ACM Transactions on Algorithms (TALG)最新文献

筛选
英文 中文
Generic Techniques for Building Top-k Structures 构建Top-k结构的通用技术
ACM Transactions on Algorithms (TALG) Pub Date : 2022-10-10 DOI: 10.1145/3546074
S. Rahul, Yufei Tao
{"title":"Generic Techniques for Building Top-k Structures","authors":"S. Rahul, Yufei Tao","doi":"10.1145/3546074","DOIUrl":"https://doi.org/10.1145/3546074","url":null,"abstract":"A reporting query returns the objects satisfying a predicate q from an input set. In prioritized reporting, each object carries a real-valued weight (which can be query dependent), and a query returns the objects that satisfy q and have weights at least a threshold τ. A top-k query finds, among all the objects satisfying q, the k ones of the largest weights; a max query is a special instance with k = 1. We want to design data structures of small space to support queries (and possibly updates) efficiently. Previous work has shown that a top-k structure can also support max and prioritized queries with no performance deterioration. This article explores the opposite direction: do prioritized queries, possibly combined with max queries, imply top-k search? Subject to mild conditions, we provide affirmative answers with two reduction techniques. The first converts a prioritized structure into a static top-k structure with the same space complexity and only a logarithmic blowup in query time. If a max structure is available in addition, our second reduction yields a top-k structure with no degradation in expected performance (this holds for the space, query, and update complexities). Our techniques significantly simplify the design of top-k structures because structures for max and prioritized queries are often easier to obtain. We demonstrate this by developing top-k structures for interval stabbing, 3D dominance, halfspace reporting, linear ranking, and L∞ nearest neighbor search in the RAM and the external memory computation models.","PeriodicalId":154047,"journal":{"name":"ACM Transactions on Algorithms (TALG)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131619578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deterministic Leader Election in Anonymous Radio Networks 匿名无线网络中的确定性领导人选举
ACM Transactions on Algorithms (TALG) Pub Date : 2022-03-26 DOI: 10.1145/3527171
Avery Miller, A. Pelc, R. Yadav
{"title":"Deterministic Leader Election in Anonymous Radio Networks","authors":"Avery Miller, A. Pelc, R. Yadav","doi":"10.1145/3527171","DOIUrl":"https://doi.org/10.1145/3527171","url":null,"abstract":"Leader election is a fundamental task in distributed computing. It is a symmetry breaking problem, calling for one node of the network to become the leader, and for all other nodes to become non-leaders. We consider leader election in anonymous radio networks modeled as simple undirected connected graphs. Nodes communicate in synchronous rounds. In each round, a node can either transmit a message to all its neighbours, or stay silent and listen. A node v hears a message from a neighbour w in a given round if v listens in this round and if w is its only neighbour transmitting in this round. If v listens in a round in which more than one neighbour transmits, then v hears noise that is different from any message and different from silence. We assume that nodes are identical (anonymous) and execute the same deterministic algorithm. Under this scenario, symmetry can be broken only in one way: by different wake-up times of the nodes. In which situations is it possible to break symmetry and elect a leader using time as symmetry breaker? In order to answer this question, we consider configurations. A configuration is the underlying graph with nodes tagged by non-negative integers with the following meaning. A node can either wake up spontaneously in the round shown on its tag, according to some global clock, or can be woken up hearing a message sent by one of its already awoken neighbours. The local clock of a node starts at its wakeup and nodes do not have access to the global clock determining their tags. A configuration is feasible if there exists a distributed algorithm that elects a leader for this configuration. Our main result is a complete algorithmic characterization of feasible configurations. More precisely, we design a centralized decision algorithm, working in polynomial time, whose input is a configuration and which decides if the configuration is feasible. Using this algorithm we also provide a dedicated deterministic distributed leader election algorithm for each feasible configuration that elects a leader for this configuration in time O(n2σ, where n is the number of nodes and σ is the difference between the largest and smallest tag of the configuration. We then ask the question whether there exists a universal deterministic distributed algorithm electing a leader for all feasible configurations. The answer turns out to be no, and we show that such a universal algorithm cannot exist even for the class of 4-node feasible configurations. We also prove that a distributed version of our decision algorithm cannot exist.","PeriodicalId":154047,"journal":{"name":"ACM Transactions on Algorithms (TALG)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132302353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Learned Approach to Design Compressed Rank/Select Data Structures 设计压缩排名/选择数据结构的学习方法
ACM Transactions on Algorithms (TALG) Pub Date : 2022-03-17 DOI: 10.1145/3524060
A. Boffa, P. Ferragina, Giorgio Vinciguerra
{"title":"A Learned Approach to Design Compressed Rank/Select Data Structures","authors":"A. Boffa, P. Ferragina, Giorgio Vinciguerra","doi":"10.1145/3524060","DOIUrl":"https://doi.org/10.1145/3524060","url":null,"abstract":"We address the problem of designing, implementing, and experimenting with compressed data structures that support rank and select queries over a dictionary of integers. We shine a new light on this classical problem by showing a connection between the input integers and the geometry of a set of points in a Cartesian plane suitably derived from them. We then build upon some results in computational geometry to introduce the first compressed rank/select dictionary based on the idea of “learning” the distribution of such points via proper linear approximations (LA). We therefore call this novel data structure the la_vector. We prove time and space complexities of the la_vector in several scenarios: in the worst case, in the case of input distributions with finite mean and variance, and taking into account the kth order entropy of some of its building blocks. We also discuss improved hybrid data structures, namely, ones that suitably orchestrate known compressed rank/select dictionaries with the la_vector. We corroborate our theoretical results with a large set of experiments over datasets originating from a variety of applications (Web search, DNA sequencing, information retrieval, and natural language processing) and show that our approach provides new interesting space-time tradeoffs with respect to many well-established compressed rank/select dictionary implementations. In particular, we show that our select is the fastest, and our rank is on the space-time Pareto frontier.","PeriodicalId":154047,"journal":{"name":"ACM Transactions on Algorithms (TALG)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126545265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
k-apices of Minor-closed Graph Classes. II. Parameterized Algorithms 小闭图类的k-顶点。2参数化算法
ACM Transactions on Algorithms (TALG) Pub Date : 2022-03-07 DOI: 10.1145/3519028
Ignasi Sau, Giannos Stamoulis, D. Thilikos
{"title":"k-apices of Minor-closed Graph Classes. II. Parameterized Algorithms","authors":"Ignasi Sau, Giannos Stamoulis, D. Thilikos","doi":"10.1145/3519028","DOIUrl":"https://doi.org/10.1145/3519028","url":null,"abstract":"Let 𝒢 be a minor-closed graph class. We say that a graph G is a k-apex of 𝒢 if G contains a set S of at most k vertices such that GS belongs to 𝒢. We denote by 𝒜k (𝒢) the set of all graphs that are k-apices of 𝒢. In the first paper of this series, we obtained upper bounds on the size of the graphs in the minor-obstruction set of 𝒜k (𝒢), i.e., the minor-minimal set of graphs not belonging to 𝒜k (𝒢). In this article, we provide an algorithm that, given a graph G on n vertices, runs in time 2poly(k) ⋅ n3 and either returns a set S certifying that G ∈ 𝒜k (𝒢), or reports that G ∉ 𝒜k (𝒢). Here poly is a polynomial function whose degree depends on the maximum size of a minor-obstruction of 𝒢. In the special case where 𝒢 excludes some apex graph as a minor, we give an alternative algorithm running in 2poly(k) ⋅ n2-time.","PeriodicalId":154047,"journal":{"name":"ACM Transactions on Algorithms (TALG)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127321977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Fully Dynamic (Δ +1)-Coloring in O(1) Update Time 完全动态(Δ +1)-在0(1)更新时间着色
ACM Transactions on Algorithms (TALG) Pub Date : 2022-03-04 DOI: 10.1145/3494539
Sayan Bhattacharya, F. Grandoni, Janardhan Kulkarni, Quanquan C. Liu, Shay Solomon
{"title":"Fully Dynamic (Δ +1)-Coloring in O(1) Update Time","authors":"Sayan Bhattacharya, F. Grandoni, Janardhan Kulkarni, Quanquan C. Liu, Shay Solomon","doi":"10.1145/3494539","DOIUrl":"https://doi.org/10.1145/3494539","url":null,"abstract":"The problem of (Δ +1)-vertex coloring a graph of maximum degree Δ has been extremely well studied over the years in various settings and models. Surprisingly, for the dynamic setting, almost nothing was known until recently. In SODA’18, Bhattacharya, Chakrabarty, Henzinger and Nanongkai devised a randomized algorithm for maintaining a (Δ +1)-coloring with O(log Δ) expected amortized update time. In this article, we present an improved randomized algorithm for (Δ +1)-coloring that achieves O(1) amortized update time and show that this bound holds not only in expectation but also with high probability. Our starting point is the state-of-the-art randomized algorithm for maintaining a maximal matching (Solomon, FOCS’16). We carefully build on the approach of Solomon, but, due to inherent differences between the maximal matching and (Δ +1)-coloring problems, we need to deviate significantly from it in several crucial and highly nontrivial points.1","PeriodicalId":154047,"journal":{"name":"ACM Transactions on Algorithms (TALG)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116454697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Quasipolynomial Multicut-mimicking Networks and Kernels for Multiway Cut Problems 多路切割问题的拟多项式多路模拟网络和核
ACM Transactions on Algorithms (TALG) Pub Date : 2022-03-04 DOI: 10.1145/3501304
Magnus Wahlström
{"title":"Quasipolynomial Multicut-mimicking Networks and Kernels for Multiway Cut Problems","authors":"Magnus Wahlström","doi":"10.1145/3501304","DOIUrl":"https://doi.org/10.1145/3501304","url":null,"abstract":"We show the existence of an exact mimicking network of kO(log k) edges for minimum multicuts over a set of terminals in an undirected graph, where k is the total capacity of the terminals, i.e., the sum of the degrees of the terminal vertices. Furthermore, using the best available approximation algorithm for Small Set Expansion, we show that a mimicking network of kO(log3 k) edges can be computed in randomized polynomial time. As a consequence, we show quasipolynomial kernels for several problems, including Edge Multiway Cut, Group Feedback Edge Set for an arbitrary group, and Edge Multicut parameterized by the solution size and the number of cut requests. The result combines the matroid-based irrelevant edge approach used in the kernel for s-Multiway Cut with a recursive decomposition and sparsification of the graph along sparse cuts. This is the first progress on the kernelization of Multiway Cut problems since the kernel for s-Multiway Cut for constant value of s (Kratsch and Wahlström, FOCS 2012).","PeriodicalId":154047,"journal":{"name":"ACM Transactions on Algorithms (TALG)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121122859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Constant-time Dynamic (Δ +1)-Coloring 恒时动态(Δ +1)-着色
ACM Transactions on Algorithms (TALG) Pub Date : 2022-03-04 DOI: 10.1145/3501403
M. Henzinger, Pan Peng
{"title":"Constant-time Dynamic (Δ +1)-Coloring","authors":"M. Henzinger, Pan Peng","doi":"10.1145/3501403","DOIUrl":"https://doi.org/10.1145/3501403","url":null,"abstract":"We give a fully dynamic (Las-Vegas style) algorithm with constant expected amortized time per update that maintains a proper (Δ +1)-vertex coloring of a graph with maximum degree at most Δ. This improves upon the previous O(log Δ)-time algorithm by Bhattacharya et al. (SODA 2018). Our algorithm uses an approach based on assigning random ranks to vertices and does not need to maintain a hierarchical graph decomposition. We show that our result does not only have optimal running time but is also optimal in the sense that already deciding whether a Δ-coloring exists in a dynamically changing graph with maximum degree at most Δ takes Ω (log n) time per operation.","PeriodicalId":154047,"journal":{"name":"ACM Transactions on Algorithms (TALG)","volume":"212 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131407868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Exponential Separations in Local Privacy 指数分离在本地隐私
ACM Transactions on Algorithms (TALG) Pub Date : 2022-02-08 DOI: 10.1145/3459095
Matthew Joseph, Jieming Mao, Aaron Roth
{"title":"Exponential Separations in Local Privacy","authors":"Matthew Joseph, Jieming Mao, Aaron Roth","doi":"10.1145/3459095","DOIUrl":"https://doi.org/10.1145/3459095","url":null,"abstract":"We prove a general connection between the communication complexity of two-player games and the sample complexity of their multi-player locally private analogues. We use this connection to prove sample complexity lower bounds for locally differentially private protocols as straightforward corollaries of results from communication complexity. In particular, we (1) use a communication lower bound for the hidden layers problem to prove an exponential sample complexity separation between sequentially and fully interactive locally private protocols, and (2) use a communication lower bound for the pointer chasing problem to prove an exponential sample complexity separation between k-round and (k+1)-round sequentially interactive locally private protocols, for every k.","PeriodicalId":154047,"journal":{"name":"ACM Transactions on Algorithms (TALG)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123093610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Introduction to the ACM-SIAM Symposium on Discrete Algorithms (SODA) 2019 Special Issue ACM-SIAM离散算法研讨会(SODA) 2019特刊简介
ACM Transactions on Algorithms (TALG) Pub Date : 2022-01-22 DOI: 10.1145/3508460
M. Hoefer, T. Kopelowitz
{"title":"Introduction to the ACM-SIAM Symposium on Discrete Algorithms (SODA) 2019 Special Issue","authors":"M. Hoefer, T. Kopelowitz","doi":"10.1145/3508460","DOIUrl":"https://doi.org/10.1145/3508460","url":null,"abstract":"We are delighted to present a Special Issue of ACM Transactions on Algorithms, containing full versions of six articles that were presented at the 30th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA) 2019 in San Diego, California, on January 6–9, 2019. These articles, selected on the basis of their high ratings by the conference program committee, have been thoroughly reviewed according to the journal’s highest standards. In “Polynomial-time algorithm for Maximum Weight Independent Set on P6-free graphs”, Andrzej Grzesik, Tereza Klimošová, Marcin Pilipczuk, and Michał Pilipczuk study the classic problem of max-weight independent set. They provide the first polynomial-time algorithm to solve the problem for the class of P6-free graphs, i.e., all graphs that contain no path on six vertices as an induced subgraph. The approach is based on a careful enumeration of vertex subsets that inherently characterize all maximal independent sets. The article “I/O-Efficient Algorithms for Topological Sort and Related Problems” by Nairen Cao, Jeremy Fineman, Katina Russell, and Eugene Yang, introduces the first randomized algorithms for topological sorting and for identifying the strongly connected components of a directed graph in the I/O model. These algorithms have a runtime of O (sort (E) · poly(logV )), where sort (E) is the time needed for sorting E elements in the I/O-model. The algorithms are based on a recursive approach, which iteratively updates a random labeling until vertices in the same strongly connected component have the same label and the labeling represents a topological sorting of the strongly connected components. These new algorithms also imply efficient I/O-algorithms for various reachability and shortest paths problems in directed acyclic graphs. In the article “SETH-Based Lower Bounds for Subset Sum and Bicriteria Path”, by Amir Abboud, Karl Bringmann, Danny Hermelin, and Dvir Shabtay, the authors introduce a reduction fromk-SAT to SUBSET SUM on dense instances. The new reduction proves that Bellman’s SUBSET SUM algorithm from 1969, which runs in O (Tn) time on n numbers and target T , cannot be improved to T 1−ε 2 (n) time for any constant ε > 0, unless the Strong Exponential Time Hypothesis (SETH) is false. The reduction is based on the results of Behrends (1946) about the existence of certain sequences of numbers, combined with clever partitioning and encoding. The authors also extend their techniques to prove SETH-based lower bounds for the BICRITERIA s, t-PATH problem. The article “Optimal Las Vegas Approximate Near Neighbors in p” by Alexander Wei presents Las Vegas data structures for solving approximate near neighbors in R under the p -norm. For 1 ≤ p ≤ 2, the author provides a data structure that matches the performance of optimal localitysensitive hashing. Moreover, using a locality-sensitive filter construction, the article gives the first","PeriodicalId":154047,"journal":{"name":"ACM Transactions on Algorithms (TALG)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116885118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal Las Vegas Approximate Near Neighbors in ℓp 最优的拉斯维加斯近似近邻
ACM Transactions on Algorithms (TALG) Pub Date : 2022-01-22 DOI: 10.1145/3461777
Alexander Wei
{"title":"Optimal Las Vegas Approximate Near Neighbors in ℓp","authors":"Alexander Wei","doi":"10.1145/3461777","DOIUrl":"https://doi.org/10.1145/3461777","url":null,"abstract":"We show that approximate near neighbor search in high dimensions can be solved in a Las Vegas fashion (i.e., without false negatives) for ℓp (1≤ p≤ 2) while matching the performance of optimal locality-sensitive hashing. Specifically, we construct a data-independent Las Vegas data structure with query time O(dnρ) and space usage O(dn1+ρ) for (r, c r)-approximate near neighbors in Rd under the ℓp norm, where ρ = 1/cp + o(1). Furthermore, we give a Las Vegas locality-sensitive filter construction for the unit sphere that can be used with the data-dependent data structure of Andoni et al. (SODA 2017) to achieve optimal space-time tradeoffs in the data-dependent setting. For the symmetric case, this gives us a data-dependent Las Vegas data structure with query time O(dnρ) and space usage O(dn1+ρ) for (r, c r)-approximate near neighbors in Rd under the ℓp norm, where ρ = 1/(2cp - 1) + o(1). Our data-independent construction improves on the recent Las Vegas data structure of Ahle (FOCS 2017) for ℓp when 1 < p≤ 2. Our data-dependent construction performs even better for ℓp for all pε [1, 2] and is the first Las Vegas approximate near neighbors data structure to make use of data-dependent approaches. We also answer open questions of Indyk (SODA 2000), Pagh (SODA 2016), and Ahle by showing that for approximate near neighbors, Las Vegas data structures can match state-of-the-art Monte Carlo data structures in performance for both the data-independent and data-dependent settings and across space-time tradeoffs.","PeriodicalId":154047,"journal":{"name":"ACM Transactions on Algorithms (TALG)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130843553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信