首页 > 最新文献

Journal of the ACM最新文献

英文 中文
Faster high-accuracy log-concave sampling via algorithmic warm starts 通过热启动算法实现更快的高精度对数凹采样
IF 2.5 2区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-03-20 DOI: 10.1145/3653446
Jason M. Altschuler, Sinho Chewi

It is a fundamental problem to understand the complexity of high-accuracy sampling from a strongly log-concave density π on (mathbb {R}^d ). Indeed, in practice, high-accuracy samplers such as the Metropolis-adjusted Langevin algorithm (MALA) remain the de facto gold standard; and in theory, via the proximal sampler reduction, it is understood that such samplers are key for sampling even beyond log-concavity (in particular, for sampling under isoperimetric assumptions). This paper improves the dimension dependence of this sampling problem to (widetilde{O}(d^{1/2}) ). The previous best result for MALA was (widetilde{O}(d) ). This closes the long line of work on the complexity of MALA, and moreover leads to state-of-the-art guarantees for high-accuracy sampling under strong log-concavity and beyond (thanks to the aforementioned reduction). Our starting point is that the complexity of MALA improves to (widetilde{O}(d^{1/2}) ), but only under a warm start (an initialization with constant Rényi divergence w.r.t. π). Previous algorithms for finding a warm start took O(d) time and thus dominated the computational effort of sampling. Our main technical contribution resolves this gap by establishing the first (widetilde{O}(d^{1/2}) ) Rényi mixing rates for the discretized underdamped Langevin diffusion. For this, we develop new differential-privacy-inspired techniques based on Rényi divergences with Orlicz–Wasserstein shifts, which allow us to sidestep longstanding challenges for proving fast convergence of hypocoercive differential equations.

要理解从 (mathbb {R}^d )上的强对数凹密度π进行高精度采样的复杂性,是一个基本问题。事实上,在实践中,诸如 Metropolis-adjusted Langevin 算法(MALA)这样的高精度采样器仍然是事实上的黄金标准;而在理论上,通过近端采样器还原,我们可以理解这种采样器是甚至超越对数凹陷采样的关键(尤其是在等运算假设下的采样)。本文将这个采样问题的维度依赖性提高到了(widetilde{O}(d^{1/2}) )。之前 MALA 的最佳结果是(widetilde{O}(d) )。这结束了关于 MALA 复杂性的长期研究,而且为强对数凹性及更高精度的采样提供了最先进的保证(这要归功于前面提到的缩减)。我们的出发点是,MALA 的复杂度提高到了(widetilde{O}(d^{1/2}) ),但仅限于热启动(具有恒定雷尼发散的π初始化)。以前的暖起点算法需要花费 O(d) 时间,因此在采样的计算量上占优势。我们的主要技术贡献是解决了这一问题,首次建立了 (widetilde{O}(d^{1/2}) )Rényi 混合率。为此,我们开发了新的微分私有性启发技术,该技术基于具有奥立兹-瓦瑟斯坦偏移的雷尼发散,使我们能够避开长期以来证明低胁迫微分方程快速收敛的难题。
{"title":"Faster high-accuracy log-concave sampling via algorithmic warm starts","authors":"Jason M. Altschuler, Sinho Chewi","doi":"10.1145/3653446","DOIUrl":"https://doi.org/10.1145/3653446","url":null,"abstract":"<p>It is a fundamental problem to understand the complexity of high-accuracy sampling from a strongly log-concave density <i>π</i> on (mathbb {R}^d ). Indeed, in practice, high-accuracy samplers such as the Metropolis-adjusted Langevin algorithm (MALA) remain the de facto gold standard; and in theory, via the proximal sampler reduction, it is understood that such samplers are key for sampling even beyond log-concavity (in particular, for sampling under isoperimetric assumptions). This paper improves the dimension dependence of this sampling problem to (widetilde{O}(d^{1/2}) ). The previous best result for MALA was (widetilde{O}(d) ). This closes the long line of work on the complexity of MALA, and moreover leads to state-of-the-art guarantees for high-accuracy sampling under strong log-concavity and beyond (thanks to the aforementioned reduction). Our starting point is that the complexity of MALA improves to (widetilde{O}(d^{1/2}) ), but only under a <i>warm start</i> (an initialization with constant Rényi divergence w.r.t. <i>π</i>). Previous algorithms for finding a warm start took <i>O</i>(<i>d</i>) time and thus dominated the computational effort of sampling. Our main technical contribution resolves this gap by establishing the first (widetilde{O}(d^{1/2}) ) Rényi mixing rates for the discretized underdamped Langevin diffusion. For this, we develop new differential-privacy-inspired techniques based on Rényi divergences with Orlicz–Wasserstein shifts, which allow us to sidestep longstanding challenges for proving fast convergence of hypocoercive differential equations.</p>","PeriodicalId":50022,"journal":{"name":"Journal of the ACM","volume":"43 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140168114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fine-Grained Cryptanalysis: Tight Conditional Bounds for Dense k-SUM and k-XOR 精细密码分析:密集 k-SUM 和 k-XOR 的严格条件约束
IF 2.5 2区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-03-17 DOI: 10.1145/3653014
Itai Dinur, Nathan Keller, Ohad Klein

An average-case variant of the k-SUM conjecture asserts that finding k numbers that sum to 0 in a list of r random numbers, each of the order rk, cannot be done in much less than rk/2⌉ time. On the other hand, in the dense regime of parameters, where the list contains more numbers and many solutions exist, the complexity of finding one of them can be significantly improved by Wagner’s k-tree algorithm. Such algorithms for k-SUM in the dense regime have many applications, notably in cryptanalysis.

In this paper, assuming the average-case k-SUM conjecture, we prove that known algorithms are essentially optimal for k = 3, 4, 5. For k > 5, we prove the optimality of the k-tree algorithm for a limited range of parameters. We also prove similar results for k-XOR, where the sum is replaced with exclusive or.

Our results are obtained by a self-reduction that, given an instance of k-SUM which has a few solutions, produces from it many instances in the dense regime. We solve each of these instances using the dense k-SUM oracle, and hope that a solution to a dense instance also solves the original problem. We deal with potentially malicious oracles (that repeatedly output correlated useless solutions) by an obfuscation process that adds noise to the dense instances. Using discrete Fourier analysis, we show that the obfuscation eliminates correlations among the oracle’s solutions, even though its inputs are highly correlated.

k-SUM 猜想的一个平均情况变体断言,在一个由 r 个随机数(每个随机数的阶数为 rk)组成的列表中,找到总和为 0 的 k 个数所需的时间不可能少于 r⌈k/2⌉。另一方面,在参数密集的情况下,即列表包含更多数字且存在许多解时,利用瓦格纳的 k 树算法可以显著提高找到其中一个解的复杂度。这种密集机制下的 k-SUM 算法有很多应用,特别是在密码分析中。在本文中,假设存在平均情况下的 k-SUM 猜想,我们证明已知算法在 k = 3、4、5 时基本上是最优的。对于 k > 5,我们证明了 k 树算法在有限参数范围内的最优性。对于 k-XOR,我们也证明了类似的结果,其中的和用排他或代替。我们的结果是通过自还原法获得的,给定一个有少量解的 k-SUM 实例,就能从中产生许多密集机制中的实例。我们使用密集 k-SUM 算法求解每个实例,并希望密集实例的解也能解决原始问题。我们通过在密集实例中添加噪音的混淆过程来处理潜在的恶意神谕(重复输出相关的无用解)。通过离散傅立叶分析,我们证明了混淆过程可以消除神谕解之间的相关性,即使其输入是高度相关的。
{"title":"Fine-Grained Cryptanalysis: Tight Conditional Bounds for Dense k-SUM and k-XOR","authors":"Itai Dinur, Nathan Keller, Ohad Klein","doi":"10.1145/3653014","DOIUrl":"https://doi.org/10.1145/3653014","url":null,"abstract":"<p>An average-case variant of the <i>k</i>-SUM conjecture asserts that finding <i>k</i> numbers that sum to 0 in a list of <i>r</i> random numbers, each of the order <i>r<sup>k</sup></i>, cannot be done in much less than <i>r</i><sup>⌈<i>k</i>/2⌉</sup> time. On the other hand, in the <i>dense regime</i> of parameters, where the list contains more numbers and many solutions exist, the complexity of finding one of them can be significantly improved by Wagner’s <i>k</i>-tree algorithm. Such algorithms for <i>k</i>-SUM in the dense regime have many applications, notably in cryptanalysis. </p><p>In this paper, assuming the average-case <i>k</i>-SUM conjecture, we prove that known algorithms are essentially optimal for <i>k</i> = 3, 4, 5. For <i>k</i> &gt; 5, we prove the optimality of the <i>k</i>-tree algorithm for a limited range of parameters. We also prove similar results for <i>k</i>-XOR, where the sum is replaced with exclusive or. </p><p>Our results are obtained by a self-reduction that, given an instance of <i>k</i>-SUM which has a few solutions, produces from it many instances in the dense regime. We solve each of these instances using the dense <i>k</i>-SUM oracle, and hope that a solution to a dense instance also solves the original problem. We deal with potentially malicious oracles (that repeatedly output correlated useless solutions) by an obfuscation process that adds noise to the dense instances. Using discrete Fourier analysis, we show that the obfuscation eliminates correlations among the oracle’s solutions, even though its inputs are highly correlated.</p>","PeriodicalId":50022,"journal":{"name":"Journal of the ACM","volume":"13 26 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140147826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Twin-width IV: ordered graphs and matrices 双宽 IV:有序图和矩阵
IF 2.5 2区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-03-11 DOI: 10.1145/3651151
Édouard Bonnet, Ugo Giocanti, Patrice Ossona de Mendez, Pierre Simon, Stéphan Thomassé, Szymon Toruńczyk

We establish a list of characterizations of bounded twin-width for hereditary classes of totally ordered graphs: as classes of at most exponential growth studied in enumerative combinatorics, as monadically NIP classes studied in model theory, as classes that do not transduce the class of all graphs studied in finite model theory, and as classes for which model checking first-order logic is fixed-parameter tractable studied in algorithmic graph theory.

This has several consequences. First, it allows us to show that every hereditary class of ordered graphs either has at most exponential growth, or has at least factorial growth. This settles a question first asked by Balogh, Bollobás, and Morris [Eur. J. Comb. ’06] on the growth of hereditary classes of ordered graphs, generalizing the Stanley-Wilf conjecture/Marcus-Tardos theorem. Second, it gives a fixed-parameter approximation algorithm for twin-width on ordered graphs. Third, it yields a full classification of fixed-parameter tractable first-order model checking on hereditary classes of ordered binary structures. Fourth, it provides a model-theoretic characterization of classes with bounded twin-width. Finally, it settles the small conjecture [SODA ’21] in the case of ordered graphs.

我们为完全有序图的遗传类建立了一系列有界孪宽的特征:枚举组合论中研究的指数增长类、模型论中研究的一元 NIP 类、有限模型论中研究的不传递所有图的类,以及算法图论中研究的模型检查一阶逻辑是固定参数可处理的类。这有几个后果。首先,它使我们能够证明,每一类有序图的遗传类要么最多具有指数增长,要么至少具有阶乘增长。这解决了 Balogh、Bollobás 和 Morris [Eur. J. Comb. '06]首次提出的关于有序图遗传类增长的问题,概括了 Stanley-Wilf 猜想/Marcus-Tardos 定理。其次,它给出了有序图上孪宽的固定参数近似算法。第三,它给出了有序二元结构遗传类上固定参数可控一阶模型检查的完整分类。第四,它提供了具有有界孪宽的类的模型理论特征。最后,它解决了有序图情况下的小猜想[SODA '21]。
{"title":"Twin-width IV: ordered graphs and matrices","authors":"Édouard Bonnet, Ugo Giocanti, Patrice Ossona de Mendez, Pierre Simon, Stéphan Thomassé, Szymon Toruńczyk","doi":"10.1145/3651151","DOIUrl":"https://doi.org/10.1145/3651151","url":null,"abstract":"<p>We establish a list of characterizations of bounded twin-width for hereditary classes of totally ordered graphs: as classes of at most exponential growth studied in enumerative combinatorics, as monadically NIP classes studied in model theory, as classes that do not transduce the class of all graphs studied in finite model theory, and as classes for which model checking first-order logic is fixed-parameter tractable studied in algorithmic graph theory. </p><p>This has several consequences. First, it allows us to show that every hereditary class of ordered graphs either has at most exponential growth, or has at least factorial growth. This settles a question first asked by Balogh, Bollobás, and Morris [Eur. J. Comb. ’06] on the growth of hereditary classes of ordered graphs, generalizing the Stanley-Wilf conjecture/Marcus-Tardos theorem. Second, it gives a fixed-parameter approximation algorithm for twin-width on ordered graphs. Third, it yields a full classification of fixed-parameter tractable first-order model checking on hereditary classes of ordered binary structures. Fourth, it provides a model-theoretic characterization of classes with bounded twin-width. Finally, it settles the small conjecture [SODA ’21] in the case of ordered graphs.</p>","PeriodicalId":50022,"journal":{"name":"Journal of the ACM","volume":"42 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140106050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Normalization of Linear Temporal Logic 线性时态逻辑的高效归一化
IF 2.5 2区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-03-06 DOI: 10.1145/3651152
Javier Esparza, Rubén Rubio, Salomon Sickert

In the mid 80s, Lichtenstein, Pnueli, and Zuck proved a classical theorem stating that every formula of Past LTL (the extension of LTL with past operators) is equivalent to a formula of the form (bigwedge _{i=1}^n mathbf {G}mathbf {F} varphi _i vee mathbf {F}mathbf {G} psi _i ), where φi and ψi contain only past operators. Some years later, Chang, Manna, and Pnueli built on this result to derive a similar normal form for LTL. Both normalization procedures have a non-elementary worst-case blow-up, and follow an involved path from formulas to counter-free automata to star-free regular expressions and back to formulas. We improve on both points. We present direct and purely syntactic normalization procedures for LTL, yielding a normal form very similar to the one by Chang, Manna, and Pnueli, that exhibit only a single exponential blow-up. As an application, we derive a simple algorithm to translate LTL into deterministic Rabin automata. The algorithm normalizes the formula, translates it into a special very weak alternating automaton, and applies a simple determinization procedure, valid only for these special automata.

在 80 年代中期,利希滕斯坦、普努埃利和扎克证明了一个经典定理,即过去式 LTL(带有过去算子的 LTL 扩展)的每一个公式都等价于一个形式为 (bigwedge _{i=1}^n mathbf {G}mathbf {F} 的公式。varphi _i (vee) (mathbf {F}mathbf {G}psi _i ),其中 φi 和 ψi 只包含过去算子。几年后,Chang、Manna 和 Pnueli 在此基础上为 LTL 推导出了类似的正则表达式。这两种正则化程序都有非元素的最坏情况爆炸,并遵循从公式到无反自动机到无星正则表达式再回到公式的复杂路径。我们在这两点上都有所改进。我们提出了 LTL 的直接和纯语法规范化程序,产生了与 Chang、Manna 和 Pnueli 的规范化形式非常相似的规范化形式,它只表现出单次指数膨胀。作为一种应用,我们推导出了一种将 LTL 转化为确定性拉宾自动机的简单算法。该算法将公式规范化,将其转化为特殊的极弱交替自动机,并应用仅对这些特殊自动机有效的简单确定化过程。
{"title":"Efficient Normalization of Linear Temporal Logic","authors":"Javier Esparza, Rubén Rubio, Salomon Sickert","doi":"10.1145/3651152","DOIUrl":"https://doi.org/10.1145/3651152","url":null,"abstract":"<p>In the mid 80s, Lichtenstein, Pnueli, and Zuck proved a classical theorem stating that every formula of Past LTL (the extension of LTL with past operators) is equivalent to a formula of the form (bigwedge _{i=1}^n mathbf {G}mathbf {F} varphi _i vee mathbf {F}mathbf {G} psi _i ), where φ<sub><i>i</i></sub> and <i>ψ<sub>i</sub></i> contain only past operators. Some years later, Chang, Manna, and Pnueli built on this result to derive a similar normal form for LTL. Both normalization procedures have a non-elementary worst-case blow-up, and follow an involved path from formulas to counter-free automata to star-free regular expressions and back to formulas. We improve on both points. We present direct and purely syntactic normalization procedures for LTL, yielding a normal form very similar to the one by Chang, Manna, and Pnueli, that exhibit only a single exponential blow-up. As an application, we derive a simple algorithm to translate LTL into deterministic Rabin automata. The algorithm normalizes the formula, translates it into a special very weak alternating automaton, and applies a simple determinization procedure, valid only for these special automata.</p>","PeriodicalId":50022,"journal":{"name":"Journal of the ACM","volume":"270 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140044322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sketching approximability of all finite CSPs 所有有限 CSP 的草图近似性
IF 2.5 2区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-02-29 DOI: 10.1145/3649435
Chi-Ning Chou, Alexander Golovnev, Madhu Sudan, Santhoshini Velusamy

A constraint satisfaction problem (CSP), (mathsf {Max-CSP}(mathcal {F}) ), is specified by a finite set of constraints (mathcal {F} subseteq lbrace [q]^k rightarrow lbrace 0,1rbrace rbrace ) for positive integers q and k. An instance of the problem on n variables is given by m applications of constraints from (mathcal {F} ) to subsequences of the n variables, and the goal is to find an assignment to the variables that satisfies the maximum number of constraints. In the (γ, β)-approximation version of the problem for parameters 0 ≤ β < γ ≤ 1, the goal is to distinguish instances where at least γ fraction of the constraints can be satisfied from instances where at most β fraction of the constraints can be satisfied.

In this work, we consider the approximability of this problem in the context of sketching algorithms and give a dichotomy result. Specifically, for every family (mathcal {F} ) and every β < γ, we show that either a linear sketching algorithm solves the problem in polylogarithmic space, or the problem is not solvable by any sketching algorithm in (o(sqrt {n}) ) space. In particular, we give non-trivial approximation algorithms using polylogarithmic space for infinitely many constraint satisfaction problems.

We also extend previously known lower bounds for general streaming algorithms to a wide variety of problems, and in particular the case of q = k = 2, where we get a dichotomy, and the case when the satisfying assignments of the constraints of (mathcal {F} ) support a distribution on [q]k with uniform marginals.

Prior to this work, other than sporadic examples, the only systematic classes of CSPs that were analyzed considered the setting of Boolean variables q = 2, binary constraints k = 2, singleton families (|mathcal {F}|=1 ) and only considered the setting where constraints are placed on literals rather than variables.

Our positive results show wide applicability of bias-based algorithms used previously by [47] and [41], which we extend to include richer norm estimation algorithms, by giving a systematic way to discover biases. Our negative results combine the Fourier analytic methods of [56], which we extend to a wider class of CSPs, with a rich collection of reductions among communication complexity problems that lie at the heart of the negative results. In particular, previous works used Fourier analysis over the Boolean cube to initiate their results and the results seemed particularly tailored to functions on Boolean literals (i.e., with negations). Our techniques surprisingly allow us to get to general q-ary CSPs without negations by appealing to the same Fourier analytic starting point over Boolean hypercubes.

一个约束满足问题(CSP),((mathsf {Max-CSP}(mathcal {F}) ),是由一个有限的约束集合(((mathcal {F} subseteq lbrace [q]^k rightarrow lbrace 0,1 rbrace )指定的。关于 n 个变量的问题实例是由(mathcal {F} )中的 m 个约束应用到 n 个变量的子序列上给出的,目标是找到一个满足最大约束数的变量赋值。在参数为 0 ≤ β < γ ≤ 1 的 (γ, β)-近似版本问题中,目标是区分至少有 γ 部分约束条件可以满足的实例和最多有β 部分约束条件可以满足的实例。在这项工作中,我们在草图算法的背景下考虑了这个问题的近似性,并给出了一个二分法结果。具体来说,对于每一个族 (mathcal {F} )和每一个 β < γ,我们证明了要么线性草图算法可以在多对数空间中解决这个问题,要么这个问题在 (o(sqrt {n}) )空间中无法被任何草图算法解决。特别是,我们给出了使用多对数空间解决无限多约束满足问题的非难近似算法。我们还将之前已知的一般流算法的下界扩展到各种问题,特别是 q = k = 2 的情况,在这种情况下我们得到了二分法,以及当 (mathcal {F}) 约束的满足赋值支持[q]k 上具有均匀边际的分布时的情况。在这项工作之前,除了零星的例子之外,所分析的 CSP 系统类只考虑了布尔变量 q = 2、二元约束 k = 2、单子族 (|mathcal {F}|=1 )的情况,而且只考虑了约束放在字面而不是变量上的情况。我们的正面结果表明,[47] 和 [41] 以前使用的基于偏差的算法具有广泛的适用性,我们通过给出发现偏差的系统方法,将其扩展到包括更丰富的规范估计算法。我们的负面结果结合了 [56] 的傅立叶分析方法(我们将其扩展到了更广泛的 CSP 类别)和丰富的通信复杂性问题还原集合,这正是负面结果的核心所在。特别是,以前的研究使用布尔立方上的傅立叶分析来启动他们的结果,而且这些结果似乎特别适合布尔字面(即带否定)上的函数。令人惊奇的是,我们的技术让我们可以通过对布尔超立方的相同傅里叶分析起点,得到不带否定词的一般 qary CSP。
{"title":"Sketching approximability of all finite CSPs","authors":"Chi-Ning Chou, Alexander Golovnev, Madhu Sudan, Santhoshini Velusamy","doi":"10.1145/3649435","DOIUrl":"https://doi.org/10.1145/3649435","url":null,"abstract":"<p>A constraint satisfaction problem (CSP), (mathsf {Max-CSP}(mathcal {F}) ), is specified by a finite set of constraints (mathcal {F} subseteq lbrace [q]^k rightarrow lbrace 0,1rbrace rbrace ) for positive integers <i>q</i> and <i>k</i>. An instance of the problem on <i>n</i> variables is given by <i>m</i> applications of constraints from (mathcal {F} ) to subsequences of the <i>n</i> variables, and the goal is to find an assignment to the variables that satisfies the maximum number of constraints. In the (<i>γ</i>, <i>β</i>)-approximation version of the problem for parameters 0 ≤ <i>β</i> &lt; <i>γ</i> ≤ 1, the goal is to distinguish instances where at least <i>γ</i> fraction of the constraints can be satisfied from instances where at most <i>β</i> fraction of the constraints can be satisfied. </p><p>In this work, we consider the approximability of this problem in the context of sketching algorithms and give a dichotomy result. Specifically, for every family (mathcal {F} ) and every <i>β</i> &lt; <i>γ</i>, we show that either a linear sketching algorithm solves the problem in polylogarithmic space, or the problem is not solvable by any sketching algorithm in (o(sqrt {n}) ) space. In particular, we give non-trivial approximation algorithms using polylogarithmic space for infinitely many constraint satisfaction problems. </p><p>We also extend previously known lower bounds for general streaming algorithms to a wide variety of problems, and in particular the case of <i>q</i> = <i>k</i> = 2, where we get a dichotomy, and the case when the satisfying assignments of the constraints of (mathcal {F} ) support a distribution on [<i>q</i>]<sup><i>k</i></sup> with uniform marginals. </p><p>Prior to this work, other than sporadic examples, the only systematic classes of CSPs that were analyzed considered the setting of Boolean variables <i>q</i> = 2, binary constraints <i>k</i> = 2, singleton families (|mathcal {F}|=1 ) and only considered the setting where constraints are placed on literals rather than variables. </p><p>Our positive results show wide applicability of bias-based algorithms used previously by [47] and [41], which we extend to include richer norm estimation algorithms, by giving a systematic way to discover biases. Our negative results combine the Fourier analytic methods of [56], which we extend to a wider class of CSPs, with a rich collection of reductions among communication complexity problems that lie at the heart of the negative results. In particular, previous works used Fourier analysis over the Boolean cube to initiate their results and the results seemed particularly tailored to functions on Boolean literals (i.e., with negations). Our techniques surprisingly allow us to get to general <i>q</i>-ary CSPs without negations by appealing to the same Fourier analytic starting point over Boolean hypercubes.</p>","PeriodicalId":50022,"journal":{"name":"Journal of the ACM","volume":"67 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140003885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Choiceless Polynomial Time with Witnessed Symmetric Choice 带见证对称选择的无选择多项式时间
IF 2.5 2区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-02-13 DOI: 10.1145/3648104
Moritz Lichter, Pascal Schweitzer

We extend Choiceless Polynomial Time (CPT), the currently only remaining promising candidate in the quest for a logic capturing Ptime, so that this extended logic has the following property: for every class of structures for which isomorphism is definable, the logic automatically captures Ptime.

For the construction of this logic we extend CPT by a witnessed symmetric choice operator. This operator allows for choices from definable orbits. But, to ensure polynomial-time evaluation, automorphisms have to be provided to certify that the choice set is indeed an orbit.

We argue that, in this logic, definable isomorphism implies definable canonization. Thereby, our construction removes the non-trivial step of extending isomorphism definability results to canonization. This step was a part of proofs that show that CPT or other logics capture Ptime on a particular class of structures. The step typically required substantial extra effort.

我们扩展了无选择多项式时间(CPT),它是目前唯一有望捕捉 Ptime 的逻辑,因此这个扩展逻辑具有以下特性:对于每一类可定义同构的结构,该逻辑都能自动捕捉 Ptime。为了构建这个逻辑,我们通过一个有见证的对称选择算子来扩展 CPT。这个算子允许从可定义的轨道中进行选择。但是,为了确保多项式时间评估,必须提供自动形态来证明选择集确实是一个轨道。我们认为,在这种逻辑中,可定义同构意味着可定义规范化。因此,我们的构造消除了将同构可定义性结果扩展到规范化的非难步骤。这一步是证明 CPT 或其他逻辑捕捉特定结构类别的 Ptime 的一部分。这一步骤通常需要大量的额外工作。
{"title":"Choiceless Polynomial Time with Witnessed Symmetric Choice","authors":"Moritz Lichter, Pascal Schweitzer","doi":"10.1145/3648104","DOIUrl":"https://doi.org/10.1145/3648104","url":null,"abstract":"<p>We extend Choiceless Polynomial Time (CPT), the currently only remaining promising candidate in the quest for a logic capturing <span>Ptime</span>, so that this extended logic has the following property: for every class of structures for which isomorphism is definable, the logic automatically captures <span>Ptime</span>. </p><p>For the construction of this logic we extend CPT by a witnessed symmetric choice operator. This operator allows for choices from definable orbits. But, to ensure polynomial-time evaluation, automorphisms have to be provided to certify that the choice set is indeed an orbit. </p><p>We argue that, in this logic, definable isomorphism implies definable canonization. Thereby, our construction removes the non-trivial step of extending isomorphism definability results to canonization. This step was a part of proofs that show that CPT or other logics capture <span>Ptime</span> on a particular class of structures. The step typically required substantial extra effort.</p>","PeriodicalId":50022,"journal":{"name":"Journal of the ACM","volume":"16 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139771267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Convergence of Datalog over (Pre-) Semirings 数据模型在(前)语义上的收敛性
IF 2.5 2区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-01-30 DOI: 10.1145/3643027
Mahmoud Abo Khamis, Hung Q. Ngo, Reinhard Pichler, Dan Suciu, Yisu Remy Wang

Recursive queries have been traditionally studied in the framework of datalog, a language that restricts recursion to monotone queries over sets, which is guaranteed to converge in polynomial time in the size of the input. But modern big data systems require recursive computations beyond the Boolean space. In this paper we study the convergence of datalog when it is interpreted over an arbitrary semiring. We consider an ordered semiring, define the semantics of a datalog program as a least fixpoint in this semiring, and study the number of steps required to reach that fixpoint, if ever. We identify algebraic properties of the semiring that correspond to certain convergence properties of datalog programs. Finally, we describe a class of ordered semirings on which one can use the semi-naïve evaluation algorithm on any datalog program.

递归查询传统上是在 datalog 框架下研究的,这种语言将递归限制在对集合的单调查询上,保证在输入大小的多项式时间内收敛。但现代大数据系统需要超越布尔空间的递归计算。在本文中,我们研究了在任意语义上解释数据模型时的收敛性。我们考虑一个有序配系,将 datalog 程序的语义定义为该配系中的一个最小定点,并研究达到该定点所需的步骤数(如果有的话)。我们确定了与 datalog 程序的某些收敛特性相对应的语义的代数特性。最后,我们描述了一类有序语义,在这类语义上,我们可以对任何 datalog 程序使用半幼稚求值算法。
{"title":"Convergence of Datalog over (Pre-) Semirings","authors":"Mahmoud Abo Khamis, Hung Q. Ngo, Reinhard Pichler, Dan Suciu, Yisu Remy Wang","doi":"10.1145/3643027","DOIUrl":"https://doi.org/10.1145/3643027","url":null,"abstract":"<p>Recursive queries have been traditionally studied in the framework of datalog, a language that restricts recursion to monotone queries over sets, which is guaranteed to converge in polynomial time in the size of the input. But modern big data systems require recursive computations beyond the Boolean space. In this paper we study the convergence of datalog when it is interpreted over an arbitrary semiring. We consider an ordered semiring, define the semantics of a datalog program as a least fixpoint in this semiring, and study the number of steps required to reach that fixpoint, if ever. We identify algebraic properties of the semiring that correspond to certain convergence properties of datalog programs. Finally, we describe a class of ordered semirings on which one can use the semi-naïve evaluation algorithm on any datalog program.</p>","PeriodicalId":50022,"journal":{"name":"Journal of the ACM","volume":"59 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139580540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Compositional Theory of Linearizability 线性化组合理论
IF 2.5 2区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-01-27 DOI: 10.1145/3643668
Arthur Oliveira Vale, Zhong Shao, Yixuan Chen

Compositionality is at the core of programming languages research and has become an important goal toward scalable verification of large systems. Despite that, there is no compositional account of linearizability, the gold standard of correctness for concurrent objects.

In this paper, we develop a compositional semantics for linearizable concurrent objects. We start by showcasing a common issue, which is independent of linearizability, in the construction of compositional models of concurrent computation: interaction with the neutral element for composition can lead to emergent behaviors, a hindrance to compositionality. Category theory provides a solution for the issue in the form of the Karoubi envelope. Surprisingly, and this is the main discovery of our work, this abstract construction is deeply related to linearizability and leads to a novel formulation of it. Notably, this new formulation neither relies on atomicity nor directly upon happens-before ordering and is only possible because of compositionality, revealing that linearizability and compositionality are intrinsically related to each other.

We use this new, and compositional, understanding of linearizability to revisit much of the theory of linearizability, providing novel, simple, algebraic proofs of the locality property and of an analogue of the equivalence with observational refinement. We show our techniques can be used in practice by connecting our semantics with a simple program logic that is nonetheless sound concerning this generalized linearizability.

可组合性是编程语言研究的核心,也是大型系统可扩展验证的重要目标。尽管如此,目前还没有关于可线性化(并发对象正确性的黄金标准)的组合解释。在本文中,我们为可线性化并发对象开发了一种组合语义。在构建并发计算的组合模型时,我们首先展示了一个与线性化无关的常见问题:与用于组合的中性元素的交互会导致突发行为,从而阻碍组合性的实现。范畴理论以卡鲁比包络的形式为这一问题提供了解决方案。令人惊奇的是,这也是我们工作的主要发现,这种抽象结构与线性化有着深刻的联系,并导致了对线性化的一种新表述。值得注意的是,这种新表述既不依赖于原子性,也不直接依赖于 "发生在先 "排序,而只是因为组成性才成为可能,这揭示了线性化和组成性之间的内在联系。我们利用这种对可线性化的新的和组成性的理解,重新审视了可线性化的大部分理论,提供了新颖、简单和代数证明,证明了局域性属性和观察细化等价性的类似物。我们将我们的语义与一个简单的程序逻辑连接起来,证明我们的技术可以用于实践,而这个简单的程序逻辑在这种广义线性化方面仍然是合理的。
{"title":"A Compositional Theory of Linearizability","authors":"Arthur Oliveira Vale, Zhong Shao, Yixuan Chen","doi":"10.1145/3643668","DOIUrl":"https://doi.org/10.1145/3643668","url":null,"abstract":"<p>Compositionality is at the core of programming languages research and has become an important goal toward scalable verification of large systems. Despite that, there is no compositional account of <i>linearizability</i>, the gold standard of correctness for concurrent objects. </p><p>In this paper, we develop a compositional semantics for linearizable concurrent objects. We start by showcasing a common issue, which is independent of linearizability, in the construction of compositional models of concurrent computation: interaction with the neutral element for composition can lead to emergent behaviors, a hindrance to compositionality. Category theory provides a solution for the issue in the form of the Karoubi envelope. Surprisingly, and this is the main discovery of our work, this abstract construction is deeply related to linearizability and leads to a novel formulation of it. Notably, this new formulation neither relies on atomicity nor directly upon happens-before ordering and is only possible <i>because</i> of compositionality, revealing that linearizability and compositionality are intrinsically related to each other. </p><p>We use this new, and compositional, understanding of linearizability to revisit much of the theory of linearizability, providing novel, simple, algebraic proofs of the <i>locality</i> property and of an analogue of the equivalence with <i>observational refinement</i>. We show our techniques can be used in practice by connecting our semantics with a simple program logic that is nonetheless sound concerning this generalized linearizability.</p>","PeriodicalId":50022,"journal":{"name":"Journal of the ACM","volume":"216 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139580404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fitting Distances by Tree Metrics Minimizing the Total Error within a Constant Factor 用树指标拟合距离,将总误差降至常数范围内最小
IF 2.5 2区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-01-02 DOI: 10.1145/3639453
Vincent Cohen-Addad, Debarati Das, Evangelos Kipouridis, Nikos Parotsidis, Mikkel Thorup

We consider the numerical taxonomy problem of fitting a positive distance function ({mathcal {D}:{Schoose 2}rightarrow mathbb {R}_{gt 0}} ) by a tree metric. We want a tree T with positive edge weights and including S among the vertices so that their distances in T match those in (mathcal {D} ). A nice application is in evolutionary biology where the tree T aims to approximate the branching process leading to the observed distances in (mathcal {D} ) [Cavalli-Sforza and Edwards 1967]. We consider the total error, that is the sum of distance errors over all pairs of points. We present a deterministic polynomial time algorithm minimizing the total error within a constant factor. We can do this both for general trees, and for the special case of ultrametrics with a root having the same distance to all vertices in S.

The problems are APX-hard, so a constant factor is the best we can hope for in polynomial time. The best previous approximation factor was O((log n)(log log n)) by Ailon and Charikar [2005] who wrote “Determining whether an O(1) approximation can be obtained is a fascinating question”.

我们考虑通过树度量拟合正距离函数({mathcal {D}:{Schoose 2}rightarrow mathbb {R}_{gt 0}} )的数值分类问题。我们想要一棵具有正边权重的树 T,其中的顶点包括 S,这样它们在 T 中的距离就能与(mathcal {D} )中的距离相匹配。一个很好的应用是在生物进化中,树 T 的目的是近似导致在 (mathcal {D} )中观察到的距离的分支过程 [Cavalli-Sforza and Edwards 1967]。我们考虑的是总误差,即所有点对的距离误差之和。我们提出了一种确定性多项式时间算法,可以在一个常数因子内最小化总误差。我们既可以针对一般的树,也可以针对根与 S 中所有顶点的距离相同的超etrics 特例。这些问题都是 APX 难问题,因此常数因子是我们在多项式时间内所能期望的最佳值。Ailon 和 Charikar [2005] 以前的最佳近似因子是 O((log n)(log log n)),他们写道:"确定能否获得 O(1) 近似值是一个引人入胜的问题"。
{"title":"Fitting Distances by Tree Metrics Minimizing the Total Error within a Constant Factor","authors":"Vincent Cohen-Addad, Debarati Das, Evangelos Kipouridis, Nikos Parotsidis, Mikkel Thorup","doi":"10.1145/3639453","DOIUrl":"https://doi.org/10.1145/3639453","url":null,"abstract":"<p>We consider the numerical taxonomy problem of fitting a positive distance function ({mathcal {D}:{Schoose 2}rightarrow mathbb {R}_{gt 0}} ) by a tree metric. We want a tree <i>T</i> with positive edge weights and including <i>S</i> among the vertices so that their distances in <i>T</i> match those in (mathcal {D} ). A nice application is in evolutionary biology where the tree <i>T</i> aims to approximate the branching process leading to the observed distances in (mathcal {D} ) [Cavalli-Sforza and Edwards 1967]. We consider the total error, that is the sum of distance errors over all pairs of points. We present a deterministic polynomial time algorithm minimizing the total error within a constant factor. We can do this both for general trees, and for the special case of ultrametrics with a root having the same distance to all vertices in <i>S</i>. </p><p>The problems are APX-hard, so a constant factor is the best we can hope for in polynomial time. The best previous approximation factor was <i>O</i>((log <i>n</i>)(log log <i>n</i>)) by Ailon and Charikar [2005] who wrote “Determining whether an <i>O</i>(1) approximation can be obtained is a fascinating question”.</p>","PeriodicalId":50022,"journal":{"name":"Journal of the ACM","volume":"25 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139082390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Byzantine Agreement with Optimal Resilience via Statistical Fraud Detection 通过统计欺诈检测实现具有最佳复原力的拜占庭协议
IF 2.5 2区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-01-02 DOI: 10.1145/3639454
Shang-En Huang, Seth Pettie, Leqi Zhu

Since the mid-1980s it has been known that Byzantine Agreement can be solved with probability 1 asynchronously, even against an omniscient, computationally unbounded adversary that can adaptively corrupt up to f < n/3 parties. Moreover, the problem is insoluble with fn/3 corruptions. However, Bracha’s [13] 1984 protocol (see also Ben-Or [8]) achieved f < n/3 resilience at the cost of exponential expected latency 2Θ(n), a bound that has never been improved in this model with f = ⌊(n − 1)/3⌋ corruptions.

In this paper, we prove that Byzantine Agreement in the asynchronous, full information model can be solved with probability 1 against an adaptive adversary that can corrupt f < n/3 parties, while incurring only polynomial latency with high probability. Our protocol follows an earlier polynomial latency protocol of King and Saia [33,34], which had suboptimalresilience, namely fn/109 [33,34].

Resilience f = (n − 1)/3 is uniquely difficult, as this is the point at which the influence of the Byzantine and honest players are of roughly equal strength. The core technical problem we solve is to design a collective coin-flipping protocol that eventuallylets us flip a coin with an unambiguous outcome. In the beginning, the influence of the Byzantine players is too powerful to overcome, and they can essentially fix the coin’s behavior at will. We guarantee that after just a polynomial number of executions of the coin-flipping protocol, either (a) the Byzantine players fail to fix the behavior of the coin (thereby ending the game) or (b) we can “blacklist” players such that the blacklisting rate for Byzantine players is at least as large as the blacklisting rate for good players. The blacklisting criterion is based on a simple statistical test of fraud detection.

自 20 世纪 80 年代中期以来,人们就知道拜占庭协议可以以概率为 1 的异步方式求解,即使是面对一个全知的、计算无界的、可以自适应地破坏多达 f < n/3 方的对手。此外,在 f ≥ n/3 次破坏的情况下,这个问题是无法解决的。然而,Bracha [13] 的 1984 协议(另见 Ben-Or [8])以指数级的预期延迟 2Θ(n) 为代价实现了 f < n/3 的恢复能力,在 f = ⌊(n - 1)/3⌋ 破坏的模型中,这一约束从未被改进过。在本文中,我们证明了在异步、全信息模型中,拜占庭协议能以 1 的概率求解,以对抗能破坏 f < n/3 方的自适应对手,同时只产生高概率的多项式延迟。我们的协议沿用了 King 和 Saia [33,34]早期的多项式延迟协议,该协议具有次优复原力,即 f≈ n/109 [33,34]。恢复力 f = (n - 1)/3 是唯一的难点,因为在这一点上,拜占庭玩家和诚实玩家的影响力大致相当。我们要解决的核心技术问题是设计一个集体掷硬币协议,最终让我们掷出一个结果明确的硬币。一开始,拜占庭玩家的影响力强大到难以克服,他们基本上可以随意修正硬币的行为。我们保证,在抛硬币协议执行了多项式次数之后,要么(a)拜占庭玩家无法固定硬币的行为(从而结束游戏),要么(b)我们可以将玩家列入 "黑名单",使拜占庭玩家的黑名单率至少与优秀玩家的黑名单率一样大。黑名单标准基于一个简单的欺诈检测统计测试。
{"title":"Byzantine Agreement with Optimal Resilience via Statistical Fraud Detection","authors":"Shang-En Huang, Seth Pettie, Leqi Zhu","doi":"10.1145/3639454","DOIUrl":"https://doi.org/10.1145/3639454","url":null,"abstract":"<p>Since the mid-1980s it has been known that Byzantine Agreement can be solved with probability 1 asynchronously, even against an omniscient, computationally unbounded adversary that can adaptively <i>corrupt</i> up to <i>f</i> &lt; <i>n</i>/3 parties. Moreover, the problem is insoluble with <i>f</i> ≥ <i>n</i>/3 corruptions. However, Bracha’s [13] 1984 protocol (see also Ben-Or [8]) achieved <i>f</i> &lt; <i>n</i>/3 resilience at the cost of <i>exponential</i> expected latency 2<sup><i>Θ</i>(<i>n</i>)</sup>, a bound that has <i>never</i> been improved in this model with <i>f</i> = ⌊(<i>n</i> − 1)/3⌋ corruptions. </p><p>In this paper, we prove that Byzantine Agreement in the asynchronous, full information model can be solved with probability 1 against an adaptive adversary that can corrupt <i>f</i> &lt; <i>n</i>/3 parties, while incurring only <i>polynomial latency with high probability</i>. Our protocol follows an earlier polynomial latency protocol of King and Saia [33,34], which had <i>suboptimal</i>\u0000resilience, namely <i>f</i> ≈ <i>n</i>/10<sup>9</sup> [33,34]. </p><p>Resilience <i>f</i> = (<i>n</i> − 1)/3 is uniquely difficult, as this is the point at which the influence of the Byzantine and honest players are of roughly equal strength. The core technical problem we solve is to design a collective coin-flipping protocol that <i>eventually</i>\u0000lets us flip a coin with an unambiguous outcome. In the beginning, the influence of the Byzantine players is too powerful to overcome, and they can essentially fix the coin’s behavior at will. We guarantee that after just a polynomial number of executions of the coin-flipping protocol, either (a) the Byzantine players fail to fix the behavior of the coin (thereby ending the game) or (b) we can “blacklist” players such that the blacklisting rate for Byzantine players is at least as large as the blacklisting rate for good players. The blacklisting criterion is based on a simple statistical test of <i>fraud detection</i>.</p>","PeriodicalId":50022,"journal":{"name":"Journal of the ACM","volume":"6 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139095927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of the ACM
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1