首页 > 最新文献

Information and Computation最新文献

英文 中文
Approximation algorithms for the maximum path cover problem using long paths 使用长路径的最大路径覆盖问题的逼近算法
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-11-01 DOI: 10.1016/j.ic.2025.105378
Mingyang Gong , Yong Chen , Zhi-Zhong Chen , Guohui Lin , Bing Su , Lusheng Wang
The problem studied in this paper is to find a collection of vertex-disjoint paths in a given graph G=(V,E) such that each path has length at least k, called a long path, and the total number of edges on these paths is maximized. The problem is NP-hard for any fixed k or when k is part of the input, by a reduction from the Hamiltonian path problem. Berman and Karpinski presented a 7/6-approximation algorithm for k=1, but for a general k2, there is no approximation algorithm directly for the problem. We present the first local search (0.4394k+O(1))-approximation algorithm for any fixed k1, and a 1.4254-approximation algorithm for k=2 built on top of a maximum triangle-free path-cycle cover.
本文研究的问题是在给定的图G=(V,E)中,求出每条路径长度至少为k的顶点不相交路径的集合,称为长路径,并使这些路径上的边总数最大化。这个问题是np困难的对于任何固定的k或者当k是输入的一部分,通过哈密顿路径问题的简化。Berman和Karpinski提出了k=1时的7/6逼近算法,但对于一般k≥2时,没有直接求解该问题的逼近算法。我们提出了k≥1时的第一个局部搜索(0.4394k+O(1))-逼近算法,以及k=2时建立在最大无三角路径环覆盖上的1.4254-逼近算法。
{"title":"Approximation algorithms for the maximum path cover problem using long paths","authors":"Mingyang Gong ,&nbsp;Yong Chen ,&nbsp;Zhi-Zhong Chen ,&nbsp;Guohui Lin ,&nbsp;Bing Su ,&nbsp;Lusheng Wang","doi":"10.1016/j.ic.2025.105378","DOIUrl":"10.1016/j.ic.2025.105378","url":null,"abstract":"<div><div>The problem studied in this paper is to find a collection of vertex-disjoint paths in a given graph <span><math><mi>G</mi><mo>=</mo><mo>(</mo><mi>V</mi><mo>,</mo><mi>E</mi><mo>)</mo></math></span> such that each path has length at least <em>k</em>, called a long path, and the total number of edges on these paths is maximized. The problem is NP-hard for any fixed <em>k</em> or when <em>k</em> is part of the input, by a reduction from the Hamiltonian path problem. Berman and Karpinski presented a 7/6-approximation algorithm for <span><math><mi>k</mi><mo>=</mo><mn>1</mn></math></span>, but for a general <span><math><mi>k</mi><mo>≥</mo><mn>2</mn></math></span>, there is no approximation algorithm directly for the problem. We present the first local search <span><math><mo>(</mo><mn>0.4394</mn><mi>k</mi><mo>+</mo><mi>O</mi><mo>(</mo><mn>1</mn><mo>)</mo><mo>)</mo></math></span>-approximation algorithm for any fixed <span><math><mi>k</mi><mo>≥</mo><mn>1</mn></math></span>, and a 1.4254-approximation algorithm for <span><math><mi>k</mi><mo>=</mo><mn>2</mn></math></span> built on top of a maximum triangle-free path-cycle cover.</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"307 ","pages":"Article 105378"},"PeriodicalIF":1.0,"publicationDate":"2025-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145528772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ergodic theorem and algorithmic randomness (following V. V'yugin) 遍历定理与算法随机性(继V. V'yugin之后)
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-11-01 DOI: 10.1016/j.ic.2025.105375
Alexander Shen
In this expository note we present the proof of the constructive version of Birkhoff's ergodic theorem following Vladimir V'yugin, trying to separate and state explicitly the combinatorial statement on which this proof is based. The exposition is based on his papers and explanations given during his visit to LIF (CNRS, Marseille).
在这篇说明性的注释中,我们提出了Birkhoff遍历定理的构造性版本的证明,并试图分离和明确地陈述这个证明所基于的组合陈述。这次展览是基于他在访问LIF (CNRS, Marseille)期间所做的论文和解释。
{"title":"Ergodic theorem and algorithmic randomness (following V. V'yugin)","authors":"Alexander Shen","doi":"10.1016/j.ic.2025.105375","DOIUrl":"10.1016/j.ic.2025.105375","url":null,"abstract":"<div><div>In this expository note we present the proof of the constructive version of Birkhoff's ergodic theorem following Vladimir V'yugin, trying to separate and state explicitly the combinatorial statement on which this proof is based. The exposition is based on his papers and explanations given during his visit to LIF (CNRS, Marseille).</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"307 ","pages":"Article 105375"},"PeriodicalIF":1.0,"publicationDate":"2025-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145416280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Syntactic characterization of learnability of structures with mind changes 思维变化对结构易学性的句法表征
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-11-01 DOI: 10.1016/j.ic.2025.105381
Ekaterina B. Fokina , Steffen Lempp
We study the learnability of classes of computable structures under models that allow finitely many mind changes. Extending classical notions of explanatory learning from informant and from text, we introduce new paradigms where the information source and the convergence requirements are modified. In particular, we define Δ20-learning, where each atomic fact may be presented with finitely many errors before stabilizing, and c.e.- and d.c.e.-learning, where information is restricted to positive atomic facts that may either never be retracted (c.e.) or be retracted at most once (d.c.e.). We provide syntactic characterizations for these notions: Δ20-learning coincides with definability by finite existential sentences, and c.e.-learning coincides with TxtEx-learning. For d.c.e.-learning we give partial characterization in restricted languages. Furthermore, for n-learning from informant, where learners are allowed at most n mind changes, we establish a complete syntactic characterization in terms of specific infinitary formulas of bounded depth.
我们研究了在允许有限多思维变化的模型下可计算结构类的可学习性。我们扩展了从信息源和文本中进行解释性学习的经典概念,引入了修改信息源和收敛要求的新范式。特别地,我们定义了Δ20-learning,其中每个原子事实在稳定之前可能会出现有限多的错误,以及c.e.和d.c.e.学习,其中信息被限制为积极的原子事实,可能永远不会撤回(c.e.)或最多撤回一次(d.c.e.)。我们为这些概念提供了句法表征:Δ20-learning与有限存在句的可定义性一致,而语言学习与文本学习一致。对于dc学习,我们给出了受限语言的部分表征。此外,对于n次学习,其中学习者最多允许n次思维变化,我们根据特定的有界深度的无限公式建立了完整的句法表征。
{"title":"Syntactic characterization of learnability of structures with mind changes","authors":"Ekaterina B. Fokina ,&nbsp;Steffen Lempp","doi":"10.1016/j.ic.2025.105381","DOIUrl":"10.1016/j.ic.2025.105381","url":null,"abstract":"<div><div>We study the learnability of classes of computable structures under models that allow finitely many mind changes. Extending classical notions of explanatory learning from informant and from text, we introduce new paradigms where the information source and the convergence requirements are modified. In particular, we define <span><math><msubsup><mrow><mi>Δ</mi></mrow><mrow><mn>2</mn></mrow><mrow><mn>0</mn></mrow></msubsup></math></span>-learning, where each atomic fact may be presented with finitely many errors before stabilizing, and <em>c.e.- and d.c.e.-learning</em>, where information is restricted to positive atomic facts that may either never be retracted (c.e.) or be retracted at most once (d.c.e.). We provide syntactic characterizations for these notions: <span><math><msubsup><mrow><mi>Δ</mi></mrow><mrow><mn>2</mn></mrow><mrow><mn>0</mn></mrow></msubsup></math></span>-learning coincides with definability by finite existential sentences, and c.e.-learning coincides with TxtEx-learning. For d.c.e.-learning we give partial characterization in restricted languages. Furthermore, for <em>n</em>-learning from informant, where learners are allowed at most <em>n</em> mind changes, we establish a complete syntactic characterization in terms of specific infinitary formulas of bounded depth.</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"307 ","pages":"Article 105381"},"PeriodicalIF":1.0,"publicationDate":"2025-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145579161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An iterative scheme of hybrid controller synthesis for nonlinear systems subject to safety constraints 具有安全约束的非线性系统混合控制器综合的迭代方法
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-11-01 DOI: 10.1016/j.ic.2025.105377
Niuniu Qi , Xia Zeng , Banglong Liu , Zhengfeng Yang , Xiaochao Tang , Li Zhang , Chao Peng , Zhenbing Zeng
For many safety-critical systems, there is a pressing need for learning the controllers to endow systems with properties of safety. Reinforcement learning (RL) has emerged as a promising approach to synthesizing controllers that satisfy safety requirements by leveraging user-defined reward functions to encode desired system behavior. However, it remains a significant challenge in synthesizing provably correct controllers with safety requirements. To address this issue, we try to design a special hybrid polynomial-NN controller that is easy to verify without losing its expressiveness and flexibility. This paper proposes an iterative framework to synthesize a hybrid controller based on RL, low-degree polynomial fitting and knowledge distillation. By formulating and solving a constrained optimization problem in which the verification conditions produce the barrier certificates, a computational method is given to ensure that every trajectory starting from the initial set of the system with the resulting controller satisfies the given safety requirement. In addition, we have implemented a tool named SynHC and evaluated its performance over a set of benchmark examples. The experimental results demonstrate that our approach efficiently synthesizes safe DNN controllers.
对于许多安全关键型系统,迫切需要学习控制器以赋予系统安全特性。强化学习(RL)已经成为一种很有前途的方法,通过利用用户定义的奖励函数来编码期望的系统行为,来合成满足安全要求的控制器。然而,如何合成具有安全要求的可证明正确的控制器仍然是一个重大挑战。为了解决这个问题,我们尝试设计一种特殊的混合多项式-神经网络控制器,该控制器易于验证,同时又不失其表达性和灵活性。提出了一种基于强化学习、低次多项式拟合和知识精馏的混合控制器迭代合成框架。通过构造和求解一个验证条件产生屏障证书的约束优化问题,给出了一种计算方法,以保证从系统初始集出发的每条轨迹都满足给定的安全要求。此外,我们还实现了一个名为SynHC的工具,并通过一组基准示例评估了它的性能。实验结果表明,该方法有效地合成了安全的深度神经网络控制器。
{"title":"An iterative scheme of hybrid controller synthesis for nonlinear systems subject to safety constraints","authors":"Niuniu Qi ,&nbsp;Xia Zeng ,&nbsp;Banglong Liu ,&nbsp;Zhengfeng Yang ,&nbsp;Xiaochao Tang ,&nbsp;Li Zhang ,&nbsp;Chao Peng ,&nbsp;Zhenbing Zeng","doi":"10.1016/j.ic.2025.105377","DOIUrl":"10.1016/j.ic.2025.105377","url":null,"abstract":"<div><div>For many safety-critical systems, there is a pressing need for learning the controllers to endow systems with properties of safety. Reinforcement learning (RL) has emerged as a promising approach to synthesizing controllers that satisfy safety requirements by leveraging user-defined reward functions to encode desired system behavior. However, it remains a significant challenge in synthesizing provably correct controllers with safety requirements. To address this issue, we try to design a special hybrid polynomial-NN controller that is easy to verify without losing its expressiveness and flexibility. This paper proposes an iterative framework to synthesize a hybrid controller based on RL, low-degree polynomial fitting and knowledge distillation. By formulating and solving a constrained optimization problem in which the verification conditions produce the barrier certificates, a computational method is given to ensure that every trajectory starting from the initial set of the system with the resulting controller satisfies the given safety requirement. In addition, we have implemented a tool named SynHC and evaluated its performance over a set of benchmark examples. The experimental results demonstrate that our approach efficiently synthesizes safe DNN controllers.</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"307 ","pages":"Article 105377"},"PeriodicalIF":1.0,"publicationDate":"2025-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145528775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Finite-time safety and reach-avoid verification of stochastic discrete-time systems 随机离散系统的有限时间安全及到达避免验证
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-11-01 DOI: 10.1016/j.ic.2025.105368
Bai Xue
This paper studies finite-time safety and reach-avoid verification for stochastic discrete-time dynamical systems. The aim is to ascertain lower and upper bounds of the probability that, within a predefined finite-time horizon, a system starting from an initial state in a safe set will either exit the safe set (safety verification) or reach a target set while remaining within the safe set until the first encounter with the target (reach-avoid verification). We introduce novel barrier-like sufficient conditions for characterizing these bounds, which either complement existing ones or fill gaps. Finally, we demonstrate the efficacy of these conditions on two simple examples.
本文研究了随机离散动力系统的有限时间安全性和到达避免验证。目的是确定概率的下界和上界,在预定义的有限时间范围内,系统从安全集中的初始状态开始,要么退出安全集(安全验证),要么到达目标集,同时保持在安全集中,直到第一次遇到目标(到达-避免验证)。我们引入了新的类障碍充分条件来表征这些边界,这些条件要么补充现有的边界,要么填补空白。最后,我们通过两个简单的例子证明了这些条件的有效性。
{"title":"Finite-time safety and reach-avoid verification of stochastic discrete-time systems","authors":"Bai Xue","doi":"10.1016/j.ic.2025.105368","DOIUrl":"10.1016/j.ic.2025.105368","url":null,"abstract":"<div><div>This paper studies finite-time safety and reach-avoid verification for stochastic discrete-time dynamical systems. The aim is to ascertain lower and upper bounds of the probability that, within a predefined finite-time horizon, a system starting from an initial state in a safe set will either exit the safe set (safety verification) or reach a target set while remaining within the safe set until the first encounter with the target (reach-avoid verification). We introduce novel barrier-like sufficient conditions for characterizing these bounds, which either complement existing ones or fill gaps. Finally, we demonstrate the efficacy of these conditions on two simple examples.</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"307 ","pages":"Article 105368"},"PeriodicalIF":1.0,"publicationDate":"2025-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145416142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Composite event recognition with arbitrary specifications 具有任意规格的复合事件识别
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-11-01 DOI: 10.1016/j.ic.2025.105373
Periklis Mantenoglou , Alexander Artikis
Composite event recognition (CER) frameworks reason over streams of low-level, symbolic events in order to detect instances of spatio-temporal patterns defining high-level, composite activities. The Event Calculus is a temporal, logical formalism that has been used to define composite activities in CER, while RTEC is a formal CER framework that detects composite activities based on their Event Calculus definitions. RTEC, however, cannot handle arbitrary Event Calculus definitions for composite activities, limiting the range of CER applications supported by RTEC. We propose RTECfl, an extension of RTEC that supports arbitrary composite activity specifications in the Event Calculus. We present the syntax, semantics, reasoning algorithms and time complexity of RTECfl. Moreover, we propose a compiler for RTECfl, generating the optimal representation of an input set of Event Calculus definitions. We demonstrate the correctness of our compiler and outline its time complexity. We conducted an empirical evaluation of RTECfl on synthetic and real data streams from human activity recognition and maritime situational awareness, including a comparison with two state-of-the-art Event Calculus-based systems, which demonstrates the benefits of RTECfl.
复合事件识别(CER)框架对低级符号事件流进行推理,以检测定义高级复合活动的时空模式实例。事件演算是一个临时的、逻辑的形式化方法,被用来定义CER中的复合活动,而RTEC是一个正式的CER框架,它根据事件演算定义来检测复合活动。然而,RTEC°不能处理任意的事件演算定义,限制了RTEC°支持的CER应用程序的范围。我们提出RTECfl,它是RTEC°的扩展,在事件演算中支持任意复合活动规范。给出了RTECfl的语法、语义、推理算法和时间复杂度。此外,我们为RTECfl提出了一个编译器,生成事件演算定义输入集的最佳表示。我们将演示编译器的正确性,并概述其时间复杂度。我们对来自人类活动识别和海上态势感知的合成和真实数据流进行了RTECfl的实证评估,包括与两种最先进的基于事件演算的系统进行比较,这证明了RTECfl的优势。
{"title":"Composite event recognition with arbitrary specifications","authors":"Periklis Mantenoglou ,&nbsp;Alexander Artikis","doi":"10.1016/j.ic.2025.105373","DOIUrl":"10.1016/j.ic.2025.105373","url":null,"abstract":"<div><div>Composite event recognition (CER) frameworks reason over streams of low-level, symbolic events in order to detect instances of spatio-temporal patterns defining high-level, composite activities. The Event Calculus is a temporal, logical formalism that has been used to define composite activities in CER, while RTEC<sub>∘</sub> is a formal CER framework that detects composite activities based on their Event Calculus definitions. RTEC<sub>∘</sub>, however, cannot handle arbitrary Event Calculus definitions for composite activities, limiting the range of CER applications supported by RTEC<sub>∘</sub>. We propose RTEC<span><math><msub><mrow></mrow><mrow><mi>f</mi><mi>l</mi></mrow></msub></math></span>, an extension of RTEC<sub>∘</sub> that supports arbitrary composite activity specifications in the Event Calculus. We present the syntax, semantics, reasoning algorithms and time complexity of RTEC<span><math><msub><mrow></mrow><mrow><mi>f</mi><mi>l</mi></mrow></msub></math></span>. Moreover, we propose a compiler for RTEC<span><math><msub><mrow></mrow><mrow><mi>f</mi><mi>l</mi></mrow></msub></math></span>, generating the optimal representation of an input set of Event Calculus definitions. We demonstrate the correctness of our compiler and outline its time complexity. We conducted an empirical evaluation of RTEC<span><math><msub><mrow></mrow><mrow><mi>f</mi><mi>l</mi></mrow></msub></math></span> on synthetic and real data streams from human activity recognition and maritime situational awareness, including a comparison with two state-of-the-art Event Calculus-based systems, which demonstrates the benefits of RTEC<span><math><msub><mrow></mrow><mrow><mi>f</mi><mi>l</mi></mrow></msub></math></span>.</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"307 ","pages":"Article 105373"},"PeriodicalIF":1.0,"publicationDate":"2025-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145416141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the containment problem for deterministic multicounter machine models 确定性多计数器模型的包容问题
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-11-01 DOI: 10.1016/j.ic.2025.105383
Oscar H. Ibarra , Ian McQuillan
A new model of multicounter machines is introduced where testing the counter status of a counter is optional, rather than existing models where they are always either required (traditional multicounter machines) or no status can be checked (partially-blind multicounter machines). If, in every accepting computation, each counter has a bounded number of occurrences where its status is tested and verified to be zero, then the machine is called finite-testable. One-way nondeterministic finite-testable multicounter machines are shown to be equivalent to partially-blind multicounter machines. However, one-way deterministic finite-testable multicounter machines are strictly more powerful than deterministic partially-blind machines. Interestingly, one-way deterministic finite-testable multicounter machines are shown to have a decidable containment problem. This makes it the most general known model where this problem is decidable, making the class important in the areas of model checking and formal verification. We also study properties of their reachability sets.
引入了一种新的多计数器机器模型,其中测试计数器的计数器状态是可选的,而不是现有的模型,它们总是要么需要(传统的多计数器机器),要么不能检查状态(部分盲的多计数器机器)。如果在每个可接受的计算中,每个计数器的状态被测试并验证为零的出现次数是有限的,则该机器称为有限可测试的。证明了单向不确定有限可测试多计数器机等价于部分盲多计数器机。然而,单向确定性有限可测试多计数器机器严格地比确定性部分盲机器更强大。有趣的是,单向确定性有限可测试多计数器机被证明具有可确定的包含问题。这使得它成为最普遍的已知模型,其中这个问题是可确定的,使得类在模型检查和形式化验证领域很重要。我们还研究了它们的可达集的性质。
{"title":"On the containment problem for deterministic multicounter machine models","authors":"Oscar H. Ibarra ,&nbsp;Ian McQuillan","doi":"10.1016/j.ic.2025.105383","DOIUrl":"10.1016/j.ic.2025.105383","url":null,"abstract":"<div><div>A new model of multicounter machines is introduced where testing the counter status of a counter is optional, rather than existing models where they are always either required (traditional multicounter machines) or no status can be checked (partially-blind multicounter machines). If, in every accepting computation, each counter has a bounded number of occurrences where its status is tested and verified to be zero, then the machine is called <em>finite-testable</em>. One-way nondeterministic finite-testable multicounter machines are shown to be equivalent to partially-blind multicounter machines. However, one-way deterministic finite-testable multicounter machines are strictly more powerful than deterministic partially-blind machines. Interestingly, one-way deterministic finite-testable multicounter machines are shown to have a decidable containment problem. This makes it the most general known model where this problem is decidable, making the class important in the areas of model checking and formal verification. We also study properties of their reachability sets.</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"307 ","pages":"Article 105383"},"PeriodicalIF":1.0,"publicationDate":"2025-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145624128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Double-ended palindromic trees in linear time 线性时间的双端回文树
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-11-01 DOI: 10.1016/j.ic.2025.105379
Qisheng Wang , Ming Yang , Xinrui Zhu
The palindromic tree (a.k.a. eertree) is a data structure that provides access to all palindromic substrings of a string. In this paper, we propose a dynamic version of eertree, called double-ended eertree, which supports online operations on the stored string, including double-ended queue operations, counting distinct palindromic substrings, and finding the longest palindromic prefix/suffix. At the heart of our construction, we identify a new class of substring occurrences, called surfaces, that are palindromic substring occurrences that are neither prefixes nor suffixes of any other palindromic substring occurrences, which is of independent interest. Surfaces characterize the link structure of all palindromic substrings in the eertree, thereby allowing a linear-time implementation of double-ended eertrees through a linear-time maintenance of surfaces.
回文树(又名eertree)是一种数据结构,它提供对字符串的所有回文子字符串的访问。在本文中,我们提出了一种动态版本的eertree,称为双端eertree,它支持对存储字符串的在线操作,包括双端队列操作,计数不同的回文子字符串,以及查找最长的回文前缀/后缀。在构造的核心,我们确定了一类新的子串出现,称为曲面,它们是回文子串出现,既不是任何其他回文子串出现的前缀,也不是后缀,这是独立的兴趣。曲面表征了eertree中所有回文子串的链接结构,从而允许通过曲面的线性时间维护来实现双端eertree的线性时间实现。
{"title":"Double-ended palindromic trees in linear time","authors":"Qisheng Wang ,&nbsp;Ming Yang ,&nbsp;Xinrui Zhu","doi":"10.1016/j.ic.2025.105379","DOIUrl":"10.1016/j.ic.2025.105379","url":null,"abstract":"<div><div>The palindromic tree (a.k.a. eertree) is a data structure that provides access to all palindromic substrings of a string. In this paper, we propose a dynamic version of eertree, called double-ended eertree, which supports online operations on the stored string, including double-ended queue operations, counting distinct palindromic substrings, and finding the longest palindromic prefix/suffix. At the heart of our construction, we identify a new class of substring occurrences, called surfaces, that are palindromic substring occurrences that are neither prefixes nor suffixes of any other palindromic substring occurrences, which is of independent interest. Surfaces characterize the link structure of all palindromic substrings in the eertree, thereby allowing a linear-time implementation of double-ended eertrees through a linear-time maintenance of surfaces.</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"307 ","pages":"Article 105379"},"PeriodicalIF":1.0,"publicationDate":"2025-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145624129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Operational complexity: NFA-to-DFA trade-off 操作复杂性:nfa到dfa的权衡
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-11-01 DOI: 10.1016/j.ic.2025.105369
Michal Hospodár , Jozef Jirásek , Galina Jirásková , Juraj Šebej
<div><div>We examine the complexity of regular operations assuming that the arguments are represented by nondeterministic finite automata, while the resulting language is required to be represented by a deterministic finite automaton. We obtain tight upper bounds on the NFA-to-DFA trade-off for complementation (<span><math><msup><mrow><mn>2</mn></mrow><mrow><mi>n</mi></mrow></msup></math></span>), union and symmetric difference (<span><math><msup><mrow><mn>2</mn></mrow><mrow><mi>m</mi><mo>+</mo><mi>n</mi></mrow></msup></math></span>), intersection (<span><math><msup><mrow><mn>2</mn></mrow><mrow><mi>m</mi><mo>+</mo><mi>n</mi></mrow></msup><mo>−</mo><msup><mrow><mn>2</mn></mrow><mrow><mi>m</mi></mrow></msup><mo>−</mo><msup><mrow><mn>2</mn></mrow><mrow><mi>n</mi></mrow></msup><mo>+</mo><mn>2</mn></math></span>), difference (<span><math><msup><mrow><mn>2</mn></mrow><mrow><mi>m</mi><mo>+</mo><mi>n</mi></mrow></msup><mo>−</mo><msup><mrow><mn>2</mn></mrow><mrow><mi>n</mi></mrow></msup><mo>+</mo><mn>1</mn></math></span>), left and right quotient (<span><math><msup><mrow><mn>2</mn></mrow><mrow><mi>m</mi></mrow></msup></math></span>), reversal and star (<span><math><msup><mrow><mn>2</mn></mrow><mrow><mi>n</mi></mrow></msup></math></span>), concatenation (<span><math><mfrac><mrow><mn>3</mn></mrow><mrow><mn>4</mn></mrow></mfrac><msup><mrow><mn>2</mn></mrow><mrow><mi>m</mi><mo>+</mo><mi>n</mi></mrow></msup></math></span>), square (<span><math><mfrac><mrow><mn>3</mn></mrow><mrow><mn>4</mn></mrow></mfrac><msup><mrow><mn>2</mn></mrow><mrow><mn>2</mn><mi>n</mi></mrow></msup></math></span>), cut (<span><math><msup><mrow><mn>2</mn></mrow><mrow><mi>m</mi><mo>−</mo><mn>1</mn></mrow></msup><mo>(</mo><msup><mrow><mn>2</mn></mrow><mrow><mi>n</mi></mrow></msup><mo>+</mo><mn>1</mn><mo>)</mo></math></span>), and shuffle (<span><math><msup><mrow><mn>2</mn></mrow><mrow><mi>m</mi><mi>n</mi></mrow></msup></math></span>), and an upper bound <span><math><msup><mrow><mn>2</mn></mrow><mrow><msup><mrow><mi>n</mi></mrow><mrow><mn>2</mn></mrow></msup></mrow></msup></math></span> and a lower bound <span><math><msubsup><mrow><mo>∑</mo></mrow><mrow><mi>k</mi><mo>=</mo><mn>0</mn></mrow><mrow><mi>n</mi></mrow></msubsup><mrow><mo>(</mo><mtable><mtr><mtd><mi>n</mi></mtd></mtr><mtr><mtd><mi>k</mi></mtd></mtr></mtable><mo>)</mo></mrow><msup><mrow><mo>(</mo><mn>1</mn><mo>+</mo><mo>(</mo><msup><mrow><mn>2</mn></mrow><mrow><mi>k</mi></mrow></msup><mo>−</mo><mn>1</mn><mo>)</mo><msup><mrow><mn>2</mn></mrow><mrow><mi>n</mi><mo>−</mo><mi>k</mi></mrow></msup><mo>)</mo></mrow><mrow><mi>n</mi><mo>−</mo><mn>1</mn></mrow></msup></math></span> for square root. Except for square root, all our witnesses are described over a small fixed alphabet of size at most four. We show that the alphabet used to describe witnesses for seven of the considered operations is optimal in the sense that the corresponding upper bounds cannot be met by any languages over a smaller alphabet. We also provide some partial results
假设参数由非确定性有限自动机表示,而结果语言则需要由确定性有限自动机表示,我们研究了常规操作的复杂性。我们得到了补(2n)、并和对称差(2m+n)、交(2m+n - 2m - 2n+2)、差(2m+n - 2n+1)、左商和右商(2m)、反转和星形(2n)、连接(342m+n)、平方(3422n)、切(2m - 1(2n+1)和shuffle (2mn)的nfa - dfa权衡的严密上界和下界∑k=0n(nk)(1+(2k−1)2n−k)n−1的平方根。除了平方根之外,我们所有的证人都是用一个固定的小字母来描述的,这个字母最多有四个。我们证明了用于描述七个考虑的操作的证人的字母表是最优的,因为在较小的字母表上,任何语言都不能满足相应的上界。我们还提供了二进制和一元情况下的部分结果。
{"title":"Operational complexity: NFA-to-DFA trade-off","authors":"Michal Hospodár ,&nbsp;Jozef Jirásek ,&nbsp;Galina Jirásková ,&nbsp;Juraj Šebej","doi":"10.1016/j.ic.2025.105369","DOIUrl":"10.1016/j.ic.2025.105369","url":null,"abstract":"&lt;div&gt;&lt;div&gt;We examine the complexity of regular operations assuming that the arguments are represented by nondeterministic finite automata, while the resulting language is required to be represented by a deterministic finite automaton. We obtain tight upper bounds on the NFA-to-DFA trade-off for complementation (&lt;span&gt;&lt;math&gt;&lt;msup&gt;&lt;mrow&gt;&lt;mn&gt;2&lt;/mn&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mi&gt;n&lt;/mi&gt;&lt;/mrow&gt;&lt;/msup&gt;&lt;/math&gt;&lt;/span&gt;), union and symmetric difference (&lt;span&gt;&lt;math&gt;&lt;msup&gt;&lt;mrow&gt;&lt;mn&gt;2&lt;/mn&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mi&gt;m&lt;/mi&gt;&lt;mo&gt;+&lt;/mo&gt;&lt;mi&gt;n&lt;/mi&gt;&lt;/mrow&gt;&lt;/msup&gt;&lt;/math&gt;&lt;/span&gt;), intersection (&lt;span&gt;&lt;math&gt;&lt;msup&gt;&lt;mrow&gt;&lt;mn&gt;2&lt;/mn&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mi&gt;m&lt;/mi&gt;&lt;mo&gt;+&lt;/mo&gt;&lt;mi&gt;n&lt;/mi&gt;&lt;/mrow&gt;&lt;/msup&gt;&lt;mo&gt;−&lt;/mo&gt;&lt;msup&gt;&lt;mrow&gt;&lt;mn&gt;2&lt;/mn&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mi&gt;m&lt;/mi&gt;&lt;/mrow&gt;&lt;/msup&gt;&lt;mo&gt;−&lt;/mo&gt;&lt;msup&gt;&lt;mrow&gt;&lt;mn&gt;2&lt;/mn&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mi&gt;n&lt;/mi&gt;&lt;/mrow&gt;&lt;/msup&gt;&lt;mo&gt;+&lt;/mo&gt;&lt;mn&gt;2&lt;/mn&gt;&lt;/math&gt;&lt;/span&gt;), difference (&lt;span&gt;&lt;math&gt;&lt;msup&gt;&lt;mrow&gt;&lt;mn&gt;2&lt;/mn&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mi&gt;m&lt;/mi&gt;&lt;mo&gt;+&lt;/mo&gt;&lt;mi&gt;n&lt;/mi&gt;&lt;/mrow&gt;&lt;/msup&gt;&lt;mo&gt;−&lt;/mo&gt;&lt;msup&gt;&lt;mrow&gt;&lt;mn&gt;2&lt;/mn&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mi&gt;n&lt;/mi&gt;&lt;/mrow&gt;&lt;/msup&gt;&lt;mo&gt;+&lt;/mo&gt;&lt;mn&gt;1&lt;/mn&gt;&lt;/math&gt;&lt;/span&gt;), left and right quotient (&lt;span&gt;&lt;math&gt;&lt;msup&gt;&lt;mrow&gt;&lt;mn&gt;2&lt;/mn&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mi&gt;m&lt;/mi&gt;&lt;/mrow&gt;&lt;/msup&gt;&lt;/math&gt;&lt;/span&gt;), reversal and star (&lt;span&gt;&lt;math&gt;&lt;msup&gt;&lt;mrow&gt;&lt;mn&gt;2&lt;/mn&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mi&gt;n&lt;/mi&gt;&lt;/mrow&gt;&lt;/msup&gt;&lt;/math&gt;&lt;/span&gt;), concatenation (&lt;span&gt;&lt;math&gt;&lt;mfrac&gt;&lt;mrow&gt;&lt;mn&gt;3&lt;/mn&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mn&gt;4&lt;/mn&gt;&lt;/mrow&gt;&lt;/mfrac&gt;&lt;msup&gt;&lt;mrow&gt;&lt;mn&gt;2&lt;/mn&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mi&gt;m&lt;/mi&gt;&lt;mo&gt;+&lt;/mo&gt;&lt;mi&gt;n&lt;/mi&gt;&lt;/mrow&gt;&lt;/msup&gt;&lt;/math&gt;&lt;/span&gt;), square (&lt;span&gt;&lt;math&gt;&lt;mfrac&gt;&lt;mrow&gt;&lt;mn&gt;3&lt;/mn&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mn&gt;4&lt;/mn&gt;&lt;/mrow&gt;&lt;/mfrac&gt;&lt;msup&gt;&lt;mrow&gt;&lt;mn&gt;2&lt;/mn&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mn&gt;2&lt;/mn&gt;&lt;mi&gt;n&lt;/mi&gt;&lt;/mrow&gt;&lt;/msup&gt;&lt;/math&gt;&lt;/span&gt;), cut (&lt;span&gt;&lt;math&gt;&lt;msup&gt;&lt;mrow&gt;&lt;mn&gt;2&lt;/mn&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mi&gt;m&lt;/mi&gt;&lt;mo&gt;−&lt;/mo&gt;&lt;mn&gt;1&lt;/mn&gt;&lt;/mrow&gt;&lt;/msup&gt;&lt;mo&gt;(&lt;/mo&gt;&lt;msup&gt;&lt;mrow&gt;&lt;mn&gt;2&lt;/mn&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mi&gt;n&lt;/mi&gt;&lt;/mrow&gt;&lt;/msup&gt;&lt;mo&gt;+&lt;/mo&gt;&lt;mn&gt;1&lt;/mn&gt;&lt;mo&gt;)&lt;/mo&gt;&lt;/math&gt;&lt;/span&gt;), and shuffle (&lt;span&gt;&lt;math&gt;&lt;msup&gt;&lt;mrow&gt;&lt;mn&gt;2&lt;/mn&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mi&gt;m&lt;/mi&gt;&lt;mi&gt;n&lt;/mi&gt;&lt;/mrow&gt;&lt;/msup&gt;&lt;/math&gt;&lt;/span&gt;), and an upper bound &lt;span&gt;&lt;math&gt;&lt;msup&gt;&lt;mrow&gt;&lt;mn&gt;2&lt;/mn&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;msup&gt;&lt;mrow&gt;&lt;mi&gt;n&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mn&gt;2&lt;/mn&gt;&lt;/mrow&gt;&lt;/msup&gt;&lt;/mrow&gt;&lt;/msup&gt;&lt;/math&gt;&lt;/span&gt; and a lower bound &lt;span&gt;&lt;math&gt;&lt;msubsup&gt;&lt;mrow&gt;&lt;mo&gt;∑&lt;/mo&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mi&gt;k&lt;/mi&gt;&lt;mo&gt;=&lt;/mo&gt;&lt;mn&gt;0&lt;/mn&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mi&gt;n&lt;/mi&gt;&lt;/mrow&gt;&lt;/msubsup&gt;&lt;mrow&gt;&lt;mo&gt;(&lt;/mo&gt;&lt;mtable&gt;&lt;mtr&gt;&lt;mtd&gt;&lt;mi&gt;n&lt;/mi&gt;&lt;/mtd&gt;&lt;/mtr&gt;&lt;mtr&gt;&lt;mtd&gt;&lt;mi&gt;k&lt;/mi&gt;&lt;/mtd&gt;&lt;/mtr&gt;&lt;/mtable&gt;&lt;mo&gt;)&lt;/mo&gt;&lt;/mrow&gt;&lt;msup&gt;&lt;mrow&gt;&lt;mo&gt;(&lt;/mo&gt;&lt;mn&gt;1&lt;/mn&gt;&lt;mo&gt;+&lt;/mo&gt;&lt;mo&gt;(&lt;/mo&gt;&lt;msup&gt;&lt;mrow&gt;&lt;mn&gt;2&lt;/mn&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mi&gt;k&lt;/mi&gt;&lt;/mrow&gt;&lt;/msup&gt;&lt;mo&gt;−&lt;/mo&gt;&lt;mn&gt;1&lt;/mn&gt;&lt;mo&gt;)&lt;/mo&gt;&lt;msup&gt;&lt;mrow&gt;&lt;mn&gt;2&lt;/mn&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mi&gt;n&lt;/mi&gt;&lt;mo&gt;−&lt;/mo&gt;&lt;mi&gt;k&lt;/mi&gt;&lt;/mrow&gt;&lt;/msup&gt;&lt;mo&gt;)&lt;/mo&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mi&gt;n&lt;/mi&gt;&lt;mo&gt;−&lt;/mo&gt;&lt;mn&gt;1&lt;/mn&gt;&lt;/mrow&gt;&lt;/msup&gt;&lt;/math&gt;&lt;/span&gt; for square root. Except for square root, all our witnesses are described over a small fixed alphabet of size at most four. We show that the alphabet used to describe witnesses for seven of the considered operations is optimal in the sense that the corresponding upper bounds cannot be met by any languages over a smaller alphabet. We also provide some partial results ","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"307 ","pages":"Article 105369"},"PeriodicalIF":1.0,"publicationDate":"2025-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145416144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Power of counting by nonuniform families of polynomial-size finite automata 多项式大小有限自动机的非一致族的计数能力
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-11-01 DOI: 10.1016/j.ic.2025.105372
Tomoyuki Yamakami
Lately, there have been intensive studies on strengths and limitations of nonuniform families of promise decision problems solvable by various types of polynomial-size finite automata families, where “polynomial-size” refers to the polynomially-bounded state complexity of a finite automata family. In this line of study, we further expand the scope of these studies to families of partial counting and gap functions, defined in terms of nonuniform families of polynomial-size nondeterministic finite automata, and their relevant families of promise decision problems. Counting functions have an ability of counting the number of accepting computation paths produced by nondeterministic finite automata. With no unproven hardness assumption, we show numerous separations and collapses of complexity classes of those partial counting and gap function families and their induced promise decision problem families. We also investigate their relationships to pushdown automata families of polynomial stack-state complexity.
近年来,人们对各种类型的多项式大小有限自动机族可解的承诺决策问题的非一致族的优势和局限性进行了深入的研究,其中“多项式大小”是指有限自动机族的多项式有界状态复杂度。在这条研究路线中,我们进一步将这些研究的范围扩展到部分计数和间隙函数族,这些函数族是根据多项式大小的不确定有限自动机的非一致族来定义的,以及它们相关的承诺决策问题族。计数函数具有对不确定性有限自动机产生的可接受计算路径的个数进行计数的能力。在没有未经证实的硬度假设的情况下,我们证明了这些部分计数和间隙函数族及其诱导的承诺决策问题族的许多复杂性类的分离和崩溃。我们还研究了它们与多项式堆栈状态复杂度的下推自动机族的关系。
{"title":"Power of counting by nonuniform families of polynomial-size finite automata","authors":"Tomoyuki Yamakami","doi":"10.1016/j.ic.2025.105372","DOIUrl":"10.1016/j.ic.2025.105372","url":null,"abstract":"<div><div>Lately, there have been intensive studies on strengths and limitations of nonuniform families of promise decision problems solvable by various types of polynomial-size finite automata families, where “polynomial-size” refers to the polynomially-bounded state complexity of a finite automata family. In this line of study, we further expand the scope of these studies to families of partial counting and gap functions, defined in terms of nonuniform families of polynomial-size nondeterministic finite automata, and their relevant families of promise decision problems. Counting functions have an ability of counting the number of accepting computation paths produced by nondeterministic finite automata. With no unproven hardness assumption, we show numerous separations and collapses of complexity classes of those partial counting and gap function families and their induced promise decision problem families. We also investigate their relationships to pushdown automata families of polynomial stack-state complexity.</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"307 ","pages":"Article 105372"},"PeriodicalIF":1.0,"publicationDate":"2025-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145465933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Information and Computation
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1