Journal of Computer and System Sciences最新文献

筛选
英文 中文
Etherless Ethereum tokens: Simulating native tokens in Ethereum 以太坊代币:在以太坊中模拟原生代币
IF 1.1 3区 计算机科学
Journal of Computer and System Sciences Pub Date : 2023-08-01 DOI: 10.1016/j.jcss.2023.02.001
John Andrews , Michele Ciampi , Vassilis Zikas
{"title":"Etherless Ethereum tokens: Simulating native tokens in Ethereum","authors":"John Andrews ,&nbsp;Michele Ciampi ,&nbsp;Vassilis Zikas","doi":"10.1016/j.jcss.2023.02.001","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.02.001","url":null,"abstract":"<div><p>Standardized Ethereum tokens, e.g., ERC-20 tokens, have become the norm in fundraising (through ICOs) and kicking off blockchain-based DeFi applications. However, they require the user's wallet to hold both tokens and ether to pay the gas fee for making a transaction. This makes for a cumbersome user experience, and complicates, from the user perspective, the process of transitioning to a different smart-contract enabled blockchain, or to a newly launched blockchain. We formalize, instantiate, and analyze in a composable manner a system that we call <em>Etherless Ethereum Tokens</em> (in short, EETs), which allows the token users to transact in a closed-economy manner, i.e., having only tokens on their wallet and paying any transaction fees in tokens rather than Ether/Gas. In the process, we devise a methodology for capturing Ethereum token-contracts in the Universal Composability (UC) framework, which can be of independent interest.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"135 ","pages":"Pages 55-72"},"PeriodicalIF":1.1,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49739651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Parameterized complexity of graph planarity with restricted cyclic orders 受限循环阶图平面性的参数化复杂度
IF 1.1 3区 计算机科学
Journal of Computer and System Sciences Pub Date : 2023-08-01 DOI: 10.1016/j.jcss.2023.02.007
Giuseppe Liotta , Ignaz Rutter , Alessandra Tappini
{"title":"Parameterized complexity of graph planarity with restricted cyclic orders","authors":"Giuseppe Liotta ,&nbsp;Ignaz Rutter ,&nbsp;Alessandra Tappini","doi":"10.1016/j.jcss.2023.02.007","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.02.007","url":null,"abstract":"<div><p>We study the complexity of testing whether a biconnected graph <span><math><mi>G</mi><mo>=</mo><mo>(</mo><mi>V</mi><mo>,</mo><mi>E</mi><mo>)</mo></math></span> is planar with the constraint that some cyclic orders of the edges incident to its vertices are allowed while some others are forbidden. The allowed cyclic orders are described by associating every vertex <em>v</em> of <em>G</em> with a set <span><math><mi>D</mi><mo>(</mo><mi>v</mi><mo>)</mo></math></span> of FPQ-trees. Let <em>tw</em> be the treewidth of <em>G</em> and let <span><math><msub><mrow><mi>D</mi></mrow><mrow><mi>max</mi></mrow></msub></math></span> be the maximum number of FPQ-trees per vertex. We show that the problem is FPT when parameterized by <span><math><mtext>tw</mtext><mo>+</mo><msub><mrow><mi>D</mi></mrow><mrow><mi>max</mi></mrow></msub></math></span>, paraNP-hard when parameterized by <span><math><msub><mrow><mi>D</mi></mrow><mrow><mi>max</mi></mrow></msub></math></span>, and W[1]-hard when parameterized by <em>tw</em>. We also consider NodeTrix planar representations of clustered graphs, where clusters are adjacency matrices and inter-cluster edges are non-intersecting simple curves. We prove that NodeTrix planarity with fixed sides is FPT when parameterized by the size of clusters plus the treewidth of the graph obtained by collapsing clusters to single vertices, provided that this graph is biconnected.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"135 ","pages":"Pages 125-144"},"PeriodicalIF":1.1,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49739733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Complexity of word problems for HNN-extensions HNN扩展词问题的复杂性
IF 1.1 3区 计算机科学
Journal of Computer and System Sciences Pub Date : 2023-08-01 DOI: 10.1016/j.jcss.2023.02.005
Markus Lohrey
{"title":"Complexity of word problems for HNN-extensions","authors":"Markus Lohrey","doi":"10.1016/j.jcss.2023.02.005","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.02.005","url":null,"abstract":"<div><p><span>The computational complexity of the word problem in HNN-extension of groups is studied. HNN-extension is a fundamental construction in combinatorial group theory. It is shown that the word problem for an ascending HNN-extension of a group </span><em>H</em> is logspace reducible to the so-called compressed word problem for <em>H</em>. The main result of the paper states that the word problem for an HNN-extension of a hyperbolic group <em>H</em><span> with cyclic associated subgroups can be solved in polynomial time<span>. This result can be easily extended to fundamental groups of graphs of groups with hyperbolic vertex groups and cyclic edge groups.</span></span></p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"135 ","pages":"Pages 145-157"},"PeriodicalIF":1.1,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49762899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bankrupting Sybil despite churn 让西比尔破产,尽管搅拌
IF 1.1 3区 计算机科学
Journal of Computer and System Sciences Pub Date : 2023-08-01 DOI: 10.1016/j.jcss.2023.02.004
Diksha Gupta , Jared Saia , Maxwell Young
{"title":"Bankrupting Sybil despite churn","authors":"Diksha Gupta ,&nbsp;Jared Saia ,&nbsp;Maxwell Young","doi":"10.1016/j.jcss.2023.02.004","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.02.004","url":null,"abstract":"<div><p><span>A Sybil attack<span> occurs when an adversary controls multiple system identifiers (IDs). Limiting the number of Sybil (bad) IDs to a minority is critical for tolerating malicious behavior. A popular tool for enforcing a bad minority is resource burning (RB): the verifiable consumption of a network resource. Unfortunately, typical RB defenses require non-Sybil (good) IDs to consume at least as many resources as the adversary. We present a new defense, </span></span><span>Ergo</span>, that guarantees (1) there is always a bad minority; and (2) during a significant attack, the good IDs consume asymptotically less resources than the bad. Specifically, despite high churn, the good-ID RB rate is <span><math><mi>O</mi><mo>(</mo><msqrt><mrow><mi>T</mi><mi>J</mi></mrow></msqrt><mo>+</mo><mi>J</mi><mo>)</mo></math></span>, where <em>T</em> is the adversary's RB rate, and <em>J</em> is the good-ID join rate. We show this RB rate is asymptotically optimal for a large class of algorithms, and we empirically demonstrate the benefits of <span>Ergo</span>.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"135 ","pages":"Pages 89-124"},"PeriodicalIF":1.1,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49739543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How heavy independent sets help to find arborescences with many leaves in DAGs 重独立集如何帮助在dag中找到具有许多叶片的乔木
IF 1.1 3区 计算机科学
Journal of Computer and System Sciences Pub Date : 2023-08-01 DOI: 10.1016/j.jcss.2023.02.006
Cristina G. Fernandes , Carla N. Lintzmayer
{"title":"How heavy independent sets help to find arborescences with many leaves in DAGs","authors":"Cristina G. Fernandes ,&nbsp;Carla N. Lintzmayer","doi":"10.1016/j.jcss.2023.02.006","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.02.006","url":null,"abstract":"<div><p>Trees with many leaves have applications for broadcasting a message to all recipients simultaneously. Internal nodes of a broadcasting tree require more expensive technology to forward the messages received. We address a problem that captures the main goal: finding spanning trees with few internal nodes in a given network. The <span>Maximum Leaf Spanning Arborescence</span> problem consists of, given a directed graph <em>D</em>, finding a spanning arborescence of <em>D</em>, if one exists, with the maximum number of leaves. This problem is NP-hard in general and MaxSNP-hard in the rooted directed acyclic graphs class. This paper explores a relationship between <span>Maximum Leaf Spanning Arborescence</span> in rooted directed acyclic graphs and maximum weight set packing. The latter problem is related to independent sets on particular classes of intersection graphs. Exploiting this relation, we derive a 7/5-approximation for <span>Maximum Leaf Spanning Arborescence</span> on rooted directed acyclic graphs, improving on the previous 3/2-approximation.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"135 ","pages":"Pages 158-174"},"PeriodicalIF":1.1,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49739308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the exact amount of missing information that makes finding possible winners hard 缺失信息的确切数量使得找到可能的赢家变得困难
IF 1.1 3区 计算机科学
Journal of Computer and System Sciences Pub Date : 2023-08-01 DOI: 10.1016/j.jcss.2023.02.003
Palash Dey , Neeldhara Misra
{"title":"On the exact amount of missing information that makes finding possible winners hard","authors":"Palash Dey ,&nbsp;Neeldhara Misra","doi":"10.1016/j.jcss.2023.02.003","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.02.003","url":null,"abstract":"<div><p>In the <em>possible winner</em> problem, we need to compute if a set of partial votes can be completed such that a given candidate wins the election under some specific voting rule. In this paper, we determine the smallest number of undetermined pairs per partial vote for which the <span>Possible Winner</span> problem is <span><math><mi>NP</mi></math></span>-complete. In particular, we find the exact values of <em>t</em> for which the <span>Possible Winner</span> problem transitions to being <span><math><mi>NP</mi></math></span>-complete from being in <span><math><mi>P</mi></math></span>, where <em>t</em> is the maximum number of undetermined pairs in every vote. We demonstrate tight results for a broad class of scoring rules, Copeland<sup><em>α</em></sup> for every <span><math><mi>α</mi><mo>∈</mo><mo>[</mo><mn>0</mn><mo>,</mo><mn>1</mn><mo>]</mo></math></span>, maximin, and Bucklin voting rules. A somewhat surprising aspect of our results is that for many of these rules, the <span>Possible Winner</span> problem turns out to be hard even if every vote has at most one undetermined pair of candidates.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"135 ","pages":"Pages 32-54"},"PeriodicalIF":1.1,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49739540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Parameterised temporal exploration problems 参数化时间探索问题
IF 1.1 3区 计算机科学
Journal of Computer and System Sciences Pub Date : 2023-08-01 DOI: 10.1016/j.jcss.2023.01.003
Thomas Erlebach , Jakob T. Spooner
{"title":"Parameterised temporal exploration problems","authors":"Thomas Erlebach ,&nbsp;Jakob T. Spooner","doi":"10.1016/j.jcss.2023.01.003","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.01.003","url":null,"abstract":"<div><p>We study the fixed-parameter tractability of the problem of deciding whether a given temporal graph admits a temporal walk that visits all vertices (temporal exploration) or, in some variants, a certain subset of the vertices. In the strict variant, edges must be traversed in strictly increasing timesteps; in the non-strict variant, any number of edges can be traversed in each timestep. For both variants, we give <span>FPT</span> algorithms for finding a temporal walk that visits a given set <em>X</em> of vertices, parameterised by <span><math><mo>|</mo><mi>X</mi><mo>|</mo></math></span>, and for finding a temporal walk that visits at least <em>k</em> distinct vertices, parameterised by <em>k</em>. We also show <span><math><mtext>W</mtext><mo>[</mo><mn>2</mn><mo>]</mo></math></span>-hardness for a set version of temporal exploration. For the non-strict variant, we give an <span>FPT</span> algorithm for temporal exploration parameterised by the lifetime, and show that temporal exploration can be solved in polynomial time if the graph in each timestep has at most two connected components.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"135 ","pages":"Pages 73-88"},"PeriodicalIF":1.1,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49739635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bipartite 3-regular counting problems with mixed signs 具有混合符号的二分3-正则计数问题
IF 1.1 3区 计算机科学
Journal of Computer and System Sciences Pub Date : 2023-08-01 DOI: 10.1016/j.jcss.2023.01.006
Jin-Yi Cai, Austen Z. Fan, Yin Liu
{"title":"Bipartite 3-regular counting problems with mixed signs","authors":"Jin-Yi Cai,&nbsp;Austen Z. Fan,&nbsp;Yin Liu","doi":"10.1016/j.jcss.2023.01.006","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.01.006","url":null,"abstract":"<div><p>We prove a complexity dichotomy for a class of counting problems expressible as bipartite 3-regular Holant problems. These are also counting CSP problems where every constraint has arity 3 and every variable is read-thrice. For every problem of the form <span><math><mi>Holant</mi><mspace></mspace><mrow><mo>(</mo><mi>f</mi><mo>|</mo><msub><mrow><mo>=</mo></mrow><mrow><mn>3</mn></mrow></msub><mo>)</mo></mrow></math></span>, where <em>f</em> is any integer (or equivalently, rational)-valued ternary symmetric constraint function on Boolean variables, we prove that it is either P-time computable or #P-hard, depending on an explicit criterion of <em>f</em>. The constraint function can take both positive and negative values, allowing for cancellations. In addition, we discover a new phenomenon: there is a set <span><math><mi>F</mi></math></span> with the property that for every <span><math><mi>f</mi><mo>∈</mo><mi>F</mi></math></span> the problem <span><math><mi>Holant</mi><mspace></mspace><mrow><mo>(</mo><mi>f</mi><mo>|</mo><msub><mrow><mo>=</mo></mrow><mrow><mn>3</mn></mrow></msub><mo>)</mo></mrow></math></span> is planar P-time computable but #P-hard in general, yet its planar tractability is by a <em>combination</em> of a holographic transformation by <span><math><mo>[</mo><mtable><mtr><mtd><mn>1</mn></mtd><mtd><mn>1</mn></mtd></mtr><mtr><mtd><mn>1</mn></mtd><mtd><mo>−</mo><mn>1</mn></mtd></mtr></mtable><mo>]</mo></math></span> to FKT <em>together</em> with an independent global argument.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"135 ","pages":"Pages 15-31"},"PeriodicalIF":1.1,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49762896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On finding separators in temporal split and permutation graphs 关于在时间分裂图和置换图中寻找分隔符
IF 1.1 3区 计算机科学
Journal of Computer and System Sciences Pub Date : 2023-08-01 DOI: 10.1016/j.jcss.2023.01.004
Nicolas Maack , Hendrik Molter , Rolf Niedermeier , Malte Renken
{"title":"On finding separators in temporal split and permutation graphs","authors":"Nicolas Maack ,&nbsp;Hendrik Molter ,&nbsp;Rolf Niedermeier ,&nbsp;Malte Renken","doi":"10.1016/j.jcss.2023.01.004","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.01.004","url":null,"abstract":"<div><p>We study the NP-hard <span>Temporal</span> <span><math><mo>(</mo><mi>s</mi><mo>,</mo><mi>z</mi><mo>)</mo></math></span><span>-Separation</span><span> problem on temporal graphs<span>, which are graphs with fixed vertex sets but edge sets that change over discrete time steps. We tackle </span></span><span>Temporal</span> <span><math><mo>(</mo><mi>s</mi><mo>,</mo><mi>z</mi><mo>)</mo></math></span><span>-Separation</span><span> by restricting the layers (i.e., graphs characterized by edges that are present at a certain point in time) to specific graph classes. We restrict the layers of the temporal graphs to be either all split graphs or all permutation graphs (both being perfect graph classes) and provide both intractability and tractability results. In particular, we show that in general </span><span>Temporal</span> <span><math><mo>(</mo><mi>s</mi><mo>,</mo><mi>z</mi><mo>)</mo></math></span><span>-Separation</span> remains NP-hard both on temporal split and temporal permutation graphs, but we also spot promising islands of fixed-parameter tractability particularly based on parameterizations that measure the amount of “change over time”.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"135 ","pages":"Pages 1-14"},"PeriodicalIF":1.1,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49762893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Restrained medium access control on adversarial shared channels 对抗性共享信道上的受限介质访问控制
IF 1.1 3区 计算机科学
Journal of Computer and System Sciences Pub Date : 2023-07-07 DOI: 10.1016/j.jcss.2023.103463
Elijah Hradovich , Marek Klonowski , Dariusz R. Kowalski
{"title":"Restrained medium access control on adversarial shared channels","authors":"Elijah Hradovich ,&nbsp;Marek Klonowski ,&nbsp;Dariusz R. Kowalski","doi":"10.1016/j.jcss.2023.103463","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.103463","url":null,"abstract":"<div><p>We study the fundamental problem of utilization of the channel shared by stations competing to transmit packets on the channel. In their turn, packets are continuously injected into stations' queues by an adversary at a rate at most <em>ρ</em><span> packets per round. The aim of the distributed medium access control algorithms is to successfully transmit packets and maintain system stability (bounded queues). We further restrain algorithms by introducing an upper bound </span><em>k</em> on the allowed number of active stations in any given round. We construct adaptive and full sensing protocols with optimal throughput 1 and almost optimal throughput <span><math><mn>1</mn><mo>−</mo><mi>ϵ</mi></math></span> (for any positive <em>ϵ</em>), respectively, in a constant-restrained channel. On the opposite side, we show that restricted protocols based on schedules known in advance suffer from a substantial drop of throughput, at most <span><math><mi>min</mi><mo>⁡</mo><mo>{</mo><mfrac><mrow><mi>k</mi></mrow><mrow><mi>n</mi></mrow></mfrac><mo>,</mo><mfrac><mrow><mn>1</mn></mrow><mrow><mi>log</mi><mo>⁡</mo><mi>n</mi></mrow></mfrac><mo>}</mo></math></span>. We compare our algorithms experimentally with well-known backoff protocols.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"138 ","pages":"Article 103463"},"PeriodicalIF":1.1,"publicationDate":"2023-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49723748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信