首页 > 最新文献

Journal of the ACM最新文献

英文 中文
Learning Equilibria in Matching Markets with Bandit Feedback 强盗反馈下匹配市场的学习均衡
IF 2.5 2区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-02-16 DOI: 10.1145/3583681
Meena Jagadeesan, Alexander Wei, Yixin Wang, Michael I. Jordan, Jacob Steinhardt
Large-scale, two-sided matching platforms must find market outcomes that align with user preferences while simultaneously learning these preferences from data. Classical notions of stability (Gale and Shapley, 1962; Shapley and Shubik, 1971) are, unfortunately, of limited value in the learning setting, given that preferences are inherently uncertain and destabilizing while they are being learned. To bridge this gap, we develop a framework and algorithms for learning stable market outcomes under uncertainty. Our primary setting is matching with transferable utilities, where the platform both matches agents and sets monetary transfers between them. We design an incentive-aware learning objective that captures the distance of a market outcome from equilibrium. Using this objective, we analyze the complexity of learning as a function of preference structure, casting learning as a stochastic multi-armed bandit problem. Algorithmically, we show that “optimism in the face of uncertainty,” the principle underlying many bandit algorithms, applies to a primal-dual formulation of matching with transfers and leads to near-optimal regret bounds. Our work takes a first step toward elucidating when and how stable matchings arise in large, data-driven marketplaces.
大规模的双边匹配平台必须找到符合用户偏好的市场结果,同时从数据中学习这些偏好。稳定性的经典概念(Gale and Shapley, 1962;Shapley和Shubik, 1971)不幸的是,在学习环境中价值有限,因为偏好在学习过程中具有固有的不确定性和不稳定性。为了弥补这一差距,我们开发了一个框架和算法来学习不确定性下的稳定市场结果。我们的主要设置是与可转让的公用事业相匹配,平台既匹配代理,又设置他们之间的货币转移。我们设计了一个激励意识学习目标,捕捉市场结果与均衡的距离。基于这一目标,我们分析了学习的复杂性作为偏好结构的函数,将学习作为一个随机的多臂强盗问题。在算法上,我们展示了“面对不确定性的乐观主义”,这是许多强盗算法的基本原则,适用于与转移匹配的原始对偶公式,并导致接近最优的后悔界限。我们的工作向阐明稳定匹配何时以及如何在大型数据驱动的市场中出现迈出了第一步。
{"title":"Learning Equilibria in Matching Markets with Bandit Feedback","authors":"Meena Jagadeesan, Alexander Wei, Yixin Wang, Michael I. Jordan, Jacob Steinhardt","doi":"10.1145/3583681","DOIUrl":"https://doi.org/10.1145/3583681","url":null,"abstract":"Large-scale, two-sided matching platforms must find market outcomes that align with user preferences while simultaneously learning these preferences from data. Classical notions of stability (Gale and Shapley, 1962; Shapley and Shubik, 1971) are, unfortunately, of limited value in the learning setting, given that preferences are inherently uncertain and destabilizing while they are being learned. To bridge this gap, we develop a framework and algorithms for learning stable market outcomes under uncertainty. Our primary setting is matching with transferable utilities, where the platform both matches agents and sets monetary transfers between them. We design an incentive-aware learning objective that captures the distance of a market outcome from equilibrium. Using this objective, we analyze the complexity of learning as a function of preference structure, casting learning as a stochastic multi-armed bandit problem. Algorithmically, we show that “optimism in the face of uncertainty,” the principle underlying many bandit algorithms, applies to a primal-dual formulation of matching with transfers and leads to near-optimal regret bounds. Our work takes a first step toward elucidating when and how stable matchings arise in large, data-driven marketplaces.","PeriodicalId":50022,"journal":{"name":"Journal of the ACM","volume":"11 1","pages":"1 - 46"},"PeriodicalIF":2.5,"publicationDate":"2023-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83992234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Robustly Learning General Mixtures of Gaussians 鲁棒学习一般高斯混合
IF 2.5 2区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-02-15 DOI: 10.1145/3583680
Allen Liu, Ankur Moitra
This work represents a natural coalescence of two important lines of work — learning mixtures of Gaussians and algorithmic robust statistics. In particular, we give the first provably robust algorithm for learning mixtures of any constant number of Gaussians. We require only mild assumptions on the mixing weights and that the total variation distance between components is bounded away from zero. At the heart of our algorithm is a new method for proving a type of dimension-independent polynomial identifiability — which we call robust identifiability — through applying a carefully chosen sequence of differential operations to certain generating functions that not only encode the parameters we would like to learn but also the system of polynomial equations we would like to solve. We show how the symbolic identities we derive can be directly used to analyze a natural sum-of-squares relaxation.
这项工作代表了两条重要工作线的自然结合-高斯和算法鲁棒统计的学习混合。特别地,我们给出了第一个可证明的鲁棒算法,用于学习任意常数高斯分布的混合物。我们只需要对混合权值进行温和的假设,并且各分量之间的总变化距离有界远离零。我们算法的核心是一种新方法,用于证明一种与维无关的多项式可辨识性——我们称之为鲁棒可辨识性——通过对某些生成函数应用精心选择的微分运算序列,这些函数不仅编码了我们想要学习的参数,而且编码了我们想要求解的多项式方程系统。我们展示了我们推导的符号恒等式如何直接用于分析自然的平方和松弛。
{"title":"Robustly Learning General Mixtures of Gaussians","authors":"Allen Liu, Ankur Moitra","doi":"10.1145/3583680","DOIUrl":"https://doi.org/10.1145/3583680","url":null,"abstract":"This work represents a natural coalescence of two important lines of work — learning mixtures of Gaussians and algorithmic robust statistics. In particular, we give the first provably robust algorithm for learning mixtures of any constant number of Gaussians. We require only mild assumptions on the mixing weights and that the total variation distance between components is bounded away from zero. At the heart of our algorithm is a new method for proving a type of dimension-independent polynomial identifiability — which we call robust identifiability — through applying a carefully chosen sequence of differential operations to certain generating functions that not only encode the parameters we would like to learn but also the system of polynomial equations we would like to solve. We show how the symbolic identities we derive can be directly used to analyze a natural sum-of-squares relaxation.","PeriodicalId":50022,"journal":{"name":"Journal of the ACM","volume":"117 1","pages":"1 - 53"},"PeriodicalIF":2.5,"publicationDate":"2023-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79878742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Correctness and Incorrectness Program Logic 正确和不正确的程序逻辑
IF 2.5 2区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-02-06 DOI: 10.1145/3582267
R. Bruni, R. Giacobazzi, R. Gori, Francesco Ranzato
Abstract interpretation is a well-known and extensively used method to extract over-approximate program invariants by a sound program analysis algorithm. Soundness means that no program errors are lost and it is, in principle, guaranteed by construction. Completeness means that the abstract interpreter reports no false alarms for all possible inputs, but this is extremely rare because it needs a very precise analysis. We introduce a weaker notion of completeness, called local completeness, which requires that no false alarms are produced only relatively to some fixed program inputs. Based on this idea, we introduce a program logic, called Local Completeness Logic for an abstract domain A, for proving both the correctness and incorrectness of program specifications. Our proof system, which is parameterized by an abstract domain A, combines over- and under-approximating reasoning. In a provable triple ⊦A [p] 𝖼 [q], 𝖼 is a program, q is an under-approximation of the strongest post-condition of 𝖼 on input p such that their abstractions in A coincide. This means that q is never too coarse, namely, under some mild assumptions, the abstract interpretation of 𝖼 does not yield false alarms for the input p iff q has no alarm. Therefore, proving ⊦A [p] 𝖼 [q] not only ensures that all the alarms raised in q are true ones, but also that if q does not raise alarms, then 𝖼 is correct. We also prove that if A is the straightforward abstraction making all program properties equivalent, then our program logic coincides with O’Hearn’s incorrectness logic, while for any other abstraction, contrary to the case of incorrectness logic, our logic can also establish program correctness.
摘要解释是一种众所周知的、广泛使用的方法,它通过一种完善的程序分析算法来提取过近似的程序不变量。健全性意味着不会丢失任何程序错误,原则上,它是由构造保证的。完整性意味着抽象解释器不会对所有可能的输入报告错误警报,但这种情况极为罕见,因为它需要非常精确的分析。我们引入了一个较弱的完整性概念,称为局部完整性,它要求仅相对于某些固定的程序输入不产生假警报。基于这一思想,我们引入了一种程序逻辑,称为抽象域a的局部完备逻辑,用于证明程序规范的正确性和不正确性。我们的证明系统由抽象域A参数化,结合了过逼近和欠逼近推理。在可证明三重体⊦a [p]𝖼[q]中,𝖼是一个程序,q是输入p上最强后置条件𝖼的一个低近似值,使得它们在a中的抽象重合。这意味着q永远不会太粗糙,也就是说,在一些温和的假设下,如果q没有报警,对𝖼的抽象解释不会对输入p产生假警报。因此,证明⊦A [p]𝖼[q]不仅保证了在q中发出的所有警报都是真实的,而且如果q没有发出警报,则𝖼是正确的。我们还证明,如果A是使所有程序属性相等的直接抽象,那么我们的程序逻辑与O 'Hearn的不正确逻辑是一致的,而对于任何其他抽象,与不正确逻辑的情况相反,我们的逻辑也可以建立程序正确性。
{"title":"A Correctness and Incorrectness Program Logic","authors":"R. Bruni, R. Giacobazzi, R. Gori, Francesco Ranzato","doi":"10.1145/3582267","DOIUrl":"https://doi.org/10.1145/3582267","url":null,"abstract":"Abstract interpretation is a well-known and extensively used method to extract over-approximate program invariants by a sound program analysis algorithm. Soundness means that no program errors are lost and it is, in principle, guaranteed by construction. Completeness means that the abstract interpreter reports no false alarms for all possible inputs, but this is extremely rare because it needs a very precise analysis. We introduce a weaker notion of completeness, called local completeness, which requires that no false alarms are produced only relatively to some fixed program inputs. Based on this idea, we introduce a program logic, called Local Completeness Logic for an abstract domain A, for proving both the correctness and incorrectness of program specifications. Our proof system, which is parameterized by an abstract domain A, combines over- and under-approximating reasoning. In a provable triple ⊦A [p] 𝖼 [q], 𝖼 is a program, q is an under-approximation of the strongest post-condition of 𝖼 on input p such that their abstractions in A coincide. This means that q is never too coarse, namely, under some mild assumptions, the abstract interpretation of 𝖼 does not yield false alarms for the input p iff q has no alarm. Therefore, proving ⊦A [p] 𝖼 [q] not only ensures that all the alarms raised in q are true ones, but also that if q does not raise alarms, then 𝖼 is correct. We also prove that if A is the straightforward abstraction making all program properties equivalent, then our program logic coincides with O’Hearn’s incorrectness logic, while for any other abstraction, contrary to the case of incorrectness logic, our logic can also establish program correctness.","PeriodicalId":50022,"journal":{"name":"Journal of the ACM","volume":"47 1","pages":"1 - 45"},"PeriodicalIF":2.5,"publicationDate":"2023-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73583749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
On the Need for Large Quantum Depth 论对大量子深度的需求
IF 2.5 2区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-01-16 DOI: https://dl.acm.org/doi/10.1145/3570637
Nai-Hui Chia, Kai-Min Chung, Ching-Yi Lai

Near-term quantum computers are likely to have small depths due to short coherence time and noisy gates. A natural approach to leverage these quantum computers is interleaving them with classical computers. Understanding the capabilities and limits of this hybrid approach is an essential topic in quantum computation. Most notably, the quantum Fourier transform can be implemented by a hybrid of logarithmic-depth quantum circuits and a classical polynomial-time algorithm. Therefore, it seems possible that quantum polylogarithmic depth is as powerful as quantum polynomial depth in the presence of classical computation. Indeed, Jozsa conjectured that “Any quantum polynomial-time algorithm can be implemented with only O(log n) quantum depth interspersed with polynomial-time classical computations.” This can be formalized as asserting the equivalence of BQP and “BQNCBPP.” However, Aaronson conjectured that “there exists an oracle separation between BQP and BPPBQNC.BQNCBPP and BPPBQNC are two natural and seemingly incomparable ways of hybrid classical-quantum computation.

In this work, we manage to prove Aaronson’s conjecture and in the meantime prove that Jozsa’s conjecture, relative to an oracle, is false. In fact, we prove a stronger statement that for any depth parameter d, there exists an oracle that separates quantum depth d and 2d+1 in the presence of classical computation. Thus, our results show that relative to oracles, doubling the quantum circuit depth does make the hybrid model more powerful, and this cannot be traded by classical computation.

由于相干时间短和噪声门,近期量子计算机可能具有较小的深度。利用这些量子计算机的一种自然方法是将它们与经典计算机交叉使用。理解这种混合方法的能力和局限性是量子计算中的一个重要主题。最值得注意的是,量子傅立叶变换可以通过对数深度量子电路和经典多项式时间算法的混合来实现。因此,在经典计算的存在下,量子多对数深度似乎有可能与量子多项式深度一样强大。事实上,Jozsa推测“任何量子多项式时间算法都可以通过O(log n)量子深度与多项式时间经典计算的穿插来实现。”这可以形式化为断言BQP和“BQNCBPP”的等价性。然而,Aaronson推测“在BQP和BPPBQNC之间存在oracle分离”。BQNCBPP和BPPBQNC是两种自然的、看似无可比拟的混合经典量子计算方式。在这项工作中,我们设法证明了Aaronson的猜想,同时证明了Jozsa的猜想,相对于神谕来说,是错误的。事实上,我们证明了一个更强的命题,即对于任何深度参数d,在经典计算的存在下,存在一个将量子深度d和2d+1分开的预言。因此,我们的结果表明,相对于预言机,加倍量子电路深度确实使混合模型更强大,这是经典计算无法替代的。
{"title":"On the Need for Large Quantum Depth","authors":"Nai-Hui Chia, Kai-Min Chung, Ching-Yi Lai","doi":"https://dl.acm.org/doi/10.1145/3570637","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3570637","url":null,"abstract":"<p>Near-term quantum computers are likely to have small depths due to short coherence time and noisy gates. A natural approach to leverage these quantum computers is interleaving them with classical computers. Understanding the capabilities and limits of this hybrid approach is an essential topic in quantum computation. Most notably, the quantum Fourier transform can be implemented by a hybrid of logarithmic-depth quantum circuits and a classical polynomial-time algorithm. Therefore, it seems possible that quantum polylogarithmic depth is as powerful as quantum polynomial depth in the presence of classical computation. Indeed, Jozsa conjectured that “<i>Any quantum polynomial-time algorithm can be implemented with only <i>O</i>(log <i>n</i>) quantum depth interspersed with polynomial-time classical computations.</i>” This can be formalized as asserting the equivalence of <monospace>BQP</monospace> and “<monospace>BQNC<sup>BPP</sup></monospace>.” However, Aaronson conjectured that “<i>there exists an oracle separation between <monospace>BQP</monospace> and <monospace>BPP<sup>BQNC</sup></monospace>.</i>” <monospace>BQNC<sup>BPP</sup></monospace> and <monospace>BPP<sup>BQNC</sup></monospace> are two natural and seemingly incomparable ways of hybrid classical-quantum computation.</p><p>In this work, we manage to prove Aaronson’s conjecture and in the meantime prove that Jozsa’s conjecture, relative to an oracle, is false. In fact, we prove a stronger statement that for any depth parameter <i>d</i>, there exists an oracle that separates quantum depth <i>d</i> and 2<i>d</i>+1 in the presence of classical computation. Thus, our results show that relative to oracles, doubling the quantum circuit depth does make the hybrid model more powerful, and this cannot be traded by classical computation.</p>","PeriodicalId":50022,"journal":{"name":"Journal of the ACM","volume":"20 13","pages":""},"PeriodicalIF":2.5,"publicationDate":"2023-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138525672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Convex Hulls of Random Order Types 随机顺序类型的凸包
IF 2.5 2区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-01-16 DOI: https://dl.acm.org/doi/10.1145/3570636
Xavier Goaoc, Emo Welzl

We establish the following two main results on order types of points in general position in the plane (realizable simple planar order types, realizable uniform acyclic oriented matroids of rank 3):

(a)

The number of extreme points in an n-point order type, chosen uniformly at random from all such order types, is on average 4+o(1). For labeled order types, this number has average (4- mbox{$frac{8}{n^2 - n +2}$}) and variance at most 3.

(b)

The (labeled) order types read off a set of n points sampled independently from the uniform measure on a convex planar domain, smooth or polygonal, or from a Gaussian distribution are concentrated, i.e., such sampling typically encounters only a vanishingly small fraction of all order types of the given size.

Result (a) generalizes to arbitrary dimension d for labeled order types with the average number of extreme points 2d+o (1) and constant variance. We also discuss to what extent our methods generalize to the abstract setting of uniform acyclic oriented matroids. Moreover, our methods show the following relative of the Erdős-Szekeres theorem: for any fixed k, as n → ∞, a proportion 1 - O(1/n) of the n-point simple order types contain a triangle enclosing a convex k-chain over an edge.

For the unlabeled case in (a), we prove that for any antipodal, finite subset of the two-dimensional sphere, the group of orientation preserving bijections is cyclic, dihedral, or one of A4, S4, or A5 (and each case is possible). These are the finite subgroups of SO(3) and our proof follows the lines of their characterization by Felix Klein.

我们建立了平面上一般位置点的阶型(可实现的简单平面阶型,可实现的秩为3的一致无环定向阵)的两个主要结果:(a)从所有这些阶型中均匀随机选择的n点阶型的极值点的数目平均为4+o(1)。对于标记的阶型,这个数字的平均值为(4- mbox{$frac{8}{n^2 - n +2}$}),方差最多为3。(b)从凸平面域、光滑或多边形或高斯分布的均匀测量中独立采样的n个点的集合中读取(标记的)阶型是集中的,即,这种采样通常只遇到给定大小的所有阶型的一小部分。结果(a)推广到任意维度d,对于有标记的阶型,极值点的平均个数为2d+o(1),方差为常数。我们还讨论了我们的方法在多大程度上推广到一致无环定向拟阵的抽象集合。此外,我们的方法还证明了Erdős-Szekeres定理的如下关系:对于任意固定k,当n→∞时,n点简单阶型的比例1 - O(1/n)包含一个在边上包有凸k链的三角形。对于(a)中的未标记情况,我们证明了对于二维球面的任何对映有限子集,保向双射群是循环的、二面体的或A4、S4、A5中的一个(每种情况都是可能的)。这些是SO(3)的有限子群,我们的证明遵循了Felix Klein对它们的描述。
{"title":"Convex Hulls of Random Order Types","authors":"Xavier Goaoc, Emo Welzl","doi":"https://dl.acm.org/doi/10.1145/3570636","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3570636","url":null,"abstract":"<p>We establish the following two main results on order types of points in general position in the plane (realizable simple planar order types, realizable uniform acyclic oriented matroids of rank 3):\u0000<p><table border=\"0\" list-type=\"ordered\" width=\"95%\"><tr><td valign=\"top\"><p>(a)</p></td><td colspan=\"5\" valign=\"top\"><p>The number of extreme points in an <i>n</i>-point order type, chosen uniformly at random from all such order types, is on average 4+<i>o</i>(1). For labeled order types, this number has average (4- mbox{$frac{8}{n^2 - n +2}$}) and variance at most 3.</p></td></tr><tr><td valign=\"top\"><p>(b)</p></td><td colspan=\"5\" valign=\"top\"><p>The (labeled) order types read off a set of <i>n</i> points sampled independently from the uniform measure on a convex planar domain, smooth or polygonal, or from a Gaussian distribution are concentrated, i.e., such sampling typically encounters only a vanishingly small fraction of all order types of the given size.</p></td></tr></table></p> Result (a) generalizes to arbitrary dimension <i>d</i> for labeled order types with the average number of extreme points 2<i>d</i>+<i>o</i> (1) and constant variance. We also discuss to what extent our methods generalize to the abstract setting of uniform acyclic oriented matroids. Moreover, our methods show the following relative of the Erdős-Szekeres theorem: for any fixed <i>k</i>, as <i>n</i> → ∞, a proportion 1 - <i>O</i>(1/<i>n</i>) of the <i>n</i>-point simple order types contain a triangle enclosing a convex <i>k</i>-chain over an edge.</p><p>For the unlabeled case in (a), we prove that for any antipodal, finite subset of the two-dimensional sphere, the group of orientation preserving bijections is cyclic, dihedral, or one of <i>A</i><sub>4</sub>, <i>S</i><sub>4</sub>, or <i>A</i><sub>5</sub> (and each case is possible). These are the finite subgroups of <i>SO</i>(3) and our proof follows the lines of their characterization by Felix Klein.</p>","PeriodicalId":50022,"journal":{"name":"Journal of the ACM","volume":"78 8","pages":""},"PeriodicalIF":2.5,"publicationDate":"2023-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138525688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lower Bounds on Implementing Mediators in Asynchronous Systems with Rational and Malicious Agents 在具有理性和恶意代理的异步系统中实现中介的下限
IF 2.5 2区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-01-02 DOI: 10.1145/3578579
I. Geffner, Joseph Y. Halpern
Abraham, Dolev, Geffner, and Halpern [1] proved that, in asynchronous systems, a (k, t)-robust equilibrium for n players and a trusted mediator can be implemented without the mediator as long as n > 4(k+t), where an equilibrium is (k, t)-robust if, roughly speaking, no coalition of t players can decrease the payoff of any of the other players, and no coalition of k players can increase their payoff by deviating. We prove that this bound is tight, in the sense that if n ≤ 4(k+t) there exist (k, t)-robust equilibria with a mediator that cannot be implemented by the players alone. Even though implementing (k, t)-robust mediators seems closely related to implementing asynchronous multiparty (k+t)-secure computation [6], to the best of our knowledge there is no known straightforward reduction from one problem to another. Nevertheless, we show that there is a non-trivial reduction from a slightly weaker notion of (k+t)-secure computation, which we call (k+t)-strict secure computation, to implementing (k, t)-robust mediators. We prove the desired lower bound by showing that there are functions on n variables that cannot be (k+t)-strictly securely computed if n ≤ 4(k+t). This also provides a simple alternative proof for the well-known lower bound of 4t+1 on asynchronous secure computation in the presence of up to t malicious agents [4, 8, 10].
Abraham, Dolev, Geffner, and Halpern[1]证明,在异步系统中,只要n >1,4 (k+t)没有中介,就可以实现n个参与者和可信中介的(k, t)鲁棒均衡,其中均衡为(k, t)鲁棒,粗略地说,如果t个参与者的联盟不会减少任何其他参与者的收益,并且k个参与者的联盟不会通过偏离来增加他们的收益。我们证明了这个界是紧的,即如果n≤4(k+t),存在(k, t)个具有中介的鲁棒均衡,且不能由参与人单独实现。尽管实现(k, t)健壮的中介似乎与实现异步多方(k+t)安全计算[6]密切相关,但据我们所知,目前还没有从一个问题直接简化到另一个问题的方法。然而,我们证明了从稍微弱一点的(k+t)安全计算的概念(我们称之为(k+t)严格安全计算)到实现(k, t)鲁棒中介的非平凡简化。我们通过证明n个变量上的函数不能是(k+t)——当n≤4(k+t)时严格安全计算,证明了期望的下界。这也为异步安全计算中存在多达t个恶意代理时众所周知的4t+1下界提供了一个简单的替代证明[4,8,10]。
{"title":"Lower Bounds on Implementing Mediators in Asynchronous Systems with Rational and Malicious Agents","authors":"I. Geffner, Joseph Y. Halpern","doi":"10.1145/3578579","DOIUrl":"https://doi.org/10.1145/3578579","url":null,"abstract":"Abraham, Dolev, Geffner, and Halpern [1] proved that, in asynchronous systems, a (k, t)-robust equilibrium for n players and a trusted mediator can be implemented without the mediator as long as n > 4(k+t), where an equilibrium is (k, t)-robust if, roughly speaking, no coalition of t players can decrease the payoff of any of the other players, and no coalition of k players can increase their payoff by deviating. We prove that this bound is tight, in the sense that if n ≤ 4(k+t) there exist (k, t)-robust equilibria with a mediator that cannot be implemented by the players alone. Even though implementing (k, t)-robust mediators seems closely related to implementing asynchronous multiparty (k+t)-secure computation [6], to the best of our knowledge there is no known straightforward reduction from one problem to another. Nevertheless, we show that there is a non-trivial reduction from a slightly weaker notion of (k+t)-secure computation, which we call (k+t)-strict secure computation, to implementing (k, t)-robust mediators. We prove the desired lower bound by showing that there are functions on n variables that cannot be (k+t)-strictly securely computed if n ≤ 4(k+t). This also provides a simple alternative proof for the well-known lower bound of 4t+1 on asynchronous secure computation in the presence of up to t malicious agents [4, 8, 10].","PeriodicalId":50022,"journal":{"name":"Journal of the ACM","volume":"2 1","pages":"1 - 21"},"PeriodicalIF":2.5,"publicationDate":"2023-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80073995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Directed Shortest Paths via Approximate Cost Balancing 基于近似成本平衡的有向最短路径
IF 2.5 2区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-12-19 DOI: https://dl.acm.org/doi/10.1145/3565019
James B. Orlin, László Végh

We present an O(nm) algorithm for all-pairs shortest paths computations in a directed graph with n nodes, m arcs, and nonnegative integer arc costs. This matches the complexity bound attained by Thorup [31] for the all-pairs problems in undirected graphs. The main insight is that shortest paths problems with approximately balanced directed cost functions can be solved similarly to the undirected case. The algorithm finds an approximately balanced reduced cost function in an O(mn log n) preprocessing step. Using these reduced costs, every shortest path query can be solved in O(m) time using an adaptation of Thorup’s component hierarchy method. The balancing result can also be applied to the ℓ-matrix balancing problem.

我们提出了一种O(nm)算法,用于计算具有n个节点,m条弧和非负整数弧代价的有向图中的全对最短路径。这与Thorup[31]对无向图中全对问题的复杂度界相匹配。主要观点是,具有近似平衡有向成本函数的最短路径问题可以与无向情况类似地解决。该算法在O(m√n log n)预处理步骤中找到一个近似平衡的降代价函数。利用这些降低的成本,每个最短路径查询都可以在O(m)时间内使用Thorup的组件层次方法进行求解。该平衡结果也可应用于求解矩阵的平衡问题。
{"title":"Directed Shortest Paths via Approximate Cost Balancing","authors":"James B. Orlin, László Végh","doi":"https://dl.acm.org/doi/10.1145/3565019","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3565019","url":null,"abstract":"<p>We present an <i>O(nm)</i> algorithm for all-pairs shortest paths computations in a directed graph with <i>n</i> nodes, <i>m</i> arcs, and nonnegative integer arc costs. This matches the complexity bound attained by Thorup [31] for the all-pairs problems in undirected graphs. The main insight is that shortest paths problems with approximately balanced directed cost functions can be solved similarly to the undirected case. The algorithm finds an approximately balanced reduced cost function in an <i>O(m</i>√ <i>n</i> log <i>n</i>) preprocessing step. Using these reduced costs, every shortest path query can be solved in <i>O(m)</i> time using an adaptation of Thorup’s component hierarchy method. The balancing result can also be applied to the ℓ<sub>∞</sub>-matrix balancing problem.</p>","PeriodicalId":50022,"journal":{"name":"Journal of the ACM","volume":"23 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2022-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138525687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Complexity of Gradient Descent: CLS = PPAD ∩ PLS 梯度下降的复杂度:CLS = PPAD∩PLS
IF 2.5 2区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-12-19 DOI: https://dl.acm.org/doi/10.1145/3568163
John Fearnley, Paul Goldberg, Alexandros Hollender, Rahul Savani

We study search problems that can be solved by performing Gradient Descent on a bounded convex polytopal domain and show that this class is equal to the intersection of two well-known classes: PPAD and PLS. As our main underlying technical contribution, we show that computing a Karush-Kuhn-Tucker (KKT) point of a continuously differentiable function over the domain [0,1]2 is PPAD ∩ PLS-complete. This is the first non-artificial problem to be shown complete for this class. Our results also imply that the class CLS (Continuous Local Search) – which was defined by Daskalakis and Papadimitriou as a more “natural” counterpart to PPAD ∩ PLS and contains many interesting problems – is itself equal to PPAD ∩ PLS.

我们研究了可以通过在有界凸多边形域上执行梯度下降来解决的搜索问题,并证明该类等于两个已知类:PPAD和PLS的交集。作为我们主要的基础技术贡献,我们证明了在域[0,1]2上计算连续可微函数的Karush-Kuhn-Tucker (KKT)点是PPAD∩PLS完备的。这是本课程第一个完整的非人工问题。我们的结果还意味着CLS(连续本地搜索)类——由Daskalakis和Papadimitriou定义为PPAD∩PLS更“自然”的对应,包含许多有趣的问题——本身等于PPAD∩PLS。
{"title":"The Complexity of Gradient Descent: CLS = PPAD ∩ PLS","authors":"John Fearnley, Paul Goldberg, Alexandros Hollender, Rahul Savani","doi":"https://dl.acm.org/doi/10.1145/3568163","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3568163","url":null,"abstract":"<p>We study search problems that can be solved by performing Gradient Descent on a bounded convex polytopal domain and show that this class is equal to the intersection of two well-known classes: PPAD and PLS. As our main underlying technical contribution, we show that computing a Karush-Kuhn-Tucker (KKT) point of a continuously differentiable function over the domain [0,1]<sup>2</sup> is PPAD ∩ PLS-complete. This is the first non-artificial problem to be shown complete for this class. Our results also imply that the class CLS (Continuous Local Search) – which was defined by Daskalakis and Papadimitriou as a more “natural” counterpart to PPAD ∩ PLS and contains many interesting problems – is itself equal to PPAD ∩ PLS.</p>","PeriodicalId":50022,"journal":{"name":"Journal of the ACM","volume":"3 2","pages":""},"PeriodicalIF":2.5,"publicationDate":"2022-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138525665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Descriptive Complexity of Temporal Constraint Satisfaction Problems 论时间约束满足问题的描述复杂性
IF 2.5 2区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-12-19 DOI: https://dl.acm.org/doi/10.1145/3566051
Manuel Bodirsky, Jakub Rydval

Finite-domain constraint satisfaction problems are either solvable by Datalog or not even expressible in fixed-point logic with counting. The border between the two regimes can be described by a universal-algebraic minor condition. For infinite-domain constraint satisfaction problems (CSPs), the situation is more complicated even if the template structure of the CSP is model-theoretically tame. We prove that there is no Maltsev condition that characterizes Datalog already for the CSPs of first-order reducts of (ℚ;<); such CSPs are called temporal CSPs and are of fundamental importance in infinite-domain constraint satisfaction. Our main result is a complete classification of temporal CSPs that can be expressed in one of the following logical formalisms: Datalog, fixed-point logic (with or without counting), or fixed-point logic with the mod-2 rank operator. The classification shows that many of the equivalent conditions in the finite fail to capture expressibility in Datalog or fixed-point logic already for temporal CSPs.

有限域约束满足问题要么是Datalog可解的,要么是在有计数的不动点逻辑中无法表达的。两种状态之间的边界可以用一个泛代数小条件来描述。对于无限域约束满足问题(CSP),即使CSP的模板结构在理论上是模型化的,情况也更为复杂。证明了(π;<)的一阶约的csp不存在表征Datalog的Maltsev条件;这种csp被称为时间csp,在无限域约束满足中具有重要意义。我们的主要结果是时间csp的完整分类,可以用以下逻辑形式之一表示:数据,定点逻辑(带或不带计数)或带mod-2秩算子的定点逻辑。该分类表明,对于时态csp,有限条件中的许多等效条件已经无法捕获Datalog或不动点逻辑中的可表达性。
{"title":"On the Descriptive Complexity of Temporal Constraint Satisfaction Problems","authors":"Manuel Bodirsky, Jakub Rydval","doi":"https://dl.acm.org/doi/10.1145/3566051","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3566051","url":null,"abstract":"<p>Finite-domain constraint satisfaction problems are either solvable by Datalog or not even expressible in fixed-point logic with counting. The border between the two regimes can be described by a universal-algebraic minor condition. For infinite-domain constraint satisfaction problems (CSPs), the situation is more complicated even if the template structure of the CSP is model-theoretically tame. We prove that there is no Maltsev condition that characterizes Datalog already for the CSPs of first-order reducts of (ℚ;&lt;); such CSPs are called <i>temporal CSPs</i> and are of fundamental importance in infinite-domain constraint satisfaction. Our main result is a complete classification of temporal CSPs that can be expressed in one of the following logical formalisms: Datalog, fixed-point logic (with or without counting), or fixed-point logic with the mod-2 rank operator. The classification shows that many of the equivalent conditions in the finite fail to capture expressibility in Datalog or fixed-point logic already for temporal CSPs.</p>","PeriodicalId":50022,"journal":{"name":"Journal of the ACM","volume":"42 9-10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2022-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138525667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Minimizing Convex Functions with Rational Minimizers 用有理最小化器最小化凸函数
IF 2.5 2区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-12-19 DOI: https://dl.acm.org/doi/10.1145/3566050
Haotian Jiang

Given a separation oracle SO for a convex function f defined on ℝn that has an integral minimizer inside a box with radius R, we show how to find an exact minimizer of f using at most

  • O(n (n log log (n)/log (n) + log (R))) calls to SO and poly (n, log (R)) arithmetic operations, or

  • O(n log (nR) calls to SO and exp (O(n)) ⋅ poly (log (R)) arithmetic operations.

When the set of minimizers of f has integral extreme points, our algorithm outputs an integral minimizer of f. This improves upon the previously best oracle complexity of O(n2 (n + log (R))) for polynomial time algorithms and O(n2 log (nR) for exponential time algorithms obtained by [Grötschel, Lovász and Schrijver, Prog. Comb. Opt. 1984, Springer 1988] over thirty years ago. Our improvement on Grötschel, Lovász and Schrijver’s result generalizes to the setting where the set of minimizers of f is a rational polyhedron with bounded vertex complexity.

For the Submodular Function Minimization problem, our result immediately implies a strongly polynomial algorithm that makes at most O(n3 log log (n)/log (n)) calls to an evaluation oracle, and an exponential time algorithm that makes at most O(n2 log (n)) calls to an evaluation oracle. These improve upon the previously best O(n3 log2(n)) oracle complexity for strongly polynomial algorithms given in [Lee, Sidford and Wong, FOCS 2015] and [Dadush, Végh and Zambelli, SODA 2018], and an exponential time algorithm with oracle complexity O(n3 log (n)) given in the former work.

Our result is achieved via a reduction to the Shortest Vector Problem in lattices. We show how an approximately shortest vector of an auxiliary lattice can be used to effectively reduce the dimension of the problem. Our analysis of the oracle complexity is based on a potential function that simultaneously captures the size of the search set and the density of the lattice, which we analyze via tools from convex geometry and lattice theory.

对于定义在一个半径为R的方框内的凸函数f,我们给出了一个分离oracle SO,它在一个半径为R的方框内有一个积分极小值,我们展示了如何使用at most (n (n log log (n)/log (n) + log (R)))调用SO和poly (n, log (R))算术运算,orO(n log (nR)调用SO和exp (O(n))⋅poly (log (R))算术运算来找到f的精确极小值。当f的极小值集具有积分极值点时,我们的算法输出f的积分极小值。这改进了先前的最佳oracle复杂度,对于多项式时间算法为O(n2 (n + log (R))),对于由[Grötschel, Lovász和Schrijver, Prog]获得的指数时间算法为O(n2 log (nR))。梳子。[Opt. 1984, Springer 1988]三十多年前。我们对Grötschel, Lovász和Schrijver的结果的改进推广到f的最小化集合是一个有界顶点复杂度的有理多面体的设置。对于次模函数最小化问题,我们的结果立即暗示了一个强多项式算法,它最多调用O(n3 log log (n)/log (n))次求值oracle,以及一个指数时间算法,它最多调用O(n2 log (n))次求值oracle。这些改进了先前在[Lee, Sidford和Wong, FOCS 2015]和[Dadush, v和Zambelli, SODA 2018]中给出的强多项式算法的最佳O(n3 log2(n)) oracle复杂度,以及先前工作中给出的oracle复杂度为O(n3 log (n))的指数时间算法。我们的结果是通过简化到格中的最短向量问题来实现的。我们展示了如何使用辅助晶格的近似最短向量来有效地降低问题的维数。我们对oracle复杂性的分析是基于一个潜在函数,该函数同时捕获了搜索集的大小和晶格的密度,我们通过凸几何和晶格理论的工具进行分析。
{"title":"Minimizing Convex Functions with Rational Minimizers","authors":"Haotian Jiang","doi":"https://dl.acm.org/doi/10.1145/3566050","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3566050","url":null,"abstract":"<p>Given a separation oracle SO for a convex function <i>f</i> defined on ℝ<sup>n</sup> that has an integral minimizer inside a box with radius <i>R</i>, we show how to find an exact minimizer of <i>f</i> using at most\u0000<p><ul><li><p><i>O(n (n</i> log log <i>(n)/</i>log <i>(n)</i> + log (<i>R</i>))) calls to SO and poly (<i>n</i>, log (<i>R</i>)) arithmetic operations, or</p></li><li><p><i>O(n</i> log <i>(nR)</i> calls to SO and exp (<i>O(n)</i>) ⋅ poly (log <i>(R)</i>) arithmetic operations.</p></li></ul></p></p><p>When the set of minimizers of <i>f</i> has integral extreme points, our algorithm outputs an integral minimizer of <i>f</i>. This improves upon the previously best oracle complexity of <i>O(n</i><sup>2</sup> (<i>n</i> + log (<i>R</i>))) for polynomial time algorithms and <i>O(n</i><sup>2</sup> log (<i>nR</i>) for exponential time algorithms obtained by [Grötschel, Lovász and Schrijver, Prog. Comb. Opt. 1984, Springer 1988] over thirty years ago. Our improvement on Grötschel, Lovász and Schrijver’s result generalizes to the setting where the set of minimizers of <i>f</i> is a rational polyhedron with bounded vertex complexity.</p><p>For the Submodular Function Minimization problem, our result immediately implies a strongly polynomial algorithm that makes at most <i>O(n</i><sup>3</sup> log log (<i>n</i>)/log (<i>n</i>)) calls to an evaluation oracle, and an exponential time algorithm that makes at most <i>O(n</i><sup>2</sup> log (<i>n</i>)) calls to an evaluation oracle. These improve upon the previously best <i>O(n</i><sup>3</sup> log<sup>2</sup>(<i>n</i>)) oracle complexity for strongly polynomial algorithms given in [Lee, Sidford and Wong, FOCS 2015] and [Dadush, Végh and Zambelli, SODA 2018], and an exponential time algorithm with oracle complexity <i>O(n</i><sup>3</sup> log (<i>n</i>)) given in the former work.</p><p>Our result is achieved via a reduction to the Shortest Vector Problem in lattices. We show how an approximately shortest vector of an auxiliary lattice can be used to effectively reduce the dimension of the problem. Our analysis of the oracle complexity is based on a potential function that simultaneously captures the size of the search set and the density of the lattice, which we analyze via tools from convex geometry and lattice theory.</p>","PeriodicalId":50022,"journal":{"name":"Journal of the ACM","volume":"68 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2022-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138525745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of the ACM
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1