Christel Baier , Stefan Kiefer , Joachim Klein , David Müller , James Worrell
{"title":"Markov chains and unambiguous automata","authors":"Christel Baier , Stefan Kiefer , Joachim Klein , David Müller , James Worrell","doi":"10.1016/j.jcss.2023.03.005","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.03.005","url":null,"abstract":"<div><p>Unambiguous automata are nondeterministic automata in which every word has at most one accepting run. In this paper we give a polynomial-time algorithm for model checking discrete-time Markov chains against <em>ω</em>-regular specifications represented as unambiguous automata. We furthermore show that the complexity of this model checking problem lies in NC: the subclass of P comprising those problems solvable in poly-logarithmic parallel time. These complexity bounds match the known bounds for model checking Markov chains against specifications given as deterministic automata, notwithstanding the fact that unambiguous automata can be exponentially more succinct than deterministic automata. We report on an implementation of our procedure, including an experiment in which the implementation is used to model check LTL formulas on Markov chains.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"136 ","pages":"Pages 113-134"},"PeriodicalIF":1.1,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49725773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
David Caballero , Timothy Gomez , Robert Schweller , Tim Wylie
{"title":"Complexity of verification in self-assembly with prebuilt assemblies","authors":"David Caballero , Timothy Gomez , Robert Schweller , Tim Wylie","doi":"10.1016/j.jcss.2023.03.002","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.03.002","url":null,"abstract":"<div><p><span>We analyze the complexity of two fundamental verification problems within a generalization of the two-handed tile self-assembly model (2HAM) where initial system assemblies are not restricted to be singleton tiles, but may be larger prebuilt assemblies. Within this model we consider the </span><em>producibility</em> problem, which asks if a given tile system builds, or produces, a given assembly, and the <em>unique assembly verification</em> (UAV) problem, which asks if a given system <em>uniquely</em> produces a given assembly. We show that producibility is NP-complete and UAV is coNP<span><math><msup><mrow></mrow><mrow><mi>N</mi><mi>P</mi></mrow></msup></math></span><span>-complete even when the initial assembly size and temperature threshold are both bounded by a constant. This is in stark contrast to results in the standard model with singleton input tiles where producibility is in P and UAV is coNP-complete with constant temperature. We further provide preliminary polynomial time results for producibility and UAV in the case of 1-dimensional </span><em>linear</em> assemblies with pre-built assemblies, as well as extend our results to the abstract Tile Assembly Model (aTAM) with constant-size attachable assemblies.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"136 ","pages":"Pages 1-16"},"PeriodicalIF":1.1,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49752946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Controlling entity integrity with key sets","authors":"Miika Hannula , Xinyi Li , Sebastian Link","doi":"10.1016/j.jcss.2023.04.004","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.04.004","url":null,"abstract":"<div><p><span>Codd's rule of entity integrity stipulates that every table has a primary key. Key sets can control entity integrity when primary keys do not exist. While key set validation is quadratic, update maintenance for unary key sets is efficient when incomplete values only occur in few key columns. We establish a binary axiomatization for the implication problem, and prove its </span><span>coNP</span><span><span>-completeness. However, the implication of unary by arbitrary key sets has better properties. The fragment enjoys a unary axiomatization and is decidable in quadratic time. Hence, we can minimize overheads before validating key sets. While Armstrong relations do not always exist, we show how to compute them for any instance of our fragment. Similarly, we show how unary keys sets can be mined from relations using hypergraph transversals. Finally, we establish an axiomatization and </span>computational complexity for the implication problem of key sets combined with </span><span>NOT NULL</span> constraints.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"136 ","pages":"Pages 195-219"},"PeriodicalIF":1.1,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49725739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ashwin Jacob , Diptapriyo Majumdar , Venkatesh Raman
{"title":"Deletion to scattered graph classes II - improved FPT algorithms for deletion to pairs of graph classes","authors":"Ashwin Jacob , Diptapriyo Majumdar , Venkatesh Raman","doi":"10.1016/j.jcss.2023.03.004","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.03.004","url":null,"abstract":"<div><p>The problem of deletion of vertices to a hereditary graph class is a well-studied problem in parameterized complexity. Recently, a natural extension of the problem was initiated where we are given a finite set of hereditary graph classes and we determine whether <em>k</em> vertices can be deleted from a given graph so that the connected components of the resulting graph belong to one of the given hereditary graph classes. The problem is shown to be fixed parameter tractable (FPT) when the deletion problem to each of the given hereditary graph classes is fixed-parameter tractable, and the property of being in any of the graph classes is expressible in the counting monodic second order (CMSO) logic. This paper focuses on pairs of specific graph classes (<span><math><msub><mrow><mi>Π</mi></mrow><mrow><mn>1</mn></mrow></msub><mo>,</mo><msub><mrow><mi>Π</mi></mrow><mrow><mn>2</mn></mrow></msub></math></span><span>) in which we would like the connected components of the resulting graph to belong to, and design simpler and more efficient FPT algorithms.</span></p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"136 ","pages":"Pages 280-301"},"PeriodicalIF":1.1,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49725452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Parameterized complexity of categorical clustering with size constraints","authors":"Fedor V. Fomin, Petr A. Golovach, Nidhi Purohit","doi":"10.1016/j.jcss.2023.03.006","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.03.006","url":null,"abstract":"<div><p>In the <span>Categorical Clustering</span> problem, we are given a set of vectors (matrix) <span><math><mi>A</mi><mo>=</mo><mo>{</mo><msub><mrow><mi>a</mi></mrow><mrow><mn>1</mn></mrow></msub><mo>,</mo><mo>…</mo><mo>,</mo><msub><mrow><mi>a</mi></mrow><mrow><mi>n</mi></mrow></msub><mo>}</mo></math></span> over <span><math><msup><mrow><mi>Σ</mi></mrow><mrow><mi>m</mi></mrow></msup></math></span>, where Σ is a finite alphabet, and integers <em>k</em> and <em>B</em>. The task is to partition <strong>A</strong> into <em>k</em> clusters such that the median objective of the clustering in the Hamming norm is at most <em>B</em>. Fomin, Golovach, and Panolan [ICALP 2018] proved that the problem is fixed-parameter tractable for the binary case <span><math><mi>Σ</mi><mo>=</mo><mo>{</mo><mn>0</mn><mo>,</mo><mn>1</mn><mo>}</mo></math></span>. We extend this algorithmic result to a popular capacitated clustering model, where in addition the sizes of the clusters are lower and upper bounded by integer parameters <em>p</em> and <em>q</em>, respectively. Our main theorem is that the problem is solvable in time <span><math><msup><mrow><mn>2</mn></mrow><mrow><mi>O</mi><mo>(</mo><mi>B</mi><mi>log</mi><mo></mo><mi>B</mi><mo>)</mo></mrow></msup><mo>|</mo><mi>Σ</mi><msup><mrow><mo>|</mo></mrow><mrow><mi>B</mi></mrow></msup><mo>⋅</mo><msup><mrow><mo>(</mo><mi>m</mi><mi>n</mi><mo>)</mo></mrow><mrow><mi>O</mi><mo>(</mo><mn>1</mn><mo>)</mo></mrow></msup></math></span>.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"136 ","pages":"Pages 171-194"},"PeriodicalIF":1.1,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49725736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Grid recognition: Classical and parameterized computational perspectives","authors":"Siddharth Gupta , Guy Sa'ar , Meirav Zehavi","doi":"10.1016/j.jcss.2023.02.008","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.02.008","url":null,"abstract":"<div><p>Over the past few decades, a large body of works studied the (in)tractability of various computational problems on grid graphs, which often yield substantially faster algorithms than general graphs. Unfortunately, the recognition of a grid graph is hard—it was shown to be NP-hard already in 1987. In this paper, we provide several positive results in this regard in the framework of parameterized complexity. Specifically, our contribution is threefold. First, we show that the problem is FPT parameterized by <span><math><mi>k</mi><mo>+</mo><mrow><mi>mcc</mi></mrow></math></span> where <span><math><mi>mcc</mi></math></span> is the maximum size of a connected component of <em>G</em>. Second, we present a new parameterization, denoted <span><math><msub><mrow><mi>a</mi></mrow><mrow><mi>G</mi></mrow></msub></math></span><span><span>, relating graph distance to </span>geometric distance. We show that the problem is para-NP-hard parameterized by </span><span><math><msub><mrow><mi>a</mi></mrow><mrow><mi>G</mi></mrow></msub></math></span>, but FPT parameterized by <span><math><msub><mrow><mi>a</mi></mrow><mrow><mi>G</mi></mrow></msub></math></span> on trees, as well as FPT parameterized by <span><math><mi>k</mi><mo>+</mo><msub><mrow><mi>a</mi></mrow><mrow><mi>G</mi></mrow></msub></math></span>. Third, we show that the recognition of <span><math><mi>k</mi><mo>×</mo><mi>r</mi></math></span> grid graphs is NP-hard on graphs of pathwidth 2 where <span><math><mi>k</mi><mo>=</mo><mn>3</mn></math></span>.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"136 ","pages":"Pages 17-62"},"PeriodicalIF":1.1,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49725808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The 2CNF Boolean formula satisfiability problem and the linear space hypothesis","authors":"Tomoyuki Yamakami","doi":"10.1016/j.jcss.2023.03.001","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.03.001","url":null,"abstract":"<div><p><span><span>We aim at investigating the solvability/insolvability of nondeterministic logarithmic-space (NL) decision, search, and optimization problems parameterized by natural size parameters using simultaneously </span>polynomial time and sub-linear space. We are particularly focused on </span><span><math><msub><mrow><mn>2SAT</mn></mrow><mrow><mn>3</mn></mrow></msub></math></span><span>—a restricted variant of the 2CNF Boolean (propositional) formula satisfiability problem in which each variable of a given 2CNF formula appears at most 3 times in the form of literals—parameterized by the total number </span><span><math><msub><mrow><mi>m</mi></mrow><mrow><mi>v</mi><mi>b</mi><mi>l</mi></mrow></msub><mo>(</mo><mi>ϕ</mi><mo>)</mo></math></span><span> of variables of each given Boolean formula </span><em>ϕ</em>. We propose a new, practical working hypothesis, called the linear space hypothesis (LSH), which asserts that <span><math><mo>(</mo><msub><mrow><mn>2SAT</mn></mrow><mrow><mn>3</mn></mrow></msub><mo>,</mo><msub><mrow><mi>m</mi></mrow><mrow><mi>v</mi><mi>b</mi><mi>l</mi></mrow></msub><mo>)</mo></math></span> cannot be solved in polynomial time using only “sub-linear” space (i.e., <span><math><msub><mrow><mi>m</mi></mrow><mrow><mi>v</mi><mi>b</mi><mi>l</mi></mrow></msub><msup><mrow><mo>(</mo><mi>x</mi><mo>)</mo></mrow><mrow><mi>ε</mi></mrow></msup><mspace></mspace><mi>p</mi><mi>o</mi><mi>l</mi><mi>y</mi><mi>l</mi><mi>o</mi><mi>g</mi><mo>(</mo><mo>|</mo><mi>x</mi><mo>|</mo><mo>)</mo></math></span> space for a constant <span><math><mi>ε</mi><mo>∈</mo><mo>[</mo><mn>0</mn><mo>,</mo><mn>1</mn><mo>)</mo></math></span>) on all instances <em>x</em>. Immediate consequences of LSH include <span><math><mi>L</mi><mo>≠</mo><mrow><mi>NL</mi></mrow></math></span>, <span><math><mrow><mi>LOGDCFL</mi></mrow><mo>≠</mo><mrow><mi>LOGCFL</mi></mrow></math></span>, and <span><math><mrow><mi>SC</mi></mrow><mo>≠</mo><mrow><mi>NSC</mi></mrow></math></span>. For our investigation, we fully utilize a key notion of “short reductions”, under which the class PsubLIN of all parameterized polynomial-time sub-linear-space solvable problems is indeed closed.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"136 ","pages":"Pages 88-112"},"PeriodicalIF":1.1,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49738284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Paloma T. Lima , Vinicius F. dos Santos , Ignasi Sau , Uéverton S. Souza , Prafullkumar Tale
{"title":"Reducing the vertex cover number via edge contractions","authors":"Paloma T. Lima , Vinicius F. dos Santos , Ignasi Sau , Uéverton S. Souza , Prafullkumar Tale","doi":"10.1016/j.jcss.2023.03.003","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.03.003","url":null,"abstract":"<div><p>Given a graph <em>G</em> on <em>n</em> vertices and two integers <em>k</em> and <em>d</em>, the <span>Contraction(<span>vc</span>)</span> problem asks whether one can contract at most <em>k</em> edges to reduce the vertex cover number of <em>G</em> by at least <em>d</em>. Recently, Lima et al. [JCSS 2021] proved that <span>Contraction(<span>vc</span>)</span> admits an <span>XP</span> algorithm running in time <span><math><mi>f</mi><mo>(</mo><mi>d</mi><mo>)</mo><mo>⋅</mo><msup><mrow><mi>n</mi></mrow><mrow><mi>O</mi><mo>(</mo><mi>d</mi><mo>)</mo></mrow></msup></math></span>. They asked whether this problem is <span>FPT</span> under this parameterization. In this article, we prove that: (i) <span>Contraction(<span>vc</span>)</span> is <span>W</span>[1]-<span>hard</span> parameterized by <span><math><mi>k</mi><mo>+</mo><mi>d</mi></math></span>. Moreover, unless the <span>ETH</span> fails, the problem does not admit an algorithm running in time <span><math><mi>f</mi><mo>(</mo><mi>k</mi><mo>+</mo><mi>d</mi><mo>)</mo><mo>⋅</mo><msup><mrow><mi>n</mi></mrow><mrow><mi>o</mi><mo>(</mo><mi>k</mi><mo>+</mo><mi>d</mi><mo>)</mo></mrow></msup></math></span> for any function <em>f</em>. This answers negatively the open question stated in Lima et al. [JCSS 2021]. (ii) <span>Contraction(<span>vc</span>)</span> is <span>NP</span>-<span>hard</span> even when <span><math><mi>k</mi><mo>=</mo><mi>d</mi></math></span>. (iii) <span>Contraction(<span>vc</span>)</span> can be solved in time <span><math><msup><mrow><mn>2</mn></mrow><mrow><mi>O</mi><mo>(</mo><mi>d</mi><mo>)</mo></mrow></msup><mo>⋅</mo><msup><mrow><mi>n</mi></mrow><mrow><mi>k</mi><mo>−</mo><mi>d</mi><mo>+</mo><mi>O</mi><mo>(</mo><mn>1</mn><mo>)</mo></mrow></msup></math></span>. This improves the algorithm of Lima et al. [JCSS 2021], and shows that when <span><math><mi>k</mi><mo>=</mo><mi>d</mi></math></span>, <span>Contraction(<span>vc</span>)</span> is <span>FPT</span> parameterized by <em>d</em> (or by <em>k</em>).</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"136 ","pages":"Pages 63-87"},"PeriodicalIF":1.1,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49725809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Valentin Bartier , Nicolas Bousquet , Amer E. Mouawad
{"title":"Galactic token sliding","authors":"Valentin Bartier , Nicolas Bousquet , Amer E. Mouawad","doi":"10.1016/j.jcss.2023.03.008","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.03.008","url":null,"abstract":"<div><p>Given a graph <em>G</em><span> and two independent sets </span><span><math><msub><mrow><mi>I</mi></mrow><mrow><mi>s</mi></mrow></msub></math></span> and <span><math><msub><mrow><mi>I</mi></mrow><mrow><mi>t</mi></mrow></msub></math></span> of size <em>k</em>, the <span>Independent Set Reconfiguration</span> problem asks whether there exists a sequence of independent sets that transforms <span><math><msub><mrow><mi>I</mi></mrow><mrow><mi>s</mi></mrow></msub></math></span> to <span><math><msub><mrow><mi>I</mi></mrow><mrow><mi>t</mi></mrow></msub></math></span> such that each independent set is obtained from the previous one using a so-called reconfiguration step. Viewing each independent set as a collection of <em>k</em> tokens placed on the vertices of a graph <em>G</em>, the two most studied reconfiguration steps are token jumping and token sliding. Over a series of papers, it was shown that the <span>Token Jumping</span> problem is fixed-parameter tractable (for parameter <em>k</em>) when restricted to sparse graph classes, such as planar, bounded treewidth, and nowhere dense graphs. As for the <span>Token Sliding</span> problem, almost nothing is known. We remedy this situation by showing that <span>Token Sliding</span><span> is fixed-parameter tractable on graphs of bounded degree, planar graphs<span>, and chordal graphs of bounded clique number.</span></span></p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"136 ","pages":"Pages 220-248"},"PeriodicalIF":1.1,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49738230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Algebraic characterizations and block product decompositions for first order logic and its infinitary quantifier extensions over countable words","authors":"Bharat Adsul , Saptarshi Sarkar , A.V. Sreejith","doi":"10.1016/j.jcss.2023.04.002","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.04.002","url":null,"abstract":"<div><p>We contribute to the refined understanding of language-logic-algebra interplay in a recent algebraic framework over countable words. Algebraic characterizations of the one variable fragment of FO as well as the boolean closure of the existential fragment of FO are established. We develop a seamless integration of the block product operation in the countable setting, and generalize well-known decompositional characterizations of FO and its two variable fragment. We propose an extension of FO admitting infinitary quantifiers to reason about inherent infinitary properties of countable words, and obtain a natural hierarchical block-product based characterization of this extension. Properties expressible in this extension can be simultaneously expressed in the classical logical systems such as WMSO and FO[cut]. We also rule out the possibility of a finite-basis for a block-product based characterization of these logical systems. Finally, we report algebraic characterizations of one variable fragments of the hierarchies of the new extension.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"136 ","pages":"Pages 302-326"},"PeriodicalIF":1.1,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49752944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}