首页 > 最新文献

CTIT technical reports series最新文献

英文 中文
Verification Condition Generation for Permission Logics with Abstraction Functions 具有抽象功能的权限逻辑验证条件生成
Pub Date : 2012-01-01 DOI: 10.3929/ETHZ-A-007313727
Stefan Heule, Ioannis T. Kassios, Peter Müller, Alexander J. Summers
Abstract predicates are the primary abstraction mechanism for program logics based on access permissions, such as separation logic and implicit dynamic frames. In addition to abstract predicates, it is often useful to also support classical abstraction functions, for instance, to encode side-effect free methods of the program and use them in specifications. However, combining abstract predicates and abstraction functions in a verification condition generator leads to subtle interactions, which complicate reasoning about heap modifications. Such complications may compromise soundness or cause divergence of the prover in the context of automated verification. In this paper, we present an encoding of abstract predicates and abstraction functions in the verification condition generator Boogie. Our encoding is sound and handles recursion in a way that is suitable for automatic verification using SMT solvers. It is implemented in the automatic verifier Chalice.
抽象谓词是基于访问权限的分离逻辑和隐式动态框架等程序逻辑的主要抽象机制。除了抽象谓词之外,支持经典抽象函数通常也很有用,例如,对程序的无副作用方法进行编码并在规范中使用它们。然而,在验证条件生成器中组合抽象谓词和抽象函数会导致微妙的交互,这会使堆修改的推理复杂化。在自动验证的背景下,这种复杂性可能会损害可靠性或导致证明者的分歧。本文给出了验证条件生成器Boogie中抽象谓词和抽象函数的编码方法。我们的编码是合理的,并且以一种适合使用SMT求解器进行自动验证的方式处理递归。它在自动验证器Chalice中实现。
{"title":"Verification Condition Generation for Permission Logics with Abstraction Functions","authors":"Stefan Heule, Ioannis T. Kassios, Peter Müller, Alexander J. Summers","doi":"10.3929/ETHZ-A-007313727","DOIUrl":"https://doi.org/10.3929/ETHZ-A-007313727","url":null,"abstract":"Abstract predicates are the primary abstraction mechanism for program logics based on access permissions, such as separation logic and implicit dynamic frames. In addition to abstract predicates, it is often useful to also support classical abstraction functions, for instance, to encode side-effect free methods of the program and use them in specifications. However, combining abstract predicates and abstraction functions in a verification condition generator leads to subtle interactions, which complicate reasoning about heap modifications. Such complications may compromise soundness or cause divergence of the prover in the context of automated verification. In this paper, we present an encoding of abstract predicates and abstraction functions in the verification condition generator Boogie. Our encoding is sound and handles recursion in a way that is suitable for automatic verification using SMT solvers. It is implemented in the automatic verifier Chalice.","PeriodicalId":10841,"journal":{"name":"CTIT technical reports series","volume":"26 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2012-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90715650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Gang scheduling istn't worth it ... yet 集体调度不值得……然而,
Pub Date : 2011-11-01 DOI: 10.3929/ETHZ-A-006742278
Simon Peter, Andrew Baumann, Zachary Anderson, Timothy Roscoe
The hardware trend toward higher core counts will likely result in a dynamic, bursty and interactive mix of parallel applications in personal and server computing. We investigate whether gang scheduling can provide performance benefits for applications in this scenario. We present a systematic study of the conditions under which gang scheduling might be better than classical general-purpose OS scheduling, and derive a set of necessary conditions on the workload. We find that these conditions are rarely met today, except in a small subset of workloads, for which we give an example. However, we propose that this subset is potentially important in the future, if (for example) parallel algorithms become increasingly used for real-time computer-human interaction.
高核数的硬件趋势可能会导致个人和服务器计算中并行应用程序的动态、突发和交互式混合。我们将研究在这种情况下,组调度是否可以为应用程序提供性能优势。我们系统地研究了组调度优于经典通用操作系统调度的条件,并得出了一组工作负载的必要条件。我们发现,除了在一小部分工作负载中,这些条件现在很少满足,我们给出了一个例子。然而,我们认为,如果(例如)并行算法越来越多地用于实时人机交互,那么这个子集在未来可能很重要。
{"title":"Gang scheduling istn't worth it ... yet","authors":"Simon Peter, Andrew Baumann, Zachary Anderson, Timothy Roscoe","doi":"10.3929/ETHZ-A-006742278","DOIUrl":"https://doi.org/10.3929/ETHZ-A-006742278","url":null,"abstract":"The hardware trend toward higher core counts will likely result in a dynamic, bursty and interactive mix of parallel applications in personal and server computing. We investigate whether gang scheduling can provide performance benefits for applications in this scenario. We present a systematic study of the conditions under which gang scheduling might be better than classical general-purpose OS scheduling, and derive a set of necessary conditions on the workload. We find that these conditions are rarely met today, except in a small subset of workloads, for which we give an example. However, we propose that this subset is potentially important in the future, if (for example) parallel algorithms become increasingly used for real-time computer-human interaction.","PeriodicalId":10841,"journal":{"name":"CTIT technical reports series","volume":"26 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83223049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Gymnasialer ICT-Unterricht im digitalen Datenlabor 在数字数据实验室中学中学
Pub Date : 2011-10-01 DOI: 10.3929/ETHZ-A-007313693
Lukas Fässler
{"title":"Gymnasialer ICT-Unterricht im digitalen Datenlabor","authors":"Lukas Fässler","doi":"10.3929/ETHZ-A-007313693","DOIUrl":"https://doi.org/10.3929/ETHZ-A-007313693","url":null,"abstract":"","PeriodicalId":10841,"journal":{"name":"CTIT technical reports series","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2011-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80937781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Building Data Flows Using Distributed Key-Value Stores 使用分布式键值存储构建数据流
Pub Date : 2011-10-01 DOI: 10.3929/ETHZ-A-007313689
Martin Hentschel, Maxim N. Grinev, Donald Kossmann
Social communication features on most of today’s largest websites require propagating the data inside the database/key-value store leading to massive data flows. In this paper we study alternative architectures to build data flows using distributed key-value stores. We compare programming model, execution model, failure model, and scalability highlighting a problem of the state-of-the-art architecture based on an external queue: non-optimal resource utilization. As part of this study, we propose an optimization of this approach by integrating queues into the key-value store. It results in better resource utilization and, thus, more cost-effective scalability; as well as easier programmability and lower maintenance cost. Our experimental study confirms these findings.
当今大多数大型网站的社交通信功能都需要在数据库/键值存储中传播数据,从而导致大量数据流。在本文中,我们研究了使用分布式键值存储构建数据流的替代架构。我们比较了编程模型、执行模型、故障模型和可伸缩性,突出了基于外部队列的最先进架构的一个问题:非最佳资源利用率。作为本研究的一部分,我们建议通过将队列集成到键值存储中来优化这种方法。它可以更好地利用资源,从而具有更高的成本效益和可扩展性;以及更容易编程和更低的维护成本。我们的实验研究证实了这些发现。
{"title":"Building Data Flows Using Distributed Key-Value Stores","authors":"Martin Hentschel, Maxim N. Grinev, Donald Kossmann","doi":"10.3929/ETHZ-A-007313689","DOIUrl":"https://doi.org/10.3929/ETHZ-A-007313689","url":null,"abstract":"Social communication features on most of today’s largest websites require propagating the data inside the database/key-value store leading to massive data flows. In this paper we study alternative architectures to build data flows using distributed key-value stores. We compare programming model, execution model, failure model, and scalability highlighting a problem of the state-of-the-art architecture based on an external queue: non-optimal resource utilization. As part of this study, we propose an optimization of this approach by integrating queues into the key-value store. It results in better resource utilization and, thus, more cost-effective scalability; as well as easier programmability and lower maintenance cost. Our experimental study confirms these findings.","PeriodicalId":10841,"journal":{"name":"CTIT technical reports series","volume":"10 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2011-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88165398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DEBS'11 Grand Challenge: Streams, Rules, or a Custom Solution? DEBS的11大挑战:流、规则还是自定义解决方案?
Pub Date : 2011-07-01 DOI: 10.3929/ETHZ-A-007314109
Lynn Aders, René Buffat, Zaheer Chothia, Matthias Wetter, C. Balkesen, Peter Fischer, Nesime Tatbul
This paper describes how we modeled and solved the DEBS’11 Grand Challenge of implementing a social network game using event processing technology. We first present an automaton-based model that we used to capture the game semantics. Then we summarize three different approaches we investigated to implement this automaton together with their evaluations. Finally, we provide a discussion of our observations and lessons learned as a result of this study.
本文描述了我们如何建模并解决了DEBS的11大挑战,即使用事件处理技术实现社交网络游戏。首先,我们提出了一个基于自动机的模型,用于捕获游戏语义。然后我们总结了我们研究的三种不同的方法来实现这个自动机以及它们的评估。最后,我们提供了我们的观察和经验教训的讨论,作为这项研究的结果。
{"title":"DEBS'11 Grand Challenge: Streams, Rules, or a Custom Solution?","authors":"Lynn Aders, René Buffat, Zaheer Chothia, Matthias Wetter, C. Balkesen, Peter Fischer, Nesime Tatbul","doi":"10.3929/ETHZ-A-007314109","DOIUrl":"https://doi.org/10.3929/ETHZ-A-007314109","url":null,"abstract":"This paper describes how we modeled and solved the DEBS’11 Grand Challenge of implementing a social network game using event processing technology. We first present an automaton-based model that we used to capture the game semantics. Then we summarize three different approaches we investigated to implement this automaton together with their evaluations. Finally, we provide a discussion of our observations and lessons learned as a result of this study.","PeriodicalId":10841,"journal":{"name":"CTIT technical reports series","volume":"52 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2011-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85880756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Analysis of approximation algorithms for the traveling salesman problem in near-metric graphs 近度量图中旅行商问题的逼近算法分析
Pub Date : 2011-06-01 DOI: 10.3929/ETHZ-A-006519144
S. Krug
We consider the beta-metric traveling salesman problem (Delta-beta-TSP), i.e., the TSP restricted to input instances satisfying the beta-triangle inequality c({v,w}) <= beta * (c{v,u} + c{u,w}), for any three vertices u,v,w. The well-known path matching Christofides algorithm (PMCA) provides an approximation ratio of 3/2 * beta^2 and is the best known algorithm in the range 1 <= beta <= 2. We show that this upper bound is tight by providing a worst-case example. This example can also be used to show the tightness of the upper bound for the PMCA variants for the Hamiltonian path problem with zero and one prespecified endpoints. For two prespecified endpoints, we cannot reuse the example, but we construct another worst-case example to show the tightness of the upper bound also in this case. Furthermore, we establish improved lower bounds for an approximation algorithm for the metric Hamiltonian path problem as well as for two approximation algorithms for the metric TSP reoptimization problem.
我们考虑β -度量旅行商问题(delta - β -TSP),即TSP被限制为满足β -三角形不等式c({v,w}) <= β * (c{v,u} + c{u,w})的输入实例,对于任意三个顶点u,v,w。众所周知的路径匹配Christofides算法(PMCA)提供了3/2 * beta^2的近似值,是1 <= beta <= 2范围内最著名的算法。我们通过提供一个最坏情况的例子来证明这个上界是紧的。这个例子还可以用来显示具有零和一个预先指定端点的哈密顿路径问题的PMCA变体上界的紧密性。对于两个预先指定的端点,我们不能重用这个例子,但是我们构造了另一个最坏情况的例子来显示在这种情况下上界的紧密性。此外,我们还建立了度量哈密顿路径问题的一种近似算法和度量TSP再优化问题的两种近似算法的改进下界。
{"title":"Analysis of approximation algorithms for the traveling salesman problem in near-metric graphs","authors":"S. Krug","doi":"10.3929/ETHZ-A-006519144","DOIUrl":"https://doi.org/10.3929/ETHZ-A-006519144","url":null,"abstract":"We consider the beta-metric traveling salesman problem (Delta-beta-TSP), i.e., the TSP restricted to input instances satisfying the beta-triangle inequality c({v,w}) <= beta * (c{v,u} + c{u,w}), for any three vertices u,v,w. The well-known path matching Christofides algorithm (PMCA) provides an approximation ratio of 3/2 * beta^2 and is the best known algorithm in the range 1 <= beta <= 2. We show that this upper bound is tight by providing a worst-case example. This example can also be used to show the tightness of the upper bound for the PMCA variants for the Hamiltonian path problem with zero and one prespecified endpoints. For two prespecified endpoints, we cannot reuse the example, but we construct another worst-case example to show the tightness of the upper bound also in this case. Furthermore, we establish improved lower bounds for an approximation algorithm for the metric Hamiltonian path problem as well as for two approximation algorithms for the metric TSP reoptimization problem.","PeriodicalId":10841,"journal":{"name":"CTIT technical reports series","volume":"36 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2011-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85048340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Evaluation of ISO/IEC 9798 Protocols 评估ISO/IEC 9798协议
Pub Date : 2011-04-01 DOI: 10.3929/ETHZ-A-006528721
D. Basin, C. Cremers
This report provides a security evaluation of the authentication protocol families described in parts 2, 3, and 4 of the ISO-IEC 9798 standard. Our analysis includes formal models of the protocols and their security properties, an analysis of existing attacks and evaluations, a security analysis of the formal protocol models, and a list of recommendations.
本报告提供了ISO-IEC 9798标准第2、3和4部分中描述的身份验证协议族的安全评估。我们的分析包括协议的形式化模型及其安全属性、对现有攻击和评估的分析、形式化协议模型的安全性分析以及建议列表。
{"title":"Evaluation of ISO/IEC 9798 Protocols","authors":"D. Basin, C. Cremers","doi":"10.3929/ETHZ-A-006528721","DOIUrl":"https://doi.org/10.3929/ETHZ-A-006528721","url":null,"abstract":"This report provides a security evaluation of the authentication protocol families described in parts 2, 3, and 4 of the ISO-IEC 9798 standard. Our analysis includes formal models of the protocols and their security properties, an analysis of existing attacks and evaluations, a security analysis of the formal protocol models, and a list of recommendations.","PeriodicalId":10841,"journal":{"name":"CTIT technical reports series","volume":"67 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2011-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89043925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
The prior experience of entering CS students 进入CS学生之前的经验
Pub Date : 2011-01-01 DOI: 10.3929/ETHZ-A-006903069
Michela Pedroni, M. Oriol, B. Meyer
One of the foremost issues for instructors of "Introduction to Programming" or "CS1" courses is the diversity of students' backgrounds { on one end of the range, a signicant portion of students start their computing degree without prior programming expertise, while on the other end, many students have even worked in a job where programming was a substantial part. This diversity makes it dicult to adapt programming instruction to students' prior experience. The present article describes students' programming and computing experience when entering the ETH Computer Science bachelor program. It is based on the data of over 900 ETH students participating in the study in the past seven years and 77 students from University of York answering the questionnaire in 2008. The article reports on the analysis of changes over the years, presents a comparison between the data of ETH and York, and describes the pedagogical implications for courses and textbooks.
对于“编程入门”或“CS1”课程的讲师来说,最重要的问题之一是学生背景的多样性{一方面,很大一部分学生在没有事先编程专业知识的情况下开始他们的计算学位,而另一方面,许多学生甚至在编程是重要部分的工作中工作过。这种多样性使得编程教学很难适应学生以前的经验。本文描述了学生在进入ETH计算机科学学士课程时的编程和计算经验。它是基于900多名ETH学生在过去7年中参与研究的数据,以及77名来自约克大学的学生在2008年回答的问卷。本文分析了多年来的变化,比较了ETH和约克的数据,并描述了对课程和教科书的教学意义。
{"title":"The prior experience of entering CS students","authors":"Michela Pedroni, M. Oriol, B. Meyer","doi":"10.3929/ETHZ-A-006903069","DOIUrl":"https://doi.org/10.3929/ETHZ-A-006903069","url":null,"abstract":"One of the foremost issues for instructors of \"Introduction to Programming\" or \"CS1\" courses is the diversity of students' backgrounds { on one end of the range, a signicant portion of students start their computing degree without prior programming expertise, while on the other end, many students have even worked in a job where programming was a substantial part. This diversity makes it dicult to adapt programming instruction to students' prior experience. The present article describes students' programming and computing experience when entering the ETH Computer Science bachelor program. It is based on the data of over 900 ETH students participating in the study in the past seven years and 77 students from University of York answering the questionnaire in 2008. The article reports on the analysis of changes over the years, presents a comparison between the data of ETH and York, and describes the pedagogical implications for courses and textbooks.","PeriodicalId":10841,"journal":{"name":"CTIT technical reports series","volume":"85 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2011-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81094755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Query Processing on Encrypted Data in the Cloud by 云中加密数据的查询处理
Pub Date : 2011-01-01 DOI: 10.3929/ETHZ-A-007313562
Stefan Hildenbrand, Donald Kossmann, Tahmineh Sanamrad, Carsten Binnig, Franz Faerber, J. Woehler
This paper explores a new encryption technique called POP. POP addresses the need to encrypt databases in the cloud and to execute complex SQL queries on the encrypted data efficiently. POP can be configured to meet different privacy requirements and attacker scenarios. Two such scenarios, referred to as domain attack and frequency attack, are studied in detail in this paper. Privacy and performance experiments conducted using the TPC-H benchmark show that POP makes it indeed possible to achieve good privacy with affordable performance overheads in many cases.
本文探讨了一种新的加密技术——POP。POP解决了对云中的数据库进行加密以及对加密数据高效执行复杂SQL查询的需求。可以配置POP以满足不同的隐私需求和攻击者场景。本文对域攻击和频率攻击这两种攻击进行了详细的研究。使用TPC-H基准进行的隐私和性能实验表明,在许多情况下,POP确实可以在负担得起的性能开销下实现良好的隐私。
{"title":"Query Processing on Encrypted Data in the Cloud by","authors":"Stefan Hildenbrand, Donald Kossmann, Tahmineh Sanamrad, Carsten Binnig, Franz Faerber, J. Woehler","doi":"10.3929/ETHZ-A-007313562","DOIUrl":"https://doi.org/10.3929/ETHZ-A-007313562","url":null,"abstract":"This paper explores a new encryption technique called POP. POP addresses the need to encrypt databases in the cloud and to execute complex SQL queries on the encrypted data efficiently. POP can be configured to meet different privacy requirements and attacker scenarios. Two such scenarios, referred to as domain attack and frequency attack, are studied in detail in this paper. Privacy and performance experiments conducted using the TPC-H benchmark show that POP makes it indeed possible to achieve good privacy with affordable performance overheads in many cases.","PeriodicalId":10841,"journal":{"name":"CTIT technical reports series","volume":"15 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2011-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83943712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Informatik macht Schule 电脑学校
Pub Date : 2011-01-01 DOI: 10.3929/ETHZ-A-006397823
Herbert E. Bruderer
{"title":"Informatik macht Schule","authors":"Herbert E. Bruderer","doi":"10.3929/ETHZ-A-006397823","DOIUrl":"https://doi.org/10.3929/ETHZ-A-006397823","url":null,"abstract":"","PeriodicalId":10841,"journal":{"name":"CTIT technical reports series","volume":"27 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2011-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78233611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
CTIT technical reports series
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1