首页 > 最新文献

Journal of Computer and System Sciences最新文献

英文 中文
Induced minor models. I. Structural properties and algorithmic consequences 诱导小模型。1 .结构性质和算法后果
IF 0.9 3区 计算机科学 Q1 BUSINESS, FINANCE Pub Date : 2026-05-01 Epub Date: 2025-12-02 DOI: 10.1016/j.jcss.2025.103738
Nicolas Bousquet , Clément Dallard , Maël Dumas , Claire Hilaire , Martin Milanič , Anthony Perez , Nicolas Trotignon
A graph H is an induced minor of G if there exists an induced minor model of H in G, that is, a collection of pairwise disjoint subsets of vertices of G labeled by the vertices of H, each inducing a connected subgraph in G, such that two vertices of H are adjacent if and only if there is an edge in G between the corresponding subsets. In this paper, we investigate structural properties of induced minor models, including bounds on treewidth and chromatic number of the subgraphs induced by minimal induced minor models. As algorithmic applications of our structural results, we make use of recent developments regarding tree-independence number to show that if H is the 4-wheel, the 5-vertex complete graph minus an edge, or a complete bipartite graph K2,q, then there is a polynomial-time algorithm to find in a given graph G an induced minor model of H in G, if there is one. We also develop an alternative polynomial-time algorithm for recognizing graphs that do not contain K2,3 as an induced minor, which revolves around the idea of detecting the induced subgraphs whose presence is forced when the input graph contains K2,3 as an induced minor. It turns out that all these induced subgraphs are Truemper configurations.
如果在G中存在H的诱导子模型,则图H是G的诱导子模型,即由H的顶点标记的G的顶点的成对不相交子集的集合,每个集合在G中诱导一个连通子图,使得H的两个顶点相邻当且仅当在G中对应的子集之间存在一条边。本文研究了诱导次要模型的结构性质,包括由最小诱导次要模型诱导的子图的树宽界和色数界。作为我们的结构结果的算法应用,我们利用最近关于树无关数的发展来表明,如果H是4轮,5顶点完全图减去一条边,或完全二部图K2,q,那么在给定的图G中有一个多项式时间算法来找到H在G中的诱导小模型,如果有的话。我们还开发了一种替代的多项式时间算法,用于识别不包含K2,3作为诱导子图的图,它围绕着检测当输入图包含K2,3作为诱导子图时强制存在的诱导子图的思想。所有这些诱导子图都是Truemper构型。
{"title":"Induced minor models. I. Structural properties and algorithmic consequences","authors":"Nicolas Bousquet ,&nbsp;Clément Dallard ,&nbsp;Maël Dumas ,&nbsp;Claire Hilaire ,&nbsp;Martin Milanič ,&nbsp;Anthony Perez ,&nbsp;Nicolas Trotignon","doi":"10.1016/j.jcss.2025.103738","DOIUrl":"10.1016/j.jcss.2025.103738","url":null,"abstract":"<div><div>A graph <em>H</em> is an induced minor of <em>G</em> if there exists an <em>induced minor model</em> of <em>H</em> in <em>G</em>, that is, a collection of pairwise disjoint subsets of vertices of <em>G</em> labeled by the vertices of <em>H</em>, each inducing a connected subgraph in <em>G</em>, such that two vertices of <em>H</em> are adjacent if and only if there is an edge in <em>G</em> between the corresponding subsets. In this paper, we investigate structural properties of induced minor models, including bounds on treewidth and chromatic number of the subgraphs induced by minimal induced minor models. As algorithmic applications of our structural results, we make use of recent developments regarding tree-independence number to show that if <em>H</em> is the 4-wheel, the 5-vertex complete graph minus an edge, or a complete bipartite graph <span><math><msub><mrow><mi>K</mi></mrow><mrow><mn>2</mn><mo>,</mo><mi>q</mi></mrow></msub></math></span>, then there is a polynomial-time algorithm to find in a given graph <em>G</em> an induced minor model of <em>H</em> in <em>G</em>, if there is one. We also develop an alternative polynomial-time algorithm for recognizing graphs that do not contain <span><math><msub><mrow><mi>K</mi></mrow><mrow><mn>2</mn><mo>,</mo><mn>3</mn></mrow></msub></math></span> as an induced minor, which revolves around the idea of detecting the induced subgraphs whose presence is forced when the input graph contains <span><math><msub><mrow><mi>K</mi></mrow><mrow><mn>2</mn><mo>,</mo><mn>3</mn></mrow></msub></math></span> as an induced minor. It turns out that all these induced subgraphs are Truemper configurations.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"157 ","pages":"Article 103738"},"PeriodicalIF":0.9,"publicationDate":"2026-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145736653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Routing few robots in a crowded network 在拥挤的网络中路由几个机器人
IF 0.9 3区 计算机科学 Q1 BUSINESS, FINANCE Pub Date : 2026-05-01 Epub Date: 2026-01-02 DOI: 10.1016/j.jcss.2025.103753
Argyrios Deligkas , Eduard Eiben , Robert Ganian , Iyad Kanj , Dominik Leko , M.S. Ramanujan
In Graph Coordinated Motion Planning, we are given a graph G some of whose vertices are occupied by robots, and we are asked to route k marked robots to their destinations while avoiding collisions and without exceeding a given budget on the number of robot moves. We continue the recent investigation of the problem [ICALP 2024], focusing on the parameter k that captures the task of routing a small number of robots in a possibly crowded graph. We prove that the problem is W[1]-hard parameterized by even for k=1, but fixed-parameter tractable parameterized by k plus the treedepth of G. We complement the latter algorithm with an NP-hardness reduction which shows that both parameters are necessary to achieve tractability.
在图协调运动规划中,我们给出一个图G,其中一些顶点被机器人占据,我们被要求将k个标记的机器人路由到目的地,同时避免碰撞,并且不超过机器人移动次数的给定预算。我们继续最近对这个问题的调查[ICALP 2024],重点关注参数k,它捕获了在可能拥挤的图中路由少量机器人的任务。我们证明了即使对于k=1,问题是W[1]-hard参数化的,但问题是固定参数可处理的,参数化是k加上树深g。我们用np -硬度约简来补充后一种算法,这表明两个参数都是实现可处理性所必需的。
{"title":"Routing few robots in a crowded network","authors":"Argyrios Deligkas ,&nbsp;Eduard Eiben ,&nbsp;Robert Ganian ,&nbsp;Iyad Kanj ,&nbsp;Dominik Leko ,&nbsp;M.S. Ramanujan","doi":"10.1016/j.jcss.2025.103753","DOIUrl":"10.1016/j.jcss.2025.103753","url":null,"abstract":"<div><div>In <span>Graph Coordinated Motion Planning</span>, we are given a graph <em>G</em> some of whose vertices are occupied by robots, and we are asked to route <em>k</em> marked robots to their destinations while avoiding collisions and without exceeding a given budget <em>ℓ</em> on the number of robot moves. We continue the recent investigation of the problem [ICALP 2024], focusing on the parameter <em>k</em> that captures the task of routing a small number of robots in a possibly crowded graph. We prove that the problem is <span>W</span>[1]-hard parameterized by <em>ℓ</em> even for <span><math><mi>k</mi><mo>=</mo><mn>1</mn></math></span>, but fixed-parameter tractable parameterized by <em>k</em> plus the treedepth of <em>G</em>. We complement the latter algorithm with an <span>NP</span>-hardness reduction which shows that both parameters are necessary to achieve tractability.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"157 ","pages":"Article 103753"},"PeriodicalIF":0.9,"publicationDate":"2026-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145924261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantum data structure for range minimum query 量程最小查询的量子数据结构
IF 0.9 3区 计算机科学 Q1 BUSINESS, FINANCE Pub Date : 2026-05-01 Epub Date: 2026-01-08 DOI: 10.1016/j.jcss.2026.103756
Qisheng Wang , Zhean Xu , Zhicheng Zhang
Given an array a[1..n], the Range Minimum Query (RMQ) problem is to maintain a data structure that supports RMQ queries: given a range [l,r], find the index of the minimum element among a[l..r], i.e., arg mini[l,r]a[i]. In this paper, we propose a quantum data structure that supports RMQ queries and range updates, with an optimal time complexity Θ˜(nq) for performing q=O(n) operations without preprocessing, compared to the classical Θ˜(n+q).1 As an application, we obtain a time-efficient quantum algorithm for k-minimum finding without the use of quantum random access memory.
给定数组a[1..]n],范围最小查询(RMQ)问题是维护一个支持RMQ查询的数据结构:给定一个范围[l,r],找到a[l,r]中最小元素的索引。R],即arg mini∈[l, R]a[i]。在本文中,我们提出了一种支持RMQ查询和范围更新的量子数据结构,与经典的Θ ~ (n+q).1相比,在没有预处理的情况下执行q=O(n)操作具有最佳时间复杂度Θ ~ (nq)作为一个应用,我们获得了一种不使用量子随机存取存储器的时间高效的k-最小查找量子算法。
{"title":"Quantum data structure for range minimum query","authors":"Qisheng Wang ,&nbsp;Zhean Xu ,&nbsp;Zhicheng Zhang","doi":"10.1016/j.jcss.2026.103756","DOIUrl":"10.1016/j.jcss.2026.103756","url":null,"abstract":"<div><div>Given an array <span><math><mi>a</mi><mrow><mo>[</mo><mn>1</mn><mo>.</mo><mo>.</mo><mi>n</mi><mo>]</mo></mrow></math></span>, the Range Minimum Query (RMQ) problem is to maintain a data structure that supports RMQ queries: given a range <span><math><mo>[</mo><mi>l</mi><mo>,</mo><mi>r</mi><mo>]</mo></math></span>, find the index of the minimum element among <span><math><mi>a</mi><mrow><mo>[</mo><mi>l</mi><mo>.</mo><mo>.</mo><mi>r</mi><mo>]</mo></mrow></math></span>, i.e., <span><math><msub><mrow><mi>arg min</mi></mrow><mrow><mi>i</mi><mo>∈</mo><mo>[</mo><mi>l</mi><mo>,</mo><mi>r</mi><mo>]</mo></mrow></msub><mspace></mspace><mi>a</mi><mo>[</mo><mi>i</mi><mo>]</mo></math></span>. In this paper, we propose a quantum data structure that supports RMQ queries and range updates, with an <em>optimal</em> time complexity <span><math><mover><mrow><mi>Θ</mi></mrow><mrow><mo>˜</mo></mrow></mover><mo>(</mo><msqrt><mrow><mi>n</mi><mi>q</mi></mrow></msqrt><mo>)</mo></math></span> for performing <span><math><mi>q</mi><mo>=</mo><mi>O</mi><mo>(</mo><mi>n</mi><mo>)</mo></math></span> operations <em>without</em> preprocessing, compared to the classical <span><math><mover><mrow><mi>Θ</mi></mrow><mrow><mo>˜</mo></mrow></mover><mo>(</mo><mi>n</mi><mo>+</mo><mi>q</mi><mo>)</mo></math></span>.<span><span><sup>1</sup></span></span> As an application, we obtain a time-efficient quantum algorithm for <em>k</em>-minimum finding <em>without</em> the use of <em>quantum random access memory</em>.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"157 ","pages":"Article 103756"},"PeriodicalIF":0.9,"publicationDate":"2026-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146037161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Normal Domination Game in graphs 正常统治游戏的图表
IF 0.9 3区 计算机科学 Q1 BUSINESS, FINANCE Pub Date : 2026-05-01 Epub Date: 2025-12-17 DOI: 10.1016/j.jcss.2025.103751
João Marcos Brito , Thiago Marcilon , Nicolas A. Martins , Rudini Sampaio
In 2010, Brešar, Klavžar and Rall introduced the optimization variant of the graph domination game and the game domination number. This variant has been extensively investigated in the literature, with several papers published on this topic. Interestingly, the most common variant of combinatorial games, the normal variant, in which the last to play wins, had never been investigated for the graph domination game. In this paper, we start the study of the normal play of the domination game, which we call Normal Domination Game. We first prove that this game is PSPACE-complete even in graphs with diameter two. We also use the Sprague-Grundy theory to prove that Alice (the first player) wins in the path Pn if and only if n is not a multiple of 4, and wins in the cycle Cn if and only if n=4k+3 for some integer k. Moreover, we obtain a polynomial time algorithm to decide the winner for any disjoint union of paths and cycles in the Normal Domination Game and its natural partizan variant. Finally, we also prove that the Misère Domination Game (the last to play loses) is PSPACE-complete, as are the natural partizan variants of the normal game and the misère game.
2010年Brešar、Klavžar和Rall引入了图形统治游戏的优化变体和游戏统治数。这种变体在文献中被广泛研究,有几篇论文发表在这个主题上。有趣的是,组合游戏最常见的变体,即最后一个玩家获胜的正常变体,从未被用于图形控制游戏的研究。本文开始研究统治博弈的正常博弈,我们称之为正常统治博弈。我们首先证明了这个对策即使在直径为2的图上也是pspace完全的。我们还使用Sprague-Grundy理论证明了Alice(第一个玩家)当且仅当n不是4的倍数时在路径Pn中获胜,并且当且仅当n=4k+3时在某个整数k中在循环Cn中获胜。此外,我们获得了一个多项式时间算法来确定正常统治博弈及其自然党派变种中任何路径和循环的不交并的赢家。最后,我们还证明了mis统治游戏(最后玩的人输)是pspace完全的,就像正常游戏和mis游戏的自然游击变体一样。
{"title":"The Normal Domination Game in graphs","authors":"João Marcos Brito ,&nbsp;Thiago Marcilon ,&nbsp;Nicolas A. Martins ,&nbsp;Rudini Sampaio","doi":"10.1016/j.jcss.2025.103751","DOIUrl":"10.1016/j.jcss.2025.103751","url":null,"abstract":"<div><div>In 2010, Brešar, Klavžar and Rall introduced the optimization variant of the graph domination game and the game domination number. This variant has been extensively investigated in the literature, with several papers published on this topic. Interestingly, the most common variant of combinatorial games, the normal variant, in which the last to play wins, had never been investigated for the graph domination game. In this paper, we start the study of the normal play of the domination game, which we call <span>Normal Domination Game</span>. We first prove that this game is PSPACE-complete even in graphs with diameter two. We also use the Sprague-Grundy theory to prove that Alice (the first player) wins in the path <span><math><msub><mrow><mi>P</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span> if and only if <em>n</em> is not a multiple of 4, and wins in the cycle <span><math><msub><mrow><mi>C</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span> if and only if <span><math><mi>n</mi><mo>=</mo><mn>4</mn><mi>k</mi><mo>+</mo><mn>3</mn></math></span> for some integer <em>k</em>. Moreover, we obtain a polynomial time algorithm to decide the winner for any disjoint union of paths and cycles in the <span>Normal Domination Game</span> and its natural partizan variant. Finally, we also prove that the <span>Misère Domination Game</span> (the last to play loses) is PSPACE-complete, as are the natural partizan variants of the normal game and the misère game.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"157 ","pages":"Article 103751"},"PeriodicalIF":0.9,"publicationDate":"2026-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145839598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Core stability in additively separable hedonic games of low treewidth 低树宽的可加可分享乐对策的核心稳定性
IF 0.9 3区 计算机科学 Q1 BUSINESS, FINANCE Pub Date : 2026-05-01 Epub Date: 2025-12-09 DOI: 10.1016/j.jcss.2025.103748
Tesshu Hanaka , Noleen Köhler , Michael Lampis
Additively Separable Hedonic Games (ASHGs) are coalition-formation games where we are given a directed graph whose vertices represent n selfish agents and the weight of each arc uv denotes the preferences of u for v. We revisit the computational complexity of the well-known notion of core stability of symmetric ASHGs, where the goal is to construct a partition of the agents into coalitions such that no group of agents would prefer to diverge from the given partition and form a new coalition. For Core Stability Verification (CSV), we first show the following hardness results: CSV remains coNP-complete on graphs of vertex cover 2; CSV is coW[1]-hard parameterized by vertex integrity when edge weights are encoded in unary; and CSV is coW[1]-hard parameterized by tree-depth even if all weights are from {1,1}. We complement these results with essentially matching algorithms and an FPT algorithm parameterized by the treewidth tw plus the maximum degree Δ (improving a previous algorithm's dependence from 2O(twΔ2) to 2O(twΔ)). We then move on to study Core Stability (CS), which one would naturally expect to be even harder than CSV. We confirm this intuition by showing that CS is Σ2p-complete even on graphs of bounded vertex cover number. On the positive side, we present a 22O(Δtw)nO(1)-time algorithm parameterized by tw+Δ, which is essentially optimal assuming the Exponential Time Hypothesis (ETH). Finally, we consider the notion of k-core stability: k denotes the maximum size of the allowed blocking (diverging) coalitions. We show that k-CSV is coW[1]-hard parameterized by k (even on unweighted graphs), while k-CS is NP-complete for all k3 (even on graphs of bounded degree with bounded edge weights).
加法分离变量享乐游戏(ASHGs)结盟是游戏,我们给出了一个有向图的顶点代表n自私的代理和每个电弧紫外的重量表示偏好的u v .我们重温著名的计算复杂度的概念核心稳定对称ASHGs,目标是构造一个分区的代理商等联盟,没有群宁愿偏离给定的分区和组建一个新的联合政府。对于核心稳定性验证(CSV),我们首先证明了以下硬度结果:CSV在顶点覆盖2的图上保持conp完全;当边权为一元编码时,CSV是顶点完整性的coW[1]-hard参数化;即使所有权值都来自{−1,1},CSV仍然是由树深度参数化的coW[1]-hard。我们用基本匹配的算法和由树宽tw加上最大程度Δ参数化的FPT算法来补充这些结果(将先前算法的依赖性从2O(twΔ2)提高到2O(twΔ))。然后我们继续学习核心稳定性(CS),人们自然会认为它比CSV更难。我们通过证明CS即使在有界顶点覆盖数的图上也是Σ2p-complete来证实这个直觉。在积极的方面,我们提出了一个由tw+Δ参数化的22O(Δtw)nO(1)时间算法,该算法本质上是最优的,假设指数时间假设(ETH)。最后,我们考虑了k核稳定性的概念:k表示允许的阻塞(发散)联盟的最大大小。我们证明k- csv是由k(即使在无权图上)硬参数化的,而k- cs对于所有k≥3(即使在边权有界的有界度图上)是np完全的。
{"title":"Core stability in additively separable hedonic games of low treewidth","authors":"Tesshu Hanaka ,&nbsp;Noleen Köhler ,&nbsp;Michael Lampis","doi":"10.1016/j.jcss.2025.103748","DOIUrl":"10.1016/j.jcss.2025.103748","url":null,"abstract":"<div><div>Additively Separable Hedonic Games (ASHGs) are coalition-formation games where we are given a directed graph whose vertices represent <em>n</em> selfish agents and the weight of each arc <em>uv</em> denotes the preferences of <em>u</em> for <em>v</em>. We revisit the computational complexity of the well-known notion of core stability of symmetric ASHGs, where the goal is to construct a partition of the agents into coalitions such that no group of agents would prefer to diverge from the given partition and form a new coalition. For <span>Core Stability Verification</span> (CSV), we first show the following hardness results: <span>CSV</span> remains coNP-complete on graphs of vertex cover 2; <span>CSV</span> is coW[1]-hard parameterized by vertex integrity when edge weights are encoded in unary; and <span>CSV</span> is coW[1]-hard parameterized by tree-depth even if all weights are from <span><math><mo>{</mo><mo>−</mo><mn>1</mn><mo>,</mo><mn>1</mn><mo>}</mo></math></span>. We complement these results with essentially matching algorithms and an FPT algorithm parameterized by the treewidth <span>tw</span> plus the maximum degree Δ (improving a previous algorithm's dependence from <span><math><msup><mrow><mn>2</mn></mrow><mrow><mi>O</mi><mo>(</mo><mrow><mi>tw</mi></mrow><msup><mrow><mi>Δ</mi></mrow><mrow><mn>2</mn></mrow></msup><mo>)</mo></mrow></msup></math></span> to <span><math><msup><mrow><mn>2</mn></mrow><mrow><mi>O</mi><mo>(</mo><mrow><mi>tw</mi></mrow><mi>Δ</mi><mo>)</mo></mrow></msup></math></span>). We then move on to study <span>Core Stability</span> (CS), which one would naturally expect to be even harder than <span>CSV</span>. We confirm this intuition by showing that <span>CS</span> is <span><math><msubsup><mrow><mi>Σ</mi></mrow><mrow><mn>2</mn></mrow><mrow><mi>p</mi></mrow></msubsup></math></span>-complete even on graphs of bounded vertex cover number. On the positive side, we present a <span><math><msup><mrow><mn>2</mn></mrow><mrow><msup><mrow><mn>2</mn></mrow><mrow><mi>O</mi><mo>(</mo><mi>Δ</mi><mrow><mi>tw</mi></mrow><mo>)</mo></mrow></msup></mrow></msup><msup><mrow><mi>n</mi></mrow><mrow><mi>O</mi><mo>(</mo><mn>1</mn><mo>)</mo></mrow></msup></math></span>-time algorithm parameterized by <span><math><mrow><mi>tw</mi></mrow><mo>+</mo><mi>Δ</mi></math></span>, which is essentially optimal assuming the Exponential Time Hypothesis (ETH). Finally, we consider the notion of <em>k</em>-core stability: <em>k</em> denotes the maximum size of the allowed blocking (diverging) coalitions. We show that <em>k</em><span>-CSV</span> is coW[1]-hard parameterized by <em>k</em> (even on unweighted graphs), while <em>k</em><span>-CS</span> is NP-complete for all <span><math><mi>k</mi><mo>≥</mo><mn>3</mn></math></span> (even on graphs of bounded degree with bounded edge weights).</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"157 ","pages":"Article 103748"},"PeriodicalIF":0.9,"publicationDate":"2026-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145789682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the parameterized complexity of computing good edge-labelings 计算好的边缘标记的参数化复杂度
IF 0.9 3区 计算机科学 Q1 BUSINESS, FINANCE Pub Date : 2026-05-01 Epub Date: 2025-12-16 DOI: 10.1016/j.jcss.2025.103752
Davi de Andrade , Júlio Araújo , Laure Morelle , Ignasi Sau , Ana Silva
A good edge-labeling (gel for short) of a graph G is a function λ:E(G)R such that, for any ordered pair of vertices (x,y) of G, there do not exist two distinct increasing paths from x to y, where “increasing” means that the sequence of labels is non-decreasing. This notion was introduced by Bermond et al. (2013) [3] motivated by practical applications arising from routing and wavelength assignment problems in optical networks. Prompted by the lack of algorithmic results about the problem of deciding whether an input graph admits a gel, called GEL, we initiate its study from the viewpoint of parameterized complexity. We first introduce the natural version of GEL where one wants to use at most c distinct labels, which we call c-GEL, and we prove that it is NP-complete for every c2 on very restricted instances. We then provide several positive results, starting with simple polynomial kernels for GEL and c-GEL parameterized by neighborhood diversity or vertex cover. As one of our main technical contributions, we present an FPT algorithm for GEL parameterized by the size of a modulator to a forest of stars, based on a novel approach via a 2-SAT formulation which we believe to be of independent interest. We also present FPT algorithms based on dynamic programming for c-GEL parameterized by treewidth and c, and for GEL parameterized by treewidth and the maximum degree. Finally, we answer positively a question of Bermond et al. (2013) [3] by proving the NP-completeness of a problem strongly related to GEL, namely that of deciding whether an input graph admits a so-called UPP-orientation.
图G的一个好的边标记(简称凝胶)是一个函数λ:E(G)→R,使得对于G的任意有序顶点对(x,y),不存在从x到y的两个不同的递增路径,其中“递增”意味着标记序列是非递减的。这一概念是由Bermond等人(2013)[3]提出的,其动机是光网络中路由和波长分配问题引起的实际应用。由于缺乏关于判断输入图是否存在凝胶(gel)问题的算法结果,我们从参数化复杂性的角度开始对其进行研究。我们首先引入了自然版本的GEL,其中人们希望使用最多c个不同的标签,我们称之为c-GEL,并且我们证明了在非常有限的情况下,对于每个c≥2,它是np完全的。然后,我们提供了几个积极的结果,从GEL和c-GEL的简单多项式核开始,通过邻域多样性或顶点覆盖参数化。作为我们的主要技术贡献之一,我们提出了一种基于2-SAT公式的新方法的GEL FPT算法,该算法由调制器的大小参数化到恒星森林,我们认为这是一个独立的兴趣。针对以树宽和c为参数的c-GEL,以及以树宽和最大度为参数的GEL,提出了基于动态规划的FPT算法。最后,我们通过证明与GEL强相关的问题的np完备性,即决定输入图是否允许所谓的upp取向,积极回答了Bermond等人(2013)[3]的问题。
{"title":"On the parameterized complexity of computing good edge-labelings","authors":"Davi de Andrade ,&nbsp;Júlio Araújo ,&nbsp;Laure Morelle ,&nbsp;Ignasi Sau ,&nbsp;Ana Silva","doi":"10.1016/j.jcss.2025.103752","DOIUrl":"10.1016/j.jcss.2025.103752","url":null,"abstract":"<div><div>A <em>good edge-labeling</em> (<span>gel</span> for short) of a graph <em>G</em> is a function <span><math><mi>λ</mi><mo>:</mo><mi>E</mi><mo>(</mo><mi>G</mi><mo>)</mo><mo>→</mo><mi>R</mi></math></span> such that, for any ordered pair of vertices <span><math><mo>(</mo><mi>x</mi><mo>,</mo><mi>y</mi><mo>)</mo></math></span> of <em>G</em>, there do not exist two distinct increasing paths from <em>x</em> to <em>y</em>, where “increasing” means that the sequence of labels is non-decreasing. This notion was introduced by Bermond et al. (2013) <span><span>[3]</span></span> motivated by practical applications arising from routing and wavelength assignment problems in optical networks. Prompted by the lack of algorithmic results about the problem of deciding whether an input graph admits a <span>gel</span>, called <span>GEL</span>, we initiate its study from the viewpoint of parameterized complexity. We first introduce the natural version of <span>GEL</span> where one wants to use at most <em>c</em> distinct labels, which we call <em>c</em>-GEL, and we prove that it is <span>NP</span>-complete for every <span><math><mi>c</mi><mo>≥</mo><mn>2</mn></math></span> on very restricted instances. We then provide several positive results, starting with simple polynomial kernels for <span>GEL</span> and <em>c</em>-<span>GEL</span> parameterized by neighborhood diversity or vertex cover. As one of our main technical contributions, we present an <span>FPT</span> algorithm for <span>GEL</span> parameterized by the size of a modulator to a forest of stars, based on a novel approach via a 2-<span>SAT</span> formulation which we believe to be of independent interest. We also present <span>FPT</span> algorithms based on dynamic programming for <em>c</em>-<span>GEL</span> parameterized by treewidth and <em>c</em>, and for <span>GEL</span> parameterized by treewidth and the maximum degree. Finally, we answer positively a question of Bermond et al. (2013) <span><span>[3]</span></span> by proving the <span>NP</span>-completeness of a problem strongly related to <span>GEL</span>, namely that of deciding whether an input graph admits a so-called UPP-orientation.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"157 ","pages":"Article 103752"},"PeriodicalIF":0.9,"publicationDate":"2026-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145789683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Gap preserving reductions between reconfiguration problems 重新配置问题之间的缺口保留减少
IF 0.9 3区 计算机科学 Q1 BUSINESS, FINANCE Pub Date : 2026-05-01 Epub Date: 2025-11-14 DOI: 10.1016/j.jcss.2025.103733
Naoto Ohsaka
Combinatorial reconfiguration is a brand-new field studying algorithmic problems relating to the structure of the solution space. In this paper, we study the hardness of approximate versions of reconfiguration problems. For example, in the Maxmin SAT Reconfiguration problem, we are given a satisfiable Boolean formula and a pair of its satisfying assignments. The objective is to transform one satisfying assignment into the other by repeatedly flipping the value of a single variable, while maximizing the minimum fraction of satisfied clauses throughout the transformation. We prove a series of gap-preserving reductions to give evidence that several reconfiguration problems are PSPACE-hard to approximate. Our starting point is a new working hypothesis called the Reconfiguration Inapproximability Hypothesis (RIH), which asserts that a gap version of Maxmin CSP Reconfiguration is PSPACE-hard. Our main result is PSPACE-hardness of approximating Maxmin 3-SAT Reconfiguration of bounded occurrence under RIH. The crux of its proof is a gap-preserving reduction from Maxmin 2-CSP Reconfiguration to itself of bounded degree. As an application of the main result, we demonstrate that under RIH, approximate versions of reconfiguration problems are PSPACE-hard to approximate, including Nondeterministic Constraint Logic, Independent Set Reconfiguration, Clique Reconfiguration, Vertex Cover Reconfiguration, and 2-SAT Reconfiguration. We highlight that RIH has recently been proven by Hirahara and Ohsaka (STOC 2024) and Karthik C.S. and Manurangsi (2023).
组合重构是研究与解空间结构有关的算法问题的一个崭新领域。本文研究了重构问题近似版本的硬度。例如,在Maxmin SAT重构问题中,我们给出了一个可满足的布尔公式及其一对可满足的赋值。目标是通过反复翻转单个变量的值,将一个令人满意的赋值转换为另一个赋值,同时在整个转换过程中最大化满足子句的最小比例。我们证明了一系列保持间隙的约简,以证明一些重构问题是难以近似的。我们的出发点是一个新的工作假设,称为重构不可近似性假设(RIH),它断言Maxmin CSP重构的间隙版本是PSPACE-hard的。我们的主要结果是在RIH条件下近似Maxmin 3-SAT重构的pspace -硬度。其证明的关键是从Maxmin 2-CSP重构到有界度自身的保间隙化简。作为主要结果的应用,我们证明了在RIH下,重构问题的近似版本是pspace难以近似的,包括不确定性约束逻辑、独立集重构、团重构、顶点覆盖重构和2-SAT重构。我们强调,最近Hirahara和Ohsaka (STOC 2024)以及Karthik C.S.和Manurangsi(2023)证明了RIH。
{"title":"Gap preserving reductions between reconfiguration problems","authors":"Naoto Ohsaka","doi":"10.1016/j.jcss.2025.103733","DOIUrl":"10.1016/j.jcss.2025.103733","url":null,"abstract":"<div><div>Combinatorial reconfiguration is a brand-new field studying algorithmic problems relating to the structure of the solution space. In this paper, we study the hardness of <em>approximate versions</em> of reconfiguration problems. For example, in the <span>Maxmin SAT Reconfiguration</span> problem, we are given a satisfiable Boolean formula and a pair of its satisfying assignments. The objective is to transform one satisfying assignment into the other by repeatedly flipping the value of a single variable, while maximizing the minimum fraction of satisfied clauses throughout the transformation. We prove a series of gap-preserving reductions to give evidence that several reconfiguration problems are <span><math><mtext>PSPACE</mtext></math></span>-hard to approximate. Our starting point is a new working hypothesis called the <em>Reconfiguration Inapproximability Hypothesis</em> (RIH), which asserts that a gap version of <span>Maxmin CSP Reconfiguration</span> is <span><math><mtext>PSPACE</mtext></math></span>-hard. Our main result is <span><math><mtext>PSPACE</mtext></math></span>-hardness of approximating <span>Maxmin 3-SAT Reconfiguration</span> of bounded occurrence under RIH. The crux of its proof is a gap-preserving reduction from <span>Maxmin 2-CSP Reconfiguration</span> to itself of bounded degree. As an application of the main result, we demonstrate that under RIH, approximate versions of reconfiguration problems are <span><math><mtext>PSPACE</mtext></math></span>-hard to approximate, including <span>Nondeterministic Constraint Logic</span>, <span>Independent Set Reconfiguration</span>, <span>Clique Reconfiguration</span>, <span>Vertex Cover Reconfiguration</span>, and <span>2-SAT Reconfiguration</span>. We highlight that RIH has recently been proven by Hirahara and Ohsaka (STOC 2024) and Karthik C.S. and Manurangsi (2023).</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"157 ","pages":"Article 103733"},"PeriodicalIF":0.9,"publicationDate":"2026-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145618296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantum and classical query complexities for determining connectedness of matroids 确定拟阵连通性的量子和经典查询复杂性
IF 0.9 3区 计算机科学 Q1 BUSINESS, FINANCE Pub Date : 2026-05-01 Epub Date: 2026-01-07 DOI: 10.1016/j.jcss.2026.103758
Xiaowei Huang , Shiguang Feng , Lvzhou Li
Connectivity is a fundamental structural property of matroids, and has been studied algorithmically over 50 years. In 1974, Cunningham proposed a deterministic algorithm consuming O(n2) queries to the independence oracle to determine whether a matroid is connected. Since then, no algorithm, not even a random one, has worked better. To the best of our knowledge, the classical query complexity lower bound and the quantum complexity for this problem have not been considered. Thus, in this paper we are devoted to addressing these issues, and our contributions are threefold as follows: (i) First, we prove that the randomized query complexity of determining whether a matroid is connected is Ω(n2) and thus the algorithm proposed by Cunningham is optimal in classical computing. (ii) Second, we present a quantum algorithm with O(n3/2) queries, which exhibits provable quantum speedups over classical ones. (iii) Third, we prove that any quantum algorithm requires Ω(n) queries, which indicates that quantum algorithms can achieve at most a quadratic speedup over classical ones. Therefore, we have a relatively comprehensive understanding of the potential of quantum computing in determining the connectedness of matroids.
连通性是拟阵的基本结构性质,已经被算法研究了50多年。1974年,Cunningham提出了一种确定性算法,该算法需要对独立oracle进行O(n2)次查询来确定一个矩阵是否连通。从那时起,没有任何一种算法,甚至是随机算法,比它更有效。据我们所知,该问题的经典查询复杂度下界和量子复杂度尚未被考虑。因此,在本文中,我们致力于解决这些问题,我们的贡献如下:(i)首先,我们证明了确定一个矩阵是否连通的随机查询复杂度为Ω(n2),因此Cunningham提出的算法在经典计算中是最优的。(ii)其次,我们提出了一个具有O(n3/2)个查询的量子算法,它比经典算法具有可证明的量子加速。(iii)第三,我们证明了任何量子算法都需要Ω(n)次查询,这表明量子算法最多可以达到经典算法的二次加速。因此,我们对量子计算在确定拟阵连通性方面的潜力有了相对全面的了解。
{"title":"Quantum and classical query complexities for determining connectedness of matroids","authors":"Xiaowei Huang ,&nbsp;Shiguang Feng ,&nbsp;Lvzhou Li","doi":"10.1016/j.jcss.2026.103758","DOIUrl":"10.1016/j.jcss.2026.103758","url":null,"abstract":"<div><div>Connectivity is a fundamental structural property of matroids, and has been studied algorithmically over 50 years. In 1974, Cunningham proposed a deterministic algorithm consuming <span><math><mi>O</mi><mo>(</mo><msup><mrow><mi>n</mi></mrow><mrow><mn>2</mn></mrow></msup><mo>)</mo></math></span> queries to the independence oracle to determine whether a matroid is connected. Since then, no algorithm, not even a random one, has worked better. To the best of our knowledge, the classical query complexity lower bound and the quantum complexity for this problem have not been considered. Thus, in this paper we are devoted to addressing these issues, and our contributions are threefold as follows: (i) First, we prove that the randomized query complexity of determining whether a matroid is connected is <span><math><mi>Ω</mi><mo>(</mo><msup><mrow><mi>n</mi></mrow><mrow><mn>2</mn></mrow></msup><mo>)</mo></math></span> and thus the algorithm proposed by Cunningham is optimal in classical computing. (ii) Second, we present a quantum algorithm with <span><math><mi>O</mi><mo>(</mo><msup><mrow><mi>n</mi></mrow><mrow><mn>3</mn><mo>/</mo><mn>2</mn></mrow></msup><mo>)</mo></math></span> queries, which exhibits provable quantum speedups over classical ones. (iii) Third, we prove that any quantum algorithm requires <span><math><mi>Ω</mi><mo>(</mo><mi>n</mi><mo>)</mo></math></span> queries, which indicates that quantum algorithms can achieve at most a quadratic speedup over classical ones. Therefore, we have a relatively comprehensive understanding of the potential of quantum computing in determining the connectedness of matroids.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"157 ","pages":"Article 103758"},"PeriodicalIF":0.9,"publicationDate":"2026-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145976511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Finding and counting patterns in sparse graphs 稀疏图中模式的发现和计数
IF 0.9 3区 计算机科学 Q1 BUSINESS, FINANCE Pub Date : 2026-05-01 Epub Date: 2025-11-19 DOI: 10.1016/j.jcss.2025.103728
Balagopal Komarath , Anant Kumar , Suchismita Mishra , Aditi Sethia
We consider algorithms for finding and counting small, fixed graphs in sparse host graphs. In the non-sparse setting, the parameters treedepth and treewidth play a crucial role in fast, constant-space and polynomial-space algorithms respectively. We discover two new parameters that we call matched treedepth and matched treewidth. We show that, for many patterns, finding and counting patterns with low matched treedepth and low matched treewidth can be done asymptotically faster than the existing algorithms when the host graphs are sparse. As an application to finding and counting fixed-size patterns, we discover O˜(m3)-time.1 constant-space algorithms for graphs on at most 11 edges and O˜(m2)-time, polynomial-space algorithms for graphs on at most 9 edges.2
我们考虑在稀疏主图中寻找和计数小的固定图的算法。在非稀疏设置下,参数树深和树宽分别在快速、常数空间和多项式空间算法中起着至关重要的作用。我们发现了两个新参数,分别称为matched treedepth和matched treewidth。我们证明,对于许多模式,当主图是稀疏时,低匹配树深和低匹配树宽的模式查找和计数可以比现有算法渐进地更快地完成。作为查找和计数固定大小模式的应用,我们发现O ~ (m3)时间。1个最多11条边图的常数空间算法和O ~ (m2)时间,最多9条边图的多项式空间算法
{"title":"Finding and counting patterns in sparse graphs","authors":"Balagopal Komarath ,&nbsp;Anant Kumar ,&nbsp;Suchismita Mishra ,&nbsp;Aditi Sethia","doi":"10.1016/j.jcss.2025.103728","DOIUrl":"10.1016/j.jcss.2025.103728","url":null,"abstract":"<div><div>We consider algorithms for finding and counting small, fixed graphs in sparse host graphs. In the non-sparse setting, the parameters treedepth and treewidth play a crucial role in fast, constant-space and polynomial-space algorithms respectively. We discover two new parameters that we call matched treedepth and matched treewidth. We show that, for many patterns, finding and counting patterns with low matched treedepth and low matched treewidth can be done asymptotically faster than the existing algorithms when the host graphs are sparse. As an application to finding and counting fixed-size patterns, we discover <span><math><mover><mrow><mi>O</mi></mrow><mrow><mo>˜</mo></mrow></mover><mo>(</mo><msup><mrow><mi>m</mi></mrow><mrow><mn>3</mn></mrow></msup><mo>)</mo></math></span>-time.<span><span><sup>1</sup></span></span> constant-space algorithms for graphs on at most 11 edges and <span><math><mover><mrow><mi>O</mi></mrow><mrow><mo>˜</mo></mrow></mover><mo>(</mo><msup><mrow><mi>m</mi></mrow><mrow><mn>2</mn></mrow></msup><mo>)</mo></math></span>-time, polynomial-space algorithms for graphs on at most 9 edges.<span><span><sup>2</sup></span></span></div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"157 ","pages":"Article 103728"},"PeriodicalIF":0.9,"publicationDate":"2026-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145618294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Maximizing the number of integer pairs summing to powers of 2 via graph labeling and solving restricted systems of linear (in)equations 通过图形标记和求解线性(in)方程的限制系统,最大化求和为2的整数对的数量
IF 0.9 3区 计算机科学 Q1 BUSINESS, FINANCE Pub Date : 2026-05-01 Epub Date: 2025-11-17 DOI: 10.1016/j.jcss.2025.103735
Max A. Alekseyev
We address the problem of finding sets of integers of a given size with a maximum number of pairs summing to powers of 2. By fixing particular pairs, this problem reduces to finding a labeling of the vertices of a given graph with pairwise distinct integers such that the endpoint labels for each edge sum up to a power of 2. We propose an efficient algorithm for this problem, which at its core relies on another algorithm that, given two sets of linear homogeneous polynomials with integer coefficients, computes all variable assignments to powers of 2 that nullify polynomials from the first set but not from the second. With the proposed algorithms, we determine the maximum size of graphs of order n that admit such a labeling for all n21, and construct the maximum admissible graphs for n20. We also identify the minimal forbidden subgraphs of order ≤11, whose presence prevents the graphs from having such a labeling.
我们解决的问题是找到给定大小的整数集,其中最大数目的整数对和为2的幂。通过固定特定的对,这个问题简化为找到给定图中具有成对不同整数的顶点的标记,使得每个边的端点标记之和为2的幂。我们为这个问题提出了一个有效的算法,其核心依赖于另一个算法,给定两组整数系数的线性齐次多项式,计算所有变量的2次方赋值,使第一组多项式无效,但不会使第二组多项式无效。利用所提出的算法,我们确定了所有n≤21的n阶图中允许这种标记的最大大小,并构造了n≤20的n阶图的最大允许大小。我们还确定了阶≤11的最小禁止子图,它的存在阻止了图具有这样的标记。
{"title":"Maximizing the number of integer pairs summing to powers of 2 via graph labeling and solving restricted systems of linear (in)equations","authors":"Max A. Alekseyev","doi":"10.1016/j.jcss.2025.103735","DOIUrl":"10.1016/j.jcss.2025.103735","url":null,"abstract":"<div><div>We address the problem of finding sets of integers of a given size with a maximum number of pairs summing to powers of 2. By fixing particular pairs, this problem reduces to finding a labeling of the vertices of a given graph with pairwise distinct integers such that the endpoint labels for each edge sum up to a power of 2. We propose an efficient algorithm for this problem, which at its core relies on another algorithm that, given two sets of linear homogeneous polynomials with integer coefficients, computes all variable assignments to powers of 2 that nullify polynomials from the first set but not from the second. With the proposed algorithms, we determine the maximum size of graphs of order <em>n</em> that admit such a labeling for all <span><math><mi>n</mi><mo>≤</mo><mn>21</mn></math></span>, and construct the maximum admissible graphs for <span><math><mi>n</mi><mo>≤</mo><mn>20</mn></math></span>. We also identify the minimal forbidden subgraphs of order ≤11, whose presence prevents the graphs from having such a labeling.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"157 ","pages":"Article 103735"},"PeriodicalIF":0.9,"publicationDate":"2026-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145618295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Computer and System Sciences
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1