{"title":"Energy Constrained Depth First Search","authors":"Shantanu Das, Dariusz Dereniowski, Przemysław Uznański","doi":"10.1007/s00453-024-01275-8","DOIUrl":"10.1007/s00453-024-01275-8","url":null,"abstract":"<div><p>Depth first search is a natural algorithmic technique for constructing a closed route that visits all vertices of a graph. The length of such a route equals, in an edge-weighted tree, twice the total weight of all edges of the tree and this is asymptotically optimal over all exploration strategies. This paper considers a variant of such search strategies where the length of each route is bounded by a positive integer <i>B</i> (e.g. due to limited energy resources of the searcher). The objective is to cover all the edges of a tree <i>T</i> using the minimum number of routes, each starting and ending at the root and each being of length at most <i>B</i>. To this end, we analyze the following natural greedy tree traversal process that is based on decomposing a depth first search traversal into a sequence of limited length routes. Given any arbitrary depth first search traversal <i>R</i> of the tree <i>T</i>, we cover <i>R</i> with routes <span>(R_1,ldots ,R_l)</span>, each of length at most <i>B</i> such that: <span>(R_i)</span> starts at the root, reaches directly the farthest point of <i>R</i> visited by <span>(R_{i-1})</span>, then <span>(R_i)</span> continues along the path <i>R</i> as far as possible, and finally <span>(R_i)</span> returns to the root. We call the above algorithm <i>piecemeal-DFS</i> and we prove that it achieves the asymptotically minimal number of routes <i>l</i>, regardless of the choice of <i>R</i>. Our analysis also shows that the total length of the traversal (and thus the traversal time) of piecemeal-DFS is asymptotically minimum over all energy-constrained exploration strategies. The fact that <i>R</i> can be chosen arbitrarily means that the exploration strategy can be constructed in an online fashion when the input tree <i>T</i> is not known in advance. Each route <span>(R_i)</span> can be constructed without any knowledge of the yet unvisited part of <i>T</i>. Surprisingly, our results show that depth first search is efficient for energy constrained exploration of trees, even though it is known that the same does not hold for energy constrained exploration of arbitrary graphs.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 12","pages":"3759 - 3782"},"PeriodicalIF":0.9,"publicationDate":"2024-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01275-8.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142636684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
AlgorithmicaPub Date : 2024-10-04DOI: 10.1007/s00453-024-01273-w
Guanzhong Li, Lvzhou Li, Jingquan Luo
{"title":"Recovering the Original Simplicity: Succinct and Exact Quantum Algorithm for the Welded Tree Problem","authors":"Guanzhong Li, Lvzhou Li, Jingquan Luo","doi":"10.1007/s00453-024-01273-w","DOIUrl":"10.1007/s00453-024-01273-w","url":null,"abstract":"<div><p>This work revisits quantum algorithms for the well-known welded tree problem, proposing a succinct quantum algorithm based on the simple coined quantum walks. It iterates the naturally defined coined quantum walk operator for a classically precomputed number of iterations, and measures. The number of iterations is linear in the depth of the tree. The success probability of this procedure is inversely linear in the depth of the tree. Moreover, it is the same for all instances of the problem of a fixed size, therefore, we can use the exact quantum amplitude amplification subroutine to answer with probability 1. This gives an exponential speedup over any classical algorithm for the same problem. The significance of the results may be seen as follows. (i) Our algorithm is rather simple compared with the one in (Jeffery and Zur, STOC’2023), which not only breaks the stereotype that coined quantum walks can only achieve quadratic speedups over classical algorithms, but also demonstrates the power of the simplest quantum walk model. (ii) Our algorithm achieves certainty of success for the first time. Thus, it becomes one of the few examples that exhibit exponential separation between exact quantum and randomized query complexities.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 12","pages":"3719 - 3758"},"PeriodicalIF":0.9,"publicationDate":"2024-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142636718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
AlgorithmicaPub Date : 2024-09-30DOI: 10.1007/s00453-024-01276-7
Manuel Lafond, Binhai Zhu
{"title":"Permutation-constrained Common String Partitions with Applications","authors":"Manuel Lafond, Binhai Zhu","doi":"10.1007/s00453-024-01276-7","DOIUrl":"10.1007/s00453-024-01276-7","url":null,"abstract":"<div><p>We study a new combinatorial problem based on the famous Minimum Common String Partition problem, which we call Permutation-constrained Common String Partition (PCSP for short). In PCSP, we are given two sequences/genomes <i>s</i> and <i>t</i> with the same length and a permutation <span>(pi )</span> on <span>([ell ])</span>, the question is to decide whether it is possible to decompose <i>s</i> and <i>t</i> into <span>(ell )</span> blocks that can be matched according to some specified requirements, and that conform with the permutation <span>(pi )</span>. Our main result is that PCSP is FPT in parameter <span>(ell + d)</span>, where <i>d</i> is the maximum number of occurrences that any symbol may have in <i>s</i> or <i>t</i>. We also study a variant where the input specifies whether each matched pair of block needs to be preserved as is, or reversed. With this result on PCSP, we show that a series of genome rearrangement problems are FPT <span>(k + d)</span>, where <i>k</i> is the rearrangement distance between two genomes of interest.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 12","pages":"3684 - 3718"},"PeriodicalIF":0.9,"publicationDate":"2024-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142636949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
AlgorithmicaPub Date : 2024-09-21DOI: 10.1007/s00453-024-01271-y
Ayumi Igarashi, Naoyuki Kamiyama, Warut Suksompong, Sheung Man Yuen
{"title":"Reachability of Fair Allocations via Sequential Exchanges","authors":"Ayumi Igarashi, Naoyuki Kamiyama, Warut Suksompong, Sheung Man Yuen","doi":"10.1007/s00453-024-01271-y","DOIUrl":"10.1007/s00453-024-01271-y","url":null,"abstract":"<div><p>In the allocation of indivisible goods, a prominent fairness notion is envy-freeness up to one good (EF1). We initiate the study of reachability problems in fair division by investigating the problem of whether one EF1 allocation can be reached from another EF1 allocation via a sequence of exchanges such that every intermediate allocation is also EF1. We show that two EF1 allocations may not be reachable from each other even in the case of two agents, and deciding their reachability is PSPACE-complete in general. On the other hand, we prove that reachability is guaranteed for two agents with identical or binary utilities as well as for any number of agents with identical binary utilities. We also examine the complexity of deciding whether there is an EF1 exchange sequence that is optimal in the number of exchanges required.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 12","pages":"3653 - 3683"},"PeriodicalIF":0.9,"publicationDate":"2024-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01271-y.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142636704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
AlgorithmicaPub Date : 2024-09-20DOI: 10.1007/s00453-024-01267-8
Omrit Filtser, Mayank Goswami, Joseph S. B. Mitchell, Valentin Polishchuk
{"title":"On Flipping the Fréchet Distance","authors":"Omrit Filtser, Mayank Goswami, Joseph S. B. Mitchell, Valentin Polishchuk","doi":"10.1007/s00453-024-01267-8","DOIUrl":"10.1007/s00453-024-01267-8","url":null,"abstract":"<div><p>The classical and extensively-studied <i>Fréchet distance</i> between two curves is defined as an <i>inf max</i>, where the infimum is over all traversals of the curves, and the maximum is over all concurrent positions of the two agents. In this article we investigate a “flipped” Fréchet measure defined by a <i>sup min</i> – the supremum is over all traversals of the curves, and the minimum is over all concurrent positions of the two agents. This measure produces a notion of “social distance” between two curves (or general domains), where agents traverse curves while trying to stay as far apart as possible. We first study the flipped Fréchet measure between two polygonal curves in one and two dimensions, providing conditional lower bounds and matching algorithms. We then consider this measure on polygons, where it denotes the minimum distance that two agents can maintain while restricted to travel in or on the boundary of the same polygon. We investigate several variants of the problem in this setting, for some of which we provide linear-time algorithms. We draw connections between our proposed flipped Fréchet measure and existing related work in computational geometry, hoping that our new measure may spawn investigations akin to those performed for the Fréchet distance, and into further interesting problems that arise.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 12","pages":"3629 - 3652"},"PeriodicalIF":0.9,"publicationDate":"2024-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142636679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
AlgorithmicaPub Date : 2024-09-14DOI: 10.1007/s00453-024-01272-x
Chien-Chung Huang, François Sellier
{"title":"Semi-streaming Algorithms for Submodular Function Maximization Under b-Matching, Matroid, and Matchoid Constraints","authors":"Chien-Chung Huang, François Sellier","doi":"10.1007/s00453-024-01272-x","DOIUrl":"10.1007/s00453-024-01272-x","url":null,"abstract":"<div><p>We consider the problem of maximizing a non-negative submodular function under the <i>b</i>-matching constraint, in the semi-streaming model. When the function is linear, monotone, and non-monotone, we obtain the approximation ratios of <span>(2+varepsilon )</span>, <span>(3 + 2 sqrt{2} approx 5.828)</span>, and <span>(4 + 2 sqrt{3} approx 7.464)</span>, respectively. We also consider a generalized problem, where a <i>k</i>-uniform hypergraph is given, along with an extra matroid or a <span>(k')</span>-matchoid constraint imposed on the edges, with the same goal of finding a <i>b</i>-matching that maximizes a submodular function. When the extra constraint is a matroid, we obtain the approximation ratios of <span>(k + 1 + varepsilon )</span>, <span>(k + 2sqrt{k+1} + 2)</span>, and <span>(k + 2sqrt{k + 2} + 3)</span> for linear, monotone and non-monotone submodular functions, respectively. When the extra constraint is a <span>(k')</span>-matchoid, we attain the approximation ratio <span>(frac{8}{3}k+ frac{64}{9}k' + O(1))</span> for general submodular functions.\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 11","pages":"3598 - 3628"},"PeriodicalIF":0.9,"publicationDate":"2024-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142248533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
AlgorithmicaPub Date : 2024-09-13DOI: 10.1007/s00453-024-01269-6
Ameet Gadekar
{"title":"On the Parameterized Complexity of Compact Set Packing","authors":"Ameet Gadekar","doi":"10.1007/s00453-024-01269-6","DOIUrl":"10.1007/s00453-024-01269-6","url":null,"abstract":"<div><p>The <span>Set Packing</span> problem is, given a collection of sets <span>(mathcal {S})</span> over a ground set <i>U</i>, to find a maximum collection of sets that are pairwise disjoint. The problem is among the most fundamental NP-hard optimization problems that have been studied extensively in various computational regimes. The focus of this work is on parameterized complexity, <span>Parameterized Set Packing</span> (<span>PSP</span>): Given parameter <span>(r in {mathbb N})</span>, is there a collection <span>( mathcal {S}' subseteq mathcal {S}: |mathcal {S}'| = r)</span> such that the sets in <span>(mathcal {S}')</span> are pairwise disjoint? Unfortunately, the problem is not fixed parameter tractable unless <span>(textsf {W[1]} = textsf {FPT} )</span>, and, in fact, an “enumerative” running time of <span>(|mathcal {S}|^{Omega (r)})</span> is required unless the exponential time hypothesis (ETH) fails. This paper is a quest for tractable instances of <span>Set Packing</span> from parameterized complexity perspectives. We say that the input <span>(({U},mathcal {S}))</span> is “compact” if <span>(|{U}| = f(r)cdot textsf {poly} ( log |mathcal {S}|))</span>, for some <span>(f(r) ge r)</span>. In the <span>Compact PSP</span> problem, we are given a compact instance of <span>PSP</span>. In this direction, we present a “dichotomy” result of <span>PSP</span>: When <span>(|{U}| = f(r)cdot o(log |mathcal {S}|))</span>, <span>PSP</span> is in <span>FPT</span>, while for <span>(|{U}| = rcdot Theta (log (|mathcal {S}|)))</span>, the problem is <span>W[1]</span>-hard; moreover, assuming ETH, <span>Compact PSP</span> does not admit <span>(|mathcal {S}|^{o(r/log r)})</span> time algorithm even when <span>(|{U}| = rcdot Theta (log (|mathcal {S}|)))</span>. Although certain results in the literature imply hardness of compact versions of related problems such as <span>Set</span> <span>(r)</span><span>-Covering</span> and <span>Exact</span> <span>(r)</span><span>-Covering</span>, these constructions fail to extend to <span>Compact PSP</span>. A novel contribution of our work is the identification and construction of a gadget, which we call Compatible Intersecting Set System pair, that is crucial in obtaining the hardness result for <span>Compact PSP</span>. Finally, our framework can be extended to obtain improved running time lower bounds for <span>Compact</span> <span>(r)</span><span>-VectorSum</span>.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 11","pages":"3579 - 3597"},"PeriodicalIF":0.9,"publicationDate":"2024-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01269-6.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142197060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
AlgorithmicaPub Date : 2024-09-12DOI: 10.1007/s00453-024-01268-7
Piotr Krysta, Mathieu Mari, Nan Zhi
{"title":"Ultimate Greedy Approximation of Independent Sets in Subcubic Graphs","authors":"Piotr Krysta, Mathieu Mari, Nan Zhi","doi":"10.1007/s00453-024-01268-7","DOIUrl":"10.1007/s00453-024-01268-7","url":null,"abstract":"<div><p>We study the approximability of the maximum size independent set (MIS) problem in bounded degree graphs. This is one of the most classic and widely studied NP-hard optimization problems. It is known for its inherent hardness of approximation. We focus on the well known minimum-degree greedy algorithm for this problem. This algorithm iteratively chooses a minimum degree vertex in the graph, adds it to the solution and removes its neighbors, until the remaining graph is empty. The approximation ratios of this algorithm have been widely studied, where it is augmented with an advice that tells the greedy algorithm which minimum degree vertex to choose if it is not unique. Our main contribution is a new mathematical theory for the design of such greedy algorithms for MIS with efficiently computable advice and for the analysis of their approximation ratios. Using this theory we obtain the ultimate approximation ratio of 5/4 for greedy algorithms on graphs with maximum degree 3, which completely solves an open problem from the paper by Halldórsson and Yoshihara (in: Staples, Eades, Katoh, Moffat (eds) Algorithms and computations—ISAAC ’95, in 2026 LNCS, Springer, Berlin, Heidelberg, 1995) . Our algorithm is the fastest currently known algorithm for MIS with this approximation ratio on such graphs. We also obtain a simple and short proof of the <span>((Delta +2)/3)</span>-approximation ratio of any greedy algorithms on graphs with maximum degree <span>(Delta )</span>, the result proved previously by Halldórsson and Radhakrishnan (Nord J Comput 1:475–492, 1994) . We almost match this ratio by showing a lower bound of <span>((Delta +1)/3)</span> on the ratio of a greedy algorithm that can use an advice. We apply our new algorithm to the minimum vertex cover problem on graphs with maximum degree 3 to obtain a substantially faster 6/5-approximation algorithm than the one currently known. We complement our algorithmic, upper bound results with lower bound results, which show that the problem of designing good advice for greedy algorithms for MIS is computationally hard and even hard to approximate on various classes of graphs. These results significantly improve on the previously known hardness results. Moreover, these results suggest that obtaining the upper bound results on the design and analysis of the greedy advice is non-trivial.\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 11","pages":"3518 - 3578"},"PeriodicalIF":0.9,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142197062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
AlgorithmicaPub Date : 2024-09-12DOI: 10.1007/s00453-024-01248-x
Piotr Berman, Meiram Murzabulatov, Sofya Raskhodnikova, Dragos-Florian Ristache
{"title":"Testing Connectedness of Images","authors":"Piotr Berman, Meiram Murzabulatov, Sofya Raskhodnikova, Dragos-Florian Ristache","doi":"10.1007/s00453-024-01248-x","DOIUrl":"10.1007/s00453-024-01248-x","url":null,"abstract":"<div><p>We investigate algorithms for testing whether an image is connected. Given a proximity parameter <span>({epsilon }in (0,1))</span> and query access to a black-and-white image represented by an <span>(ntimes n)</span> matrix of Boolean pixel values, a (1-sided error) connectedness tester accepts if the image is connected and rejects with probability at least 2/3 if the image is <span>({epsilon })</span>-far from connected. We show that connectedness can be tested nonadaptively with <span>(OBig (frac{1}{{epsilon }^2}Big ))</span> queries and adaptively with <span>(OBig (frac{1}{{epsilon }^{3/2}} sqrt{log frac{1}{{epsilon }}}Big ))</span> queries. The best connectedness tester to date, by Berman, Raskhodnikova, and Yaroslavtsev (STOC 2014) had query complexity <span>(OBig (frac{1}{{epsilon }^2}log frac{1}{{epsilon }}Big ))</span> and was adaptive. We also prove that every nonadaptive, 1-sided error tester for connectedness must make <span>(Omega Big (frac{1}{{epsilon }}log frac{1}{{epsilon }}Big ))</span> queries.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 11","pages":"3496 - 3517"},"PeriodicalIF":0.9,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142197061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Romeo and Juliet Meeting in Forest Like Regions","authors":"Neeldhara Misra, Manas Mulpuri, Prafullkumar Tale, Gaurav Viramgami","doi":"10.1007/s00453-024-01264-x","DOIUrl":"10.1007/s00453-024-01264-x","url":null,"abstract":"<div><p>The game of rendezvous with adversaries is a game on a graph played by two players: <i>Facilitator</i> and <i>Divider</i>. Facilitator has two agents and Divider has a team of <span>(k ge 1)</span> agents. While the initial positions of Facilitator’s agents are fixed, Divider gets to select the initial positions of his agents. Then, they take turns to move their agents to adjacent vertices (or stay put) with Facilitator’s goal to bring both her agents at same vertex and Divider’s goal to prevent it. The computational question of interest is to determine if Facilitator has a winning strategy against Divider with <i>k</i> agents. Fomin, Golovach, and Thilikos [WG, 2021] introduced this game and proved that it is <span>PSPACE</span>-<span>hard</span> and <span>co</span>-<span>W</span>[2]-<span>hard</span> parameterized by the number of agents. This hardness naturally motivates the structural parameterization of the problem. The authors proved that it admits an <span>FPT</span> algorithm when parameterized by the modular width and the number of allowed rounds. However, they left open the complexity of the problem from the perspective of other structural parameters. In particular, they explicitly asked whether the problem admits an <span>FPT</span> or <span>XP</span>-algorithm with respect to the treewidth of the input graph. We answer this question in the negative and show that <span>Rendezvous</span> is <span>co</span>-<span>NP</span>-<span>hard</span> even for graphs of constant treewidth. Further, we show that the problem is <span>co</span>-<span>W</span>[1]-<span>hard</span> when parameterized by the feedback vertex set number and the number of agents, and is unlikely to admit a polynomial kernel when parameterized by the vertex cover number and the number of agents. Complementing these hardness results, we show that the <span>Rendezvous</span> is <span>FPT</span> when parameterized by both the vertex cover number and the solution size. Finally, for graphs of treewidth at most two and girds, we show that the problem can be solved in polynomial time.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 11","pages":"3465 - 3495"},"PeriodicalIF":0.9,"publicationDate":"2024-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142197065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}