首页 > 最新文献

Acta Informatica最新文献

英文 中文
Serial and parallel algorithms for order-preserving pattern matching based on the duel-and-sweep paradigm 基于 "决斗-扫荡 "范式的保序模式匹配串行和并行算法
IF 0.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-31 DOI: 10.1007/s00236-024-00464-w
Davaajav Jargalsaikhan, Diptarama Hendrian, Yohei Ueki, Ryo Yoshinaka, Ayumi Shinohara

Given a text and a pattern over an alphabet, the classic exact matching problem searches for all occurrences of the pattern in the text. Unlike exact matching, order-preserving pattern matching (OPPM) considers the relative order of elements, rather than their exact values. In this paper, we propose efficient algorithms for the OPPM problem using the “duel-and-sweep” paradigm. For a pattern of length m and a text of length n, our serial algorithm runs in (O(n + mlog m)) time, and our parallel algorithm runs in (O(log ^2 m)) time and (O(n log ^2 m)) work with (O(log m)) time and (O(m log m)) work pattern preprocessing on the Priority Concurrent Read Concurrent Write Parallel Random-Access Machines (P-CRCW PRAM).

给定一段文本和一个字母表上的模式,经典的精确匹配问题是搜索文本中模式的所有出现次数。与精确匹配不同,保序模式匹配(OPPM)考虑的是元素的相对顺序,而不是它们的精确值。在本文中,我们提出了使用 "决斗和扫荡 "范式来解决 OPPM 问题的高效算法。对于长度为 m 的模式和长度为 n 的文本,我们的串行算法运行时间为 (O(n + mlog m))、而我们的并行算法在优先并发读取并发写入并行随机存取机(P-CRCW PRAM)上的运行时间为(O(log ^2 m)),工作模式预处理时间为(O(log m)),工作模式预处理时间为(O(n log ^2 m))。
{"title":"Serial and parallel algorithms for order-preserving pattern matching based on the duel-and-sweep paradigm","authors":"Davaajav Jargalsaikhan, Diptarama Hendrian, Yohei Ueki, Ryo Yoshinaka, Ayumi Shinohara","doi":"10.1007/s00236-024-00464-w","DOIUrl":"https://doi.org/10.1007/s00236-024-00464-w","url":null,"abstract":"<p>Given a text and a pattern over an alphabet, the classic exact matching problem searches for all occurrences of the pattern in the text. Unlike exact matching, <i>order-preserving pattern matching</i> (OPPM) considers the relative order of elements, rather than their exact values. In this paper, we propose efficient algorithms for the OPPM problem using the “duel-and-sweep” paradigm. For a pattern of length <i>m</i> and a text of length <i>n</i>, our serial algorithm runs in <span>(O(n + mlog m))</span> time, and our parallel algorithm runs in <span>(O(log ^2 m))</span> time and <span>(O(n log ^2 m))</span> work with <span>(O(log m))</span> time and <span>(O(m log m))</span> work pattern preprocessing on the Priority Concurrent Read Concurrent Write Parallel Random-Access Machines (P-CRCW PRAM).</p>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2024-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142209514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Linear-size suffix tries and linear-size CDAWGs simplified and improved 简化和改进线性大小后缀尝试和线性大小 CDAWG
IF 0.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-23 DOI: 10.1007/s00236-024-00465-9
Shunsuke Inenaga

The linear-size suffix tries (LSTries) (Crochemore et al. in Theor Comput Sci 638:171–178, 2016) are a version of suffix trees in which the edge labels are single characters, yet are able to perform pattern matching queries in optimal time. Instead of explicitly storing the input text, LSTries have some extra non-branching internal nodes called type-2 nodes. The extended techniques are then used in the linear-size compact directed acyclic word graphs (LCDAWGs) (Takagi et al., in: SPIRE 2017, pp. 304–316, 2017), which can be stored with (O(textsf{el}(T)+textsf{er}(T))) space (i.e. without the text), where (textsf{el}(T)) and (textsf{er}(T)) are the numbers of left- and right-extensions of the maximal repeats in the input text string T, respectively. In this paper, we present simpler alternatives to the aforementioned indexing structures, called the simplified LSTries (simLSTries) and the simplified LCDAWGs (simLCDAWGs), in which most of the type-2 nodes are removed. In particular, our simLCDAWGs require only (O(textsf{er}(T))) space and work in a weaker model of computation (i.e. the pointer machine model). This contrasts the (O(textsf{er}(T)))-space CDAWG representation of Belazzougui and Cunial (in: Proceedings of the 24th international symposium on string processing and information retrieval, pp. 161–175, 2017), which works on the word RAM model.

线性大小后缀树(linear-size suffix tries,LSTries)(Crochemore 等人,载于 Theor Comput Sci 638:171-178, 2016)是后缀树的一个版本,其中的边标签是单字符,但却能在最佳时间内执行模式匹配查询。LSTries 不明确存储输入文本,而是有一些额外的非分支内部节点,称为 Type-2 节点。扩展技术随后被用于线性大小的紧凑有向无环词图(LCDAWGs)(Takagi et al、in: SPIRE 2017, pp. 304-316, 2017),它可以用 (O(textsf{el}(T)+textsf{er}(T)))空间存储(即不含文本),其中 (textsf{el}(T))和 (textsf{er}(T))分别是输入文本串 T 中最大重复次数的左扩展和右扩展的数量。在本文中,我们提出了上述索引结构的简化替代方案,称为简化 LSTries(simLSTries)和简化 LCDAWGs(simLCDAWGs),其中去除了大部分类型 2 节点。特别是,我们的 simLCDAWGs 只需要 (O(textsf{er}(T))) 空间,并且可以在较弱的计算模型(即指针机模型)中工作。这与 Belazzougui 和 Cunial 的 (O(textsf{er}(T)) )空间 CDAWG 表示(in:第 24 届字符串处理与信息检索国际研讨会论文集》(Proceedings of the 24th international symposium on string processing and information retrieval, pp.
{"title":"Linear-size suffix tries and linear-size CDAWGs simplified and improved","authors":"Shunsuke Inenaga","doi":"10.1007/s00236-024-00465-9","DOIUrl":"https://doi.org/10.1007/s00236-024-00465-9","url":null,"abstract":"<p>The <i>linear-size suffix tries</i> (<i>LSTries</i>) (Crochemore et al. in Theor Comput Sci 638:171–178, 2016) are a version of suffix trees in which the edge labels are single characters, yet are able to perform pattern matching queries in optimal time. Instead of explicitly storing the input text, LSTries have some extra non-branching internal nodes called <i>type-2</i> nodes. The extended techniques are then used in the <i>linear-size compact directed acyclic word graphs</i> (<i>LCDAWGs</i>) (Takagi et al., in: SPIRE 2017, pp. 304–316, 2017), which can be stored with <span>(O(textsf{el}(T)+textsf{er}(T)))</span> space (i.e. without the text), where <span>(textsf{el}(T))</span> and <span>(textsf{er}(T))</span> are the numbers of left- and right-extensions of the maximal repeats in the input text string <i>T</i>, respectively. In this paper, we present simpler alternatives to the aforementioned indexing structures, called the <i>simplified LSTries</i> (<i>simLSTries</i>) and the <i>simplified LCDAWGs</i> (<i>simLCDAWGs</i>), in which most of the type-2 nodes are removed. In particular, our simLCDAWGs require only <span>(O(textsf{er}(T)))</span> space and work in a weaker model of computation (i.e. the pointer machine model). This contrasts the <span>(O(textsf{er}(T)))</span>-space CDAWG representation of Belazzougui and Cunial (in: Proceedings of the 24th international symposium on string processing and information retrieval, pp. 161–175, 2017), which works on the word RAM model.</p>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2024-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142209384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Parameterized aspects of distinct kemeny rank aggregation 不同凯门尼等级聚合的参数化方面
IF 0.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-15 DOI: 10.1007/s00236-024-00463-x
Koustav De, Harshil Mittal, Palash Dey, Neeldhara Misra

The Kemeny method is one of the popular tools for rank aggregation. However, computing an optimal Kemeny ranking is (textsf{NP})-hard. Consequently, the computational task of finding a Kemeny ranking has been studied under the lens of parameterized complexity with respect to many parameters. We study the parameterized complexity of the problem of computing all distinct Kemeny rankings. We consider the target Kemeny score, number of candidates, average distance of input rankings, maximum range of any candidate, and unanimity width as our parameters. For all these parameters, we already have (textsf{FPT}) algorithms. We find that any desirable number of Kemeny rankings can also be found without substantial increase in running time. We also present (textsf{FPT}) approximation algorithms for Kemeny rank aggregation with respect to these parameters.

Kemeny 方法是排名聚合的常用工具之一。然而,计算一个最优的凯美尼排名是非常困难的。因此,人们在参数化复杂性的视角下研究了寻找凯美尼排序的计算任务。我们研究计算所有不同的凯门尼排名问题的参数化复杂度。我们将目标凯门尼得分、候选者数量、输入排名的平均距离、任何候选者的最大范围和一致度宽度作为参数。对于所有这些参数,我们已经有了(textsf{FPT})算法。我们发现,在不大幅增加运行时间的情况下,也可以找到任何理想数量的凯门尼排名。我们还提出了与这些参数相关的凯门尼排序聚合的 (textsf{FPT}) 近似算法。
{"title":"Parameterized aspects of distinct kemeny rank aggregation","authors":"Koustav De, Harshil Mittal, Palash Dey, Neeldhara Misra","doi":"10.1007/s00236-024-00463-x","DOIUrl":"https://doi.org/10.1007/s00236-024-00463-x","url":null,"abstract":"<p>The Kemeny method is one of the popular tools for rank aggregation. However, computing an optimal Kemeny ranking is <span>(textsf{NP})</span>-hard. Consequently, the computational task of finding a Kemeny ranking has been studied under the lens of parameterized complexity with respect to many parameters. We study the parameterized complexity of the problem of computing all distinct Kemeny rankings. We consider the target Kemeny score, number of candidates, average distance of input rankings, maximum range of any candidate, and unanimity width as our parameters. For all these parameters, we already have <span>(textsf{FPT})</span> algorithms. We find that any desirable number of Kemeny rankings can also be found without substantial increase in running time. We also present <span>(textsf{FPT})</span> approximation algorithms for Kemeny rank aggregation with respect to these parameters.</p>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2024-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142209385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Word-representable graphs from a word’s perspective 从单词的角度看可表示单词的图表
IF 0.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-10 DOI: 10.1007/s00236-024-00462-y
Pamela Fleischmann, Lukas Haschke, Tim Löck, Dirk Nowotka

Word-representable graphs were introduced in 2008 by Kitaev and Pyatkin in the context of semigroup theory. Graphs are called word-representable if there exists a word with the graph’s nodes as letters such that the letters in the word alternate iff there is an edge between them in the graph. Until today numerous works investigated the word-representability of graphs but mostly from the graph perspective. In this work, we change the perspective to the words, i.e., we take classes of words and investigate the represented graphs. Our first subject of interest are the conjugates of words: we determine exactly which graphs are represented if we rotate the word. Afterwards, we look at k-local words introduced by Day et al. (FSTTCS LIPIcs, 2017) in order to gain more insights into this class of words. Here, we investigate especially which graphs are represented by 1-local words. Lastly, we prove that the language of all words representing a graph is regular. We were also able to characterise k-representable graphs, solving an open problem.

词可表示图是 Kitaev 和 Pyatkin 于 2008 年在半群理论的背景下提出的。如果存在一个以图的节点为字母的单词,且单词中的字母交替出现在图中,则该图被称为单词可表示图。迄今为止,研究图的单词可表示性的著作不胜枚举,但大多是从图的角度进行研究的。在这项工作中,我们将视角转向单词,即从单词的类别出发,研究其所代表的图。我们首先关注的是单词的共轭词:如果旋转单词,我们就能准确地确定哪些图被表示出来。之后,我们研究了 Day 等人(FSTTCS LIPIcs, 2017)引入的 k 本地单词,以深入了解这类单词。在这里,我们特别研究了哪些图是由 1 本地词表示的。最后,我们证明所有表示图的词的语言都是有规律的。我们还能够表征 k 可表示图,解决了一个未决问题。
{"title":"Word-representable graphs from a word’s perspective","authors":"Pamela Fleischmann, Lukas Haschke, Tim Löck, Dirk Nowotka","doi":"10.1007/s00236-024-00462-y","DOIUrl":"https://doi.org/10.1007/s00236-024-00462-y","url":null,"abstract":"<p>Word-representable graphs were introduced in 2008 by Kitaev and Pyatkin in the context of semigroup theory. Graphs are called word-representable if there exists a word with the graph’s nodes as letters such that the letters in the word alternate iff there is an edge between them in the graph. Until today numerous works investigated the word-representability of graphs but mostly from the graph perspective. In this work, we change the perspective to the words, i.e., we take classes of words and investigate the represented graphs. Our first subject of interest are the conjugates of words: we determine exactly which graphs are represented if we rotate the word. Afterwards, we look at <i>k</i>-local words introduced by Day et al. (FSTTCS LIPIcs, 2017) in order to gain more insights into this class of words. Here, we investigate especially which graphs are represented by 1-local words. Lastly, we prove that the language of all words representing a graph is regular. We were also able to characterise <i>k</i>-representable graphs, solving an open problem.\u0000</p>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2024-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141937303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A closer look at Hamiltonicity and domination through the lens of diameter and convexity 从直径和凸度的角度细看汉密尔顿性和支配性
IF 0.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-03 DOI: 10.1007/s00236-024-00461-z
R. Mahendra Kumar, N. Sadagopan

A bipartite graph G(XY) is called a star-convex bipartite graph with convexity on X if there is an associated star T(XF), such that for each vertex in Y, its neighborhood in X induces a subtree in T. A graph G is said to be a split graph if G can be partitioned into a clique (K) and an independent set (I). The objective of this study is twofold: (i) to strengthen the complexity results presented in Chen et al. (J Comb Optim 32(1):95–110, 2016) for the Hamiltonian cycle (HCYCLE), the Hamiltonian path (HPATH), and the Domination (DS) problems on star-convex bipartite graphs (ii) to reinforce the results of Müller (Discret Math 156(1–3):291–298, 1996) for HCYCLE, and HPATH on split graphs by introducing a convex ordering on one of the partitions (K or I). As part of our fine-grained analysis study with the diameter being the parameter, we first show that the diameter of star-convex bipartite graphs is at most six. Next, we observe that the reduction instances of Chen et al. (J Comb Optim 32(1):95–110, 2016) are star-convex bipartite graphs with at most diameter 4, and hence HCYCLE and HPATH are NP-complete on star-convex bipartite graphs with at most diameter 4. We strengthen this result and establish the following results on star-convex bipartite graphs: (i) HCYCLE is NP-complete for diameter 3, and polynomial-time solvable for diameters 2, 5, and 6 (a transformation in complexity: P to NPC to P) (ii) HPATH is polynomial-time solvable for diameter 2, and NP-Complete, otherwise (a dichotomy). Further, with convexity being the parameter, for split graphs with convexity on K (resp. I), we show that HCYCLE and HPATH are NP-complete on star-convex (resp. comb) split graphs with convexity on K (resp. I). Further, we show that HCYCLE is NP-complete on (k_{1,r})-free star-convex split graphs with convexity on I, (rge 6). On the positive side, we show that for (K_{1,5})-free star-convex split graphs with convexity on I, HCYCLE is polynomial-time solvable. Thus, we establish a dichotomy for HCYCLE on star-convex split graphs with convexity on I. We further show that the dominating set problem (DS) and its variants (resp. Connected, Total, Outer-Connected, and Dominating biclique) are NP-complete on star-convex bipartite graphs with diameter 3 (resp. diameter 5, and diameter 6). On the parameterized complexity front, we prove that the parameterized version of the domination problem and its variants, with the parameter being the solution size, is not fixed-parameter tractable for star-convex bipartite graphs with diameter 3 (resp. diameter 5, and diameter 6), whereas it is fixed-parameter tractable when the parameter is the number of leaves in the associated star. Further, we show that for star-convex bipartite graphs with diameters 5, and 6, the domination

如果存在一个相关星 T(X,F),使得 Y 中的每个顶点在 X 中的邻域都在 T 中诱导出一个子树,那么一个双态图 G(X, Y)被称为在 X 上具有凸性的星凸双态图。本研究的目的有两个:(i) 强化 Chen 等人的复杂性结果(《J Comb Optim》32(1)(J Comb Optim 32(1):95-110, 2016) 中提出的星凸双方形图上的汉密尔顿循环(HCYCLE)、汉密尔顿路径(HPATH)和主宰(DS)问题的复杂度结果(ii)通过在其中一个分区(K 或 I)上引入凸排序,加强 Müller (Discret Math 156(1-3):291-298, 1996) 中提出的分裂图上的汉密尔顿循环和汉密尔顿路径问题的复杂度结果。作为以直径为参数的细粒度分析研究的一部分,我们首先证明星凸双artite图的直径最多为6。接下来,我们观察到 Chen 等人(J Comb Optim 32(1):95-110, 2016)的还原实例是直径最多为 4 的星凸双叉图,因此 HCYCLE 和 HPATH 在直径最多为 4 的星凸双叉图上是 NP-完备的。我们强化了这一结果,并在星凸双叉图上建立了以下结果:(i) HCYCLE 对于直径为 3 的图是 NP-完全的,而对于直径为 2、5 和 6 的图是多项式时间可解的(复杂性的转换:P 到 NPC 到 P) (ii) HPATH 对于直径为 2 的图是多项式时间可解的,否则是 NP-完全的(二分法)。此外,以凸性为参数,对于 K(或 I)上具有凸性的分裂图,我们证明 HCYCLE 和 HPATH 在 K(或 I)上具有凸性的星凸(或梳状)分裂图上是 NP-完全的。此外,我们还证明了 HCYCLE 在 I 上具有凸性的(k_{1,r})无星凸分裂图上是 NP-完全的。从正面来看,我们证明了对于 I 上具有凸性的(K_{1,5})无星凸分裂图,HCYCLE 是多项式时间可解的。我们进一步证明,在直径为 3(直径为 5 和直径为 6)的星凸双瓣图上,支配集问题(Dominating Set problem,DS)及其变体(分别为连通问题、全连通问题、外连通问题和支配双瓣问题)是 NP-完全的。在参数化复杂性方面,我们证明了参数化版本的支配问题及其变体(参数为解大小)对于直径为 3(分别为直径为 5 和直径为 6)的星凸双瓣图来说不是固定参数可处理的,而当参数为相关星中的叶片数时则是固定参数可处理的。此外,我们还证明了对于直径为 5 和 6 的星凸双啮合图,支配问题及其变体无法在 ((1-epsilon )) ln n 内近似,除非 NP (subseteq TIME(2^{n^ {o(1)}})).
{"title":"A closer look at Hamiltonicity and domination through the lens of diameter and convexity","authors":"R. Mahendra Kumar, N. Sadagopan","doi":"10.1007/s00236-024-00461-z","DOIUrl":"https://doi.org/10.1007/s00236-024-00461-z","url":null,"abstract":"<p>A bipartite graph <i>G</i>(<i>X</i>, <i>Y</i>) is called a star-convex bipartite graph with convexity on <i>X</i> if there is an associated star <i>T</i>(<i>X</i>, <i>F</i>), such that for each vertex in <i>Y</i>, its neighborhood in <i>X</i> induces a subtree in <i>T</i>. A graph <i>G</i> is said to be a split graph if <i>G</i> can be partitioned into a clique (<i>K</i>) and an independent set (<i>I</i>). The objective of this study is twofold: (i) to strengthen the complexity results presented in Chen et al. (J Comb Optim 32(1):95–110, 2016) for the Hamiltonian cycle (HCYCLE), the Hamiltonian path (HPATH), and the Domination (DS) problems on star-convex bipartite graphs (ii) to reinforce the results of Müller (Discret Math 156(1–3):291–298, 1996) for HCYCLE, and HPATH on split graphs by introducing a convex ordering on one of the partitions (<i>K</i> or <i>I</i>). As part of our fine-grained analysis study with the diameter being the parameter, we first show that the diameter of star-convex bipartite graphs is at most six. Next, we observe that the reduction instances of Chen et al. (J Comb Optim 32(1):95–110, 2016) are star-convex bipartite graphs with at most diameter 4, and hence HCYCLE and HPATH are NP-complete on star-convex bipartite graphs with at most diameter 4. We strengthen this result and establish the following results on star-convex bipartite graphs: (i) HCYCLE is NP-complete for diameter 3, and polynomial-time solvable for diameters 2, 5, and 6 (a transformation in complexity: P to NPC to P) (ii) HPATH is polynomial-time solvable for diameter 2, and NP-Complete, otherwise (a dichotomy). Further, with convexity being the parameter, for split graphs with convexity on <i>K</i> (resp. <i>I</i>), we show that HCYCLE and HPATH are NP-complete on star-convex (resp. comb) split graphs with convexity on <i>K</i> (resp. <i>I</i>). Further, we show that HCYCLE is NP-complete on <span>(k_{1,r})</span>-free star-convex split graphs with convexity on <i>I</i>, <span>(rge 6)</span>. On the positive side, we show that for <span>(K_{1,5})</span>-free star-convex split graphs with convexity on <i>I</i>, HCYCLE is polynomial-time solvable. Thus, we establish a dichotomy for HCYCLE on star-convex split graphs with convexity on <i>I</i>. We further show that the dominating set problem (DS) and its variants (resp. Connected, Total, Outer-Connected, and Dominating biclique) are NP-complete on star-convex bipartite graphs with diameter 3 (resp. diameter 5, and diameter 6). On the parameterized complexity front, we prove that the parameterized version of the domination problem and its variants, with the parameter being the solution size, is not fixed-parameter tractable for star-convex bipartite graphs with diameter 3 (resp. diameter 5, and diameter 6), whereas it is fixed-parameter tractable when the parameter is the number of leaves in the associated star. Further, we show that for star-convex bipartite graphs with diameters 5, and 6, the domination","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2024-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141937307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cycle encoding-based parameter synthesis for timed automata safety 基于循环编码的定时自动机安全参数合成
IF 0.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-30 DOI: 10.1007/s00236-024-00460-0
Burkay Sucu, Ebru Aydin Gol

Parametric timed automata (PTA) extend timed automata (TA) with parameters instead of fixed timing constraints, providing the flexibility to accommodate uncertainties during the design phase. Once a parametric model is obtained, the next step is finding the optimal parameters such that the resulting TA satisfies the specifications. This paper introduces a new algorithm for determining parameters from safety specifications for PTA with bounded integer parameters and no nested cycles. The algorithm searches for unsafe paths through a depth-first search and generates parameter constraints. In particular, the realizability of simple and cyclic paths are encoded via mixed integer linear programming and non-linear programming problems. Then, the parameter constraints rendering the path unrealizable are derived via quantifier elimination. The accumulated constraints through the depth-first search guarantee that a parameter valuation satisfying these constraints solves the synthesis problem. The results are illustrated over benchmarks.

参数定时自动机(PTA)用参数而不是固定的定时约束来扩展定时自动机(TA),从而提供了在设计阶段适应不确定性的灵活性。获得参数模型后,下一步就是找到最佳参数,使得到的定时自动机满足规范要求。本文介绍了一种新算法,用于根据具有有界整数参数且无嵌套循环的 PTA 安全规范确定参数。该算法通过深度优先搜索寻找不安全路径,并生成参数约束。其中,简单路径和循环路径的可实现性通过混合整数线性规划和非线性规划问题进行编码。然后,通过量子消元法推导出使路径不可实现的参数约束。通过深度优先搜索积累的约束条件保证了满足这些约束条件的参数估值能解决合成问题。通过基准测试对结果进行了说明。
{"title":"Cycle encoding-based parameter synthesis for timed automata safety","authors":"Burkay Sucu, Ebru Aydin Gol","doi":"10.1007/s00236-024-00460-0","DOIUrl":"https://doi.org/10.1007/s00236-024-00460-0","url":null,"abstract":"<p>Parametric timed automata (PTA) extend timed automata (TA) with parameters instead of fixed timing constraints, providing the flexibility to accommodate uncertainties during the design phase. Once a parametric model is obtained, the next step is finding the optimal parameters such that the resulting TA satisfies the specifications. This paper introduces a new algorithm for determining parameters from safety specifications for PTA with bounded integer parameters and no nested cycles. The algorithm searches for unsafe paths through a depth-first search and generates parameter constraints. In particular, the realizability of simple and cyclic paths are encoded via mixed integer linear programming and non-linear programming problems. Then, the parameter constraints rendering the path unrealizable are derived via quantifier elimination. The accumulated constraints through the depth-first search guarantee that a parameter valuation satisfying these constraints solves the synthesis problem. The results are illustrated over benchmarks.\u0000</p>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2024-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141868296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The longest letter-duplicated subsequence and related problems 最长字母重复子序列及相关问题
IF 0.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-20 DOI: 10.1007/s00236-024-00459-7
Wenfeng Lai, Adiesha Liyanage, Binhai Zhu, Peng Zou

Motivated by computing duplication patterns in sequences, a new problem called the longest letter-duplicated subsequence (LLDS) is proposed. Given a sequence S of length n, a letter-duplicated subsequence is a subsequence of S in the form of (x_1^{d_1}x_2^{d_2}ldots x_k^{d_k}) with (x_iin Sigma ), (x_jne x_{j+1}) and (d_ige 2) for all i in [k] and j in ([k-1]). A linear time algorithm for computing a longest letter-duplicated subsequence (LLDS) of S can be easily obtained. In this paper, we focus on two variants of this problem: (1) ‘all-appearance’ version, i.e., all letters in (Sigma ) must appear in the solution, and (2) the weighted version. For the former, we obtain dichotomous results: We prove that, when each letter appears in S at least 4 times, the problem and a relaxed version on feasibility testing (FT) are both NP-hard. The reduction is from ((3^+,1,2^-))-SAT, where all 3-clauses (i.e., containing 3 lals) are monotone (i.e., containing only positive literals) and all 2-clauses contain only negative literals. We then show that when each letter appears in S at most 3 times, then the problem admits an O(n) time algorithm. Finally, we consider the weighted version, where the weight of a block (x_i^{d_i} (d_ige 2)) could be any positive function which might not grow with (d_i). We give a non-trivial (O(n^2)) time dynamic programming algorithm for this version, i.e., computing an LD-subsequence of S whose weight is maximized.

受计算序列中重复模式的启发,我们提出了一个称为最长字母重复子序列(LLDS)的新问题。给定一个长度为 n 的序列 S,对于 [k] 中的所有 i 和 ([k-1]) 中的所有 j,字母重复子序列是 S 的一个子序列,其形式为 (x_1^{d_1}x_2^{d_2}ldots x_k^{d_k}) with (x_iin Sigma ), (x_jne x_{j+1}) and (d_ige 2) 。计算 S 的最长字母重复子序列(LLDS)的线性时间算法很容易得到。在本文中,我们将重点讨论这个问题的两个变体:(1)"全部出现 "版本,即解中必须出现 (Sigma ) 中的所有字母;(2)加权版本。对于前者,我们得到了二分结果:我们证明,当每个字母在 S 中至少出现 4 次时,这个问题和可行性测试(FT)的简化版本都是 NP-困难的。该问题是由((3^+,1,2^-))-SAT 简化而来的,其中所有 3 个分句(即包含 3 个字面量)都是单调的(即只包含正字面量),而所有 2 个分句只包含负字面量。然后我们证明,当每个字母在 S 中最多出现 3 次时,该问题的算法时间为 O(n)。最后,我们考虑了加权版本,其中块 (x_i^{d_i} (d_ige 2))的权重可以是任何正函数,它可能不会随着 (d_i)的增长而增长。对于这个版本,我们给出了一种非微妙的(O(n^2))时间动态编程算法,即计算 S 的 LD 子序列,其权重最大化。
{"title":"The longest letter-duplicated subsequence and related problems","authors":"Wenfeng Lai, Adiesha Liyanage, Binhai Zhu, Peng Zou","doi":"10.1007/s00236-024-00459-7","DOIUrl":"https://doi.org/10.1007/s00236-024-00459-7","url":null,"abstract":"<p>Motivated by computing duplication patterns in sequences, a new problem called the longest letter-duplicated subsequence (LLDS) is proposed. Given a sequence <i>S</i> of length <i>n</i>, a letter-duplicated subsequence is a subsequence of <i>S</i> in the form of <span>(x_1^{d_1}x_2^{d_2}ldots x_k^{d_k})</span> with <span>(x_iin Sigma )</span>, <span>(x_jne x_{j+1})</span> and <span>(d_ige 2)</span> for all <i>i</i> in [<i>k</i>] and <i>j</i> in <span>([k-1])</span>. A linear time algorithm for computing a longest letter-duplicated subsequence (LLDS) of <i>S</i> can be easily obtained. In this paper, we focus on two variants of this problem: (1) ‘all-appearance’ version, i.e., all letters in <span>(Sigma )</span> must appear in the solution, and (2) the weighted version. For the former, we obtain dichotomous results: We prove that, when each letter appears in <i>S</i> at least 4 times, the problem and a relaxed version on feasibility testing (FT) are both NP-hard. The reduction is from <span>((3^+,1,2^-))</span>-SAT, where all 3-clauses (i.e., containing 3 lals) are monotone (i.e., containing only positive literals) and all 2-clauses contain only negative literals. We then show that when each letter appears in <i>S</i> at most 3 times, then the problem admits an <i>O</i>(<i>n</i>) time algorithm. Finally, we consider the weighted version, where the weight of a block <span>(x_i^{d_i} (d_ige 2))</span> could be any positive function which might not grow with <span>(d_i)</span>. We give a non-trivial <span>(O(n^2))</span> time dynamic programming algorithm for this version, i.e., computing an LD-subsequence of <i>S</i> whose weight is maximized.</p>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2024-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141741186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Invariant relations for affine loops 仿射环的不变关系
IF 0.6 4区 计算机科学 Q3 Computer Science Pub Date : 2024-05-13 DOI: 10.1007/s00236-024-00457-9
Wided Ghardallou, Hessamaldin Mohammadi, Richard C. Linger, Mark Pleszkoch, JiMeng Loh, Ali Mili

Invariant relations are used to analyze while loops; while their primary application is to derive the function of a loop, they can also be used to derive loop invariants, weakest preconditions, strongest postconditions, sufficient conditions of correctness, necessary conditions of correctness, and termination conditions of loops. In this paper we present two generic invariant relations that capture the semantics of loops whose loop body applies affine transformations on numeric variables.

不变量关系用于分析 while 循环;虽然它们的主要应用是推导循环的函数,但也可用于推导循环不变量、最弱前置条件、最强后置条件、正确性充分条件、正确性必要条件和循环终止条件。在本文中,我们提出了两个通用不变式关系,它们捕捉了循环体对数值变量进行仿射变换的循环语义。
{"title":"Invariant relations for affine loops","authors":"Wided Ghardallou, Hessamaldin Mohammadi, Richard C. Linger, Mark Pleszkoch, JiMeng Loh, Ali Mili","doi":"10.1007/s00236-024-00457-9","DOIUrl":"https://doi.org/10.1007/s00236-024-00457-9","url":null,"abstract":"<p>Invariant relations are used to analyze while loops; while their primary application is to derive the function of a loop, they can also be used to derive loop invariants, weakest preconditions, strongest postconditions, sufficient conditions of correctness, necessary conditions of correctness, and termination conditions of loops. In this paper we present two generic invariant relations that capture the semantics of loops whose loop body applies affine transformations on numeric variables.\u0000</p>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2024-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140930753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reachability analysis of linear systems 线性系统的可达性分析
IF 0.6 4区 计算机科学 Q3 Computer Science Pub Date : 2024-04-09 DOI: 10.1007/s00236-024-00458-8
Shiping Chen, Xinyu Ge

In this paper, we propose a decision procedure of reachability for a linear system (xi '=Axi +u), where the matrix (A's) eigenvalues can be arbitrary algebraic number and the input u is a vector of trigonometric-exponential polynomials. If the initial set contains only one point, the reachability problem under consideration is reduced to the decidability of the sign of trigonometric-exponential polynomial and then achieved by being reduced to verification of a series of univariate polynomial inequalities through Taylor expansions of the related exponential functions and trigonometric functions. If the initial set is open semi-algebraic, we will propose a decision procedure based on OpenCAD and an algorithm of real root isolation derived from the sign-deciding procedure for the trigonometric-exponential polynomials. The experimental results indicate the efficiency of our approach. Under the assumption of Schanuel’s Conjecture, the above procedures are complete for bounded time except for several cases.

本文提出了线性系统 (xi '=Axi +u/)的可达性决策程序,其中矩阵 (A's/)特征值可以是任意代数数,输入 u 是三角-指数多项式的向量。如果初始集只包含一个点,那么所考虑的可达性问题就简化为三角-指数多项式符号的可判定性,然后通过相关指数函数和三角函数的泰勒展开,简化为一系列单变量多项式不等式的验证。如果初始集合是开放的半代数,我们将提出一种基于 OpenCAD 的判定程序,以及一种从三角-指数多项式的符号判定程序中衍生出来的实根隔离算法。实验结果表明我们的方法非常有效。在Schanuel猜想的假设下,除了几种情况外,上述程序都能在有界时间内完成。
{"title":"Reachability analysis of linear systems","authors":"Shiping Chen, Xinyu Ge","doi":"10.1007/s00236-024-00458-8","DOIUrl":"https://doi.org/10.1007/s00236-024-00458-8","url":null,"abstract":"<p>In this paper, we propose a decision procedure of reachability for a linear system <span>(xi '=Axi +u)</span>, where the matrix <span>(A's)</span> eigenvalues can be arbitrary algebraic number and the input <i>u</i> is a vector of trigonometric-exponential polynomials. If the initial set contains only one point, the reachability problem under consideration is reduced to the decidability of the sign of trigonometric-exponential polynomial and then achieved by being reduced to verification of a series of univariate polynomial inequalities through Taylor expansions of the related exponential functions and trigonometric functions. If the initial set is open semi-algebraic, we will propose a decision procedure based on OpenCAD and an algorithm of real root isolation derived from the sign-deciding procedure for the trigonometric-exponential polynomials. The experimental results indicate the efficiency of our approach. Under the assumption of Schanuel’s Conjecture, the above procedures are complete for bounded time except for several cases.</p>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2024-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140568440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Revisiting 2–3 red–black trees with a pedagogically sound yet efficient deletion algorithm: parity-seeking 用一种教学合理而高效的删除算法重新审视 2-3 红黑树:奇偶性搜索
IF 0.6 4区 计算机科学 Q3 Computer Science Pub Date : 2024-03-29 DOI: 10.1007/s00236-023-00452-6
Kamaledin Ghiasi-Shirazi, Taraneh Ghandi, Ali Taghizadeh, Ali Rahimi-Baigi

Red–black (RB) trees are one of the most efficient variants of balanced binary search trees. However, they have often been criticized for being too complicated, hard to explain, and unsuitable for pedagogical purposes, particularly their delete operation. Sedgewick (in: Dagstuhl Workshop on Data Structures, 2008. https://sedgewick.io/wp-content/themes/sedgewick/papers/2008LLRB.pdf) identified the length of code as the root of the problems and introduced left-leaning red–black (LLRB) trees. The delete operation of LLRB trees has a compact recursive code. Unfortunately, it may perform many unnecessary operations. The crux of the deletion algorithm is dealing with a “deficient” subtree, that is one whose black-height has become one less than that of its sibling subtree. In this paper, we revisit 2–3 red–black trees and propose a parity-seeking delete algorithm with the basic idea of making a deficient subtree on a par with its sibling: either by fixing the deficient subtree or by turning the sibling deficient as well, ascending deficiency to the parent node. Interestingly, the proposed parity-seeking delete algorithm also works for 2–3–4 RB trees. Our experiments show that the proposed parity-seeking delete algorithm is as efficient as the best preceding RB trees. The proposed parity-seeking delete algorithm is easily understandable and suitable for pedagogical and practical purposes.

红黑(RB)树是平衡二叉搜索树中最有效的变种之一。然而,它们经常被批评过于复杂、难以解释,而且不适合教学目的,尤其是删除操作。Sedgewick (in:达格施图尔数据结构研讨会,2008 年。https://sedgewick.io/wp-content/themes/sedgewick/papers/2008LLRB.pdf)认为代码长度是问题的根源,并引入了左倾红黑树(LLRB)。LLRB 树的删除操作具有紧凑的递归代码。遗憾的是,它可能会执行许多不必要的操作。删除算法的关键在于处理 "缺失 "子树,即其黑色高度比同级子树的黑色高度少一个的子树。在本文中,我们重新审视了 2-3 个红黑树,并提出了一种奇偶性搜索删除算法,其基本思想是使有缺陷的子树与其同胞子树处于同等位置:要么修复有缺陷的子树,要么将同胞子树也变成有缺陷的,缺陷程度依次递增至父节点。有趣的是,所提出的奇偶性搜索删除算法也适用于 2-3-4 RB 树。我们的实验表明,所提出的奇偶校验搜索删除算法的效率不亚于之前的最佳 RB 树。所提出的奇偶校验寻求删除算法易于理解,适合教学和实际应用。
{"title":"Revisiting 2–3 red–black trees with a pedagogically sound yet efficient deletion algorithm: parity-seeking","authors":"Kamaledin Ghiasi-Shirazi, Taraneh Ghandi, Ali Taghizadeh, Ali Rahimi-Baigi","doi":"10.1007/s00236-023-00452-6","DOIUrl":"https://doi.org/10.1007/s00236-023-00452-6","url":null,"abstract":"<p>Red–black (RB) trees are one of the most efficient variants of balanced binary search trees. However, they have often been criticized for being too complicated, hard to explain, and unsuitable for pedagogical purposes, particularly their delete operation. Sedgewick (in: Dagstuhl Workshop on Data Structures, 2008. https://sedgewick.io/wp-content/themes/sedgewick/papers/2008LLRB.pdf) identified the length of code as the root of the problems and introduced left-leaning red–black (LLRB) trees. The delete operation of LLRB trees has a compact recursive code. Unfortunately, it may perform many unnecessary operations. The crux of the deletion algorithm is dealing with a “deficient” subtree, that is one whose black-height has become one less than that of its sibling subtree. In this paper, we revisit 2–3 red–black trees and propose a parity-seeking delete algorithm with the basic idea of making a deficient subtree on a par with its sibling: either by fixing the deficient subtree or by turning the sibling deficient as well, ascending deficiency to the parent node. Interestingly, the proposed parity-seeking <i>delete</i> algorithm also works for 2–3–4 RB trees. Our experiments show that the proposed parity-seeking delete algorithm is as efficient as the best preceding RB trees. The proposed parity-seeking delete algorithm is easily understandable and suitable for pedagogical and practical purposes.</p>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2024-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140325649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Acta Informatica
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1