首页 > 最新文献

Theoretical Computer Science最新文献

英文 中文
Largest similar copies of convex polygons in polygonal domains 多边形域中凸多边形的最大相似副本
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-07 DOI: 10.1016/j.tcs.2025.115685
Taekang Eom , Seungjun Lee , Hee-Kap Ahn
Given a convex polygon with k vertices and a polygonal domain consisting of polygonal obstacles with n vertices in total in the plane, we study the optimization problem of finding a largest similar copy of the polygon that can be placed in the polygonal domain without intersecting the obstacles. We present an upper bound O(k2n2λ4(k)) on the number of combinatorial changes occurring to the underlying structure during the rotation of the polygon, together with an O(k2n2λ4(k)log n)-time deterministic algorithm for the problem, where λs(n) is the length of the longest Davenport–Schinzel sequence of order s including n distinct symbols. This improves upon the previously best known results by Chew and Kedem [SoCG89, CGTA93] and Sharir and Toledo [SoCG91, CGTA94] on the problem in more than 27 years. Our result also improves the time complexity of the high-clearance motion planning algorithm by Chew and Kedem.
给定一个有k个顶点的凸多边形和一个平面上有n个顶点的多边形障碍物组成的多边形域,我们研究了在多边形域中寻找一个最大的相似多边形副本的优化问题,该副本可以放置在多边形域中而不与障碍物相交。我们给出了在多边形旋转过程中底层结构发生组合变化的次数的上界O(k2n2λ4(k)),以及该问题的O(k2n2λ4(k)log n)时间确定性算法,其中λs(n)是包含n个不同符号的s阶最长Davenport-Schinzel序列的长度。这比之前由Chew和Kedem [SoCG89, CGTA93]以及Sharir和Toledo [SoCG91, CGTA94]在27年多的时间里对这个问题所做的最著名的研究结果有所改进。我们的结果也提高了Chew和Kedem的高间隙运动规划算法的时间复杂度。
{"title":"Largest similar copies of convex polygons in polygonal domains","authors":"Taekang Eom ,&nbsp;Seungjun Lee ,&nbsp;Hee-Kap Ahn","doi":"10.1016/j.tcs.2025.115685","DOIUrl":"10.1016/j.tcs.2025.115685","url":null,"abstract":"<div><div>Given a convex polygon with <em>k</em> vertices and a polygonal domain consisting of polygonal obstacles with <em>n</em> vertices in total in the plane, we study the optimization problem of finding a largest similar copy of the polygon that can be placed in the polygonal domain without intersecting the obstacles. We present an upper bound <em>O</em>(<em>k</em><sup>2</sup><em>n</em><sup>2</sup><em>λ</em><sub>4</sub>(<em>k</em>)) on the number of combinatorial changes occurring to the underlying structure during the rotation of the polygon, together with an <em>O</em>(<em>k</em><sup>2</sup><em>n</em><sup>2</sup><em>λ</em><sub>4</sub>(<em>k</em>)log <em>n</em>)-time deterministic algorithm for the problem, where <em>λ<sub>s</sub></em>(<em>n</em>) is the length of the longest Davenport–Schinzel sequence of order <em>s</em> including <em>n</em> distinct symbols. This improves upon the previously best known results by Chew and Kedem [SoCG89, CGTA93] and Sharir and Toledo [SoCG91, CGTA94] on the problem in more than 27 years. Our result also improves the time complexity of the high-clearance motion planning algorithm by Chew and Kedem.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1063 ","pages":"Article 115685"},"PeriodicalIF":1.0,"publicationDate":"2025-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145746973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of key reuse security for Aigis.KEM aegis密钥重用安全性分析。克姆
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-06 DOI: 10.1016/j.tcs.2025.115680
Ke Wang , Haodong Jiang , Zhenfeng Zhang , Long Chen , Huiqin Xie
Key reuse security is an important security property considered in the NIST post-quantum cryptography algorithm standardization. At PKC’20, Zhang et al. proposed Aigis.KEM, a key encapsulation mechanism based on asymmetric MLWE. Aigis.KEM provides flexible parameter selection, has high comprehensive performance, and won the first prize of the China’s National cryptographic algorithm competition. However, its key reuse security is currently unclear. This paper studies the key reuse security of Aigis.KEM. Aigis.KEM is derived from public key encryption Aigis.PKE, so we will first assess its key reuse resilience using key recovery under plaintext-checking attack (KR-PCA). Then, we optimize the attack and proposes a two-positional KR-PCA attack to further approach the lower bound of attack complexity. We also verify these attacks through experiments, and discuss the further optimization and improvement. Finally, based on the KR-PCA attacks on Aigis.PKE, we further propose practical attacks on Aigis.KEM by utilizing side-channel attacks or fault-injection attacks. In response to these attacks, we explored possible countermeasures. The work helps to clarify the potential risks of Aigis.KEM and guide its application in practice.
密钥重用安全性是NIST后量子加密算法标准化中考虑的一个重要安全特性。在PKC ' 20上,Zhang等人提出了aegis。基于非对称MLWE的密钥封装机制KEM。Aigis。KEM提供灵活的参数选择,综合性能高,曾获得中国国家密码算法竞赛一等奖。然而,它的密钥重用安全性目前还不清楚。本文研究了aegis . kem的密钥重用安全性。Aigis。KEM是由公钥加密技术派生而来。因此,我们将首先使用明文检查攻击(KR-PCA)下的密钥恢复来评估其密钥重用弹性。然后,我们对攻击进行了优化,提出了一种双位置的KR-PCA攻击,进一步逼近攻击复杂度的下界。我们还通过实验验证了这些攻击,并讨论了进一步的优化和改进。最后,基于KR-PCA对isis进行攻击。PKE,我们进一步建议对isis实施实际攻击。利用侧信道攻击或故障注入攻击进行KEM攻击。为了应对这些攻击,我们探索了可能的对策。这项工作有助于澄清isis的潜在风险。并指导其在实践中的应用。
{"title":"Analysis of key reuse security for Aigis.KEM","authors":"Ke Wang ,&nbsp;Haodong Jiang ,&nbsp;Zhenfeng Zhang ,&nbsp;Long Chen ,&nbsp;Huiqin Xie","doi":"10.1016/j.tcs.2025.115680","DOIUrl":"10.1016/j.tcs.2025.115680","url":null,"abstract":"<div><div>Key reuse security is an important security property considered in the NIST post-quantum cryptography algorithm standardization. At PKC’20, Zhang et al. proposed Aigis.KEM, a key encapsulation mechanism based on asymmetric MLWE. Aigis.KEM provides flexible parameter selection, has high comprehensive performance, and won the first prize of the China’s National cryptographic algorithm competition. However, its key reuse security is currently unclear. This paper studies the key reuse security of Aigis.KEM. Aigis.KEM is derived from public key encryption Aigis.PKE, so we will first assess its key reuse resilience using key recovery under plaintext-checking attack (KR-PCA). Then, we optimize the attack and proposes a two-positional KR-PCA attack to further approach the lower bound of attack complexity. We also verify these attacks through experiments, and discuss the further optimization and improvement. Finally, based on the KR-PCA attacks on Aigis.PKE, we further propose practical attacks on Aigis.KEM by utilizing side-channel attacks or fault-injection attacks. In response to these attacks, we explored possible countermeasures. The work helps to clarify the potential risks of Aigis.KEM and guide its application in practice.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1063 ","pages":"Article 115680"},"PeriodicalIF":1.0,"publicationDate":"2025-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145746975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anonymous registered attribute-based signature for circuits 匿名注册的基于属性的电路签名
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-04 DOI: 10.1016/j.tcs.2025.115681
Liuyu Yang , Xinxuan Zhang , Yi Deng , Zhuo Wu , Xudong Zhu
Registered attribute-based signature (registered ABS), introduced by Zhang et al. (PKC’24), eliminates the key escrow problem associated with classical attribute-based signature (ABS). It allows users to generate public/sectret key pairs themselves and register the related public key and attribute with a key curator. Different from a trusted attribute authority, the key curator is fully transparent and retains no secrets. In this paper, we propose the first generic framework for anonymous registered ABS that supports circuits as policies. We achieve this goal through an approach we call “accumulate-then-sign-then-prove”, which leverages commonly used cryptographic primitives including digital signature, accumulator, and non-interactive zero-knowledge schemes (NIZKs). We further enrich the functionality by adding user removal, making our scheme dynamic. Our generic framework can be instantiated from various combinations of inner and outer layer protocols based on different assumptions. We provide recommendations from three different perspectives for the choice of concrete cryptographic schemes. Compared with current work on registered ABS, our framework: i) provides diversity regarding the assumptions to instantiate cryptographic primitives; ii) has advantages in proof size and verification time.
由Zhang等人(PKC ' 24)提出的注册属性签名(Registered ABS),消除了与经典属性签名(ABS)相关的密钥托管问题。它允许用户自己生成公共/秘密密钥对,并向密钥管理员注册相关的公共密钥和属性。与可信属性权威不同,密钥管理器是完全透明的,不保留任何秘密。本文提出了第一个支持电路作为策略的匿名注册ABS通用框架。我们通过一种称为“积累-然后签名-然后证明”的方法来实现这一目标,该方法利用了常用的加密原语,包括数字签名、累加器和非交互式零知识方案(nizk)。我们通过添加用户删除来进一步丰富功能,使我们的方案动态化。我们的通用框架可以根据不同的假设从内部和外层协议的各种组合实例化。我们从三个不同的角度为具体密码方案的选择提供了建议。与目前在注册ABS上的工作相比,我们的框架:i)提供了关于实例化加密原语的假设的多样性;Ii)在证明大小和验证时间上具有优势。
{"title":"Anonymous registered attribute-based signature for circuits","authors":"Liuyu Yang ,&nbsp;Xinxuan Zhang ,&nbsp;Yi Deng ,&nbsp;Zhuo Wu ,&nbsp;Xudong Zhu","doi":"10.1016/j.tcs.2025.115681","DOIUrl":"10.1016/j.tcs.2025.115681","url":null,"abstract":"<div><div>Registered attribute-based signature (registered ABS), introduced by Zhang et al. (PKC’24), eliminates the key escrow problem associated with classical attribute-based signature (ABS). It allows users to generate public/sectret key pairs themselves and register the related public key and attribute with a key curator. Different from a trusted attribute authority, the key curator is fully transparent and retains no secrets. In this paper, we propose the first generic framework for anonymous registered ABS that supports circuits as policies. We achieve this goal through an approach we call “accumulate-then-sign-then-prove”, which leverages commonly used cryptographic primitives including digital signature, accumulator, and non-interactive zero-knowledge schemes (NIZKs). We further enrich the functionality by adding user removal, making our scheme dynamic. Our generic framework can be instantiated from various combinations of inner and outer layer protocols based on different assumptions. We provide recommendations from three different perspectives for the choice of concrete cryptographic schemes. Compared with current work on registered ABS, our framework: i) provides diversity regarding the assumptions to instantiate cryptographic primitives; ii) has advantages in proof size and verification time.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1063 ","pages":"Article 115681"},"PeriodicalIF":1.0,"publicationDate":"2025-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145746974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image reflection on process graphs of 1-free regular expressions modulo bisimilarity 1-free正则表达式模双相似过程图的图像反射
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-03 DOI: 10.1016/j.tcs.2025.115678
Yuanrui Zhang , Xinxin Liu
We study a phenomenon called “image reflection” on a type of characterization graphs — LLEE charts — for 1-free regular expressions modulo bisimularity. This property, stating that the images of a bisimulation function from an LLEE chart actually impose a special LEE structure corresponding to the LLEE chart, is recognized by our proposed “well-structured looping-back charts” as a sub-LLEE-structure of LLEE charts. As an application, our study naturally leads to a novel proof for the completeness of the inference system BBP for 1-free regular expressions, due to the correspondence between 1-free regular expressions and the provable solutions of LEE/LLEE charts. Compared to the previous approach, our proof is more direct in the sense that it does not rely on a graph transformation procedure on LLEE charts in which at each step two bisimilar nodes have to be carefully selected and merged together according to selection rules. Our observation on LLEE charts is useful to understand the completeness problems of regular expressions modulo bisimilarity from a new angle, and can be also helpful for solving the completeness problems of other expressions that share similar graph structures.
我们研究了1-free正则表达式模双相似的一类表征图- LLEE图上的“映像反射”现象。这一性质表明,来自LLEE图表的双模拟函数的图像实际上强加了一个与LLEE图表相对应的特殊LEE结构,我们提出的“结构良好的回环图表”将其视为LLEE图表的子LLEE结构。作为一个应用,由于1-free正则表达式与LEE/LLEE图的可证明解之间的对应关系,我们的研究自然导致了1-free正则表达式推理系统BBP完备性的一个新的证明。与之前的方法相比,我们的证明更直接,因为它不依赖于LLEE图上的图变换过程,其中每一步都必须根据选择规则仔细选择两个双相似节点并合并在一起。我们对LLEE图的观察有助于从一个新的角度理解正则表达式模双相似的完备性问题,也有助于解决其他具有相似图结构的表达式的完备性问题。
{"title":"Image reflection on process graphs of 1-free regular expressions modulo bisimilarity","authors":"Yuanrui Zhang ,&nbsp;Xinxin Liu","doi":"10.1016/j.tcs.2025.115678","DOIUrl":"10.1016/j.tcs.2025.115678","url":null,"abstract":"<div><div>We study a phenomenon called “image reflection” on a type of characterization graphs — LLEE charts — for 1-free regular expressions modulo bisimularity. This property, stating that the images of a bisimulation function from an LLEE chart actually impose a special LEE structure corresponding to the LLEE chart, is recognized by our proposed “well-structured looping-back charts” as a sub-LLEE-structure of LLEE charts. As an application, our study naturally leads to a novel proof for the completeness of the inference system <span><math><mi>BBP</mi></math></span> for 1-free regular expressions, due to the correspondence between 1-free regular expressions and the provable solutions of LEE/LLEE charts. Compared to the previous approach, our proof is more direct in the sense that it does not rely on a graph transformation procedure on LLEE charts in which at each step two bisimilar nodes have to be carefully selected and merged together according to selection rules. Our observation on LLEE charts is useful to understand the completeness problems of regular expressions modulo bisimilarity from a new angle, and can be also helpful for solving the completeness problems of other expressions that share similar graph structures.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1063 ","pages":"Article 115678"},"PeriodicalIF":1.0,"publicationDate":"2025-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145705791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The non-inclusive diagnosability of a kind of networks 一类网络的非包容性可诊断性
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-11-29 DOI: 10.1016/j.tcs.2025.115659
Chuanye Zheng, Liqiong Xu
The probability of vertex failure in interconnection networks will enhance with the increase of the system scale, so the fault diagnosis of interconnection networks deserves our attention and study. The diagnosability is a significant indicator to evaluate network reliability. For measuring the diagnosability of a given system more accurately, Ding et al. [1] came up with the non-inclusive diagnosability of a graph. Our work is to determine the lower bounds of non-inclusive diagnosability of a kind of networks under the PMC model and the MM* model, which can be applied to non-regular graphs and some graphs containing triangles. Finally, we propose the non-inclusive diagnosability of some famous networks under the two diagnostic models as applications.
随着系统规模的增大,互连网络中出现顶点故障的概率会增大,因此互连网络的故障诊断值得我们关注和研究。可诊断性是评价网络可靠性的重要指标。为了更准确地测量给定系统的可诊断性,Ding等人提出了图的非包容性可诊断性。我们的工作是确定一类网络在PMC模型和MM*模型下的非包容可诊断性下界,该下界可应用于非正则图和一些包含三角形的图。最后,我们提出了两种诊断模型下一些著名网络的非包容性可诊断性作为应用。
{"title":"The non-inclusive diagnosability of a kind of networks","authors":"Chuanye Zheng,&nbsp;Liqiong Xu","doi":"10.1016/j.tcs.2025.115659","DOIUrl":"10.1016/j.tcs.2025.115659","url":null,"abstract":"<div><div>The probability of vertex failure in interconnection networks will enhance with the increase of the system scale, so the fault diagnosis of interconnection networks deserves our attention and study. The diagnosability is a significant indicator to evaluate network reliability. For measuring the diagnosability of a given system more accurately, Ding et al. [1] came up with the non-inclusive diagnosability of a graph. Our work is to determine the lower bounds of non-inclusive diagnosability of a kind of networks under the PMC model and the MM* model, which can be applied to non-regular graphs and some graphs containing triangles. Finally, we propose the non-inclusive diagnosability of some famous networks under the two diagnostic models as applications.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1062 ","pages":"Article 115659"},"PeriodicalIF":1.0,"publicationDate":"2025-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145659151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Elimination of annotation dependencies in validation for Modern JSON Schema 消除了现代JSON模式验证中的注释依赖
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-11-28 DOI: 10.1016/j.tcs.2025.115645
Lyes Attouche , Mohamed-Amine Baazizi , Dario Colazzo , Giorgio Ghelli , Stefan Klessinger , Carlo Sartiani , Stefanie Scherzinger
<div><div>JSON Schema is a declarative language that allows one to specify the structure of JSON instances using hierarchical schema objects that combine logical and structural operators.2.2 Early versions of JSON Schema, known collectively as Classical JSON Schema, operated with a straightforward semantics where a schema’s meaning was completely determined by which JSON values it could successfully validate. This simple foundation enabled researchers to develop robust theoretical frameworks and practical tools for instance validation and also to determine whether schemas are satisfiable or equivalent to one another. However, Classical JSON Schema had a significant weakness in its inability to effectively express certain kinds of extensions of object schemas.</div><div>This limitation prompted a major overhaul in Draft 2019-09, introducing two new features that fundamentally alter how JSON Schema works. The first is <em>annotation dependency</em>, where validation now produces more than just a yes/no result. When a schema validates a JSON instance, it also generates an “annotation” that records which fields and items were “evaluated”. This annotation then influences the behavior of the new operators "<span><math><mi>unevaluatedProperties</mi></math></span>" and "<span><math><mi>unevaluatedItems</mi></math></span>", creating a dependency that did not exist before. The second feature is dynamic references, a separate mechanism that allows for the target of a reference operator to depend on the validation context. These changes were so substantial that all JSON Schema versions from Draft 2019-09 onward are called <em>Modern JSON Schema</em>.</div><div>This semantic shift invalidated much of the existing theoretical work, and the algorithms that researchers had developed for Classical JSON Schema — particularly those for determining satisfiability and schema inclusion — do not easily adapt to Modern JSON Schema’s new behavior. One approach to bridge this gap is “elimination” — converting Modern JSON Schema constructs back into equivalent Classical JSON Schema forms. Previous research successfully developed algorithms for eliminating dynamic references, but annotation dependency remained unsolved.</div><div>In this paper we solve this problem, providing three contributions: an <em>expressibility</em> result, proving that eliminating annotation-dependent operators is possible; a <em>succinctness</em> result, proving that eliminating annotation-dependent operators can generally cause schemas to grow exponentially in size, and finally a <em>practical algorithm</em> to perform annotation elimination.</div><div>Our “practical algorithm” not only matches the asymptotic lower-bound that is provided by the succinctness theorem, but it also presents some specific optimizations that we designed to exploit typical features or real-world schemas. A comprehensive experimental testing, executed on a representative set of 305 schemas retrieved from GitHub, shows tha
JSON模式是一种声明性语言,允许用户使用结合逻辑和结构操作符的分层模式对象来指定JSON实例的结构。2.2 JSON模式的早期版本,统称为经典JSON模式,使用直接的语义操作,其中模式的含义完全由它可以成功验证的JSON值决定。这个简单的基础使研究人员能够为实例验证开发强大的理论框架和实用工具,并确定模式是否可满足或彼此等效。然而,经典JSON模式有一个明显的弱点,即无法有效地表达对象模式的某些类型的扩展。这一限制促使草案2019-09进行了重大修改,引入了两个从根本上改变JSON模式工作方式的新功能。第一个是注释依赖,其中验证现在产生的不仅仅是是/否结果。当模式验证JSON实例时,它还生成一个“注释”,记录“评估”了哪些字段和项。这个注释然后影响新操作符“unevaluatedProperties”和“unevaluatedItems”的行为,创建以前不存在的依赖项。第二个特性是动态引用,这是一种单独的机制,允许引用操作符的目标依赖于验证上下文。这些变化是如此之大,以至于从2019-09草案开始的所有JSON模式版本都被称为现代JSON模式。这种语义的转变使许多现有的理论工作无效,并且研究人员为经典JSON模式开发的算法——特别是那些确定可满足性和模式包含性的算法——不容易适应现代JSON模式的新行为。弥合这一差距的一种方法是“消除”——将现代JSON模式结构转换回等效的经典JSON模式形式。先前的研究成功地开发了消除动态引用的算法,但注释依赖仍然没有得到解决。在本文中,我们解决了这个问题,提供了三个贡献:一个可表达性结果,证明消除注释依赖算子是可能的;简洁的结果,证明消除依赖于注释的操作符通常会导致模式的大小呈指数级增长,最后是执行注释消除的实用算法。我们的“实用算法”不仅与简洁性定理提供的渐近下界相匹配,而且还提供了一些我们为利用典型特征或现实世界模式而设计的特定优化。对从GitHub检索到的305个具有代表性的模式进行了全面的实验测试,结果表明,实际算法在所有模式上的运行时间都不到10毫秒,在98%的情况下运行时间不到1毫秒,并且在95%的情况下,它以经典JSON模式生成的模式的大小最多比以现代JSON模式编写的源模式大10倍。
{"title":"Elimination of annotation dependencies in validation for Modern JSON Schema","authors":"Lyes Attouche ,&nbsp;Mohamed-Amine Baazizi ,&nbsp;Dario Colazzo ,&nbsp;Giorgio Ghelli ,&nbsp;Stefan Klessinger ,&nbsp;Carlo Sartiani ,&nbsp;Stefanie Scherzinger","doi":"10.1016/j.tcs.2025.115645","DOIUrl":"10.1016/j.tcs.2025.115645","url":null,"abstract":"&lt;div&gt;&lt;div&gt;JSON Schema is a declarative language that allows one to specify the structure of JSON instances using hierarchical schema objects that combine logical and structural operators.2.2 Early versions of JSON Schema, known collectively as Classical JSON Schema, operated with a straightforward semantics where a schema’s meaning was completely determined by which JSON values it could successfully validate. This simple foundation enabled researchers to develop robust theoretical frameworks and practical tools for instance validation and also to determine whether schemas are satisfiable or equivalent to one another. However, Classical JSON Schema had a significant weakness in its inability to effectively express certain kinds of extensions of object schemas.&lt;/div&gt;&lt;div&gt;This limitation prompted a major overhaul in Draft 2019-09, introducing two new features that fundamentally alter how JSON Schema works. The first is &lt;em&gt;annotation dependency&lt;/em&gt;, where validation now produces more than just a yes/no result. When a schema validates a JSON instance, it also generates an “annotation” that records which fields and items were “evaluated”. This annotation then influences the behavior of the new operators \"&lt;span&gt;&lt;math&gt;&lt;mi&gt;unevaluatedProperties&lt;/mi&gt;&lt;/math&gt;&lt;/span&gt;\" and \"&lt;span&gt;&lt;math&gt;&lt;mi&gt;unevaluatedItems&lt;/mi&gt;&lt;/math&gt;&lt;/span&gt;\", creating a dependency that did not exist before. The second feature is dynamic references, a separate mechanism that allows for the target of a reference operator to depend on the validation context. These changes were so substantial that all JSON Schema versions from Draft 2019-09 onward are called &lt;em&gt;Modern JSON Schema&lt;/em&gt;.&lt;/div&gt;&lt;div&gt;This semantic shift invalidated much of the existing theoretical work, and the algorithms that researchers had developed for Classical JSON Schema — particularly those for determining satisfiability and schema inclusion — do not easily adapt to Modern JSON Schema’s new behavior. One approach to bridge this gap is “elimination” — converting Modern JSON Schema constructs back into equivalent Classical JSON Schema forms. Previous research successfully developed algorithms for eliminating dynamic references, but annotation dependency remained unsolved.&lt;/div&gt;&lt;div&gt;In this paper we solve this problem, providing three contributions: an &lt;em&gt;expressibility&lt;/em&gt; result, proving that eliminating annotation-dependent operators is possible; a &lt;em&gt;succinctness&lt;/em&gt; result, proving that eliminating annotation-dependent operators can generally cause schemas to grow exponentially in size, and finally a &lt;em&gt;practical algorithm&lt;/em&gt; to perform annotation elimination.&lt;/div&gt;&lt;div&gt;Our “practical algorithm” not only matches the asymptotic lower-bound that is provided by the succinctness theorem, but it also presents some specific optimizations that we designed to exploit typical features or real-world schemas. A comprehensive experimental testing, executed on a representative set of 305 schemas retrieved from GitHub, shows tha","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1063 ","pages":"Article 115645"},"PeriodicalIF":1.0,"publicationDate":"2025-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145798612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the parameterized complexity of diverse SAT 不同SAT参数化复杂度研究
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-11-28 DOI: 10.1016/j.tcs.2025.115653
Neeldhara Misra , Harshil Mittal , Ashutosh Rai
We study the Boolean Satisfiability problem (SAT) in the framework of diversity, where one asks for multiple solutions that are mutually far apart (i.e., sufficiently dissimilar from each other) for a suitable notion of distance/dissimilarity between solutions. Interpreting assignments as bit vectors, we take their Hamming distance to quantify dissimilarity, and we focus on the problem of finding two solutions. Specifically, we define the problem Max Differ SAT (resp. Exact Differ SAT) as follows: Given a Boolean formula ϕ on n variables, decide whether ϕ has two satisfying assignments that differ on at least (resp. exactly) d variables. We study the classical and parameterized (in parameters d and nd) complexities of Max Differ SAT and Exact Differ SAT, when restricted to some classes of formulas on which SAT is known to be polynomial-time solvable. In particular, we consider affine formulas, Krom formulas (i.e., 2-CNF formulas) and hitting formulas. For affine formulas, we show the following: Both problems are polynomial-time solvable when each equation has at most two variables. Exact Differ SAT is NP-hard, even when each equation has at most three variables and each variable appears in at most four equations. Also, Max Differ SAT is NP-hard, even when each equation has at most four variables. Both problems are W[1]-hard in the parameter nd. In contrast, when parameterized by d, Exact Differ SAT is W[1]-hard, but Max Differ SAT admits a single-exponential FPT algorithm and a polynomial-kernel. For Krom formulas, we show the following: Both problems are polynomial-time solvable when each variable appears in at most two clauses. Also, both problems are W[1]-hard in the parameter d (and therefore, it turns out, also NP-hard), even on monotone inputs (i.e., formulas with no negative literals). Finally, for hitting formulas, we show that both problems can be solved in polynomial-time.
我们在多样性的框架下研究布尔可满足性问题(SAT),其中人们要求多个解彼此相距很远(即彼此充分不同),以获得解之间距离/不相似度的合适概念。将赋值解释为位向量,我们用它们的汉明距离来量化不相似性,我们专注于找到两个解的问题。具体地说,我们定义了问题的最大差异。给定n个变量上的一个布尔公式φ,决定φ是否有两个令人满意的至少在(resp)上不同的赋值。正好)d个变量。我们研究了Max Differ SAT和Exact Differ SAT的经典和参数化(在参数d和n - d中)复杂性,当它们被限制在已知SAT是多项式时间可解的某些类型的公式时。特别地,我们考虑了仿射公式、Krom公式(即2-CNF公式)和命中公式。对于仿射公式,我们证明如下:当每个方程最多有两个变量时,两个问题都是多项式时间可解的。即使每个方程最多有三个变量,每个变量最多出现在四个方程中,Exact Differ SAT也是np困难的。此外,Max Differ SAT是np困难的,即使每个方程最多有四个变量。两个问题在参数n−d中都是W[1]-hard。相比之下,当参数化为d时,Exact Differ SAT是W[1]-hard,而Max Differ SAT则采用单指数FPT算法和多项式核。对于Krom公式,我们证明如下:当每个变量最多出现在两个子句中时,两个问题都是多项式时间可解的。此外,两个问题在参数d中都是W[1]-困难(因此,结果也是np -困难),即使在单调输入(即,没有负文字的公式)上也是如此。最后,对于命中公式,我们证明了这两个问题都可以在多项式时间内解决。
{"title":"On the parameterized complexity of diverse SAT","authors":"Neeldhara Misra ,&nbsp;Harshil Mittal ,&nbsp;Ashutosh Rai","doi":"10.1016/j.tcs.2025.115653","DOIUrl":"10.1016/j.tcs.2025.115653","url":null,"abstract":"<div><div>We study the <span>Boolean Satisfiability problem (SAT)</span> in the framework of diversity, where one asks for multiple solutions that are mutually far apart (i.e., sufficiently dissimilar from each other) for a suitable notion of distance/dissimilarity between solutions. Interpreting assignments as bit vectors, we take their Hamming distance to quantify dissimilarity, and we focus on the problem of finding two solutions. Specifically, we define the problem <span>Max</span> <span>Differ SAT</span> (resp. <span>Exact Differ SAT</span>) as follows: Given a Boolean formula <em>ϕ</em> on <em>n</em> variables, decide whether <em>ϕ</em> has two satisfying assignments that differ on at least (resp. exactly) <em>d</em> variables. We study the classical and parameterized (in parameters <em>d</em> and <span><math><mrow><mi>n</mi><mo>−</mo><mi>d</mi></mrow></math></span>) complexities of <span>Max Differ SAT</span> and <span>Exact Differ SAT</span>, when restricted to some classes of formulas on which SAT is known to be polynomial-time solvable. In particular, we consider affine formulas, Krom formulas (i.e., 2-CNF formulas) and hitting formulas. For affine formulas, we show the following: Both problems are polynomial-time solvable when each equation has at most two variables. <span>Exact Differ SAT</span> is <span><math><mi>NP</mi></math></span>-hard, even when each equation has at most three variables and each variable appears in at most four equations. Also, <span>Max Differ SAT</span> is <span><math><mi>NP</mi></math></span>-hard, even when each equation has at most four variables. Both problems are <span><math><mrow><mi>W</mi><mo>[</mo><mn>1</mn><mo>]</mo></mrow></math></span>-hard in the parameter <span><math><mrow><mi>n</mi><mo>−</mo><mi>d</mi></mrow></math></span>. In contrast, when parameterized by <em>d</em>, <span>Exact Differ SAT</span> is <span><math><mrow><mi>W</mi><mo>[</mo><mn>1</mn><mo>]</mo></mrow></math></span>-hard, but <span>Max Differ SAT</span> admits a single-exponential <span><math><mi>FPT</mi></math></span> algorithm and a polynomial-kernel. For Krom formulas, we show the following: Both problems are polynomial-time solvable when each variable appears in at most two clauses. Also, both problems are <span><math><mrow><mi>W</mi><mo>[</mo><mn>1</mn><mo>]</mo></mrow></math></span>-hard in the parameter <em>d</em> (and therefore, it turns out, also <span><math><mi>NP</mi></math></span>-hard), even on monotone inputs (i.e., formulas with no negative literals). Finally, for hitting formulas, we show that both problems can be solved in polynomial-time.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1062 ","pages":"Article 115653"},"PeriodicalIF":1.0,"publicationDate":"2025-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145659150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A tractability gap beyond nim-sums: It’s hard to tell whether a bunch of superstars are losers 一个超越金钱的可操控性差距:很难判断一群超级明星是否都是失败者
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-11-26 DOI: 10.1016/j.tcs.2025.115656
Kyle Burke , Matthew Ferland , Svenja Huntemann , Shang-Hua Teng
In this paper, we address a natural question at the intersection of combinatorial game theory and computational complexity: “Can a sum of simple tepid games in canonical form be intractable?” To resolve this fundamental question, we consider superstars, positions first introduced in Winning Ways where all options are nimbers. Extending Morris’ classic result with hot games to tepid games, we prove that disjunctive sums of superstars are intractable to solve. This is striking as sums of nimbers can be computed in linear time. Our analysis shows that the game Paint Can is intractable and also yields a new intractable game, Blackout. We present web-playable versions of both games.
在本文中,我们在组合博弈论和计算复杂性的交叉点上提出了一个自然的问题:“规范形式的简单不温博弈的和是否难以处理?”为了解决这个基本问题,我们考虑了超级明星,即《Winning Ways》中首次引入的所有选项都是数字的位置。将Morris关于热对策的经典结果推广到不温对策,证明了超级明星的析取和是难以解的。这是惊人的,因为数字的总和可以在线性时间内计算出来。我们的分析表明,游戏油漆罐是棘手的,也产生了一个新的棘手的游戏,停电。我们推出了这两款游戏的网页版本。
{"title":"A tractability gap beyond nim-sums: It’s hard to tell whether a bunch of superstars are losers","authors":"Kyle Burke ,&nbsp;Matthew Ferland ,&nbsp;Svenja Huntemann ,&nbsp;Shang-Hua Teng","doi":"10.1016/j.tcs.2025.115656","DOIUrl":"10.1016/j.tcs.2025.115656","url":null,"abstract":"<div><div>In this paper, we address a natural question at the intersection of combinatorial game theory and computational complexity: “Can a sum of simple <em>tepid games</em> in canonical form be intractable?” To resolve this fundamental question, we consider <em>superstars</em>, positions first introduced in <em>Winning Ways</em> where all options are <em>nimbers</em>. Extending Morris’ classic result with hot games to tepid games, we prove that disjunctive sums of superstars are intractable to solve. This is striking as sums of nimbers can be computed in linear time. Our analysis shows that the game <span>Paint Can</span> is intractable and also yields a new intractable game, <span>Blackout</span>. We present web-playable versions of both games.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1062 ","pages":"Article 115656"},"PeriodicalIF":1.0,"publicationDate":"2025-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145694787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Independent set reconfiguration under bounded-hop token jumping 有界跳令牌跳跃下的独立集合重构
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-11-25 DOI: 10.1016/j.tcs.2025.115651
Hiroki Hatano , Naoki Kitamura , Taisuke Izumi , Takehiro Ito , Toshimitsu Masuzawa
The independent set reconfiguration problem (ISReconf) is the problem of determining, for two given independent sets of a graph, whether one can be transformed into the other by repeatedly applying a prescribed reconfiguration rule. There are two well-studied reconfiguration rules, called the Token Sliding (TS) rule and the Token Jumping (TJ) rule, and it is known that the complexity status of ISReconf differs between the TS and TJ rules for some graph classes. In this paper, we analyze how changes in reconfiguration rules affect the computational complexity of ISReconf. To this end, we generalize the TS and TJ rules to a unified reconfiguration rule, called the k-Jump rule, which removes one vertex from a current independent set and adds a vertex within distance k from the removed vertex to obtain another independent set having the same cardinality. We give the following three results: First, we show that the reconfigurability of any ISReconf instance does not change for all k ≥ 3. Second, we present a polynomial-time algorithm to solve ISReconf under the 2-Jump rule for split graphs. Third, we consider the shortest variant of ISReconf, which determines whether there is a transformation of at most ℓ steps, for a given integer ℓ ≥ 0. We prove that this shortest variant under the k-Jump rule is NP-complete for chordal graphs of diameter at most 2k+1, for any k ≥ 3.
独立集重构问题(ISReconf)是对给定的两个图的独立集,通过重复应用规定的重构规则,确定其中一个能否转化为另一个的问题。有两种重新配置规则,称为令牌滑动(TS)规则和令牌跳跃(TJ)规则,众所周知,对于某些图类,ISReconf在TS和TJ规则之间的复杂性状态是不同的。本文分析了重构规则的变化对ISReconf计算复杂度的影响。为此,我们将TS和TJ规则推广为一个统一的重构规则,称为k- jump规则,该规则从当前独立集中删除一个顶点,并在距离被删除顶点k的距离内添加一个顶点,以获得具有相同基数的另一个独立集。我们给出了以下三个结果:首先,我们证明了对于所有k ≥ 3,任何ISReconf实例的可重构性都不会改变。其次,我们提出了一个多项式时间算法来求解分割图的2-Jump规则下的ISReconf。第三,我们考虑ISReconf的最短变体,它决定了对于给定的整数( ≥ 0),是否存在最多步长的变换。我们证明了在k- jump规则下,对于直径不超过2k+1的弦图,对于任意k ≥ 3,这个最短变体是np完全的。
{"title":"Independent set reconfiguration under bounded-hop token jumping","authors":"Hiroki Hatano ,&nbsp;Naoki Kitamura ,&nbsp;Taisuke Izumi ,&nbsp;Takehiro Ito ,&nbsp;Toshimitsu Masuzawa","doi":"10.1016/j.tcs.2025.115651","DOIUrl":"10.1016/j.tcs.2025.115651","url":null,"abstract":"<div><div>The independent set reconfiguration problem (<span>ISReconf</span>) is the problem of determining, for two given independent sets of a graph, whether one can be transformed into the other by repeatedly applying a prescribed reconfiguration rule. There are two well-studied reconfiguration rules, called the Token Sliding (TS) rule and the Token Jumping (TJ) rule, and it is known that the complexity status of <span>ISReconf</span> differs between the TS and TJ rules for some graph classes. In this paper, we analyze how changes in reconfiguration rules affect the computational complexity of <span>ISReconf</span>. To this end, we generalize the TS and TJ rules to a unified reconfiguration rule, called the <em>k</em>-Jump rule, which removes one vertex from a current independent set and adds a vertex within distance <em>k</em> from the removed vertex to obtain another independent set having the same cardinality. We give the following three results: First, we show that the reconfigurability of any <span>ISReconf</span> instance does not change for all <em>k</em> ≥ 3. Second, we present a polynomial-time algorithm to solve <span>ISReconf</span> under the 2-Jump rule for split graphs. Third, we consider the shortest variant of <span>ISReconf</span>, which determines whether there is a transformation of at most ℓ steps, for a given integer ℓ ≥ 0. We prove that this shortest variant under the <em>k</em>-Jump rule is NP-complete for chordal graphs of diameter at most <span><math><mrow><mn>2</mn><mi>k</mi><mo>+</mo><mn>1</mn></mrow></math></span>, for any <em>k</em> ≥ 3.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1062 ","pages":"Article 115651"},"PeriodicalIF":1.0,"publicationDate":"2025-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145694788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
#P-Hardness proofs of matrix immanants evaluated on restricted matrices 在受限矩阵上求矩阵内变量的硬度证明
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-11-25 DOI: 10.1016/j.tcs.2025.115660
Istvan Miklos , Cordian Riener
We establish the #P-hardness of computing a broad class of immanants, even when restricted to specific categories of matrices. Concretely, we prove that computing λ-immanants of 01 matrices is #P-hard whenever the partition λ contains a sufficiently large domino-tileable region, subject to certain technical conditions.
We also give hardness proofs for some λ-immanants of weighted adjacency matrices of planar directed graphs, such that the shape λ=(1+λd) has size n such that |λd|=nε for some 0<ε<12, and such that for some w, the shape λd/(w) is tileable with 1 × 2 dominos.
我们建立了计算广义内变量的# p -硬度,即使局限于特定类别的矩阵。具体地,我们证明了在一定的技术条件下,当划分λ包含一个足够大的多米诺骨牌区域时,计算0−1矩阵的λ-内积是#P-hard的。我们还给出了平面有向图的加权邻接矩阵的一些λ-内量的硬度证明,使得形状λ=(1+λd)的大小为n,使得对于某些0<;ε<12,形状λd/(w)可以铺成1 × 2个多米诺骨牌。
{"title":"#P-Hardness proofs of matrix immanants evaluated on restricted matrices","authors":"Istvan Miklos ,&nbsp;Cordian Riener","doi":"10.1016/j.tcs.2025.115660","DOIUrl":"10.1016/j.tcs.2025.115660","url":null,"abstract":"<div><div>We establish the #<em>P</em>-hardness of computing a broad class of immanants, even when restricted to specific categories of matrices. Concretely, we prove that computing <em>λ</em>-immanants of <span><math><mrow><mn>0</mn><mspace></mspace><mo>−</mo><mspace></mspace><mn>1</mn></mrow></math></span> matrices is #<em>P</em>-hard whenever the partition <em>λ</em> contains a sufficiently large domino-tileable region, subject to certain technical conditions.</div><div>We also give hardness proofs for some <em>λ</em>-immanants of weighted adjacency matrices of planar directed graphs, such that the shape <span><math><mrow><mi>λ</mi><mo>=</mo><mo>(</mo><mn>1</mn><mo>+</mo><msub><mi>λ</mi><mi>d</mi></msub><mo>)</mo></mrow></math></span> has size <em>n</em> such that <span><math><mrow><mrow><mo>|</mo></mrow><msub><mi>λ</mi><mi>d</mi></msub><mrow><mo>|</mo><mo>=</mo></mrow><msup><mi>n</mi><mrow><mi>ε</mi></mrow></msup></mrow></math></span> for some <span><math><mrow><mn>0</mn><mo>&lt;</mo><mrow><mi>ε</mi></mrow><mo>&lt;</mo><mfrac><mn>1</mn><mn>2</mn></mfrac></mrow></math></span>, and such that for some <em>w</em>, the shape <em>λ<sub>d</sub></em>/(<em>w</em>) is tileable with 1 × 2 dominos.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1062 ","pages":"Article 115660"},"PeriodicalIF":1.0,"publicationDate":"2025-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145659152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Theoretical Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1