delay. If both error sources are stochastic, or if the noise is adversarial and independent of the stochastic delay, then the capacity of the associated physical channel is infinite!","PeriodicalId":326048,"journal":{"name":"2011 IEEE 52nd Annual Symposium on Foundations of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130951182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multiple-Source Multiple-Sink Maximum Flow in Directed Planar Graphs in Near-Linear Time 近线性时间下多源多汇有向平面图中的最大流量
Pub Date : 2011-05-11 DOI: 10.1137/15M1042929
G. Borradaile, P. Klein, S. Mozes, Yahav Nussbaum, Christian Wulff-Nilsen
We give an O(n log3 n) algorithm that, given an n-node directed planar graph with arc capacities, a set of source nodes, and a set of sink nodes, finds a maximum flow from the sources to the sinks. Previously, the fastest algorithms known for this problem were those for general graphs.
我们给出了一个O(n log3n)算法,该算法给定一个有n个节点的有向平面图,一组源节点和一组汇聚节点,找到从源到汇聚的最大流量。以前,已知解决这个问题最快的算法是一般图的算法。
{"title":"Multiple-Source Multiple-Sink Maximum Flow in Directed Planar Graphs in Near-Linear Time","authors":"G. Borradaile, P. Klein, S. Mozes, Yahav Nussbaum, Christian Wulff-Nilsen","doi":"10.1137/15M1042929","DOIUrl":"https://doi.org/10.1137/15M1042929","url":null,"abstract":"We give an O(n log3 n) algorithm that, given an n-node directed planar graph with arc capacities, a set of source nodes, and a set of sink nodes, finds a maximum flow from the sources to the sinks. Previously, the fastest algorithms known for this problem were those for general graphs.","PeriodicalId":326048,"journal":{"name":"2011 IEEE 52nd Annual Symposium on Foundations of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121975326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 98
Approximation Algorithms for Submodular Multiway Partition 次模多路划分的近似算法
Pub Date : 2011-05-10 DOI: 10.1109/FOCS.2011.34
C. Chekuri, Alina Ene
We study algorithms for the {sc Sub modular Multiway Partition}problem (SubMP). An instance of SubMP consists of a finite ground set $V$, a subset $S = {s_1,s_2,ldots,s_k} subseteq V$ of $k$elements called terminals, and a non-negative sub modular set function$f:2^Vrightarrow mathbb{R}_+$ on $V$ provided as a value oracle. The goal is to partition $V$ into $k$ sets $A_1,ldots,A_k$ to minimize $sum_{i=1}^kf(A_i)$ such that for $1 le i le k$, $s_i inA_i$. SubMP generalizes some well-known problems such as the {scMultiway Cut} problem in graphs and hyper graphs, and the {scNode-weighed Multiway Cut} problem in graphs. SubMP for arbitrary sub modular functions (instead of just symmetric functions) was considered by Zhao, Nagamochi and Ibaraki cite{ZhaoNI05}. Previous algorithms were based on greedy splitting and divide and conquer strategies. In recent work cite{ChekuriE11} we proposed a convex-programming relaxation for SubMP based on the Lov'asz-extension of a sub modular function and showed its applicability for some special cases. In this paper we obtain the following results for arbitrary sub modular functions via this relaxation. begin{itemize} item A $2$-approximation for SubMP. This improves the $(k-1)$-approximation from cite{ZhaoNI05}. item A $(1.5-frac{1}{k})$-approximation for SubMP when $f$ is {em symmetric}. This improves the $2(1-frac{1}{k})$-approximation from cite{Queyranne99, ZhaoNI05}.end{itemize}
我们研究了{sc子模块多路分区}问题的算法(SubMP)。SubMP的实例由一个有限的基础集$V$、一个称为终端的$k$元素子集$S = {s_1,s_2,ldots,s_k} subseteq V$和一个在$V$上作为值oracle提供的非负子模集函数$f:2^Vrightarrow mathbb{R}_+$组成。目标是将$V$划分为$k$集$A_1,ldots,A_k$,以最小化$sum_{i=1}^kf(A_i)$,以便于$1 le i le k$、$s_i inA_i$。SubMP推广了一些众所周知的问题,如{scMultiway图和超图中的切问题,以及}{scNode加权}图中的多路切问题。SubMP任意子模函数(而不仅仅是对称函数)是由Zhao, Nagamochi和Ibaraki考虑的cite{ZhaoNI05}。以前的算法是基于贪婪分割和分而治之策略。在最近的工作cite{ChekuriE11}中,我们提出了一个基于子模函数Lovász-extension的SubMP的凸规划松弛,并证明了它在一些特殊情况下的适用性。本文利用这种松弛得到了任意子模函数的如下结果。 begin{itemize} itemSubMP的$2$ -近似。这改进了cite{ZhaoNI05}的$(k-1)$ -近似。 item 当$f$是的时,SubMP的$(1.5-frac{1}{k})$ -近似。这改进了{em}cite{Queyranne99, ZhaoNI05}的$2(1-frac{1}{k})$ -近似。end{itemize}
{"title":"Approximation Algorithms for Submodular Multiway Partition","authors":"C. Chekuri, Alina Ene","doi":"10.1109/FOCS.2011.34","DOIUrl":"https://doi.org/10.1109/FOCS.2011.34","url":null,"abstract":"We study algorithms for the {sc Sub modular Multiway Partition}problem (SubMP). An instance of SubMP consists of a finite ground set $V$, a subset $S = {s_1,s_2,ldots,s_k} subseteq V$ of $k$elements called terminals, and a non-negative sub modular set function$f:2^Vrightarrow mathbb{R}_+$ on $V$ provided as a value oracle. The goal is to partition $V$ into $k$ sets $A_1,ldots,A_k$ to minimize $sum_{i=1}^kf(A_i)$ such that for $1 le i le k$, $s_i inA_i$. SubMP generalizes some well-known problems such as the {scMultiway Cut} problem in graphs and hyper graphs, and the {scNode-weighed Multiway Cut} problem in graphs. SubMP for arbitrary sub modular functions (instead of just symmetric functions) was considered by Zhao, Nagamochi and Ibaraki cite{ZhaoNI05}. Previous algorithms were based on greedy splitting and divide and conquer strategies. In recent work cite{ChekuriE11} we proposed a convex-programming relaxation for SubMP based on the Lov'asz-extension of a sub modular function and showed its applicability for some special cases. In this paper we obtain the following results for arbitrary sub modular functions via this relaxation. begin{itemize} item A $2$-approximation for SubMP. This improves the $(k-1)$-approximation from cite{ZhaoNI05}. item A $(1.5-frac{1}{k})$-approximation for SubMP when $f$ is {em symmetric}. This improves the $2(1-frac{1}{k})$-approximation from cite{Queyranne99, ZhaoNI05}.end{itemize}","PeriodicalId":326048,"journal":{"name":"2011 IEEE 52nd Annual Symposium on Foundations of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127332682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 57
Rounding Semidefinite Programming Hierarchies via Global Correlation 基于全局关联的半定规划层次的舍入
Pub Date : 2011-04-24 DOI: 10.1109/FOCS.2011.95
B. Barak, P. Raghavendra, David Steurer
We show a new way to round vector solutions of semi definite programming (SDP) hierarchies into integral solutions, based on a connection between these hierarchies and the spectrum of the input graph. We demonstrate the utility of our method by providing a new SDP-hierarchy based algorithm for constraint satisfaction problems with 2-variable constraints (2-CSP's). More concretely, we show for every $2$-CSP instance $Ins$, a rounding algorithm for $r$ rounds of the Lasserre SDP hierarchy for $Ins$ that obtains an integral solution which is at most $e$ worse than the relaxation's value (normalized to lie in $[0,1]$), as long as[ r >, kcdotrank_{geq theta}(Ins)/poly(e) ;,]where $k$ is the alphabet size of $Ins$, $theta=poly(e/k)$, and $rank_{geq theta}(Ins)$ denotes the number of eigen values larger than $theta$ in the normalized adjacency matrix of the constraint graph of $Ins$. In the case that $Ins$ is a unique games instance, the threshold $theta$ is only a polynomial in $e$, and is independent of the alphabet size. Also in this case, we can give a non-trivial bound on the number of rounds for emph{every} instance. In particular our result yields an SDP-hierarchy based algorithm that matches the performance of the recent sub exponential algorithm of Aurora, Barak and Steurer (FOCS 2010) in the worst case, but runs faster on a natural family of instances, thus further restricting the set of possible hard instances for Khot's Unique Games Conjecture. Our algorithm actually requires less than the $n^{O(r)}$ constraints specified by the $r^{th}$ level of the Lasserre hierarchy, and in some cases $r$ rounds of our program can be evaluated in time$2^{O(r)}poly(n)$.
基于半定规划(SDP)层次与输入图谱之间的联系,给出了一种将半定规划(SDP)层次的向量解舍入为积分解的新方法。我们通过提供一种新的基于sdp层次的算法来解决具有2变量约束(2-CSP)的约束满足问题来证明我们的方法的实用性。更具体地说,我们证明了对于$2$ -CSP实例$Ins$,对于$Ins$的Lasserre SDP层次结构的$r$的舍入算法,得到的积分解至多$e$小于松弛值(归一化到$[0,1]$),只要[ r >, kcdotrank_{geq theta}(Ins)/poly(e) ;,],其中$k$是$Ins$, $theta=poly(e/k)$,$rank_{geq theta}(Ins)$表示$Ins$约束图的归一化邻接矩阵中大于$theta$的特征值个数。在$Ins$是unique games实例的情况下,阈值$theta$只是$e$中的一个多项式,并且与字母大小无关。同样在这种情况下,我们可以给出emph{每个}实例的轮数的非平凡界。特别是,我们的结果产生了一个基于sdp层次的算法,在最坏的情况下,它与Aurora, Barak和Steurer最近的次指数算法(FOCS 2010)的性能相匹配,但在自然实例系列上运行得更快,从而进一步限制了Khot的Unique Games Conjecture的可能硬实例集。我们的算法实际上需要比Lasserre层次结构的$r^{th}$级别指定的$n^{O(r)}$约束更少的约束,并且在某些情况下,我们的程序的$r$轮可以及时计算$2^{O(r)}poly(n)$。
{"title":"Rounding Semidefinite Programming Hierarchies via Global Correlation","authors":"B. Barak, P. Raghavendra, David Steurer","doi":"10.1109/FOCS.2011.95","DOIUrl":"https://doi.org/10.1109/FOCS.2011.95","url":null,"abstract":"We show a new way to round vector solutions of semi definite programming (SDP) hierarchies into integral solutions, based on a connection between these hierarchies and the spectrum of the input graph. We demonstrate the utility of our method by providing a new SDP-hierarchy based algorithm for constraint satisfaction problems with 2-variable constraints (2-CSP's). More concretely, we show for every $2$-CSP instance $Ins$, a rounding algorithm for $r$ rounds of the Lasserre SDP hierarchy for $Ins$ that obtains an integral solution which is at most $e$ worse than the relaxation's value (normalized to lie in $[0,1]$), as long as[ r &gt, kcdotrank_{geq theta}(Ins)/poly(e) ;,]where $k$ is the alphabet size of $Ins$, $theta=poly(e/k)$, and $rank_{geq theta}(Ins)$ denotes the number of eigen values larger than $theta$ in the normalized adjacency matrix of the constraint graph of $Ins$. In the case that $Ins$ is a unique games instance, the threshold $theta$ is only a polynomial in $e$, and is independent of the alphabet size. Also in this case, we can give a non-trivial bound on the number of rounds for emph{every} instance. In particular our result yields an SDP-hierarchy based algorithm that matches the performance of the recent sub exponential algorithm of Aurora, Barak and Steurer (FOCS 2010) in the worst case, but runs faster on a natural family of instances, thus further restricting the set of possible hard instances for Khot's Unique Games Conjecture. Our algorithm actually requires less than the $n^{O(r)}$ constraints specified by the $r^{th}$ level of the Lasserre hierarchy, and in some cases $r$ rounds of our program can be evaluated in time$2^{O(r)}poly(n)$.","PeriodicalId":326048,"journal":{"name":"2011 IEEE 52nd Annual Symposium on Foundations of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122102430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 162
How to Play Unique Games Against a Semi-random Adversary: Study of Semi-random Models of Unique Games 如何对抗半随机对手玩独特游戏:研究独特游戏的半随机模型
Pub Date : 2011-04-19 DOI: 10.1109/FOCS.2011.78
A. Kolla, K. Makarychev, Yury Makarychev
In this paper, we study the average case complexity of the Unique Games problem. We propose a semi-random model, in which a unique game instance is generated in several steps. First an adversary selects a completely satisfiable instance of Unique Games, then she chooses an epsilon-fraction of all edges, and finally replaces (& quot; corrupts'') the constraints corresponding to these edges with new constraints. If all steps are adversarial, the adversary can obtain any (1-epsilon)-satisfiable instance, so then the problem is as hard as in the worst case. We show however that we can find a solution satisfying a (1-delta) fraction of all constraints in polynomial-time if at least one step is random (we require that the average degree of the graph is Omeg(log k)). Our result holds only for epsilon less than some absolute constant. We prove that if epsilon >= 1/2, then the problem is hard in one of the models, that is, no polynomial-time algorithm can distinguish between the following two cases: (i) the instance is a (1-epsilon)-satisfiable semi-random instance and (ii) the instance is at most delta-satisfiable (for every delta >, 0); the result assumes the 2-to-2 conjecture. Finally, we study semi-random instances of Unique Games that are at most (1-epsilon)-satisfiable. We present an algorithm that distinguishes between the case when the instance is a semi-random instance and the case when the instance is an (arbitrary) (1-delta)-satisfiable instances if epsilon >, c delta (for some absolute constant c).
本文研究了唯一对策问题的平均情况复杂度。我们提出了一个半随机模型,其中一个唯一的游戏实例是在几个步骤中生成的。对手首先选择一个完全可满足的Unique Games实例,然后选择所有边的一个分数,最后替换(& quot;用新的约束约束与这些边相对应。如果所有步骤都是对抗性的,那么对手可以获得任何(1-epsilon)可满足的实例,因此问题与最坏情况一样困难。然而,我们证明,如果至少有一个步骤是随机的,我们可以在多项式时间内找到满足所有约束(1-delta)分数的解(我们要求图的平均度是omega (log k))。我们的结果只对小于某个绝对常数成立。我们证明了如果epsilon >= 1/2,则问题在其中一个模型中是困难的,即多项式时间算法不能区分以下两种情况:(i)实例是(1-epsilon)可满足的半随机实例和(ii)实例最多是可满足的(对于每个>, 0);结果假定为2对2猜想。最后,我们研究了最多(1-epsilon)可满足的唯一游戏的半随机实例。我们提出了一种算法来区分实例是半随机实例和实例是(任意)(1- δ)可满足实例的情况,如果ε >, c δ(对于某个绝对常数c)。
{"title":"How to Play Unique Games Against a Semi-random Adversary: Study of Semi-random Models of Unique Games","authors":"A. Kolla, K. Makarychev, Yury Makarychev","doi":"10.1109/FOCS.2011.78","DOIUrl":"https://doi.org/10.1109/FOCS.2011.78","url":null,"abstract":"In this paper, we study the average case complexity of the Unique Games problem. We propose a semi-random model, in which a unique game instance is generated in several steps. First an adversary selects a completely satisfiable instance of Unique Games, then she chooses an epsilon-fraction of all edges, and finally replaces (& quot; corrupts'') the constraints corresponding to these edges with new constraints. If all steps are adversarial, the adversary can obtain any (1-epsilon)-satisfiable instance, so then the problem is as hard as in the worst case. We show however that we can find a solution satisfying a (1-delta) fraction of all constraints in polynomial-time if at least one step is random (we require that the average degree of the graph is Omeg(log k)). Our result holds only for epsilon less than some absolute constant. We prove that if epsilon >= 1/2, then the problem is hard in one of the models, that is, no polynomial-time algorithm can distinguish between the following two cases: (i) the instance is a (1-epsilon)-satisfiable semi-random instance and (ii) the instance is at most delta-satisfiable (for every delta &gt, 0); the result assumes the 2-to-2 conjecture. Finally, we study semi-random instances of Unique Games that are at most (1-epsilon)-satisfiable. We present an algorithm that distinguishes between the case when the instance is a semi-random instance and the case when the instance is an (arbitrary) (1-delta)-satisfiable instances if epsilon &gt, c delta (for some absolute constant c).","PeriodicalId":326048,"journal":{"name":"2011 IEEE 52nd Annual Symposium on Foundations of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123802508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
Approximating Graphic TSP by Matchings 通过匹配逼近图形TSP
Pub Date : 2011-04-15 DOI: 10.1109/FOCS.2011.56
Tobias Mömke, O. Svensson
We present a framework for approximating the metric TSP based on a novel use of matchings. Traditionally, matchings have been used to add edges in order to make a given graph Eulerian, whereas our approach also allows for the removal of certain edges leading to a decreased cost. For the TSP on graphic metrics (graph-TSP), the approach yields a 1.461-approximation algorithm with respect to the Held-Karp lower bound. For graph-TSP restricted to a class of graphs that contains degree three bounded and claw-free graphs, we show that the integrality gap of the Held-Karp relaxation matches the conjectured ratio 4/3. The framework allows for generalizations in a natural way and also leads to a 1.586-approximation algorithm for the traveling salesman path problem on graphic metrics where the start and end vertices are prespecified.
我们提出了一个框架来近似度量TSP基于一种新的使用匹配。传统上,匹配已经被用来添加边,以使给定的图欧拉,而我们的方法也允许删除某些边,从而降低成本。对于图形度量上的TSP (graph-TSP),该方法产生了关于Held-Karp下界的1.461近似算法。对于图- tsp限制为一类包含三次有界无爪图的图,我们证明了hold - karp松弛的完整性间隙匹配猜想比率4/3。该框架允许以一种自然的方式进行泛化,并且还导致了在图形度量上的旅行推销员路径问题的1.586近似算法,其中开始和结束顶点是预先指定的。
{"title":"Approximating Graphic TSP by Matchings","authors":"Tobias Mömke, O. Svensson","doi":"10.1109/FOCS.2011.56","DOIUrl":"https://doi.org/10.1109/FOCS.2011.56","url":null,"abstract":"We present a framework for approximating the metric TSP based on a novel use of matchings. Traditionally, matchings have been used to add edges in order to make a given graph Eulerian, whereas our approach also allows for the removal of certain edges leading to a decreased cost. For the TSP on graphic metrics (graph-TSP), the approach yields a 1.461-approximation algorithm with respect to the Held-Karp lower bound. For graph-TSP restricted to a class of graphs that contains degree three bounded and claw-free graphs, we show that the integrality gap of the Held-Karp relaxation matches the conjectured ratio 4/3. The framework allows for generalizations in a natural way and also leads to a 1.586-approximation algorithm for the traveling salesman path problem on graphic metrics where the start and end vertices are prespecified.","PeriodicalId":326048,"journal":{"name":"2011 IEEE 52nd Annual Symposium on Foundations of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130394080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 121
Minimum Weight Cycles and Triangles: Equivalences and Algorithms 最小权环和三角形:等价和算法
Pub Date : 2011-04-14 DOI: 10.1109/FOCS.2011.27
L. Roditty, V. V. Williams
We consider the fundamental algorithmic problem of finding a cycle of minimum weight in a weighted graph. In particular, we show that the minimum weight cycle problem in an undirected n-node graph with edge weights in {1,...,M} or in a directed n-node graph with edge weights in {-M,..., M} and no negative cycles can be efficiently reduced to finding a minimum weight _triangle_ in an Theta(n)-node _undirected_ graph with weights in {1,...,O(M)}. Roughly speaking, our reductions imply the following surprising phenomenon: a minimum cycle with an arbitrary number of weighted edges can be ``encoded'' using only three edges within roughly the same weight interval! This resolves a longstanding open problem posed in a seminal work by Itai and Rodeh [SIAM J. Computing 1978] on minimum cycle in unweighted graphs. A direct consequence of our efficient reductions are tilde{O}(Mn^{omega})0) for minimum weight cycle immediately implies a O(n^{3-delta})-time algorithm (delta>0) for APSP.
我们考虑在加权图中寻找最小权值环的基本算法问题。特别地,我们证明了边权为{1,…的无向n节点图的最小权循环问题。,在边权为-M}的有向n节点图中,{, M}和无负环可以有效地简化为在Theta(n)节点的无向图中找到一个最小权值三角形,权值为{1,…,O(M)}。粗略地说,我们的约简暗示了以下令人惊讶的现象:具有任意数量加权边的最小循环可以在大致相同的权重区间内仅使用三条边进行“编码”!这解决了Itai和Rodeh [SIAM J. Computing 1978]在非加权图中的最小周期的开创性工作中提出的长期开放问题。我们有效缩减的直接结果是最小权循环的{tildeO}(Mn^ {omega})0)立即意味着APSP的O(n^{3-delta})时间算法(delta >0)。
{"title":"Minimum Weight Cycles and Triangles: Equivalences and Algorithms","authors":"L. Roditty, V. V. Williams","doi":"10.1109/FOCS.2011.27","DOIUrl":"https://doi.org/10.1109/FOCS.2011.27","url":null,"abstract":"We consider the fundamental algorithmic problem of finding a cycle of minimum weight in a weighted graph. In particular, we show that the minimum weight cycle problem in an undirected n-node graph with edge weights in {1,...,M} or in a directed n-node graph with edge weights in {-M,..., M} and no negative cycles can be efficiently reduced to finding a minimum weight _triangle_ in an Theta(n)-node _undirected_ graph with weights in {1,...,O(M)}. Roughly speaking, our reductions imply the following surprising phenomenon: a minimum cycle with an arbitrary number of weighted edges can be ``encoded'' using only three edges within roughly the same weight interval! This resolves a longstanding open problem posed in a seminal work by Itai and Rodeh [SIAM J. Computing 1978] on minimum cycle in unweighted graphs. A direct consequence of our efficient reductions are tilde{O}(Mn^{omega})0) for minimum weight cycle immediately implies a O(n^{3-delta})-time algorithm (delta>0) for APSP.","PeriodicalId":326048,"journal":{"name":"2011 IEEE 52nd Annual Symposium on Foundations of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133320696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
期刊
2011 IEEE 52nd Annual Symposium on Foundations of Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1