首页 > 最新文献

Computer Networks (1976)最新文献

英文 中文
Concise report on the “first african conference on computer communications” — Africom 84 关于“第一届非洲计算机通信会议”的简要报告-非洲司令部84
Pub Date : 1984-10-01 DOI: 10.1016/0376-5075(84)90011-4
A. Danthine
{"title":"Concise report on the “first african conference on computer communications” — Africom 84","authors":"A. Danthine","doi":"10.1016/0376-5075(84)90011-4","DOIUrl":"10.1016/0376-5075(84)90011-4","url":null,"abstract":"","PeriodicalId":100316,"journal":{"name":"Computer Networks (1976)","volume":"8 5","pages":"Page 489"},"PeriodicalIF":0.0,"publicationDate":"1984-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0376-5075(84)90011-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"53791678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New technologies for the information network system 信息网络系统新技术
Pub Date : 1984-10-01 DOI: 10.1016/0376-5075(84)90003-5
Nobuo Inoue

Major requirements of a future telecommunications network called INS are outlined and key technologies needed to help meet these requirements described. INS is envisioned as requiring construction of a transmission and switching system, communication and information processing equipment, equipment for use on customer premises and the application of network management and control system technologies supported by such fundamental technologies as LSI and fiber optics. INS technology must include means for composing a telecommunications network and its subsystems, network architecture and network structure.

This new telecommunications network will make it possible to respond to the diverse requirements for voice and non-voice services through overall utilization of digital technology and enhanced network capabilities.

概述了未来电信网络INS的主要要求,并描述了帮助满足这些要求所需的关键技术。按照设想,INS需要建造传输和交换系统、通信和信息处理设备、供客户使用的设备以及由大规模集成电路和光纤等基础技术支持的网络管理和控制系统技术的应用。INS技术必须包括组成电信网络及其子系统的手段、网络体系结构和网络结构。这一新的电信网络将通过全面利用数字技术和增强的网络能力,能够满足话音和非话音业务的各种需求。
{"title":"New technologies for the information network system","authors":"Nobuo Inoue","doi":"10.1016/0376-5075(84)90003-5","DOIUrl":"https://doi.org/10.1016/0376-5075(84)90003-5","url":null,"abstract":"<div><p>Major requirements of a future telecommunications network called INS are outlined and key technologies needed to help meet these requirements described. INS is envisioned as requiring construction of a transmission and switching system, communication and information processing equipment, equipment for use on customer premises and the application of network management and control system technologies supported by such fundamental technologies as LSI and fiber optics. INS technology must include means for composing a telecommunications network and its subsystems, network architecture and network structure.</p><p>This new telecommunications network will make it possible to respond to the diverse requirements for voice and non-voice services through overall utilization of digital technology and enhanced network capabilities.</p></div>","PeriodicalId":100316,"journal":{"name":"Computer Networks (1976)","volume":"8 5","pages":"Pages 393-412"},"PeriodicalIF":0.0,"publicationDate":"1984-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0376-5075(84)90003-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91764452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Subject index to volume 8 第8卷主题索引
Pub Date : 1984-10-01 DOI: 10.1016/0376-5075(84)90014-X
{"title":"Subject index to volume 8","authors":"","doi":"10.1016/0376-5075(84)90014-X","DOIUrl":"https://doi.org/10.1016/0376-5075(84)90014-X","url":null,"abstract":"","PeriodicalId":100316,"journal":{"name":"Computer Networks (1976)","volume":"8 5","pages":"Pages 499-500"},"PeriodicalIF":0.0,"publicationDate":"1984-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0376-5075(84)90014-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"137288452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
INS (Information Network System) — Telecommunications for the advanced information society INS(信息网络系统)-先进信息社会的电信
Pub Date : 1984-10-01 DOI: 10.1016/0376-5075(84)90002-3
Yasusada Kitahara

An Information Network System (INS) as the basis of a new world information order. Maximum advantage is to be made of the marriage between telecommunications and computer technologies in implementing the information network. A bit rate tariff system is also proposed to make INS feasible on both a national and international scale. As the community of man transforms itself, on the shoulders of INS, into an advanced information society, the human and technical weaknesses inherent in such a society must be addressed. By harmonizing the natural and social sciences with the needs of humanity, the technological and information-oriented innovations accompanying INS are expected to greatly enrich the quality of life.

信息网络系统(INS)是世界信息新秩序的基础。在实施信息网络时,应最大限度地利用电信技术和计算机技术的结合。还提出了一种比特率收费制度,使INS在国内和国际范围内都是可行的。随着人类社会在国际新闻社的肩膀上转变为一个先进的信息社会,必须解决这种社会固有的人力和技术弱点。通过协调自然科学和社会科学与人类的需要,技术和面向信息的创新伴随着INS有望极大地丰富生活质量。
{"title":"INS (Information Network System) — Telecommunications for the advanced information society","authors":"Yasusada Kitahara","doi":"10.1016/0376-5075(84)90002-3","DOIUrl":"https://doi.org/10.1016/0376-5075(84)90002-3","url":null,"abstract":"<div><p>An Information Network System (INS) as the basis of a new world information order. Maximum advantage is to be made of the marriage between telecommunications and computer technologies in implementing the information network. A bit rate tariff system is also proposed to make INS feasible on both a national and international scale. As the community of man transforms itself, on the shoulders of INS, into an advanced information society, the human and technical weaknesses inherent in such a society must be addressed. By harmonizing the natural and social sciences with the needs of humanity, the technological and information-oriented innovations accompanying INS are expected to greatly enrich the quality of life.</p></div>","PeriodicalId":100316,"journal":{"name":"Computer Networks (1976)","volume":"8 5","pages":"Pages 383-392"},"PeriodicalIF":0.0,"publicationDate":"1984-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0376-5075(84)90002-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91764453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The INS model system INS模型系统
Pub Date : 1984-10-01 DOI: 10.1016/0376-5075(84)90004-7
Akira Togawa

The construction of a pilot for “Information Network System” (INS), started recently, is a milestone in INS development. The pilot plant, called a Model System, started its five-year field trial in September, 1982. Through the test, studies will be made on technical feasibility and service requirements. Further, an intensive assessment for the formation of INS will be made from the viewpoints of the social and cultural sciences. With the results obtained from the Model System, comprehension of what INS can be gained, and problems relating to establishment of INS can be solved.

最近启动的“信息网络系统”(INS)试点建设是INS发展的一个里程碑。1982年9月,这个被称为“示范系统”的试验性工厂开始了为期五年的田间试验。通过试验,对技术可行性和服务需求进行研究。此外,将从社会科学和文化科学的角度对国际新闻社的形成进行深入的评估。通过模型系统得到的结果,可以理解国际惯性系统,并解决建立国际惯性系统的相关问题。
{"title":"The INS model system","authors":"Akira Togawa","doi":"10.1016/0376-5075(84)90004-7","DOIUrl":"https://doi.org/10.1016/0376-5075(84)90004-7","url":null,"abstract":"<div><p>The construction of a pilot for “Information Network System” (INS), started recently, is a milestone in INS development. The pilot plant, called a Model System, started its five-year field trial in September, 1982. Through the test, studies will be made on technical feasibility and service requirements. Further, an intensive assessment for the formation of INS will be made from the viewpoints of the social and cultural sciences. With the results obtained from the Model System, comprehension of what INS can be gained, and problems relating to establishment of INS can be solved.</p></div>","PeriodicalId":100316,"journal":{"name":"Computer Networks (1976)","volume":"8 5","pages":"Pages 413-420"},"PeriodicalIF":0.0,"publicationDate":"1984-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0376-5075(84)90004-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90126393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Protection and resource control in distributed operating systems 分布式操作系统中的保护和资源控制
Pub Date : 1984-10-01 DOI: 10.1016/0376-5075(84)90005-9
Sape J Mullender, Andrew S Tanenbaum

Local networks often consist of a cable snaking through a building with sockets in each room into which users can plug their personal computers. Using such a network for building a coherent distributed or network operating system is difficult because the system administrators have no control over the user's machine — not the applications programs, not the system kernel, not even the choice of hardware. In this paper we discuss a general method to protect such systems against malicious users without placing any restrictions on the kinds of operating systems that can be constructed. Depending on the details of the hardware, either one-way functions or public key cryptography forms the basis for the protection. As an example of our method, we show how a traditional object-oriented capability system can be implemented on top of the basic protection mechanism, and how a service for accounting and resource control can be constructed.

本地网络通常由一条电缆组成,电缆蜿蜒穿过建筑物,每个房间都有插座,用户可以将他们的个人电脑插入其中。使用这样的网络来构建一致的分布式或网络操作系统是很困难的,因为系统管理员无法控制用户的机器——不能控制应用程序,不能控制系统内核,甚至不能控制硬件的选择。在本文中,我们讨论了一种保护此类系统免受恶意用户攻击的一般方法,而无需对可以构建的操作系统的种类进行任何限制。根据硬件的细节,单向功能或公钥加密构成了保护的基础。作为我们方法的一个示例,我们展示了如何在基本保护机制之上实现传统的面向对象能力系统,以及如何构建用于记帐和资源控制的服务。
{"title":"Protection and resource control in distributed operating systems","authors":"Sape J Mullender,&nbsp;Andrew S Tanenbaum","doi":"10.1016/0376-5075(84)90005-9","DOIUrl":"10.1016/0376-5075(84)90005-9","url":null,"abstract":"<div><p>Local networks often consist of a cable snaking through a building with sockets in each room into which users can plug their personal computers. Using such a network for building a coherent distributed or network operating system is difficult because the system administrators have no control over the user's machine — not the applications programs, not the system kernel, not even the choice of hardware. In this paper we discuss a general method to protect such systems against malicious users without placing any restrictions on the kinds of operating systems that can be constructed. Depending on the details of the hardware, either one-way functions or public key cryptography forms the basis for the protection. As an example of our method, we show how a traditional object-oriented capability system can be implemented on top of the basic protection mechanism, and how a service for accounting and resource control can be constructed.</p></div>","PeriodicalId":100316,"journal":{"name":"Computer Networks (1976)","volume":"8 5","pages":"Pages 421-432"},"PeriodicalIF":0.0,"publicationDate":"1984-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0376-5075(84)90005-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83018104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
Verification of a multidestination selective repeat procedure 多目的地选择性重复过程的验证
Pub Date : 1984-10-01 DOI: 10.1016/0376-5075(84)90008-4
K Sabnani, M Schwartz

A multidestination protocol is a data transfer procedure from one transmitter to many rceivers. We specify and verify such a protocol, the Selective Repeat procedure. The communication medium assumed is a satellite broadcast channel shared by using a time division multiplexed technique.

The Selective Repeat procedure is modeled as a parallel program in a Pascal-like language. Then, we show the correctness of the parallel program model using temporal logic. The correctness requires that the program model have two system properties: the safety and liveness properties. The safety property ensures that each receiver delivers the packets to the user in the same sequence as originally delivered to the transmitter. The liveness property ensures that each receiver delivers an infinite number of packets to the user if an infinite number of packets are waiting to be transmitted at the transmitter.

多目标协议是从一个发送器到多个接收器的数据传输过程。我们指定并验证这样一个协议,即选择性重复程序。假定通信介质是使用时分多路复用技术共享的卫星广播信道。选择性重复过程被建模为一个类似pascal语言的并行程序。然后,我们用时序逻辑证明了并行程序模型的正确性。正确性要求程序模型具有两个系统属性:安全性和活动性。安全属性确保每个接收端按照最初发送到发送端的顺序向用户发送数据包。如果在发送端有无限数量的数据包等待传输,那么活跃性属性确保每个接收端向用户发送无限数量的数据包。
{"title":"Verification of a multidestination selective repeat procedure","authors":"K Sabnani,&nbsp;M Schwartz","doi":"10.1016/0376-5075(84)90008-4","DOIUrl":"10.1016/0376-5075(84)90008-4","url":null,"abstract":"<div><p>A multidestination protocol is a data transfer procedure from one transmitter to many rceivers. We specify and verify such a protocol, the <em>Selective Repeat procedure</em>. The communication medium assumed is a satellite broadcast channel shared by using a time division multiplexed technique.</p><p>The <em>Selective Repeat procedure</em> is modeled as a parallel program in a Pascal-like language. Then, we show the correctness of the parallel program model using temporal logic. The correctness requires that the program model have two system properties: the safety and liveness properties. The safety property ensures that each receiver delivers the packets to the user in the same sequence as originally delivered to the transmitter. The liveness property ensures that each receiver delivers an infinite number of packets to the user if an infinite number of packets are waiting to be transmitted at the transmitter.</p></div>","PeriodicalId":100316,"journal":{"name":"Computer Networks (1976)","volume":"8 5","pages":"Pages 463-478"},"PeriodicalIF":0.0,"publicationDate":"1984-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0376-5075(84)90008-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83535956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
PTC '84 — Pacific Telecommunications Conference PTC '84 -太平洋电信会议
Pub Date : 1984-10-01 DOI: 10.1016/0376-5075(84)90009-6
{"title":"PTC '84 — Pacific Telecommunications Conference","authors":"","doi":"10.1016/0376-5075(84)90009-6","DOIUrl":"https://doi.org/10.1016/0376-5075(84)90009-6","url":null,"abstract":"","PeriodicalId":100316,"journal":{"name":"Computer Networks (1976)","volume":"8 5","pages":"Pages 479-486"},"PeriodicalIF":0.0,"publicationDate":"1984-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0376-5075(84)90009-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"137350377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security mechanisms in a transport layer protocol 传输层协议中的安全机制
Pub Date : 1984-10-01 DOI: 10.1016/0376-5075(84)90006-0
Victor L Voydock, Stephen T Kent

This paper describes how the error detection and recovery mechanisms of the proposed National Bureau of Standards (NBS) transport layer protocol can be easily extended to provide secure transmission of information. The security mechanisms are based on the Data Encryption Standard (DES) of the NBS. Two distinct security architectures are described. In the first, the DES hardware is a peripheral I/O device of the computer in which the transport layer resides. In the other, encryption is performed by a hardware device located in the data path between the transport layer and the network layer. The paper argues that, in the long run, the transport layer should be implemented in a front end computer equipped with a DES peripheral. This isolates it from (possibly untrustworthy) host software, and greatly simplifies the job of certifying its correct behavior.

本文描述了拟议的NBS传输层协议的错误检测和恢复机制如何易于扩展,以提供安全的信息传输。安全机制基于国家统计局的DES (Data Encryption Standard)。本文描述了两种不同的安全体系结构。首先,DES硬件是传输层所在的计算机的外设I/O设备。在另一种情况下,加密由位于传输层和网络层之间的数据路径上的硬件设备执行。本文认为,从长远来看,传输层应该在配备DES外围设备的前端计算机中实现。这将它与(可能不可信的)主机软件隔离开来,并极大地简化了证明其正确行为的工作。
{"title":"Security mechanisms in a transport layer protocol","authors":"Victor L Voydock,&nbsp;Stephen T Kent","doi":"10.1016/0376-5075(84)90006-0","DOIUrl":"https://doi.org/10.1016/0376-5075(84)90006-0","url":null,"abstract":"<div><p>This paper describes how the error detection and recovery mechanisms of the proposed National Bureau of Standards (NBS) transport layer protocol can be easily extended to provide secure transmission of information. The security mechanisms are based on the Data Encryption Standard (DES) of the NBS. Two distinct security architectures are described. In the first, the DES hardware is a peripheral I/O device of the computer in which the transport layer resides. In the other, encryption is performed by a hardware device located in the data path between the transport layer and the network layer. The paper argues that, in the long run, the transport layer should be implemented in a front end computer equipped with a DES peripheral. This isolates it from (possibly untrustworthy) host software, and greatly simplifies the job of certifying its correct behavior.</p></div>","PeriodicalId":100316,"journal":{"name":"Computer Networks (1976)","volume":"8 5","pages":"Pages 433-449"},"PeriodicalIF":0.0,"publicationDate":"1984-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0376-5075(84)90006-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91764454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
8th conference on local computer networks 第八届本地计算机网络会议
Pub Date : 1984-10-01 DOI: 10.1016/0376-5075(84)90010-2
{"title":"8th conference on local computer networks","authors":"","doi":"10.1016/0376-5075(84)90010-2","DOIUrl":"https://doi.org/10.1016/0376-5075(84)90010-2","url":null,"abstract":"","PeriodicalId":100316,"journal":{"name":"Computer Networks (1976)","volume":"8 5","pages":"Pages 486-488"},"PeriodicalIF":0.0,"publicationDate":"1984-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0376-5075(84)90010-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"137350376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Networks (1976)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1