首页 > 最新文献

Algorithmica最新文献

英文 中文
Minimizing the Maximum Flow Time in the Online Food Delivery Problem 在线食品配送问题中的最大流通时间最小化
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2023-10-31 DOI: 10.1007/s00453-023-01177-1
Xiangyu Guo, Shi Li, Kelin Luo, Yuhao Zhang

We study a common delivery problem encountered in nowadays online food-ordering platforms: Customers order dishes online, and the restaurant delivers the food after receiving the order. Specifically, we study a problem where k vehicles of capacity c are serving a set of requests ordering food from one restaurant. After a request arrives, it can be served by a vehicle moving from the restaurant to its delivery location. We are interested in serving all requests while minimizing the maximum flow-time, i.e., the maximum time length a customer waits to receive his/her food after submitting the order. The problem also has a close connection with the broadcast scheduling problem with maximum flow time objective. We show that the problem is hard in both offline and online settings even when (k = 1) and (c = infty ): There is a hardness of approximation of (Omega (n)) for the offline problem, and a lower bound of (Omega (n)) on the competitive ratio of any online algorithm, where n is number of points in the metric. We circumvent the strong negative results in two directions. Our main result is an O(1)-competitive online algorithm for the uncapaciated (i.e, (c = infty )) food delivery problem on tree metrics; we also have a negative result showing that the condition (c = infty ) is needed. Then we consider the speed-augmentation model, in which our online algorithm is allowed to use (alpha )-speed vehicles, where (alpha ge 1) is called the speeding factor. We develop an exponential time ((1+epsilon ))-speeding (O(1/epsilon ))-competitive algorithm for any (epsilon > 0). A polynomial time algorithm can be obtained with a speeding factor of (alpha _{textsf{TSP}}+ epsilon ) or (alpha _{textsf{CVRP}}+ epsilon ), depending on whether the problem is uncapacitated. Here (alpha _{textsf{TSP}}) and (alpha _{textsf{CVRP}}) are the best approximation factors for the traveling salesman (TSP) and capacitated vehicle routing (CVRP) problems respectively. We complement the results with some negative ones.

我们研究了当今网上订餐平台中常见的送餐问题:顾客在线订餐,餐厅在收到订单后送餐。具体来说,我们研究的是这样一个问题:容量为 c 的 k 辆车正在为一组从一家餐厅订餐的请求提供服务。请求到达后,可以由一辆从餐厅开往送餐地点的车辆提供服务。我们感兴趣的是在为所有请求提供服务的同时,最大限度地减少流动时间,即顾客提交订单后等待接收食物的最长时间。这个问题与以最大流动时间为目标的广播调度问题也有密切联系。我们证明,即使当 (k = 1) 和 (c = infty ) 时,该问题在离线和在线环境下都很难解决:离线问题的近似难度为(Omega (n)),任何在线算法的竞争比率的下限为(Omega (n)),其中 n 是度量中的点数。我们从两个方面规避了强负结果。我们的主要结果是针对树度量上的无缺口(即 (c = infty ))食物运送问题的 O(1)-competitive 在线算法;我们还有一个否定结果,表明需要 (c = infty )这一条件。然后我们考虑速度增强模型,其中我们的在线算法允许使用 (α )-速度的车辆,其中 (α ge 1) 被称为加速因子。我们开发了一种指数时间((1+epsilon ))-超速(O(1/epsilon ))-竞争算法,适用于任意(epsilon > 0).多项式时间算法的加速因子可以是 (α _{textsf{TSP}}+ epsilon )或 (α _{textsf{CVRP}}+ epsilon ),这取决于问题是否无包袱。这里,(alpha _{textsf{TSP}})和(alpha _{textsf{CVRP}})分别是旅行推销员(TSP)问题和获容车辆路由(CVRP)问题的最佳近似因子。我们用一些负面的结果来补充这些结果。
{"title":"Minimizing the Maximum Flow Time in the Online Food Delivery Problem","authors":"Xiangyu Guo,&nbsp;Shi Li,&nbsp;Kelin Luo,&nbsp;Yuhao Zhang","doi":"10.1007/s00453-023-01177-1","DOIUrl":"10.1007/s00453-023-01177-1","url":null,"abstract":"<div><p>We study a common delivery problem encountered in nowadays online food-ordering platforms: Customers order dishes online, and the restaurant delivers the food after receiving the order. Specifically, we study a problem where <i>k</i> vehicles of capacity <i>c</i> are serving a set of requests ordering food from one restaurant. After a request arrives, it can be served by a vehicle moving from the restaurant to its delivery location. We are interested in serving all requests while minimizing the maximum flow-time, i.e., the maximum time length a customer waits to receive his/her food after submitting the order. The problem also has a close connection with the broadcast scheduling problem with maximum flow time objective. We show that the problem is hard in both offline and online settings even when <span>(k = 1)</span> and <span>(c = infty )</span>: There is a hardness of approximation of <span>(Omega (n))</span> for the offline problem, and a lower bound of <span>(Omega (n))</span> on the competitive ratio of any online algorithm, where <i>n</i> is number of points in the metric. We circumvent the strong negative results in two directions. Our main result is an <i>O</i>(1)-competitive online algorithm for the uncapaciated (i.e, <span>(c = infty )</span>) food delivery problem on tree metrics; we also have a negative result showing that the condition <span>(c = infty )</span> is needed. Then we consider the speed-augmentation model, in which our online algorithm is allowed to use <span>(alpha )</span>-speed vehicles, where <span>(alpha ge 1)</span> is called the speeding factor. We develop an exponential time <span>((1+epsilon ))</span>-speeding <span>(O(1/epsilon ))</span>-competitive algorithm for any <span>(epsilon &gt; 0)</span>. A polynomial time algorithm can be obtained with a speeding factor of <span>(alpha _{textsf{TSP}}+ epsilon )</span> or <span>(alpha _{textsf{CVRP}}+ epsilon )</span>, depending on whether the problem is uncapacitated. Here <span>(alpha _{textsf{TSP}})</span> and <span>(alpha _{textsf{CVRP}})</span> are the best approximation factors for the traveling salesman (TSP) and capacitated vehicle routing (CVRP) problems respectively. We complement the results with some negative ones.\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 4","pages":"907 - 943"},"PeriodicalIF":0.9,"publicationDate":"2023-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135810614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Counting Cycles on Planar Graphs in Subexponential Time 以亚指数时间计算平面图上的周期
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2023-10-30 DOI: 10.1007/s00453-023-01182-4
Jin-Yi Cai, Ashwin Maran

We study the problem of counting all cycles or self- avoiding walks (SAWs) on triangulated planar graphs. We present a subexponential (2^{O(sqrt{n})}) time algorithm for this counting problem. Among the technical ingredients used in this algorithm are the planar separator theorem and a delicate analysis using pairs of Motzkin paths and Motzkin numbers. We can then adapt this algorithm to uniformly sample SAWs, in subexponential time. Our work is motivated by the problem of gerrymandered districting maps.

我们研究了在三角形平面图上计算所有循环或自避行(SAW)的问题。我们为这个计数问题提出了一种亚指数(2^{O(sqrt{n})}/)时间算法。该算法使用的技术要素包括平面分离定理以及使用莫兹金路径和莫兹金数对进行的精细分析。然后,我们可以调整该算法,在亚指数时间内对 SAW 进行均匀采样。我们的工作源于选区划分图问题。
{"title":"Counting Cycles on Planar Graphs in Subexponential Time","authors":"Jin-Yi Cai,&nbsp;Ashwin Maran","doi":"10.1007/s00453-023-01182-4","DOIUrl":"10.1007/s00453-023-01182-4","url":null,"abstract":"<div><p>We study the problem of counting all cycles or self- avoiding walks (SAWs) on triangulated planar graphs. We present a subexponential <span>(2^{O(sqrt{n})})</span> time algorithm for this counting problem. Among the technical ingredients used in this algorithm are the planar separator theorem and a delicate analysis using pairs of Motzkin paths and Motzkin numbers. We can then adapt this algorithm to uniformly sample SAWs, in subexponential time. Our work is motivated by the problem of gerrymandered districting maps.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 2","pages":"656 - 693"},"PeriodicalIF":0.9,"publicationDate":"2023-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136102273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Token Sliding on Graphs of Girth Five 五围图形上的令牌滑动
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2023-10-28 DOI: 10.1007/s00453-023-01181-5
Valentin Bartier, Nicolas Bousquet, Jihad Hanna, Amer E. Mouawad, Sebastian Siebertz

In the Token Sliding problem we are given a graph G and two independent sets (I_s) and (I_t) in G of size (k ge 1). The goal is to decide whether there exists a sequence (langle I_1, I_2, ldots , I_ell rangle ) of independent sets such that for all (j in {1,ldots , ell - 1}) the set (I_j) is an independent set of size k, (I_1 = I_s), (I_ell = I_t) and (I_j triangle I_{j + 1} = {u, v} in E(G)). Intuitively, we view each independent set as a collection of tokens placed on the vertices of the graph. Then, the problem asks whether there exists a sequence of independent sets that transforms (I_s) into (I_t) where at each step we are allowed to slide one token from a vertex to a neighboring vertex. In this paper, we focus on the parameterized complexity of Token Sliding parameterized by k. As shown by Bartier et al. (Algorithmica 83(9):2914–2951, 2021. https://doi.org/10.1007/s00453-021-00848-1), the problem is W[1]-hard on graphs of girth four or less, and the authors posed the question of whether there exists a constant (p ge 5) such that the problem becomes fixed-parameter tractable on graphs of girth at least p. We answer their question positively and prove that the problem is indeed fixed-parameter tractable on graphs of girth five or more, which establishes a full classification of the tractability of Token Sliding parameterized by the number of tokens based on the girth of the input graph.

在 "令牌滑动 "问题中,我们给定了一个图 G 和 G 中两个独立的集合 (I_s )和 (I_t ),它们的大小为 (k ge 1 )。我们的目标是判断是否存在一个独立集序列(langle I_1, I_2, ldots , I_ell rangle ),使得对于所有的(j in {1、集合(I_j)是大小为 k 的独立集合,(I_1 = I_s ),(I_ell = I_t )和(I_j 三角形 I_{j + 1} = ({u, v})是大小为 k 的独立集合,(I_1 = I_s ),(I_ell = I_t )和(I_j 三角形 I_{j + 1} = ({u, v})是大小为 k 的独立集合。在 E(G)中)。直观地说,我们把每个独立集看作是放置在图顶点上的代币集合。然后,问题问是否存在一个独立集序列,它可以将 (I_s)转化为 (I_t),其中每一步都允许我们将一个令牌从一个顶点滑向相邻的顶点。正如巴蒂尔等人(Algorithmica 83(9):2914-2951, 2021. https://doi.org/10.1007/s00453-021-00848-1)所指出的,在周长为 4 或更小的图上,这个问题是 W[1]-hard 的,作者提出了一个问题:是否存在一个常数 (p ge 5) 使得这个问题在周长至少为 p 的图上变得固定参数可控。我们肯定地回答了他们的问题,并证明该问题在周长为五或更大的图上确实是固定参数可处理的,这就建立了以基于输入图周长的标记数为参数的标记滑动可处理性的完整分类。
{"title":"Token Sliding on Graphs of Girth Five","authors":"Valentin Bartier,&nbsp;Nicolas Bousquet,&nbsp;Jihad Hanna,&nbsp;Amer E. Mouawad,&nbsp;Sebastian Siebertz","doi":"10.1007/s00453-023-01181-5","DOIUrl":"10.1007/s00453-023-01181-5","url":null,"abstract":"<div><p>In the <span>Token Sliding</span> problem we are given a graph <i>G</i> and two independent sets <span>(I_s)</span> and <span>(I_t)</span> in <i>G</i> of size <span>(k ge 1)</span>. The goal is to decide whether there exists a sequence <span>(langle I_1, I_2, ldots , I_ell rangle )</span> of independent sets such that for all <span>(j in {1,ldots , ell - 1})</span> the set <span>(I_j)</span> is an independent set of size <i>k</i>, <span>(I_1 = I_s)</span>, <span>(I_ell = I_t)</span> and <span>(I_j triangle I_{j + 1} = {u, v} in E(G))</span>. Intuitively, we view each independent set as a collection of tokens placed on the vertices of the graph. Then, the problem asks whether there exists a sequence of independent sets that transforms <span>(I_s)</span> into <span>(I_t)</span> where at each step we are allowed to slide one token from a vertex to a neighboring vertex. In this paper, we focus on the parameterized complexity of <span>Token Sliding</span> parameterized by <i>k</i>. As shown by Bartier et al. (Algorithmica 83(9):2914–2951, 2021. https://doi.org/10.1007/s00453-021-00848-1), the problem is <span>W[1]</span>-hard on graphs of girth four or less, and the authors posed the question of whether there exists a constant <span>(p ge 5)</span> such that the problem becomes fixed-parameter tractable on graphs of girth at least <i>p</i>. We answer their question positively and prove that the problem is indeed fixed-parameter tractable on graphs of girth five or more, which establishes a full classification of the tractability of <span>Token Sliding</span> parameterized by the number of tokens based on the girth of the input graph.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 2","pages":"638 - 655"},"PeriodicalIF":0.9,"publicationDate":"2023-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-023-01181-5.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136159019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recognizing Map Graphs of Bounded Treewidth 识别有界树宽的地图图形
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2023-10-27 DOI: 10.1007/s00453-023-01180-6
Patrizio Angelini, Michael A. Bekos, Giordano Da Lozzo, Martin Gronemann, Fabrizio Montecchiani, Alessandra Tappini

A map is a partition of the sphere into interior-disjoint regions homeomorphic to closed disks. Some regions are labeled as nations, while the remaining ones are labeled as holes. A map in which at most k nations touch at the same point is a k-map, while it is hole-free if it contains no holes. A graph is a map graph if there is a bijection between its vertices and the nations of a map, such that two nations touch if and only the corresponding vertices are connected by an edge. We present a fixed-parameter tractable algorithm for recognizing map graphs parameterized by treewidth. Its time complexity is linear in the size of the graph. It reports a certificate in the form of a so-called witness, if the input is a yes-instance. Our algorithmic framework is general enough to test, for any k, if the input graph admits a k-map or a hole-free k-map.

映射是将球面划分为与封闭磁盘同构的内部相邻区域。一些区域被标记为 "国",而其余区域被标记为 "洞"。最多有 k 个国家在同一点接触的图是 k 图,如果不包含洞,则是无洞图。如果一个图的顶点与地图中的国家之间存在双投影关系,那么这个图就是一个地图图,只有相应的顶点通过边相连时,两个国家才会接触。我们提出了一种固定参数的可行算法,用于识别以树宽为参数的地图图。其时间复杂度与图的大小成线性关系。如果输入是一个 "是 "的实例,它就会以所谓 "证人 "的形式报告证书。我们的算法框架具有足够的通用性,对于任意 k,都能测试输入图是否包含 k 映射或无洞 k 映射。
{"title":"Recognizing Map Graphs of Bounded Treewidth","authors":"Patrizio Angelini,&nbsp;Michael A. Bekos,&nbsp;Giordano Da Lozzo,&nbsp;Martin Gronemann,&nbsp;Fabrizio Montecchiani,&nbsp;Alessandra Tappini","doi":"10.1007/s00453-023-01180-6","DOIUrl":"10.1007/s00453-023-01180-6","url":null,"abstract":"<div><p>A map is a partition of the sphere into interior-disjoint regions homeomorphic to closed disks. Some regions are labeled as nations, while the remaining ones are labeled as holes. A map in which at most <i>k</i> nations touch at the same point is a <i>k</i>-map, while it is hole-free if it contains no holes. A graph is a map graph if there is a bijection between its vertices and the nations of a map, such that two nations touch if and only the corresponding vertices are connected by an edge. We present a fixed-parameter tractable algorithm for recognizing map graphs parameterized by treewidth. Its time complexity is linear in the size of the graph. It reports a certificate in the form of a so-called witness, if the input is a yes-instance. Our algorithmic framework is general enough to test, for any <i>k</i>, if the input graph admits a <i>k</i>-map or a hole-free <i>k</i>-map.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 2","pages":"613 - 637"},"PeriodicalIF":0.9,"publicationDate":"2023-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-023-01180-6.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136317040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Meta-Theorem for Distributed Certification 分布式认证元定理
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2023-10-25 DOI: 10.1007/s00453-023-01185-1
Pierre Fraigniaud, Pedro Montealegre, Ivan Rapaport, Ioan Todinca

Distributed certification, whether it be proof-labeling schemes, locally checkable proofs, etc., deals with the issue of certifying the legality of a distributed system with respect to a given boolean predicate. A certificate is assigned to each process in the system by a non-trustable oracle, and the processes are in charge of verifying these certificates, so that two properties are satisfied: completeness, i.e., for every legal instance, there is a certificate assignment leading all processes to accept, and soundness, i.e., for every illegal instance, and for every certificate assignment, at least one process rejects. The verification of the certificates must be fast, and the certificates themselves must be small. A large quantity of results have been produced in this framework, each aiming at designing a distributed certification mechanism for specific boolean predicates. This paper presents a “meta-theorem”, applying to many boolean predicates at once. Specifically, we prove that, for every boolean predicate on graphs definable in the monadic second-order (MSO) logic of graphs, there exists a distributed certification mechanism using certificates on (O(log ^2n)) bits in n-node graphs of bounded treewidth, with a verification protocol involving a single round of communication between neighbors.

分布式认证,无论是证明标记方案、本地可检查证明等,都是针对给定的布尔谓词,处理认证分布式系统合法性的问题。系统中的每个进程都由一个不可信的oracle分配一个证书,进程负责验证这些证书,从而满足两个属性:完整性,即对于每个合法实例,都有一个证书分配导致所有进程都接受;健全性,即对于每个非法实例,以及每个证书分配,至少有一个进程拒绝接受。证书的验证必须快速,证书本身必须小巧。在这一框架下产生了大量成果,每个成果都旨在为特定布尔谓词设计分布式认证机制。本文提出了一个同时适用于多个布尔谓词的 "元定理"。具体来说,我们证明了,对于每一个可在图的一元二阶(MSO)逻辑中定义的图上的布尔谓词,都存在一种分布式认证机制,该机制在有界树宽的 n 节点图中使用 (O(log ^2n))比特上的证书,验证协议只涉及邻居之间的一轮通信。
{"title":"A Meta-Theorem for Distributed Certification","authors":"Pierre Fraigniaud,&nbsp;Pedro Montealegre,&nbsp;Ivan Rapaport,&nbsp;Ioan Todinca","doi":"10.1007/s00453-023-01185-1","DOIUrl":"10.1007/s00453-023-01185-1","url":null,"abstract":"<div><p>Distributed certification, whether it be <i>proof-labeling schemes</i>, <i>locally checkable proofs</i>, etc., deals with the issue of certifying the legality of a distributed system with respect to a given boolean predicate. A certificate is assigned to each process in the system by a non-trustable oracle, and the processes are in charge of verifying these certificates, so that two properties are satisfied: <i>completeness</i>, i.e., for every legal instance, there is a certificate assignment leading all processes to accept, and <i>soundness</i>, i.e., for every illegal instance, and for every certificate assignment, at least one process rejects. The verification of the certificates must be fast, and the certificates themselves must be small. A large quantity of results have been produced in this framework, each aiming at designing a distributed certification mechanism for specific boolean predicates. This paper presents a “meta-theorem”, applying to many boolean predicates at once. Specifically, we prove that, for every boolean predicate on graphs definable in the monadic second-order (MSO) logic of graphs, there exists a distributed certification mechanism using certificates on <span>(O(log ^2n))</span> bits in <i>n</i>-node graphs of bounded treewidth, with a verification protocol involving a single round of communication between neighbors.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 2","pages":"585 - 612"},"PeriodicalIF":0.9,"publicationDate":"2023-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134973749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Randomized Strategies for Robust Combinatorial Optimization with Approximate Separation 近似分离的鲁棒组合优化随机策略
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2023-10-10 DOI: 10.1007/s00453-023-01175-3
Yasushi Kawase, Hanna Sumita

In this paper, we study the following robust optimization problem. Given a set family representing feasibility and candidate objective functions, we choose a feasible set, and then an adversary chooses one objective function, knowing our choice. The goal is to find a randomized strategy (i.e., a probability distribution over the feasible sets) that maximizes the expected objective value in the worst case. This problem is fundamental in wide areas such as artificial intelligence, machine learning, game theory, and optimization. To solve the problem, we provide a general framework based on the dual linear programming problem. In the framework, we utilize the ellipsoid algorithm with the approximate separation algorithm. We prove that there exists an (alpha )-approximation algorithm for our robust optimization problem if there exists an (alpha )-approximation algorithm for finding a (deterministic) feasible set that maximizes a nonnegative linear combination of the candidate objective functions. Using our result, we provide approximation algorithms for the max–min fair randomized allocation problem and the maximum cardinality robustness problem with a knapsack constraint.

本文研究以下鲁棒优化问题。给定一个代表可行性和候选目标函数的集合族,我们选择一个可行集合,然后对手在知道我们的选择后选择一个目标函数。我们的目标是找到一种随机策略(即可行集合的概率分布),在最坏情况下最大化预期目标值。这个问题是人工智能、机器学习、博弈论和优化等广泛领域的基本问题。为了解决这个问题,我们提供了一个基于对偶线性规划问题的通用框架。在这个框架中,我们利用了椭圆算法和近似分离算法。我们证明,如果存在一个(确定性)可行集的近似算法来找到最大化候选目标函数的非负线性组合的(确定性)可行集,那么我们的鲁棒优化问题就存在一个(α)近似算法。利用我们的结果,我们提供了最大最小公平随机分配问题和最大卡方健壮性问题的近似算法。
{"title":"Randomized Strategies for Robust Combinatorial Optimization with Approximate Separation","authors":"Yasushi Kawase,&nbsp;Hanna Sumita","doi":"10.1007/s00453-023-01175-3","DOIUrl":"10.1007/s00453-023-01175-3","url":null,"abstract":"<div><p>In this paper, we study the following robust optimization problem. Given a set family representing feasibility and candidate objective functions, we choose a feasible set, and then an adversary chooses one objective function, knowing our choice. The goal is to find a randomized strategy (i.e., a probability distribution over the feasible sets) that maximizes the expected objective value in the worst case. This problem is fundamental in wide areas such as artificial intelligence, machine learning, game theory, and optimization. To solve the problem, we provide a general framework based on the dual linear programming problem. In the framework, we utilize the ellipsoid algorithm with the approximate separation algorithm. We prove that there exists an <span>(alpha )</span>-approximation algorithm for our robust optimization problem if there exists an <span>(alpha )</span>-approximation algorithm for finding a (deterministic) feasible set that maximizes a nonnegative linear combination of the candidate objective functions. Using our result, we provide approximation algorithms for the max–min fair randomized allocation problem and the maximum cardinality robustness problem with a knapsack constraint.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 2","pages":"566 - 584"},"PeriodicalIF":0.9,"publicationDate":"2023-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-023-01175-3.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136295362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computing Generalized Convolutions Faster Than Brute Force 比蛮力更快地计算广义卷积
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2023-10-06 DOI: 10.1007/s00453-023-01176-2
Barış Can Esmer, Ariel Kulik, Dániel Marx, Philipp Schepper, Karol Węgrzycki

In this paper, we consider a general notion of convolution. Let (D) be a finite domain and let (D^n) be the set of n-length vectors (tuples) of (D). Let (f :Dtimes Drightarrow D) be a function and let (oplus _f) be a coordinate-wise application of f. The (f)-Convolution of two functions (g,h :D^n rightarrow {-M,ldots ,M}) is

$$begin{aligned} (g mathbin {circledast _{f}}h)(textbf{v}) {:}{=}sum _{begin{array}{c} textbf{v}_g,textbf{v}_h in D^n text {s.t. } textbf{v}= textbf{v}_g oplus _f textbf{v}_h end{array}} g(textbf{v}_g) cdot h(textbf{v}_h) end{aligned}$$

for every (textbf{v}in D^n). This problem generalizes many fundamental convolutions such as Subset Convolution, XOR Product, Covering Product or Packing Product, etc. For arbitrary function f and domain (D) we can compute (f)-Convolution via brute-force enumeration in (widetilde{{mathcal {O}}}(|D|^{2n} cdot textrm{polylog}(M))) time. Our main result is an improvement over this naive algorithm. We show that (f)-Convolution can be computed exactly in (widetilde{{mathcal {O}}}( (c cdot |D|^2)^{n} cdot textrm{polylog}(M))) for constant (c {:}{=}3/4) when (D) has even cardinality. Our main observation is that a cyclic partition of a function (f :Dtimes Drightarrow D) can be used to speed up the computation of (f)-Convolution, and we show that an appropriate cyclic partition exists for every f. Furthermore, we demonstrate that a single entry of the (f)-Convolution can be computed more efficiently. In this variant, we are given two functions (g,h :D^n rightarrow {-M,ldots ,M}) alongside with a vector (textbf{v}in D^n) and the task of the (f)-Query problem is to compute integer ((g mathbin {circledast _{f}}h)(textbf{v})). This is a generalization of the well-known Orthogonal Vectors problem. We show that (f)-Query can be computed in (widetilde{{mathcal {O}}}(|D|^{frac{omega }{2} n} cdot textrm{polylog}(M))) time, where (omega in [2,2.372)) is the exponent of currently fastest matrix multiplication algorithm.

在本文中,我们将考虑卷积的一般概念。让 (D) 是一个有限域,让 (D^n) 是 (D) 的 n 长向量(元组)的集合。让 (f :Dtimes Drightarrow D) 是一个函数,让 (oplus _f)是 f 的坐标应用。两个函数 (g,h :D^n rightarrow {-M,ldots ,M}) 的 (f)-Convolution 是 $$begin{aligned} (g mathbin {circledast _{f}}h)(textbf{v}) {:}{=}sum _{begin{array}{c}.in D^ntext {s.t. }textbf{v}= textbf{v}_g oplus _f textbf{v}_h end{array}} g(textbf{v}_g) cdot h(textbf{v}_h) end{aligned}$$ 对于每一个 (textbf{v}in D^n).这个问题概括了许多基本卷积,例如子集卷积、XOR 积、覆盖积或打包积等。对于任意函数 f 和域 (D),我们可以在 (widetilde{{mathcal {O}}}(|D|^{2n}) 中通过暴力枚举来计算 (f)-Convolution时间)。我们的主要结果是对这一天真算法的改进。我们证明了 (f)-Convolution 可以在 (widetilde{{mathcal {O}}( (c cdot |D|^2)^{n}) 时间内精确计算。当 (D) 具有偶数卡片数时,对于常数 (c {:}{=}3/4) 来说,(cdot textrm{polylog}(M))) 是常数。我们的主要观点是,函数 (f :Dtimes Drightarrow D) 的循环分区可以用来加快 (f)-Convolution 的计算速度,而且我们证明了对于每个 f 都存在一个合适的循环分区。在这个变体中,我们给定了两个函数(g,h :D^n rightarrow {-M,ldots ,M})以及一个向量(D^n中的textbf{v}),而(f)-查询问题的任务就是计算整数((g mathbin {circledast _{f}}h)(textbf{v}) )。这是著名的正交向量问题的一般化。我们证明了 (f)-Query 可以在 (widetilde{mathcal {O}}}(|D|^{frac{omega }{2} n} 中计算。cdot textrm{polylog}(M))) time,其中 (omega in [2,2.372)) 是当前最快矩阵乘法算法的指数。
{"title":"Computing Generalized Convolutions Faster Than Brute Force","authors":"Barış Can Esmer,&nbsp;Ariel Kulik,&nbsp;Dániel Marx,&nbsp;Philipp Schepper,&nbsp;Karol Węgrzycki","doi":"10.1007/s00453-023-01176-2","DOIUrl":"10.1007/s00453-023-01176-2","url":null,"abstract":"<div><p>In this paper, we consider a general notion of convolution. Let <span>(D)</span> be a finite domain and let <span>(D^n)</span> be the set of <i>n</i>-length vectors (tuples) of <span>(D)</span>. Let <span>(f :Dtimes Drightarrow D)</span> be a function and let <span>(oplus _f)</span> be a coordinate-wise application of <i>f</i>. The <span>(f)</span>-<span>Convolution</span> of two functions <span>(g,h :D^n rightarrow {-M,ldots ,M})</span> is </p><div><div><span>$$begin{aligned} (g mathbin {circledast _{f}}h)(textbf{v}) {:}{=}sum _{begin{array}{c} textbf{v}_g,textbf{v}_h in D^n text {s.t. } textbf{v}= textbf{v}_g oplus _f textbf{v}_h end{array}} g(textbf{v}_g) cdot h(textbf{v}_h) end{aligned}$$</span></div></div><p>for every <span>(textbf{v}in D^n)</span>. This problem generalizes many fundamental convolutions such as Subset Convolution, XOR Product, Covering Product or Packing Product, etc. For arbitrary function <i>f</i> and domain <span>(D)</span> we can compute <span>(f)</span>-<span>Convolution</span> via brute-force enumeration in <span>(widetilde{{mathcal {O}}}(|D|^{2n} cdot textrm{polylog}(M)))</span> time. Our main result is an improvement over this naive algorithm. We show that <span>(f)</span>-<span>Convolution</span> can be computed exactly in <span>(widetilde{{mathcal {O}}}( (c cdot |D|^2)^{n} cdot textrm{polylog}(M)))</span> for constant <span>(c {:}{=}3/4)</span> when <span>(D)</span> has even cardinality. Our main observation is that a <i>cyclic partition</i> of a function <span>(f :Dtimes Drightarrow D)</span> can be used to speed up the computation of <span>(f)</span>-<span>Convolution</span>, and we show that an appropriate cyclic partition exists for every <i>f</i>. Furthermore, we demonstrate that a single entry of the <span>(f)</span>-<span>Convolution</span> can be computed more efficiently. In this variant, we are given two functions <span>(g,h :D^n rightarrow {-M,ldots ,M})</span> alongside with a vector <span>(textbf{v}in D^n)</span> and the task of the <span>(f)</span>-<span>Query</span> problem is to compute integer <span>((g mathbin {circledast _{f}}h)(textbf{v}))</span>. This is a generalization of the well-known Orthogonal Vectors problem. We show that <span>(f)</span>-<span>Query</span> can be computed in <span>(widetilde{{mathcal {O}}}(|D|^{frac{omega }{2} n} cdot textrm{polylog}(M)))</span> time, where <span>(omega in [2,2.372))</span> is the exponent of currently fastest matrix multiplication algorithm.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 1","pages":"334 - 366"},"PeriodicalIF":0.9,"publicationDate":"2023-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-023-01176-2.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135350290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Parameterized Complexity of Binary Networked Public Goods Game 论二元网络公共产品博弈的参数化复杂性
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2023-09-28 DOI: 10.1007/s00453-023-01174-4
Arnab Maiti, Palash Dey

In the binary networked public goods (BNPG for short) game, every player needs to decide if she participates in a public project whose utility is shared equally by the community. We study the problem of deciding if there exists a pure strategy Nash equilibrium (PSNE) in such games. The problem is already known to be (textsf{NP})-complete. This casts doubt on predictive power of PSNE in BNPG games. We provide fine-grained analysis of this problem under the lens of parameterized complexity theory. We consider various natural graph parameters and show (mathsf {W[1]})-hardness, XP, and (textsf{FPT}) results. Hence, our work significantly improves our understanding of BNPG games where PSNE serves as a reliable solution concept. We finally prove that some graph classes, for example path, cycle, bi-clique, and complete graph, always have a PSNE if the utility function of the players are same.

在二元网络公共物品(简称 BNPG)博弈中,每个博弈者都需要决定自己是否参与一个公共项目,而这个项目的效用是由社区均摊的。我们要研究的问题是,在这种博弈中是否存在纯策略纳什均衡(PSNE)。众所周知,这个问题是(textsf{NP})不完全的。这让人怀疑 PSNE 在 BNPG 博弈中的预测能力。我们从参数化复杂性理论的角度对这一问题进行了精细分析。我们考虑了各种自然图参数,并展示了((mathsf {W[1]})硬度、XP和((textsf{FPT})结果。因此,我们的工作极大地改进了我们对 BNPG 博弈的理解,在这些博弈中,PSNE 是一个可靠的解概念。最后,我们证明了一些图类,例如路径图、循环图、双曲图和完整图,如果博弈者的效用函数相同,总是有一个 PSNE。
{"title":"On Parameterized Complexity of Binary Networked Public Goods Game","authors":"Arnab Maiti,&nbsp;Palash Dey","doi":"10.1007/s00453-023-01174-4","DOIUrl":"10.1007/s00453-023-01174-4","url":null,"abstract":"<div><p>In the binary networked public goods (BNPG for short) game, every player needs to decide if she participates in a public project whose utility is shared equally by the community. We study the problem of deciding if there exists a pure strategy Nash equilibrium (PSNE) in such games. The problem is already known to be <span>(textsf{NP})</span>-complete. This casts doubt on predictive power of PSNE in BNPG games. We provide fine-grained analysis of this problem under the lens of parameterized complexity theory. We consider various natural graph parameters and show <span>(mathsf {W[1]})</span>-hardness, XP, and <span>(textsf{FPT})</span> results. Hence, our work significantly improves our understanding of BNPG games where PSNE serves as a reliable solution concept. We finally prove that some graph classes, for example path, cycle, bi-clique, and complete graph, always have a PSNE if the utility function of the players are same.\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 1","pages":"307 - 333"},"PeriodicalIF":0.9,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135342993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparison of Matrix Norm Sparsification 矩阵范数稀疏化的比较
IF 1.1 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2023-09-25 DOI: 10.1007/s00453-023-01172-6
Robert Krauthgamer, Shay Sapir

A well-known approach in the design of efficient algorithms, called matrix sparsification, approximates a matrix A with a sparse matrix (A'). Achlioptas and McSherry (J ACM 54(2):9-es, 2007) initiated a long line of work on spectral-norm sparsification, which aims to guarantee that (Vert A'-AVert le epsilon Vert AVert ) for error parameter (epsilon >0). Various forms of matrix approximation motivate considering this problem with a guarantee according to the Schatten p-norm for general p, which includes the spectral norm as the special case (p=infty ). We investigate the relation between fixed but different (pne q), that is, whether sparsification in the Schatten p-norm implies (existentially and/or algorithmically) sparsification in the Schatten (qtext {-norm}) with similar sparsity. An affirmative answer could be tremendously useful, as it will identify which value of p to focus on. Our main finding is a surprising contrast between this question and the analogous case of (ell _p)-norm sparsification for vectors: For vectors, the answer is affirmative for (p<q) and negative for (p>q), but for matrices we answer negatively for almost all sufficiently distinct (pne q). In addition, our explicit constructions may be of independent interest.

在高效算法的设计中,有一种众所周知的方法叫做矩阵稀疏化,它用一个稀疏矩阵(A')来近似矩阵A。Achlioptas和McSherry (J ACM 54(2):9-es, 2007)发起了一项关于谱模稀疏化的长期工作,其目的是保证误差参数(epsilon >0)的(Vert A'-AVert le epsilon Vert AVert )。各种形式的矩阵逼近促使我们考虑这个问题,并根据一般p的Schatten p-范数保证,其中包括谱范数作为特例(p=infty )。我们研究了固定但不同(pne q)之间的关系,也就是说,Schatten p-范数中的稀疏化是否意味着(存在和/或算法上)具有相似稀疏性的Schatten (qtext {-norm})中的稀疏化。一个肯定的答案可能非常有用,因为它将确定p的哪个值值得关注。我们的主要发现是这个问题与向量的(ell _p) -范数稀疏化的类似情况之间的惊人对比:对于向量,对于(p<q)的答案是肯定的,对于(p>q)的答案是否定的,但是对于矩阵,我们对几乎所有足够不同的(pne q)的答案都是否定的。此外,我们的外显结构可能具有独立的兴趣。
{"title":"Comparison of Matrix Norm Sparsification","authors":"Robert Krauthgamer,&nbsp;Shay Sapir","doi":"10.1007/s00453-023-01172-6","DOIUrl":"10.1007/s00453-023-01172-6","url":null,"abstract":"<div><p>A well-known approach in the design of efficient algorithms, called matrix sparsification, approximates a matrix <i>A</i> with a sparse matrix <span>(A')</span>. Achlioptas and McSherry (J ACM 54(2):9-es, 2007) initiated a long line of work on spectral-norm sparsification, which aims to guarantee that <span>(Vert A'-AVert le epsilon Vert AVert )</span> for error parameter <span>(epsilon &gt;0)</span>. Various forms of matrix approximation motivate considering this problem with a guarantee according to the Schatten <i>p</i>-norm for general <i>p</i>, which includes the spectral norm as the special case <span>(p=infty )</span>. We investigate the relation between fixed but different <span>(pne q)</span>, that is, whether sparsification in the Schatten <i>p</i>-norm implies (existentially and/or algorithmically) sparsification in the Schatten <span>(qtext {-norm})</span> with similar sparsity. An affirmative answer could be tremendously useful, as it will identify which value of <i>p</i> to focus on. Our main finding is a surprising contrast between this question and the analogous case of <span>(ell _p)</span>-norm sparsification for vectors: For vectors, the answer is affirmative for <span>(p&lt;q)</span> and negative for <span>(p&gt;q)</span>, but for matrices we answer negatively for almost all sufficiently distinct <span>(pne q)</span>. In addition, our explicit constructions may be of independent interest.\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"85 12","pages":"3957 - 3972"},"PeriodicalIF":1.1,"publicationDate":"2023-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134797493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Subfield and Extended Codes of a Subclass of Optimal Three-Weight Cyclic Codes 一类最优三权循环码的子域和扩展码
IF 1.1 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2023-09-25 DOI: 10.1007/s00453-023-01173-5
Félix Hernández, Gerardo Vega

A class of optimal three-weight ([q^k-1,k+1,q^{k-1}(q-1)-1]) cyclic codes over ({mathrm{I!F}}_q), with (kge 2), achieving the Griesmer bound, was presented by Heng and Yue (IEEE Trans Inf Theory 62(8):4501–4513, 2016. https://doi.org/10.1109/TIT.2016.2550029). In this paper we study some of the subfield codes of this class of optimal cyclic codes when (k=2). The weight distributions of the subfield codes are settled. It turns out that some of these codes are optimal and others have the best known parameters. The duals of the subfield codes are also investigated and found to be almost optimal with respect to the sphere-packing bound. In addition, the covering structure for the studied subfield codes is determined. Some of these codes are found to have the important property that any nonzero codeword is minimal, which is a desirable property that is useful in the design of a secret sharing scheme based on a linear code. Moreover, a specific example of a secret sharing scheme based on one of these subfield codes is given. Finally, a class of optimal two-weight linear codes over ({mathrm{I!F}}_q), achieving the Griesmer bound, whose duals are almost optimal with respect to the sphere-packing bound is presented. Through a different approach, this class of optimal two-weight linear codes was reported very recently by Heng (IEEE Trans Inf Theory 69(2):978–994, 2023. https://doi.org/10.1109/TIT.2022.3203380). Furthermore, it is shown that these optimal codes can be used to construct strongly regular graphs.

Heng和Yue (IEEE Trans . Theory 62(8): 4501-4513, 2016)提出了一类最优的三权值([q^k-1,k+1,q^{k-1}(q-1)-1])循环码(({mathrm{I!F}}_q), (kge 2)),实现了Griesmer界。https://doi.org/10.1109/TIT.2016.2550029)。本文研究了该类最优循环码在(k=2)时的一些子域码。确定了子域码的权重分布。事实证明,其中一些代码是最优的,而另一些则有最广为人知的参数。对子域码的对偶也进行了研究,发现它们对于球填充界几乎是最优的。此外,还确定了所研究子域码的覆盖结构。我们发现其中一些码具有任何非零码字都是最小的重要性质,这在基于线性码的秘密共享方案设计中非常有用。此外,还给出了基于这些子域码之一的秘密共享方案的具体示例。最后,给出了({mathrm{I!F}}_q)上的一类最优双权线性码,得到了Griesmer界,其对偶相对于球填充界几乎是最优的。通过不同的方法,Heng (IEEE Trans Inf Theory 69(2): 978-994, 2023)最近报道了这类最优双权线性码。https://doi.org/10.1109/TIT.2022.3203380)。进一步证明了这些最优码可用于构造强正则图。
{"title":"The Subfield and Extended Codes of a Subclass of Optimal Three-Weight Cyclic Codes","authors":"Félix Hernández,&nbsp;Gerardo Vega","doi":"10.1007/s00453-023-01173-5","DOIUrl":"10.1007/s00453-023-01173-5","url":null,"abstract":"<div><p>A class of optimal three-weight <span>([q^k-1,k+1,q^{k-1}(q-1)-1])</span> cyclic codes over <span>({mathrm{I!F}}_q)</span>, with <span>(kge 2)</span>, achieving the Griesmer bound, was presented by Heng and Yue (IEEE Trans Inf Theory 62(8):4501–4513, 2016. https://doi.org/10.1109/TIT.2016.2550029). In this paper we study some of the subfield codes of this class of optimal cyclic codes when <span>(k=2)</span>. The weight distributions of the subfield codes are settled. It turns out that some of these codes are optimal and others have the best known parameters. The duals of the subfield codes are also investigated and found to be almost optimal with respect to the sphere-packing bound. In addition, the covering structure for the studied subfield codes is determined. Some of these codes are found to have the important property that any nonzero codeword is minimal, which is a desirable property that is useful in the design of a secret sharing scheme based on a linear code. Moreover, a specific example of a secret sharing scheme based on one of these subfield codes is given. Finally, a class of optimal two-weight linear codes over <span>({mathrm{I!F}}_q)</span>, achieving the Griesmer bound, whose duals are almost optimal with respect to the sphere-packing bound is presented. Through a different approach, this class of optimal two-weight linear codes was reported very recently by Heng (IEEE Trans Inf Theory 69(2):978–994, 2023. https://doi.org/10.1109/TIT.2022.3203380). Furthermore, it is shown that these optimal codes can be used to construct strongly regular graphs.\u0000\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"85 12","pages":"3973 - 3995"},"PeriodicalIF":1.1,"publicationDate":"2023-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-023-01173-5.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134797494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Algorithmica
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1