首页 > 最新文献

Algorithmica最新文献

英文 中文
Better Hardness Results for the Minimum Spanning Tree Congestion Problem
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-10-26 DOI: 10.1007/s00453-024-01278-5
Huong Luu, Marek Chrobak

In the spanning tree congestion problem, given a connected graph G, the objective is to compute a spanning tree T in G that minimizes its maximum edge congestion, where the congestion of an edge e of T is the number of edges in G for which the unique path in T between their endpoints traverses e. The problem is known to be (mathbb{N}mathbb{P})-hard, but its approximability is still poorly understood, and it is not even known whether the optimum solution can be efficiently approximated with ratio o(n). In the decision version of this problem, denoted ({varvec{K}-textsf {STC}}), we need to determine if G has a spanning tree with congestion at most K. It is known that ({varvec{K}-textsf {STC}}) is (mathbb{N}mathbb{P})-complete for (Kge 8), and this implies a lower bound of 1.125 on the approximation ratio of minimizing congestion. On the other hand, ({varvec{3}-textsf {STC}}) can be solved in polynomial time, with the complexity status of this problem for (Kin { left{ 4,5,6,7 right} }) remaining an open problem. We substantially improve the earlier hardness results by proving that ({varvec{K}-textsf {STC}}) is (mathbb{N}mathbb{P})-complete for (Kge 5). This leaves only the case (K=4) open, and improves the lower bound on the approximation ratio to 1.2. Motivated by evidence that minimizing congestion is hard even for graphs of small constant radius, we also consider ({varvec{K}-textsf {STC}}) restricted to graphs of radius 2, and we prove that this variant is (mathbb{N}mathbb{P})-complete for all (Kge 6).

{"title":"Better Hardness Results for the Minimum Spanning Tree Congestion Problem","authors":"Huong Luu,&nbsp;Marek Chrobak","doi":"10.1007/s00453-024-01278-5","DOIUrl":"10.1007/s00453-024-01278-5","url":null,"abstract":"<div><p>In the spanning tree congestion problem, given a connected graph <i>G</i>, the objective is to compute a spanning tree <i>T</i> in <i>G</i> that minimizes its maximum edge congestion, where the congestion of an edge <i>e</i> of <i>T</i> is the number of edges in <i>G</i> for which the unique path in <i>T</i> between their endpoints traverses <i>e</i>. The problem is known to be <span>(mathbb{N}mathbb{P})</span>-hard, but its approximability is still poorly understood, and it is not even known whether the optimum solution can be efficiently approximated with ratio <i>o</i>(<i>n</i>). In the decision version of this problem, denoted <span>({varvec{K}-textsf {STC}})</span>, we need to determine if <i>G</i> has a spanning tree with congestion at most <i>K</i>. It is known that <span>({varvec{K}-textsf {STC}})</span> is <span>(mathbb{N}mathbb{P})</span>-complete for <span>(Kge 8)</span>, and this implies a lower bound of 1.125 on the approximation ratio of minimizing congestion. On the other hand, <span>({varvec{3}-textsf {STC}})</span> can be solved in polynomial time, with the complexity status of this problem for <span>(Kin { left{ 4,5,6,7 right} })</span> remaining an open problem. We substantially improve the earlier hardness results by proving that <span>({varvec{K}-textsf {STC}})</span> is <span>(mathbb{N}mathbb{P})</span>-complete for <span>(Kge 5)</span>. This leaves only the case <span>(K=4)</span> open, and improves the lower bound on the approximation ratio to 1.2. Motivated by evidence that minimizing congestion is hard even for graphs of small constant radius, we also consider <span>({varvec{K}-textsf {STC}})</span> restricted to graphs of radius 2, and we prove that this variant is <span>(mathbb{N}mathbb{P})</span>-complete for all <span>(Kge 6)</span>. \u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"87 1","pages":"148 - 165"},"PeriodicalIF":0.9,"publicationDate":"2024-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01278-5.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142995588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Euclidean Maximum Matchings in the Plane—Local to Global
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-10-19 DOI: 10.1007/s00453-024-01279-4
Ahmad Biniaz, Anil Maheshwari, Michiel Smid

Let M be a perfect matching on a set of points in the plane where every edge is a line segment between two points. We say that M is globally maximum if it is a maximum-length matching on all points. We say that M is k-local maximum if for any subset (M'={a_1b_1,dots ,a_kb_k}) of k edges of M it holds that (M') is a maximum-length matching on points ({a_1,b_1,dots ,a_k,b_k}). We show that local maximum matchings are good approximations of global ones. Let (mu _k) be the infimum ratio of the length of any k-local maximum matching to the length of any global maximum matching, over all finite point sets in the Euclidean plane. It is known that (mu _kgeqslant frac{k-1}{k}) for any (kgeqslant 2). We show the following improved bounds for (kin {2,3}): (sqrt{3/7}leqslant mu _2< 0.93 ) and (sqrt{3}/2leqslant mu _3< 0.98). We also show that every pairwise crossing matching is unique and it is globally maximum. Towards our proof of the lower bound for (mu _2) we show the following result which is of independent interest: If we increase the radii of pairwise intersecting disks by factor (2/sqrt{3}), then the resulting disks have a common intersection.

{"title":"Euclidean Maximum Matchings in the Plane—Local to Global","authors":"Ahmad Biniaz,&nbsp;Anil Maheshwari,&nbsp;Michiel Smid","doi":"10.1007/s00453-024-01279-4","DOIUrl":"10.1007/s00453-024-01279-4","url":null,"abstract":"<div><p>Let <i>M</i> be a perfect matching on a set of points in the plane where every edge is a line segment between two points. We say that <i>M</i> is <i>globally maximum</i> if it is a maximum-length matching on all points. We say that <i>M</i> is <i>k</i>-<i>local maximum</i> if for any subset <span>(M'={a_1b_1,dots ,a_kb_k})</span> of <i>k</i> edges of <i>M</i> it holds that <span>(M')</span> is a maximum-length matching on points <span>({a_1,b_1,dots ,a_k,b_k})</span>. We show that local maximum matchings are good approximations of global ones. Let <span>(mu _k)</span> be the infimum ratio of the length of any <i>k</i>-local maximum matching to the length of any global maximum matching, over all finite point sets in the Euclidean plane. It is known that <span>(mu _kgeqslant frac{k-1}{k})</span> for any <span>(kgeqslant 2)</span>. We show the following improved bounds for <span>(kin {2,3})</span>: <span>(sqrt{3/7}leqslant mu _2&lt; 0.93 )</span> and <span>(sqrt{3}/2leqslant mu _3&lt; 0.98)</span>. We also show that every pairwise crossing matching is unique and it is globally maximum. Towards our proof of the lower bound for <span>(mu _2)</span> we show the following result which is of independent interest: If we increase the radii of pairwise intersecting disks by factor <span>(2/sqrt{3})</span>, then the resulting disks have a common intersection.\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"87 1","pages":"132 - 147"},"PeriodicalIF":0.9,"publicationDate":"2024-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142995500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Online Paging with Heterogeneous Cache Slots
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-10-17 DOI: 10.1007/s00453-024-01270-z
Marek Chrobak, Samuel Haney, Mehraneh Liaee, Debmalya Panigrahi, Rajmohan Rajaraman, Ravi Sundaram, Neal E. Young

It is natural to generalize the online (k)-Server problem by allowing each request to specify not only a point p, but also a subset S of servers that may serve it. To date, only a few special cases of this problem have been studied. The objective of the work presented in this paper has been to more systematically explore this generalization in the case of uniform and star metrics. For uniform metrics, the problem is equivalent to a generalization of Paging in which each request specifies not only a page p, but also a subset S of cache slots, and is satisfied by having a copy of p in some slot in S. We call this problem Slot-Heterogenous Paging. In realistic settings only certain subsets of cache slots or servers would appear in requests. Therefore we parameterize the problem by specifying a family ({mathcal {S}}subseteq 2^{[k]}) of requestable slot sets, and we establish bounds on the competitive ratio as a function of the cache size k and family ({mathcal {S}}):

  • If all request sets are allowed (({mathcal {S}}=2^{[k]}setminus {emptyset })), the optimal deterministic and randomized competitive ratios are exponentially worse than for standard Paging (({mathcal {S}}={[k]})).

  • As a function of (|{mathcal {S}}|) and k, the optimal deterministic ratio is polynomial: at most (O(k^2|{mathcal {S}}|)) and at least (Omega (sqrt{|{mathcal {S}}|})).

  • For any laminar family ({mathcal {S}}) of height h, the optimal ratios are O(hk) (deterministic) and (O(h^2log k)) (randomized).

  • The special case of laminar ({mathcal {S}}) that we call All-or-One Paging extends standard Paging by allowing each request to specify a specific slot to put the requested page in. The optimal deterministic ratio for weighted All-or-One Paging is (Theta (k)). Offline All-or-One Paging is (mathbb{N}mathbb{P})-hard.

Some results for the laminar case are shown via a reduction to the generalization of Paging in which each request specifies a set (P) of pages, and is satisfied by fetching any page from (P) into the cache. The optimal ratios for the latter problem (with laminar family of height h) are at most hk (deterministic) and (hH_k) (randomized).

{"title":"Online Paging with Heterogeneous Cache Slots","authors":"Marek Chrobak,&nbsp;Samuel Haney,&nbsp;Mehraneh Liaee,&nbsp;Debmalya Panigrahi,&nbsp;Rajmohan Rajaraman,&nbsp;Ravi Sundaram,&nbsp;Neal E. Young","doi":"10.1007/s00453-024-01270-z","DOIUrl":"10.1007/s00453-024-01270-z","url":null,"abstract":"<div><p>It is natural to generalize the online <span>(k)</span>-Server problem by allowing each request to specify not only a point <i>p</i>, but also a subset <i>S</i> of servers that may serve it. To date, only a few special cases of this problem have been studied. The objective of the work presented in this paper has been to more systematically explore this generalization in the case of uniform and star metrics. For uniform metrics, the problem is equivalent to a generalization of Paging in which each request specifies not only a page <i>p</i>, but also a subset <i>S</i> of cache slots, and is satisfied by having a copy of <i>p</i> in some slot in <i>S</i>. We call this problem <i>Slot-Heterogenous Paging</i>. In realistic settings only certain subsets of cache slots or servers would appear in requests. Therefore we parameterize the problem by specifying a family <span>({mathcal {S}}subseteq 2^{[k]})</span> of requestable slot sets, and we establish bounds on the competitive ratio as a function of the cache size <i>k</i> and family <span>({mathcal {S}})</span>:</p><ul>\u0000 <li>\u0000 <p>If all request sets are allowed (<span>({mathcal {S}}=2^{[k]}setminus {emptyset })</span>), the optimal deterministic and randomized competitive ratios are exponentially worse than for standard Paging (<span>({mathcal {S}}={[k]})</span>).</p>\u0000 </li>\u0000 <li>\u0000 <p>As a function of <span>(|{mathcal {S}}|)</span> and <i>k</i>, the optimal deterministic ratio is polynomial: at most <span>(O(k^2|{mathcal {S}}|))</span> and at least <span>(Omega (sqrt{|{mathcal {S}}|}))</span>.</p>\u0000 </li>\u0000 <li>\u0000 <p>For any laminar family <span>({mathcal {S}})</span> of height <i>h</i>, the optimal ratios are <i>O</i>(<i>hk</i>) (deterministic) and <span>(O(h^2log k))</span> (randomized).</p>\u0000 </li>\u0000 <li>\u0000 <p>The special case of laminar <span>({mathcal {S}})</span> that we call <i>All-or-One Paging</i> extends standard Paging by allowing each request to specify a specific slot to put the requested page in. The optimal deterministic ratio for <i>weighted</i> All-or-One Paging is <span>(Theta (k))</span>. Offline All-or-One Paging is <span>(mathbb{N}mathbb{P})</span>-hard.</p>\u0000 </li>\u0000 </ul><p> Some results for the laminar case are shown via a reduction to the generalization of Paging in which each request specifies a set <span>(P)</span> of <i>pages</i>, and is satisfied by fetching any page from <span>(P)</span> into the cache. The optimal ratios for the latter problem (with laminar family of height <i>h</i>) are at most <i>hk</i> (deterministic) and <span>(hH_k)</span> (randomized).</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"87 1","pages":"89 - 131"},"PeriodicalIF":0.9,"publicationDate":"2024-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01270-z.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142995413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anti-factor is FPT Parameterized by Treewidth and List Size (but Counting is Hard)
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-10-15 DOI: 10.1007/s00453-024-01265-w
Dániel Marx, Govind S. Sankar, Philipp Schepper

In the general AntiFactor problem, a graph G and, for every vertex v of G, a set (X_vsubseteq {mathbb {N}}) of forbidden degrees is given. The task is to find a set S of edges such that the degree of v in S is not in the set (X_v). Standard techniques (dynamic programming plus fast convolution) can be used to show that if M is the largest forbidden degree, then the problem can be solved in time ((M+2)^{{operatorname {tw}}}cdot n^{{mathcal {O}}(1)}) if a tree decomposition of width ({operatorname {tw}}) is given. However, significantly faster algorithms are possible if the sets (X_v) are sparse: our main algorithmic result shows that if every vertex has at most (x) forbidden degrees (we call this special case AntiFactorx), then the problem can be solved in time ((x+1)^{{mathcal {O}}({operatorname {tw}})}cdot n^{{mathcal {O}}(1)}). That is, AntiFactorx is fixed-parameter tractable parameterized by treewidth ({operatorname {tw}}) and the maximum number (x) of excluded degrees. Our algorithm uses the technique of representative sets, which can be generalized to the optimization version, but (as expected) not to the counting version of the problem. In fact, we show that #AntiFactor1 is already #W ([1])-hard parameterized by the width of the given decomposition. Moreover, we show that, unlike for the decision version, the standard dynamic programming algorithm is essentially optimal for the counting version. Formally, for a fixed nonempty set (X), we denote by (X)-AntiFactor the special case where every vertex v has the same set (X_v=X) of forbidden degrees. We show the following lower bound for every fixed set (X): if there is an (epsilon >0) such that #(X)-AntiFactor can be solved in time ((max X+2-epsilon )^{{operatorname {tw}}}cdot n^{{mathcal {O}}(1)}) given a tree decomposition of width ({operatorname {tw}}), then the counting strong exponential-time hypothesis (#SETH) fails.

{"title":"Anti-factor is FPT Parameterized by Treewidth and List Size (but Counting is Hard)","authors":"Dániel Marx,&nbsp;Govind S. Sankar,&nbsp;Philipp Schepper","doi":"10.1007/s00453-024-01265-w","DOIUrl":"10.1007/s00453-024-01265-w","url":null,"abstract":"<div><p>In the general <span>AntiFactor</span> problem, a graph <i>G</i> and, for every vertex <i>v</i> of <i>G</i>, a set <span>(X_vsubseteq {mathbb {N}})</span> of forbidden degrees is given. The task is to find a set <i>S</i> of edges such that the degree of <i>v</i> in <i>S</i> is <i>not</i> in the set <span>(X_v)</span>. Standard techniques (dynamic programming plus fast convolution) can be used to show that if <i>M</i> is the largest forbidden degree, then the problem can be solved in time <span>((M+2)^{{operatorname {tw}}}cdot n^{{mathcal {O}}(1)})</span> if a tree decomposition of width <span>({operatorname {tw}})</span> is given. However, significantly faster algorithms are possible if the sets <span>(X_v)</span> are sparse: our main algorithmic result shows that if every vertex has at most <span>(x)</span> forbidden degrees (we call this special case <span>AntiFactor</span><sub>x</sub>), then the problem can be solved in time <span>((x+1)^{{mathcal {O}}({operatorname {tw}})}cdot n^{{mathcal {O}}(1)})</span>. That is, <span>AntiFactor</span><sub>x</sub> is fixed-parameter tractable parameterized by treewidth <span>({operatorname {tw}})</span> and the maximum number <span>(x)</span> of excluded degrees. Our algorithm uses the technique of representative sets, which can be generalized to the optimization version, but (as expected) not to the counting version of the problem. In fact, we show that #<span>AntiFactor</span><sub>1</sub> is already #<span>W</span> <span>([1])</span>-hard parameterized by the width of the given decomposition. Moreover, we show that, unlike for the decision version, the standard dynamic programming algorithm is essentially optimal for the counting version. Formally, for a fixed nonempty set <span>(X)</span>, we denote by <span>(X)</span>-<span>AntiFactor</span> the special case where every vertex <i>v</i> has the same set <span>(X_v=X)</span> of forbidden degrees. We show the following lower bound for every fixed set <span>(X)</span>: if there is an <span>(epsilon &gt;0)</span> such that #<span>(X)</span>-<span>AntiFactor</span> can be solved in time <span>((max X+2-epsilon )^{{operatorname {tw}}}cdot n^{{mathcal {O}}(1)})</span> given a tree decomposition of width <span>({operatorname {tw}})</span>, then the counting strong exponential-time hypothesis (#SETH) fails.\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"87 1","pages":"22 - 88"},"PeriodicalIF":0.9,"publicationDate":"2024-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01265-w.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142994791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy Constrained Depth First Search 能量受限深度优先搜索
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-10-12 DOI: 10.1007/s00453-024-01275-8
Shantanu Das, Dariusz Dereniowski, Przemysław Uznański

Depth first search is a natural algorithmic technique for constructing a closed route that visits all vertices of a graph. The length of such a route equals, in an edge-weighted tree, twice the total weight of all edges of the tree and this is asymptotically optimal over all exploration strategies. This paper considers a variant of such search strategies where the length of each route is bounded by a positive integer B (e.g. due to limited energy resources of the searcher). The objective is to cover all the edges of a tree T using the minimum number of routes, each starting and ending at the root and each being of length at most B. To this end, we analyze the following natural greedy tree traversal process that is based on decomposing a depth first search traversal into a sequence of limited length routes. Given any arbitrary depth first search traversal R of the tree T, we cover R with routes (R_1,ldots ,R_l), each of length at most B such that: (R_i) starts at the root, reaches directly the farthest point of R visited by (R_{i-1}), then (R_i) continues along the path R as far as possible, and finally (R_i) returns to the root. We call the above algorithm piecemeal-DFS and we prove that it achieves the asymptotically minimal number of routes l, regardless of the choice of R. Our analysis also shows that the total length of the traversal (and thus the traversal time) of piecemeal-DFS is asymptotically minimum over all energy-constrained exploration strategies. The fact that R can be chosen arbitrarily means that the exploration strategy can be constructed in an online fashion when the input tree T is not known in advance. Each route (R_i) can be constructed without any knowledge of the yet unvisited part of T. Surprisingly, our results show that depth first search is efficient for energy constrained exploration of trees, even though it is known that the same does not hold for energy constrained exploration of arbitrary graphs.

深度优先搜索是一种天然的算法技术,用于构建一条能访问图中所有顶点的封闭路径。在有边加权的树中,这种路径的长度等于树中所有边总重量的两倍,而且在所有探索策略中,这是渐近最优的。本文考虑的是这种搜索策略的一种变体,即每条路径的长度由正整数 B 限定(例如,由于搜索者的能源资源有限)。我们的目标是用最少的路径覆盖树 T 的所有边,每条路径以根为起点和终点,每条路径的长度最多为 B。为此,我们分析了以下自然贪婪树遍历过程,该过程基于将深度优先搜索遍历分解为长度有限的路径序列。给定树 T 的任意深度优先搜索遍历 R,我们用路径 (R_1,ldots,R_l)覆盖 R,每个路径的长度最多为 B,这样(R_i)从根开始,直接到达(R_{i-1})访问过的R的最远点,然后(R_i)尽可能地沿着R的路径继续前进,最后(R_i)返回根。我们称上述算法为零碎-DFS,并证明无论 R 如何选择,它都能实现渐近最小的路径数 l。我们的分析还表明,在所有能量受限的探索策略中,零碎-DFS 的遍历总长度(以及遍历时间)都是渐近最小的。R 可以任意选择这一事实意味着,当输入树 T 事先未知时,探索策略可以在线构建。令人惊讶的是,我们的结果表明,深度优先搜索对于能量受限的树探索是有效的,尽管众所周知,对于任意图的能量受限探索来说,这一点并不成立。
{"title":"Energy Constrained Depth First Search","authors":"Shantanu Das,&nbsp;Dariusz Dereniowski,&nbsp;Przemysław Uznański","doi":"10.1007/s00453-024-01275-8","DOIUrl":"10.1007/s00453-024-01275-8","url":null,"abstract":"<div><p>Depth first search is a natural algorithmic technique for constructing a closed route that visits all vertices of a graph. The length of such a route equals, in an edge-weighted tree, twice the total weight of all edges of the tree and this is asymptotically optimal over all exploration strategies. This paper considers a variant of such search strategies where the length of each route is bounded by a positive integer <i>B</i> (e.g. due to limited energy resources of the searcher). The objective is to cover all the edges of a tree <i>T</i> using the minimum number of routes, each starting and ending at the root and each being of length at most <i>B</i>. To this end, we analyze the following natural greedy tree traversal process that is based on decomposing a depth first search traversal into a sequence of limited length routes. Given any arbitrary depth first search traversal <i>R</i> of the tree <i>T</i>, we cover <i>R</i> with routes <span>(R_1,ldots ,R_l)</span>, each of length at most <i>B</i> such that: <span>(R_i)</span> starts at the root, reaches directly the farthest point of <i>R</i> visited by <span>(R_{i-1})</span>, then <span>(R_i)</span> continues along the path <i>R</i> as far as possible, and finally <span>(R_i)</span> returns to the root. We call the above algorithm <i>piecemeal-DFS</i> and we prove that it achieves the asymptotically minimal number of routes <i>l</i>, regardless of the choice of <i>R</i>. Our analysis also shows that the total length of the traversal (and thus the traversal time) of piecemeal-DFS is asymptotically minimum over all energy-constrained exploration strategies. The fact that <i>R</i> can be chosen arbitrarily means that the exploration strategy can be constructed in an online fashion when the input tree <i>T</i> is not known in advance. Each route <span>(R_i)</span> can be constructed without any knowledge of the yet unvisited part of <i>T</i>. Surprisingly, our results show that depth first search is efficient for energy constrained exploration of trees, even though it is known that the same does not hold for energy constrained exploration of arbitrary graphs.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 12","pages":"3759 - 3782"},"PeriodicalIF":0.9,"publicationDate":"2024-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01275-8.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142636684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Scheduling Mechanisms Beyond the Worst Case
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-10-12 DOI: 10.1007/s00453-024-01277-6
Yansong Gao, Jie Zhang

The problem of scheduling unrelated machines has been studied since the inception of algorithmic mechanism design (Nisan and Ronen, Algorithmic mechanism design(extended abstract). In: Proceedings of the Thirty First Annual ACM Symposium on Theory of Computing (STOC), pp. 129–140, 1999. It is a resource allocation problem that entails assigning m tasks to n machines for execution. Machines are regarded as strategic agents who may lie about their execution costs so as to minimize their time cost. To address the situation when monetary payment is not an option to compensate the machines’ costs, Koutsoupias (Theory Comput Syst 54:375–387, 2014) devised two truthful mechanisms, K and P respectively, that achieves an approximation ratio of (frac{n+1}{2}) and n, for social cost minimization. In addition, no truthful mechanism can achieve an approximation ratio better than (frac{n+1}{2}). Hence, mechanism K is optimal. While the approximation ratio provides a strong worst-case guarantee, it also limits us to a comprehensive understanding of mechanism performance on various inputs. This paper investigates these two scheduling mechanisms beyond the worst case. We first show that mechanism K achieves a smaller social cost than mechanism P on every input. That is, mechanism K is pointwise better than mechanism P. Next, for each task, when machines’ execution costs are independent and identically drawn from a task-specific distribution, we show that the average-case approximation ratio of mechanism K converges to a constant determined by the task-specific distribution. This bound is tight for mechanism K. For a better understanding of this distribution-dependent constant, on the one hand, we estimate its value by plugging in a few common distributions; on the other, we show that this converging bound improves a known bound (Zhang in Algorithmica 83(6):1638–1652, 2021)) which only captures the single-task setting. Last, we find that the average-case approximation ratio of mechanism P converges to the same constant.

{"title":"On Scheduling Mechanisms Beyond the Worst Case","authors":"Yansong Gao,&nbsp;Jie Zhang","doi":"10.1007/s00453-024-01277-6","DOIUrl":"10.1007/s00453-024-01277-6","url":null,"abstract":"<div><p>The problem of scheduling unrelated machines has been studied since the inception of algorithmic mechanism design (Nisan and Ronen, Algorithmic mechanism design(extended abstract). In: Proceedings of the Thirty First Annual ACM Symposium on Theory of Computing (STOC), pp. 129–140, 1999. It is a resource allocation problem that entails assigning <i>m</i> tasks to <i>n</i> machines for execution. Machines are regarded as strategic agents who may lie about their execution costs so as to minimize their time cost. To address the situation when monetary payment is not an option to compensate the machines’ costs, Koutsoupias (Theory Comput Syst 54:375–387, 2014) devised two <i>truthful</i> mechanisms, K and P respectively, that achieves an approximation ratio of <span>(frac{n+1}{2})</span> and <i>n</i>, for social cost minimization. In addition, no truthful mechanism can achieve an approximation ratio better than <span>(frac{n+1}{2})</span>. Hence, mechanism K is optimal. While the approximation ratio provides a strong worst-case guarantee, it also limits us to a comprehensive understanding of mechanism performance on various inputs. This paper investigates these two scheduling mechanisms beyond the worst case. We first show that mechanism K achieves a smaller social cost than mechanism P on every input. That is, mechanism K is pointwise better than mechanism P. Next, for each task, when machines’ execution costs are independent and identically drawn from a task-specific distribution, we show that the average-case approximation ratio of mechanism K converges to a constant determined by the task-specific distribution. This bound is tight for mechanism K. For a better understanding of this distribution-dependent constant, on the one hand, we estimate its value by plugging in a few common distributions; on the other, we show that this converging bound improves a known bound (Zhang in Algorithmica 83(6):1638–1652, 2021)) which only captures the single-task setting. Last, we find that the average-case approximation ratio of mechanism P converges to the same constant.\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"87 1","pages":"1 - 21"},"PeriodicalIF":0.9,"publicationDate":"2024-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01277-6.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142994640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recovering the Original Simplicity: Succinct and Exact Quantum Algorithm for the Welded Tree Problem 恢复原始的简单性:焊接树问题的简洁精确量子算法
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-10-04 DOI: 10.1007/s00453-024-01273-w
Guanzhong Li, Lvzhou Li, Jingquan Luo

This work revisits quantum algorithms for the well-known welded tree problem, proposing a succinct quantum algorithm based on the simple coined quantum walks. It iterates the naturally defined coined quantum walk operator for a classically precomputed number of iterations, and measures. The number of iterations is linear in the depth of the tree. The success probability of this procedure is inversely linear in the depth of the tree. Moreover, it is the same for all instances of the problem of a fixed size, therefore, we can use the exact quantum amplitude amplification subroutine to answer with probability 1. This gives an exponential speedup over any classical algorithm for the same problem. The significance of the results may be seen as follows. (i) Our algorithm is rather simple compared with the one in (Jeffery and Zur, STOC’2023), which not only breaks the stereotype that coined quantum walks can only achieve quadratic speedups over classical algorithms, but also demonstrates the power of the simplest quantum walk model. (ii) Our algorithm achieves certainty of success for the first time. Thus, it becomes one of the few examples that exhibit exponential separation between exact quantum and randomized query complexities.

这项研究重新审视了众所周知的焊接树问题的量子算法,提出了一种基于简单的内联量子行走的简洁量子算法。它对自然定义的巧合量子行走算子进行迭代,迭代次数按经典方法预先计算,并进行测量。迭代次数与树的深度成线性关系。这个过程的成功概率与树的深度成反比。此外,对于大小固定的所有问题实例,成功概率都是相同的,因此,我们可以使用精确量子振幅放大子程序,以 1 的概率回答问题。这比任何经典算法对同一问题的处理速度都快了指数级。这些结果的意义如下。(i) 与(Jeffery 和 Zur,STOC'2023)中的算法相比,我们的算法相当简单,这不仅打破了创造性量子行走只能比经典算法实现二次加速的刻板印象,而且展示了最简单量子行走模型的威力。(ii) 我们的算法首次实现了成功的确定性。因此,它成为在精确量子和随机查询复杂性之间表现出指数级分离的少数例子之一。
{"title":"Recovering the Original Simplicity: Succinct and Exact Quantum Algorithm for the Welded Tree Problem","authors":"Guanzhong Li,&nbsp;Lvzhou Li,&nbsp;Jingquan Luo","doi":"10.1007/s00453-024-01273-w","DOIUrl":"10.1007/s00453-024-01273-w","url":null,"abstract":"<div><p>This work revisits quantum algorithms for the well-known welded tree problem, proposing a succinct quantum algorithm based on the simple coined quantum walks. It iterates the naturally defined coined quantum walk operator for a classically precomputed number of iterations, and measures. The number of iterations is linear in the depth of the tree. The success probability of this procedure is inversely linear in the depth of the tree. Moreover, it is the same for all instances of the problem of a fixed size, therefore, we can use the exact quantum amplitude amplification subroutine to answer with probability 1. This gives an exponential speedup over any classical algorithm for the same problem. The significance of the results may be seen as follows. (i) Our algorithm is rather simple compared with the one in (Jeffery and Zur, STOC’2023), which not only breaks the stereotype that coined quantum walks can only achieve quadratic speedups over classical algorithms, but also demonstrates the power of the simplest quantum walk model. (ii) Our algorithm achieves certainty of success for the first time. Thus, it becomes one of the few examples that exhibit exponential separation between exact quantum and randomized query complexities.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 12","pages":"3719 - 3758"},"PeriodicalIF":0.9,"publicationDate":"2024-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142636718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Permutation-constrained Common String Partitions with Applications 排列受限的普通字符串分区及其应用
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-09-30 DOI: 10.1007/s00453-024-01276-7
Manuel Lafond, Binhai Zhu

We study a new combinatorial problem based on the famous Minimum Common String Partition problem, which we call Permutation-constrained Common String Partition (PCSP for short). In PCSP, we are given two sequences/genomes s and t with the same length and a permutation (pi ) on ([ell ]), the question is to decide whether it is possible to decompose s and t into (ell ) blocks that can be matched according to some specified requirements, and that conform with the permutation (pi ). Our main result is that PCSP is FPT in parameter (ell + d), where d is the maximum number of occurrences that any symbol may have in s or t. We also study a variant where the input specifies whether each matched pair of block needs to be preserved as is, or reversed. With this result on PCSP, we show that a series of genome rearrangement problems are FPT (k + d), where k is the rearrangement distance between two genomes of interest.

我们在著名的最小公共字符串分割(Minimum Common String Partition)问题的基础上研究了一个新的组合问题,我们称之为 "排列约束公共字符串分割"(Permutation-constrained Common String Partition,简称 PCSP)。在 PCSP 中,我们给定了两个长度相同的序列/基因组 s 和 t,以及一个关于 ([ell ]) 的排列组合 (pi),问题是要决定是否有可能把 s 和 t 分解成可以根据某些指定要求匹配的、符合排列组合 (pi)的块((ell ))。我们的主要结果是 PCSP 在参数 (ell + d) 中是 FPT,其中 d 是任何符号在 s 或 t 中可能出现的最大次数。我们还研究了一种变体,即输入指定了每一对匹配的块是需要原样保留,还是需要反转。利用 PCSP 的这一结果,我们证明了一系列基因组重排问题都是 FPT (k + d) ,其中 k 是两个相关基因组之间的重排距离。
{"title":"Permutation-constrained Common String Partitions with Applications","authors":"Manuel Lafond,&nbsp;Binhai Zhu","doi":"10.1007/s00453-024-01276-7","DOIUrl":"10.1007/s00453-024-01276-7","url":null,"abstract":"<div><p>We study a new combinatorial problem based on the famous Minimum Common String Partition problem, which we call Permutation-constrained Common String Partition (PCSP for short). In PCSP, we are given two sequences/genomes <i>s</i> and <i>t</i> with the same length and a permutation <span>(pi )</span> on <span>([ell ])</span>, the question is to decide whether it is possible to decompose <i>s</i> and <i>t</i> into <span>(ell )</span> blocks that can be matched according to some specified requirements, and that conform with the permutation <span>(pi )</span>. Our main result is that PCSP is FPT in parameter <span>(ell + d)</span>, where <i>d</i> is the maximum number of occurrences that any symbol may have in <i>s</i> or <i>t</i>. We also study a variant where the input specifies whether each matched pair of block needs to be preserved as is, or reversed. With this result on PCSP, we show that a series of genome rearrangement problems are FPT <span>(k + d)</span>, where <i>k</i> is the rearrangement distance between two genomes of interest.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 12","pages":"3684 - 3718"},"PeriodicalIF":0.9,"publicationDate":"2024-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142636949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reachability of Fair Allocations via Sequential Exchanges 通过顺序交换实现公平分配的可达性
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-09-21 DOI: 10.1007/s00453-024-01271-y
Ayumi Igarashi, Naoyuki Kamiyama, Warut Suksompong, Sheung Man Yuen

In the allocation of indivisible goods, a prominent fairness notion is envy-freeness up to one good (EF1). We initiate the study of reachability problems in fair division by investigating the problem of whether one EF1 allocation can be reached from another EF1 allocation via a sequence of exchanges such that every intermediate allocation is also EF1. We show that two EF1 allocations may not be reachable from each other even in the case of two agents, and deciding their reachability is PSPACE-complete in general. On the other hand, we prove that reachability is guaranteed for two agents with identical or binary utilities as well as for any number of agents with identical binary utilities. We also examine the complexity of deciding whether there is an EF1 exchange sequence that is optimal in the number of exchanges required.

在不可分割物品的分配中,一个突出的公平概念是一种物品的无嫉妒(EF1)。我们开始研究公平分配中的可达性问题,研究一个 EF1 分配是否可以通过一系列交换从另一个 EF1 分配到达,使得每个中间分配也是 EF1。我们证明,即使在有两个代理的情况下,两个 EF1 分配也不一定能相互到达,而且决定它们的可到达性在一般情况下是 PSPACE-complete。另一方面,我们证明,对于具有相同或二进制效用的两个代理,以及具有相同二进制效用的任意数量的代理,都能保证可达性。我们还研究了决定是否存在所需的交换次数最优的 EF1 交换序列的复杂性。
{"title":"Reachability of Fair Allocations via Sequential Exchanges","authors":"Ayumi Igarashi,&nbsp;Naoyuki Kamiyama,&nbsp;Warut Suksompong,&nbsp;Sheung Man Yuen","doi":"10.1007/s00453-024-01271-y","DOIUrl":"10.1007/s00453-024-01271-y","url":null,"abstract":"<div><p>In the allocation of indivisible goods, a prominent fairness notion is envy-freeness up to one good (EF1). We initiate the study of reachability problems in fair division by investigating the problem of whether one EF1 allocation can be reached from another EF1 allocation via a sequence of exchanges such that every intermediate allocation is also EF1. We show that two EF1 allocations may not be reachable from each other even in the case of two agents, and deciding their reachability is PSPACE-complete in general. On the other hand, we prove that reachability is guaranteed for two agents with identical or binary utilities as well as for any number of agents with identical binary utilities. We also examine the complexity of deciding whether there is an EF1 exchange sequence that is optimal in the number of exchanges required.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 12","pages":"3653 - 3683"},"PeriodicalIF":0.9,"publicationDate":"2024-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01271-y.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142636704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Flipping the Fréchet Distance 关于翻转弗雷谢特距离
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-09-20 DOI: 10.1007/s00453-024-01267-8
Omrit Filtser, Mayank Goswami, Joseph S. B. Mitchell, Valentin Polishchuk

The classical and extensively-studied Fréchet distance between two curves is defined as an inf max, where the infimum is over all traversals of the curves, and the maximum is over all concurrent positions of the two agents. In this article we investigate a “flipped” Fréchet measure defined by a sup min – the supremum is over all traversals of the curves, and the minimum is over all concurrent positions of the two agents. This measure produces a notion of “social distance” between two curves (or general domains), where agents traverse curves while trying to stay as far apart as possible. We first study the flipped Fréchet measure between two polygonal curves in one and two dimensions, providing conditional lower bounds and matching algorithms. We then consider this measure on polygons, where it denotes the minimum distance that two agents can maintain while restricted to travel in or on the boundary of the same polygon. We investigate several variants of the problem in this setting, for some of which we provide linear-time algorithms. We draw connections between our proposed flipped Fréchet measure and existing related work in computational geometry, hoping that our new measure may spawn investigations akin to those performed for the Fréchet distance, and into further interesting problems that arise.

两条曲线之间的弗雷谢特距离被定义为 inf max,其中最小值是曲线的所有遍历,最大值是两个代理的所有同时位置。在本文中,我们将研究一种 "翻转 "的弗雷谢特度量,其定义为 sup min - 上极大值是曲线的所有遍历,而最小值是两个代理的所有同时位置。这种度量产生了两个曲线(或一般域)之间的 "社会距离 "概念,即代理人在穿越曲线时尽量保持距离。我们首先研究了一维和二维两条多边形曲线之间的翻转弗雷谢特度量,提供了条件下限和匹配算法。然后,我们考虑多边形上的这一度量,它表示两个代理在被限制在同一多边形内或边界上行进时所能保持的最小距离。我们研究了该问题在这种情况下的几种变体,并为其中一些变体提供了线性时间算法。我们将我们提出的翻转弗雷谢特度量与计算几何中现有的相关工作联系起来,希望我们的新度量能引发与弗雷谢特距离类似的研究,并引发更多有趣的问题。
{"title":"On Flipping the Fréchet Distance","authors":"Omrit Filtser,&nbsp;Mayank Goswami,&nbsp;Joseph S. B. Mitchell,&nbsp;Valentin Polishchuk","doi":"10.1007/s00453-024-01267-8","DOIUrl":"10.1007/s00453-024-01267-8","url":null,"abstract":"<div><p>The classical and extensively-studied <i>Fréchet distance</i> between two curves is defined as an <i>inf max</i>, where the infimum is over all traversals of the curves, and the maximum is over all concurrent positions of the two agents. In this article we investigate a “flipped” Fréchet measure defined by a <i>sup min</i> – the supremum is over all traversals of the curves, and the minimum is over all concurrent positions of the two agents. This measure produces a notion of “social distance” between two curves (or general domains), where agents traverse curves while trying to stay as far apart as possible. We first study the flipped Fréchet measure between two polygonal curves in one and two dimensions, providing conditional lower bounds and matching algorithms. We then consider this measure on polygons, where it denotes the minimum distance that two agents can maintain while restricted to travel in or on the boundary of the same polygon. We investigate several variants of the problem in this setting, for some of which we provide linear-time algorithms. We draw connections between our proposed flipped Fréchet measure and existing related work in computational geometry, hoping that our new measure may spawn investigations akin to those performed for the Fréchet distance, and into further interesting problems that arise.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 12","pages":"3629 - 3652"},"PeriodicalIF":0.9,"publicationDate":"2024-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142636679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Algorithmica
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1