Journal of Computer and System Sciences最新文献

筛选
英文 中文
On kernels for d-path vertex cover 关于 d 路径顶点覆盖的内核
IF 1.1 3区 计算机科学
Journal of Computer and System Sciences Pub Date : 2024-03-27 DOI: 10.1016/j.jcss.2024.103531
Radovan Červený, Pratibha Choudhary, Ondřej Suchý
{"title":"On kernels for d-path vertex cover","authors":"Radovan Červený,&nbsp;Pratibha Choudhary,&nbsp;Ondřej Suchý","doi":"10.1016/j.jcss.2024.103531","DOIUrl":"10.1016/j.jcss.2024.103531","url":null,"abstract":"<div><p>In this paper we study the kernelization of the <em>d</em>-<span>Path Vertex Cover</span> (<em>d</em>-PVC) problem. Given a graph <em>G</em>, the problem requires finding whether there exists a set of at most <em>k</em> vertices whose removal from <em>G</em> results in a graph that does not contain a path (not necessarily induced) with <em>d</em> vertices. It is known that <em>d</em>-PVC is <span>NP</span>-complete for <span><math><mi>d</mi><mo>≥</mo><mn>2</mn></math></span>. Since the problem generalizes to <em>d</em>-<span>Hitting Set</span>, it is known to admit a kernel with <span><math><mi>O</mi><mo>(</mo><mi>d</mi><msup><mrow><mi>k</mi></mrow><mrow><mi>d</mi></mrow></msup><mo>)</mo></math></span> edges. We improve on this by giving better kernels. Specifically, we give kernels with <span><math><mi>O</mi><mo>(</mo><msup><mrow><mi>k</mi></mrow><mrow><mn>2</mn></mrow></msup><mo>)</mo></math></span> vertices and edges for the cases when <span><math><mi>d</mi><mo>=</mo><mn>4</mn></math></span> and <span><math><mi>d</mi><mo>=</mo><mn>5</mn></math></span>. Further, we give a kernel with <span><math><mi>O</mi><mo>(</mo><msup><mrow><mi>k</mi></mrow><mrow><mn>4</mn></mrow></msup><msup><mrow><mi>d</mi></mrow><mrow><mn>2</mn><mi>d</mi><mo>+</mo><mn>9</mn></mrow></msup><mo>)</mo></math></span> vertices and edges for general <em>d</em>.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"144 ","pages":"Article 103531"},"PeriodicalIF":1.1,"publicationDate":"2024-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140323105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decidable problems in substitution shifts 置换移动中的可解问题
IF 1.1 3区 计算机科学
Journal of Computer and System Sciences Pub Date : 2024-03-18 DOI: 10.1016/j.jcss.2024.103529
Marie-Pierre Béal , Dominique Perrin , Antonio Restivo
{"title":"Decidable problems in substitution shifts","authors":"Marie-Pierre Béal ,&nbsp;Dominique Perrin ,&nbsp;Antonio Restivo","doi":"10.1016/j.jcss.2024.103529","DOIUrl":"10.1016/j.jcss.2024.103529","url":null,"abstract":"<div><p>In this paper, we investigate the structure of the most general kind of substitution shifts, including non-minimal ones, and allowing erasing morphisms. We prove the decidability of many properties of these morphisms with respect to the shift space generated by iteration, such as aperiodicity, recognizability and (under an additional assumption) irreducibility, or minimality.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"143 ","pages":"Article 103529"},"PeriodicalIF":1.1,"publicationDate":"2024-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140201967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Packing arc-disjoint cycles in oriented graphs 打包定向图中的弧异循环
IF 1.1 3区 计算机科学
Journal of Computer and System Sciences Pub Date : 2024-03-15 DOI: 10.1016/j.jcss.2024.103530
Jasine Babu , Ajay Saju Jacob , R. Krithika , Deepak Rajendraprasad
{"title":"Packing arc-disjoint cycles in oriented graphs","authors":"Jasine Babu ,&nbsp;Ajay Saju Jacob ,&nbsp;R. Krithika ,&nbsp;Deepak Rajendraprasad","doi":"10.1016/j.jcss.2024.103530","DOIUrl":"10.1016/j.jcss.2024.103530","url":null,"abstract":"<div><p><span>Arc-Disjoint Cycle Packing</span> is a classical <span>NP</span>-complete problem and we study it from two perspectives: (1) by restricting the cycles in the packing to be of a fixed length, and (2) by restricting the inputs to bipartite tournaments. Focusing first on <span>Arc-Disjoint</span> <em>r</em><span>-Cycle Packing</span> (where the cycles in the packing are required to be of length <em>r</em>), we show <span>NP</span>-completeness in oriented graphs with girth <em>r</em> for each <span><math><mi>r</mi><mo>≥</mo><mn>3</mn></math></span> and study the parameterized complexity of the problem with respect to two parameterizations (solution size and vertex cover size) for <span><math><mi>r</mi><mo>=</mo><mn>4</mn></math></span> in oriented graphs. Moving on to <span>Arc-Disjoint Cycle Packing</span> in bipartite tournaments, we show that every bipartite tournament either contains <em>k</em> arc-disjoint cycles or has a feedback arc set of size at most <span><math><mn>7</mn><mo>(</mo><mi>k</mi><mo>−</mo><mn>1</mn><mo>)</mo></math></span>. This result adds to the set of Erdös-Pósa-type results known in the combinatorics literature for packing and covering problems.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"143 ","pages":"Article 103530"},"PeriodicalIF":1.1,"publicationDate":"2024-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140201944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Monitoring the edges of a graph using distances with given girth 使用给定周长的距离监测图形的边缘
IF 1.1 3区 计算机科学
Journal of Computer and System Sciences Pub Date : 2024-03-06 DOI: 10.1016/j.jcss.2024.103528
Chenxu Yang , Gang Yang , Sun-Yuan Hsieh , Yaping Mao , Ralf Klasing
{"title":"Monitoring the edges of a graph using distances with given girth","authors":"Chenxu Yang ,&nbsp;Gang Yang ,&nbsp;Sun-Yuan Hsieh ,&nbsp;Yaping Mao ,&nbsp;Ralf Klasing","doi":"10.1016/j.jcss.2024.103528","DOIUrl":"10.1016/j.jcss.2024.103528","url":null,"abstract":"<div><p>A set <em>M</em> of vertices of a graph <em>G</em> is a <em>distance-edge-monitoring set</em> if for every edge <span><math><mi>e</mi><mo>∈</mo><mi>G</mi></math></span>, there is a vertex <span><math><mi>x</mi><mo>∈</mo><mi>M</mi></math></span> and a vertex <span><math><mi>y</mi><mo>∈</mo><mi>G</mi></math></span> such that <em>e</em> belongs to all shortest paths between <em>x</em> and <em>y</em>. We denote by <span><math><mrow><mi>dem</mi></mrow><mo>(</mo><mi>G</mi><mo>)</mo></math></span> the smallest size of such a set in <em>G</em>. In this paper, we prove that <span><math><mi>dem</mi><mo>(</mo><mi>G</mi><mo>)</mo><mo>≤</mo><mi>n</mi><mo>−</mo><mo>⌊</mo><mi>g</mi><mo>(</mo><mi>G</mi><mo>)</mo><mo>/</mo><mn>2</mn><mo>⌋</mo></math></span> for any connected graph <em>G</em>, which is not a tree, of order <em>n</em>, where <span><math><mi>g</mi><mo>(</mo><mi>G</mi><mo>)</mo></math></span> is the length of a shortest cycle in <em>G</em>, and give the graphs with <span><math><mi>dem</mi><mo>(</mo><mi>G</mi><mo>)</mo><mo>=</mo><mi>n</mi><mo>−</mo><mo>⌊</mo><mi>g</mi><mo>(</mo><mi>G</mi><mo>)</mo><mo>/</mo><mn>2</mn><mo>⌋</mo></math></span>. We also obtain that <span><math><mo>|</mo><mi>V</mi><mo>(</mo><mi>G</mi><mo>)</mo><mo>|</mo><mo>≥</mo><mi>k</mi><mo>+</mo><mo>⌊</mo><mi>g</mi><mo>(</mo><mi>G</mi><mo>)</mo><mo>/</mo><mn>2</mn><mo>⌋</mo></math></span> for every connected graph <em>G</em> with <span><math><mrow><mi>dem</mi></mrow><mo>(</mo><mi>G</mi><mo>)</mo><mo>=</mo><mi>k</mi></math></span> and <span><math><mi>g</mi><mo>(</mo><mi>G</mi><mo>)</mo><mo>=</mo><mi>g</mi></math></span>. Furthermore, the lower bound holds if and only if <span><math><mi>g</mi><mo>=</mo><mn>3</mn></math></span> and <span><math><mi>k</mi><mo>=</mo><mi>n</mi><mo>−</mo><mn>1</mn></math></span> or <span><math><mi>g</mi><mo>=</mo><mn>4</mn></math></span> and <span><math><mi>k</mi><mo>=</mo><mn>2</mn></math></span>. We prove that <span><math><mrow><mi>dem</mi></mrow><mo>(</mo><mi>G</mi><mo>)</mo><mo>≤</mo><mn>2</mn><mi>n</mi><mo>/</mo><mn>5</mn></math></span> for <span><math><mi>g</mi><mo>(</mo><mi>G</mi><mo>)</mo><mo>≥</mo><mn>5</mn></math></span>.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"143 ","pages":"Article 103528"},"PeriodicalIF":1.1,"publicationDate":"2024-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140053823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep kernelization for the Tree Bisection and Reconnection (TBR) distance in phylogenetics 系统发生学中树分叉和重新连接(TBR)距离的深度核化
IF 1.1 3区 计算机科学
Journal of Computer and System Sciences Pub Date : 2024-01-26 DOI: 10.1016/j.jcss.2024.103519
Steven Kelk , Simone Linz , Ruben Meuwese
{"title":"Deep kernelization for the Tree Bisection and Reconnection (TBR) distance in phylogenetics","authors":"Steven Kelk ,&nbsp;Simone Linz ,&nbsp;Ruben Meuwese","doi":"10.1016/j.jcss.2024.103519","DOIUrl":"10.1016/j.jcss.2024.103519","url":null,"abstract":"<div><p>We describe a kernel of size <span><math><mn>9</mn><mi>k</mi><mo>−</mo><mn>8</mn></math></span> for the NP-hard problem of computing the Tree Bisection and Reconnection (TBR) distance <em>k</em> between two unrooted binary phylogenetic trees. To achieve this, we extend the existing portfolio of reduction rules with three new reduction rules. Two of these are based on the idea of topologically transforming the trees in a distance-preserving way in order to guarantee execution of earlier reduction rules. The third rule extends the local neighborhood approach introduced in <span>[20]</span> to more global structures, allowing new situations to be identified when the deletion of a leaf definitely reduces the TBR distance by one. The bound on the kernel size is tight up to an additive term. Our results also apply to the equivalent problem of computing a maximum agreement forest between two unrooted binary phylogenetic trees. We anticipate that our results are widely applicable for computing agreement-forest based dissimilarity measures.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"142 ","pages":"Article 103519"},"PeriodicalIF":1.1,"publicationDate":"2024-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S002200002400014X/pdfft?md5=d95807a5290b9b72c4034f27a39f9776&pid=1-s2.0-S002200002400014X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139587066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SAT backdoors: Depth beats size SAT 后门:深度胜于大小
IF 1.1 3区 计算机科学
Journal of Computer and System Sciences Pub Date : 2024-01-19 DOI: 10.1016/j.jcss.2024.103520
Jan Dreier , Sebastian Ordyniak , Stefan Szeider
{"title":"SAT backdoors: Depth beats size","authors":"Jan Dreier ,&nbsp;Sebastian Ordyniak ,&nbsp;Stefan Szeider","doi":"10.1016/j.jcss.2024.103520","DOIUrl":"10.1016/j.jcss.2024.103520","url":null,"abstract":"<div><p>For several decades, much effort has been put into identifying classes of CNF formulas whose satisfiability can be decided in polynomial time. Classic results are the linear-time tractability of Horn formulas (Aspvall, Plass, and Tarjan, 1979) and Krom (i.e., 2CNF) formulas (Dowling and Gallier, 1984). Backdoors, introduced by Williams, Gomes and Selman (2003), gradually extend such a tractable class to all formulas of bounded distance to the class. Backdoor size provides a natural but rather crude distance measure between a formula and a tractable class. Backdoor depth, introduced by Mählmann, Siebertz, and Vigny (2021), is a more refined distance measure, which admits the utilization of different backdoor variables in parallel. We propose FPT approximation algorithms to compute backdoor depth into the classes Horn and Krom. This leads to a linear-time algorithm for deciding the satisfiability of formulas of bounded backdoor depth into these classes.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"142 ","pages":"Article 103520"},"PeriodicalIF":1.1,"publicationDate":"2024-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0022000024000151/pdfft?md5=aa98f57a25f01ddf20d9eccf4811314c&pid=1-s2.0-S0022000024000151-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139501386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The maximal coordination principle in regulatory Boolean networks 调控布尔网络中的最大协调原则
IF 1.1 3区 计算机科学
Journal of Computer and System Sciences Pub Date : 2024-01-17 DOI: 10.1016/j.jcss.2024.103518
Alexis Poindron
{"title":"The maximal coordination principle in regulatory Boolean networks","authors":"Alexis Poindron","doi":"10.1016/j.jcss.2024.103518","DOIUrl":"10.1016/j.jcss.2024.103518","url":null,"abstract":"<div><p>We introduce a coordination index in regulatory Boolean networks and we expose the maximal coordination principle (MCP), according to which a cohesive society reaches the dynamics characterized by the highest coordination index. Based on simple theoretical examples, we show that the MCP can be used to infer the influence graph from opinion dynamics/gene expressions. We provide some algorithms to apply the MCP and we compare the coordination index with existing statistical indexes (likelihood, entropy). The advantage of the coordination approach is its simplicity; in particular, we do not need to impose restrictions on the aggregation functions.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"142 ","pages":"Article 103518"},"PeriodicalIF":1.1,"publicationDate":"2024-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139501327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On coresets for fair clustering in metric and Euclidean spaces and their applications 论公设空间和欧几里得空间中公平聚类的内核及其应用
IF 1.1 3区 计算机科学
Journal of Computer and System Sciences Pub Date : 2024-01-11 DOI: 10.1016/j.jcss.2024.103506
Sayan Bandyapadhyay , Fedor V. Fomin , Kirill Simonov
{"title":"On coresets for fair clustering in metric and Euclidean spaces and their applications","authors":"Sayan Bandyapadhyay ,&nbsp;Fedor V. Fomin ,&nbsp;Kirill Simonov","doi":"10.1016/j.jcss.2024.103506","DOIUrl":"10.1016/j.jcss.2024.103506","url":null,"abstract":"<div><p>Fair clustering is a constrained clustering problem where we need to partition a set of colored points. The fraction of points of each color in every cluster should be more or less equal to the fraction of points of this color in the dataset. The problem was recently introduced by Chierichetti et al. (2017) <span>[1]</span>. We propose a new construction of coresets for fair clustering for Euclidean and general metrics based on random sampling. For the Euclidean space <span><math><msup><mrow><mi>R</mi></mrow><mrow><mi>d</mi></mrow></msup></math></span>, we provide the first coreset whose size does not depend exponentially on the dimension <em>d</em>. The question of whether such constructions exist was asked by Schmidt et al. (2019) <span>[2]</span> and Huang et al. (2019) <span>[5]</span>. For general metrics, our construction provides the first coreset for fair clustering. New coresets appear to be a handy tool for designing better approximation and streaming algorithms for fair and other constrained clustering variants.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"142 ","pages":"Article 103506"},"PeriodicalIF":1.1,"publicationDate":"2024-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0022000024000011/pdfft?md5=8effb294ac14fcc95086200a05194229&pid=1-s2.0-S0022000024000011-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139423640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Special Issue on the 1st Symposium on Algorithmic Foundations of Dynamic Networks (SAND 2022) 第一届动态网络算法基础学术研讨会特刊(SAND 2022)
IF 1.1 3区 计算机科学
Journal of Computer and System Sciences Pub Date : 2023-12-06 DOI: 10.1016/j.jcss.2023.103503
James Aspnes (Guest Editor and SAND 2022 Program Chair), Othon Michail
{"title":"Special Issue on the 1st Symposium on Algorithmic Foundations of Dynamic Networks (SAND 2022)","authors":"James Aspnes (Guest Editor and SAND 2022 Program Chair),&nbsp;Othon Michail","doi":"10.1016/j.jcss.2023.103503","DOIUrl":"10.1016/j.jcss.2023.103503","url":null,"abstract":"","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"141 ","pages":"Article 103503"},"PeriodicalIF":1.1,"publicationDate":"2023-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138493944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PAC learning halfspaces in non-interactive local differential privacy model with public unlabeled data 带有公共未标记数据的非交互式局部差分隐私模型中的PAC学习半空间
IF 1.1 3区 计算机科学
Journal of Computer and System Sciences Pub Date : 2023-12-06 DOI: 10.1016/j.jcss.2023.103496
Jinyan Su , Jinhui Xu , Di Wang
{"title":"PAC learning halfspaces in non-interactive local differential privacy model with public unlabeled data","authors":"Jinyan Su ,&nbsp;Jinhui Xu ,&nbsp;Di Wang","doi":"10.1016/j.jcss.2023.103496","DOIUrl":"10.1016/j.jcss.2023.103496","url":null,"abstract":"<div><p>In this paper, we study the problem of PAC learning halfspaces in the non-interactive local differential privacy<span> model (NLDP). To breach the barrier of exponential sample complexity, previous results studied a relaxed setting where the server has access to some additional public but unlabeled data. We continue in this direction. Specifically, we consider the problem under the standard setting instead of the large margin setting studied before. Under different mild assumptions on the underlying data distribution, we propose two approaches that are based on the Massart noise model and self-supervised learning and show that it is possible to achieve sample complexities that are only linear in the dimension and polynomial in other terms for both private and public data, which significantly improve the previous results. Our methods could also be used for other private PAC learning problems.</span></p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"141 ","pages":"Article 103496"},"PeriodicalIF":1.1,"publicationDate":"2023-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138493945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信