首页 > 最新文献

Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications最新文献

英文 中文
Session details: Analysis 会话详细信息:
Matthew Hertz
{"title":"Session details: Analysis","authors":"Matthew Hertz","doi":"10.1145/3261565","DOIUrl":"https://doi.org/10.1145/3261565","url":null,"abstract":"","PeriodicalId":109155,"journal":{"name":"Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications","volume":"638 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133101608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Wireless 会议详情:无线
B. Karp
{"title":"Session details: Wireless","authors":"B. Karp","doi":"10.1145/3249785","DOIUrl":"https://doi.org/10.1145/3249785","url":null,"abstract":"","PeriodicalId":109155,"journal":{"name":"Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117131091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Analysis 会话详细信息:
W. Willinger
{"title":"Session details: Analysis","authors":"W. Willinger","doi":"10.1145/3263449","DOIUrl":"https://doi.org/10.1145/3263449","url":null,"abstract":"","PeriodicalId":109155,"journal":{"name":"Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132471354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications 2006年计算机通信应用、技术、体系结构和协议会议论文集
L. Rizzo, T. Anderson, N. McKeown
It is my pleasure to welcome you to Pisa for the 2006 edition of the ACM SIGCOMM conference. In keeping with our tradition, the conference will open with a keynote speech by the latest winner of the SIGCOMM Award, an honor that this year goes to Domenico Ferrari.Organizing a conference of the size and reputation of SIGCOMM is always a challenge, and it would not have been possible without the help of many people and organizations, all of which I would like to thank. It is my pleasure to start with the Universita di Pisa, which not only provided a huge help with logistics, equipment, administrative resources, and even some funding on it's own, but also let me and the Local Organization Chair, Giovanni Stea, spend a large amount of our time working on the organization of SIGCOMM 2006.In addition to the work of many individuals, this year we were extremely lucky, as we could rely on generous help from a number of companies and institutions. Our Gold Supporters are Cisco Systems and the National Science Foundation, who both provided funding for the Student Travel Grants. (Travel Grants also were made possible by the new SIGCOMM-sponsored Geodiversity Travel Grants program.) Silver Supporters are Microsoft Research, Intel, and Alcatel, who partly supported various social events. Last but not least, we have a large number of Bronze Supporters: AT&T, Digium, Google, HP, IIJ, Nokia, Tiscali and the Universita di Pisa.I am of course indebted to the other people involved in the event in various roles, who also invested many, many days on their tasks: Tom Anderson, Kenjiro Cho, Marco Conti, Jaudelice C. de Oliveira, Christophe Diot, Chris Edmondson-Yurkanan, Serge Fdida, Gianluca Iannaccone, Brad Karp, Laurent Mathy, Nick McKeown, Fran Spinola, Joe Touch, and Ellen Zegura. The team worked in close cooperation over a period of almost a year, exchanging thousands of emails (diligently archived for the benefit of next year's committee).For several of us, this was our first experience with this kind of work, and that made the task even more challenging. We would not have succeeded without help from the SIG officers, Jennifer Rexford and Tilman Wolf, and last year's General Chair, Roch Guerin, who was a precious resource for us in explaining how the process was run in the past.
我很高兴欢迎各位来到比萨参加2006年ACM SIGCOMM会议。按照我们的传统,会议将由SIGCOMM奖的最新获奖者发表主题演讲开幕,该奖项今年授予了Domenico Ferrari。组织一个像SIGCOMM这样规模和声誉的会议一直是一个挑战,如果没有许多人和组织的帮助,这是不可能的,我要感谢所有这些人。我很高兴从比萨大学开始,它不仅在后勤、设备、行政资源方面提供了巨大的帮助,甚至自己也提供了一些资金,而且让我和当地组织主席Giovanni Stea花了大量的时间为SIGCOMM 2006的组织工作。除了许多个人的努力之外,今年我们非常幸运,因为我们可以依靠许多公司和机构的慷慨帮助。我们的金牌支持者是思科系统公司和美国国家科学基金会,他们都为学生旅行补助金提供了资金。(旅行补助金也通过新的sigcomm赞助的地质多样性旅行补助金计划得以实现。)银色支持者是微软研究院、英特尔和阿尔卡特,他们部分支持了各种社会活动。最后但并非最不重要的是,我们有大量的铜支持者:AT&T, Digium,谷歌,惠普,IIJ,诺基亚,Tiscali和比萨大学。当然,我也要感谢其他以不同角色参与这次活动的人,他们也在自己的任务上投入了很多很多天:汤姆·安德森、Kenjiro Cho、马可·孔蒂、乔德丽斯·c·德·奥利维拉、克里斯托弗·迪奥、克里斯·埃德蒙森-尤尔卡南、塞尔日·菲迪达、吉安卢卡·伊纳科内、布拉德·卡普、劳伦特·马西、尼克·麦基翁、弗兰·斯皮诺拉、乔·塔奇和艾伦·泽古拉。该团队在近一年的时间里密切合作,交换了数千封电子邮件(为了明年的委员会的利益,勤奋地存档)。对于我们中的一些人来说,这是我们第一次接触这种工作,这使得这项任务更具挑战性。如果没有小组官员Jennifer Rexford和Tilman Wolf以及去年的总主席Roch Guerin的帮助,我们是不可能成功的,他是我们解释过去这个过程是如何运行的宝贵资源。
{"title":"Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications","authors":"L. Rizzo, T. Anderson, N. McKeown","doi":"10.1145/1159913","DOIUrl":"https://doi.org/10.1145/1159913","url":null,"abstract":"It is my pleasure to welcome you to Pisa for the 2006 edition of the ACM SIGCOMM conference. In keeping with our tradition, the conference will open with a keynote speech by the latest winner of the SIGCOMM Award, an honor that this year goes to Domenico Ferrari.Organizing a conference of the size and reputation of SIGCOMM is always a challenge, and it would not have been possible without the help of many people and organizations, all of which I would like to thank. It is my pleasure to start with the Universita di Pisa, which not only provided a huge help with logistics, equipment, administrative resources, and even some funding on it's own, but also let me and the Local Organization Chair, Giovanni Stea, spend a large amount of our time working on the organization of SIGCOMM 2006.In addition to the work of many individuals, this year we were extremely lucky, as we could rely on generous help from a number of companies and institutions. Our Gold Supporters are Cisco Systems and the National Science Foundation, who both provided funding for the Student Travel Grants. (Travel Grants also were made possible by the new SIGCOMM-sponsored Geodiversity Travel Grants program.) Silver Supporters are Microsoft Research, Intel, and Alcatel, who partly supported various social events. Last but not least, we have a large number of Bronze Supporters: AT&T, Digium, Google, HP, IIJ, Nokia, Tiscali and the Universita di Pisa.I am of course indebted to the other people involved in the event in various roles, who also invested many, many days on their tasks: Tom Anderson, Kenjiro Cho, Marco Conti, Jaudelice C. de Oliveira, Christophe Diot, Chris Edmondson-Yurkanan, Serge Fdida, Gianluca Iannaccone, Brad Karp, Laurent Mathy, Nick McKeown, Fran Spinola, Joe Touch, and Ellen Zegura. The team worked in close cooperation over a period of almost a year, exchanging thousands of emails (diligently archived for the benefit of next year's committee).For several of us, this was our first experience with this kind of work, and that made the task even more challenging. We would not have succeeded without help from the SIG officers, Jennifer Rexford and Tilman Wolf, and last year's General Chair, Roch Guerin, who was a precious resource for us in explaining how the process was run in the past.","PeriodicalId":109155,"journal":{"name":"Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123111744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Session details: Routing 2 会话详细信息:路由2
M. Handley
{"title":"Session details: Routing 2","authors":"M. Handley","doi":"10.1145/3249793","DOIUrl":"https://doi.org/10.1145/3249793","url":null,"abstract":"","PeriodicalId":109155,"journal":{"name":"Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131652549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Routing 1 会话详细信息:路由1
B. Davie
{"title":"Session details: Routing 1","authors":"B. Davie","doi":"10.1145/3263446","DOIUrl":"https://doi.org/10.1145/3263446","url":null,"abstract":"","PeriodicalId":109155,"journal":{"name":"Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129955958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Applications 会话详细信息:应用
S. Seshan
{"title":"Session details: Applications","authors":"S. Seshan","doi":"10.1145/3249794","DOIUrl":"https://doi.org/10.1145/3249794","url":null,"abstract":"","PeriodicalId":109155,"journal":{"name":"Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126529989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Measurement 会议详情:测量
D. Andersen
{"title":"Session details: Measurement","authors":"D. Andersen","doi":"10.1145/3262943","DOIUrl":"https://doi.org/10.1145/3262943","url":null,"abstract":"","PeriodicalId":109155,"journal":{"name":"Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127082412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Jigsaw: solving the puzzle of enterprise 802.11 analysis 拼图:解决企业802.11分析难题
Yuchung Cheng, J. Bellardo, Péter Benkö, A. Snoeren, G. Voelker, S. Savage
The combination of unlicensed spectrum, cheap wireless interfaces and the inherent convenience of untethered computing have made 802.11 based networks ubiquitous in the enterprise. Modern universities, corporate campuses and government offices routinely de-ploy scores of access points to blanket their sites with wireless Internet access. However, while the fine-grained behavior of the 802.11 protocol itself has been well studied, our understanding of how large 802.11 networks behave in their full empirical complex-ity is surprisingly limited. In this paper, we present a system called Jigsaw that uses multiple monitors to provide a single unified view of all physical, link, network and transport-layer activity on an 802.11 network. To drive this analysis, we have deployed an infrastructure of over 150 radio monitors that simultaneously capture all 802.11b and 802.11g activity in a large university building (1M+ cubic feet). We describe the challenges posed by both the scale and ambiguity inherent in such an architecture, and explain the algorithms and inference techniques we developed to address them. Finally, using a 24-hour distributed trace containing more than 1.5 billion events, we use Jigsaw's global cross-layer viewpoint to isolate performance artifacts, both explicit, such as management inefficiencies, and implicit, such as co-channel interference. We believe this is the first analysis combining this scale and level of detail for a production 802.11 network.
未经许可的频谱、廉价的无线接口和不受限制的计算固有的便利性相结合,使得基于802.11的网络在企业中无处不在。现代大学、企业园区和政府办公室通常会部署大量的接入点,以无线互联网接入覆盖他们的网站。然而,虽然802.11协议本身的细粒度行为已经得到了很好的研究,但我们对大型802.11网络在其完全经验复杂性下的行为的理解却令人惊讶地有限。在本文中,我们提出了一个称为Jigsaw的系统,它使用多个监视器来提供802.11网络上所有物理、链路、网络和传输层活动的单一统一视图。为了推动这一分析,我们部署了一个由150多个无线电监测器组成的基础设施,可以同时捕获大型大学建筑(100多立方英尺)中的所有802.11b和802.11g活动。我们描述了这种架构中固有的规模和模糊性所带来的挑战,并解释了我们为解决这些问题而开发的算法和推理技术。最后,使用包含超过15亿个事件的24小时分布式跟踪,我们使用Jigsaw的全局跨层视点来隔离性能工件,包括显式的(如管理效率低下)和隐式的(如共通道干扰)。我们相信这是第一次对生产的802.11网络结合如此规模和详细程度的分析。
{"title":"Jigsaw: solving the puzzle of enterprise 802.11 analysis","authors":"Yuchung Cheng, J. Bellardo, Péter Benkö, A. Snoeren, G. Voelker, S. Savage","doi":"10.1145/1159913.1159920","DOIUrl":"https://doi.org/10.1145/1159913.1159920","url":null,"abstract":"The combination of unlicensed spectrum, cheap wireless interfaces and the inherent convenience of untethered computing have made 802.11 based networks ubiquitous in the enterprise. Modern universities, corporate campuses and government offices routinely de-ploy scores of access points to blanket their sites with wireless Internet access. However, while the fine-grained behavior of the 802.11 protocol itself has been well studied, our understanding of how large 802.11 networks behave in their full empirical complex-ity is surprisingly limited. In this paper, we present a system called Jigsaw that uses multiple monitors to provide a single unified view of all physical, link, network and transport-layer activity on an 802.11 network. To drive this analysis, we have deployed an infrastructure of over 150 radio monitors that simultaneously capture all 802.11b and 802.11g activity in a large university building (1M+ cubic feet). We describe the challenges posed by both the scale and ambiguity inherent in such an architecture, and explain the algorithms and inference techniques we developed to address them. Finally, using a 24-hour distributed trace containing more than 1.5 billion events, we use Jigsaw's global cross-layer viewpoint to isolate performance artifacts, both explicit, such as management inefficiencies, and implicit, such as co-channel interference. We believe this is the first analysis combining this scale and level of detail for a production 802.11 network.","PeriodicalId":109155,"journal":{"name":"Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116800516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 364
Modeling adoptability of secure BGP protocol 安全BGP协议的建模可采性
Haowen Chan, D. Dash, A. Perrig, Hui Zhang
Despite the existence of several secure BGP routing protocols, there has been little progress to date on actual adoption. Although feasibility for widespread adoption remains the greatest hurdle for BGP security, there has been little quantitative research into what properties contribute the most to the adoptability of a security scheme. In this paper, we provide a model for assessing the adoptability of a secure BGP routing protocol. We perform this evaluation by simulating incentives compatible adoption decisions of ISPs on the Internet under a variety of assumptions. Our results include: (a) the existence of a sharp threshold, where, if the cost of adoption is below the threshold, complete adoption takes place, while almost no adoption takes place above the threshold; (b) under a strong attacker model, adding a single hop of path authentication to origin authentication yields similar adoptability characteristics as a full path security scheme; (c) under a weaker attacker model, adding full path authentication (e.g., via S-BGP [9]) significantly improves the adoptability of BGP security over weaker path security schemes such as soBGP [16]. These results provide insight into the development of more adoptable secure BGP protocols and demonstrate the importance of studying adoptability of protocols.
尽管存在几种安全的BGP路由协议,但迄今为止在实际采用方面几乎没有进展。尽管广泛采用的可行性仍然是BGP安全的最大障碍,但很少有定量研究表明哪些属性对安全方案的可采用性贡献最大。在本文中,我们提供了一个模型来评估安全BGP路由协议的可采用性。我们通过模拟互联网上的isp在各种假设下的激励兼容采用决策来执行此评估。我们的研究结果包括:(a)存在一个尖锐的阈值,如果采用成本低于阈值,则完全采用,而高于阈值则几乎不采用;(b)在强攻击者模型下,在原始认证基础上增加单跳路径认证,可获得与全路径安全方案相似的可接受特性;(c)在较弱的攻击者模型下,添加全路径认证(例如,通过S-BGP[9])可以显著提高BGP安全性相对于较弱路径安全方案(如soBGP[16])的可采用率。这些结果为开发更多可采用的安全BGP协议提供了见解,并证明了研究协议可采用性的重要性。
{"title":"Modeling adoptability of secure BGP protocol","authors":"Haowen Chan, D. Dash, A. Perrig, Hui Zhang","doi":"10.1145/1159913.1159946","DOIUrl":"https://doi.org/10.1145/1159913.1159946","url":null,"abstract":"Despite the existence of several secure BGP routing protocols, there has been little progress to date on actual adoption. Although feasibility for widespread adoption remains the greatest hurdle for BGP security, there has been little quantitative research into what properties contribute the most to the adoptability of a security scheme. In this paper, we provide a model for assessing the adoptability of a secure BGP routing protocol. We perform this evaluation by simulating incentives compatible adoption decisions of ISPs on the Internet under a variety of assumptions. Our results include: (a) the existence of a sharp threshold, where, if the cost of adoption is below the threshold, complete adoption takes place, while almost no adoption takes place above the threshold; (b) under a strong attacker model, adding a single hop of path authentication to origin authentication yields similar adoptability characteristics as a full path security scheme; (c) under a weaker attacker model, adding full path authentication (e.g., via S-BGP [9]) significantly improves the adoptability of BGP security over weaker path security schemes such as soBGP [16]. These results provide insight into the development of more adoptable secure BGP protocols and demonstrate the importance of studying adoptability of protocols.","PeriodicalId":109155,"journal":{"name":"Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126034369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 66
期刊
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1