首页 > 最新文献

Theoretical Computer Science最新文献

英文 中文
Efficient algorithms for the interval maximum coverage problem 区间最大覆盖问题的有效算法
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-02-06 DOI: 10.1016/j.tcs.2026.115802
Vacharapat Mettanant
This paper studies a special case of the Maximum Interval Multi-Cover (MaxIMC) problem, called the Interval Maximum Coverage Problem. Given a set of points P on the real line, a collection of intervals I, and a budget K, the goal is to select up to K intervals that maximize the number of covered points. While the computational complexity of the general MaxIMC problem with arbitrary coverage requirements remains open, this special case admits efficient polynomial-time solutions. We develop an exact algorithm that improves computational efficiency when the number of intervals is extremely large, and a near-linear-time approximation algorithm for the case where each interval covers exactly r points. We provide formal proofs of correctness, detailed complexity analysis, and experimental results demonstrating the practical efficiency and effectiveness of the proposed algorithms.
本文研究了最大区间多覆盖问题的一种特殊情况,即区间最大覆盖问题。给定实线上的点集P,区间集合I和预算K,目标是选择最多K个区间,使覆盖点的数量最大化。虽然具有任意覆盖要求的一般MaxIMC问题的计算复杂性仍然是开放的,但这种特殊情况允许有效的多项式时间解决方案。我们开发了一种精确的算法,当区间数量非常大时,它可以提高计算效率,并且对于每个区间恰好覆盖r个点的情况,我们开发了一种近线性时间逼近算法。我们提供了正确性的正式证明,详细的复杂性分析和实验结果,证明了所提出算法的实际效率和有效性。
{"title":"Efficient algorithms for the interval maximum coverage problem","authors":"Vacharapat Mettanant","doi":"10.1016/j.tcs.2026.115802","DOIUrl":"10.1016/j.tcs.2026.115802","url":null,"abstract":"<div><div>This paper studies a special case of the Maximum Interval Multi-Cover (MaxIMC) problem, called the <em>Interval Maximum Coverage Problem</em>. Given a set of points <em>P</em> on the real line, a collection of intervals <em>I</em>, and a budget <em>K</em>, the goal is to select up to <em>K</em> intervals that maximize the number of covered points. While the computational complexity of the general MaxIMC problem with arbitrary coverage requirements remains open, this special case admits efficient polynomial-time solutions. We develop an exact algorithm that improves computational efficiency when the number of intervals is extremely large, and a near-linear-time approximation algorithm for the case where each interval covers exactly <em>r</em> points. We provide formal proofs of correctness, detailed complexity analysis, and experimental results demonstrating the practical efficiency and effectiveness of the proposed algorithms.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1069 ","pages":"Article 115802"},"PeriodicalIF":1.0,"publicationDate":"2026-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146147122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Finding trails in multigraphs with restricted transitions 在过渡受限的多图中寻找轨迹
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-02-05 DOI: 10.1016/j.tcs.2026.115798
Hortensia Galeana-Sánchez , Carlos Vilchis-Alfaro
Let G be a multigraph. A transition in G is a pair of adjacent edges. For each vertex x of G, a set T(x) of allowed transition with respect to x is a set of unordered pairs of edges incident to x. A transition system T is a set {T(x): x ∈ V(G)}, where T(x) is a fixed set of allowed transition with respect to x. Given a multigraph G and a transition system T, for each x ∈ V(G), the transition graph of x, denoted by Gx, is a graph such that its vertex set is the set of edges incident to x; and two vertices e and g of Gx are adjacent whenever eg ∈ T(x). A trail P=(x0,e0,x1,,xk1,ek1,xk) in G is T-compatible if for every i{0,,k2}, eiei+1T(xi+1).
In this paper we deal with the problem of finding T-compatible trails between s and t two given vertices in a multigraph with transition system T. First, we prove that finding a T-compatible trail between two given edges can be done in polynomial time. Consequently, finding a T-compatible st trail can be done in polynomial time. Moreover, it can be found a shortest T-compatible st trail and a closed T-compatible trail containing a given vertex in polynomial time. Finally, we study multigraphs with transition systems such that their transition graph is connected or complete multipartite graph. The properly colored setting is a particular case of transition systems where all its transition graphs are complete multipartite graphs.
设G是一个多重图。G中的一个过渡是一对相邻的边。每个顶点x (G, T (x)允许过渡对x是一组无序对边缘入射x。过渡系统T是一个集{T (x): x ∈ V (G)},其中T (x)是一组固定的允许过渡对x。鉴于油印G和T转换系统,为每个x ∈ V (G), x的过渡图,用Gx,就是这样一个图表,其顶点集的边缘入射x;当eg ∈ T(x)时,两个顶点e与g (Gx)相邻。小道P = (x0, e0 x1,…,xk−1,埃克−1,xk)在G T-compatible如果每我∈{0…k−2},eiei T + 1∈(xi + 1)。本文研究了具有过渡系统t的多重图中s和t两个给定顶点之间的t -相容轨迹问题,首先证明了在多项式时间内找到两个给定边之间的t -相容轨迹是可行的。因此,找到t兼容的s - t轨迹可以在多项式时间内完成。此外,在多项式时间内可以找到一条最短的t -兼容s - t轨迹和一条包含给定顶点的t -兼容闭合轨迹。最后,我们研究了具有过渡系统的多图,其过渡图是连通或完全多部图。适当的着色设置是过渡系统的特殊情况,其中所有的过渡图都是完全多部图。
{"title":"Finding trails in multigraphs with restricted transitions","authors":"Hortensia Galeana-Sánchez ,&nbsp;Carlos Vilchis-Alfaro","doi":"10.1016/j.tcs.2026.115798","DOIUrl":"10.1016/j.tcs.2026.115798","url":null,"abstract":"<div><div>Let <em>G</em> be a multigraph. A transition in <em>G</em> is a pair of adjacent edges. For each vertex <em>x</em> of <em>G</em>, a set <em>T</em>(<em>x</em>) of allowed transition with respect to <em>x</em> is a set of unordered pairs of edges incident to <em>x</em>. A transition system <em>T</em> is a set {<em>T</em>(<em>x</em>): <em>x</em> ∈ <em>V</em>(<em>G</em>)}, where <em>T</em>(<em>x</em>) is a fixed set of allowed transition with respect to <em>x</em>. Given a multigraph <em>G</em> and a transition system <em>T</em>, for each <em>x</em> ∈ <em>V</em>(<em>G</em>), the transition graph of <em>x</em>, denoted by <em>G<sub>x</sub></em>, is a graph such that its vertex set is the set of edges incident to <em>x</em>; and two vertices <em>e</em> and <em>g</em> of <em>G<sub>x</sub></em> are adjacent whenever <em>eg</em> ∈ <em>T</em>(<em>x</em>). A trail <span><math><mrow><mi>P</mi><mo>=</mo><mo>(</mo><msub><mi>x</mi><mn>0</mn></msub><mo>,</mo><msub><mi>e</mi><mn>0</mn></msub><mo>,</mo><msub><mi>x</mi><mn>1</mn></msub><mo>,</mo><mo>…</mo><mo>,</mo><msub><mi>x</mi><mrow><mi>k</mi><mo>−</mo><mn>1</mn></mrow></msub><mo>,</mo><msub><mi>e</mi><mrow><mi>k</mi><mo>−</mo><mn>1</mn></mrow></msub><mo>,</mo><msub><mi>x</mi><mi>k</mi></msub><mo>)</mo></mrow></math></span> in <em>G</em> is <em>T</em>-compatible if for every <span><math><mrow><mi>i</mi><mo>∈</mo><mo>{</mo><mn>0</mn><mo>,</mo><mo>…</mo><mo>,</mo><mi>k</mi><mo>−</mo><mn>2</mn><mo>}</mo></mrow></math></span>, <span><math><mrow><msub><mi>e</mi><mi>i</mi></msub><msub><mi>e</mi><mrow><mi>i</mi><mo>+</mo><mn>1</mn></mrow></msub><mo>∈</mo><mi>T</mi><mrow><mo>(</mo><msub><mi>x</mi><mrow><mi>i</mi><mo>+</mo><mn>1</mn></mrow></msub><mo>)</mo></mrow></mrow></math></span>.</div><div>In this paper we deal with the problem of finding <em>T</em>-compatible trails between <em>s</em> and <em>t</em> two given vertices in a multigraph with transition system <em>T</em>. First, we prove that finding a <em>T</em>-compatible trail between two given edges can be done in polynomial time. Consequently, finding a <em>T</em>-compatible <span><math><mrow><mi>s</mi><mo>−</mo><mi>t</mi></mrow></math></span> trail can be done in polynomial time. Moreover, it can be found a shortest <em>T</em>-compatible <span><math><mrow><mi>s</mi><mo>−</mo><mi>t</mi></mrow></math></span> trail and a closed <em>T</em>-compatible trail containing a given vertex in polynomial time. Finally, we study multigraphs with transition systems such that their transition graph is connected or complete multipartite graph. The properly colored setting is a particular case of transition systems where all its transition graphs are complete multipartite graphs.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1069 ","pages":"Article 115798"},"PeriodicalIF":1.0,"publicationDate":"2026-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146147124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SOBRA - Shielding Optimization for BRAchytherapy SOBRA -近距离放射治疗的屏蔽优化
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-02-02 DOI: 10.1016/j.tcs.2026.115797
Guillaume Blin , Adrian Miclăuş , Sebastian Ordyniak , Alexandru Popa
In this paper, we study a combinatorial problem which arises in the development of innovative treatment strategies and equipment using tunable shields in internal radiotherapy. From an algorithmic point of view, the problem is related to circular integer word decomposition into circular binary words under constraints. We consider several variants of the problem, depending on constraints and parameters and present exact, approximation, fixed parameter tractable algorithms and NP-hardness and APX-hardness results.
在本文中,我们研究了一个组合问题,出现在创新的治疗策略和设备的发展中,使用可调屏蔽在内部放疗。从算法的角度来看,问题涉及到在约束条件下将循环整数字分解为循环二进制字。我们考虑了问题的几种变体,取决于约束和参数,并提出了精确,近似,固定参数可处理的算法以及np -硬度和apx -硬度的结果。
{"title":"SOBRA - Shielding Optimization for BRAchytherapy","authors":"Guillaume Blin ,&nbsp;Adrian Miclăuş ,&nbsp;Sebastian Ordyniak ,&nbsp;Alexandru Popa","doi":"10.1016/j.tcs.2026.115797","DOIUrl":"10.1016/j.tcs.2026.115797","url":null,"abstract":"<div><div>In this paper, we study a combinatorial problem which arises in the development of innovative treatment strategies and equipment using tunable shields in internal radiotherapy. From an algorithmic point of view, the problem is related to circular integer word decomposition into circular binary words under constraints. We consider several variants of the problem, depending on constraints and parameters and present exact, approximation, fixed parameter tractable algorithms and NP-hardness and APX-hardness results.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1069 ","pages":"Article 115797"},"PeriodicalIF":1.0,"publicationDate":"2026-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146147123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lattice-based logarithmic-size forward-secure ring signatures in QROM QROM中基于格子的对数大小前向安全环签名
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-29 DOI: 10.1016/j.tcs.2026.115787
Priyanka Dutta, Willy Susilo, Fuchun Guo, Dung Hoang Duong
Ring signatures, a novel cryptographic primitive, were introduced by Rivest, Shamir, and Tauman at ASIACRYPT 2001. It allows a member of a group to sign a message on behalf of an ad-hoc group of users, known as a ring, without revealing its identity. Ring signatures, initially introduced for applications such as whistle-blowing and confidential disclosures, have since gained significant relevance and widespread adoption across various domains, including blockchain technologies, ad-hoc networks, anonymous transactions, location-based services, cloud computing platforms, and outsourced computation. However, traditional ring signatures are vulnerable if the signers’ keys are compromised. To resolve this vulnerability, Liu and Wong introduced the notion of forward-secure ring signatures at IJNS 2008. Forward-security ensures that even if a signer’s secret key is compromised, signatures generated in prior time periods remain secure. It significantly reduces the damage caused by secret key exposure, making it crucial for long-term security in applications such as whistle-blowing or anonymous authentication. However, most existing forward-secure ring signature schemes are based on number-theoretic assumptions, making them vulnerable to quantum adversaries. Yu and Wang proposed a quantum-safe forward-secure ring signature scheme at ICICS 2023, and Yu et al. further extended this work in Computer Networks (2025), retaining the same ring signature scheme with forward security. But the scheme suffers from large signatures that grow linearly with the ring size. In this paper, we propose a lattice-based forward-secure ring signature scheme in the quantum random oracle model (QROM) that simultaneously achieves security against quantum adversaries and compact signature size. Notably, the signature size is logarithmic in the number of members in the ring, enabling significantly better scalability compared to prior constructions.
环签名是由Rivest、Shamir和Tauman在ASIACRYPT 2001上提出的一种新的密码原语。它允许组的成员代表一个特别的用户组(称为环)签署消息,而不暴露其身份。环签名最初是为举报和机密披露等应用而引入的,后来在区块链技术、自组织网络、匿名交易、基于位置的服务、云计算平台和外包计算等各个领域获得了重要的相关性和广泛的采用。然而,如果签名者的密钥被泄露,传统的环签名是脆弱的。为了解决这个漏洞,Liu和Wong在IJNS 2008上引入了前向安全环签名的概念。前向安全性确保即使签名者的秘密密钥被泄露,以前时间段生成的签名仍然是安全的。它大大减少了密钥暴露所造成的损害,使其对举报或匿名身份验证等应用程序的长期安全性至关重要。然而,大多数现有的前向安全环签名方案都是基于数论假设的,这使得它们很容易受到量子对手的攻击。Yu和Wang在ICICS 2023上提出了量子安全的前向安全环签名方案,Yu等人在《计算机网络》(2025)中进一步扩展了这项工作,保留了与前向安全相同的环签名方案。但是该方案的缺点是签名会随着环的大小线性增长。本文提出了一种基于格子的量子随机预言模型(QROM)的前向安全环签名方案,该方案同时实现了对量子对手的安全性和紧凑的签名大小。值得注意的是,签名大小是环中成员数量的对数,与之前的结构相比,具有更好的可扩展性。
{"title":"Lattice-based logarithmic-size forward-secure ring signatures in QROM","authors":"Priyanka Dutta,&nbsp;Willy Susilo,&nbsp;Fuchun Guo,&nbsp;Dung Hoang Duong","doi":"10.1016/j.tcs.2026.115787","DOIUrl":"10.1016/j.tcs.2026.115787","url":null,"abstract":"<div><div>Ring signatures, a novel cryptographic primitive, were introduced by Rivest, Shamir, and Tauman at ASIACRYPT 2001. It allows a member of a group to sign a message on behalf of an ad-hoc group of users, known as a ring, without revealing its identity. Ring signatures, initially introduced for applications such as whistle-blowing and confidential disclosures, have since gained significant relevance and widespread adoption across various domains, including blockchain technologies, ad-hoc networks, anonymous transactions, location-based services, cloud computing platforms, and outsourced computation. However, traditional ring signatures are vulnerable if the signers’ keys are compromised. To resolve this vulnerability, Liu and Wong introduced the notion of forward-secure ring signatures at IJNS 2008. Forward-security ensures that even if a signer’s secret key is compromised, signatures generated in prior time periods remain secure. It significantly reduces the damage caused by secret key exposure, making it crucial for long-term security in applications such as whistle-blowing or anonymous authentication. However, most existing forward-secure ring signature schemes are based on number-theoretic assumptions, making them vulnerable to quantum adversaries. Yu and Wang proposed a quantum-safe forward-secure ring signature scheme at ICICS 2023, and Yu et al. further extended this work in Computer Networks (2025), retaining the same ring signature scheme with forward security. But the scheme suffers from large signatures that grow linearly with the ring size. In this paper, we propose a lattice-based forward-secure ring signature scheme in the quantum random oracle model (<span>QROM</span>) that simultaneously achieves security against quantum adversaries and compact signature size. Notably, the signature size is logarithmic in the number of members in the ring, enabling significantly better scalability compared to prior constructions.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1068 ","pages":"Article 115787"},"PeriodicalIF":1.0,"publicationDate":"2026-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146081152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Approximation algorithm for k-Product uncapacitated facility location problem with submodular penalties 具有次模惩罚的k-积无能力设施选址问题的近似算法
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-24 DOI: 10.1016/j.tcs.2026.115785
Chenzheng Feng, Wen Liu, Gengsheng Zhang, Bo Hou
In this paper, we consider the k-product uncapacitated facility location problem with submodular penalties. In this problem, we are given a set of demand points where clients are located, a set of potential locations where unlimited capacity facilities can be opened and a set of k different kinds of products. Each open facility can only supply one kind of product, and its open cost is determined by the product it supplies. There is a service cost between each pair of locations. Assume these costs of service are metric. Each client is either supplied k different kinds of products by a set of k different open facilities or completely rejected and a rejection cost has to be paid, which is determined by a submodular function. The objective is to minimize the total cost, including the cost of opening facilities at sites, the service cost for providing products to clients from the open facilities, and the penalty cost of the set of the rejected clients. Based on the LP rounding technique, we propose a (2k+2)-approximation algorithm for this problem.
本文考虑具有次模惩罚的k-积无能力设施选址问题。在这个问题中,我们有一组客户所在的需求点,一组可以开放无限容量设施的潜在地点和一组k种不同的产品。每个开放设施只能提供一种产品,其开放成本由其提供的产品决定。每对位置之间都有服务成本。假设这些服务成本是度量的。每个客户要么通过一组k种不同的开放设施提供k种不同的产品,要么完全拒绝并支付拒绝成本,拒绝成本由子模块函数决定。目标是使总成本最小化,包括在现场开设设施的成本,从开放设施向客户提供产品的服务成本,以及被拒绝的客户组的惩罚成本。基于LP舍入技术,提出了一种(2k+2)逼近算法。
{"title":"Approximation algorithm for k-Product uncapacitated facility location problem with submodular penalties","authors":"Chenzheng Feng,&nbsp;Wen Liu,&nbsp;Gengsheng Zhang,&nbsp;Bo Hou","doi":"10.1016/j.tcs.2026.115785","DOIUrl":"10.1016/j.tcs.2026.115785","url":null,"abstract":"<div><div>In this paper, we consider the <em>k</em>-product uncapacitated facility location problem with submodular penalties. In this problem, we are given a set of demand points where clients are located, a set of potential locations where unlimited capacity facilities can be opened and a set of <em>k</em> different kinds of products. Each open facility can only supply one kind of product, and its open cost is determined by the product it supplies. There is a service cost between each pair of locations. Assume these costs of service are metric. Each client is either supplied <em>k</em> different kinds of products by a set of <em>k</em> different open facilities or completely rejected and a rejection cost has to be paid, which is determined by a submodular function. The objective is to minimize the total cost, including the cost of opening facilities at sites, the service cost for providing products to clients from the open facilities, and the penalty cost of the set of the rejected clients. Based on the LP rounding technique, we propose a <span><math><mrow><mo>(</mo><mn>2</mn><mi>k</mi><mo>+</mo><mn>2</mn><mo>)</mo></mrow></math></span>-approximation algorithm for this problem.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1068 ","pages":"Article 115785"},"PeriodicalIF":1.0,"publicationDate":"2026-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146049011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparison of k-creature and t-critter k型生物和t型生物的比较
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-24 DOI: 10.1016/j.tcs.2026.115767
Kohei Nomura, Koichi Yamazaki
Studying minimal separators in graph theory is important for both practical and theoretical reasons. Some graphs have polynomially many minimal separators, while others have exponentially many. Recently, there has been increasing interest in understanding which graph structures lead to exponentially many minimal separators. One such structure is a k-creature. It has been observed that graphs containing a k-creature as an induced subgraph have exponentially many minimal separators. Because of this, it was initially conjectured that forbidding k-creatures would be sufficient to characterize graph classes with only a polynomial number of minimal separators.
However, this conjecture was disproven by Gartland and Lokshtanov, who introduced a graph class known as k-twisted ladders. Although these graphs are free of k-creatures, they still have exponentially many minimal separators. This counterexample motivated the introduction of a new graph structure called the k-critter, which generalizes the k-twisted ladder.
This paper aims to clarify the fundamental differences between k-creatures and k-critters by analyzing their associated lattice structures. We focus on two representative graph types: k-ladders, which exemplify k-creatures, and k-twisted ladders, which represent the k-critter structure. By comparing the lattices formed by the minimal separators of each graph, we demonstrate that, despite their similar graph structures, their lattice structures differ significantly. Our results show that lattice-theoretical methods provide useful insights for studying minimal a, b-separators.
图论中最小分隔符的研究具有重要的理论和实践意义。一些图有多项式的最小分隔符,而另一些图有指数的最小分隔符。最近,人们对理解哪些图结构导致指数级多的最小分隔符越来越感兴趣。其中一种结构就是k型生物。已经观察到,包含一个k生物作为诱导子图的图具有指数级多的最小分隔符。正因为如此,最初推测禁止k-生物将足以表征只有多项式数量的最小分隔符的图类。然而,这个猜想被Gartland和Lokshtanov推翻了,他们引入了一个被称为k扭曲阶梯的图类。尽管这些图没有k-生物,但它们仍然有指数级多的最小分隔符。这个反例促使我们引入了一种新的图结构,称为k-critter,它推广了k-twisted ladder。本文旨在通过分析k-creatures和k-critters的相关晶格结构来阐明它们之间的根本区别。我们关注两种代表性的图类型:k-阶梯,它代表了k-生物,和k-扭曲阶梯,它代表了k-生物结构。通过比较每个图的最小分隔符形成的格,我们证明,尽管它们的图结构相似,但它们的晶格结构有很大的不同。我们的结果表明,晶格理论方法为研究极小a, b分隔子提供了有用的见解。
{"title":"Comparison of k-creature and t-critter","authors":"Kohei Nomura,&nbsp;Koichi Yamazaki","doi":"10.1016/j.tcs.2026.115767","DOIUrl":"10.1016/j.tcs.2026.115767","url":null,"abstract":"<div><div>Studying minimal separators in graph theory is important for both practical and theoretical reasons. Some graphs have polynomially many minimal separators, while others have exponentially many. Recently, there has been increasing interest in understanding which graph structures lead to exponentially many minimal separators. One such structure is a <em>k</em>-creature. It has been observed that graphs containing a <em>k</em>-creature as an induced subgraph have exponentially many minimal separators. Because of this, it was initially conjectured that forbidding <em>k</em>-creatures would be sufficient to characterize graph classes with only a polynomial number of minimal separators.</div><div>However, this conjecture was disproven by Gartland and Lokshtanov, who introduced a graph class known as <em>k</em>-twisted ladders. Although these graphs are free of <em>k</em>-creatures, they still have exponentially many minimal separators. This counterexample motivated the introduction of a new graph structure called the <em>k</em>-critter, which generalizes the <em>k</em>-twisted ladder.</div><div>This paper aims to clarify the fundamental differences between <em>k</em>-creatures and <em>k</em>-critters by analyzing their associated lattice structures. We focus on two representative graph types: <em>k</em>-ladders, which exemplify <em>k</em>-creatures, and <em>k</em>-twisted ladders, which represent the <em>k</em>-critter structure. By comparing the lattices formed by the minimal separators of each graph, we demonstrate that, despite their similar graph structures, their lattice structures differ significantly. Our results show that lattice-theoretical methods provide useful insights for studying minimal <em>a, b</em>-separators.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1068 ","pages":"Article 115767"},"PeriodicalIF":1.0,"publicationDate":"2026-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146049012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decomposing convex bipartite graphs into biconvex graphs and enumerating minimum weight red blue dominating sets 将凸二部图分解为双凸图,并列举最小权值红蓝支配集
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-24 DOI: 10.1016/j.tcs.2026.115784
Nesrine Abbas
In this paper we show that convex bipartite graphs can be decomposed into induced subgraphs consisting of biconvex connected components with no neighbourhood set containment. We use this result to enumerate minimum weight blue dominating sets in convex bipartite graphs. In the k blue (red) domination problem for a vertex-weighted bipartite graph G=(X,Y,E,w), where w is a function that assigns positive integer weights to vertices, we seek a subset DY (respectively DX) of total vertex weight at most k that dominates vertices of X (respectively Y). Because convex bipartite graphs are asymmetrical with regards to the neighbourhood sets of vertices in X and Y, an algorithm for red domination does not necessarily apply to blue domination for this subclass of bipartite graphs. The decision version of red (blue) domination is NP-complete for general bipartite graphs. We strengthen those results by showing that it remains NP-complete for perfect elimination bipartite graphs. We present a tight upper bound on the number of such sets in bipartite graphs. We present linear space linear delay enumeration algorithms for both the minimum weight red and blue dominating sets in convex bipartite graphs, that need linear and quadratic preprocessing time, respectively. We show that the number of minimum weight red and blue dominating sets in convex bipartite graphs can be computed in linear and quadratic time, respectively. We show that our results can be used to compute minimum weight red and blue dominating sets in convex bipartite graphs in polynomial time. Thus, they extend results in the literature for computing minimum cardinality red and blue dominating sets in unweighted convex bipartite graphs.
本文证明了凸二部图可以分解为由无邻域集包含的双凸连通分量组成的诱导子图。我们利用这一结果枚举了凸二部图的最小权值蓝色支配集。在顶点加权二部图G=(X,Y,E,w)的k个蓝(红)支配问题中,其中w是给顶点赋正整数权的函数,我们寻求顶点总权最大k的子集D⊥Y(分别为D⊥X),该子集支配X(分别为Y)的顶点。由于凸二部图对于X和Y上的顶点的邻域集是不对称的,所以对于这个二部图的子集,红色控制的算法不一定适用于蓝色控制。对于一般二部图,红(蓝)支配的决策版本是np完全的。我们通过证明对于完全消去二部图它仍然是np完全来加强这些结果。我们给出了二部图中这类集合数目的紧上界。针对凸二部图中最小权值红支配集和最小权值蓝支配集分别需要线性和二次预处理时间的问题,提出了线性空间线性延迟枚举算法。我们证明了凸二部图的最小权值红色和蓝色支配集的数量可以分别在线性和二次时间内计算。我们证明了我们的结果可以用于在多项式时间内计算凸二部图的最小权红和蓝支配集。因此,他们扩展了在非加权凸二部图中计算最小基数红和蓝支配集的文献结果。
{"title":"Decomposing convex bipartite graphs into biconvex graphs and enumerating minimum weight red blue dominating sets","authors":"Nesrine Abbas","doi":"10.1016/j.tcs.2026.115784","DOIUrl":"10.1016/j.tcs.2026.115784","url":null,"abstract":"<div><div>In this paper we show that convex bipartite graphs can be decomposed into induced subgraphs consisting of biconvex connected components with no neighbourhood set containment. We use this result to enumerate minimum weight blue dominating sets in convex bipartite graphs. In the <em>k</em> blue (red) domination problem for a vertex-weighted bipartite graph <span><math><mrow><mi>G</mi><mo>=</mo><mo>(</mo><mi>X</mi><mo>,</mo><mi>Y</mi><mo>,</mo><mi>E</mi><mo>,</mo><mi>w</mi><mo>)</mo><mo>,</mo></mrow></math></span> where <em>w</em> is a function that assigns positive integer weights to vertices, we seek a subset <em>D</em>⊆<em>Y</em> (respectively <em>D</em>⊆<em>X</em>) of total vertex weight at most <em>k</em> that dominates vertices of <em>X</em> (respectively <em>Y</em>). Because convex bipartite graphs are asymmetrical with regards to the neighbourhood sets of vertices in <em>X</em> and <em>Y</em>, an algorithm for red domination does not necessarily apply to blue domination for this subclass of bipartite graphs. The decision version of red (blue) domination is <span><math><mtext>NP</mtext></math></span>-complete for general bipartite graphs. We strengthen those results by showing that it remains <span><math><mtext>NP</mtext></math></span>-complete for perfect elimination bipartite graphs. We present a tight upper bound on the number of such sets in bipartite graphs. We present linear space linear delay enumeration algorithms for both the minimum weight red and blue dominating sets in convex bipartite graphs, that need linear and quadratic preprocessing time, respectively. We show that the number of minimum weight red and blue dominating sets in convex bipartite graphs can be computed in linear and quadratic time, respectively. We show that our results can be used to compute minimum weight red and blue dominating sets in convex bipartite graphs in polynomial time. Thus, they extend results in the literature for computing minimum cardinality red and blue dominating sets in unweighted convex bipartite graphs.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1068 ","pages":"Article 115784"},"PeriodicalIF":1.0,"publicationDate":"2026-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146081149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cluster vertex deletion problems on cubic graphs 三次图上的聚类顶点删除问题
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-23 DOI: 10.1016/j.tcs.2026.115775
Irena Rusu
The problems Cluster Vertex Deletion (or Cluster-VD) and its generalization s-Club Cluster Vertex Deletion (or s-Club-VD, for any integer s ≥ 1), have been introduced with the aim of detecting highly-connected parts in complex systems. Their NP-completeness has been established for several classes of graphs, but remains open for smaller classes, including subcubic planar bipartite graphs and cubic graphs. In this paper, we show that Cluster-VD and more generally s-Club-VD are NP-complete for cubic planar bipartite graphs, as well as for subcubic planar bipartite graphs with unbounded girth (when s is odd) and with girth exactly s+2 (when s is even). We also deduce new results for the related k-Path Vertex Cover problem (or k-PVC), namely 3-PVC is NP-complete for cubic planar bipartite graphs, whereas k-PVC with k ≥ 4 is NP-complete for subcubic planar (and bipartite, when k is odd) graphs of arbitrarily large girth.
针对复杂系统中高连通部分的检测问题,提出了聚类顶点删除(Cluster- vd)及其推广的s- club聚类顶点删除(s- club - vd,适用于任意整数s ≥ 1)。它们的np完备性已被建立在若干类图上,但对于更小的类,包括次三次平面二部图和三次图,仍然是开放的。在本文中,我们证明了Cluster-VD和更一般的s- club - vd对于三次平面二部图以及具有无界周长(当s为奇数)和周长正好为s+2(当s为偶数)的次三次平面二部图是np完全的。对于相关的k- path顶点覆盖问题(或k- pvc),我们也推导出新的结果,即对于三次平面二部图,3-PVC是np完全的,而对于任意大周长的次三次平面(和二部图,当k为奇数时)图,k- pvc (k ≥ 4)是np完全的。
{"title":"Cluster vertex deletion problems on cubic graphs","authors":"Irena Rusu","doi":"10.1016/j.tcs.2026.115775","DOIUrl":"10.1016/j.tcs.2026.115775","url":null,"abstract":"<div><div>The problems <span>Cluster Vertex Deletion</span> (or <span>Cluster-VD</span>) and its generalization <em>s</em>-<span>Club Cluster Vertex Deletion</span> (or <em>s</em>-<span>Club-VD</span>, for any integer <em>s</em> ≥ 1), have been introduced with the aim of detecting highly-connected parts in complex systems. Their NP-completeness has been established for several classes of graphs, but remains open for smaller classes, including subcubic planar bipartite graphs and cubic graphs. In this paper, we show that <span>Cluster-VD</span> and more generally <em>s</em>-<span>Club-VD</span> are NP-complete for cubic planar bipartite graphs, as well as for subcubic planar bipartite graphs with unbounded girth (when <em>s</em> is odd) and with girth exactly <span><math><mrow><mi>s</mi><mo>+</mo><mn>2</mn></mrow></math></span> (when <em>s</em> is even). We also deduce new results for the related <em>k</em>-<span>Path Vertex Cover</span> problem (or <em>k</em>-<span>PVC</span>), namely <span>3</span>-PVC is NP-complete for cubic planar bipartite graphs, whereas <em>k</em>-<span>PVC</span> with <em>k</em> ≥ 4 is NP-complete for subcubic planar (and bipartite, when <em>k</em> is odd) graphs of arbitrarily large girth.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1068 ","pages":"Article 115775"},"PeriodicalIF":1.0,"publicationDate":"2026-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146081150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the complexity of indeterminate strings matching 不确定字符串匹配的复杂性
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-23 DOI: 10.1016/j.tcs.2026.115771
Paweł Gawrychowski , Samah Ghazawi , Gad M. Landau
Given two indeterminate equal-length strings p and t with a set of r characters per position in both strings, we obtain a determinate string pw from p and a determinate string tw from t by choosing one character per position. Then, we say that p and t match when pw and tw match for some choice of characters. We systematically study the complexity of string matching for indeterminate equal-length strings, for different notions of matching: parameterized matching, order-preserving matching, and Cartesian tree matching. We use n to denote the length of both strings and r the upper bound on the number of characters per position. First, we provide an algorithm for the Cartesian tree version that runs in O(nlognloglogn) time using O(n) space, for any constant r. Second, we establish NP-hardness of the order-preserving version for r=2, thus solving a question explicitly stated by Henriques et al. [CPM 2018], who showed hardness for r=3. Third, we establish NP-hardness of the parameterized version for r=2. As both parameterized and order-preserving indeterminate matching reduce to the standard determinate matching for r=1, this provides a complete classification for these three variants.
给定两个不确定的等长字符串p和t,两个字符串中每个位置都有r个字符,我们从p得到一个确定字符串pw,从t得到一个确定字符串tw,每个位置选择一个字符。然后,当pw和tw匹配某些字符时,我们说p和t匹配。我们系统地研究了不确定等长字符串匹配的复杂性,包括不同的匹配概念:参数化匹配、保序匹配和笛卡儿树匹配。我们用n表示两个字符串的长度,用r表示每个位置的字符数的上限。首先,我们为笛卡尔树版本提供了一种算法,该算法使用O(n)空间在O(n)时间内运行,对于任何常数r。其次,我们建立了r=2时保序版本的np -硬度,从而解决了Henriques等人[CPM 2018]明确提出的问题,他们显示了r=3时的硬度。第三,我们建立了r=2时参数化版本的np -硬度。由于参数化和保序不确定匹配都简化为r=1时的标准确定匹配,这为这三种变体提供了完整的分类。
{"title":"On the complexity of indeterminate strings matching","authors":"Paweł Gawrychowski ,&nbsp;Samah Ghazawi ,&nbsp;Gad M. Landau","doi":"10.1016/j.tcs.2026.115771","DOIUrl":"10.1016/j.tcs.2026.115771","url":null,"abstract":"<div><div>Given two indeterminate equal-length strings <em>p</em> and <em>t</em> with a set of <em>r</em> characters per position in both strings, we obtain a determinate string <em>p<sub>w</sub></em> from <em>p</em> and a determinate string <em>t<sub>w</sub></em> from <em>t</em> by choosing one character per position. Then, we say that <em>p</em> and <em>t</em> match when <em>p<sub>w</sub></em> and <em>t<sub>w</sub></em> match for some choice of characters. We systematically study the complexity of string matching for indeterminate equal-length strings, for different notions of matching: parameterized matching, order-preserving matching, and Cartesian tree matching. We use <em>n</em> to denote the length of both strings and <em>r</em> the upper bound on the number of characters per position. First, we provide an algorithm for the Cartesian tree version that runs in <span><math><mrow><mi>O</mi><mo>(</mo><mi>n</mi><mi>log</mi><mi>n</mi><mi>log</mi><mi>log</mi><mi>n</mi><mo>)</mo></mrow></math></span> time using <span><math><mrow><mi>O</mi><mo>(</mo><mi>n</mi><mo>)</mo></mrow></math></span> space, for any constant <em>r</em>. Second, we establish NP-hardness of the order-preserving version for <span><math><mrow><mi>r</mi><mo>=</mo><mn>2</mn></mrow></math></span>, thus solving a question explicitly stated by Henriques et al. [CPM 2018], who showed hardness for <span><math><mrow><mi>r</mi><mo>=</mo><mn>3</mn></mrow></math></span>. Third, we establish NP-hardness of the parameterized version for <span><math><mrow><mi>r</mi><mo>=</mo><mn>2</mn></mrow></math></span>. As both parameterized and order-preserving indeterminate matching reduce to the standard determinate matching for <span><math><mrow><mi>r</mi><mo>=</mo><mn>1</mn></mrow></math></span>, this provides a complete classification for these three variants.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1067 ","pages":"Article 115771"},"PeriodicalIF":1.0,"publicationDate":"2026-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146080051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
More on online cardinality constrained bin packing with small cardinality bounds 更多关于小基数边界的在线基数约束装箱
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-22 DOI: 10.1016/j.tcs.2026.115774
János Balogh , József Békési , György Dósa , Leah Epstein , Asaf Levin
We revisit online bin packing with cardinality constraints. In this problem, a set of items of positive sizes not larger than 1 and an integer parameter k ≥ 2 are given. The goal is to partition the items into the minimum number of valid bins, where a valid bin is a set of at most k items whose total size is at most 1. We provide better bounds on the asymptotic competitive ratio for cardinality constrained bin packing for k=3, showcasing current methods for designing algorithms for bin packing problems. We extend the lower bound construction for k=3 for other values of k, improving all known lower bounds on the best possible asymptotic competitive ratio for small k ≥ 3.
我们重新审视带有基数约束的在线装箱。在这个问题中,给定一组正大小不大于1的项目,且参数k ≥ 2为整数。目标是将项目划分到最小数量的有效bin中,其中有效bin是最多k个项目的集合,其总大小最多为1。我们提供了k=3时基数约束装箱的渐近竞争比的更好的界限,展示了目前设计装箱问题算法的方法。对于k的其他值,我们扩展了k=3的下界构造,改进了最小k ≥ 3的最佳可能渐近竞争比的所有已知下界。
{"title":"More on online cardinality constrained bin packing with small cardinality bounds","authors":"János Balogh ,&nbsp;József Békési ,&nbsp;György Dósa ,&nbsp;Leah Epstein ,&nbsp;Asaf Levin","doi":"10.1016/j.tcs.2026.115774","DOIUrl":"10.1016/j.tcs.2026.115774","url":null,"abstract":"<div><div>We revisit online bin packing with cardinality constraints. In this problem, a set of items of positive sizes not larger than 1 and an integer parameter <em>k</em> ≥ 2 are given. The goal is to partition the items into the minimum number of valid bins, where a valid bin is a set of at most <em>k</em> items whose total size is at most 1. We provide better bounds on the asymptotic competitive ratio for cardinality constrained bin packing for <span><math><mrow><mi>k</mi><mo>=</mo><mn>3</mn></mrow></math></span>, showcasing current methods for designing algorithms for bin packing problems. We extend the lower bound construction for <span><math><mrow><mi>k</mi><mo>=</mo><mn>3</mn></mrow></math></span> for other values of <em>k</em>, improving all known lower bounds on the best possible asymptotic competitive ratio for small <em>k</em> ≥ 3.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1068 ","pages":"Article 115774"},"PeriodicalIF":1.0,"publicationDate":"2026-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146081800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Theoretical Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1