首页 > 最新文献

Information and Computation最新文献

英文 中文
Truthful approximation for rank-maximal matchings 秩最大匹配的真实逼近
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-01 DOI: 10.1016/j.ic.2026.105404
Jinshan Zhang , Hao Xu , Feng Wang , Meng Xi , Xiaotie Deng , Jianwei Yin
In this work, we investigate truthful mechanisms for the rank-maximal matching problem from an approximation standpoint. Our findings narrow the gap between the upper and lower bounds. We introduce a lexicographically truthful (LT) and nearly Pareto optimal (PO) randomized mechanism with an approximation ratio of 2e12e21.77, an improvement over the previous best result of 2. Key to our algorithm are preservation lemmas that enable us to leverage techniques from online algorithms to analyze the new approximation ratio. Furthermore, we present several hardness results across different settings to enhance our upper bound. Notably, we improve the lower bound for the approximation ratio of our LT and PO mechanism to 18/131.38. To our knowledge, this is the first instance of a lower bound being established using a linear programming approach in this field.
在这项工作中,我们从近似的角度研究了秩最大匹配问题的真实机制。我们的发现缩小了上限和下限之间的差距。我们引入了一个字典真实(LT)和近似帕累托最优(PO)随机化机制,其近似比为2e−12e−2≈1.77,比之前的最佳结果2有所改进。我们算法的关键是保留引理,它使我们能够利用在线算法中的技术来分析新的近似比。此外,我们提出了不同设置下的几个硬度结果,以增强我们的上界。值得注意的是,我们将我们的LT和PO机制的近似比率的下界提高到18/13≈1.38。据我们所知,这是在该领域中使用线性规划方法建立下界的第一个实例。
{"title":"Truthful approximation for rank-maximal matchings","authors":"Jinshan Zhang ,&nbsp;Hao Xu ,&nbsp;Feng Wang ,&nbsp;Meng Xi ,&nbsp;Xiaotie Deng ,&nbsp;Jianwei Yin","doi":"10.1016/j.ic.2026.105404","DOIUrl":"10.1016/j.ic.2026.105404","url":null,"abstract":"<div><div>In this work, we investigate truthful mechanisms for the rank-maximal matching problem from an approximation standpoint. Our findings narrow the gap between the upper and lower bounds. We introduce a lexicographically truthful (LT) and nearly Pareto optimal (PO) randomized mechanism with an approximation ratio of <span><math><mfrac><mrow><mn>2</mn><msqrt><mrow><mi>e</mi></mrow></msqrt><mo>−</mo><mn>1</mn></mrow><mrow><mn>2</mn><msqrt><mrow><mi>e</mi></mrow></msqrt><mo>−</mo><mn>2</mn></mrow></mfrac><mo>≈</mo><mn>1.77</mn></math></span>, an improvement over the previous best result of 2. Key to our algorithm are preservation lemmas that enable us to leverage techniques from online algorithms to analyze the new approximation ratio. Furthermore, we present several hardness results across different settings to enhance our upper bound. Notably, we improve the lower bound for the approximation ratio of our LT and PO mechanism to <span><math><mn>18</mn><mo>/</mo><mn>13</mn><mo>≈</mo><mn>1.38</mn></math></span>. To our knowledge, this is the first instance of a lower bound being established using a linear programming approach in this field.</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"308 ","pages":"Article 105404"},"PeriodicalIF":1.0,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145976646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved approximations for the capacitated vehicle routing problem with fixed capacity 固定容量有容车辆路径问题的改进逼近
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-01 DOI: 10.1016/j.ic.2026.105405
Jingyang Zhao, Mingyu Xiao
The Capacitated Vehicle Routing Problem (CVRP) is one of the most extensively studied problems in combinatorial optimization. Based on customer demand, we distinguish three variants of CVRP: unit-demand, splittable, and unsplittable. In this paper, we consider k-CVRP in general metrics and on general graphs, where k is the vehicle capacity. All three versions are APX-hard for any fixed k3. Based on an α-approximation algorithm for metric TSP, we propose new approximation algorithms. For α=32, we obtain a (52Θ(1k))-approximation algorithm for the splittable and unit-demand cases, and a (52+ln2Θ(1k))-approximation algorithm for the unsplittable case. Our approximation ratio is better than the previous results when k is less than a fairly large value, approximately 1.7×107.
For small values of k, we design independent and elegant algorithms with further improvements. For the splittable and unit-demand cases, we improve the approximation ratio from 1.792 to 1.500 for k=3, and from 1.750 to 1.500 for k=4. For the unsplittable case, we improve the approximation ratio from 1.792 to 1.500 for k=3, from 2.051 to 1.750 for k=4, and from 2.249 to 2.157 for k=5. The approximation ratio for k=3 surprisingly achieves the same value as in the splittable case. Our techniques, such as EX-ITP – an extension of the classic ITP method, have the potential to improve algorithms for other routing problems as well.
有能力车辆路径问题(CVRP)是组合优化中研究最广泛的问题之一。基于客户需求,我们区分了CVRP的三种变体:单位需求、可分割和不可分割。在本文中,我们考虑一般度量和一般图上的k- cvrp,其中k为车辆容量。所有三个版本对于任何固定k≥3都是apx硬的。在度量TSP的α-近似算法的基础上,提出了新的近似算法。对于α=32,我们得到了可分和单位需求情况下的(52−Θ(1k))近似算法,以及不可分情况下的(52+ln²−Θ(1k))近似算法。当k小于一个相当大的值时,我们的近似比以前的结果要好,近似为1.7×107。对于较小的k值,我们设计了独立且优雅的算法,并进行了进一步改进。对于可分割和单位需求情况,我们将k=3时的近似比率从1.792提高到1.500,k=4时的近似比率从1.750提高到1.500。对于不可分割的情况,我们将k=3时的近似比率从1.792提高到1.500,k=4时从2.051提高到1.750,k=5时从2.249提高到2.157。令人惊讶的是,k=3的近似值与可分割情况下的近似值相同。我们的技术,如EX-ITP——经典ITP方法的扩展,也有可能改进其他路由问题的算法。
{"title":"Improved approximations for the capacitated vehicle routing problem with fixed capacity","authors":"Jingyang Zhao,&nbsp;Mingyu Xiao","doi":"10.1016/j.ic.2026.105405","DOIUrl":"10.1016/j.ic.2026.105405","url":null,"abstract":"<div><div>The Capacitated Vehicle Routing Problem (CVRP) is one of the most extensively studied problems in combinatorial optimization. Based on customer demand, we distinguish three variants of CVRP: unit-demand, splittable, and unsplittable. In this paper, we consider <em>k</em>-CVRP in general metrics and on general graphs, where <em>k</em> is the vehicle capacity. All three versions are APX-hard for any fixed <span><math><mi>k</mi><mo>≥</mo><mn>3</mn></math></span>. Based on an <em>α</em>-approximation algorithm for metric TSP, we propose new approximation algorithms. For <span><math><mi>α</mi><mo>=</mo><mfrac><mrow><mn>3</mn></mrow><mrow><mn>2</mn></mrow></mfrac></math></span>, we obtain a <span><math><mo>(</mo><mfrac><mrow><mn>5</mn></mrow><mrow><mn>2</mn></mrow></mfrac><mo>−</mo><mi>Θ</mi><mo>(</mo><mfrac><mrow><mn>1</mn></mrow><mrow><msqrt><mrow><mi>k</mi></mrow></msqrt></mrow></mfrac><mo>)</mo><mo>)</mo></math></span>-approximation algorithm for the splittable and unit-demand cases, and a <span><math><mo>(</mo><mfrac><mrow><mn>5</mn></mrow><mrow><mn>2</mn></mrow></mfrac><mo>+</mo><mi>ln</mi><mo>⁡</mo><mn>2</mn><mo>−</mo><mi>Θ</mi><mo>(</mo><mfrac><mrow><mn>1</mn></mrow><mrow><msqrt><mrow><mi>k</mi></mrow></msqrt></mrow></mfrac><mo>)</mo><mo>)</mo></math></span>-approximation algorithm for the unsplittable case. Our approximation ratio is better than the previous results when <em>k</em> is less than a fairly large value, approximately <span><math><mn>1.7</mn><mo>×</mo><msup><mrow><mn>10</mn></mrow><mrow><mn>7</mn></mrow></msup></math></span>.</div><div>For small values of <em>k</em>, we design independent and elegant algorithms with further improvements. For the splittable and unit-demand cases, we improve the approximation ratio from 1.792 to 1.500 for <span><math><mi>k</mi><mo>=</mo><mn>3</mn></math></span>, and from 1.750 to 1.500 for <span><math><mi>k</mi><mo>=</mo><mn>4</mn></math></span>. For the unsplittable case, we improve the approximation ratio from 1.792 to 1.500 for <span><math><mi>k</mi><mo>=</mo><mn>3</mn></math></span>, from 2.051 to 1.750 for <span><math><mi>k</mi><mo>=</mo><mn>4</mn></math></span>, and from 2.249 to 2.157 for <span><math><mi>k</mi><mo>=</mo><mn>5</mn></math></span>. The approximation ratio for <span><math><mi>k</mi><mo>=</mo><mn>3</mn></math></span> surprisingly achieves the same value as in the splittable case. Our techniques, such as EX-ITP – an extension of the classic ITP method, have the potential to improve algorithms for other routing problems as well.</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"308 ","pages":"Article 105405"},"PeriodicalIF":1.0,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145976580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A perfect matching reciprocity method for embedding multiple hypercubes in an augmented cube: Application to Hamiltonian decomposition 在增广立方体中嵌入多个超立方体的一种完美匹配互易方法:在哈密顿分解中的应用
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-01 DOI: 10.1016/j.ic.2025.105401
Da-Wei Yang , Hongyang Zhang , Rong-Xia Hao , Sun-Yuan Hsieh
This paper focuses on the embeddability of hypercubes in an important class of Cayley graphs, known as augmented cubes. An n-dimensional augmented cube AQn is constructed by augmenting the n-dimensional hypercube Qn with additional edges, thus making Qn a spanning subgraph of AQn. Dong and Wang (2019) first posed the problem of determining the number of Qn-isomorphic subgraphs in AQn, which still remains open. By exploiting the Cayley properties of AQn, we establish a lower bound for this number. Furthermore, we develop a method for constructing pairs of Qn-isomorphic subgraphs in AQn with the minimum number of common edges. This is accomplished through the use of reciprocal perfect matchings, a technique that also relies on the Cayley property of AQn. As an application, we prove that AQn admits n1 edge-disjoint Hamiltonian cycles when n3 is odd and n2 cycles when n is even, thereby confirming a conjecture by Hung (2015) that AQn admits a Hamiltonian decomposition for odd n with n3.
本文主要研究一类重要的Cayley图的超立方体的可嵌入性,即增广立方体。通过在n维超立方体Qn上增加额外的边来构造n维增广立方体AQn,从而使Qn成为AQn的生成子图。Dong and Wang(2019)首先提出了确定AQn中qn -同构子图数量的问题,该问题仍然是开放的。通过利用AQn的Cayley性质,我们建立了这个数的下界。在此基础上,提出了一种构造具有最小公共边数的qn -同构子图对的方法。这是通过使用互反完美匹配来实现的,这种技术也依赖于AQn的Cayley性质。作为应用,我们证明了当n≥3为奇数时AQn允许n−1个边不相交的哈密顿循环,当n为偶数时n−2个循环,从而证实了Hung(2015)关于当n≥3时AQn允许奇数n的哈密顿分解的猜想。
{"title":"A perfect matching reciprocity method for embedding multiple hypercubes in an augmented cube: Application to Hamiltonian decomposition","authors":"Da-Wei Yang ,&nbsp;Hongyang Zhang ,&nbsp;Rong-Xia Hao ,&nbsp;Sun-Yuan Hsieh","doi":"10.1016/j.ic.2025.105401","DOIUrl":"10.1016/j.ic.2025.105401","url":null,"abstract":"<div><div>This paper focuses on the embeddability of hypercubes in an important class of Cayley graphs, known as augmented cubes. An <em>n</em>-dimensional augmented cube <span><math><mi>A</mi><msub><mrow><mi>Q</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span> is constructed by augmenting the <em>n</em>-dimensional hypercube <span><math><msub><mrow><mi>Q</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span> with additional edges, thus making <span><math><msub><mrow><mi>Q</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span> a spanning subgraph of <span><math><mi>A</mi><msub><mrow><mi>Q</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span>. Dong and Wang (2019) first posed the problem of determining the number of <span><math><msub><mrow><mi>Q</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span>-isomorphic subgraphs in <span><math><mi>A</mi><msub><mrow><mi>Q</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span>, which still remains open. By exploiting the Cayley properties of <span><math><mi>A</mi><msub><mrow><mi>Q</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span>, we establish a lower bound for this number. Furthermore, we develop a method for constructing pairs of <span><math><msub><mrow><mi>Q</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span>-isomorphic subgraphs in <span><math><mi>A</mi><msub><mrow><mi>Q</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span> with the minimum number of common edges. This is accomplished through the use of reciprocal perfect matchings, a technique that also relies on the Cayley property of <span><math><mi>A</mi><msub><mrow><mi>Q</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span>. As an application, we prove that <span><math><mi>A</mi><msub><mrow><mi>Q</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span> admits <span><math><mi>n</mi><mo>−</mo><mn>1</mn></math></span> edge-disjoint Hamiltonian cycles when <span><math><mi>n</mi><mo>≥</mo><mn>3</mn></math></span> is odd and <span><math><mi>n</mi><mo>−</mo><mn>2</mn></math></span> cycles when <em>n</em> is even, thereby confirming a conjecture by Hung (2015) that <span><math><mi>A</mi><msub><mrow><mi>Q</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span> admits a Hamiltonian decomposition for odd <em>n</em> with <span><math><mi>n</mi><mo>≥</mo><mn>3</mn></math></span>.</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"308 ","pages":"Article 105401"},"PeriodicalIF":1.0,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145884338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Total conditional complexity of certain objects 某些对象的总条件复杂度
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-01 DOI: 10.1016/j.ic.2025.105400
Nikolay Vereshchagin
The fine approach to measure information dependence is based on the total conditional complexity CT(y|x), which is defined as the minimal length of a total program that outputs y on the input x. It is known that the total conditional complexity can be much larger than the plain conditional complexity. Such strings x,y are defined by means of a diagonal argument and are not otherwise interesting. In this paper we investigate whether this happens also for some natural objects having some other interesting properties. More specifically, we consider the following objects: the number of strings of complexity less than n and the lex first string of length n and complexity ⩾n. It is known that they have negligible mutual conditional complexities. In this paper we prove that their mutual total conditional complexities may be large. This is the first example of interesting objects whose plain conditional complexity is much less than the total one.
衡量信息依赖性的好方法是基于总条件复杂度CT(y|x),它被定义为输出y的输入x的总程序的最小长度。众所周知,总条件复杂度可以比普通条件复杂度大得多。这样的字符串x,y是通过对角参数定义的,否则就没什么意思了。在本文中,我们研究了对于一些具有其他有趣性质的自然物体是否也会发生这种情况。更具体地说,我们考虑以下对象:复杂度小于n的字符串的数量以及长度为n和复杂度大于或等于n的lex第一个字符串。众所周知,它们具有可忽略不计的相互条件复杂性。本文证明了它们的相互总条件复杂度可能很大。这是有趣对象的第一个例子,它的普通条件复杂性远低于总的条件复杂性。
{"title":"Total conditional complexity of certain objects","authors":"Nikolay Vereshchagin","doi":"10.1016/j.ic.2025.105400","DOIUrl":"10.1016/j.ic.2025.105400","url":null,"abstract":"<div><div>The fine approach to measure information dependence is based on the total conditional complexity <span><math><mtext>CT</mtext><mo>(</mo><mi>y</mi><mo>|</mo><mi>x</mi><mo>)</mo></math></span>, which is defined as the minimal length of a <em>total</em> program that outputs <em>y</em> on the input <em>x</em>. It is known that the total conditional complexity can be much larger than the plain conditional complexity. Such strings <span><math><mi>x</mi><mo>,</mo><mi>y</mi></math></span> are defined by means of a diagonal argument and are not otherwise interesting. In this paper we investigate whether this happens also for some natural objects having some other interesting properties. More specifically, we consider the following objects: the number of strings of complexity less than <em>n</em> and the lex first string of length <em>n</em> and complexity ⩾<em>n</em>. It is known that they have negligible mutual conditional complexities. In this paper we prove that their mutual total conditional complexities may be large. This is the first example of interesting objects whose plain conditional complexity is much less than the total one.</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"308 ","pages":"Article 105400"},"PeriodicalIF":1.0,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145884336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deterministic pushdown automata with translucent input letters 带有半透明输入字母的确定性下推自动机
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-01 DOI: 10.1016/j.ic.2026.105403
Martin Kutrib , Andreas Malcher , Carlo Mereghetti , Beatrice Palano , Priscilla Raucci , Matthias Wendlandt
The use of translucent input letters represents a way of implementing a discontinuous input processing in automata. In detail, a translucent automaton performs several sweeps from left to right on the input: according to the current state, some symbols are visible and can be processed, whereas some other symbols are invisible and may be processed in another sweep. We also distinguish between the returning and non-returning mode, which differ in the way the automaton behaves after reading a symbol: in the returning mode, a new sweep starts immediately, while in the non-returning mode, the device processes the next visible symbol.
Here, we investigate deterministic pushdown automata with translucent letters both in the returning and non-returning mode. We prove that the non-returning mode strictly outperforms the returning mode, and that the families of the languages accepted by these two types of devices can be ranked strictly between the deterministic context-free languages and the deterministic context-sensitive languages. Moreover, both families are shown to be incomparable to the families of context-free, growing context-sensitive, and Church-Rosser languages. The ability of accepting non-semilinear languages is also emphasized (addressing an open question in the literature). Finally, we study the closure properties of both language families under the Boolean operations, obtaining that they are both closed under complementation but not under union and intersection. Further non-closure results are pointed-out for returning devices.
半透明输入字母的使用代表了在自动机中实现不连续输入处理的一种方法。具体来说,一个半透明的自动机从左到右对输入执行几次扫描:根据当前状态,一些符号是可见的,可以处理,而另一些符号是不可见的,可以在另一次扫描中处理。我们还区分了返回模式和不返回模式,它们的不同之处在于自动机在读取符号后的行为方式:在返回模式下,立即开始新的扫描,而在不返回模式下,设备处理下一个可见符号。在这里,我们研究了半透明字母在返回和不返回模式下的确定性下推自动机。我们证明了不返回模式严格优于返回模式,并且这两种类型的设备所接受的语言族可以严格地排列在确定性上下文无关语言和确定性上下文敏感语言之间。此外,这两个家族都被证明是无法与上下文无关的、日益增长的上下文敏感的和Church-Rosser语言家族相比的。还强调了接受非非线性语言的能力(解决文献中的一个开放问题)。最后,我们研究了这两个语系在布尔运算下的闭包性质,得到了它们在补集下都是闭包的,而在并交下不闭包。进一步的非闭合结果指出了返回设备。
{"title":"Deterministic pushdown automata with translucent input letters","authors":"Martin Kutrib ,&nbsp;Andreas Malcher ,&nbsp;Carlo Mereghetti ,&nbsp;Beatrice Palano ,&nbsp;Priscilla Raucci ,&nbsp;Matthias Wendlandt","doi":"10.1016/j.ic.2026.105403","DOIUrl":"10.1016/j.ic.2026.105403","url":null,"abstract":"<div><div>The use of translucent input letters represents a way of implementing a discontinuous input processing in automata. In detail, a translucent automaton performs several sweeps from left to right on the input: according to the current state, some symbols are visible and can be processed, whereas some other symbols are invisible and may be processed in another sweep. We also distinguish between the returning and non-returning mode, which differ in the way the automaton behaves after reading a symbol: in the returning mode, a new sweep starts immediately, while in the non-returning mode, the device processes the next visible symbol.</div><div>Here, we investigate <em>deterministic pushdown automata with translucent letters</em> both in the returning and non-returning mode. We prove that the non-returning mode strictly outperforms the returning mode, and that the families of the languages accepted by these two types of devices can be ranked strictly between the deterministic context-free languages and the deterministic context-sensitive languages. Moreover, both families are shown to be incomparable to the families of context-free, growing context-sensitive, and Church-Rosser languages. The ability of accepting non-semilinear languages is also emphasized (addressing an open question in the literature). Finally, we study the closure properties of both language families under the Boolean operations, obtaining that they are both closed under complementation but not under union and intersection. Further non-closure results are pointed-out for returning devices.</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"308 ","pages":"Article 105403"},"PeriodicalIF":1.0,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145976581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Corrigendum to “On the equivalence of uniform key agreement and sequential composition insecurity” [Information and Computation 307 (2025) 105365] “关于统一密钥一致性和顺序组合不安全性的等价性”的勘误表[信息与计算307 (2025)105365]
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-01 DOI: 10.1016/j.ic.2025.105402
Yusai Wu , Liqing Yu , Yu Yu
{"title":"Corrigendum to “On the equivalence of uniform key agreement and sequential composition insecurity” [Information and Computation 307 (2025) 105365]","authors":"Yusai Wu ,&nbsp;Liqing Yu ,&nbsp;Yu Yu","doi":"10.1016/j.ic.2025.105402","DOIUrl":"10.1016/j.ic.2025.105402","url":null,"abstract":"","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"308 ","pages":"Article 105402"},"PeriodicalIF":1.0,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145884337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spiking neural P systems with non-gated channels 非门控通道的脉冲神经P系统
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-18 DOI: 10.1016/j.ic.2025.105399
Yuzhen Zhao , Zhen Yang , Yueguo Luo , Hui Li , Wenke Zang
Spiking neural P systems (SNP systems) are parallel and distributed computational models mimicking the storage, processing, and transmission of spikes in the human brain nervous system. However, they do not consider the non-gated channels in human brain neurons, which would affect the storage and thus further affect the processing and transmission of spikes. To enhance the SNP systems' ability to process complex information and to make SNP systems more biologically plausible, this work constructs the SNP systems with non-gated channels (NGCSNP systems). In NGCSNP systems, when a neuron is not activated, the spikes in it slowly flow out into the environment through non-gated channels until a steady state is reached. That is, the number of spikes in a neuron nonlinearly varies automatically. In terms of computational power, this work proves the Turing universality of NGCSNP systems by simulating register machines. For the ADD/SUB/FIN/INPUT/deterministic ADD modules of the universal register machine, NGCSNP systems utilize only 7, 6, 3, 5, and 4 neurons, with each neuron containing a maximum of 2, 2, 2, 1, and 1 rules for module simulation, respectively. Compared to the other eight variants, NGCSNP systems use fewer computational resources. Also, this work proves the computational efficiency of NGCSNP systems by solving a classical NP-hard problem: Boolean Satisfiability Problems in linear time via a space-for-time strategy. NGCSNP systems introduce nonlinear features at the neuronal level, enhance the computational functionality as well as stability of the systems, save the computational resources, and provide clues for developing computational models that resemble the human brain.
尖峰神经P系统(SNP系统)是一种模拟人类脑神经系统中尖峰的存储、处理和传输的并行和分布式计算模型。然而,他们没有考虑人脑神经元中的非门控通道,这将影响存储,从而进一步影响峰值的处理和传输。为了增强SNP系统处理复杂信息的能力,并使SNP系统更具生物学合理性,本研究构建了具有非门控通道的SNP系统(NGCSNP系统)。在NGCSNP系统中,当一个神经元没有被激活时,它的尖峰会通过非门控通道缓慢地流入环境中,直到达到稳定状态。也就是说,一个神经元中的尖峰数是非线性自动变化的。在计算能力方面,本工作通过模拟寄存器机证明了NGCSNP系统的图灵通用性。对于通用寄存器机的ADD/SUB/FIN/INPUT/deterministic ADD模块,NGCSNP系统仅使用7、6、3、5和4个神经元,每个神经元最多分别包含2、2、2、1和1个模块仿真规则。与其他8种变体相比,NGCSNP系统使用的计算资源更少。此外,本文还通过空间换时间策略解决了一个经典的np困难问题:线性时间的布尔可满足性问题,证明了NGCSNP系统的计算效率。NGCSNP系统在神经元层面引入非线性特征,增强了系统的计算功能和稳定性,节省了计算资源,为开发类似人脑的计算模型提供了线索。
{"title":"Spiking neural P systems with non-gated channels","authors":"Yuzhen Zhao ,&nbsp;Zhen Yang ,&nbsp;Yueguo Luo ,&nbsp;Hui Li ,&nbsp;Wenke Zang","doi":"10.1016/j.ic.2025.105399","DOIUrl":"10.1016/j.ic.2025.105399","url":null,"abstract":"<div><div>Spiking neural P systems (SNP systems) are parallel and distributed computational models mimicking the storage, processing, and transmission of spikes in the human brain nervous system. However, they do not consider the non-gated channels in human brain neurons, which would affect the storage and thus further affect the processing and transmission of spikes. To enhance the SNP systems' ability to process complex information and to make SNP systems more biologically plausible, this work constructs the SNP systems with non-gated channels (NGCSNP systems). In NGCSNP systems, when a neuron is not activated, the spikes in it slowly flow out into the environment through non-gated channels until a steady state is reached. That is, the number of spikes in a neuron nonlinearly varies automatically. In terms of computational power, this work proves the Turing universality of NGCSNP systems by simulating register machines. For the ADD/SUB/FIN/INPUT/deterministic ADD modules of the universal register machine, NGCSNP systems utilize only 7, 6, 3, 5, and 4 neurons, with each neuron containing a maximum of 2, 2, 2, 1, and 1 rules for module simulation, respectively. Compared to the other eight variants, NGCSNP systems use fewer computational resources. Also, this work proves the computational efficiency of NGCSNP systems by solving a classical NP-hard problem: Boolean Satisfiability Problems in linear time via a space-for-time strategy. NGCSNP systems introduce nonlinear features at the neuronal level, enhance the computational functionality as well as stability of the systems, save the computational resources, and provide clues for developing computational models that resemble the human brain.</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"308 ","pages":"Article 105399"},"PeriodicalIF":1.0,"publicationDate":"2025-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145840783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Verifying and interpreting neural networks using finite automata 用有限自动机验证和解释神经网络
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-16 DOI: 10.1016/j.ic.2025.105398
Marco Sälzer , Eric Alsmann , Florian Bruse , Martin Lange
Verifying properties and interpreting the behaviour of deep neural networks (DNN) is an important task given their ubiquitous use in applications, including safety-critical ones, and their black-box nature. We propose an automata-theoretic approach to tackling problems arising in DNN analysis. We show that the input-output behaviour of a DNN can be captured precisely by a (special) weak Büchi automaton and we show how these can be used to address common verification and interpretation tasks of DNN like adversarial robustness or minimum sufficient reasons.
鉴于深度神经网络(DNN)在应用程序(包括安全关键应用程序)中的普遍应用以及它们的黑箱性质,验证属性和解释行为是一项重要的任务。我们提出了一种自动机理论方法来解决深度神经网络分析中出现的问题。我们展示了DNN的输入输出行为可以通过一个(特殊的)弱b chi自动机精确地捕获,我们展示了如何使用这些来解决DNN的常见验证和解释任务,如对抗鲁棒性或最小充分理由。
{"title":"Verifying and interpreting neural networks using finite automata","authors":"Marco Sälzer ,&nbsp;Eric Alsmann ,&nbsp;Florian Bruse ,&nbsp;Martin Lange","doi":"10.1016/j.ic.2025.105398","DOIUrl":"10.1016/j.ic.2025.105398","url":null,"abstract":"<div><div>Verifying properties and interpreting the behaviour of deep neural networks (DNN) is an important task given their ubiquitous use in applications, including safety-critical ones, and their black-box nature. We propose an automata-theoretic approach to tackling problems arising in DNN analysis. We show that the input-output behaviour of a DNN can be captured precisely by a (special) weak Büchi automaton and we show how these can be used to address common verification and interpretation tasks of DNN like adversarial robustness or minimum sufficient reasons.</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"308 ","pages":"Article 105398"},"PeriodicalIF":1.0,"publicationDate":"2025-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145791115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Approximation algorithms for non-sequential star packing problems 非顺序星形布局问题的近似算法
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-08 DOI: 10.1016/j.ic.2025.105397
Mengyuan Hu , An Zhang , Yong Chen , Mingyang Gong , Guohui Lin
For a positive integer k1, a k-star (k+-star, k-star, respectively) is a connected graph containing a degree- vertex and degree-1 vertices, where =k (k, 1k, respectively). The k+-star packing problem is to cover as many vertices of an input graph G as possible using vertex-disjoint k+-stars in G; and given k>t1, the k/t-star packing problem is to cover as many vertices of G as possible using vertex-disjoint k-stars but no t-stars in G. Both problems are NP-hard for any fixed k2. We present a (1+k22k+1)- and a 32-approximation algorithms for the k+-star packing problem when k3 and k=2, respectively, and a (1+1t+1+1/k)-approximation algorithm for the k/t-star packing problem when k>t2. They are all local search algorithms and they improve the best known approximation algorithms for the problems, respectively.
对于正整数k≥1,k-星(分别为k+-星,k−-星)是一个包含一个阶- r顶点和一个阶- r顶点的连通图,其中,r =k(分别为r≥k, 1≤r≤k)。k+星填充问题是在输入图G中使用顶点不相交的k+星来覆盖尽可能多的顶点;当给定k>;t≥1时,k−/t星填充问题是使用顶点不相交的k−星而不使用G中的t星来覆盖G中尽可能多的顶点。对于任意固定k≥2,这两个问题都是np困难的。对于k≥3和k=2时的k+星填充问题,我们分别给出了一个(1+k22k+1)-和一个32-近似算法,对于k>;t≥2时的k−/t星填充问题,我们给出了一个(1+1t+1+1/k)-近似算法。它们都是局部搜索算法,它们分别改进了最著名的近似算法。
{"title":"Approximation algorithms for non-sequential star packing problems","authors":"Mengyuan Hu ,&nbsp;An Zhang ,&nbsp;Yong Chen ,&nbsp;Mingyang Gong ,&nbsp;Guohui Lin","doi":"10.1016/j.ic.2025.105397","DOIUrl":"10.1016/j.ic.2025.105397","url":null,"abstract":"<div><div>For a positive integer <span><math><mi>k</mi><mo>≥</mo><mn>1</mn></math></span>, a <em>k</em>-star (<span><math><msup><mrow><mi>k</mi></mrow><mrow><mo>+</mo></mrow></msup></math></span>-star, <span><math><msup><mrow><mi>k</mi></mrow><mrow><mo>−</mo></mrow></msup></math></span>-star, respectively) is a connected graph containing a degree-<em>ℓ</em> vertex and <em>ℓ</em> degree-1 vertices, where <span><math><mi>ℓ</mi><mo>=</mo><mi>k</mi></math></span> (<span><math><mi>ℓ</mi><mo>≥</mo><mi>k</mi></math></span>, <span><math><mn>1</mn><mo>≤</mo><mi>ℓ</mi><mo>≤</mo><mi>k</mi></math></span>, respectively). The <span><math><msup><mrow><mi>k</mi></mrow><mrow><mo>+</mo></mrow></msup></math></span>-star packing problem is to cover as many vertices of an input graph <em>G</em> as possible using vertex-disjoint <span><math><msup><mrow><mi>k</mi></mrow><mrow><mo>+</mo></mrow></msup></math></span>-stars in <em>G</em>; and given <span><math><mi>k</mi><mo>&gt;</mo><mi>t</mi><mo>≥</mo><mn>1</mn></math></span>, the <span><math><msup><mrow><mi>k</mi></mrow><mrow><mo>−</mo></mrow></msup><mo>/</mo><mi>t</mi></math></span>-star packing problem is to cover as many vertices of <em>G</em> as possible using vertex-disjoint <span><math><msup><mrow><mi>k</mi></mrow><mrow><mo>−</mo></mrow></msup></math></span>-stars but no <em>t</em>-stars in <em>G</em>. Both problems are NP-hard for any fixed <span><math><mi>k</mi><mo>≥</mo><mn>2</mn></math></span>. We present a <span><math><mo>(</mo><mn>1</mn><mo>+</mo><mfrac><mrow><msup><mrow><mi>k</mi></mrow><mrow><mn>2</mn></mrow></msup></mrow><mrow><mn>2</mn><mi>k</mi><mo>+</mo><mn>1</mn></mrow></mfrac><mo>)</mo></math></span>- and a <span><math><mfrac><mrow><mn>3</mn></mrow><mrow><mn>2</mn></mrow></mfrac></math></span>-approximation algorithms for the <span><math><msup><mrow><mi>k</mi></mrow><mrow><mo>+</mo></mrow></msup></math></span>-star packing problem when <span><math><mi>k</mi><mo>≥</mo><mn>3</mn></math></span> and <span><math><mi>k</mi><mo>=</mo><mn>2</mn></math></span>, respectively, and a <span><math><mo>(</mo><mn>1</mn><mo>+</mo><mfrac><mrow><mn>1</mn></mrow><mrow><mi>t</mi><mo>+</mo><mn>1</mn><mo>+</mo><mn>1</mn><mo>/</mo><mi>k</mi></mrow></mfrac><mo>)</mo></math></span>-approximation algorithm for the <span><math><msup><mrow><mi>k</mi></mrow><mrow><mo>−</mo></mrow></msup><mo>/</mo><mi>t</mi></math></span>-star packing problem when <span><math><mi>k</mi><mo>&gt;</mo><mi>t</mi><mo>≥</mo><mn>2</mn></math></span>. They are all local search algorithms and they improve the best known approximation algorithms for the problems, respectively.</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"308 ","pages":"Article 105397"},"PeriodicalIF":1.0,"publicationDate":"2025-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145738184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Algebraic barriers to halving algorithmic information quantities in correlated strings 相关字符串中算法信息量减半的代数障碍
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-05 DOI: 10.1016/j.ic.2025.105396
Andrei Romashchenko
We study the possibility of scaling down algorithmic information quantities in tuples of correlated strings. In particular, we address a question raised by Alexander Shen: whether, for any triple of strings (a,b,c), there exists a string z such that each conditional Kolmogorov complexity C(a|z),C(b|z),C(c|z) is approximately half of the corresponding unconditional Kolmogorov complexity. We give a negative answer to this question by constructing a triple (a,b,c) for which no such string z exists. Moreover, we construct a fully explicit example of such a tuple, inspired by Vladimir V'yugin's perspective on the role of structured and natural objects in algorithmic information theory. Our construction is based on combinatorial properties of incidences in finite projective planes and relies on bounds for point-line incidences over prime fields, obtained using tools from additive combinatorics and algebraic methods, notably results by Bourgain–Katz–Tao and Stevens–De Zeeuw. As an application, we show that this impossibility yields lower bounds on the communication complexity of secret key agreement protocols in certain settings. These results reveal algebraic obstructions to efficient information exchange and highlight a separation in information-theoretic behavior between fields with and without proper subfields.
我们研究了在相关字符串元组中缩减算法信息量的可能性。特别地,我们解决了Alexander Shen提出的一个问题:对于任意字符串的三组(a,b,c),是否存在一个字符串z,使得每个条件Kolmogorov复杂度c (a|z), c (b|z), c (c|z)大约是相应的无条件Kolmogorov复杂度的一半。我们通过构造一个不存在这样的字符串z的三元组(a,b,c)来给出这个问题的否定答案。此外,受Vladimir V'yugin关于算法信息论中结构化和自然对象的作用的观点的启发,我们构建了这样一个元组的完全明确的例子。我们的构造是基于有限射影平面上关联的组合性质,并依赖于素域上点线关联的界,这些界是使用加性组合学和代数方法的工具得到的,特别是由Bourgain-Katz-Tao和Stevens-De Zeeuw得到的结果。作为一个应用,我们证明了这种不可能性在某些设置下产生了密钥协议通信复杂性的下界。这些结果揭示了有效信息交换的代数障碍,并突出了有适当子域和没有适当子域的域之间的信息论行为的分离。
{"title":"Algebraic barriers to halving algorithmic information quantities in correlated strings","authors":"Andrei Romashchenko","doi":"10.1016/j.ic.2025.105396","DOIUrl":"10.1016/j.ic.2025.105396","url":null,"abstract":"<div><div>We study the possibility of scaling down algorithmic information quantities in tuples of correlated strings. In particular, we address a question raised by Alexander Shen: whether, for any triple of strings <span><math><mo>(</mo><mi>a</mi><mo>,</mo><mi>b</mi><mo>,</mo><mi>c</mi><mo>)</mo></math></span>, there exists a string <em>z</em> such that each conditional Kolmogorov complexity <span><math><mi>C</mi><mo>(</mo><mi>a</mi><mo>|</mo><mi>z</mi><mo>)</mo><mo>,</mo><mi>C</mi><mo>(</mo><mi>b</mi><mo>|</mo><mi>z</mi><mo>)</mo><mo>,</mo><mi>C</mi><mo>(</mo><mi>c</mi><mo>|</mo><mi>z</mi><mo>)</mo></math></span> is approximately half of the corresponding unconditional Kolmogorov complexity. We give a negative answer to this question by constructing a triple <span><math><mo>(</mo><mi>a</mi><mo>,</mo><mi>b</mi><mo>,</mo><mi>c</mi><mo>)</mo></math></span> for which no such string <em>z</em> exists. Moreover, we construct a fully explicit example of such a tuple, inspired by Vladimir V'yugin's perspective on the role of structured and natural objects in algorithmic information theory. Our construction is based on combinatorial properties of incidences in finite projective planes and relies on bounds for point-line incidences over prime fields, obtained using tools from additive combinatorics and algebraic methods, notably results by Bourgain–Katz–Tao and Stevens–De Zeeuw. As an application, we show that this impossibility yields lower bounds on the communication complexity of secret key agreement protocols in certain settings. These results reveal algebraic obstructions to efficient information exchange and highlight a separation in information-theoretic behavior between fields with and without proper subfields.</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"308 ","pages":"Article 105396"},"PeriodicalIF":1.0,"publicationDate":"2025-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145738183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Information and Computation
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1