International Symposium on Mathematical Foundations of Computer Science最新文献

筛选
英文 中文
Independent set reconfiguration on directed graphs 有向图上的独立集重构
International Symposium on Mathematical Foundations of Computer Science Pub Date : 2022-03-25 DOI: 10.48550/arXiv.2203.13435
Takehiro Ito, Yuni Iwamasa, Yasuaki Kobayashi, Yu Nakahata, Y. Otachi, Masahiro Takahashi, Kunihiro Wasa
{"title":"Independent set reconfiguration on directed graphs","authors":"Takehiro Ito, Yuni Iwamasa, Yasuaki Kobayashi, Yu Nakahata, Y. Otachi, Masahiro Takahashi, Kunihiro Wasa","doi":"10.48550/arXiv.2203.13435","DOIUrl":"https://doi.org/10.48550/arXiv.2203.13435","url":null,"abstract":"Directed Token Sliding asks, given a directed graph and two sets of pairwise non-adjacent vertices, whether one can reach from one set to the other by repeatedly applying a local operation that exchanges a vertex in the current set with one of its out-neighbors, while keeping the nonadjacency. It can be seen as a reconfiguration process where a token is placed on each vertex in the current set, and the local operation slides a token along an arc respect-ing its direction. Previously, such a problem was extensively studied on undirected graphs, where the edges have no directions and thus the local operation is symmetric. Directed Token Sliding is a generalization of its undirected variant since an undirected edge can be simulated by two arcs of opposite directions. In this paper, we initiate the algorithmic study of Directed Token Sliding . We first observe that the problem is PSPACE-complete even if we forbid parallel arcs in opposite directions and that the problem on directed acyclic graphs is NP-complete and W[1]-hard parameterized by the size of the sets in consideration. We then show our main result: a linear-time algorithm for the problem on directed graphs whose underlying undirected graphs are trees, which are called polytrees. Such a result is also known for the undirected variant of the problem on trees [Demaine et al. TCS 2015], but the techniques used here are quite different because of the asymmetric nature of the directed problem. We present a characterization of yes-instances based on the existence of a certain set of directed paths, and then derive simple equivalent conditions from it by some observations, which admits an efficient algorithm. For the polytree case, we also present a quadratic-time algorithm that outputs, if the input is a yes-instance, one of the shortest reconfiguration sequences.","PeriodicalId":369104,"journal":{"name":"International Symposium on Mathematical Foundations of Computer Science","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114691571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
On the Skolem Problem for Reversible Sequences 关于可逆序列的Skolem问题
International Symposium on Mathematical Foundations of Computer Science Pub Date : 2022-03-14 DOI: 10.48550/arXiv.2203.07061
George Kenison
{"title":"On the Skolem Problem for Reversible Sequences","authors":"George Kenison","doi":"10.48550/arXiv.2203.07061","DOIUrl":"https://doi.org/10.48550/arXiv.2203.07061","url":null,"abstract":"Given an integer linear recurrence sequence h X n i ∞ n =0 , the Skolem Problem asks to determine whether there is an n ∈ N 0 such that X n = 0. Recent work by Lipton, Luca, Nieuwveld, Ouaknine, Purser, and Worrell proved that the Skolem Problem is decidable for a class of reversible sequences of order at most seven. Here we give an alternative proof of their result. Our novel approach employs a powerful result for Galois conjugates that lie on two concentric circles due to Dubickas and Smyth.","PeriodicalId":369104,"journal":{"name":"International Symposium on Mathematical Foundations of Computer Science","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128428138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
CNF Encodings of Parity 校验校验的CNF编码
International Symposium on Mathematical Foundations of Computer Science Pub Date : 2022-03-02 DOI: 10.48550/arXiv.2203.01082
G. Emdin, A. Kulikov, Ivan Mihajlin, Nikita Slezkin
{"title":"CNF Encodings of Parity","authors":"G. Emdin, A. Kulikov, Ivan Mihajlin, Nikita Slezkin","doi":"10.48550/arXiv.2203.01082","DOIUrl":"https://doi.org/10.48550/arXiv.2203.01082","url":null,"abstract":"The minimum number of clauses in a CNF representation of the parity function x 1 ⊕ x 2 ⊕ · · · ⊕ x n is 2 n − 1 . One can obtain a more compact CNF encoding by using non-deterministic variables (also known as guess or auxiliary variables). In this paper, we prove the following lower bounds, that almost match known upper bounds, on the number m of clauses and the maximum width k of clauses: 1) if there are at most s auxiliary variables, then m ≥ Ω (cid:0) 2 n/ ( s +1) /n (cid:1) and k ≥ n/ ( s + 1); 2) the minimum number of clauses is at least 3 n . We derive the first two bounds from the Satisfiability Coding Lemma due to Paturi, Pudlák, and Zane using a tight connection between CNF encodings and depth-3 circuits. In particular, we show that lower bounds on the size of a CNF encoding of a Boolean function imply depth-3 circuit lower bounds for this function. of","PeriodicalId":369104,"journal":{"name":"International Symposium on Mathematical Foundations of Computer Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122695442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Algebraic Representations of Unique Bipartite Perfect Matching 唯一二部完美匹配的代数表示
International Symposium on Mathematical Foundations of Computer Science Pub Date : 2022-03-02 DOI: 10.48550/arXiv.2203.01071
Gal Beniamini
{"title":"Algebraic Representations of Unique Bipartite Perfect Matching","authors":"Gal Beniamini","doi":"10.48550/arXiv.2203.01071","DOIUrl":"https://doi.org/10.48550/arXiv.2203.01071","url":null,"abstract":"We obtain complete characterizations of the Unique Bipartite Perfect Matching function, and of its Boolean dual, using multilinear polynomials over the reals. Building on previous results, we show that, surprisingly, the dual description is sparse and has low $ell_1$-norm -- only exponential in $Theta(n log n)$, and this result extends even to other families of matching-related functions. Our approach relies on the M\"obius numbers in the matching-covered lattice, and a key ingredient in our proof is M\"obius' inversion formula. These polynomial representations yield complexity-theoretic results. For instance, we show that unique bipartite matching is evasive for classical decision trees, and nearly evasive even for generalized query models. We also obtain a tight $Theta(n log n)$ bound on the log-rank of the associated two-party communication task.","PeriodicalId":369104,"journal":{"name":"International Symposium on Mathematical Foundations of Computer Science","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121077667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The complexity of computing optimum labelings for temporal connectivity 计算时间连通性的最佳标签的复杂性
International Symposium on Mathematical Foundations of Computer Science Pub Date : 2022-02-11 DOI: 10.4230/LIPIcs.MFCS.2022.62
Nina Klobas, G. Mertzios, Hendrik Molter, P. Spirakis
{"title":"The complexity of computing optimum labelings for temporal connectivity","authors":"Nina Klobas, G. Mertzios, Hendrik Molter, P. Spirakis","doi":"10.4230/LIPIcs.MFCS.2022.62","DOIUrl":"https://doi.org/10.4230/LIPIcs.MFCS.2022.62","url":null,"abstract":"A graph is temporally connected if there exists a strict temporal path, i.e. a path whose edges have strictly increasing labels, from every vertex $u$ to every other vertex $v$. In this paper we study temporal design problems for undirected temporally connected graphs. The basic setting of these optimization problems is as follows: given a connected undirected graph $G$, what is the smallest number $|lambda|$ of time-labels that we need to add to the edges of $G$ such that the resulting temporal graph $(G,lambda)$ is temporally connected? As it turns out, this basic problem, called MINIMUM LABELING (ML), can be optimally solved in polynomial time. However, exploiting the temporal dimension, the problem becomes more interesting and meaningful in its following variations, which we investigate in this paper. First we consider the problem MIN. AGED LABELING (MAL) of temporally connecting the graph when we are given an upper-bound on the allowed age (i.e. maximum label) of the obtained temporal graph $(G,lambda)$. Second we consider the problem MIN. STEINER LABELING (MSL), where the aim is now to have a temporal path between any pair of\"terminals\"vertices which lie in a subset $Rsubseteq V$. This relaxed problem resembles STEINER TREE in static graphs. However, due to the requirement of strictly increasing labels in a temporal path, STEINER TREE is not a special case of MSL. Finally we consider the age-restricted version of MSL, namely MIN. AGED STEINER LABELING (MASL). Our main results are threefold: we prove that (i) MAL becomes NP-complete on undirected graphs, while (ii) MASL becomes W[1]-hard with respect to the number $|R|$ of terminals. On the other hand we prove that (iii) although the age-unrestricted problem MSL is NP-hard, it is in FPT with respect to the number $|R|$ of terminals. That is, adding the age restriction, makes the above problems strictly harder.","PeriodicalId":369104,"journal":{"name":"International Symposium on Mathematical Foundations of Computer Science","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116969324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
On the Identity Problem for Unitriangular Matrices of Dimension Four 关于四维酉角矩阵的恒等问题
International Symposium on Mathematical Foundations of Computer Science Pub Date : 2022-02-10 DOI: 10.4230/LIPIcs.MFCS.2022.43
Rui-Tao Dong
{"title":"On the Identity Problem for Unitriangular Matrices of Dimension Four","authors":"Rui-Tao Dong","doi":"10.4230/LIPIcs.MFCS.2022.43","DOIUrl":"https://doi.org/10.4230/LIPIcs.MFCS.2022.43","url":null,"abstract":"We show that the Identity Problem is decidable in polynomial time for finitely generated sub-semigroups of the group $mathsf{UT}(4, mathbb{Z})$ of $4 times 4$ unitriangular integer matrices. As a byproduct of our proof, we also show the polynomial-time decidability of several subset reachability problems in $mathsf{UT}(4, mathbb{Z})$.","PeriodicalId":369104,"journal":{"name":"International Symposium on Mathematical Foundations of Computer Science","volume":"32 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132760956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Tree exploration in dual-memory model 双内存模型中的树探索
International Symposium on Mathematical Foundations of Computer Science Pub Date : 2021-12-26 DOI: 10.4230/LIPIcs.MFCS.2022.22
Dominik Bojko, Karol Gotfryd, D. Kowalski, Dominik Pajak
{"title":"Tree exploration in dual-memory model","authors":"Dominik Bojko, Karol Gotfryd, D. Kowalski, Dominik Pajak","doi":"10.4230/LIPIcs.MFCS.2022.22","DOIUrl":"https://doi.org/10.4230/LIPIcs.MFCS.2022.22","url":null,"abstract":"We study the problem of online tree exploration by a deterministic mobile agent. Our main objective is to establish what features of the model of the mobile agent and the environment allow linear exploration time. We study agents that, upon entering a node, do not receive as input the edge via which they entered. In such model, deterministic memoryless exploration is infeasible, hence the agent needs to be allowed to use some memory. The memory can be located at the agent or at each node. The existing lower bounds show that if the memory is either only at the agent or only at the nodes, then the exploration needs superlinear time. We show that tree exploration in dual-memory model, with constant memory at the agent and logarithmic in the degree at each node is possible in linear time when one of the two additional features is present: fixed initial state of the memory at each node (so called clean memory) or a single movable token. We present two algorithms working in linear time for arbitrary trees in these two models. On the other hand, in our lower bound we show that if the agent has a single bit of memory and one bit is present at each node, then the exploration may require quadratic time even on paths, if the initial memory at nodes could be set arbitrarily (so called dirty memory). This shows that having clean node memory or a token allows linear time exploration of trees in the dual-memory model, but having neither of those features may lead to quadratic exploration time even on a simple path. of the on feasibility of we show that is possible to complete the tree exploration in the minimum possible linear time using (asymptotically) minimal memory. We show two algorithms in models CleanMem and Token , exploring arbitrary unknown trees in the optimal time O ( n ) if constant memory is located at the agent and logarithmic memory is located at each node. Our results show that in the context of tree exploration in dual-memory model, the assumption about clean (fixed initial state of node can be “traded” for a token.","PeriodicalId":369104,"journal":{"name":"International Symposium on Mathematical Foundations of Computer Science","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132963300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Algorithms Based on Finitely Many Homomorphism Counts 基于有限多同态计数的算法
International Symposium on Mathematical Foundations of Computer Science Pub Date : 2021-11-25 DOI: 10.4230/LIPIcs.MFCS.2022.32
Yijia Chen, J. Flum, Mingjun Liu, Zhiyang Xun
{"title":"On Algorithms Based on Finitely Many Homomorphism Counts","authors":"Yijia Chen, J. Flum, Mingjun Liu, Zhiyang Xun","doi":"10.4230/LIPIcs.MFCS.2022.32","DOIUrl":"https://doi.org/10.4230/LIPIcs.MFCS.2022.32","url":null,"abstract":"It is well known [Lov'asz, 67] that up to isomorphism a graph~$G$ is determined by the homomorphism counts $hom(F, G)$, i.e., the number of homomorphisms from $F$ to $G$, where $F$ ranges over all graphs. Thus, in principle, we can answer any query concerning $G$ with only accessing the $hom(cdot,G)$'s instead of $G$ itself. In this paper, we deal with queries for which there is a hom algorithm, i.e., there are finitely many graphs $F_1, ldots, F_k$ such that for any graph $G$ whether it is a Yes-instance of the query is already determined by the vector[overrightarrow{hom}_{F_1,ldots,F_k}(G):= big(hom(F_1,G),ldots,hom(F_k,G)big),]where the graphs $F_1, ldots, F_k$ only depend on $varphi$. We observe that planarity of graphs and 3-colorability of graphs, properties expressible in monadic second-order logic, have no hom algorithm. On the other hand, queries expressible as a Boolean combination of universal sentences in first-order logic FO have a hom algorithm. Even though it is not easy to find FO definable queries without a hom algorithm, we succeed to show this for the non-existence of an isolated vertex, a property expressible by the FO sentence $forall xexists y Exy$, somehow the ``simplest'' graph property not definable by a Boolean combination of universal sentences.These results provide a characterization of the prefix classes of first-order logic with the property that each query definable by a sentence of the prefix class has a hom algorithm. For adaptive query algorithms, i.e., algorithms that again access $overrightarrow{hom}_{F_1,ldots,F_k}(G)$ but here $F_{i+1}$ might depend on $hom(F_1,G),ldots,hom(F_i,G)$, we show that three homomorphism counts $hom(cdot,G)$ are both sufficient and in general necessary to determine the isomorphism type of $G$.","PeriodicalId":369104,"journal":{"name":"International Symposium on Mathematical Foundations of Computer Science","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128154785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Weyl Criterion for Finite-State Dimension 有限状态维的Weyl准则
International Symposium on Mathematical Foundations of Computer Science Pub Date : 2021-11-07 DOI: 10.4230/LIPIcs.MFCS.2023.65
J. H. Lutz, S. Nandakumar, Subin Pulari
{"title":"A Weyl Criterion for Finite-State Dimension","authors":"J. H. Lutz, S. Nandakumar, Subin Pulari","doi":"10.4230/LIPIcs.MFCS.2023.65","DOIUrl":"https://doi.org/10.4230/LIPIcs.MFCS.2023.65","url":null,"abstract":"Finite-state dimension, introduced early in this century as a finite-state version of classical Hausdorff dimension, is a quantitative measure of the lower asymptotic density of information in an infinite sequence over a finite alphabet, as perceived by finite automata. Finite-state dimension is a robust concept that now has equivalent formulations in terms of finite-state gambling, lossless finite-state data compression, finite-state prediction, entropy rates, and automatic Kolmogorov complexity. The Schnorr-Stimm dichotomy theorem gave the first automata-theoretic characterization of normal sequences, which had been studied in analytic number theory since Borel defined them. This theorem implies that a sequence (or a real number having this sequence as its base-b expansion) is normal if and only if it has finite-state dimension 1. One of the most powerful classical tools for investigating normal numbers is the Weyl criterion, which characterizes normality in terms of exponential sums. Such sums are well studied objects with many connections to other aspects of analytic number theory, and this has made use of Weyl criterion especially fruitful. This raises the question whether Weyl criterion can be generalized from finite-state dimension 1 to arbitrary finite-state dimensions, thereby making it a quantitative tool for studying data compression, prediction, etc. This paper does exactly this. We extend the Weyl criterion from a characterization of sequences with finite-state dimension 1 to a criterion that characterizes every finite-state dimension. This turns out not to be a routine generalization of the original Weyl criterion. Even though exponential sums may diverge for non-normal numbers, finite-state dimension can be characterized in terms of the dimensions of the subsequence limits of the exponential sums. We demonstrate the utility of our criterion though examples.","PeriodicalId":369104,"journal":{"name":"International Symposium on Mathematical Foundations of Computer Science","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114204902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fine-Grained Complexity of Rainbow Coloring and its Variants 彩虹着色的细粒度复杂性及其变体
International Symposium on Mathematical Foundations of Computer Science Pub Date : 2021-10-01 DOI: 10.4230/LIPIcs.MFCS.2017.60
A. Agrawal
{"title":"Fine-Grained Complexity of Rainbow Coloring and its Variants","authors":"A. Agrawal","doi":"10.4230/LIPIcs.MFCS.2017.60","DOIUrl":"https://doi.org/10.4230/LIPIcs.MFCS.2017.60","url":null,"abstract":"Abstract For a graph G and c R : E ( G ) → [ k ] , a path P between u , v ∈ V ( G ) is a rainbow path if for distinct e , e ′ ∈ E ( P ) , we have c R ( e ) ≠ c R ( e ′ ) . Rainbow k -Coloring takes a graph G and the objective is to check if there is c R : E ( G ) → [ k ] such that for all u , v ∈ V ( G ) there is a rainbow path between u and v. Two variants of the above problem are Subset Rainbow k -Coloring and Steiner Rainbow k -Coloring , where we are additionally given a subset S ⊆ V ( G ) × V ( G ) and S ′ ⊆ V ( G ) , respectively. Moreover, the objective is to check if there is c R : E ( G ) → [ k ] , such that there is a rainbow path for each ( u , v ) ∈ S and u , v ∈ S ′ , respectively. Under ETH, we obtain that for each k ≥ 3 : 1. Rainbow k -Coloring has no 2 o ( | E ( G ) | ) n O ( 1 ) -time algorithm. 2. Steiner Rainbow k -Coloring has no 2 o ( | S | 2 ) n O ( 1 ) -time algorithm. We also obtain that Subset Rainbow k -Coloring and Steiner Rainbow k -Coloring admit 2 O ( | S | ) n O ( 1 ) - and 2 O ( | S | 2 ) n O ( 1 ) -time algorithms, respectively.","PeriodicalId":369104,"journal":{"name":"International Symposium on Mathematical Foundations of Computer Science","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129995385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信