首页 > 最新文献

Algorithmica最新文献

英文 中文
Diverse Pairs of Matchings 多样化的配对
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-03-15 DOI: 10.1007/s00453-024-01214-7
Fedor V. Fomin, Petr A. Golovach, Lars Jaffke, Geevarghese Philip, Danil Sagunov

We initiate the study of the Diverse Pair of (Maximum/ Perfect) Matchings problems which given a graph G and an integer k, ask whether G has two (maximum/perfect) matchings whose symmetric difference is at least k. Diverse Pair of Matchings (asking for two not necessarily maximum or perfect matchings) is (textsf{NP})-complete on general graphs if k is part of the input, and we consider two restricted variants. First, we show that on bipartite graphs, the problem is polynomial-time solvable, and second we show that Diverse Pair of Maximum Matchings is (textsf{FPT}) parameterized by k. We round off the work by showing that Diverse Pair of Matchings has a kernel on ({mathcal {O}}(k^2)) vertices.

我们开始研究"(最大/完美)匹配的多样性对"(Diverse Pair of (Maximum/ Perfect) Matchings)问题,给定一个图 G 和一个整数 k,问 G 是否有两个对称差至少为 k 的(最大/完美)匹配。首先,我们证明了在二叉图上,这个问题是多项式时间可解的;其次,我们证明了以 k 为参数的 Diverse Pair of Maximum Matchings 是 (textsf{FPT})的。
{"title":"Diverse Pairs of Matchings","authors":"Fedor V. Fomin,&nbsp;Petr A. Golovach,&nbsp;Lars Jaffke,&nbsp;Geevarghese Philip,&nbsp;Danil Sagunov","doi":"10.1007/s00453-024-01214-7","DOIUrl":"10.1007/s00453-024-01214-7","url":null,"abstract":"<div><p>We initiate the study of the <span>Diverse Pair of (Maximum/ Perfect) Matchings</span> problems which given a graph <i>G</i> and an integer <i>k</i>, ask whether <i>G</i> has two (maximum/perfect) matchings whose symmetric difference is at least <i>k</i>. <span>Diverse Pair of Matchings</span> (asking for two not necessarily maximum or perfect matchings) is <span>(textsf{NP})</span>-complete on general graphs if <i>k</i> is part of the input, and we consider two restricted variants. First, we show that on bipartite graphs, the problem is polynomial-time solvable, and second we show that <span>Diverse Pair of Maximum Matchings</span> is <span>(textsf{FPT})</span> parameterized by <i>k</i>. We round off the work by showing that <span>Diverse Pair of Matchings</span> has a kernel on <span>({mathcal {O}}(k^2))</span> vertices.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 6","pages":"2026 - 2040"},"PeriodicalIF":0.9,"publicationDate":"2024-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01214-7.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140150835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Linear Space Data Structures for Finite Groups with Constant Query-Time 查询时间不变的有限群线性空间数据结构
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-03-11 DOI: 10.1007/s00453-024-01212-9
Bireswar Das, Anant Kumar, Shivdutt Sharma, Dhara Thakkar

A finite group of order n can be represented by its Cayley table. In the word-RAM model the Cayley table of a group of order n can be stored using (O(n^2)) words and can be used to answer a multiplication query in constant time. It is interesting to ask if we can design a data structure to store a group of order n that uses (o(n^2)) space but can still answer a multiplication query in constant time. Das et al. (J Comput Syst Sci 114:137–146, 2020) showed that for any finite group G of order n and for any (delta in [1/log {n}, 1]), a data structure can be constructed for G that uses (O(n^{1+delta }/delta )) space and answers a multiplication query in time (O(1/delta )). Farzan and Munro (ISSAC, 2006) gave an information theoretic lower bound of (Omega (n)) on the number of words to store a group of order n. We design a constant query-time data structure that can store any finite group using O(n) words where n is the order of the group. Since our data structure achieves the information theoretic lower bound and answers queries in constant time, it is optimal in both space usage and query-time. A crucial step in the process is essentially to design linear space and constant query-time data structures for nonabelian simple groups. The data structures for nonabelian simple groups are designed using a lemma that we prove using the Classification Theorem for Finite Simple Groups.

摘要 阶数为 n 的有限群可以用它的 Cayley 表来表示。在字 RAM 模型中,一个 n 阶群的 Cayley 表可以用 (O(n^2)) 字来存储,并且可以用来在恒定时间内回答乘法查询。有趣的是,我们是否可以设计一种数据结构来存储阶数为 n 的组,这种结构使用 (o(n^2) 空间,但仍然可以在恒定时间内回答乘法查询。Das 等人(J Comput Syst Sci 114:137-146, 2020)的研究表明,对于任何阶数为 n 的有限群组 G 以及任何 (delta in [1/log {n}, 1]),都可以为 G 构建一个数据结构,它使用 (O(n^{1+delta }/delta )) 空间,并且可以在 (O(1/delta )) 时间内回答乘法查询。Farzan 和 Munro (ISSAC, 2006)给出了存储阶数为 n 的组的字数的信息论下限((Omega (n)) )。我们设计了一种恒定查询时间的数据结构,可以用 O(n) 个字存储任何有限组,其中 n 是组的阶数。由于我们的数据结构实现了信息论下限,并能在恒定时间内回答查询,因此在空间使用和查询时间上都是最优的。这一过程的关键步骤是为非标简单群设计线性空间和恒定查询时间的数据结构。非阿贝尔简单群的数据结构是利用我们用有限简单群分类定理证明的一个 Lemma 来设计的。
{"title":"Linear Space Data Structures for Finite Groups with Constant Query-Time","authors":"Bireswar Das,&nbsp;Anant Kumar,&nbsp;Shivdutt Sharma,&nbsp;Dhara Thakkar","doi":"10.1007/s00453-024-01212-9","DOIUrl":"10.1007/s00453-024-01212-9","url":null,"abstract":"<div><p>A finite group of order <i>n</i> can be represented by its Cayley table. In the word-RAM model the Cayley table of a group of order <i>n</i> can be stored using <span>(O(n^2))</span> words and can be used to answer a multiplication query in constant time. It is interesting to ask if we can design a data structure to store a group of order <i>n</i> that uses <span>(o(n^2))</span> space but can still answer a multiplication query in constant time. Das et al. (J Comput Syst Sci 114:137–146, 2020) showed that for any finite group <i>G</i> of order <i>n</i> and for any <span>(delta in [1/log {n}, 1])</span>, a data structure can be constructed for <i>G</i> that uses <span>(O(n^{1+delta }/delta ))</span> space and answers a multiplication query in time <span>(O(1/delta ))</span>. Farzan and Munro (ISSAC, 2006) gave an information theoretic lower bound of <span>(Omega (n))</span> on the number of words to store a group of order <i>n</i>. We design a constant query-time data structure that can store any finite group using <i>O</i>(<i>n</i>) words where <i>n</i> is the order of the group. Since our data structure achieves the information theoretic lower bound and answers queries in constant time, it is optimal in both space usage and query-time. A crucial step in the process is essentially to design linear space and constant query-time data structures for nonabelian simple groups. The data structures for nonabelian simple groups are designed using a lemma that we prove using the Classification Theorem for Finite Simple Groups.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 6","pages":"1979 - 2025"},"PeriodicalIF":0.9,"publicationDate":"2024-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140097564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pattern Masking for Dictionary Matching: Theory and Practice 用于字典匹配的模式屏蔽:理论与实践
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-03-06 DOI: 10.1007/s00453-024-01213-8
Panagiotis Charalampopoulos, Huiping Chen, Peter Christen, Grigorios Loukides, Nadia Pisanti, Solon P. Pissis, Jakub Radoszewski
<div><p>Data masking is a common technique for sanitizing sensitive data maintained in database systems which is becoming increasingly important in various application areas, such as in record linkage of personal data. This work formalizes the Pattern Masking for Dictionary Matching (<span>PMDM</span>) problem: given a dictionary <span>(mathscr {D})</span> of <i>d</i> strings, each of length <span>(ell )</span>, a query string <i>q</i> of length <span>(ell )</span>, and a positive integer <i>z</i>, we are asked to compute a smallest set <span>(Ksubseteq {1,ldots ,ell })</span>, so that if <i>q</i>[<i>i</i>] is replaced by a wildcard for all <span>(iin K)</span>, then <i>q</i> matches at least <i>z</i> strings from <span>(mathscr {D})</span>. Solving <span>PMDM</span> allows providing data utility guarantees as opposed to existing approaches. We first show, through a reduction from the well-known <i>k</i>-Clique problem, that a decision version of the <span>PMDM</span> problem is NP-complete, even for binary strings. We thus approach the problem from a more practical perspective. We show a combinatorial <span>(mathscr {O}((dell )^{|K|/3}+dell ))</span>-time and <span>(mathscr {O}(dell ))</span>-space algorithm for <span>PMDM</span> for <span>(|K|=mathscr {O}(1))</span>. In fact, we show that we cannot hope for a faster combinatorial algorithm, unless the combinatorial <i>k</i>-Clique hypothesis fails (Abboud et al. in SIAM J Comput 47:2527–2555, 2018; Lincoln et al., in: 29th ACM-SIAM Symposium on Discrete Algorithms (SODA), 2018). Our combinatorial algorithm, executed with small |<i>K</i>|, is the backbone of a greedy heuristic that we propose. Our experiments on real-world and synthetic datasets show that our heuristic finds nearly-optimal solutions in practice and is also very efficient. We also generalize this algorithm for the problem of masking multiple query strings simultaneously so that every string has at least <i>z</i> matches in <span>(mathscr {D})</span>. <span>PMDM</span> can be viewed as a generalization of the decision version of the dictionary matching with mismatches problem: by querying a <span>PMDM</span> data structure with string <i>q</i> and <span>(z=1)</span>, one obtains the minimal number of mismatches of <i>q</i> with any string from <span>(mathscr {D})</span>. The query time or space of all known data structures for the <i>more restricted</i> problem of dictionary matching with at most <i>k</i> mismatches incurs some exponential factor with respect to <i>k</i>. A simple exact algorithm for <span>PMDM</span> runs in time <span>(mathscr {O}(2^ell d))</span>. We present a data structure for <span>PMDM</span> that answers queries over <span>(mathscr {D})</span> in time <span>(mathscr {O}(2^{ell /2}(2^{ell /2}+tau )ell ))</span> and requires space <span>(mathscr {O}(2^{ell }d^2/tau ^2+2^{ell /2}d))</span>, for any parameter <span>(tau in [1,d])</span>. We complement our results by showing a two-way polynomial-time reduction
摘要 数据屏蔽是对数据库系统中的敏感数据进行消毒的一种常用技术,在个人数据的记录链接等各种应用领域正变得越来越重要。这项工作正式提出了字典匹配模式掩码(PDM)问题:给定一个由 d 个字符串(每个字符串长度为 (ell ))组成的字典 (mathscr {D}) ,一个长度为 (ell )的查询字符串 q,以及一个正整数 z、我们被要求计算一个最小的集合(Ksubseteq {1,ldots ,ell }),这样如果 q[i] 被通配符替换为所有的 (iin K) ,那么 q 至少匹配来自 (mathscr {D}) 的 z 个字符串。与现有方法相比,求解 PMDM 可以提供数据效用保证。我们首先通过对著名的 k-Clique 问题的还原,证明 PMDM 问题的决策版本是 NP-complete,即使对于二进制字符串也是如此。因此,我们从更实用的角度来处理这个问题。我们展示了一个组合((dell )^{K||/3}+dell))-时间和((mathscr {O}(dell ))K|=mathscr {O}(1)) 的 PMDM 的-空间算法。事实上,我们表明,除非组合 k-Clique 假设失效,否则我们不可能希望有更快的组合算法(Abboud 等人,载于 SIAM J Comput 47:2527-2555, 2018;Lincoln 等人,载于:第 29 届 ACM-SIAM 离散算法研讨会(SODA),2018 年)。我们的组合算法以较小的|K|执行,是我们提出的贪婪启发式的支柱。我们在现实世界和合成数据集上的实验表明,我们的启发式算法在实践中能找到近乎最优的解决方案,而且非常高效。我们还将这种算法推广到同时屏蔽多个查询字符串的问题上,这样每个字符串在 (mathscr {D}) 中至少有 z 个匹配项。PMDM 可以被看作是有错配字典匹配问题的决策版本的一般化:通过用字符串 q 和 (z=1) 查询 PMDM 数据结构,可以得到 q 与 (mathscr {D}) 中任意字符串错配的最小数量。所有已知数据结构的查询时间或空间对于字典匹配的更受限制的问题(最多有k个不匹配)来说,都会产生一些与k有关的指数因子。PMDM的一个简单精确算法的运行时间是(mathscr {O}(2^ell d))。我们提出了一种 PMDM 的数据结构,它可以在 (mathscr {O}(2^{ell /2}(2^{ell /2}+tau )) 的时间内回答对 (mathscr {D}) 的查询,并且需要 (mathscr {O}(2^{ell }d^2/tau ^2+2^{ell /2}d)) 的空间。)对于任何参数 ([1,d]中的)。我们通过展示 PMDM 与最小联合问题之间的双向多项式时间还原来补充我们的结果 [Chlamtáč 等人,ACM-SIAM 离散算法研讨会(SODA)2017]。这就给出了一个多项式时间((mathscr {O}(d^{1/4+epsilon }))-approximation算法,该算法在一个可信的复杂性猜想下是紧密的。本文是在 2021 年算法与计算国际研讨会(ISAAC)上发表的论文的扩展版。
{"title":"Pattern Masking for Dictionary Matching: Theory and Practice","authors":"Panagiotis Charalampopoulos,&nbsp;Huiping Chen,&nbsp;Peter Christen,&nbsp;Grigorios Loukides,&nbsp;Nadia Pisanti,&nbsp;Solon P. Pissis,&nbsp;Jakub Radoszewski","doi":"10.1007/s00453-024-01213-8","DOIUrl":"10.1007/s00453-024-01213-8","url":null,"abstract":"&lt;div&gt;&lt;p&gt;Data masking is a common technique for sanitizing sensitive data maintained in database systems which is becoming increasingly important in various application areas, such as in record linkage of personal data. This work formalizes the Pattern Masking for Dictionary Matching (&lt;span&gt;PMDM&lt;/span&gt;) problem: given a dictionary &lt;span&gt;(mathscr {D})&lt;/span&gt; of &lt;i&gt;d&lt;/i&gt; strings, each of length &lt;span&gt;(ell )&lt;/span&gt;, a query string &lt;i&gt;q&lt;/i&gt; of length &lt;span&gt;(ell )&lt;/span&gt;, and a positive integer &lt;i&gt;z&lt;/i&gt;, we are asked to compute a smallest set &lt;span&gt;(Ksubseteq {1,ldots ,ell })&lt;/span&gt;, so that if &lt;i&gt;q&lt;/i&gt;[&lt;i&gt;i&lt;/i&gt;] is replaced by a wildcard for all &lt;span&gt;(iin K)&lt;/span&gt;, then &lt;i&gt;q&lt;/i&gt; matches at least &lt;i&gt;z&lt;/i&gt; strings from &lt;span&gt;(mathscr {D})&lt;/span&gt;. Solving &lt;span&gt;PMDM&lt;/span&gt; allows providing data utility guarantees as opposed to existing approaches. We first show, through a reduction from the well-known &lt;i&gt;k&lt;/i&gt;-Clique problem, that a decision version of the &lt;span&gt;PMDM&lt;/span&gt; problem is NP-complete, even for binary strings. We thus approach the problem from a more practical perspective. We show a combinatorial &lt;span&gt;(mathscr {O}((dell )^{|K|/3}+dell ))&lt;/span&gt;-time and &lt;span&gt;(mathscr {O}(dell ))&lt;/span&gt;-space algorithm for &lt;span&gt;PMDM&lt;/span&gt; for &lt;span&gt;(|K|=mathscr {O}(1))&lt;/span&gt;. In fact, we show that we cannot hope for a faster combinatorial algorithm, unless the combinatorial &lt;i&gt;k&lt;/i&gt;-Clique hypothesis fails (Abboud et al. in SIAM J Comput 47:2527–2555, 2018; Lincoln et al., in: 29th ACM-SIAM Symposium on Discrete Algorithms (SODA), 2018). Our combinatorial algorithm, executed with small |&lt;i&gt;K&lt;/i&gt;|, is the backbone of a greedy heuristic that we propose. Our experiments on real-world and synthetic datasets show that our heuristic finds nearly-optimal solutions in practice and is also very efficient. We also generalize this algorithm for the problem of masking multiple query strings simultaneously so that every string has at least &lt;i&gt;z&lt;/i&gt; matches in &lt;span&gt;(mathscr {D})&lt;/span&gt;. &lt;span&gt;PMDM&lt;/span&gt; can be viewed as a generalization of the decision version of the dictionary matching with mismatches problem: by querying a &lt;span&gt;PMDM&lt;/span&gt; data structure with string &lt;i&gt;q&lt;/i&gt; and &lt;span&gt;(z=1)&lt;/span&gt;, one obtains the minimal number of mismatches of &lt;i&gt;q&lt;/i&gt; with any string from &lt;span&gt;(mathscr {D})&lt;/span&gt;. The query time or space of all known data structures for the &lt;i&gt;more restricted&lt;/i&gt; problem of dictionary matching with at most &lt;i&gt;k&lt;/i&gt; mismatches incurs some exponential factor with respect to &lt;i&gt;k&lt;/i&gt;. A simple exact algorithm for &lt;span&gt;PMDM&lt;/span&gt; runs in time &lt;span&gt;(mathscr {O}(2^ell d))&lt;/span&gt;. We present a data structure for &lt;span&gt;PMDM&lt;/span&gt; that answers queries over &lt;span&gt;(mathscr {D})&lt;/span&gt; in time &lt;span&gt;(mathscr {O}(2^{ell /2}(2^{ell /2}+tau )ell ))&lt;/span&gt; and requires space &lt;span&gt;(mathscr {O}(2^{ell }d^2/tau ^2+2^{ell /2}d))&lt;/span&gt;, for any parameter &lt;span&gt;(tau in [1,d])&lt;/span&gt;. We complement our results by showing a two-way polynomial-time reduction ","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 6","pages":"1948 - 1978"},"PeriodicalIF":0.9,"publicationDate":"2024-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01213-8.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140055360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Finding Optimal Solutions with Neighborly Help 在邻居的帮助下找到最佳解决方案
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-03-06 DOI: 10.1007/s00453-023-01204-1
Elisabet Burjons, Fabian Frei, Edith Hemaspaandra, Dennis Komm, David Wehner

Can we efficiently compute optimal solutions to instances of a hard problem from optimal solutions to neighbor instances, that is, instances with one local modification? For example, can we efficiently compute an optimal coloring for a graph from optimal colorings for all one-edge-deleted subgraphs? Studying such questions not only gives detailed insight into the structure of the problem itself, but also into the complexity of related problems, most notably, graph theory’s core notion of critical graphs (e.g., graphs whose chromatic number decreases under deletion of an arbitrary edge) and the complexity-theoretic notion of minimality problems (also called criticality problems, e.g., recognizing graphs that become 3-colorable when an arbitrary edge is deleted). We focus on two prototypical graph problems, colorability and vertex cover. For example, we show that it is (text {NP})-hard to compute an optimal coloring for a graph from optimal colorings for all its one-vertex-deleted subgraphs, and that this remains true even when optimal solutions for all one-edge-deleted subgraphs are given. In contrast, computing an optimal coloring from all (or even just two) one-edge-added supergraphs is in (text {P}). We observe that vertex cover exhibits a remarkably different behavior, demonstrating the power of our model to delineate problems from each other more precisely on a structural level. Moreover, we provide a number of new complexity results for minimality and criticality problems. For example, we prove that Minimal-3-UnColorability is complete for (text {DP}) (differences of (text {NP}) sets), which was previously known only for the more amenable case of deleting vertices rather than edges. For vertex cover, we show that recognizing (beta )-vertex-critical graphs is complete for (Theta _2^text {p}) (parallel access to (text {NP})), obtaining the first completeness result for a criticality problem for this class.

我们能否从相邻实例的最优解(即有一个局部修改的实例)中有效地计算出难题实例的最优解?例如,我们能否从所有单边删除子图的最优着色高效地计算出一个图的最优着色?研究这类问题不仅能深入了解问题本身的结构,还能了解相关问题的复杂性,其中最值得注意的是图论的核心概念临界图(例如,在删除任意边时色度数会降低的图)和复杂性理论概念最小性问题(也称为临界性问题,例如,识别在删除任意边时变成可着色的图)。我们将重点放在两个原型图问题上:可着色性和顶点覆盖。例如,我们证明了从一个图的所有单顶点删除子图的最优着色来计算该图的最优着色是非常困难的,而且即使给出了所有单边删除子图的最优解,这一点仍然是正确的。与此相反,从所有(甚至只有两个)单边添加的超级图中计算出最优着色是在(text {P})。我们观察到顶点覆盖(vertex cover)表现出了明显不同的行为,这证明了我们的模型能够在结构层面上更精确地将问题彼此区分开来。此外,我们还为最小问题和临界问题提供了许多新的复杂性结果。例如,我们证明了 Minimal-3-UnColorability 对于 (text {DP}) ((text {NP})集的差异)是完整的,而这在以前只针对删除顶点而不是边这种更容易处理的情况。对于顶点覆盖,我们证明了对于 (θ _2^text {p})(并行访问 (text {NP}))来说,识别 (β )-顶点临界图是完备的,获得了该类临界问题的第一个完备性结果。
{"title":"Finding Optimal Solutions with Neighborly Help","authors":"Elisabet Burjons,&nbsp;Fabian Frei,&nbsp;Edith Hemaspaandra,&nbsp;Dennis Komm,&nbsp;David Wehner","doi":"10.1007/s00453-023-01204-1","DOIUrl":"10.1007/s00453-023-01204-1","url":null,"abstract":"<div><p>Can we efficiently compute optimal solutions to instances of a hard problem from optimal solutions to neighbor instances, that is, instances with one local modification? For example, can we efficiently compute an optimal coloring for a graph from optimal colorings for all one-edge-deleted subgraphs? Studying such questions not only gives detailed insight into the structure of the problem itself, but also into the complexity of related problems, most notably, graph theory’s core notion of critical graphs (e.g., graphs whose chromatic number decreases under deletion of an arbitrary edge) and the complexity-theoretic notion of minimality problems (also called criticality problems, e.g., recognizing graphs that become 3-colorable when an arbitrary edge is deleted). We focus on two prototypical graph problems, colorability and vertex cover. For example, we show that it is <span>(text {NP})</span>-hard to compute an optimal coloring for a graph from optimal colorings for <i>all</i> its one-vertex-deleted subgraphs, and that this remains true even when optimal solutions for <i>all</i> one-edge-deleted subgraphs are given. In contrast, computing an optimal coloring from all (or even just two) one-edge-added supergraphs is in <span>(text {P})</span>. We observe that vertex cover exhibits a remarkably different behavior, demonstrating the power of our model to delineate problems from each other more precisely on a structural level. Moreover, we provide a number of new complexity results for minimality and criticality problems. For example, we prove that <span>Minimal</span>-3-<span>UnColorability</span> is complete for <span>(text {DP})</span> (differences of <span>(text {NP})</span> sets), which was previously known only for the more amenable case of deleting vertices rather than edges. For vertex cover, we show that recognizing <span>(beta )</span>-vertex-critical graphs is complete for <span>(Theta _2^text {p})</span> (parallel access to <span>(text {NP})</span>), obtaining the first completeness result for a criticality problem for this class.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 6","pages":"1921 - 1947"},"PeriodicalIF":0.9,"publicationDate":"2024-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-023-01204-1.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140055369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Preface of the Special Issue Dedicated to Selected Papers from IWOCA 2022 IWOCA 2022 论文选特刊序言
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-03-05 DOI: 10.1007/s00453-024-01225-4
Cristina Bazgan, Henning Fernau
{"title":"Preface of the Special Issue Dedicated to Selected Papers from IWOCA 2022","authors":"Cristina Bazgan,&nbsp;Henning Fernau","doi":"10.1007/s00453-024-01225-4","DOIUrl":"10.1007/s00453-024-01225-4","url":null,"abstract":"","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 3","pages":"695 - 696"},"PeriodicalIF":0.9,"publicationDate":"2024-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140078949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stable Matchings, One-Sided Ties, and Approximate Popularity 稳定配对、单边纽带和近似受欢迎程度
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-03-02 DOI: 10.1007/s00453-024-01215-6
Telikepalli Kavitha

We consider a matching problem in a bipartite graph (G = (A cup B, E)) where vertices in A rank their neighbors in a strict order of preference while vertices in B are allowed to have weak rankings, i.e., ties are allowed in their rankings. Stable matchings always exist in G and are easy to find, however popular matchings need not exist in G and it is NP-complete to decide if one exists. This motivates the “approximately popular” matching problem. A well-known measure of approximate popularity is low unpopularity factor. We show that when each tie in G has length at most k, there always exists a stable matching whose unpopularity factor is at most k and such a matching can be computed in polynomial time. Thus when ties have bounded length, there always exists a near-popular stable matching. This can be considered to be a generalization of Gärdenfors’ result (1975) which showed that when rankings are strict, every stable matching is popular. We then extend our result to the hospitals/residents setting, i.e., vertices in B have capacities. There are several applications where the size of the matching is its most important attribute. When ties are one-sided and of length at most k, we show a polynomial time algorithm to find a maximum matching whose unpopularity factor within the set of maximum matchings is at most 2k.

我们考虑的是(G = (A cup B, E))双瓣图中的匹配问题,其中 A 中的顶点按照严格的偏好顺序排列它们的邻居,而 B 中的顶点允许弱排序,即允许它们的排序出现平局。稳定匹配总是存在于 G 中,而且很容易找到,但是流行匹配不一定存在于 G 中,而且判断是否存在流行匹配是一个 NP 难点。这就产生了 "近似流行 "匹配问题。近似受欢迎程度的一个众所周知的衡量标准是低不受欢迎系数。我们的研究表明,当 G 中每条领带的长度最多为 k 时,总会存在一个不受欢迎系数最多为 k 的稳定匹配,而且这种匹配可以在多项式时间内计算出来。因此,当领带长度有界时,总是存在一个接近流行的稳定匹配。这可以看作是 Gärdenfors 结果(1975 年)的推广,Gärdenfors 的结果表明,当排名严格时,每个稳定匹配都是受欢迎的。然后,我们将结果扩展到医院/住院病人设置,即 B 中的顶点具有容量。在一些应用中,匹配的大小是其最重要的属性。当纽带是单边的且长度最多为 k 时,我们展示了一种多项式时间算法,可以找到最大匹配集合中不受欢迎系数最多为 2k 的最大匹配。
{"title":"Stable Matchings, One-Sided Ties, and Approximate Popularity","authors":"Telikepalli Kavitha","doi":"10.1007/s00453-024-01215-6","DOIUrl":"10.1007/s00453-024-01215-6","url":null,"abstract":"<div><p>We consider a matching problem in a bipartite graph <span>(G = (A cup B, E))</span> where vertices in <i>A</i> rank their neighbors in a strict order of preference while vertices in <i>B</i> are allowed to have <i>weak</i> rankings, i.e., ties are allowed in their rankings. Stable matchings always exist in <i>G</i> and are easy to find, however popular matchings need not exist in <i>G</i> and it is NP-complete to decide if one exists. This motivates the “approximately popular” matching problem. A well-known measure of approximate popularity is <i>low unpopularity factor</i>. We show that when each tie in <i>G</i> has length at most <i>k</i>, there always exists a stable matching whose unpopularity factor is at most <i>k</i> and such a matching can be computed in polynomial time. Thus when ties have bounded length, there always exists a <i>near-popular</i> stable matching. This can be considered to be a generalization of Gärdenfors’ result (1975) which showed that when rankings are strict, every stable matching is popular. We then extend our result to the hospitals/residents setting, i.e., vertices in <i>B</i> have capacities. There are several applications where the size of the matching is its most important attribute. When ties are one-sided and of length at most <i>k</i>, we show a polynomial time algorithm to find a maximum matching whose unpopularity factor <i>within</i> the set of maximum matchings is at most 2<i>k</i>.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 6","pages":"1888 - 1920"},"PeriodicalIF":0.9,"publicationDate":"2024-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140016673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Editor’s Note: Special Issue with GECCO 2021 编者按:GECCO 2021 特刊
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-03-02 DOI: 10.1007/s00453-024-01217-4
{"title":"Editor’s Note: Special Issue with GECCO 2021","authors":"","doi":"10.1007/s00453-024-01217-4","DOIUrl":"10.1007/s00453-024-01217-4","url":null,"abstract":"","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 6","pages":"2067 - 2067"},"PeriodicalIF":0.9,"publicationDate":"2024-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142409442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Minimal Roman Dominating Functions: Extensions and Enumeration 最小罗马支配函数:扩展与枚举
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-02-14 DOI: 10.1007/s00453-024-01211-w
Faisal N. Abu-Khzam, Henning Fernau, Kevin Mann

Roman domination is one of the many variants of domination that keeps most of the complexity features of the classical domination problem. We prove that Roman domination behaves differently in two aspects: enumeration and extension. We develop non-trivial enumeration algorithms for minimal Roman dominating functions with polynomial delay and polynomial space. Recall that the existence of a similar enumeration result for minimal dominating sets is open for decades. Our result is based on a polynomial-time algorithm for Extension Roman Domination: Given a graph (G=(V,E)) and a function (f:Vrightarrow {0,1,2}), is there a minimal Roman dominating function (tilde{f}) with (fle tilde{f})? Here, (le ) lifts (0< 1< 2) pointwise; minimality is understood in this order. Our enumeration algorithm is also analyzed from an input-sensitive viewpoint, leading to a run-time estimate of (mathcal {O}(1.9332^n)) for graphs of order n; this is complemented by a lower bound example of (Omega (1.7441^n)).

摘要 罗马支配法是支配法的众多变体之一,它保留了经典支配法问题的大部分复杂性特征。我们证明罗马支配在枚举和扩展两个方面表现不同。我们以多项式延迟和多项式空间为最小罗马支配函数开发了非难枚举算法。回想一下,类似的枚举结果对于最小支配集的存在已经有几十年的历史了。我们的结果基于 Extension Roman Domination 的多项式时间算法:给定一个图(G=(V,E))和一个函数(f:Vrightarrow {0,1,2}),是否存在一个最小罗马支配函数(tilde{f})与(fle tilde{f})?在这里,(le )点对点地提升(0< 1< 2); 最小性是按这个顺序理解的。我们的枚举算法还从输入敏感的角度进行了分析,从而得出了对于阶数为 n 的图,运行时间估计值为 (mathcal {O}(1.9332^n)) ;这一估计值还得到了 (Omega (1.7441^n)) 的下限实例的补充。
{"title":"Minimal Roman Dominating Functions: Extensions and Enumeration","authors":"Faisal N. Abu-Khzam,&nbsp;Henning Fernau,&nbsp;Kevin Mann","doi":"10.1007/s00453-024-01211-w","DOIUrl":"10.1007/s00453-024-01211-w","url":null,"abstract":"<div><p>Roman domination is one of the many variants of domination that keeps most of the complexity features of the classical domination problem. We prove that Roman domination behaves differently in two aspects: enumeration and extension. We develop non-trivial enumeration algorithms for minimal Roman dominating functions with polynomial delay and polynomial space. Recall that the existence of a similar enumeration result for minimal dominating sets is open for decades. Our result is based on a polynomial-time algorithm for <span>Extension Roman Domination</span>: Given a graph <span>(G=(V,E))</span> and a function <span>(f:Vrightarrow {0,1,2})</span>, is there a minimal Roman dominating function <span>(tilde{f})</span> with <span>(fle tilde{f})</span>? Here, <span>(le )</span> lifts <span>(0&lt; 1&lt; 2)</span> pointwise; minimality is understood in this order. Our enumeration algorithm is also analyzed from an input-sensitive viewpoint, leading to a run-time estimate of <span>(mathcal {O}(1.9332^n))</span> for graphs of order <i>n</i>; this is complemented by a lower bound example of <span>(Omega (1.7441^n))</span>.\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 6","pages":"1862 - 1887"},"PeriodicalIF":0.9,"publicationDate":"2024-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01211-w.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139750959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Time Complexity of Consensus Under Oblivious Message Adversaries 忽略信息对手情况下达成共识的时间复杂性
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-02-13 DOI: 10.1007/s00453-024-01209-4
Kyrill Winkler, Ami Paz, Hugo Rincon Galeana, Stefan Schmid, Ulrich Schmid

We study the problem of solving consensus in synchronous directed dynamic networks, in which communication is controlled by an oblivious message adversary that picks the communication graph to be used in a round from a fixed set of graphs (textbf{D}) arbitrarily. In this fundamental model, determining consensus solvability and designing efficient consensus algorithms is surprisingly difficult. Enabled by a decision procedure that is derived from a well-established previous consensus solvability characterization for a given set (textbf{D}), we study, for the first time, the time complexity of solving consensus in this model: We provide both upper and lower bounds for this time complexity, and also relate it to the number of iterations required by the decision procedure. Among other results, we find that reaching consensus under an oblivious message adversary can take exponentially longer than both deciding consensus solvability and broadcasting the input value of some unknown process to all other processes.

我们研究的是同步有向动态网络中的共识求解问题,在这种网络中,通信是由一个遗忘信息对抗者控制的,对抗者会从一组固定的图(textbf{D})中任意挑选一轮中要使用的通信图。在这个基本模型中,确定共识可解性和设计高效共识算法的难度之大令人吃惊。我们从之前针对给定集合 (textbf{D})建立的共识可解性表征中推导出了一个决策程序,在这个决策程序的帮助下,我们首次研究了在这个模型中求解共识的时间复杂度:我们提供了时间复杂度的上限和下限,并将其与决策程序所需的迭代次数联系起来。除其他结果外,我们还发现,与决定共识可解性和向所有其他进程广播某些未知进程的输入值相比,在遗忘信息对抗下达成共识所需的时间可能会呈指数级增长。
{"title":"The Time Complexity of Consensus Under Oblivious Message Adversaries","authors":"Kyrill Winkler,&nbsp;Ami Paz,&nbsp;Hugo Rincon Galeana,&nbsp;Stefan Schmid,&nbsp;Ulrich Schmid","doi":"10.1007/s00453-024-01209-4","DOIUrl":"10.1007/s00453-024-01209-4","url":null,"abstract":"<div><p>We study the problem of solving consensus in synchronous directed dynamic networks, in which communication is controlled by an oblivious message adversary that picks the communication graph to be used in a round from a fixed set of graphs <span>(textbf{D})</span> arbitrarily. In this fundamental model, determining consensus solvability and designing efficient consensus algorithms is surprisingly difficult. Enabled by a decision procedure that is derived from a well-established previous consensus solvability characterization for a given set <span>(textbf{D})</span>, we study, for the first time, the time complexity of solving consensus in this model: We provide both upper and lower bounds for this time complexity, and also relate it to the number of iterations required by the decision procedure. Among other results, we find that reaching consensus under an oblivious message adversary can take exponentially longer than both deciding consensus solvability and broadcasting the input value of some unknown process to all other processes.\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 6","pages":"1830 - 1861"},"PeriodicalIF":0.9,"publicationDate":"2024-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01209-4.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139750870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sublinear Time Eigenvalue Approximation via Random Sampling 通过随机抽样实现次线性时间特征值逼近
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-02-12 DOI: 10.1007/s00453-024-01208-5
Rajarshi Bhattacharjee, Gregory Dexter, Petros Drineas, Cameron Musco, Archan Ray

We study the problem of approximating the eigenspectrum of a symmetric matrix (textbf{A} in mathbb {R}^{n times n}) with bounded entries (i.e., (Vert textbf{A}Vert _{infty } le 1)). We present a simple sublinear time algorithm that approximates all eigenvalues of (textbf{A}) up to additive error (pm epsilon n) using those of a randomly sampled ({tilde{O}}left( frac{log ^3 n}{epsilon ^3}right) times {{tilde{O}}}left( frac{log ^3 n}{epsilon ^3}right) ) principal submatrix. Our result can be viewed as a concentration bound on the complete eigenspectrum of a random submatrix, significantly extending known bounds on just the singular values (the magnitudes of the eigenvalues). We give improved error bounds of (pm epsilon sqrt{text {nnz}(textbf{A})}) and (pm epsilon Vert textbf{A}Vert _F) when the rows of (textbf{A}) can be sampled with probabilities proportional to their sparsities or their squared (ell _2) norms respectively. Here (text {nnz}(textbf{A})) is the number of non-zero entries in (textbf{A}) and (Vert textbf{A}Vert _F) is its Frobenius norm. Even for the strictly easier problems of approximating the singular values or testing the existence of large negative eigenvalues (Bakshi, Chepurko, and Jayaram, FOCS ’20), our results are the first that take advantage of non-uniform sampling to give improved error bounds. From a technical perspective, our results require several new eigenvalue concentration and perturbation bounds for matrices with bounded entries. Our non-uniform sampling bounds require a new algorithmic approach, which judiciously zeroes out entries of a randomly sampled submatrix to reduce variance, before computing the eigenvalues of that submatrix as estimates for those of (textbf{A}). We complement our theoretical results with numerical simulations, which demonstrate the effectiveness of our algorithms in practice.

我们研究的问题是近似具有有界条目(即 (Vert textbf{A}Vert _{infty } le 1)) 的对称矩阵 (textbf{A} in mathbb {R}^{n times n}) 的特征谱。我们提出了一种简单的亚线性时间算法,它可以用随机采样的times {{tilde{O}}}left(frac{log ^3 n}{epsilon ^3}right) 主子矩阵。我们的结果可以看作是对随机子矩阵完整特征谱的集中约束,极大地扩展了对奇异值(特征值的大小)的已知约束。当 (textbf{A}) 的行可以分别以与它们的稀疏度或它们的平方(ell _2)规范成比例的概率进行采样时,我们给出了 (pm epsilon sqrttext {nnz}(textbf{A})}) 和 (pm epsilon Vert textbf{A}Vert _F)的改进误差约束。这里,(text {nnz}(textbf{A}))是(textbf{A})中的非零条目数,(Vert textbf{A}Vert _F)是它的弗罗贝尼斯规范。即使对于近似奇异值或检验是否存在大负特征值这种严格意义上更容易的问题(Bakshi, Chepurko, and Jayaram, FOCS '20),我们的结果也是第一个利用非均匀采样给出改进误差边界的结果。从技术角度看,我们的结果要求对有界项的矩阵进行若干新的特征值集中和扰动约束。我们的非均匀抽样边界需要一种新的算法方法,即在计算该子矩阵的特征值作为 (textbf{A}) 的估计值之前,明智地将随机抽样子矩阵的条目清零以减少方差。我们用数值模拟补充了理论结果,证明了我们的算法在实践中的有效性。
{"title":"Sublinear Time Eigenvalue Approximation via Random Sampling","authors":"Rajarshi Bhattacharjee,&nbsp;Gregory Dexter,&nbsp;Petros Drineas,&nbsp;Cameron Musco,&nbsp;Archan Ray","doi":"10.1007/s00453-024-01208-5","DOIUrl":"10.1007/s00453-024-01208-5","url":null,"abstract":"<div><p>We study the problem of approximating the eigenspectrum of a symmetric matrix <span>(textbf{A} in mathbb {R}^{n times n})</span> with bounded entries (i.e., <span>(Vert textbf{A}Vert _{infty } le 1)</span>). We present a simple sublinear time algorithm that approximates all eigenvalues of <span>(textbf{A})</span> up to additive error <span>(pm epsilon n)</span> using those of a randomly sampled <span>({tilde{O}}left( frac{log ^3 n}{epsilon ^3}right) times {{tilde{O}}}left( frac{log ^3 n}{epsilon ^3}right) )</span> principal submatrix. Our result can be viewed as a concentration bound on the complete eigenspectrum of a random submatrix, significantly extending known bounds on just the singular values (the magnitudes of the eigenvalues). We give improved error bounds of <span>(pm epsilon sqrt{text {nnz}(textbf{A})})</span> and <span>(pm epsilon Vert textbf{A}Vert _F)</span> when the rows of <span>(textbf{A})</span> can be sampled with probabilities proportional to their sparsities or their squared <span>(ell _2)</span> norms respectively. Here <span>(text {nnz}(textbf{A}))</span> is the number of non-zero entries in <span>(textbf{A})</span> and <span>(Vert textbf{A}Vert _F)</span> is its Frobenius norm. Even for the strictly easier problems of approximating the singular values or testing the existence of large negative eigenvalues (Bakshi, Chepurko, and Jayaram, FOCS ’20), our results are the first that take advantage of non-uniform sampling to give improved error bounds. From a technical perspective, our results require several new eigenvalue concentration and perturbation bounds for matrices with bounded entries. Our non-uniform sampling bounds require a new algorithmic approach, which judiciously zeroes out entries of a randomly sampled submatrix to reduce variance, before computing the eigenvalues of that submatrix as estimates for those of <span>(textbf{A})</span>. We complement our theoretical results with numerical simulations, which demonstrate the effectiveness of our algorithms in practice.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 6","pages":"1764 - 1829"},"PeriodicalIF":0.9,"publicationDate":"2024-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139751014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Algorithmica
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1