2009 24th Annual IEEE Conference on Computational Complexity最新文献

筛选
英文 中文
The Proof Complexity of Polynomial Identities 多项式恒等式的证明复杂性
2009 24th Annual IEEE Conference on Computational Complexity Pub Date : 2009-07-15 DOI: 10.1109/CCC.2009.9
P. Hrubes, Iddo Tzameret
{"title":"The Proof Complexity of Polynomial Identities","authors":"P. Hrubes, Iddo Tzameret","doi":"10.1109/CCC.2009.9","DOIUrl":"https://doi.org/10.1109/CCC.2009.9","url":null,"abstract":"Devising an efficient deterministic -- or even a non-deterministic sub-exponential time -- algorithm for testing polynomial identities is a fundamental problem in algebraic complexity and complexity at large. Motivated by this problem, as well as by results from proof complexity, we investigate the complexity of _proving_ polynomial identities. To this end, we study a class of equational proof systems, of varying strength, operating with polynomial identities written as arithmetic formulas over a given ring. A proof in these systems establishes that two arithmetic formulas compute the same polynomial, and consists of a sequence of equations between polynomials, written as arithmetic formulas, where each equation in the sequence is derived from previous equations by means of the polynomial-ring axioms. We establish the first non-trivial upper and lower bounds on the size of equational proofs of polynomial identities, as follows: 1. Polynomial-size upper bounds on equational proofs of identities involving symmetric polynomials and interpolation-based identities. In particular, we show that basic properties of the elementary symmetric polynomials are efficiently provable already in equational proofs operating with depth-4 formulas, over infinite fields. This also yields polynomial-size depth-4 proofs of the Newton identities, providing a positive answer to a question posed by Grigoriev and Hirsch [GH03]. 2. Exponential-size lower bounds on (full, unrestricted) equational proofs of identities over certain specific rings. 3. Exponential-size lower bounds on analytic proofs operating with depth-3 formulas, under a certain regularity condition. The ``analytic'' requirement is, roughly, a condition that forbids introducing arbitrary formulas in a proof and the regularity condition is an additional structural restriction. 4. Exponential-size lower bounds on one-way proofs (of unrestricted depth) over infinite fields. Here, one-way proofs are analytic proofs, in which one is also not allowed to introduce arbitrary constants. Furthermore, we determine basic structural characterizations of equational proofs, and consider relations with polynomial identity testing procedures. Specifically, we show that equational proofs efficiently simulate the polynomial identity testing algorithm provided by Dvir and Shpilka [DS04].","PeriodicalId":158572,"journal":{"name":"2009 24th Annual IEEE Conference on Computational Complexity","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127278922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Fixed-Polynomial Size Circuit Bounds 固定多项式大小的电路边界
2009 24th Annual IEEE Conference on Computational Complexity Pub Date : 2009-07-15 DOI: 10.1109/CCC.2009.21
L. Fortnow, R. Santhanam
{"title":"Fixed-Polynomial Size Circuit Bounds","authors":"L. Fortnow, R. Santhanam","doi":"10.1109/CCC.2009.21","DOIUrl":"https://doi.org/10.1109/CCC.2009.21","url":null,"abstract":"In 1982, Kannan showed that $Sigma^P_2$ does not have $n^k$-sized circuits for any $k$. Do smaller classes also admit such circuit lower bounds? Despite several improvements of Kannan's result, we still cannot prove that $P^NP$ does not have linear size circuits. Work of Aaronson and Wigderson provides strong evidence -- the ``algebrization'' barrier -- that current techniques have inherent limitations in this respect. We explore questions about fixed-polynomial size circuit lower bounds around and beyond the algebrization barrier. We find several connections, including begin{itemize} item The following are equivalent: begin{itemize} item $NP$ is in $SIZE(n^k)$ (has $O(n^k)$-size circuit families) for some $k$ item For each $c$, $P^{NP[n^c]}$ is in $SIZE(n^k)$ for some $k$ item $ONP/1$ is in $SIZE(n^k)$ for some $k$, where $ONP$ is the class of languages accepted {it obliviously} by $NP$ machines, with witnesses for ``yes'' instances depending only on the input length. end{itemize} item For a large number of natural classes ${cal C}$ and all $k geq 1$, ${cal C}$ is in $SIZE(n^k)$ if and only if ${cal C}/1capP/poly$ is in $SIZE(n^k)$. item If there is a $d$ such that $MATIME(n) subseteq NTIME(n^d)$, then $P^{NP}$ does not have $O(n^k)$ size circuits for any $k ≫ 0$. item One cannot show $n^2$-size circuit lower bounds for $oplus P$ without new nonrelativizing techniques. In particular, the proof that $PP notsubseteq SIZE(n^k)$ for all $k$ relies on the (relativizing) result that $P^{PP} subseteq MA Longrightarrow PP notsubseteq SIZE(n^k)$, and we give an oracle relative to which $P^{oplus P} subseteq MA$ and $oplus P subseteq SIZE(n^2)$ both hold. end{itemize}","PeriodicalId":158572,"journal":{"name":"2009 24th Annual IEEE Conference on Computational Complexity","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123708451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Planar Graph Isomorphism is in Log-Space 平面图同构存在于对数空间中
2009 24th Annual IEEE Conference on Computational Complexity Pub Date : 2009-07-15 DOI: 10.1145/3543686
Samir Datta, N. Limaye, Prajakta Nimbhorkar, T. Thierauf, Fabian Wagner
{"title":"Planar Graph Isomorphism is in Log-Space","authors":"Samir Datta, N. Limaye, Prajakta Nimbhorkar, T. Thierauf, Fabian Wagner","doi":"10.1145/3543686","DOIUrl":"https://doi.org/10.1145/3543686","url":null,"abstract":"Graph Isomorphism is the prime example of a computational problem with a wide difference between the best known lower and upper bounds on its complexity. There is a significant gap between extant lower and upper bounds for planar graphs as well. We bridge the gap for this natural and important special case by presenting an upper bound that matches the known log-space hardness [JKMT03]. In fact, we show the formally stronger result that planar graph canonization is in log-space. This improves the previously known upper bound of AC1 [MR91]. Our algorithm first constructs the biconnected component tree of a connected planar graph and then refines each biconnected component into a triconnected component tree. The next step is to log-space reduce the biconnected planar graph isomorphism and canonization problems to those for 3-connected planar graphs, which are known to be in log-space by [DLN08]. This is achieved by using the above decomposition, and by making significant modifications to Lindell’s algorithm for tree canonization, along with changes in the space complexity analysis. The reduction from the connected case to the biconnected case requires further new ideas, including a non-trivial case analysis and a group theoretic lemma to bound the number of automorphisms of a colored 3-connected planar graph. This lemma is crucial for the reduction to work in log-space.","PeriodicalId":158572,"journal":{"name":"2009 24th Annual IEEE Conference on Computational Complexity","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114136528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 75
The Maximum Communication Complexity of Multi-Party Pointer Jumping 多方指针跳转的最大通信复杂度
2009 24th Annual IEEE Conference on Computational Complexity Pub Date : 2009-07-15 DOI: 10.1109/CCC.2009.30
Joshua Brody
{"title":"The Maximum Communication Complexity of Multi-Party Pointer Jumping","authors":"Joshua Brody","doi":"10.1109/CCC.2009.30","DOIUrl":"https://doi.org/10.1109/CCC.2009.30","url":null,"abstract":"We study the one-way number-on-the-forhead (NOF) communication complexity of the $k$-layer pointer jumping problem. Strong lower bounds for this problem would have important implications in circuit complexity. All of our results apply to myopic protocols (where players see only one layer ahead, but can still see arbitrarily far behind them.) Furthermore, our results apply to the maximum communication complexity, where a protocol is charged for the maximum communication sent by a single player rather than the total communication sent by all players. Our main result is a lower bound of $n/2$ bits for deterministic protocols, independent of the number of players. We also provide a matching upper bound, as well as an $Omega(n/klog n)$ lower bound for randomized protocols, improving on the bounds of Chakrabarti. In the non-Boolean version of the problem, we give a lower bound of $n (log^{(k-1)} n)(1-o(1))$ bits, essentially matching the upper bound from Damm et al.","PeriodicalId":158572,"journal":{"name":"2009 24th Annual IEEE Conference on Computational Complexity","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121952903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
On Basing ZK ≠ BPP on the Hardness of PAC Learning 基于PAC学习难度的ZK≠BPP
2009 24th Annual IEEE Conference on Computational Complexity Pub Date : 2009-07-15 DOI: 10.1109/CCC.2009.11
David Xiao
{"title":"On Basing ZK ≠ BPP on the Hardness of PAC Learning","authors":"David Xiao","doi":"10.1109/CCC.2009.11","DOIUrl":"https://doi.org/10.1109/CCC.2009.11","url":null,"abstract":"Learning is a central task in computer science, and there are various formalisms for capturing the notion. One important model studied in computational learning theory is the PAC model of Valiant (CACM 1984). On the other hand, in cryptography the notion of \"learning nothing'' is often modelled by the simulation paradigm: in an interactive protocol, a party learns nothing if it can produce a transcript of the protocol by itself that is indistinguishable from what it gets by interacting with other parties. The most famous example of this paradigm is zero knowledge proofs, introduced by Goldwasser, Micali, and Rackoff (SICOMP 1989). Applebaum et al. (FOCS 2008) observed that a theorem of Ostrovsky and Wigderson (ISTCS 1993) combined with the transformation of one-way functions to pseudo-random functions (Hastad et al. SICOMP 1999, Goldreich et al. J. ACM 1986) implies that if there exist non-trivial languages with zero-knowledge arguments, then no efficient algorithm can PAC learn polynomial-size circuits. They also prove a weak reverse implication, that if a certain non-standard learning task is hard, then zero knowledge is non-trivial. This motivates the question we explore here: can one prove that hardness of PAC learning is equivalent to non-triviality of zero-knowledge? We show that this statement cannot be proven via the following techniques: 1. Relativizing techniques: there exists an oracle relative to which learning polynomial-size circuits is hard and yet the class of languages with zero knowledge arguments is trivial. 2. Semi-black-box techniques: if there is a black-box construction of a zero-knowledge argument for an NP-complete language (possibly with a non-black-box security reduction) based on hardness of PAC learning, then NP has statistical zero knowledge proofs, namely NP is contained in SZK. Under the standard conjecture that NP is not contained in SZK, our results imply that most standard techniques do not suffice to prove the equivalence between the non-triviality of zero knowledge and the hardness of PAC learning. Our results hold even when considering non-uniform hardness of PAC learning with membership queries. In addition, our technique relies on a new kind of separating oracle that may be of independent interest.","PeriodicalId":158572,"journal":{"name":"2009 24th Annual IEEE Conference on Computational Complexity","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127543359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
One-Way Functions and the Berman-Hartmanis Conjecture 单向函数与Berman-Hartmanis猜想
2009 24th Annual IEEE Conference on Computational Complexity Pub Date : 2009-07-15 DOI: 10.1109/CCC.2009.17
Manindra Agrawal, O. Watanabe
{"title":"One-Way Functions and the Berman-Hartmanis Conjecture","authors":"Manindra Agrawal, O. Watanabe","doi":"10.1109/CCC.2009.17","DOIUrl":"https://doi.org/10.1109/CCC.2009.17","url":null,"abstract":"The Berman-Hartmanis conjecture states that all NP-complete sets are P-isomorphic each other. On this conjecture, we first improve the previous result of Agrawal and show that all NP-complete sets are P/poly-time computable 1,li-reducible to each other based on the assumption that there exist regular one-way functions that cannot be inverted by randomized polynomial-time algorithms. Secondly, we show that, besides the above assumption, if all one-way functions have some easy part to invert, then all NP-complete sets are P/poly-isomorphic to each other.","PeriodicalId":158572,"journal":{"name":"2009 24th Annual IEEE Conference on Computational Complexity","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123685330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Regularity, Boosting, and Efficiently Simulating Every High-Entropy Distribution 规则性、增强和高效模拟每一个高熵分布
2009 24th Annual IEEE Conference on Computational Complexity Pub Date : 2009-07-15 DOI: 10.1109/CCC.2009.41
L. Trevisan, Madhur Tulsiani, S. Vadhan
{"title":"Regularity, Boosting, and Efficiently Simulating Every High-Entropy Distribution","authors":"L. Trevisan, Madhur Tulsiani, S. Vadhan","doi":"10.1109/CCC.2009.41","DOIUrl":"https://doi.org/10.1109/CCC.2009.41","url":null,"abstract":"We show that every bounded function g: {0,1}^n -≫ [0,1] admits an efficiently computable \"simulator\" function h: {0,1}^n-≫[0,1] such that every fixed polynomial size circuit has approximately the same correlation with g as with h. If g describes (up to scaling) a high min-entropy distribution D, then h can be used to efficiently sample a distribution D' of the same min-entropy that is indistinguishable from D by circuits of fixed polynomial size. We state and prove our result in a more abstract setting, in which we allow arbitrary finite domains instead of {0,1}^n, and arbitrary families of distinguishers, instead of fixed polynomial size circuits. Our result implies (a) the Weak Szemeredi Regularity Lemma of Frieze and Kannan (b) a constructive version of the Dense Model Theorem of Green, Tao and Ziegler with better quantitative parameters (polynomial rather than exponential in the distinguishing probability), and (c) the Impagliazzo Hardcore Set Lemma. It appears to be the general result underlying the known connections between \"regularity\" results in graph theory, \"decomposition\" results in additive combinatorics, and the Hardcore Lemma in complexity theory. We present two proofs of our result, one in the spirit of Nisan's proof of the Hardcore Lemma via duality of linear programming, and one similar to Impagliazzo's \"boosting\" proof. A third proof by iterative partitioning, which gives the complexity of the sampler to be exponential in the distinguishing probability, is also implicit in the Green-Tao-Ziegler proofs of the Dense Model Theorem.","PeriodicalId":158572,"journal":{"name":"2009 24th Annual IEEE Conference on Computational Complexity","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128557646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 79
Poly-logarithmic Independence Fools AC^0 Circuits 多对数独立性愚AC^0电路
2009 24th Annual IEEE Conference on Computational Complexity Pub Date : 2009-07-15 DOI: 10.1145/1754399.1754401
M. Braverman
{"title":"Poly-logarithmic Independence Fools AC^0 Circuits","authors":"M. Braverman","doi":"10.1145/1754399.1754401","DOIUrl":"https://doi.org/10.1145/1754399.1754401","url":null,"abstract":"We prove that poly-sized AC^0 circuits cannot distinguish a poly-logarithmically independent distribution from the uniform one. This settles the 1990 conjecture by Linial and Nisan [LN90]. The only prior progress on the problem was by Bazzi [Baz07], who showed that O(log^2 n)-independent distributions fool poly-size DNF formulas. Razborov [Raz08] has later given a much simpler proof for Bazzi’s theorem.","PeriodicalId":158572,"journal":{"name":"2009 24th Annual IEEE Conference on Computational Complexity","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128647996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 105
Increasing the Gap between Descriptional Complexity and Algorithmic Probability 增加描述复杂性和算法概率之间的差距
2009 24th Annual IEEE Conference on Computational Complexity Pub Date : 2009-07-15 DOI: 10.1109/CCC.2009.13
A. Day
{"title":"Increasing the Gap between Descriptional Complexity and Algorithmic Probability","authors":"A. Day","doi":"10.1109/CCC.2009.13","DOIUrl":"https://doi.org/10.1109/CCC.2009.13","url":null,"abstract":"The coding theorem is a fundamental result of algorithmic information theory. A well known theorem of Gács shows that the analog of the coding theorem fails for continuous sample spaces. This means that descriptional monotonic complexity does not coincide within an additive constant with the negative logarithm of algorithmic probability. Gács's proof provided a lower bound on the difference between these values. He showed that for infinitely many finite binary strings, this difference was greater than a version of the inverse Ackermann function applied to string length. This paper establishes that this lower bound can be substantially improved. The inverse Ackermann function can be replaced with a function O(log(log(x))). This shows that in continuous sample spaces, descriptional monotonic complexity and algorithmic probability are very different. While this proof builds on the original work by Gács, it does have a number of new features, in particular, the algorithm at the heart of the proof works on sets of strings as opposed to individual strings.","PeriodicalId":158572,"journal":{"name":"2009 24th Annual IEEE Conference on Computational Complexity","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116673596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Lower Bounds on Quantum Multiparty Communication Complexity 量子多方通信复杂度的下界
2009 24th Annual IEEE Conference on Computational Complexity Pub Date : 2009-07-15 DOI: 10.1109/CCC.2009.24
Troy Lee, G. Schechtman, A. Shraibman
{"title":"Lower Bounds on Quantum Multiparty Communication Complexity","authors":"Troy Lee, G. Schechtman, A. Shraibman","doi":"10.1109/CCC.2009.24","DOIUrl":"https://doi.org/10.1109/CCC.2009.24","url":null,"abstract":"A major open question in communication complexity is if randomized and quantum communication are polynomially related for all total functions. So far, no gap larger than a power of two is known, despite significant efforts. We examine this question in the number-on-the-forehead model of multiparty communication complexity. We show that essentially all lower bounds known on randomized complexity in this model also hold for quantum communication. This includes bounds of size Omega(n/2^k) for the k-party complexity of explicit functions, bounds for the generalized inner product function, and recent work on the multiparty complexity of disjointness. To the best of our knowledge, these are the first lower bounds of any kind on quantum communication in the general number-on-the-forehead model. We show this result in the following way. In the two-party case, there is a lower bound on quantum communication complexity in terms of a norm gamma_2, which is known to subsume nearly all other techniques in the literature. For randomized complexity there is another natural bound in terms of a different norm mu which is also one of the strongest techniques available. A deep theorem in functional analysis, Grothendieck's inequality, implies that gamma_2 and mu are equivalent up to a constant factor. This connection is one of the major obstacles to showing a larger gap between randomized and quantum communication complexity in the two-party case. The lower bound technique in terms of the norm mu was recently extended to the multiparty number-on-the-forehead model. Here we show how the gamma_2 norm can be also extended to lower bound quantum multiparty complexity. Surprisingly, even in this general setting the two lower bounds, on quantum and classical communication, are still very closely related. This implies that separating quantum and classical communication in this setting will require the development of new techniques. The relation between these extensions of mu and gamma_2 is proved by a multi-dimensional version of Grothendieck's inequality.","PeriodicalId":158572,"journal":{"name":"2009 24th Annual IEEE Conference on Computational Complexity","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121567883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信