首页 > 最新文献

Formal Methods in System Design最新文献

英文 中文
Static detection of uncoalesced accesses in GPU programs GPU程序中非合并访问的静态检测
IF 0.8 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-03-05 DOI: 10.1007/s10703-021-00362-8
R. Alur, Joseph Devietti, O. N. Leija, N. Singhania
{"title":"Static detection of uncoalesced accesses in GPU programs","authors":"R. Alur, Joseph Devietti, O. N. Leija, N. Singhania","doi":"10.1007/s10703-021-00362-8","DOIUrl":"https://doi.org/10.1007/s10703-021-00362-8","url":null,"abstract":"","PeriodicalId":12430,"journal":{"name":"Formal Methods in System Design","volume":"60 1","pages":"1 - 32"},"PeriodicalIF":0.8,"publicationDate":"2021-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s10703-021-00362-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48491671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Gray-box monitoring of hyperproperties with an application to privacy 超属性的灰盒监控及其在隐私保护中的应用
IF 0.8 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-02-02 DOI: 10.1007/s10703-020-00358-w
Sandro Stucki, César Sánchez, G. Schneider, Borzoo Bonakdarpour
{"title":"Gray-box monitoring of hyperproperties with an application to privacy","authors":"Sandro Stucki, César Sánchez, G. Schneider, Borzoo Bonakdarpour","doi":"10.1007/s10703-020-00358-w","DOIUrl":"https://doi.org/10.1007/s10703-020-00358-w","url":null,"abstract":"","PeriodicalId":12430,"journal":{"name":"Formal Methods in System Design","volume":"58 1","pages":"126 - 159"},"PeriodicalIF":0.8,"publicationDate":"2021-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s10703-020-00358-w","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43219218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Preface of the special issue on the Conference on Formal Methods in Computer-Aided Design 2017 2017计算机辅助设计形式化方法会议特刊前言
IF 0.8 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-01-18 DOI: 10.1007/S10703-020-00357-X
Daryl Stewart, Georg Weissenbacher
{"title":"Preface of the special issue on the Conference on Formal Methods in Computer-Aided Design 2017","authors":"Daryl Stewart, Georg Weissenbacher","doi":"10.1007/S10703-020-00357-X","DOIUrl":"https://doi.org/10.1007/S10703-020-00357-X","url":null,"abstract":"","PeriodicalId":12430,"journal":{"name":"Formal Methods in System Design","volume":"57 1","pages":"303 - 304"},"PeriodicalIF":0.8,"publicationDate":"2021-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/S10703-020-00357-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47321141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Static analysis for detecting high-level races in RTOS kernels 用于检测RTOS内核中高级竞争的静态分析
IF 0.8 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-01-08 DOI: 10.1007/s10703-020-00354-0
Rekha R. Pai, Abhishek Singh, D. D'Souza, Meenakshi D'Souza, Prathibha Prakash
{"title":"Static analysis for detecting high-level races in RTOS kernels","authors":"Rekha R. Pai, Abhishek Singh, D. D'Souza, Meenakshi D'Souza, Prathibha Prakash","doi":"10.1007/s10703-020-00354-0","DOIUrl":"https://doi.org/10.1007/s10703-020-00354-0","url":null,"abstract":"","PeriodicalId":12430,"journal":{"name":"Formal Methods in System Design","volume":"58 1","pages":"294 - 321"},"PeriodicalIF":0.8,"publicationDate":"2021-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s10703-020-00354-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42993249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
From LTL to rLTL monitoring: improved monitorability through robust semantics. 从 LTL 到 rLTL 监控:通过稳健语义提高可监控性。
IF 0.7 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-01-01 Epub Date: 2022-10-21 DOI: 10.1007/s10703-022-00398-4
Corto Mascle, Daniel Neider, Maximilian Schwenger, Paulo Tabuada, Alexander Weinert, Martin Zimmermann

Runtime monitoring is commonly used to detect the violation of desired properties in safety critical cyber-physical systems by observing its executions. Bauer et al. introduced an influential framework for monitoring Linear Temporal Logic (LTL) properties based on a three-valued semantics for a finite execution: the formula is already satisfied by the given execution, it is already violated, or it is still undetermined, i.e., it can still be satisfied and violated by appropriate extensions of the given execution. However, a wide range of formulas are not monitorable under this approach, meaning that there are executions for which satisfaction and violation will always remain undetermined no matter how it is extended. In particular, Bauer et al. report that 44% of the formulas they consider in their experiments fall into this category. Recently, a robust semantics for LTL was introduced to capture different degrees by which a property can be violated. In this paper we introduce a robust semantics for finite strings and show its potential in monitoring: every formula considered by Bauer et al. is monitorable under our approach. Furthermore, we discuss which properties that come naturally in LTL monitoring-such as the realizability of all truth values-can be transferred to the robust setting. We show that LTL formulas with robust semantics can be monitored by deterministic automata, and provide tight bounds on the size of the constructed automaton. Lastly, we report on a prototype implementation and compare it to the LTL monitor of Bauer et al. on a sample of examples.

运行时监控通常用于通过观察安全关键网络物理系统的执行情况来检测其是否违反了所需的属性。Bauer 等人基于有限执行的三值语义,为监控线性时态逻辑 (LTL) 属性提出了一个颇具影响力的框架:给定执行已满足该公式、该公式已被违反或该公式仍未确定,也就是说,通过对给定执行进行适当扩展,仍可满足或违反该公式。然而,在这种方法下,有很多公式是无法监控的,也就是说,有些执行无论如何扩展,其满足和违反情况始终无法确定。特别是,鲍尔等人报告说,他们在实验中考虑的公式中有 44% 属于这一类。最近,人们引入了 LTL 的健壮语义,以捕捉属性被违反的不同程度。在本文中,我们引入了有限字符串的健壮语义,并展示了其在监控方面的潜力:根据我们的方法,鲍尔等人考虑的每个公式都是可监控的。此外,我们还讨论了哪些在 LTL 监控中自然产生的属性(如所有真值的可实现性)可以转移到健壮设置中。我们证明,具有健壮语义的 LTL 公式可以通过确定性自动机进行监控,并对构建的自动机的大小提供了严格的约束。最后,我们报告了一个原型实现,并在一个示例中将其与鲍尔等人的 LTL 监控器进行了比较。
{"title":"From LTL to rLTL monitoring: improved monitorability through robust semantics.","authors":"Corto Mascle, Daniel Neider, Maximilian Schwenger, Paulo Tabuada, Alexander Weinert, Martin Zimmermann","doi":"10.1007/s10703-022-00398-4","DOIUrl":"10.1007/s10703-022-00398-4","url":null,"abstract":"<p><p>Runtime monitoring is commonly used to detect the violation of desired properties in safety critical cyber-physical systems by observing its executions. Bauer et al. introduced an influential framework for monitoring Linear Temporal Logic (LTL) properties based on a three-valued semantics for a finite execution: the formula is already satisfied by the given execution, it is already violated, or it is still undetermined, i.e., it can still be satisfied and violated by appropriate extensions of the given execution. However, a wide range of formulas are not monitorable under this approach, meaning that there are executions for which satisfaction and violation will always remain undetermined no matter how it is extended. In particular, Bauer et al. report that 44% of the formulas they consider in their experiments fall into this category. Recently, a robust semantics for LTL was introduced to capture different degrees by which a property can be violated. In this paper we introduce a robust semantics for finite strings and show its potential in monitoring: every formula considered by Bauer et al. is monitorable under our approach. Furthermore, we discuss which properties that come naturally in LTL monitoring-such as the realizability of all truth values-can be transferred to the robust setting. We show that LTL formulas with robust semantics can be monitored by deterministic automata, and provide tight bounds on the size of the constructed automaton. Lastly, we report on a prototype implementation and compare it to the LTL monitor of Bauer et al. on a sample of examples.</p>","PeriodicalId":12430,"journal":{"name":"Formal Methods in System Design","volume":"59 1-3","pages":"170-204"},"PeriodicalIF":0.7,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9794548/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"10472646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards efficient verification of population protocols. 促进有效核查人口议定书。
IF 0.8 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-01-01 Epub Date: 2021-04-14 DOI: 10.1007/s10703-021-00367-3
Michael Blondin, Javier Esparza, Stefan Jaax, Philipp J Meyer

Population protocols are a well established model of computation by anonymous, identical finite-state agents. A protocol is well-specified if from every initial configuration, all fair executions of the protocol reach a common consensus. The central verification question for population protocols is the well-specification problem: deciding if a given protocol is well-specified. Esparza et al. have recently shown that this problem is decidable, but with very high complexity: it is at least as hard as the Petri net reachability problem, which is TOWER-hard, and for which only algorithms of non-primitive recursive complexity are currently known. In this paper we introduce the class WS 3 of well-specified strongly-silent protocols and we prove that it is suitable for automatic verification. More precisely, we show that WS 3 has the same computational power as general well-specified protocols, and captures standard protocols from the literature. Moreover, we show that the membership and correctness problems for WS 3 reduce to solving boolean combinations of linear constraints over N . This allowed us to develop the first software able to automatically prove correctness for all of the infinitely many possible inputs.

群体协议是由匿名的、相同的有限状态代理进行计算的一个完善的模型。如果从每个初始配置开始,协议的所有公平执行都达到了共同的共识,那么协议就是良好指定的。总体协议的核心验证问题是规范问题:确定给定的协议是否规范良好。Esparza等人最近表明,这个问题是可决定的,但具有非常高的复杂性:它至少与Petri网可达性问题一样难,后者是TOWER-hard的,目前只知道非原语递归复杂性的算法。本文介绍了WS - 3类完备的强静默协议,并证明了它适用于自动验证。更准确地说,我们表明WS 3具有与一般良好指定的协议相同的计算能力,并从文献中获取标准协议。此外,我们还证明了ws3的隶属性和正确性问题可以简化为求解N上线性约束的布尔组合。这使我们能够开发出第一个能够自动证明所有无限多可能输入的正确性的软件。
{"title":"Towards efficient verification of population protocols.","authors":"Michael Blondin,&nbsp;Javier Esparza,&nbsp;Stefan Jaax,&nbsp;Philipp J Meyer","doi":"10.1007/s10703-021-00367-3","DOIUrl":"https://doi.org/10.1007/s10703-021-00367-3","url":null,"abstract":"<p><p>Population protocols are a well established model of computation by anonymous, identical finite-state agents. A protocol is well-specified if from every initial configuration, all fair executions of the protocol reach a common consensus. The central verification question for population protocols is the <i>well-specification problem</i>: deciding if a given protocol is well-specified. Esparza et al. have recently shown that this problem is decidable, but with very high complexity: it is at least as hard as the Petri net reachability problem, which is TOWER-hard, and for which only algorithms of non-primitive recursive complexity are currently known. In this paper we introduce the class <math> <msup><mrow><mi>WS</mi></mrow> <mn>3</mn></msup> </math> of well-specified strongly-silent protocols and we prove that it is suitable for automatic verification. More precisely, we show that <math> <msup><mrow><mi>WS</mi></mrow> <mn>3</mn></msup> </math> has the same computational power as general well-specified protocols, and captures standard protocols from the literature. Moreover, we show that the membership and correctness problems for <math> <msup><mrow><mi>WS</mi></mrow> <mn>3</mn></msup> </math> reduce to solving boolean combinations of linear constraints over <math><mi>N</mi></math> . This allowed us to develop the first software able to automatically prove correctness for <i>all</i> of the infinitely many possible inputs.</p>","PeriodicalId":12430,"journal":{"name":"Formal Methods in System Design","volume":"57 3","pages":"305-342"},"PeriodicalIF":0.8,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s10703-021-00367-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"39946454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Formal methods: practical applications and foundations: Editorial. 正式方法:实际应用和基础:编辑。
IF 0.8 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-01-01 Epub Date: 2021-07-06 DOI: 10.1007/s10703-021-00380-6
Maurice H Ter Beek, Annabelle McIver
{"title":"Formal methods: practical applications and foundations: Editorial.","authors":"Maurice H Ter Beek,&nbsp;Annabelle McIver","doi":"10.1007/s10703-021-00380-6","DOIUrl":"https://doi.org/10.1007/s10703-021-00380-6","url":null,"abstract":"","PeriodicalId":12430,"journal":{"name":"Formal Methods in System Design","volume":"58 1-2","pages":"1-4"},"PeriodicalIF":0.8,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s10703-021-00380-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"39173325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Formal Methods: 24th International Symposium, FM 2021, Virtual Event, November 20–26, 2021, Proceedings 正式方法:第24届国际研讨会,FM 2021,虚拟事件,11月20日至26日,2021,会议录
IF 0.8 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-01-01 DOI: 10.1007/978-3-030-90870-6
{"title":"Formal Methods: 24th International Symposium, FM 2021, Virtual Event, November 20–26, 2021, Proceedings","authors":"","doi":"10.1007/978-3-030-90870-6","DOIUrl":"https://doi.org/10.1007/978-3-030-90870-6","url":null,"abstract":"","PeriodicalId":12430,"journal":{"name":"Formal Methods in System Design","volume":"56 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82628052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Debug-localize-repair: a symbiotic construction for heap manipulations 调试-本地化修复:堆操作的共生构造
IF 0.8 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-11-26 DOI: 10.1007/s10703-021-00387-z
Sahil Verma, Subhajit Roy
{"title":"Debug-localize-repair: a symbiotic construction for heap manipulations","authors":"Sahil Verma, Subhajit Roy","doi":"10.1007/s10703-021-00387-z","DOIUrl":"https://doi.org/10.1007/s10703-021-00387-z","url":null,"abstract":"","PeriodicalId":12430,"journal":{"name":"Formal Methods in System Design","volume":"58 1","pages":"399 - 439"},"PeriodicalIF":0.8,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42305624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Integrating formal specifications into applications: the ProB Java API 将正式规范集成到应用程序中:ProB Java API
IF 0.8 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-10-21 DOI: 10.1007/s10703-020-00351-3
Philipp Körner, Jens Bendisposto, Jannik Dunkelau, Sebastian Krings, M. Leuschel
{"title":"Integrating formal specifications into applications: the ProB Java API","authors":"Philipp Körner, Jens Bendisposto, Jannik Dunkelau, Sebastian Krings, M. Leuschel","doi":"10.1007/s10703-020-00351-3","DOIUrl":"https://doi.org/10.1007/s10703-020-00351-3","url":null,"abstract":"","PeriodicalId":12430,"journal":{"name":"Formal Methods in System Design","volume":"58 1","pages":"160 - 187"},"PeriodicalIF":0.8,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s10703-020-00351-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43991609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
Formal Methods in System Design
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1