首页 > 最新文献

Acta Informatica最新文献

英文 中文
Novel tree-search method for synthesizing SMT strategies 一种新的SMT策略合成树搜索方法
IF 0.5 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-04 DOI: 10.1007/s00236-025-00495-x
Zhengyang John Lu, Joel Day, Piyush Jha, Paul Sarnighausen-Cahn, Stefan Siemer, Florin Manea, Vijay Ganesh

Modern SMT solvers, such as Z3, allow solver users to customize strategies to improve performance on their specific use cases. However, handcrafting an optimized strategy for a specific class of SMT instances remains a complex and demanding task for both solver developers and users alike. In this paper, we address the problem of automated SMT strategy synthesis via a novel method based on Monte-Carlo Tree Search (MCTS). We formulate strategy synthesis as a sequential decision-making process, where the search tree corresponds to the strategy space. Subsequently, we employ MCTS to navigate this vast search space. Compared to the conventional MCTS, we introduce two heuristics—layered and staged search—that enable our method to identify effective strategies with lower costs. We implement our method, dubbed Z3alpha, upon the Z3 SMT solver. Our experiments demonstrate that Z3alpha outperforms the default Z3 solver and the state-of-the-art synthesis tool Fastsmt on the majority of the evaluated benchmark sets, while producing more interpretable strategies than FastSMT. At SMT-COMP’24, among the 16 participating logics, Z3alpha improved upon the default Z3 in 12 cases and helped solve hundreds more instances in QF_NIA and QF_NRA, winning their respective divisions.

现代SMT求解器,如Z3,允许求解器用户自定义策略,以提高其特定用例的性能。然而,对于求解器开发人员和用户来说,为特定类别的SMT实例手工制定优化策略仍然是一项复杂且要求很高的任务。本文提出了一种基于蒙特卡罗树搜索(MCTS)的SMT策略自动合成方法。我们将战略综合制定为一个顺序决策过程,其中搜索树对应于战略空间。随后,我们使用MCTS来导航这个巨大的搜索空间。与传统的MCTS相比,我们引入了两种启发式方法——分层搜索和分阶段搜索——使我们的方法能够以更低的成本识别有效的策略。我们在Z3 SMT求解器上实现我们的方法,称为Z3alpha。我们的实验表明,在大多数评估的基准集上,Z3alpha优于默认的Z3求解器和最先进的合成工具Fastsmt,同时产生比Fastsmt更多的可解释策略。在SMT-COMP’24上,在16个参赛逻辑中,Z3alpha在12个案例中改进了默认的Z3,并帮助解决了QF_NIA和QF_NRA的数百个案例,赢得了各自组别的冠军。
{"title":"Novel tree-search method for synthesizing SMT strategies","authors":"Zhengyang John Lu,&nbsp;Joel Day,&nbsp;Piyush Jha,&nbsp;Paul Sarnighausen-Cahn,&nbsp;Stefan Siemer,&nbsp;Florin Manea,&nbsp;Vijay Ganesh","doi":"10.1007/s00236-025-00495-x","DOIUrl":"10.1007/s00236-025-00495-x","url":null,"abstract":"<div><p>Modern SMT solvers, such as Z3, allow solver users to customize strategies to improve performance on their specific use cases. However, handcrafting an optimized strategy for a specific class of SMT instances remains a complex and demanding task for both solver developers and users alike. In this paper, we address the problem of automated SMT strategy synthesis via a novel method based on Monte-Carlo Tree Search (MCTS). We formulate strategy synthesis as a sequential decision-making process, where the search tree corresponds to the strategy space. Subsequently, we employ MCTS to navigate this vast search space. Compared to the conventional MCTS, we introduce two heuristics—layered and staged search—that enable our method to identify effective strategies with lower costs. We implement our method, dubbed Z3alpha, upon the Z3 SMT solver. Our experiments demonstrate that Z3alpha outperforms the default Z3 solver and the state-of-the-art synthesis tool Fastsmt on the majority of the evaluated benchmark sets, while producing more interpretable strategies than FastSMT. At SMT-COMP’24, among the 16 participating logics, Z3alpha improved upon the default Z3 in 12 cases and helped solve hundreds more instances in QF_NIA and QF_NRA, winning their respective divisions.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"62 3","pages":""},"PeriodicalIF":0.5,"publicationDate":"2025-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-025-00495-x.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145161738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Correction: Directed capacity-preserving subgraphs: hardness and exact polynomial algorithms 修正:有向容量保持子图:硬度和精确多项式算法
IF 0.5 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-07-04 DOI: 10.1007/s00236-025-00493-z
Markus Chimani, Max Ilsen
{"title":"Correction: Directed capacity-preserving subgraphs: hardness and exact polynomial algorithms","authors":"Markus Chimani,&nbsp;Max Ilsen","doi":"10.1007/s00236-025-00493-z","DOIUrl":"10.1007/s00236-025-00493-z","url":null,"abstract":"","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"62 3","pages":""},"PeriodicalIF":0.5,"publicationDate":"2025-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-025-00493-z.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145161928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Primitive Deficiency of two Primitive Strings 两个原弦的原缺
IF 0.5 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-27 DOI: 10.1007/s00236-025-00494-y
Othman Echi

Let (Sigma ) be an alphabet of size at least 2, and let (textbf{Q}(Sigma )) denote the set of all primitive strings over (Sigma ). Let p and q be two distinct primitive strings over (Sigma ). In 1967, Lentin and Schützenberger proved that the language (p^+q^+:= {p^n q^m: m, n in mathbb {N} setminus {0}}) contains at most one periodic string. Moreover, if (p^n q^m) is periodic, then either (n = 1) or (m = 1). They also showed that if (pq^m) is periodic, then

$$begin{aligned} m le dfrac{2|p|}{|q|} + 3. end{aligned}$$

The aim of this paper is to provide a complete characterization of all pairs of distinct primitive strings p and q such that (pq^m) is periodic. As a consequence, we show that if (|p| >|q|) and (pq^m) is periodic, and if t is the quotient of the integer division of|p| by|q|, then

$$begin{aligned} m le t + 2. end{aligned}$$

Furthermore, if t and i are integers such that (t ge 2) and (1 le i le t + 2), we show that there exist two primitive strings p and q with (|p| >|q|) such that t is the quotient of the integer division of|p| by|q|, and (pq^i) is periodic.

设(Sigma )是一个大小至少为2的字母,并设(textbf{Q}(Sigma ))表示(Sigma )上所有原始字符串的集合。设p和q是(Sigma )上两个不同的原始字符串。1967年,Lentin和sch岑伯格证明了语言(p^+q^+:= {p^n q^m: m, n in mathbb {N} setminus {0}})最多包含一个周期字符串。此外,如果(p^n q^m)是周期性的,那么就是(n = 1)或(m = 1)。他们还表明,如果(pq^m)是周期的,那么$$begin{aligned} m le dfrac{2|p|}{|q|} + 3. end{aligned}$$本文的目的是提供所有不同的原始字符串p和q对的完整表征,使得(pq^m)是周期的。因此,我们证明,如果(|p| >|q|)和(pq^m)是周期的,如果t是|p|除以|q|的整数除法的商,那么$$begin{aligned} m le t + 2. end{aligned}$$进一步,如果t和i是整数,使得(t ge 2)和(1 le i le t + 2),我们证明存在两个原语字符串p和q,使得(|p| >|q|)是|p|除以|q|的整数除法的商,并且(pq^i)是周期的。
{"title":"The Primitive Deficiency of two Primitive Strings","authors":"Othman Echi","doi":"10.1007/s00236-025-00494-y","DOIUrl":"10.1007/s00236-025-00494-y","url":null,"abstract":"<div><p>Let <span>(Sigma )</span> be an alphabet of size at least 2, and let <span>(textbf{Q}(Sigma ))</span> denote the set of all primitive strings over <span>(Sigma )</span>. Let <i>p</i> and <i>q</i> be two distinct primitive strings over <span>(Sigma )</span>. In 1967, Lentin and Schützenberger proved that the language <span>(p^+q^+:= {p^n q^m: m, n in mathbb {N} setminus {0}})</span> contains at most one periodic string. Moreover, if <span>(p^n q^m)</span> is periodic, then either <span>(n = 1)</span> or <span>(m = 1)</span>. They also showed that if <span>(pq^m)</span> is periodic, then </p><div><div><span>$$begin{aligned} m le dfrac{2|p|}{|q|} + 3. end{aligned}$$</span></div></div><p>The aim of this paper is to provide a complete characterization of all pairs of distinct primitive strings <i>p</i> and <i>q</i> such that <span>(pq^m)</span> is periodic. As a consequence, we show that if <span>(|p| &gt;|q|)</span> and <span>(pq^m)</span> is periodic, and if <i>t</i> is the quotient of the integer division of|<i>p</i>| by|<i>q</i>|, then </p><div><div><span>$$begin{aligned} m le t + 2. end{aligned}$$</span></div></div><p>Furthermore, if <i>t</i> and <i>i</i> are integers such that <span>(t ge 2)</span> and <span>(1 le i le t + 2)</span>, we show that there exist two primitive strings <i>p</i> and <i>q</i> with <span>(|p| &gt;|q|)</span> such that <i>t</i> is the quotient of the integer division of|<i>p</i>| by|<i>q</i>|, and <span>(pq^i)</span> is periodic.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"62 3","pages":""},"PeriodicalIF":0.5,"publicationDate":"2025-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145169414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data reduction for directed feedback vertex set on graphs without long induced cycles 无长诱导循环图上有向反馈顶点集的数据约简
IF 0.5 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-03 DOI: 10.1007/s00236-025-00490-2
Jona Dirks, Enna Gerhard, Mario Grobler, Amer E. Mouawad, Sebastian Siebertz
<div><p>We study reduction rules for <span>Directed Feedback Vertex Set (DFVS)</span> on directed graphs without long cycles. A <span>DFVS</span> instance without cycles longer than <i>d</i> naturally corresponds to an instance of <i>d</i><span>-Hitting Set</span>, however, enumerating all cycles in an <i>n</i>-vertex graph and then kernelizing the resulting <i>d</i><span>-Hitting Set</span> instance can be too costly, as already enumerating all cycles can take time <span>(Omega (n^d))</span>. To the best of our knowledge, the kernelization of <span>DFVS</span> on graphs without long cycles has not been studied in the literature, except for very restricted cases, e.g., for tournaments, in which all induced cycles are of length three. We show that the natural reduction rule to delete all vertices and edges that do not lie on induced cycles cannot be implemented efficiently, that is, it is <i>W</i>[1]-hard (with respect to parameter <i>d</i>) to decide if a vertex or edge lies on an induced cycle of length at most <i>d</i> even on graphs that become acyclic after the deletion of a single vertex or edge. Based on different reduction rules we then show how to compute a kernel with at most <span>(2^dk^d)</span> vertices and at most <span>(d^{3d}k^d)</span> induced cycles of length at most <i>d</i> (which however, cannot be enumerated efficiently), where <i>k</i> is the size of a minimum directed feedback vertex set. We then study classes of graphs whose underlying undirected graphs have bounded expansion or are nowhere dense. These are very general classes of sparse graphs, containing e.g. classes excluding a minor or a topological minor. We prove that for every class <span>(mathscr {C} )</span> with bounded expansion there is a function <span>(f_mathscr {C} (d))</span> such that for graphs <span>(Gin mathscr {C} )</span> without induced cycles of length greater than <i>d</i> we can compute a kernel with <span>(f_mathscr {C} (d)cdot k)</span> vertices in time <span>(f_mathscr {C} (d)cdot n^{mathcal {O}(1)})</span>. For every nowhere dense class <span>(mathscr {C} )</span> there is a function <span>(f_mathscr {C} (d,varepsilon ))</span> such that for graphs <span>(Gin mathscr {C} )</span> without induced cycles of length greater than <i>d</i> we can compute a kernel with <span>(f_mathscr {C} (d,varepsilon )cdot k^{1+varepsilon })</span> vertices for any <span>(varepsilon >0)</span> in time <span>(f_mathscr {C} (d,varepsilon )cdot n^{mathcal {O}(1)})</span>. The most restricted classes we consider are strongly connected planar graphs without any (induced or non-induced) long cycles. We show that these classes have treewidth <span>(mathcal {O}(d))</span> and hence <span>DFVS</span> on planar graphs without cycles of length greater than <i>d</i> can be solved in time <span>(2^{mathcal {O}(d)}cdot n^{mathcal {O}(1)})</span>. We finally present a new data reduction rule for general <span>DFVS</span> and prove that the rule together with a few standard
研究了无长周期有向图上有向反馈顶点集的约简规则。一个周期不超过d的DFVS实例自然对应于一个d- hitting Set的实例,然而,枚举n顶点图中的所有循环,然后对结果d- hitting Set实例进行核化可能太昂贵,因为已经枚举了所有循环会花费时间(Omega (n^d))。据我们所知,除了非常有限的情况(例如,所有诱导循环长度为3的比赛)外,文献中还没有研究过无长循环图上DFVS的核化。我们证明了删除不位于诱导环上的所有顶点和边的自然约简规则不能有效地实现,即,即使在删除单个顶点或边后变为无环的图上,确定顶点或边是否位于最长为d的诱导环上也是W[1]-困难(相对于参数d)。基于不同的约简规则,我们展示了如何计算一个最多(2^dk^d)个顶点和最多(d^{3d}k^d)个诱导循环的核,其长度最多为d(然而,不能有效地枚举),其中k是最小有向反馈顶点集的大小。然后,我们研究了其底层无向图具有有界展开或无处密集的图类。这些是稀疏图的非常一般的类别,例如,包含不包含小项或拓扑小项的类。我们证明了对于每一个具有有界展开的类(mathscr {C} ),存在一个函数(f_mathscr {C} (d)),使得对于没有长度大于d的诱导循环的图(Gin mathscr {C} ),我们可以在时间(f_mathscr {C} (d)cdot n^{mathcal {O}(1)})上计算一个具有(f_mathscr {C} (d)cdot k)个顶点的核。对于每一个无处密集的类(mathscr {C} ),都有一个函数(f_mathscr {C} (d,varepsilon )),使得对于没有长度大于d的诱导循环的图(Gin mathscr {C} ),我们可以计算一个具有(f_mathscr {C} (d,varepsilon )cdot k^{1+varepsilon })顶点的核,对于任意(varepsilon >0)时间(f_mathscr {C} (d,varepsilon )cdot n^{mathcal {O}(1)})。我们考虑的最受限制的类是没有任何(诱导或非诱导)长循环的强连接平面图。我们证明了这些类具有树宽(mathcal {O}(d)),因此在没有长度大于d的循环的平面图上的DFVS可以及时求解(2^{mathcal {O}(d)}cdot n^{mathcal {O}(1)})。最后,我们提出了一种新的一般DFVS的数据约简规则,并证明该规则与一些标准规则一起包含了Bergougnoux等人工作中应用的所有规则,从而得到DFVS的多项式核[FVS],即由底层(无向)图的反馈顶点集数参数化的DFVS。最后,我们研究了基于lp的DFVS近似。
{"title":"Data reduction for directed feedback vertex set on graphs without long induced cycles","authors":"Jona Dirks,&nbsp;Enna Gerhard,&nbsp;Mario Grobler,&nbsp;Amer E. Mouawad,&nbsp;Sebastian Siebertz","doi":"10.1007/s00236-025-00490-2","DOIUrl":"10.1007/s00236-025-00490-2","url":null,"abstract":"&lt;div&gt;&lt;p&gt;We study reduction rules for &lt;span&gt;Directed Feedback Vertex Set (DFVS)&lt;/span&gt; on directed graphs without long cycles. A &lt;span&gt;DFVS&lt;/span&gt; instance without cycles longer than &lt;i&gt;d&lt;/i&gt; naturally corresponds to an instance of &lt;i&gt;d&lt;/i&gt;&lt;span&gt;-Hitting Set&lt;/span&gt;, however, enumerating all cycles in an &lt;i&gt;n&lt;/i&gt;-vertex graph and then kernelizing the resulting &lt;i&gt;d&lt;/i&gt;&lt;span&gt;-Hitting Set&lt;/span&gt; instance can be too costly, as already enumerating all cycles can take time &lt;span&gt;(Omega (n^d))&lt;/span&gt;. To the best of our knowledge, the kernelization of &lt;span&gt;DFVS&lt;/span&gt; on graphs without long cycles has not been studied in the literature, except for very restricted cases, e.g., for tournaments, in which all induced cycles are of length three. We show that the natural reduction rule to delete all vertices and edges that do not lie on induced cycles cannot be implemented efficiently, that is, it is &lt;i&gt;W&lt;/i&gt;[1]-hard (with respect to parameter &lt;i&gt;d&lt;/i&gt;) to decide if a vertex or edge lies on an induced cycle of length at most &lt;i&gt;d&lt;/i&gt; even on graphs that become acyclic after the deletion of a single vertex or edge. Based on different reduction rules we then show how to compute a kernel with at most &lt;span&gt;(2^dk^d)&lt;/span&gt; vertices and at most &lt;span&gt;(d^{3d}k^d)&lt;/span&gt; induced cycles of length at most &lt;i&gt;d&lt;/i&gt; (which however, cannot be enumerated efficiently), where &lt;i&gt;k&lt;/i&gt; is the size of a minimum directed feedback vertex set. We then study classes of graphs whose underlying undirected graphs have bounded expansion or are nowhere dense. These are very general classes of sparse graphs, containing e.g. classes excluding a minor or a topological minor. We prove that for every class &lt;span&gt;(mathscr {C} )&lt;/span&gt; with bounded expansion there is a function &lt;span&gt;(f_mathscr {C} (d))&lt;/span&gt; such that for graphs &lt;span&gt;(Gin mathscr {C} )&lt;/span&gt; without induced cycles of length greater than &lt;i&gt;d&lt;/i&gt; we can compute a kernel with &lt;span&gt;(f_mathscr {C} (d)cdot k)&lt;/span&gt; vertices in time &lt;span&gt;(f_mathscr {C} (d)cdot n^{mathcal {O}(1)})&lt;/span&gt;. For every nowhere dense class &lt;span&gt;(mathscr {C} )&lt;/span&gt; there is a function &lt;span&gt;(f_mathscr {C} (d,varepsilon ))&lt;/span&gt; such that for graphs &lt;span&gt;(Gin mathscr {C} )&lt;/span&gt; without induced cycles of length greater than &lt;i&gt;d&lt;/i&gt; we can compute a kernel with &lt;span&gt;(f_mathscr {C} (d,varepsilon )cdot k^{1+varepsilon })&lt;/span&gt; vertices for any &lt;span&gt;(varepsilon &gt;0)&lt;/span&gt; in time &lt;span&gt;(f_mathscr {C} (d,varepsilon )cdot n^{mathcal {O}(1)})&lt;/span&gt;. The most restricted classes we consider are strongly connected planar graphs without any (induced or non-induced) long cycles. We show that these classes have treewidth &lt;span&gt;(mathcal {O}(d))&lt;/span&gt; and hence &lt;span&gt;DFVS&lt;/span&gt; on planar graphs without cycles of length greater than &lt;i&gt;d&lt;/i&gt; can be solved in time &lt;span&gt;(2^{mathcal {O}(d)}cdot n^{mathcal {O}(1)})&lt;/span&gt;. We finally present a new data reduction rule for general &lt;span&gt;DFVS&lt;/span&gt; and prove that the rule together with a few standard ","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"62 2","pages":""},"PeriodicalIF":0.5,"publicationDate":"2025-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-025-00490-2.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145161722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exact and parameterized algorithms for choosability 精确和参数化算法的可选择性。
IF 0.5 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-05-30 DOI: 10.1007/s00236-025-00492-0
Ivan Bliznets, Jesper Nederlof

In the Choosability problem (or list chromatic number problem), for a given graph G, we need to find the smallest k such that G admits a list coloring for any list assignment where all lists contain at least k colors. The problem is tightly connected with the well-studied Coloring and List Coloring problems. However, the knowledge of the complexity landscape for the Choosability problem is pretty scarce. Moreover, most of the known results only provide lower bounds for its computational complexity and do not provide ways to cope with the intractability. The main objective of our paper is to construct the first non-trivial exact exponential algorithms for the Choosability problem, and complete the picture with parameterized results. Specifically, we present the first single-exponential algorithm for the decision version of the problem with fixed k. This result answers an implicit question from Eppstein on a stackexchange thread discussing upper bounds on the union of lists assigned to vertices. We also present a (2^{n^2} poly(n)) time algorithm for the general Choosability problem. In the parameterized setting, we give a polynomial kernel for the problem parameterized by vertex cover, and algorithms that run in FPT time when parameterized by a size of a clique-modulator and by the dual parameterization (n-k). Additionally, we show that Choosability admits a significant running time improvement if it is parameterized by cutwidth in comparison with the parameterization by treewidth studied by Marx and Mitsou [ICALP’16]. On the negative side, we provide a lower bound parameterized by a size of a modulator to split graphs under assumption of the Exponential Time Hypothesis.

在可选择性问题(或列表色数问题)中,对于给定的图G,我们需要找到最小的k,使得G允许所有列表分配的列表着色,其中所有列表包含至少k种颜色。这个问题与研究得很好的着色问题和列表着色问题密切相关。然而,关于可选择性问题的复杂性的知识是相当少的。此外,大多数已知的结果只提供了其计算复杂度的下界,而没有提供处理难解性的方法。本文的主要目的是构造可选择性问题的第一个非平凡精确指数算法,并用参数化结果完成图。具体地说,我们提出了第一个单指数算法来解决具有固定k的问题的决策版本。这个结果回答了Eppstein在stackexchange线程上讨论分配给顶点的列表的并集上界的隐式问题。对于一般的可选择性问题,我们也提出了一个[公式:见文本]时间算法。在参数化设置中,我们给出了用顶点覆盖参数化问题的多项式核,以及用团调制器的大小和对偶参数化参数化时在FPT时间内运行的算法[公式:见文本]。此外,我们表明,与马克思和Mitsou [ICALP'16]研究的树宽度参数化相比,如果用树宽度参数化可选择性,则可显著改善运行时间。在负面方面,我们在指数时间假设的假设下,提供了一个由调制器大小参数化的下界。
{"title":"Exact and parameterized algorithms for choosability","authors":"Ivan Bliznets,&nbsp;Jesper Nederlof","doi":"10.1007/s00236-025-00492-0","DOIUrl":"10.1007/s00236-025-00492-0","url":null,"abstract":"<div><p>In the C<span>hoosability</span> problem (or list chromatic number problem), for a given graph <i>G</i>, we need to find the smallest <i>k</i> such that <i>G</i> admits a list coloring for any list assignment where all lists contain at least <i>k</i> colors. The problem is tightly connected with the well-studied C<span>oloring</span> and L<span>ist </span> C<span>oloring</span> problems. However, the knowledge of the complexity landscape for the C<span>hoosability</span> problem is pretty scarce. Moreover, most of the known results only provide lower bounds for its computational complexity and do not provide ways to cope with the intractability. The main objective of our paper is to construct the first non-trivial exact exponential algorithms for the C<span>hoosability</span> problem, and complete the picture with parameterized results. Specifically, we present the first single-exponential algorithm for the decision version of the problem with fixed <i>k</i>. This result answers an implicit question from Eppstein on a stackexchange thread discussing upper bounds on the union of lists assigned to vertices. We also present a <span>(2^{n^2} poly(n))</span> time algorithm for the general C<span>hoosability</span> problem. In the parameterized setting, we give a polynomial kernel for the problem parameterized by vertex cover, and algorithms that run in FPT time when parameterized by a size of a clique-modulator and by the dual parameterization <span>(n-k)</span>. Additionally, we show that C<span>hoosability</span> admits a significant running time improvement if it is parameterized by cutwidth in comparison with the parameterization by treewidth studied by Marx and Mitsou [ICALP’16]. On the negative side, we provide a lower bound parameterized by a size of a modulator to split graphs under assumption of the Exponential Time Hypothesis.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"62 2","pages":""},"PeriodicalIF":0.5,"publicationDate":"2025-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC12125139/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144198053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effects on distance energy of some special complete multipartite graphs by embedding an edge 嵌入边对几种特殊完全多部图距离能量的影响
IF 0.4 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-05-22 DOI: 10.1007/s00236-025-00491-1
Masood Ur Rehman, Muhammad Ajmal

The distance energy of a simple undirected graph (mathcal {G}), denoted by (mathcal {E}_D(mathcal {G})), is the sum of the absolute values of the eigenvalues of the distance matrix (D(mathcal {G})) of (mathcal {G}). In this paper, we study the effects on distance energy of some special complete t-partite graphs due to embedding an edge. This paper is motivated by the study in a 2022 paper by Wang and Meng.

一个简单无向图(mathcal {G})的距离能量,用(mathcal {E}_D(mathcal {G}))表示,是(mathcal {G})的距离矩阵(D(mathcal {G}))的特征值的绝对值之和。本文研究了一些特殊的完全t部图中嵌入一条边对距离能量的影响。本文的研究灵感来源于Wang和b孟在2022年的一篇论文中的研究。
{"title":"Effects on distance energy of some special complete multipartite graphs by embedding an edge","authors":"Masood Ur Rehman,&nbsp;Muhammad Ajmal","doi":"10.1007/s00236-025-00491-1","DOIUrl":"10.1007/s00236-025-00491-1","url":null,"abstract":"<div><p>The distance energy of a simple undirected graph <span>(mathcal {G})</span>, denoted by <span>(mathcal {E}_D(mathcal {G}))</span>, is the sum of the absolute values of the eigenvalues of the distance matrix <span>(D(mathcal {G}))</span> of <span>(mathcal {G})</span>. In this paper, we study the effects on distance energy of some special complete <i>t</i>-partite graphs due to embedding an edge. This paper is motivated by the study in a 2022 paper by Wang and Meng.\u0000</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"62 2","pages":""},"PeriodicalIF":0.4,"publicationDate":"2025-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144108446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Row-column combination of Dyck words Dyck单词的行-列组合
IF 0.4 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-05-22 DOI: 10.1007/s00236-025-00489-9
Stefano Crespi Reghizzi, Antonio Restivo, Pierluigi San Pietro

We extend the notion of the Dyck language from words to two-dimensional arrays of symbols, i.e., pictures, using the row-column combination (also known as the crossword) of two Dyck languages over the same alphabet. In a Dyck crossword picture, each column and each row must be a word from the respective Dyck language. The pairing of open and closed parentheses in a Dyck word can be represented by edges connecting corresponding cells in the same row or column. This defines a matching graph, which serves as the two-dimensional analogue of the syntactic tree of a Dyck word. A matching graph is partitioned into simple circuits of unbounded length (always a multiple of four), whose labels form a regular language. These circuits exhibit a wide variety of forms and labelings, which we illustrate and partially classify. With a two-letter alphabet, a Dyck crossword is necessarily empty. The minimal non-trivial case, requiring an alphabet of size four, already generates all possible forms of matching graphs and is the primary focus of our study. We prove that the only picture with a single matching circuit (i.e., a Hamiltonian cycle) has size 2 by 2. Two key properties of Dyck words–cancellation and well-nesting–can be generalized to two dimensions, leading to two alternative definitions of 2D Dyck languages: neutralizable and well-nested. These languages are special cases of Dyck crossword pictures called quaternate, where all circuits have length 4 (i.e., are rectangles). This results in a strict language inclusion hierarchy: well-nested (subset ) neutralizable (subset ) quaternate (subset ) Dyck crosswords. When the alphabet size exceeds four, not all combinations of row and column Dyck languages yield non-empty crosswords. To identify productive combinations, we introduce an alphabetic graph, where nodes represent alphabet symbols and edges represent their couplings. A matching circuit corresponds to the unrolling of an alphabetic graph circuit. Finally, we prove that Dyck crosswords are not tiling-recognizable, as expected for a definition extending Dyck word languages to pictures.

我们将戴克语言的概念从单词扩展到二维符号数组,即图片,使用相同字母表上的两种戴克语言的行-列组合(也称为填字游戏)。在戴克填字游戏图片中,每一列和每一行必须是来自各自戴克语言的一个单词。Dyck单词中开括号和闭括号的配对可以用连接同一行或同列中相应单元格的边来表示。这定义了一个匹配图,作为Dyck单词语法树的二维模拟。匹配图被划分成无限长的简单电路(通常是4的倍数),其标签形成规则语言。这些电路表现出各种各样的形式和标签,我们将对其进行说明和部分分类。对于两个字母的字母表,戴克填字游戏必然是空的。最小的非平凡情况,需要大小为4的字母表,已经生成了所有可能形式的匹配图,是我们研究的主要焦点。我们证明了具有单个匹配电路(即哈密顿循环)的唯一图像的大小为2 × 2。Dyck词的两个关键属性——消去和良好嵌套——可以推广到二维,从而导致二维Dyck语言的两种可选定义:可中和和良好嵌套。这些语言是戴克填字游戏的特殊情况,称为四元制,其中所有电路的长度为4(即矩形)。这导致了严格的语言包含层次结构:嵌套良好的(subset )可中和的(subset )季元的(subset ) Dyck填字游戏。当字母表大小超过4时,并非所有行Dyck语言和列Dyck语言的组合都产生非空的填字游戏。为了识别有效的组合,我们引入了一个字母图,其中节点表示字母符号,边表示它们的耦合。匹配电路对应于字母图电路的展开。最后,我们证明了Dyck填字游戏不具有平铺可识别性,正如将Dyck单词语言扩展到图片的定义所期望的那样。
{"title":"Row-column combination of Dyck words","authors":"Stefano Crespi Reghizzi,&nbsp;Antonio Restivo,&nbsp;Pierluigi San Pietro","doi":"10.1007/s00236-025-00489-9","DOIUrl":"10.1007/s00236-025-00489-9","url":null,"abstract":"<div><p>We extend the notion of the Dyck language from words to two-dimensional arrays of symbols, i.e., pictures, using the row-column combination (also known as the crossword) of two Dyck languages over the same alphabet. In a Dyck crossword picture, each column and each row must be a word from the respective Dyck language. The pairing of open and closed parentheses in a Dyck word can be represented by edges connecting corresponding cells in the same row or column. This defines a <i>matching graph</i>, which serves as the two-dimensional analogue of the syntactic tree of a Dyck word. A matching graph is partitioned into simple circuits of unbounded length (always a multiple of four), whose labels form a regular language. These circuits exhibit a wide variety of forms and labelings, which we illustrate and partially classify. With a two-letter alphabet, a Dyck crossword is necessarily empty. The minimal non-trivial case, requiring an alphabet of size four, already generates all possible forms of matching graphs and is the primary focus of our study. We prove that the only picture with a single matching circuit (i.e., a Hamiltonian cycle) has size 2 by 2. Two key properties of Dyck words–cancellation and well-nesting–can be generalized to two dimensions, leading to two alternative definitions of 2D Dyck languages: <i>neutralizable </i> and <i>well-nested</i>. These languages are special cases of Dyck crossword pictures called quaternate, where all circuits have length 4 (i.e., are rectangles). This results in a strict language inclusion hierarchy: well-nested <span>(subset )</span> neutralizable <span>(subset )</span> quaternate <span>(subset )</span> Dyck crosswords. When the alphabet size exceeds four, not all combinations of row and column Dyck languages yield non-empty crosswords. To identify productive combinations, we introduce an <i>alphabetic graph</i>, where nodes represent alphabet symbols and edges represent their couplings. A matching circuit corresponds to the unrolling of an alphabetic graph circuit. Finally, we prove that Dyck crosswords are not tiling-recognizable, as expected for a definition extending Dyck word languages to pictures.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"62 2","pages":""},"PeriodicalIF":0.4,"publicationDate":"2025-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-025-00489-9.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144117700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deterministic real-time tree-walking-storage automata 确定性实时树行走存储自动机
IF 0.4 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-05-03 DOI: 10.1007/s00236-025-00488-w
Martin Kutrib, Uwe Meyer

We study deterministic tree-walking-storage automata, which are finite-state devices equipped with a tree-like storage. These automata are generalized stack automata, where the linear stack storage is replaced by a non-linear tree-like stack. Therefore, tree-walking-storage automata have the ability to explore the interior of the tree storage without altering the contents, with the possible moves of the tree pointer corresponding to those of tree-walking automata. In addition, a tree-walking-storage automaton can append (push) non-existent descendants to a tree node and remove (pop) leaves from the tree. Here we are particularly considering the capacities of deterministic tree-walking-storage automata working in real time. It is shown that even the non-erasing variant can accept rather complicated unary languages as, for example, the language of words whose lengths are powers of two, or the language of words whose lengths are double Fibonacci numbers. Comparing the computational capacities with automata from the classical automata hierarchy, we derive that the family of languages accepted by real-time deterministic (non-erasing) tree-walking-storage automata is located between the regular and the deterministic context-sensitive languages. Moreover, the families are incomparable with the families of context-free and growing context-sensitive languages. It turns out that the devices under consideration accept unary languages in non-erasing mode that cannot be accepted by any classical stack automaton, even in erasing mode and arbitrary time. Basic closure properties of the induced families of languages are shown. In particular, we consider Boolean operations and AFL operations. It turns out that the two families in question have the same properties and, in particular, share all but one of these closure properties with the important family of deterministic context-free languages. Then, we consider the computational capacity of the counterpart to counter- and stack-counter automata, where the set of stack symbols is a singleton. Finally, we explore several decidability problems and show, that even for devices with a single tree symbol, the problems are all non-semidecidable by reductions of non-semidecidable problems of Turing machines.

我们研究了确定性树行走-存储自动机,它是一种具有树状存储的有限状态设备。这些自动机是广义堆栈自动机,其中线性堆栈存储被非线性树状堆栈所取代。因此,树行走-存储自动机具有在不改变内容的情况下探索树存储内部的能力,树指针的可能移动与树行走自动机的可能移动相对应。此外,树行走-存储自动机可以将不存在的后代附加(推)到树节点,并从树中删除(弹出)叶子。在这里,我们特别考虑了实时工作的确定性树行走存储自动机的能力。结果表明,即使非擦除变体也可以接受相当复杂的一元语言,例如,长度为2的幂的单词的语言,或者长度为双斐波那契数的单词的语言。通过与经典自动机层次结构中的自动机的计算能力比较,我们得出实时确定性(非擦除)树行走存储自动机所接受的语言族位于规则语言和确定性上下文敏感语言之间。此外,这些语言族与上下文无关的和日益增长的上下文敏感语言族是无法比拟的。结果表明,所考虑的器件在非擦除模式下接受一元语言,这是任何经典堆栈自动机都无法接受的,即使在擦除模式和任意时间下也是如此。给出了归纳语言族的基本闭包性质。特别地,我们考虑布尔运算和AFL运算。事实证明,所讨论的两个语言家族具有相同的属性,特别是,除了一个闭包属性外,它们与重要的确定性上下文无关语言家族共享所有闭包属性。然后,我们考虑计数器自动机和堆栈计数器自动机对应的计算能力,其中堆栈符号集是单例的。最后,我们探讨了几个可决性问题,并证明了即使对于具有单个树符号的设备,通过图灵机的不可半决问题的约简,这些问题都是不可半决的。
{"title":"Deterministic real-time tree-walking-storage automata","authors":"Martin Kutrib,&nbsp;Uwe Meyer","doi":"10.1007/s00236-025-00488-w","DOIUrl":"10.1007/s00236-025-00488-w","url":null,"abstract":"<div><p>We study deterministic tree-walking-storage automata, which are finite-state devices equipped with a tree-like storage. These automata are generalized stack automata, where the linear stack storage is replaced by a non-linear tree-like stack. Therefore, tree-walking-storage automata have the ability to explore the interior of the tree storage without altering the contents, with the possible moves of the tree pointer corresponding to those of tree-walking automata. In addition, a tree-walking-storage automaton can append (push) non-existent descendants to a tree node and remove (pop) leaves from the tree. Here we are particularly considering the capacities of deterministic tree-walking-storage automata working in real time. It is shown that even the non-erasing variant can accept rather complicated unary languages as, for example, the language of words whose lengths are powers of two, or the language of words whose lengths are double Fibonacci numbers. Comparing the computational capacities with automata from the classical automata hierarchy, we derive that the family of languages accepted by real-time deterministic (non-erasing) tree-walking-storage automata is located between the regular and the deterministic context-sensitive languages. Moreover, the families are incomparable with the families of context-free and growing context-sensitive languages. It turns out that the devices under consideration accept unary languages in non-erasing mode that cannot be accepted by any classical stack automaton, even in erasing mode and arbitrary time. Basic closure properties of the induced families of languages are shown. In particular, we consider Boolean operations and AFL operations. It turns out that the two families in question have the same properties and, in particular, share all but one of these closure properties with the important family of deterministic context-free languages. Then, we consider the computational capacity of the counterpart to counter- and stack-counter automata, where the set of stack symbols is a singleton. Finally, we explore several decidability problems and show, that even for devices with a single tree symbol, the problems are all non-semidecidable by reductions of non-semidecidable problems of Turing machines.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"62 2","pages":""},"PeriodicalIF":0.4,"publicationDate":"2025-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-025-00488-w.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143900799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Three-word codes ({a, aba, u}) and ({a, ab, v}) having finite completions 三字代码({a, aba, u})和({a, ab, v})具有有限补全
IF 0.4 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-04-16 DOI: 10.1007/s00236-025-00487-x
Chunhua Cao, Lei Liao, Zhongmei Yan, Di Yang, Yuguang Yuan

Does every three-word code have a finite completion? Up to now, this famous question in the theory of codes remains open. Motivated by this problem, we construct several types of three-word codes with the form ({a, aba, u}) and ({a, ab, v}) which have finite completions.

是否每个三字代码都有一个有限补全?直到现在,这个著名的密码理论问题仍然没有得到解决。在这个问题的激励下,我们构造了几种形式为({a, aba, u})和({a, ab, v})的有限补全的三字码。
{"title":"Three-word codes ({a, aba, u}) and ({a, ab, v}) having finite completions","authors":"Chunhua Cao,&nbsp;Lei Liao,&nbsp;Zhongmei Yan,&nbsp;Di Yang,&nbsp;Yuguang Yuan","doi":"10.1007/s00236-025-00487-x","DOIUrl":"10.1007/s00236-025-00487-x","url":null,"abstract":"<div><p>Does every three-word code have a finite completion? Up to now, this famous question in the theory of codes remains open. Motivated by this problem, we construct several types of three-word codes with the form <span>({a, aba, u})</span> and <span>({a, ab, v})</span> which have finite completions.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"62 2","pages":""},"PeriodicalIF":0.4,"publicationDate":"2025-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143840353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Visualization of bipartite graphs in limited window size 有限窗口大小下的双方图可视化
IF 0.4 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-04-03 DOI: 10.1007/s00236-025-00483-1
Alon Efrat, William Evans, Kassian Köck, Stephen Kobourov, Jacob Miller

Bipartite graphs are commonly used to visualize objects and their features. An object may possess several features and several objects may share a common feature. The standard visualization of bipartite graphs, with objects and features on two (say horizontal) parallel lines at integer coordinates and edges drawn as line segments, can often be difficult to work with. A common task in visualization of such graphs is to consider one object and all its features. This naturally defines a drawing window, defined as the smallest interval that contains the x-coordinates of the object and all its features. We show that if both objects and features can be reordered, minimizing the average window size is NP-hard. However, if the features are fixed, then we provide an efficient polynomial-time algorithm for arranging the objects, so as to minimize the average window size. Finally, we introduce a different way of visualizing the bipartite graph, by placing the nodes of the two parts on two concentric circles. For this setting we also show NP-hardness for the general case and a polynomial-time algorithm when the features are fixed.

二部图通常用于可视化物体及其特征。一个对象可以具有多个特征,多个对象可以共享一个共同特征。二部图的标准可视化,对象和特征在整数坐标的两条平行线(比如水平)上,边缘绘制为线段,通常很难处理。在这种图形的可视化中,一个常见的任务是考虑一个对象及其所有特征。这自然定义了一个绘图窗口,定义为包含对象的x坐标及其所有特征的最小间隔。我们表明,如果对象和特征都可以重新排序,最小化平均窗口大小是np困难的。然而,如果特征是固定的,那么我们提供了一个有效的多项式时间算法来排列对象,从而最小化平均窗口大小。最后,我们介绍了一种不同的可视化二部图的方法,即将两部分的节点放置在两个同心圆上。对于这种设置,我们还展示了一般情况下的np -硬度,以及特征固定时的多项式时间算法。
{"title":"Visualization of bipartite graphs in limited window size","authors":"Alon Efrat,&nbsp;William Evans,&nbsp;Kassian Köck,&nbsp;Stephen Kobourov,&nbsp;Jacob Miller","doi":"10.1007/s00236-025-00483-1","DOIUrl":"10.1007/s00236-025-00483-1","url":null,"abstract":"<div><p>Bipartite graphs are commonly used to visualize objects and their features. An object may possess several features and several objects may share a common feature. The standard visualization of bipartite graphs, with objects and features on two (say horizontal) parallel lines at integer coordinates and edges drawn as line segments, can often be difficult to work with. A common task in visualization of such graphs is to consider one object and all its features. This naturally defines a drawing window, defined as the smallest interval that contains the x-coordinates of the object and all its features. We show that if both objects and features can be reordered, minimizing the average window size is NP-hard. However, if the features are fixed, then we provide an efficient polynomial-time algorithm for arranging the objects, so as to minimize the average window size. Finally, we introduce a different way of visualizing the bipartite graph, by placing the nodes of the two parts on two concentric circles. For this setting we also show NP-hardness for the general case and a polynomial-time algorithm when the features are fixed.\u0000</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"62 2","pages":""},"PeriodicalIF":0.4,"publicationDate":"2025-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-025-00483-1.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143761776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Acta Informatica
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1