Theory of Computing Systems最新文献

筛选
英文 中文
Approximation Algorithms for the MAXSPACE Advertisement Problem MAXSPACE 广告问题的近似算法
IF 0.5 4区 计算机科学
Theory of Computing Systems Pub Date : 2024-03-25 DOI: 10.1007/s00224-024-10170-2
Lehilton L. C. Pedrosa, Mauro R. C. da Silva, Rafael C. S. Schouery
{"title":"Approximation Algorithms for the MAXSPACE Advertisement Problem","authors":"Lehilton L. C. Pedrosa, Mauro R. C. da Silva, Rafael C. S. Schouery","doi":"10.1007/s00224-024-10170-2","DOIUrl":"https://doi.org/10.1007/s00224-024-10170-2","url":null,"abstract":"<p>In MAXSPACE, given a set of ads <span>(mathcal {A})</span>, one wants to schedule a subset <span>({mathcal {A}'subseteq mathcal {A}})</span> into <i>K</i> slots <span>({B_1, dots , B_K})</span> of size <i>L</i>. Each ad <span>({A_i in mathcal {A}})</span> has a <i>size</i> <span>(s_i)</span> and a <i>frequency</i> <span>(w_i)</span>. A schedule is feasible if the total size of ads in any slot is at most <i>L</i>, and each ad <span>({A_i in mathcal {A}'})</span> appears in exactly <span>(w_i)</span> slots and at most once per slot. The goal is to find a feasible schedule that maximizes the sum of the space occupied by all slots. We consider a generalization called MAXSPACE-R for which an ad <span>(A_i)</span> also has a release date <span>(r_i)</span> and may only appear in a slot <span>(B_j)</span> if <span>({j ge r_i})</span>. For this variant, we give a 1/9-approximation algorithm. Furthermore, we consider MAXSPACE-RDV for which an ad <span>(A_i)</span> also has a deadline <span>(d_i)</span> (and may only appear in a slot <span>(B_j)</span> with <span>(r_i le j le d_i)</span>), and a value <span>(v_i)</span> that is the gain of each assigned copy of <span>(A_i)</span> (which can be unrelated to <span>(s_i)</span>). We present a polynomial-time approximation scheme for this problem when <i>K</i> is bounded by a constant. This is the best factor one can expect since MAXSPACE is strongly NP-hard, even if <span>(K = 2)</span>.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":"52 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2024-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140301610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Imperative Process Algebra and Models of Parallel Computation 强制过程代数和并行计算模型
IF 0.5 4区 计算机科学
Theory of Computing Systems Pub Date : 2024-03-14 DOI: 10.1007/s00224-024-10164-0
Cornelis A. Middelburg
{"title":"Imperative Process Algebra and Models of Parallel Computation","authors":"Cornelis A. Middelburg","doi":"10.1007/s00224-024-10164-0","DOIUrl":"https://doi.org/10.1007/s00224-024-10164-0","url":null,"abstract":"<p>Studies of issues related to computability and computational complexity involve the use of a model of computation. Central in such a model are computational processes. Processes of this kind can be described using an imperative process algebra based on ACP (Algebra of Communicating Processes). In this paper, it is investigated whether the imperative process algebra concerned can play a role in the field of models of computation. It is demonstrated that the process algebra is suitable to describe in a mathematically precise way models of computation corresponding to existing models based on sequential, asynchronous parallel, and synchronous parallel random access machines as well as time and work complexity measures for those models.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":"7 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2024-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140153092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performing Regular Operations with 1-Limited Automata 用 1 限自动机执行正则运算
IF 0.5 4区 计算机科学
Theory of Computing Systems Pub Date : 2024-03-14 DOI: 10.1007/s00224-024-10163-1
Giovanni Pighizzini, Luca Prigioniero, Šimon Sádovský
{"title":"Performing Regular Operations with 1-Limited Automata","authors":"Giovanni Pighizzini, Luca Prigioniero, Šimon Sádovský","doi":"10.1007/s00224-024-10163-1","DOIUrl":"https://doi.org/10.1007/s00224-024-10163-1","url":null,"abstract":"<p>The descriptional complexity of basic operations on regular languages using 1-limited automata, a restricted version of one-tape Turing machines, is investigated. When simulating operations on deterministic finite automata with deterministic 1-limited automata, the sizes of the resulting devices are polynomial in the sizes of the simulated machines. The situation is different when the operations are applied to deterministic 1-limited automata: while for boolean operations the simulations remain polynomial, for product, star, and reversal they cost exponential in size. The costs for product and star do not reduce if the given machines are sweeping two-way deterministic finite automata. These bounds are tight.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":"7 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2024-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140153339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Linear Codes Correcting Repeated Bursts Equipped with Homogeneous Distance 利用同质距离校正重复突发的线性编码
IF 0.5 4区 计算机科学
Theory of Computing Systems Pub Date : 2024-03-06 DOI: 10.1007/s00224-024-10166-y
{"title":"Linear Codes Correcting Repeated Bursts Equipped with Homogeneous Distance","authors":"","doi":"10.1007/s00224-024-10166-y","DOIUrl":"https://doi.org/10.1007/s00224-024-10166-y","url":null,"abstract":"<h3>Abstract</h3> <p>The homogeneous weight (metric) is useful in the construction of codes over a ring of integers <span> <span>(mathbb {Z}_{p^l})</span> </span> (<em>p</em> prime and <span> <span>(l ge 1)</span> </span> an integer). It becomes Hamming weight when the ring is taken to be a finite field and becomes Lee weight when the ring is taken to be <span> <span>(mathbb {Z}_{4})</span> </span>. This paper presents homogeneous weight distribution and total homogeneous weight of burst and repeated burst errors in the code space of <em>n</em>-tuples over <span> <span>(mathbb {Z}_{p^l})</span> </span>. Necessary and sufficient conditions for existence of an (<em>n</em>, <em>k</em>) linear code over <span> <span>(mathbb {Z}_{p^l})</span> </span> correcting the error patterns with respect to the homogeneous weight are derived.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":"16 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2024-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140046197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New Results on the Remote Set Problem and Its Applications in Complexity Study 远程集问题的新成果及其在复杂性研究中的应用
IF 0.5 4区 计算机科学
Theory of Computing Systems Pub Date : 2024-03-05 DOI: 10.1007/s00224-024-10162-2
Yijie Chen, Kewei Lv
{"title":"New Results on the Remote Set Problem and Its Applications in Complexity Study","authors":"Yijie Chen, Kewei Lv","doi":"10.1007/s00224-024-10162-2","DOIUrl":"https://doi.org/10.1007/s00224-024-10162-2","url":null,"abstract":"<p>In 2015, Haviv introduced the Remote set problem (RSP) and studied the complexity of the covering radius problem (CRP), which is a classical problem in lattices. The RSP aims to identify a set containing a point that is sufficiently distant from a given lattice <span>(pmb {mathcal {L}})</span>. It introduced a new method for analyzing the complexity of CRP. An open question in RSP is whether we can obtain the approximation factor <span>(gamma =1/2)</span>. This paper investigates this question and proposes a probabilistic polynomial-time algorithm for RSP with an approximation factor of <span>(1/2-1/(clambda ^{(p)}_n))</span>, where <span>(cin mathbb {Z}^{+})</span> and <span>(lambda ^{(p)}_n)</span> is the <i>n</i>-th successive minima in lattice under <span>(l_p)</span>-norm. For a given lattice <span>(pmb {mathcal {L}})</span> with rank <i>n</i> and positive integer <i>d</i>, our algorithm outputs a set <i>S</i> of size <i>d</i> in polynomial time. This set <i>S</i> includes a point at least <span>((frac{1}{2}-frac{1}{clambda ^{(p)}_n}){{rho }^{(p)}}(pmb {mathcal {L}}))</span> from lattice <span>(pmb {mathcal {L}})</span> with a probability greater than <span>(1-1/2^d)</span>. Here, <i>c</i> is a positive integer and <span>(rho ^{(p)}(pmb {mathcal {L}}))</span> denotes the covering radius of <span>(pmb {mathcal {L}})</span> in <span>(l_p)</span>-norm(<span>(1le ple infty )</span>). Based on this, we obtain that <span>(text {GAPCRP}_{2+1/2^{O(n)}})</span> belongs to the complexity class coRP, and we provide new reductions from GAPCRP to GAPCVP.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":"65 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2024-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140034561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Non-principal Arithmetical Numberings and Families 论非主流算术级数和族
IF 0.5 4区 计算机科学
Theory of Computing Systems Pub Date : 2024-02-23 DOI: 10.1007/s00224-024-10165-z
Marat Faizrahmanov
{"title":"On Non-principal Arithmetical Numberings and Families","authors":"Marat Faizrahmanov","doi":"10.1007/s00224-024-10165-z","DOIUrl":"https://doi.org/10.1007/s00224-024-10165-z","url":null,"abstract":"<p>The paper studies <span>(varvec{Sigma ^0_n})</span>-computable families (<span>(varvec{ngeqslant 2})</span>) and their numberings. It is proved that any non-trivial <span>(varvec{Sigma ^0_n})</span>-computable family has a complete with respect to any of its elements <span>(varvec{Sigma ^0_n})</span>-computable non-principal numbering. It is established that if a <span>(varvec{Sigma ^0_n})</span>-computable family is not principal, then any of its <span>(varvec{Sigma ^0_n})</span>-computable numberings has a minimal cover and, if the family is infinite, is incomparable with one of its minimal <span>(varvec{Sigma ^0_n})</span>-computable numberings. It is also shown that for any <span>(varvec{Sigma ^0_n})</span>-computable numbering <span>(varvec{nu })</span> of a <span>(varvec{Sigma ^0_n})</span>-computable non-principal family there exists its <span>(varvec{Sigma ^0_n})</span>-computable numbering that is incomparable with <span>(varvec{nu })</span>. If a non-trivial <span>(varvec{Sigma ^0_n})</span>-computable family contains the least and greatest elements under inclusion, then for any of its <span>(varvec{Sigma ^0_n})</span>-computable non-principal non-least numberings <span>(varvec{nu })</span> there exists a <span>(varvec{Sigma ^0_n})</span>-computable numbering of the family incomparable with <span>(varvec{nu })</span>. In particular, this is true for the family of all <span>(varvec{Sigma ^0_n})</span>-sets and for the families consisting of two inclusion-comparable <span>(varvec{Sigma ^0_n})</span>-sets (semilattices of the <span>(varvec{Sigma ^0_n})</span>-computable numberings of such families are isomorphic to the semilattice of <span>(varvec{m})</span>-degrees of <span>(varvec{Sigma ^0_n})</span>-sets).</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":"7 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2024-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139955332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Complexity of the (Connected) Cluster Vertex Deletion Problem on H-free Graphs 无 H 图上(连接)簇顶点删除问题的复杂性
IF 0.5 4区 计算机科学
Theory of Computing Systems Pub Date : 2024-02-23 DOI: 10.1007/s00224-024-10161-3
Hoang-Oanh Le, Van Bang Le
{"title":"Complexity of the (Connected) Cluster Vertex Deletion Problem on H-free Graphs","authors":"Hoang-Oanh Le, Van Bang Le","doi":"10.1007/s00224-024-10161-3","DOIUrl":"https://doi.org/10.1007/s00224-024-10161-3","url":null,"abstract":"<p>The well-known Cluster Vertex Deletion problem (<span>cluster-vd</span>) asks for a given graph <i>G</i> and an integer <i>k</i> whether it is possible to delete a set <i>S</i> of at most <i>k</i> vertices of <i>G</i> such that the resulting graph <span>(G-S)</span> is a cluster graph (a disjoint union of cliques). We give a complete characterization of graphs <i>H</i> for which <span>cluster-vd</span> on <i>H</i>-free graphs is polynomially solvable and for which it is <span>(textsf{NP})</span>-complete. Moreover, in the <span>(textsf{NP})</span>-completeness cases, <span>cluster-vd</span> cannot be solved in sub-exponential time in the vertex number of the <i>H</i>-free input graphs unless the Exponential-Time Hypothesis fails. We also consider the connected variant of <span>cluster-vd</span>, the Connected Cluster Vertex Deletion problem (<span>connected cluster-vd</span>), in which the set <i>S</i> has to induce a connected subgraph of <i>G</i>. It turns out that <span>connected cluster-vd</span> admits the same complexity dichotomy for <i>H</i>-free graphs. Our results enlarge a list of rare dichotomy theorems for well-studied problems on <i>H</i>-free graphs.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":"41 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2024-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139955176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Decidability of Infix Inclusion Problem 论无穷包含问题的可判定性
IF 0.5 4区 计算机科学
Theory of Computing Systems Pub Date : 2024-01-13 DOI: 10.1007/s00224-023-10160-w
{"title":"On the Decidability of Infix Inclusion Problem","authors":"","doi":"10.1007/s00224-023-10160-w","DOIUrl":"https://doi.org/10.1007/s00224-023-10160-w","url":null,"abstract":"<h3>Abstract</h3> <p>We introduce the infix inclusion problem of two languages <em>S</em> and <em>T</em> that decides whether or not <em>S</em> is a subset of the set of all infixes of <em>T</em>. This problem is motivated by the need for identifying malicious computation patterns according to their semantics, which are often disguised with additional sub-patterns surrounding information. In other words, malicious patterns are embedded as an infix of the whole pattern. We examine the infix inclusion problem for the case where a source <em>S</em> and a target <em>T</em> are finite, regular or context-free languages. We prove that the problem is 1) <span>co-NP-complete</span> when one of the languages is finite, 2) <span>PSPACE-complete</span> when both <em>S</em> and <em>T</em> are regular, 3) <span>EXPTIME-complete</span> when <em>S</em> is context-free and <em>T</em> is regular, 4) undecidable when <em>S</em> is either regular or context-free and <em>T</em> is context-free and 5) undecidable when one of <em>S</em> and <em>T</em> is in a language class where the emptiness of its languages is undecidable, even if the other is finite. We, furthermore, explore the infix inclusion problem for visibly pushdown languages, a subclass of context-free languages.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":"31 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2024-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139459373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Farkas Bounds on Horn Constraint Systems 角约束系统的法卡斯界值
IF 0.5 4区 计算机科学
Theory of Computing Systems Pub Date : 2024-01-06 DOI: 10.1007/s00224-023-10156-6
K. Subramani, Piotr Wojciechowki, Alvaro Velasquez
{"title":"Farkas Bounds on Horn Constraint Systems","authors":"K. Subramani, Piotr Wojciechowki, Alvaro Velasquez","doi":"10.1007/s00224-023-10156-6","DOIUrl":"https://doi.org/10.1007/s00224-023-10156-6","url":null,"abstract":"<p>In this paper, we analyze the copy complexity of unsatisfiable Horn constraint systems, under the ADD refutation system. Recall that a linear constraint of the form <span>(sum _{i=1}^{n} a_{i}cdot x_{i} ge b)</span>, is said to be a horn constraint if all the <span>(a_{i} in {0,1,-1})</span> and at most one of the <span>(a_{i})</span>s is positive. A conjunction of such constraints is called a Horn constraint system (HCS). Horn constraints arise in a number of domains including, but not limited to, program verification, power systems, econometrics, and operations research. The ADD refutation system is both <b>sound</b> and <b>complete</b>. Additionally, it is the simplest and most natural refutation system for refuting the feasibility of a system of linear constraints. The copy complexity of an infeasible linear constraint system (not necessarily Horn) in a refutation system, is the minimum number of times each constraint needs to be replicated, in order to obtain a read-once refutation. We show that for an HCS with <i>n</i> variables and <i>m</i> constraints, the copy complexity is at most <span>(2^{n-1})</span>, in the ADD refutation system. Additionally, we analyze bounded-width HCSs from the perspective of copy complexity. Finally, we provide an empirical analysis of an integer programming formulation of the copy complexity problem in HCSs. (An extended abstract was published in FroCos 2021 [26].)</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":"4 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139373777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Polynomial Recursive Sequences. 论多项式递推序列。
IF 0.6 4区 计算机科学
Theory of Computing Systems Pub Date : 2024-01-01 Epub Date: 2021-06-02 DOI: 10.1007/s00224-021-10046-9
Michaël Cadilhac, Filip Mazowiecki, Charles Paperman, Michał Pilipczuk, Géraud Sénizergues
{"title":"On Polynomial Recursive Sequences.","authors":"Michaël Cadilhac, Filip Mazowiecki, Charles Paperman, Michał Pilipczuk, Géraud Sénizergues","doi":"10.1007/s00224-021-10046-9","DOIUrl":"https://doi.org/10.1007/s00224-021-10046-9","url":null,"abstract":"<p><p>We study the expressive power of <i>polynomial recursive sequences</i>, a nonlinear extension of the well-known class of linear recursive sequences. These sequences arise naturally in the study of nonlinear extensions of weighted automata, where (non)expressiveness results translate to class separations. A typical example of a polynomial recursive sequence is <i>b</i> <sub><i>n</i></sub> = <i>n</i>!. Our main result is that the sequence <i>u</i> <sub><i>n</i></sub> = <i>n</i> <sup><i>n</i></sup> is not polynomial recursive.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":"68 4","pages":"593-614"},"PeriodicalIF":0.6,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11343969/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142056552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信