首页 > 最新文献

Journal of Computer and System Sciences最新文献

英文 中文
Interaction graphs of isomorphic automata networks I: Complete digraph and minimum in-degree 同构自动机网络的交互图I:完全有向图和最小in度
IF 1.1 3区 计算机科学 Q2 Mathematics Pub Date : 2023-05-25 DOI: 10.1016/j.jcss.2023.05.003
Florian Bridoux , Kévin Perrot , Aymeric Picard Marchetto , Adrien Richard

An automata network with n components over a finite alphabet Q of size q is a discrete dynamical system described by the successive iterations of a function f:QnQn. In most applications, the main parameter is the interaction graph of f: the digraph with vertex set [n] that contains an arc from j to i if fi depends on input j. What can be said on the set G(f) of the interaction graphs of the automata networks isomorphic to f? It seems that this simple question has never been studied. Here, we report some basic facts. First, we prove that if n5 or q3 and f is neither the identity nor constant, then G(f) always contains the complete digraph Kn, with n2 arcs. Then, we prove that G(f) always contains a digraph whose minimum in-degree is bounded as a function of q. Hence, if n is large with respect to q, then G(f) cannot only contain Kn. However, we prove that G(f) can contain only dense digraphs, with at least n2/4 arcs.

在大小为Q的有限字母表Q上具有n个分量的自动机网络是由函数f:Qn的连续迭代描述的离散动力系统→问题。在大多数应用中,主要参数是f的交互图:如果fi依赖于输入j,则具有顶点集[n]的有向图包含从j到i的弧。同构于f的自动机网络的交互图的集合G(f)上可以说什么?这个简单的问题似乎从未被研究过。在这里,我们报告一些基本事实。首先,我们证明了如果n≥5或q≥3且f既不是恒等式也不是常数,则G(f)总是包含具有n2个弧的完全有向图Kn。然后,我们证明了G(f)总是包含一个有向图,其最小度作为q的函数是有界的。因此,如果n相对于q很大,那么G(f(f)不能只包含Kn。然而,我们证明G(f。
{"title":"Interaction graphs of isomorphic automata networks I: Complete digraph and minimum in-degree","authors":"Florian Bridoux ,&nbsp;Kévin Perrot ,&nbsp;Aymeric Picard Marchetto ,&nbsp;Adrien Richard","doi":"10.1016/j.jcss.2023.05.003","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.05.003","url":null,"abstract":"<div><p><span>An automata network with </span><em>n</em> components over a finite alphabet <em>Q</em> of size <em>q</em><span> is a discrete dynamical system described by the successive iterations of a function </span><span><math><mi>f</mi><mo>:</mo><msup><mrow><mi>Q</mi></mrow><mrow><mi>n</mi></mrow></msup><mo>→</mo><msup><mrow><mi>Q</mi></mrow><mrow><mi>n</mi></mrow></msup></math></span>. In most applications, the main parameter is the interaction graph of <em>f</em><span>: the digraph with vertex set </span><span><math><mo>[</mo><mi>n</mi><mo>]</mo></math></span> that contains an arc from <em>j</em> to <em>i</em> if <span><math><msub><mrow><mi>f</mi></mrow><mrow><mi>i</mi></mrow></msub></math></span> depends on input <em>j</em>. What can be said on the set <span><math><mi>G</mi><mo>(</mo><mi>f</mi><mo>)</mo></math></span> of the interaction graphs of the automata networks isomorphic to <em>f</em>? It seems that this simple question has never been studied. Here, we report some basic facts. First, we prove that if <span><math><mi>n</mi><mo>≥</mo><mn>5</mn></math></span> or <span><math><mi>q</mi><mo>≥</mo><mn>3</mn></math></span> and <em>f</em> is neither the identity nor constant, then <span><math><mi>G</mi><mo>(</mo><mi>f</mi><mo>)</mo></math></span> always contains the complete digraph <span><math><msub><mrow><mi>K</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span>, with <span><math><msup><mrow><mi>n</mi></mrow><mrow><mn>2</mn></mrow></msup></math></span> arcs. Then, we prove that <span><math><mi>G</mi><mo>(</mo><mi>f</mi><mo>)</mo></math></span> always contains a digraph whose minimum in-degree is bounded as a function of <em>q</em>. Hence, if <em>n</em> is large with respect to <em>q</em>, then <span><math><mi>G</mi><mo>(</mo><mi>f</mi><mo>)</mo></math></span> cannot only contain <span><math><msub><mrow><mi>K</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span>. However, we prove that <span><math><mi>G</mi><mo>(</mo><mi>f</mi><mo>)</mo></math></span> can contain only dense digraphs, with at least <span><math><mo>⌊</mo><msup><mrow><mi>n</mi></mrow><mrow><mn>2</mn></mrow></msup><mo>/</mo><mn>4</mn><mo>⌋</mo></math></span> arcs.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"138 ","pages":"Article 103458"},"PeriodicalIF":1.1,"publicationDate":"2023-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49723541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detours in directed graphs 有向图中的Detours
IF 1.1 3区 计算机科学 Q2 Mathematics Pub Date : 2023-05-22 DOI: 10.1016/j.jcss.2023.05.001
Fedor V. Fomin , Petr A. Golovach , William Lochet , Danil Sagunov , Saket Saurabh , Kirill Simonov

We study two “above guarantee” versions of the classical Longest Path problem on undirected and directed graphs and obtain the following results. In the first variant of Longest Path that we study, called Longest Detour, the task is to decide whether a graph has an (s,t)-path of length at least distG(s,t)+k. Bezáková et al. [7] proved that on undirected graphs the problem is fixed-parameter tractable (FPT). Our first main result establishes a connection between Longest Detour on directed graphs and 3- Disjoint Paths on directed graphs. Using these new insights, we design a 2O(k)nO(1) time algorithm for the problem on directed planar graphs. Furthermore, the new approach yields a significantly faster FPT algorithm on undirected graphs. In the second variant of Longest Path, namely Longest Path above Diameter, the task is to decide whether the graph has a path of length at least diam(G)+k. We obtain dichotomy results about Longest Path above Diameter on undirected and directed graphs.

我们研究了无向图和有向图上经典最长路径问题的两个“上保证”版本,得到了以下结果。在我们研究的最长路径的第一个变体中,称为最长Detour,任务是确定图是否具有长度至少为distG(s,t)+k的(s,t)路径。Bezáková等人[7]证明了在无向图上问题是固定参数可处理的(FPT)。我们的第一个主要结果建立了有向图上的最长Detour和有向图的3-不联合路径之间的联系。利用这些新的见解,我们设计了一个求解有向平面图问题的2O(k)·nO(1)时间算法。此外,新方法在无向图上产生了明显更快的FPT算法。在最长路径的第二种变体中,即直径以上的最长路径,任务是决定图是否具有长度至少为直径(G)+k的路径。我们在无向图和有向图上得到了关于直径以上最长路径的二分法结果。
{"title":"Detours in directed graphs","authors":"Fedor V. Fomin ,&nbsp;Petr A. Golovach ,&nbsp;William Lochet ,&nbsp;Danil Sagunov ,&nbsp;Saket Saurabh ,&nbsp;Kirill Simonov","doi":"10.1016/j.jcss.2023.05.001","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.05.001","url":null,"abstract":"<div><p>We study two “above guarantee” versions of the classical <span>Longest Path</span> problem on undirected and directed graphs and obtain the following results. In the first variant of <span>Longest Path</span> that we study, called <span>Longest Detour</span>, the task is to decide whether a graph has an <span><math><mo>(</mo><mi>s</mi><mo>,</mo><mi>t</mi><mo>)</mo></math></span>-path of length at least <span><math><msub><mrow><mi>dist</mi></mrow><mrow><mi>G</mi></mrow></msub><mo>(</mo><mi>s</mi><mo>,</mo><mi>t</mi><mo>)</mo><mo>+</mo><mi>k</mi></math></span>. Bezáková et al. <span>[7]</span> proved that on undirected graphs the problem is fixed-parameter tractable (<span><math><mi>FPT</mi></math></span>). Our first main result establishes a connection between <span>Longest Detour</span> on directed graphs and 3- <span>Disjoint Paths</span> on directed graphs. Using these new insights, we design a <span><math><msup><mrow><mn>2</mn></mrow><mrow><mi>O</mi><mo>(</mo><mi>k</mi><mo>)</mo></mrow></msup><mo>⋅</mo><msup><mrow><mi>n</mi></mrow><mrow><mi>O</mi><mo>(</mo><mn>1</mn><mo>)</mo></mrow></msup></math></span> time algorithm for the problem on directed planar graphs. Furthermore, the new approach yields a significantly faster <span><math><mi>FPT</mi></math></span> algorithm on undirected graphs. In the second variant of <span>Longest Path</span>, namely <span>Longest Path above Diameter</span>, the task is to decide whether the graph has a path of length at least <span><math><mi>diam</mi><mo>(</mo><mi>G</mi><mo>)</mo><mo>+</mo><mi>k</mi></math></span>. We obtain dichotomy results about <span>Longest Path above Diameter</span> on undirected and directed graphs.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"137 ","pages":"Pages 66-86"},"PeriodicalIF":1.1,"publicationDate":"2023-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49762902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Linear-time 2-party secure merge from additively homomorphic encryption 加性同态加密的线性时间二部分安全合并
IF 1.1 3区 计算机科学 Q2 Mathematics Pub Date : 2023-05-11 DOI: 10.1016/j.jcss.2023.04.007
Brett Hemenway Falk , Rohit Nema , Rafail Ostrovsky

We present a linear-time, space and communication data-oblivious algorithm for securely merging two private, sorted lists into a single sorted, secret-shared list in the two party setting. Although merging two sorted lists can be done insecurely in linear time, previous secure merge algorithms all require super-linear time and communication. A key feature of our construction is a novel method to obliviously traverse permuted lists in sorted order. Our algorithm only requires black-box use of the underlying additively homomorphic cryptosystem and generic secure computation protocols for comparison and equality testing.

我们提出了一种线性时间、空间和通信数据遗忘算法,用于在双方设置中安全地将两个私有的排序列表合并为一个单独的排序的秘密共享列表。虽然合并两个排序列表可以在线性时间内不安全地完成,但以前的安全合并算法都需要超线性时间和通信。我们构建的一个关键特征是一种新颖的方法,可以按排序顺序无意地遍历排列列表。我们的算法只需要黑盒使用底层的加性同态密码系统和通用安全计算协议进行比较和等式测试。
{"title":"Linear-time 2-party secure merge from additively homomorphic encryption","authors":"Brett Hemenway Falk ,&nbsp;Rohit Nema ,&nbsp;Rafail Ostrovsky","doi":"10.1016/j.jcss.2023.04.007","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.04.007","url":null,"abstract":"<div><p>We present a linear-time, space and communication <em>data-oblivious</em> algorithm for securely merging two private, sorted lists into a single sorted, secret-shared list in the <em>two</em> party setting. Although merging two sorted lists can be done <em>insecurely</em> in linear time, previous <em>secure</em> merge algorithms all require super-linear time and communication. A key feature of our construction is a novel method to <em>obliviously</em> traverse permuted lists in sorted order. Our algorithm only requires black-box use of the underlying additively homomorphic cryptosystem and generic secure computation protocols for comparison and equality testing.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"137 ","pages":"Pages 37-49"},"PeriodicalIF":1.1,"publicationDate":"2023-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49762882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Space characterizations of complexity measures and size-space trade-offs in propositional proof systems 命题证明系统中复杂性度量和大小-空间权衡的空间表征
IF 1.1 3区 计算机科学 Q2 Mathematics Pub Date : 2023-05-04 DOI: 10.1016/j.jcss.2023.04.006
Theodoros Papamakarios , Alexander Razborov

We identify two new clusters of proof complexity measures equal up to polynomial and logn factors. The first cluster contains the logarithm of tree-like resolution size, regularized clause and monomial space, and clause space, ordinary and regularized, in regular and tree-like resolution. Consequently, separating clause or monomial space from the logarithm of tree-like resolution size is equivalent to showing strong trade-offs between clause space and length, and equivalent to showing super-critical trade-offs between clause space and depth. The second cluster contains width, Σ2 space (a generalization of clause space to depth 2 Frege systems), ordinary and regularized, and the logarithm of tree-like R(log) size. As an application, we improve a known size-space trade-off for polynomial calculus with resolution. We further show a quadratic lower bound on tree-like resolution size for formulas refutable in clause space 4, and introduce a measure intermediate between depth and the logarithm of tree-like resolution size.

我们确定了两个新的证明复杂度测度簇,它们等于多项式和对数⁡n个因素。第一个簇包含树状分辨率大小的对数、正则子句和单项式空间,以及正则和树状分辨率中的正则和正则子句空间。因此,从树状分辨率大小的对数中分离子句或单项式空间,相当于在子句空间和长度之间进行了强有力的权衡,相当于显示了子句空间和深度之间的超临界权衡。第二个簇包含宽度,∑2空间(子句空间到深度2 Frege系统的推广),普通的和正则的,以及树状R的对数(log⁡) 大小作为一个应用,我们改进了具有分辨率的多项式演算的已知大小空间权衡。我们进一步给出了子句空间4中可反驳公式的类树分辨率大小的二次下界,并引入了类树分辨率的深度和对数之间的测度。
{"title":"Space characterizations of complexity measures and size-space trade-offs in propositional proof systems","authors":"Theodoros Papamakarios ,&nbsp;Alexander Razborov","doi":"10.1016/j.jcss.2023.04.006","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.04.006","url":null,"abstract":"<div><p>We identify two new clusters of proof complexity measures equal up to polynomial and <span><math><mi>log</mi><mo>⁡</mo><mi>n</mi></math></span> factors. The first cluster contains the logarithm of tree-like resolution size, regularized clause and monomial space, and clause space, ordinary and regularized, in regular and tree-like resolution. Consequently, separating clause or monomial space from the logarithm of tree-like resolution size is equivalent to showing strong trade-offs between clause space and length, and equivalent to showing super-critical trade-offs between clause space and depth. The second cluster contains width, <span><math><msub><mrow><mi>Σ</mi></mrow><mrow><mn>2</mn></mrow></msub></math></span> space (a generalization of clause space to depth 2 Frege systems), ordinary and regularized, and the logarithm of tree-like <span><math><mi>R</mi><mo>(</mo><mi>log</mi><mo>⁡</mo><mo>)</mo></math></span> size. As an application, we improve a known size-space trade-off for polynomial calculus with resolution. We further show a quadratic lower bound on tree-like resolution size for formulas refutable in clause space 4, and introduce a measure intermediate between depth and the logarithm of tree-like resolution size.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"137 ","pages":"Pages 20-36"},"PeriodicalIF":1.1,"publicationDate":"2023-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49739315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computing maximum matchings in temporal graphs 计算时间图中的最大匹配
IF 1.1 3区 计算机科学 Q2 Mathematics Pub Date : 2023-05-04 DOI: 10.1016/j.jcss.2023.04.005
George B. Mertzios , Hendrik Molter , Rolf Niedermeier , Viktor Zamaraev , Philipp Zschoche

Temporal graphs are graphs whose topology is subject to discrete changes over time. Given a static underlying graph G, a temporal graph is represented by assigning a set of integer time-labels to every edge e of G, indicating the discrete time steps at which e is active. We introduce and study the complexity of a natural temporal extension of the classical graph problem Maximum Matching, taking into account the dynamic nature of temporal graphs. In our problem, Maximum Temporal Matching, we are looking for the largest possible number of time-labeled edges (simply time-edges) (e,t) such that no vertex is matched more than once within any time window of Δ consecutive time slots, where ΔN is given. We prove strong computational hardness results for Maximum Temporal Matching, even for elementary cases, as well as fixed-parameter algorithms with respect to natural parameters and polynomial-time approximation algorithms.

时态图是拓扑结构随时间发生离散变化的图。给定静态底层图G,时间图通过将一组整数时间标签分配给G的每条边e来表示,指示e活动的离散时间步长。考虑到时间图的动态性质,我们引入并研究了经典图问题最大匹配的自然时间扩展的复杂性。在我们的问题“最大时间匹配”中,我们正在寻找尽可能多的时间标记边(简称时间边)(e,t),使得在Δ连续时隙的任何时间窗口内,没有顶点匹配超过一次,其中Δ∈N是给定的。我们证明了最大时间匹配的强计算硬度结果,即使是在基本情况下,以及相对于自然参数的固定参数算法和多项式时间近似算法。
{"title":"Computing maximum matchings in temporal graphs","authors":"George B. Mertzios ,&nbsp;Hendrik Molter ,&nbsp;Rolf Niedermeier ,&nbsp;Viktor Zamaraev ,&nbsp;Philipp Zschoche","doi":"10.1016/j.jcss.2023.04.005","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.04.005","url":null,"abstract":"<div><p><span>Temporal graphs are graphs whose topology is subject to discrete changes over time. Given a static underlying graph </span><em>G</em>, a temporal graph is represented by assigning a set of integer time-labels to every edge <em>e</em> of <em>G</em><span>, indicating the discrete time steps at which </span><em>e</em><span><span> is active. We introduce and study the complexity of a natural temporal extension of the </span>classical graph problem </span><span>Maximum Matching</span>, taking into account the dynamic nature of temporal graphs. In our problem, <span>Maximum Temporal Matching</span>, we are looking for the largest possible number of time-labeled edges (simply <em>time-edges</em>) <span><math><mo>(</mo><mi>e</mi><mo>,</mo><mi>t</mi><mo>)</mo></math></span> such that no vertex is matched more than once within any time window of Δ consecutive time slots, where <span><math><mi>Δ</mi><mo>∈</mo><mi>N</mi></math></span> is given. We prove strong computational hardness results for <span>Maximum Temporal Matching</span><span>, even for elementary cases, as well as fixed-parameter algorithms with respect to natural parameters and polynomial-time approximation algorithms.</span></p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"137 ","pages":"Pages 1-19"},"PeriodicalIF":1.1,"publicationDate":"2023-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49739744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved IP lookup technology for trie-based data structures 改进了基于尝试的数据结构的IP查找技术
IF 1.1 3区 计算机科学 Q2 Mathematics Pub Date : 2023-05-01 DOI: 10.1016/j.jcss.2022.10.003
Yen-Heng Lin , Sun-Yuan Hsieh

Many Internet protocol (IP) lookup algorithms have been formulated to improve network performance. This study reviewed and experimentally evaluated technologies for trie-based methods that reduce memory access, memory consumption and IP lookup time. Experiments involving binary tries (for simplicity) were conducted on four real-world data sets, two of which were on IPv4 router tables (855,997 and 876,489 active prefixes) and two of which were on IPv6 router tables (155,310 and 157,579 active prefixes). Technologies designed to reduce time taken (at the expense of memory consumption) worked well for IPv4, and those designed to reduce memory consumption worked well for IPv6. Various combinations of these technologies were applied together in the experiments.

已经制定了许多因特网协议(IP)查找算法来提高网络性能。这项研究回顾并实验评估了基于trie的方法的技术,这些方法可以减少内存访问、内存消耗和IP查找时间。涉及二进制尝试的实验(为了简单起见)在四个真实世界的数据集上进行,其中两个在IPv4路由器表(855997和876489个活动前缀)上,两个在IPv6路由器表(155310和157579个活跃前缀)上。旨在减少耗时(以内存消耗为代价)的技术在IPv4中运行良好,而那些旨在减少内存消耗的技术在IPv6中运行良好。这些技术的各种组合被一起应用于实验中。
{"title":"Improved IP lookup technology for trie-based data structures","authors":"Yen-Heng Lin ,&nbsp;Sun-Yuan Hsieh","doi":"10.1016/j.jcss.2022.10.003","DOIUrl":"https://doi.org/10.1016/j.jcss.2022.10.003","url":null,"abstract":"<div><p>Many Internet protocol (IP) lookup algorithms have been formulated to improve network performance. This study reviewed and experimentally evaluated technologies for trie-based methods that reduce memory access, memory consumption and IP lookup time. Experiments involving binary tries (for simplicity) were conducted on four real-world data sets, two of which were on IPv4 router tables (855,997 and 876,489 active prefixes) and two of which were on IPv6 router tables (155,310 and 157,579 active prefixes). Technologies designed to reduce time taken (at the expense of memory consumption) worked well for IPv4, and those designed to reduce memory consumption worked well for IPv6. Various combinations of these technologies were applied together in the experiments.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"133 ","pages":"Pages 41-55"},"PeriodicalIF":1.1,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49725737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
p-Edge/vertex-connected vertex cover: Parameterized and approximation algorithms p边/顶点连接的顶点覆盖:参数化和近似算法
IF 1.1 3区 计算机科学 Q2 Mathematics Pub Date : 2023-05-01 DOI: 10.1016/j.jcss.2022.11.002
Carl Einarson , Gregory Gutin , Bart M.P. Jansen , Diptapriyo Majumdar , Magnus Wahlström

We introduce and study two natural generalizations of the Connected Vertex Cover (VC) problem: the p-Edge-Connected and p-Vertex-Connected VC problem (where p2 is a fixed integer). We obtain an 2O(pk)nO(1)-time algorithm for p-Edge-Connected VC and an 2O(k2)nO(1)-time algorithm for p-Vertex-Connected VC. Thus, like Connected VC, both constrained VC problems are FPT. Furthermore, like Connected VC, neither problem admits a polynomial kernel unless NP ⊆ coNP/poly, which is highly unlikely. We prove however that both problems admit time efficient polynomial sized approximate kernelization schemes. Finally, we describe a 2(p+1)-approximation algorithm for the p-Edge-Connected VC. The proofs for the new VC problems require more sophisticated arguments than for Connected VC. In particular, for the approximation algorithm we use Gomory-Hu trees and for the approximate kernels a result on small-size spanning p-vertex/edge-connected subgraphs of a p-vertex/edge-connected graph by Nishizeki and Poljak (1994) [30] and Nagamochi and Ibaraki (1992) [27].

我们引入并研究了连通顶点覆盖(VC)问题的两个自然推广:p-边连通和p-顶点连通VC问题(其中p≥2是固定整数)。我们得到了p-边连通VC的一个2O(pk)nO(1)时间算法和p-顶点连通VC的2O(k2)nO(1)算法。因此,与连通VC一样,这两个约束VC问题都是FPT。此外,与连通VC一样,这两个问题都不允许多项式核,除非NP⊆coNP/poly,这是极不可能的。然而,我们证明了这两个问题都允许时间有效的多项式大小的近似核化方案。最后,我们描述了p-Edge-Connected VC的2(p+1)-近似算法。新VC问题的证明需要比连通VC更复杂的参数。特别是,对于近似算法,我们使用Gomory-Hu树,对于近似核,Nishizeki和Poljak(1994)[30]以及Nagamochi和Ibaraki(1992)[27]关于p顶点/边连通图的小尺寸生成p顶点/边缘连通子图的结果。
{"title":"p-Edge/vertex-connected vertex cover: Parameterized and approximation algorithms","authors":"Carl Einarson ,&nbsp;Gregory Gutin ,&nbsp;Bart M.P. Jansen ,&nbsp;Diptapriyo Majumdar ,&nbsp;Magnus Wahlström","doi":"10.1016/j.jcss.2022.11.002","DOIUrl":"https://doi.org/10.1016/j.jcss.2022.11.002","url":null,"abstract":"<div><p>We introduce and study two natural generalizations of the Connected Vertex Cover (VC) problem: the <em>p</em>-Edge-Connected and <em>p</em>-Vertex-Connected VC problem (where <span><math><mi>p</mi><mo>≥</mo><mn>2</mn></math></span> is a fixed integer). We obtain an <span><math><msup><mrow><mn>2</mn></mrow><mrow><mi>O</mi><mo>(</mo><mi>p</mi><mi>k</mi><mo>)</mo></mrow></msup><msup><mrow><mi>n</mi></mrow><mrow><mi>O</mi><mo>(</mo><mn>1</mn><mo>)</mo></mrow></msup></math></span>-time algorithm for <em>p</em>-Edge-Connected VC and an <span><math><msup><mrow><mn>2</mn></mrow><mrow><mi>O</mi><mo>(</mo><msup><mrow><mi>k</mi></mrow><mrow><mn>2</mn></mrow></msup><mo>)</mo></mrow></msup><msup><mrow><mi>n</mi></mrow><mrow><mi>O</mi><mo>(</mo><mn>1</mn><mo>)</mo></mrow></msup></math></span>-time algorithm for <em>p</em>-Vertex-Connected VC. Thus, like Connected VC, both constrained VC problems are FPT. Furthermore, like Connected VC, neither problem admits a polynomial kernel unless NP ⊆ coNP/poly, which is highly unlikely. We prove however that both problems admit time efficient polynomial sized approximate kernelization schemes. Finally, we describe a <span><math><mn>2</mn><mo>(</mo><mi>p</mi><mo>+</mo><mn>1</mn><mo>)</mo></math></span>-approximation algorithm for the <em>p</em>-Edge-Connected VC. The proofs for the new VC problems require more sophisticated arguments than for Connected VC. In particular, for the approximation algorithm we use Gomory-Hu trees and for the approximate kernels a result on small-size spanning <em>p</em>-vertex/edge-connected subgraphs of a <em>p</em>-vertex/edge-connected graph by Nishizeki and Poljak (1994) <span>[30]</span> and Nagamochi and Ibaraki (1992) <span>[27]</span>.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"133 ","pages":"Pages 23-40"},"PeriodicalIF":1.1,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49725779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Deterministic non-adaptive contention resolution on a shared channel 共享通道上的确定性非自适应争用解析
IF 1.1 3区 计算机科学 Q2 Mathematics Pub Date : 2023-05-01 DOI: 10.1016/j.jcss.2022.11.001
Gianluca De Marco , Dariusz R. Kowalski , Grzegorz Stachowiak

In a multiple access channel, autonomous stations are able to transmit and listen to a shared device. A fundamental problem, called contention resolution, is to allow any station to successfully deliver its message by resolving the conflicts that arise when several stations transmit simultaneously. Despite a long history on such a problem, most of the results deal with the static setting when all stations start simultaneously, while many fundamental questions remain open in the realistic scenario when stations can join the channel at arbitrary times. In this paper, we explore the impact that three major channel features (asynchrony among stations, knowledge of the number of contenders and possibility of switching off stations after a successful transmission) can have on the time complexity of non-adaptive deterministic algorithms. We establish upper and lower bounds allowing to understand which parameters permit time-efficient contention resolution and which do not.

在多址信道中,自主站能够发送和监听共享设备。一个称为争用解决的基本问题是,通过解决几个站同时传输时出现的冲突,允许任何一个站成功地传递其消息。尽管在这个问题上有很长的历史,但大多数结果都涉及所有站点同时启动时的静态设置,而在站点可以在任意时间加入信道的现实场景中,许多基本问题仍然悬而未决。在本文中,我们探讨了三个主要信道特征(站点之间的异步性、竞争者数量的知识以及成功传输后关闭站点的可能性)对非自适应确定性算法的时间复杂性的影响。我们建立了上限和下限,以便了解哪些参数允许时间有效的争用解决,哪些参数不允许。
{"title":"Deterministic non-adaptive contention resolution on a shared channel","authors":"Gianluca De Marco ,&nbsp;Dariusz R. Kowalski ,&nbsp;Grzegorz Stachowiak","doi":"10.1016/j.jcss.2022.11.001","DOIUrl":"https://doi.org/10.1016/j.jcss.2022.11.001","url":null,"abstract":"<div><p><span>In a multiple access channel, autonomous stations are able to transmit and listen to a shared device. A fundamental problem, called </span><span><em>contention resolution</em></span>, is to allow any station to successfully deliver its message by resolving the conflicts that arise when several stations transmit simultaneously. Despite a long history on such a problem, most of the results deal with the static setting when all stations start simultaneously, while many fundamental questions remain open in the realistic scenario when stations can join the channel at arbitrary times. In this paper, we explore the impact that three major channel features (asynchrony among stations, knowledge of the number of contenders and possibility of switching off stations after a successful transmission) can have on the time complexity of non-adaptive deterministic algorithms. We establish upper and lower bounds allowing to understand which parameters permit time-efficient contention resolution and which do not.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"133 ","pages":"Pages 1-22"},"PeriodicalIF":1.1,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49725774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Almost optimal query algorithm for hitting set using a subset query 几乎最优的查询算法命中集使用子集查询
IF 1.1 3区 计算机科学 Q2 Mathematics Pub Date : 2023-04-25 DOI: 10.1016/j.jcss.2023.02.002
Arijit Bishnu , Arijit Ghosh , Sudeshna Kolay , Gopinath Mishra , Saket Saurabh

In this paper, we focus on Hitting-Set, a fundamental problem in combinatorial optimization, through the lens of sublinear time algorithms. Given access to the hypergraph through a subset query oracle in the query model, we give sublinear time algorithms for Hitting-Set with almost tight parameterized query complexity. In parameterized query complexity, we estimate the number of queries to the oracle based on the parameter k, the size of the Hitting-Set. The subset query oracle we use in this paper is called Generalized d-partite Independent Set query oracle (GPIS) and it was introduced by Bishnu et al. (ISAAC'18). GPIS is a generalization to hypergraphs of the Bipartite Independent Set query oracle (BIS) introduced by Beame et al. (ITCS'18 and TALG'20) for estimating the number of edges in graphs. Since its introduction GPIS query oracle has been used for estimating the number of hyperedges independently by Dell et al. (SODA'20 and SICOMP'22) and Bhattacharya et al. (STACS'22), and for estimating the number of triangles in a graph by Bhattacharya et al. (ISAAC'19 and TOCS'21). Formally, GPIS is defined as follows: GPIS oracle for a d-uniform hypergraph H takes as input d pairwise disjoint non-empty subsets A1,,Ad of vertices in H and answers whether there is a hyperedge in H that intersects each set Ai, where i{1,2,,d}. For d=2, the GPIS oracle is nothing but BIS oracle.

We show that d-Hitting-Set, the hitting set problem for d-uniform hypergraphs, can be solved using O˜d(kdlogn) GPIS queries. Additionally, we also showed that d-Decision-Hitting-Set, the decision version of d-Hitting-Set can be solved with O˜d(min{kdlog
在本文中,我们通过亚线性时间算法的视角来关注组合优化中的一个基本问题——命中集。给定通过查询模型中的子集查询预言器访问超图,我们给出了具有几乎严格参数化查询复杂性的Hitting Set的次线性时间算法。在参数化查询复杂性中,我们根据参数k(Hitting Set的大小)来估计对oracle的查询数量。本文中使用的子集查询预言机被称为广义d部分独立集查询预言机(GPIS),它是由Bishnu等人(ISAAC'18)引入的。GPIS是Beame等人(ITCS'18和TALG'20)引入的双部分独立集查询预言机(BIS)超图的推广,用于估计图中的边数。自引入GPIS查询预言机以来,Dell等人(SODA'20和SICOMP'22)和Bhattacharya等人(STACS'22)已将其独立用于估计超边的数量,Bhattacharia等人(ISAAC'19和TOCS'21)也将其用于估计图中三角形的数量。形式上,GPIS定义如下:d-一致超图H的GPIS预言机将H中顶点的d个成对不相交的非空子集A1,…,Ad作为输入,并回答H中是否存在与每个集合Ai相交的超边,其中i∈{1,2,…,d}。对于d=2,GPIS预言机不过是BIS预言机。我们证明了d-一致超图的碰撞集问题d-碰撞集可以用O~d(kdlog⁡n) GPIS查询。此外,我们还证明了d-Decision-Hitting-Set,d-Hitting-Sert的决策版本可以用O~d(min⁡{kdlog⁡n、 k2d2})GPIS查询。我们用一个几乎匹配的参数化下界来补充这些参数化上界,该下界表示任何求解d-Decision-Hitting-Set的算法都需要Ω((k+dd))GPIS查询。
{"title":"Almost optimal query algorithm for hitting set using a subset query","authors":"Arijit Bishnu ,&nbsp;Arijit Ghosh ,&nbsp;Sudeshna Kolay ,&nbsp;Gopinath Mishra ,&nbsp;Saket Saurabh","doi":"10.1016/j.jcss.2023.02.002","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.02.002","url":null,"abstract":"<div><p>In this paper, we focus on <span>Hitting-Set</span><span>, a fundamental problem in combinatorial optimization, through the lens of sublinear time algorithms. Given access to the hypergraph through a subset query oracle in the query model, we give sublinear time algorithms for </span><span>Hitting-Set</span><span> with almost tight parameterized query complexity. In </span><em>parameterized query complexity</em>, we estimate the number of queries to the oracle based on the parameter <em>k</em>, the size of the <span>Hitting-Set</span>. The subset query oracle we use in this paper is called Generalized <em>d</em><span>-partite Independent Set query oracle (GPIS) and it was introduced by Bishnu et al. (ISAAC'18). GPIS is a generalization to hypergraphs of the Bipartite Independent Set query oracle (BIS) introduced by Beame et al. (ITCS'18 and TALG'20) for estimating the number of edges in graphs. Since its introduction GPIS query oracle has been used for estimating the number of hyperedges independently by Dell et al. (SODA'20 and SICOMP'22) and Bhattacharya et al. (STACS'22), and for estimating the number of triangles in a graph by Bhattacharya et al. (ISAAC'19 and TOCS'21). Formally, GPIS is defined as follows: </span><span>GPIS</span> <em>oracle for a d-uniform hypergraph</em> <span><math><mi>H</mi></math></span> <em>takes as input d pairwise disjoint non-empty subsets</em> <span><math><msub><mrow><mi>A</mi></mrow><mrow><mn>1</mn></mrow></msub><mo>,</mo><mo>…</mo><mo>,</mo><msub><mrow><mi>A</mi></mrow><mrow><mi>d</mi></mrow></msub></math></span> <em>of vertices in</em> <span><math><mi>H</mi></math></span> <em>and answers whether there is a hyperedge in</em> <span><math><mi>H</mi></math></span> <em>that intersects each set</em> <span><math><msub><mrow><mi>A</mi></mrow><mrow><mi>i</mi></mrow></msub></math></span><em>, where</em> <span><math><mi>i</mi><mo>∈</mo><mo>{</mo><mn>1</mn><mo>,</mo><mspace></mspace><mn>2</mn><mo>,</mo><mspace></mspace><mo>…</mo><mo>,</mo><mi>d</mi><mo>}</mo></math></span><em>.</em> For <span><math><mi>d</mi><mo>=</mo><mn>2</mn></math></span>, the <span>GPIS</span> oracle is nothing but <span>BIS</span> oracle.</p><p>We show that <em>d</em>-<span>Hitting-Set</span>, the hitting set problem for <em>d</em>-uniform hypergraphs, can be solved using <span><math><msub><mrow><mover><mrow><mi>O</mi></mrow><mrow><mo>˜</mo></mrow></mover></mrow><mrow><mi>d</mi></mrow></msub><mo>(</mo><msup><mrow><mi>k</mi></mrow><mrow><mi>d</mi></mrow></msup><mi>log</mi><mo>⁡</mo><mi>n</mi><mo>)</mo></math></span> <span>GPIS</span> queries. Additionally, we also showed that <em>d</em>-<span>Decision-Hitting-Set</span>, the decision version of <em>d</em>-<span>Hitting-Set</span> can be solved with <span><math><msub><mrow><mover><mrow><mi>O</mi></mrow><mrow><mo>˜</mo></mrow></mover></mrow><mrow><mi>d</mi></mrow></msub><mrow><mo>(</mo><mi>min</mi><mo>⁡</mo><mrow><mo>{</mo><msup><mrow><mi>k</mi></mrow><mrow><mi>d</mi></mrow></msup><mi>log</mi><mo","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"137 ","pages":"Pages 50-65"},"PeriodicalIF":1.1,"publicationDate":"2023-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49739741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Building large k-cores from sparse graphs 从稀疏图构建大型k核
IF 1.1 3区 计算机科学 Q2 Mathematics Pub Date : 2023-03-01 DOI: 10.1016/j.jcss.2022.10.002
Fedor V. Fomin , Danil Sagunov , Kirill Simonov

A k-core of a graph G is the maximal induced subgraph in which every vertex has degree at least k. In the Edge k-Core optimization problem, we are given a graph G and integers k, b and p. The task is to ensure that the k-core of G has at least p vertices, by adding at most b edges. While Edge k-Core is known to be computationally hard in general, we show that there are efficient algorithms when the k-core has to be constructed from a sparse graph with some structural properties. Our results are as follows.

  • When the input graph is a forest, Edge k-Core is solvable in polynomial time.

  • Edge k-Core is fixed-parameter tractable (FPT) when parameterized by the minimum size of a vertex cover in the input graph.

  • Edge k-Core is FPT when parameterized by the treewidth of the graph plus k.

图G的k-核是每个顶点的度至少为k的最大诱导子图。在边k-核优化问题中,我们给出了一个图G和整数k、b和p。任务是通过添加最多b条边来确保G的k-核心至少有p个顶点。虽然边缘k-Core通常在计算上是困难的,但我们证明了当k-Core必须由具有某些结构属性的稀疏图构造时,存在有效的算法。我们的结果如下。•当输入图是森林时,边k-Core在多项式时间内是可解的。•当通过输入图中顶点覆盖的最小大小进行参数化时,边k-Core是固定参数可处理的(FPT)。•当通过图的树宽度加上k来参数化时,边k-Core是FPT。
{"title":"Building large k-cores from sparse graphs","authors":"Fedor V. Fomin ,&nbsp;Danil Sagunov ,&nbsp;Kirill Simonov","doi":"10.1016/j.jcss.2022.10.002","DOIUrl":"https://doi.org/10.1016/j.jcss.2022.10.002","url":null,"abstract":"<div><p>A <em>k</em>-core of a graph <em>G</em> is the maximal induced subgraph in which every vertex has degree at least <em>k</em>. In the <span>Edge</span> <em>k</em><span>-Core</span> optimization problem, we are given a graph <em>G</em> and integers <em>k</em>, <em>b</em> and <em>p</em>. The task is to ensure that the <em>k</em>-core of <em>G</em> has at least <em>p</em> vertices, by adding at most <em>b</em> edges. While <span>Edge</span> <em>k</em><span>-Core</span> is known to be computationally hard in general, we show that there are efficient algorithms when the <em>k</em>-core has to be constructed from a sparse graph with some structural properties. Our results are as follows.</p><ul><li><span>•</span><span><p>When the input graph is a forest, <span>Edge</span> <em>k</em><span>-Core</span> is solvable in polynomial time.</p></span></li><li><span>•</span><span><p><span>Edge</span> <em>k</em><span>-Core</span> is fixed-parameter tractable (FPT) when parameterized by the minimum size of a vertex cover in the input graph.</p></span></li><li><span>•</span><span><p><span>Edge</span> <em>k</em><span>-Core</span> is <span><math><mi>FPT</mi></math></span> when parameterized by the treewidth of the graph plus <em>k</em>.</p></span></li></ul></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"132 ","pages":"Pages 68-88"},"PeriodicalIF":1.1,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49738283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Computer and System Sciences
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1