首页 > 最新文献

Theoretical Computer Science最新文献

英文 中文
A new similarity in clustering through users' interest and social relationship 通过用户兴趣和社会关系进行聚类的新相似性
IF 0.9 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-09-06 DOI: 10.1016/j.tcs.2024.114833
Jianxiong Guo , Zhehao Zhu , Yucen Gao , Xiaofeng Gao

Clustering is a basic technology in data mining, and similarity measurement plays a crucial role in it. The existing clustering algorithms, especially those for social networks, pay more attention to users' properties while ignoring the global measurement across social relationships. In this paper, a new clustering algorithm is proposed, which not only considers the distance of users' properties but also considers users' social influence. Social influence can be further divided into mutual influence and self influence. With mutual influence, we can deal with users' interests and measure their similarities by introducing areas and activities, thus better weighing the influence between them in an indirect way. Separately, we formulate a new propagation model, PR-Threshold++, by merging the PageRank algorithm and Linear Threshold model, to model the self influence. Based on that, we design a novel similarity by exploiting users' distance, mutual influence, and self influence. Finally, we adjust K-medoids according to our similarity and use real-world datasets to evaluate their performance in intensive simulations.

聚类是数据挖掘的一项基本技术,而相似性测量在其中扮演着至关重要的角色。现有的聚类算法,尤其是针对社交网络的聚类算法,更多关注的是用户属性,而忽略了跨社交关系的全局度量。本文提出了一种新的聚类算法,它不仅考虑了用户属性的距离,还考虑了用户的社会影响力。社会影响力又可分为相互影响力和自身影响力。通过相互影响,我们可以处理用户的兴趣,并通过引入领域和活动来衡量他们的相似性,从而以间接的方式更好地权衡他们之间的影响力。另外,我们通过合并 PageRank 算法和线性阈值模型,建立了一个新的传播模型--PR-Threshold++,以模拟自我影响力。在此基础上,我们利用用户的距离、相互影响和自身影响设计了一种新的相似性。最后,我们根据相似性调整 K-medoids 并使用真实数据集进行密集模拟,以评估其性能。
{"title":"A new similarity in clustering through users' interest and social relationship","authors":"Jianxiong Guo ,&nbsp;Zhehao Zhu ,&nbsp;Yucen Gao ,&nbsp;Xiaofeng Gao","doi":"10.1016/j.tcs.2024.114833","DOIUrl":"10.1016/j.tcs.2024.114833","url":null,"abstract":"<div><p>Clustering is a basic technology in data mining, and similarity measurement plays a crucial role in it. The existing clustering algorithms, especially those for social networks, pay more attention to users' properties while ignoring the global measurement across social relationships. In this paper, a new clustering algorithm is proposed, which not only considers the distance of users' properties but also considers users' social influence. Social influence can be further divided into mutual influence and self influence. With mutual influence, we can deal with users' interests and measure their similarities by introducing areas and activities, thus better weighing the influence between them in an indirect way. Separately, we formulate a new propagation model, PR-Threshold++, by merging the PageRank algorithm and Linear Threshold model, to model the self influence. Based on that, we design a novel similarity by exploiting users' distance, mutual influence, and self influence. Finally, we adjust K-medoids according to our similarity and use real-world datasets to evaluate their performance in intensive simulations.</p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1019 ","pages":"Article 114833"},"PeriodicalIF":0.9,"publicationDate":"2024-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142158432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
High fault-tolerant performance of the divide-and-swap cube network 分插立方体网络的高容错性能
IF 0.9 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-09-06 DOI: 10.1016/j.tcs.2024.114834
Qianru Zhou , Jianxi Fan , Yan Wang , Baolei Cheng , Guijuan Wang

Two crucial metrics used to evaluate the fault tolerance of interconnection networks are connectivity and diagnosability. By improving the connectivity and diagnosability of the interconnection network, its fault tolerance can be enhanced. In this paper, we focus on determining the g-extra connectivity (0g10) of the divide-and-swap cube DSCn, as well as its diagnosability based on the pessimistic diagnosis strategy and g-extra precise diagnosis strategy, under the PMC and MM* models. The research analysis suggests that compared with some other connectivity and diagnosability of DSCn, such as classical connectivity, structure connectivity, super connectivity, and classical diagnosability, the extra connectivity/diagnosability and pessimistic diagnosability of DSCn enable it to have a higher fault tolerance. Moreover, we propose two O(Nlog2N) effective diagnosis algorithms of DSCn: the g-extra diagnosis algorithm (EX-DiagnosisDSCn) and the pessimistic diagnosis algorithm (PE-DiagnosisDSCn), where the EX-DiagnosisDSCn algorithm can accurately diagnose the state of all processors in DSCn.

用于评估互连网络容错性的两个关键指标是连通性和可诊断性。通过提高互连网络的连通性和可诊断性,可以增强其容错能力。本文重点研究在 PMC 和 MM* 模型下,基于悲观诊断策略和 g-extra 精确诊断策略,确定分插立方体 DSCn 的 g-extra 连接性(0≤g≤10)及其可诊断性。研究分析表明,与 DSCn 的其他连接性和可诊断性(如经典连接性、结构连接性、超级连接性和经典可诊断性)相比,DSCn 的额外连接性/可诊断性和悲观可诊断性使其具有更高的容错性。此外,我们还提出了两种 O(Nlog2N) 有效的 DSCn 诊断算法:g-额外诊断算法(EX-DiagnosisDSCn)和悲观诊断算法(PE-DiagnosisDSCn),其中 EX-DiagnosisDSCn 算法可以准确诊断 DSCn 中所有处理器的状态。
{"title":"High fault-tolerant performance of the divide-and-swap cube network","authors":"Qianru Zhou ,&nbsp;Jianxi Fan ,&nbsp;Yan Wang ,&nbsp;Baolei Cheng ,&nbsp;Guijuan Wang","doi":"10.1016/j.tcs.2024.114834","DOIUrl":"10.1016/j.tcs.2024.114834","url":null,"abstract":"<div><p>Two crucial metrics used to evaluate the fault tolerance of interconnection networks are connectivity and diagnosability. By improving the connectivity and diagnosability of the interconnection network, its fault tolerance can be enhanced. In this paper, we focus on determining the <em>g</em>-extra connectivity <span><math><mo>(</mo><mn>0</mn><mo>≤</mo><mi>g</mi><mo>≤</mo><mn>10</mn><mo>)</mo></math></span> of the divide-and-swap cube <span><math><mi>D</mi><mi>S</mi><msub><mrow><mi>C</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span>, as well as its diagnosability based on the pessimistic diagnosis strategy and <em>g</em>-extra precise diagnosis strategy, under the PMC and MM* models. The research analysis suggests that compared with some other connectivity and diagnosability of <span><math><mi>D</mi><mi>S</mi><msub><mrow><mi>C</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span>, such as classical connectivity, structure connectivity, super connectivity, and classical diagnosability, the extra connectivity/diagnosability and pessimistic diagnosability of <span><math><mi>D</mi><mi>S</mi><msub><mrow><mi>C</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span> enable it to have a higher fault tolerance. Moreover, we propose two <span><math><mi>O</mi><mo>(</mo><mi>N</mi><msub><mrow><mi>log</mi></mrow><mrow><mn>2</mn></mrow></msub><mo>⁡</mo><mi>N</mi><mo>)</mo></math></span> effective diagnosis algorithms of <span><math><mi>D</mi><mi>S</mi><msub><mrow><mi>C</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span>: the <em>g</em>-extra diagnosis algorithm (EX-Diagnosis<span><math><msub><mrow></mrow><mrow><mi>D</mi><mi>S</mi><msub><mrow><mi>C</mi></mrow><mrow><mi>n</mi></mrow></msub></mrow></msub></math></span>) and the pessimistic diagnosis algorithm (PE-Diagnosis<span><math><msub><mrow></mrow><mrow><mi>D</mi><mi>S</mi><msub><mrow><mi>C</mi></mrow><mrow><mi>n</mi></mrow></msub></mrow></msub></math></span>), where the EX-Diagnosis<span><math><msub><mrow></mrow><mrow><mi>D</mi><mi>S</mi><msub><mrow><mi>C</mi></mrow><mrow><mi>n</mi></mrow></msub></mrow></msub></math></span> algorithm can accurately diagnose the state of all processors in <span><math><mi>D</mi><mi>S</mi><msub><mrow><mi>C</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span>.</p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1019 ","pages":"Article 114834"},"PeriodicalIF":0.9,"publicationDate":"2024-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142163043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Partial key exposure attacks on Prime Power RSA with non-consecutive blocks 使用非连续块的 Prime Power RSA 部分密钥暴露攻击
IF 0.9 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-09-05 DOI: 10.1016/j.tcs.2024.114845
Ziming Jiang , Yongbin Zhou , Yuejun Liu

Partial key exposure attacks pose a significant threat to RSA-type cryptosystems. These attacks factorize the RSA modulus by utilizing partial knowledge of the decryption exponent, which is typically revealed by side-channel attacks, cold boot attacks, etc. Such partial information is often located in non-consecutive blocks. However, the majority of the proposed attacks on Prime Power RSA have only considered a single unexposed block. Meanwhile, related attacks are incapable of being expanded to multiple unexposed blocks or achieving optimal results.

In this paper, we propose partial key exposure attacks on Prime Power RSA modulus N=prql with n unknown blocks, where n2. We reduce this extended attack to solving multivariate linear modular equations and apply lattice-based approaches, including Herrmann-May's method (ASIACRYPT'08), Takayasu-Kunihiro's method (ACISP'13), and Lu-Zhang-Peng-Lin's method (ASIACRYPT'15), to solve them. Furthermore, we improve Lu et al.'s method by adding helpful polynomials and removing unhelpful polynomials to construct a better lattice basis. We also extend Lu et al.'s method by introducing a new parameter to make the lattice basis construction more flexible. Our improved and extended methods can be used for attacks when l=1 and l1, respectively. These new attacks require less partial information than previous methods. For example, in the case where n=2, we reduce the amount of partial information needed from 80.7% to 77.8% when r=2,l=1, and from 64.0% to 44.9% when r=3,l=2.

部分密钥暴露攻击对 RSA 类密码系统构成重大威胁。这些攻击利用解密指数的部分知识对 RSA 模进行因式分解,而解密指数通常是通过侧信道攻击、冷启动攻击等方式泄露的。这些部分信息通常位于非连续块中。然而,针对 Prime Power RSA 提出的大多数攻击都只考虑了单个未暴露的区块。本文提出了对具有 n 个未知块(其中 n≥2 )的 Prime Power RSA 模 N=prql 的部分密钥暴露攻击。我们将这种扩展攻击简化为解多元线性模块方程,并应用基于网格的方法,包括 Herrmann-May 方法(ASIACRYPT'08)、Takayasu-Kunihiro 方法(ACISP'13)和 Lu-Zhang-Peng-Lin 方法(ASIACRYPT'15)来解决它们。此外,我们还改进了 Lu 等人的方法,增加了有用的多项式,删除了无用的多项式,从而构建了更好的网格基础。我们还对 Lu 等人的方法进行了扩展,引入了一个新参数,使网格基础的构建更加灵活。我们改进和扩展的方法可分别用于 l=1 和 l≥1 时的攻击。与以前的方法相比,这些新的攻击方法所需的局部信息更少。例如,在 n=2 的情况下,当 r=2,l=1 时,我们将所需的局部信息量从 80.7% 减少到 77.8%;当 r=3,l=2 时,我们将所需的局部信息量从 64.0% 减少到 44.9%。
{"title":"Partial key exposure attacks on Prime Power RSA with non-consecutive blocks","authors":"Ziming Jiang ,&nbsp;Yongbin Zhou ,&nbsp;Yuejun Liu","doi":"10.1016/j.tcs.2024.114845","DOIUrl":"10.1016/j.tcs.2024.114845","url":null,"abstract":"<div><p>Partial key exposure attacks pose a significant threat to RSA-type cryptosystems. These attacks factorize the RSA modulus by utilizing partial knowledge of the decryption exponent, which is typically revealed by side-channel attacks, cold boot attacks, etc. Such partial information is often located in non-consecutive blocks. However, the majority of the proposed attacks on Prime Power RSA have only considered a single unexposed block. Meanwhile, related attacks are incapable of being expanded to multiple unexposed blocks or achieving optimal results.</p><p>In this paper, we propose partial key exposure attacks on Prime Power RSA modulus <span><math><mi>N</mi><mo>=</mo><msup><mrow><mi>p</mi></mrow><mrow><mi>r</mi></mrow></msup><msup><mrow><mi>q</mi></mrow><mrow><mi>l</mi></mrow></msup></math></span> with <em>n</em> unknown blocks, where <span><math><mi>n</mi><mo>≥</mo><mn>2</mn></math></span>. We reduce this extended attack to solving multivariate linear modular equations and apply lattice-based approaches, including Herrmann-May's method (ASIACRYPT'08), Takayasu-Kunihiro's method (ACISP'13), and Lu-Zhang-Peng-Lin's method (ASIACRYPT'15), to solve them. Furthermore, we improve Lu et al.'s method by adding helpful polynomials and removing unhelpful polynomials to construct a better lattice basis. We also extend Lu et al.'s method by introducing a new parameter to make the lattice basis construction more flexible. Our improved and extended methods can be used for attacks when <span><math><mi>l</mi><mo>=</mo><mn>1</mn></math></span> and <span><math><mi>l</mi><mo>≥</mo><mn>1</mn></math></span>, respectively. These new attacks require less partial information than previous methods. For example, in the case where <span><math><mi>n</mi><mo>=</mo><mn>2</mn></math></span>, we reduce the amount of partial information needed from 80.7% to 77.8% when <span><math><mi>r</mi><mo>=</mo><mn>2</mn><mo>,</mo><mi>l</mi><mo>=</mo><mn>1</mn></math></span>, and from 64.0% to 44.9% when <span><math><mi>r</mi><mo>=</mo><mn>3</mn><mo>,</mo><mi>l</mi><mo>=</mo><mn>2</mn></math></span>.</p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1019 ","pages":"Article 114845"},"PeriodicalIF":0.9,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142163044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A complexity trichotomy for k-regular asymmetric spin systems with complex edge functions 具有复杂边缘函数的 k-regular 不对称自旋系统的复杂性三分法
IF 0.9 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-09-05 DOI: 10.1016/j.tcs.2024.114835
Peng Yang, Yuan Huang, Zhiguo Fu

We prove a complexity trichotomy theorem for a class of partition functions over k-regular graphs, where the signature is complex valued and not necessarily symmetric. In details, we establish explicit criteria, according to which the partition functions of all such systems are classified into three classes: For every parameter setting in C for the spin system, the partition function is either (1) computable in polynomial time for every graph, or (2) #P-hard for general graphs but computable in polynomial time for planar graphs, or (3) #P-hard even for planar graphs.

我们证明了 k 规则图上一类分区函数的复杂性三分法定理,其中签名是复值且不一定对称。具体来说,我们建立了明确的标准,根据这些标准,所有此类系统的分割函数都可分为三类:对于自旋系统 C 中的每个参数设置,分区函数要么是 (1) 对每个图都可在多项式时间内计算;要么是 (2) 对一般图 #P 难,但对平面图可在多项式时间内计算;要么是 (3) 即使对平面图也 #P 难。
{"title":"A complexity trichotomy for k-regular asymmetric spin systems with complex edge functions","authors":"Peng Yang,&nbsp;Yuan Huang,&nbsp;Zhiguo Fu","doi":"10.1016/j.tcs.2024.114835","DOIUrl":"10.1016/j.tcs.2024.114835","url":null,"abstract":"<div><p>We prove a complexity trichotomy theorem for a class of partition functions over <em>k</em>-regular graphs, where the signature is complex valued and not necessarily <em>symmetric</em>. In details, we establish explicit criteria, according to which the partition functions of all such systems are classified into three classes: For every parameter setting in <span><math><mi>C</mi></math></span> for the spin system, the partition function is either (1) computable in polynomial time for every graph, or (2) #P-hard for general graphs but computable in polynomial time for planar graphs, or (3) #P-hard even for planar graphs.</p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1020 ","pages":"Article 114835"},"PeriodicalIF":0.9,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142172866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Observation routes and external watchman routes 观察路线和外部看守路线
IF 0.9 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-09-04 DOI: 10.1016/j.tcs.2024.114818
Adrian Dumitrescu , Csaba D. Tóth

We introduce the Observation Route Problem (ORP) defined as follows: Given a set of n pairwise disjoint obstacles (regions) in the plane, find a shortest tour (route) such that an observer walking along this tour can see (observe) each obstacle from some point of the tour. The observer does not need to see the entire boundary of an obstacle. The tour is not allowed to intersect the interior of any region (i.e., the regions are obstacles and therefore out of bounds). The problem exhibits similarity to both the Traveling Salesman Problem with Neighborhoods (TSPN) and the External Watchman Route Problem (EWRP). We distinguish two variants: the range of visibility is either limited to a bounding rectangle, or unlimited. We obtain the following results:

(I) Given a family of n disjoint convex bodies in the plane, computing a shortest observation route does not admit a (clogn)-approximation unless P=NP for an absolute constant c>0. (This holds for both limited and unlimited vision.)

(II) Given a family of disjoint convex bodies in the plane, computing a shortest external watchman route is NP-hard. (This holds for both limited and unlimited vision; and even for families of axis-aligned squares.)

(III) Given a family of n disjoint fat convex polygons in the plane, an observation tour whose length is at most O(logn) times the optimal can be computed in polynomial time. (This holds for limited vision.)

(IV) For every n5, there exists a convex polygon with n sides and all angles obtuse such that its perimeter is not a shortest external watchman route. This refutes a conjecture by Absar and Whitesides (2006).

我们引入了定义如下的观察路线问题(ORP):给定平面上一组 n 对互不相交的障碍物(区域),找出一条最短的路径(路线),使得沿着这条路径行走的观察者可以从路径上的某一点看到(观察到)每个障碍物。观察者不需要看到障碍物的整个边界。巡回路线不允许与任何区域的内部相交(即这些区域都是障碍物,因此不在边界内)。该问题与邻域旅行推销员问题(TSPN)和外部守望者路线问题(ERP)相似。我们将其分为两种变体:可见度范围限制在边界矩形内,或者不受限制。我们得到以下结果:(I) 给定平面上 n 个不相交凸体的族,除非 P=NP 为绝对常量 c>0,否则计算最短观察路线不接受 (clogn)-approximation 。(这对有限视力和无限视力都成立。)(II) 给定平面中的不相交凸体族,计算一条最短的外部观察路线是 NP 难的。 (这对有限视力和无限视力都成立;甚至对轴对齐的正方形族也成立。)(III) 给定平面中的 n 个不相交肥凸多边形族,可以在多项式时间内计算出一条长度最多为最优的 O(logn) 倍的观察路线。(IV)对于每 n≥5,存在一个有 n 边且所有角均为钝角的凸多边形,使得它的周长不是一条最短的外部观察路线。这反驳了 Absar 和 Whitesides(2006 年)的猜想。
{"title":"Observation routes and external watchman routes","authors":"Adrian Dumitrescu ,&nbsp;Csaba D. Tóth","doi":"10.1016/j.tcs.2024.114818","DOIUrl":"10.1016/j.tcs.2024.114818","url":null,"abstract":"<div><p>We introduce the Observation Route Problem (<span>ORP</span>) defined as follows: Given a set of <em>n</em> pairwise disjoint obstacles (regions) in the plane, find a shortest tour (route) such that an observer walking along this tour can see (observe) each obstacle from some point of the tour. The observer does <em>not</em> need to see the entire boundary of an obstacle. The tour is <em>not</em> allowed to intersect the interior of any region (i.e., the regions are obstacles and therefore out of bounds). The problem exhibits similarity to both the Traveling Salesman Problem with Neighborhoods (<span>TSPN</span>) and the External Watchman Route Problem (<span>EWRP</span>). We distinguish two variants: the range of visibility is either limited to a bounding rectangle, or unlimited. We obtain the following results:</p><p>(I) Given a family of <em>n</em> disjoint convex bodies in the plane, computing a shortest observation route does not admit a <span><math><mo>(</mo><mi>c</mi><mi>log</mi><mo>⁡</mo><mi>n</mi><mo>)</mo></math></span>-approximation unless <span><math><mi>P</mi><mo>=</mo><mrow><mi>NP</mi></mrow></math></span> for an absolute constant <span><math><mi>c</mi><mo>&gt;</mo><mn>0</mn></math></span>. (This holds for both limited and unlimited vision.)</p><p>(II) Given a family of disjoint convex bodies in the plane, computing a shortest external watchman route is <span><math><mi>NP</mi></math></span>-hard. (This holds for both limited and unlimited vision; and even for families of axis-aligned squares.)</p><p>(III) Given a family of <em>n</em> disjoint fat convex polygons in the plane, an observation tour whose length is at most <span><math><mi>O</mi><mo>(</mo><mi>log</mi><mo>⁡</mo><mi>n</mi><mo>)</mo></math></span> times the optimal can be computed in polynomial time. (This holds for limited vision.)</p><p>(IV) For every <span><math><mi>n</mi><mo>≥</mo><mn>5</mn></math></span>, there exists a convex polygon with <em>n</em> sides and all angles obtuse such that its perimeter is <em>not</em> a shortest external watchman route. This refutes a conjecture by Absar and Whitesides (2006).</p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1019 ","pages":"Article 114818"},"PeriodicalIF":0.9,"publicationDate":"2024-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0304397524004353/pdfft?md5=8156a2411321e5e2d23ab419a17b5976&pid=1-s2.0-S0304397524004353-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142163027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An algorithmic construction of union-intersection-bounded families 联集-交集-有界族的算法构造
IF 0.9 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-09-03 DOI: 10.1016/j.tcs.2024.114817
Marcel Fernández , John Livieratos , Sebastià Martín

In this paper, we present lower bounds and algorithmic constructions of union-intersection-bounded families of sets. The lower bound is established using the Lovász Local Lemma. This bound matches the best known bound for the size of union-intersection-bounded families of sets. We then use the variable framework for the Lovász Local Lemma, to discuss an algorithm that outputs explicit constructions that attain the lower bound. The algorithm has polynomial complexity in the number of points in the family.

在本文中,我们提出了联合-交集有界集合族的下界和算法构造。下界是利用洛瓦兹局部定理(Lovász Local Lemma)建立的。这个下界与已知的联合交集有界集合族大小的最佳下界相吻合。然后,我们使用 Lovász 局部定理的变量框架,讨论一种算法,它能输出达到下界的明确构造。该算法的复杂度为族中点数的多项式。
{"title":"An algorithmic construction of union-intersection-bounded families","authors":"Marcel Fernández ,&nbsp;John Livieratos ,&nbsp;Sebastià Martín","doi":"10.1016/j.tcs.2024.114817","DOIUrl":"10.1016/j.tcs.2024.114817","url":null,"abstract":"<div><p>In this paper, we present lower bounds and algorithmic constructions of union-intersection-bounded families of sets. The lower bound is established using the Lovász Local Lemma. This bound matches the best known bound for the size of union-intersection-bounded families of sets. We then use the variable framework for the Lovász Local Lemma, to discuss an algorithm that outputs explicit constructions that attain the lower bound. The algorithm has polynomial complexity in the number of points in the family.</p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1018 ","pages":"Article 114817"},"PeriodicalIF":0.9,"publicationDate":"2024-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142136033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A fixed-parameter algorithm for dominance drawings of DAGs DAG 优势图的固定参数算法
IF 0.9 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-09-03 DOI: 10.1016/j.tcs.2024.114819
Giacomo Ortali , Ioannis G. Tollis

A weak dominance drawing Γ of a DAG G=(V,E) is a d-dimensional drawing such that D(u)<D(v) for every dimension D of Γ if there is a directed path from a vertex u to a vertex v in G, where D(w) is the coordinate of vertex wV in dimension D of Γ. If D(u)<D(v) for every dimension D of Γ, but there is no path from u to v, we have a falsely implied path (fip). Minimizing the number of fips is an important theoretical and practical problem. Computing 2-dimensional weak dominance drawings with minimum number of fips is NP-hard. We show that this problem is FPT parameterized by the dimension d and the modular width mw. A key ingredient of our proof is the Compaction Lemma, where we show an interesting property of any weak dominance drawing of G with the minimum number of fips. This FPT result in weak dominance, which is interesting by itself because the fip-minimization problem is NP-hard, is used to prove our main contributions. Computing the dominance dimension of G, that is, the minimum number of dimensions d for which G has a d-dimensional dominance drawing (a weak dominance drawing with 0 fips), is a well-known NP-hard problem. We show that the dominance dimension of G is bounded by mw2 (or mw, if mw<4) and that computing the dominance dimension of G is an FPT problem with parameter mw. As far as we know, this the first FPT-algorithm to compute the dominance dimension of a DAG.

DAG G=(V,E) 的弱支配图 Γ 是一个 d 维图,如果在 G 中存在从顶点 u 到顶点 v 的有向路径,那么在 Γ 的每一个 D 维中,D(u)<D(v)都是有向路径,其中 D(w) 是顶点 w∈V 在 Γ 的 D 维中的坐标。如果在 Γ 的每个维度 D 中,D(u)<D(v),但并不存在从 u 到 v 的路径,那么我们就有一条虚假隐含路径(fip)。尽量减少虚假路径的数量是一个重要的理论和实际问题。计算二维弱支配图的 fips 数量最小是 NP-hard。我们证明,这个问题是由维度 d 和模宽 mw 参数化的 FPT 问题。我们证明的一个关键要素是 "压缩"(Compaction Lemma),在这里我们展示了一个有趣的特性,即任何弱支配图都能以最少的点数绘制 G。弱支配性的这一 FPT 结果本身就很有趣,因为 fip 最小化问题是 NP-hard,它被用来证明我们的主要贡献。计算 G 的支配维度,即 G 具有 d 维支配图(fips 为 0 的弱支配图)的最小维数 d,是一个众所周知的 NP 难问题。我们证明了 G 的优势维数以 mw2(或 mw,如果 mw<4 则为 mw)为界,并且计算 G 的优势维数是一个参数为 mw 的 FPT 问题。据我们所知,这是第一个计算 DAG 优势维度的 FPT 算法。
{"title":"A fixed-parameter algorithm for dominance drawings of DAGs","authors":"Giacomo Ortali ,&nbsp;Ioannis G. Tollis","doi":"10.1016/j.tcs.2024.114819","DOIUrl":"10.1016/j.tcs.2024.114819","url":null,"abstract":"<div><p>A weak dominance drawing Γ of a DAG <span><math><mi>G</mi><mo>=</mo><mo>(</mo><mi>V</mi><mo>,</mo><mi>E</mi><mo>)</mo></math></span> is a <em>d</em>-dimensional drawing such that <span><math><mi>D</mi><mo>(</mo><mi>u</mi><mo>)</mo><mo>&lt;</mo><mi>D</mi><mo>(</mo><mi>v</mi><mo>)</mo></math></span> for every dimension <em>D</em> of Γ if there is a directed path from a vertex <em>u</em> to a vertex <em>v</em> in <em>G</em>, where <span><math><mi>D</mi><mo>(</mo><mi>w</mi><mo>)</mo></math></span> is the coordinate of vertex <span><math><mi>w</mi><mo>∈</mo><mi>V</mi></math></span> in dimension <em>D</em> of Γ. If <span><math><mi>D</mi><mo>(</mo><mi>u</mi><mo>)</mo><mo>&lt;</mo><mi>D</mi><mo>(</mo><mi>v</mi><mo>)</mo></math></span> for every dimension <em>D</em> of Γ, but there is no path from <em>u</em> to <em>v</em>, we have a <em>falsely implied path (fip)</em>. Minimizing the number of fips is an important theoretical and practical problem. Computing 2-dimensional weak dominance drawings with minimum number of fips is NP-hard. We show that this problem is FPT parameterized by the dimension <em>d</em> and the modular width <em>mw</em>. A key ingredient of our proof is the <span>Compaction Lemma</span>, where we show an interesting property of any weak dominance drawing of <em>G</em> with the minimum number of fips. This FPT result in weak dominance, which is interesting by itself because the fip-minimization problem is NP-hard, is used to prove our main contributions. Computing the dominance dimension of <em>G</em>, that is, the minimum number of dimensions <em>d</em> for which <em>G</em> has a <em>d</em>-dimensional dominance drawing (a weak dominance drawing with 0 fips), is a well-known NP-hard problem. We show that the dominance dimension of <em>G</em> is bounded by <span><math><mfrac><mrow><mi>m</mi><mi>w</mi></mrow><mrow><mn>2</mn></mrow></mfrac></math></span> (or <em>mw</em>, if <span><math><mi>m</mi><mi>w</mi><mo>&lt;</mo><mn>4</mn></math></span>) and that computing the dominance dimension of <em>G</em> is an FPT problem with parameter <em>mw</em>. As far as we know, this the first FPT-algorithm to compute the dominance dimension of a DAG.</p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1020 ","pages":"Article 114819"},"PeriodicalIF":0.9,"publicationDate":"2024-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142168385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sink location problems in dynamic flow grid networks 动态流网格网络中的下沉点定位问题
IF 0.9 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-09-03 DOI: 10.1016/j.tcs.2024.114812
Yuya Higashikawa, Ayano Nishii, Junichi Teruyama, Yuki Tokuni

A dynamic flow network consists of a directed graph, where nodes called sources represent locations of evacuees, and nodes called sinks represent locations of evacuation facilities. Each source and each sink are given supply representing the number of evacuees and demand representing the maximum number of acceptable evacuees, respectively. Each edge is given capacity and transit time. Here, the capacity of an edge bounds the rate at which evacuees can enter the edge per unit time, and the transit time represents the time which evacuees take to travel across the edge. The evacuation completion time is the minimum time at which each evacuee can arrive at one of the evacuation facilities. Given a dynamic flow network without sinks, once sinks are located on some nodes or edges, the evacuation completion time for this sink location is determined. We then consider the problem of locating sinks to minimize the evacuation completion time, called the sink location problem. The problems have been given polynomial-time algorithms only for limited networks such as paths [1], [2], [3], cycles [1], and trees [4], [5], [6], but no polynomial-time algorithms are known for more complex network classes. In this paper, we prove that the 1-sink location problem can be solved in polynomial-time when an input network is a grid with uniform edge capacity and transit time.

动态人流网络由一个有向图组成,其中称为 "源 "的节点代表疏散人员的位置,称为 "汇 "的节点代表疏散设施的位置。每个源和每个汇分别有代表疏散人数的供应量和代表可接受疏散人数上限的需求量。每条边都有容量和传输时间。在这里,边缘的容量是指疏散人员在单位时间内进入边缘的速度,而过境时间是指疏散人员穿越边缘所需的时间。疏散完成时间是每个疏散人员到达其中一个疏散设施的最短时间。给定一个没有汇集点的动态流网络,一旦在某些节点或边缘找到汇集点,就能确定该汇集点的疏散完成时间。我们接下来要考虑的问题是,如何确定水槽的位置,使疏散完成时间最小化,这就是水槽位置问题。对于有限的网络,如路径 [1]、[2]、[3]、循环 [1] 和树 [4]、[5]、[6],这些问题只给出了多项式时间算法,但对于更复杂的网络类别,还没有已知的多项式时间算法。在本文中,我们证明了当输入网络是具有均匀边容量和传输时间的网格时,1-汇定位问题可以在多项式时间内求解。
{"title":"Sink location problems in dynamic flow grid networks","authors":"Yuya Higashikawa,&nbsp;Ayano Nishii,&nbsp;Junichi Teruyama,&nbsp;Yuki Tokuni","doi":"10.1016/j.tcs.2024.114812","DOIUrl":"10.1016/j.tcs.2024.114812","url":null,"abstract":"<div><p>A <em>dynamic flow network</em> consists of a directed graph, where nodes called <em>sources</em> represent locations of evacuees, and nodes called <em>sinks</em> represent locations of evacuation facilities. Each source and each sink are given <em>supply</em> representing the number of evacuees and <em>demand</em> representing the maximum number of acceptable evacuees, respectively. Each edge is given <em>capacity</em> and <em>transit time</em>. Here, the capacity of an edge bounds the rate at which evacuees can enter the edge per unit time, and the transit time represents the time which evacuees take to travel across the edge. The <em>evacuation completion time</em> is the minimum time at which each evacuee can arrive at one of the evacuation facilities. Given a dynamic flow network without sinks, once sinks are located on some nodes or edges, the evacuation completion time for this sink location is determined. We then consider the problem of locating sinks to minimize the evacuation completion time, called the <em>sink location problem</em>. The problems have been given polynomial-time algorithms only for limited networks such as paths <span><span>[1]</span></span>, <span><span>[2]</span></span>, <span><span>[3]</span></span>, cycles <span><span>[1]</span></span>, and trees <span><span>[4]</span></span>, <span><span>[5]</span></span>, <span><span>[6]</span></span>, but no polynomial-time algorithms are known for more complex network classes. In this paper, we prove that the 1-sink location problem can be solved in polynomial-time when an input network is a grid with uniform edge capacity and transit time.</p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1019 ","pages":"Article 114812"},"PeriodicalIF":0.9,"publicationDate":"2024-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142163026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Maximum Zero-Sum Partition problem 最大零和分割问题
IF 0.9 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-08-30 DOI: 10.1016/j.tcs.2024.114811
Guillaume Fertin , Oscar Fontaine , Géraldine Jean , Stéphane Vialette

We study the Maximum Zero-Sum Partition problem (or MZSP), defined as follows: given a multiset S={a1,a2,,an} of integers aiZ (where Z denotes the set of non-zero integers) such that i=1nai=0, find a maximum cardinality partition {S1,S2,,Sk} of S such that, for every 1ik, ajSiaj=0. Solving MZSP is useful in genomics for computing evolutionary distances between pairs of species. Our contributions are a series of algorithmic results concerning MZSP, in terms of complexity, (in)approximability, with a particular focus on the fixed-parameter tractability of MZSP with respect to either (i) the size k of the solution, (ii) the number of negative (resp. positive) values in S and (iii) the largest integer in S.

我们研究的最大零和分割问题(或 MZSP)定义如下:给定一个由整数 ai∈Z⁎ 组成的多集合 S={a1,a2,...,an}(其中 Z⁎ 表示非零整数集合),使得∑i=1nai=0,找出 S 的最大卡方分割 {S1,S2,...,Sk},使得对于每 1≤i≤k,∑aj∈Siaj=0。求解 MZSP 对基因组学中计算物种对之间的进化距离非常有用。我们的贡献是一系列有关 MZSP 的算法结果,包括复杂性、(不)近似性,特别是 MZSP 在以下方面的固定参数可操作性:(i) 解的大小 k;(ii) S 中负值(或正值)的数量;(iii) S 中最大的整数。
{"title":"The Maximum Zero-Sum Partition problem","authors":"Guillaume Fertin ,&nbsp;Oscar Fontaine ,&nbsp;Géraldine Jean ,&nbsp;Stéphane Vialette","doi":"10.1016/j.tcs.2024.114811","DOIUrl":"10.1016/j.tcs.2024.114811","url":null,"abstract":"<div><p>We study the <span>Maximum Zero-Sum Partition</span> problem (or <span>MZSP</span>), defined as follows: given a multiset <span><math><mi>S</mi><mo>=</mo><mo>{</mo><msub><mrow><mi>a</mi></mrow><mrow><mn>1</mn></mrow></msub><mo>,</mo><msub><mrow><mi>a</mi></mrow><mrow><mn>2</mn></mrow></msub><mo>,</mo><mo>…</mo><mo>,</mo><msub><mrow><mi>a</mi></mrow><mrow><mi>n</mi></mrow></msub><mo>}</mo></math></span> of integers <span><math><msub><mrow><mi>a</mi></mrow><mrow><mi>i</mi></mrow></msub><mo>∈</mo><msup><mrow><mi>Z</mi></mrow><mrow><mo>⁎</mo></mrow></msup></math></span> (where <span><math><msup><mrow><mi>Z</mi></mrow><mrow><mo>⁎</mo></mrow></msup></math></span> denotes the set of non-zero integers) such that <span><math><msubsup><mrow><mo>∑</mo></mrow><mrow><mi>i</mi><mo>=</mo><mn>1</mn></mrow><mrow><mi>n</mi></mrow></msubsup><msub><mrow><mi>a</mi></mrow><mrow><mi>i</mi></mrow></msub><mo>=</mo><mn>0</mn></math></span>, find a maximum cardinality partition <span><math><mo>{</mo><msub><mrow><mi>S</mi></mrow><mrow><mn>1</mn></mrow></msub><mo>,</mo><msub><mrow><mi>S</mi></mrow><mrow><mn>2</mn></mrow></msub><mo>,</mo><mo>…</mo><mo>,</mo><msub><mrow><mi>S</mi></mrow><mrow><mi>k</mi></mrow></msub><mo>}</mo></math></span> of <span><math><mi>S</mi></math></span> such that, for every <span><math><mn>1</mn><mo>≤</mo><mi>i</mi><mo>≤</mo><mi>k</mi></math></span>, <span><math><msub><mrow><mo>∑</mo></mrow><mrow><msub><mrow><mi>a</mi></mrow><mrow><mi>j</mi></mrow></msub><mo>∈</mo><msub><mrow><mi>S</mi></mrow><mrow><mi>i</mi></mrow></msub></mrow></msub><msub><mrow><mi>a</mi></mrow><mrow><mi>j</mi></mrow></msub><mo>=</mo><mn>0</mn></math></span>. Solving <span>MZSP</span> is useful in genomics for computing evolutionary distances between pairs of species. Our contributions are a series of algorithmic results concerning <span>MZSP</span>, in terms of complexity, (in)approximability, with a particular focus on the fixed-parameter tractability of <span>MZSP</span> with respect to either (i) the size <em>k</em> of the solution, (ii) the number of negative (resp. positive) values in <span><math><mi>S</mi></math></span> and (iii) the largest integer in <span><math><mi>S</mi></math></span>.</p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1019 ","pages":"Article 114811"},"PeriodicalIF":0.9,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0304397524004286/pdfft?md5=834de52b293d98cccaa7d3d01b33ccb6&pid=1-s2.0-S0304397524004286-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142158429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The cyclic diagnosability of balanced hypercubes under the PMC and MM⁎ model PMC和MM⁎模型下平衡超立方体的可循环诊断性
IF 0.9 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-08-30 DOI: 10.1016/j.tcs.2024.114816
Yulin Han , Yalan Li , Chengfu Ye

In 2023, Zhang et al. proposed a novel diagnostic parameter, namely the cyclic diagnosability and explored the cyclic diagnosability of Qn. In this paper, the cyclic diagnosability of BHn is determined under the PMC model and the MM model.

2023 年,Zhang 等人提出了一种新的诊断参数,即循环可诊断性,并探讨了 Qn 的循环可诊断性。本文在 PMC 模型和 MM⁎ 模型下确定了 BHn 的可循环诊断性。
{"title":"The cyclic diagnosability of balanced hypercubes under the PMC and MM⁎ model","authors":"Yulin Han ,&nbsp;Yalan Li ,&nbsp;Chengfu Ye","doi":"10.1016/j.tcs.2024.114816","DOIUrl":"10.1016/j.tcs.2024.114816","url":null,"abstract":"<div><p>In 2023, Zhang et al. proposed a novel diagnostic parameter, namely the cyclic diagnosability and explored the cyclic diagnosability of <span><math><msub><mrow><mi>Q</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span>. In this paper, the cyclic diagnosability of <span><math><mi>B</mi><msub><mrow><mi>H</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span> is determined under the <em>PMC</em> model and the <span><math><mi>M</mi><msup><mrow><mi>M</mi></mrow><mrow><mo>⁎</mo></mrow></msup></math></span> model.</p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1018 ","pages":"Article 114816"},"PeriodicalIF":0.9,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142136056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Theoretical Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1