Journal of Symbolic Computation最新文献

筛选
英文 中文
Tensor decompositions on simplicial complexes with invariance 具有不变性的简单复数上的张量分解
IF 0.7 4区 数学
Journal of Symbolic Computation Pub Date : 2024-01-19 DOI: 10.1016/j.jsc.2024.102299
Gemma De las Cuevas , Matt Hoogsteder Riera , Tim Netzer
{"title":"Tensor decompositions on simplicial complexes with invariance","authors":"Gemma De las Cuevas ,&nbsp;Matt Hoogsteder Riera ,&nbsp;Tim Netzer","doi":"10.1016/j.jsc.2024.102299","DOIUrl":"10.1016/j.jsc.2024.102299","url":null,"abstract":"<div><p><span>Tensors are ubiquitous in mathematics and the sciences, as they allow to store information in a concise way. Decompositions of tensors may give insights into their structure and complexity. In this work, we develop a new framework for decompositions of tensors, taking into account invariance, positivity and a geometric arrangement of their local spaces. We define an invariant decomposition with indices arranged on a simplicial complex which is explicitly invariant under a group action. We give a constructive proof that this decomposition exists for all invariant tensors, after possibly enriching the simplicial complex. We further define several decompositions certifying positivity, and prove similar existence results, as well as inequalities between the corresponding ranks. Our results generalize results from the theory of </span>tensor networks, used in the study of quantum many-body systems, for example.</p></div>","PeriodicalId":50031,"journal":{"name":"Journal of Symbolic Computation","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2024-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139497517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computing the binomial part of a polynomial ideal 计算多项式理想的二项式部分
IF 0.7 4区 数学
Journal of Symbolic Computation Pub Date : 2024-01-14 DOI: 10.1016/j.jsc.2024.102298
Martin Kreuzer, Florian Walsh
{"title":"Computing the binomial part of a polynomial ideal","authors":"Martin Kreuzer,&nbsp;Florian Walsh","doi":"10.1016/j.jsc.2024.102298","DOIUrl":"10.1016/j.jsc.2024.102298","url":null,"abstract":"<div><p>Given an ideal <em>I</em> in a polynomial ring <span><math><mi>K</mi><mo>[</mo><msub><mrow><mi>x</mi></mrow><mrow><mn>1</mn></mrow></msub><mo>,</mo><mo>…</mo><mo>,</mo><msub><mrow><mi>x</mi></mrow><mrow><mi>n</mi></mrow></msub><mo>]</mo></math></span> over a field <em>K</em>, we present a complete algorithm to compute the binomial part of <em>I</em>, i.e., the subideal <span><math><mrow><mi>Bin</mi></mrow><mo>(</mo><mi>I</mi><mo>)</mo></math></span> of <em>I</em> generated by all monomials and binomials in <em>I</em>. This is achieved step-by-step. First we collect and extend several algorithms for computing exponent lattices in different kinds of fields. Then we generalize them to compute exponent lattices of units in 0-dimensional <em>K</em>-algebras, where we have to generalize the computation of the separable part of an algebra to non-perfect fields in characteristic <em>p</em>. Next we examine the computation of unit lattices in finitely generated <em>K</em>-algebras, as well as their associated characters and lattice ideals. This allows us to calculate <span><math><mrow><mi>Bin</mi></mrow><mo>(</mo><mi>I</mi><mo>)</mo></math></span> when <em>I</em> is saturated with respect to the indeterminates by reducing the task to the 0-dimensional case. Finally, we treat the computation of <span><math><mrow><mi>Bin</mi></mrow><mo>(</mo><mi>I</mi><mo>)</mo></math></span> for general ideals by computing their cellular decomposition and dealing with finitely many special ideals called <span><math><mo>(</mo><mi>s</mi><mo>,</mo><mi>t</mi><mo>)</mo></math></span>-binomial parts. All algorithms have been implemented in <span>SageMath</span>.</p></div>","PeriodicalId":50031,"journal":{"name":"Journal of Symbolic Computation","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2024-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0747717124000026/pdfft?md5=bc32bb62dcb12f7f2c1d113994ec49bf&pid=1-s2.0-S0747717124000026-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139462707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A post-quantum key exchange protocol from the intersection of conics 来自圆锥交点的后量子密钥交换协议
IF 0.7 4区 数学
Journal of Symbolic Computation Pub Date : 2024-01-05 DOI: 10.1016/j.jsc.2024.102297
Alberto Alzati, Daniele Di Tullio, Manoj Gyawali, Alfonso Tortora
{"title":"A post-quantum key exchange protocol from the intersection of conics","authors":"Alberto Alzati, Daniele Di Tullio, Manoj Gyawali, Alfonso Tortora","doi":"10.1016/j.jsc.2024.102297","DOIUrl":"https://doi.org/10.1016/j.jsc.2024.102297","url":null,"abstract":"<p>In this paper we present a key exchange protocol in which Alice and Bob have secret keys given by two conics embedded in a large ambient space by means of the Veronese embedding and public keys given by hyperplanes containing the embedded curves. Both of them construct some common invariants given by the intersection of two conics.</p>","PeriodicalId":50031,"journal":{"name":"Journal of Symbolic Computation","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2024-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139102670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An effective decomposition theorem for Schubert varieties 舒伯特变换的一个有效分解定理
IF 0.7 4区 数学
Journal of Symbolic Computation Pub Date : 2024-01-01 DOI: 10.1016/j.jsc.2023.102238
Francesca Cioffi, Davide Franco, Carmine Sessa
{"title":"An effective decomposition theorem for Schubert varieties","authors":"Francesca Cioffi,&nbsp;Davide Franco,&nbsp;Carmine Sessa","doi":"10.1016/j.jsc.2023.102238","DOIUrl":"https://doi.org/10.1016/j.jsc.2023.102238","url":null,"abstract":"","PeriodicalId":50031,"journal":{"name":"Journal of Symbolic Computation","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49727688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Theta nullvalues of supersingular Abelian varieties 超星阿贝尔变体的 Theta 空值
IF 0.7 4区 数学
Journal of Symbolic Computation Pub Date : 2023-12-29 DOI: 10.1016/j.jsc.2023.102296
Andreas Pieper
{"title":"Theta nullvalues of supersingular Abelian varieties","authors":"Andreas Pieper","doi":"10.1016/j.jsc.2023.102296","DOIUrl":"10.1016/j.jsc.2023.102296","url":null,"abstract":"<div><p>Let <em>η</em><span> be a polarization with connected kernel on a superspecial abelian variety </span><span><math><msup><mrow><mi>E</mi></mrow><mrow><mi>g</mi></mrow></msup></math></span>. We give a sufficient criterion which allows the computation of the theta nullvalues of any quotient of <span><math><msup><mrow><mi>E</mi></mrow><mrow><mi>g</mi></mrow></msup></math></span> by a maximal isotropic subgroup scheme of <span><math><mi>ker</mi><mo>⁡</mo><mo>(</mo><mi>η</mi><mo>)</mo></math></span> effectively.</p><p>This criterion is satisfied in many situations studied by <span>Li and Oort (1998)</span>. We used our method to implement an algorithm that computes supersingular curves of genus 3.</p></div>","PeriodicalId":50031,"journal":{"name":"Journal of Symbolic Computation","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2023-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139065849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A note on the relation between recognisable series and regular sequences, and their minimal linear representations 关于可识别数列和正则表达式及其最小线性表示之间关系的说明
IF 0.7 4区 数学
Journal of Symbolic Computation Pub Date : 2023-12-28 DOI: 10.1016/j.jsc.2023.102295
Clemens Heuberger , Daniel Krenn , Gabriel F. Lipnik
{"title":"A note on the relation between recognisable series and regular sequences, and their minimal linear representations","authors":"Clemens Heuberger ,&nbsp;Daniel Krenn ,&nbsp;Gabriel F. Lipnik","doi":"10.1016/j.jsc.2023.102295","DOIUrl":"10.1016/j.jsc.2023.102295","url":null,"abstract":"<div><p>In this note, we precisely elaborate the connection between recognisable series (in the sense of Berstel and Reutenauer) and <em>q</em>-regular sequences (in the sense of Allouche and Shallit) via their linear representations. In particular, we show that the minimisation algorithm for recognisable series can also be used to minimise linear representations of <em>q</em>-regular sequences.</p></div>","PeriodicalId":50031,"journal":{"name":"Journal of Symbolic Computation","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2023-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0747717123001098/pdfft?md5=492907babc8de19f0ee8ae11896722d4&pid=1-s2.0-S0747717123001098-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139065963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Axioms for a theory of signature bases 签名基础理论的公理
IF 0.7 4区 数学
Journal of Symbolic Computation Pub Date : 2023-12-18 DOI: 10.1016/j.jsc.2023.102275
Pierre Lairez
{"title":"Axioms for a theory of signature bases","authors":"Pierre Lairez","doi":"10.1016/j.jsc.2023.102275","DOIUrl":"10.1016/j.jsc.2023.102275","url":null,"abstract":"<div><p><span>Twenty years after the discovery of the F5 algorithm, Gröbner bases with signatures are still challenging to understand and to adapt to different settings. This contrasts with Buchberger's algorithm, which we can bend in many directions keeping correctness and termination obvious. I propose an axiomatic approach to Gröbner bases with signatures with the purpose of uncoupling the theory and the algorithms, giving general results applicable in many different settings (e.g. Gröbner for </span>submodules, F4-style reduction, noncommutative rings, non-Noetherian settings, etc.), and extending the reach of signature algorithms.</p></div>","PeriodicalId":50031,"journal":{"name":"Journal of Symbolic Computation","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2023-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138742217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computing primitive idempotents in finite commutative rings and applications 计算有限交换环中的基元幂级数及其应用
IF 0.7 4区 数学
Journal of Symbolic Computation Pub Date : 2023-12-15 DOI: 10.1016/j.jsc.2023.102294
Mugurel Barcau , Vicenţiu Paşol
{"title":"Computing primitive idempotents in finite commutative rings and applications","authors":"Mugurel Barcau ,&nbsp;Vicenţiu Paşol","doi":"10.1016/j.jsc.2023.102294","DOIUrl":"10.1016/j.jsc.2023.102294","url":null,"abstract":"<div><p><span>In this paper, we compute an algebraic decomposition of black-box rings in the generic ring model. More precisely, we explicitly decompose a black-box ring as a direct product of a nilpotent black-box ring and unital local black-box rings, by computing all its primitive idempotents. The algorithm presented in this paper uses quantum subroutines for the computation of the </span><em>p</em>-power parts of a black-box ring and then classical algorithms for the computation of the corresponding primitive idempotents. As a by-product, we get that the reduction of a black-box ring is also a black-box ring. The first application of this decomposition is an extension of the work of <span>Maurer and Raub (2007)</span> on representation problem in black-box finite fields to the case of reduced <em>p</em>-power black-box rings. Another important application is an <span><math><msup><mrow><mtext>IND-CCA</mtext></mrow><mrow><mn>1</mn></mrow></msup></math></span><span> attack for any ring homomorphic encryption scheme<span> in the generic ring model. Moreover, when the plaintext space is a finite reduced black-box ring, we present a plaintext-recovery attack based on representation problem in black-box prime fields. In particular, if the ciphertext space has smooth characteristic, the plaintext-recovery attack is effectively computable in the generic ring model.</span></span></p></div>","PeriodicalId":50031,"journal":{"name":"Journal of Symbolic Computation","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2023-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138688298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fast computation of the centralizer of a permutation group in the symmetric group 对称群中置换群中心化器的快速计算
IF 0.7 4区 数学
Journal of Symbolic Computation Pub Date : 2023-12-05 DOI: 10.1016/j.jsc.2023.102287
Rok Požar
{"title":"Fast computation of the centralizer of a permutation group in the symmetric group","authors":"Rok Požar","doi":"10.1016/j.jsc.2023.102287","DOIUrl":"10.1016/j.jsc.2023.102287","url":null,"abstract":"<div><p>Let <em>G</em><span> be a permutation group acting on a set Ω. Best known algorithms for computing the centralizer of </span><em>G</em><span> in the symmetric group on Ω are all based on the same general approach that involves solving the following two fundamental problems: given a </span><em>G</em>-orbit Δ of size <em>n</em>, compute the centralizer of the restriction of <em>G</em> to Δ in the symmetric group on Δ; and given two <em>G</em>-orbits Δ and <span><math><msup><mrow><mi>Δ</mi></mrow><mrow><mo>′</mo></mrow></msup></math></span> each of size <em>n</em>, find an equivalence between the action of <em>G</em> restricted to Δ and the action of <em>G</em> restricted to <span><math><msup><mrow><mi>Δ</mi></mrow><mrow><mo>′</mo></mrow></msup></math></span> when one exists. If <em>G</em> is given by a generating set <em>X</em>, previous solutions to each of these two problems take <span><math><mi>O</mi><mo>(</mo><mo>|</mo><mi>X</mi><mo>|</mo><msup><mrow><mi>n</mi></mrow><mrow><mn>2</mn></mrow></msup><mo>)</mo></math></span> time.</p><p>In this paper, we first solve each fundamental problem in <span><math><mi>O</mi><mo>(</mo><mi>δ</mi><mi>n</mi><mo>+</mo><mo>|</mo><mi>X</mi><mo>|</mo><mi>n</mi><mi>log</mi><mo>⁡</mo><mi>n</mi><mo>)</mo></math></span> time, where <em>δ</em> is the depth of the breadth-first-search Schreier tree for <em>X</em> rooted at some fixed vertex. For the important class of small-base groups <em>G</em>, we improve the theoretical worst-case time bound of our solutions to <span><math><mi>O</mi><mo>(</mo><mi>n</mi><msup><mrow><mi>log</mi></mrow><mrow><mi>c</mi></mrow></msup><mo>⁡</mo><mi>n</mi><mo>+</mo><mo>|</mo><mi>X</mi><mo>|</mo><mi>n</mi><mi>log</mi><mo>⁡</mo><mi>n</mi><mo>)</mo></math></span> for some constant <em>c</em>. Moreover, if <span><math><mo>⌈</mo><mn>20</mn><msub><mrow><mi>log</mi></mrow><mrow><mn>2</mn></mrow></msub><mo>⁡</mo><mi>n</mi><mo>⌉</mo></math></span> uniformly distributed random elements of <em>G</em><span> are given in advance, our solutions have, with probability at least </span><span><math><mn>1</mn><mo>−</mo><mn>1</mn><mo>/</mo><mi>n</mi></math></span>, a running time of <span><math><mi>O</mi><mo>(</mo><mi>n</mi><msup><mrow><mi>log</mi></mrow><mrow><mn>2</mn></mrow></msup><mo>⁡</mo><mi>n</mi><mo>+</mo><mo>|</mo><mi>X</mi><mo>|</mo><mi>n</mi><mi>log</mi><mo>⁡</mo><mi>n</mi><mo>)</mo></math></span>. We then apply our solutions to obtain a more efficient algorithm for computing the centralizer of <em>G</em> in the symmetric group on Ω. In an experimental evaluation we demonstrate that it is substantially faster than previously known algorithms.</p></div>","PeriodicalId":50031,"journal":{"name":"Journal of Symbolic Computation","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2023-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138513693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Levelwise construction of a single cylindrical algebraic cell 一个圆柱代数单元的水平构造
IF 0.7 4区 数学
Journal of Symbolic Computation Pub Date : 2023-12-05 DOI: 10.1016/j.jsc.2023.102288
Jasper Nalbach , Erika Ábrahám , Philippe Specht , Christopher W. Brown , James H. Davenport , Matthew England
{"title":"Levelwise construction of a single cylindrical algebraic cell","authors":"Jasper Nalbach ,&nbsp;Erika Ábrahám ,&nbsp;Philippe Specht ,&nbsp;Christopher W. Brown ,&nbsp;James H. Davenport ,&nbsp;Matthew England","doi":"10.1016/j.jsc.2023.102288","DOIUrl":"10.1016/j.jsc.2023.102288","url":null,"abstract":"<div><p><em>Satisfiability modulo theories (SMT)</em> solvers check the satisfiability of quantifier-free first-order logic formulae over different theories. We consider the theory of <em>non-linear real arithmetic</em> where the formulae are logical combinations of polynomial constraints. Here a commonly used tool is the <em>cylindrical algebraic decomposition (CAD)</em> to decompose the real space into cells where the constraints are truth-invariant through the use of <em>projection polynomials</em>.</p><p>A CAD encodes more information than necessary for checking satisfiability. One approach to address this is to repackage the CAD theory into a search-based algorithm: one that guesses sample points to satisfy the formula, and generalizes guesses that conflict constraints to cylindrical cells around samples which are avoided in the continuing search. This can lead to a satisfying assignment more quickly, or conclude unsatisfiability with far fewer cells. A notable example of this approach is Jovanović and de Moura's <em>NLSAT</em> algorithm. Since these cells are being produced locally to a sample there is scope to use fewer projection polynomials than the traditional CAD projection. The original NLSAT algorithm reduced the set a little; while Brown's <em>single cell construction</em> reduced it much further still. However, it refines a cell polynomial-by-polynomial, meaning the shape and size of the cell produced depends on the order in which the polynomials are considered.</p><p>The present paper proposes a method to construct such cells <em>levelwise</em>, i.e. built level-by-level according to a variable ordering instead of polynomial-by-polynomial for all levels. We still use a reduced number of projection polynomials, but can now consider a variety of different reductions and use <em>heuristics</em> to select the projection polynomials in order to optimize the shape of the cell under construction. The new method can thus improve the performance of the NLSAT algorithm. We formulate all the necessary theory that underpins the algorithm as a <em>proof system</em>: while not a common presentation for work in this field, it is valuable in allowing an elegant decoupling of heuristic decisions from the main algorithm and its proof of correctness. We expect the symbolic computation community may find uses for it in other areas too. In particular, the proof system could be a step towards formal proofs for non-linear real arithmetic.</p><p>This work has been implemented in the SMT-RAT solver and the benefits of the levelwise construction are validated experimentally on the SMT-LIB benchmark library. We also compare several heuristics for the construction and observe that each heuristic has strengths offering potential for further exploitation of the new approach.</p></div>","PeriodicalId":50031,"journal":{"name":"Journal of Symbolic Computation","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2023-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0747717123001025/pdfft?md5=f45eafa5ba7d71b914304fbba6948761&pid=1-s2.0-S0747717123001025-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138513690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信