首页 > 最新文献

Proceedings of the Posters and Demos Session of the 17th International Middleware Conference最新文献

英文 中文
Understanding the Behavior of Spark Workloads from Linux Kernel Parameters Perspective 从Linux内核参数的角度理解Spark工作负载的行为
Li Wang, Tianni Xu, Jing Wang, Wei-gong Zhang, Xiufeng Sui, Yungang Bao
Despite a number of innovative computer systems with high capacity memory have been built, the design principles behind an operating system kernel have remained unchanged for decades. We argue that kernel parameters is a kind of special interface of operating system and must be factored into the operation and maintenance of datacenters. To shed some light on the effectiveness of tuning Linux parameters of virtual memory subsystem when running Spark workloads, we evaluate the benchmarks in a simple standalone deploy mode. Our performance results reveal that some of the Linux memory parameters must be carefully set to efficiently support these processing workloads. We hope this work yields insights for datacenter system operators.
尽管已经建立了许多具有高容量内存的创新计算机系统,但操作系统内核背后的设计原则几十年来一直保持不变。认为内核参数是操作系统的一种特殊接口,是数据中心运维中必须考虑的因素。为了说明在运行Spark工作负载时调优虚拟内存子系统的Linux参数的有效性,我们在简单的独立部署模式下评估基准测试。我们的性能结果表明,必须仔细设置一些Linux内存参数才能有效地支持这些处理工作负载。我们希望这项工作能够为数据中心系统操作员提供见解。
{"title":"Understanding the Behavior of Spark Workloads from Linux Kernel Parameters Perspective","authors":"Li Wang, Tianni Xu, Jing Wang, Wei-gong Zhang, Xiufeng Sui, Yungang Bao","doi":"10.1145/3007592.3007593","DOIUrl":"https://doi.org/10.1145/3007592.3007593","url":null,"abstract":"Despite a number of innovative computer systems with high capacity memory have been built, the design principles behind an operating system kernel have remained unchanged for decades. We argue that kernel parameters is a kind of special interface of operating system and must be factored into the operation and maintenance of datacenters. To shed some light on the effectiveness of tuning Linux parameters of virtual memory subsystem when running Spark workloads, we evaluate the benchmarks in a simple standalone deploy mode. Our performance results reveal that some of the Linux memory parameters must be carefully set to efficiently support these processing workloads. We hope this work yields insights for datacenter system operators.","PeriodicalId":125362,"journal":{"name":"Proceedings of the Posters and Demos Session of the 17th International Middleware Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130713508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ALMA: GC-assisted JVM Live Migration for Java Server Applications ALMA: GC-assisted JVM Live Migration for Java Server Applications
R. Bruno, P. Ferreira
Live migration of Java Virtual Machines (JVMs) consumes significant amounts of time and resources, imposing relevant application performance overhead. This problem is specially hard when memory modified by applications changes faster than it can be transferred through the network (to a remote host). Current solutions to this problem resort to several techniques which depend on high-speed networks and application throttling, require lots of CPU time to compress memory, or need explicit assistance from the application. We propose a novel approach, Garbage Collector (GC) assisted JVM Live Migration for Java Server Applications (ALMA). ALMA makes a snapshot to be migrated containing a minimal amount of application state, by taking into account the amount of reachable memory (i.e. live data) detected by the GC. The main novelty of ALMA is the following: ALMA analyzes the JVM heap looking for regions in which a collection phase is advantageous w.r.t. the network bandwidth available (i.e. it pays to collect because a significant amount of memory will not be part of the snapshot). ALMA is implemented on OpenJDK 8 and extends CRIU (a Linux disk-based process checkpoint/restore tool) to support process live migration over the network. We evaluate ALMA using well-known JVM performance benchmarks (SPECjvm2008 and DaCapo), and by comparing it to other previous approaches. ALMA shows very good performance results.
Java虚拟机(jvm)的实时迁移消耗了大量的时间和资源,增加了相关的应用程序性能开销。当应用程序修改的内存的变化速度比通过网络(到远程主机)传输的速度快时,这个问题特别困难。当前这个问题的解决方案依赖于几种技术,这些技术依赖于高速网络和应用程序节流,需要大量CPU时间来压缩内存,或者需要应用程序的明确帮助。我们提出了一种新的方法,垃圾收集器(GC)辅助JVM实时迁移Java服务器应用程序(ALMA)。ALMA通过考虑GC检测到的可达内存(即实时数据)的数量,使要迁移的快照包含最少量的应用程序状态。ALMA的主要新颖之处如下:ALMA分析JVM堆,寻找收集阶段相对于可用网络带宽有利的区域(也就是说,收集是值得的,因为大量内存不会成为快照的一部分)。ALMA是在OpenJDK 8上实现的,并扩展了CRIU(一种基于Linux磁盘的进程检查点/恢复工具),以支持进程在网络上的实时迁移。我们使用著名的JVM性能基准(SPECjvm2008和DaCapo)评估ALMA,并将其与之前的其他方法进行比较。ALMA显示了非常好的性能结果。
{"title":"ALMA: GC-assisted JVM Live Migration for Java Server Applications","authors":"R. Bruno, P. Ferreira","doi":"10.1145/3007592.3007603","DOIUrl":"https://doi.org/10.1145/3007592.3007603","url":null,"abstract":"Live migration of Java Virtual Machines (JVMs) consumes significant amounts of time and resources, imposing relevant application performance overhead. This problem is specially hard when memory modified by applications changes faster than it can be transferred through the network (to a remote host). Current solutions to this problem resort to several techniques which depend on high-speed networks and application throttling, require lots of CPU time to compress memory, or need explicit assistance from the application. We propose a novel approach, Garbage Collector (GC) assisted JVM Live Migration for Java Server Applications (ALMA). ALMA makes a snapshot to be migrated containing a minimal amount of application state, by taking into account the amount of reachable memory (i.e. live data) detected by the GC. The main novelty of ALMA is the following: ALMA analyzes the JVM heap looking for regions in which a collection phase is advantageous w.r.t. the network bandwidth available (i.e. it pays to collect because a significant amount of memory will not be part of the snapshot). ALMA is implemented on OpenJDK 8 and extends CRIU (a Linux disk-based process checkpoint/restore tool) to support process live migration over the network. We evaluate ALMA using well-known JVM performance benchmarks (SPECjvm2008 and DaCapo), and by comparing it to other previous approaches. ALMA shows very good performance results.","PeriodicalId":125362,"journal":{"name":"Proceedings of the Posters and Demos Session of the 17th International Middleware Conference","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117331407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Hairspring: Online graph processing middleware for temporal networks 游丝:用于时态网络的在线图形处理中间件
Jaewook Byun, Sungpil Woo, Daeyoung Kim
The researches of temporal graph have been conducted in interdisciplinary fields and applied to various kinds of networks; online social network, cell biology network, neural network, ecological network, etc. However, processing and understanding the networks would be complicated for application developers due to their high velocity and volume. Also, the heterogeneity of the networks incurs their unified usage. Therefore, we propose the online graph processing middleware for temporal networks, namely Hairspring. The middleware is based on the temporal property graph, which we leverage the property graph model, Blueprints, with temporal extensions. Based on the temporal property graph, we present and prototype the publish-subscribe architecture, which enables to publish graph elements and notify the processed graph elements of interest to subscribers on the fly.
时间图的研究已在多学科交叉领域展开,并应用于各类网络;在线社交网络、细胞生物学网络、神经网络、生态网络等。然而,对于应用程序开发人员来说,处理和理解网络将是复杂的,因为它们的速度和数量都很高。同时,网络的异构性也导致了网络的统一使用。为此,我们提出了面向时态网络的在线图处理中间件Hairspring。中间件基于时态属性图,我们利用属性图模型Blueprints和时态扩展。在时态属性图的基础上,提出了发布-订阅体系结构并对其进行了原型化,该体系结构能够实时发布图形元素,并将处理后的感兴趣的图形元素通知订阅者。
{"title":"Hairspring: Online graph processing middleware for temporal networks","authors":"Jaewook Byun, Sungpil Woo, Daeyoung Kim","doi":"10.1145/3007592.3007598","DOIUrl":"https://doi.org/10.1145/3007592.3007598","url":null,"abstract":"The researches of temporal graph have been conducted in interdisciplinary fields and applied to various kinds of networks; online social network, cell biology network, neural network, ecological network, etc. However, processing and understanding the networks would be complicated for application developers due to their high velocity and volume. Also, the heterogeneity of the networks incurs their unified usage. Therefore, we propose the online graph processing middleware for temporal networks, namely Hairspring. The middleware is based on the temporal property graph, which we leverage the property graph model, Blueprints, with temporal extensions. Based on the temporal property graph, we present and prototype the publish-subscribe architecture, which enables to publish graph elements and notify the processed graph elements of interest to subscribers on the fly.","PeriodicalId":125362,"journal":{"name":"Proceedings of the Posters and Demos Session of the 17th International Middleware Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129219611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Leveraging Query Sensitivity for Practical Private Web Search 利用查询敏感性的实用私人网络搜索
A. Boutet, Albin Petit, Sonia Ben Mokhtar, Léa Laporte
Several private Web search solutions have been proposed to preserve the user privacy while querying search engines. However, most of these solutions are costly in term of processing, network overhead and latency as they mostly rely on cryptographic techniques and/or the generation of fake requests. Furthermore, all these solutions protect all queries similarly, ignoring whether the original request contains sensitive content (e.g., religious, political or sexual orientation) or not. Based on an analysis of a real dataset of Web search requests, we show that queries related to sensitive matters are in practice a minority. As a consequence, protecting all queries similarly results in poor performance as a large number of queries get overprotected. In this paper, we propose a request sensitivity assessment module that we use for improving the practicability of existing private web search solutions. We assess the sensitivity of a request in two phases: a semantic sensitivity analysis (based on the topic of the query) and a request linkability analysis (based on the similarity between the current query and the query history of the requester). Finally, the sensitivity assessment is used to adapt the level of protection of a given query according to its identified degree of sensitivity: the more sensitive a query is, the more protected it will be. Experiments with a real dataset show that our approach can improve the performance of state-of-the-arts private Web search solutions by reducing the number of queries overprotected, while ensuring a similar level of privacy to the users, making them more likely to be used in practice.
为了在查询搜索引擎时保护用户的隐私,已经提出了几种私有Web搜索解决方案。然而,这些解决方案中的大多数在处理、网络开销和延迟方面都是昂贵的,因为它们主要依赖于加密技术和/或生成虚假请求。此外,所有这些解决方案都类似地保护所有查询,忽略原始请求是否包含敏感内容(例如,宗教、政治或性取向)。基于对Web搜索请求的真实数据集的分析,我们表明与敏感事项相关的查询实际上是少数。因此,类似地保护所有查询会导致性能下降,因为大量查询会受到过度保护。在本文中,我们提出了一个请求敏感性评估模块,我们使用它来提高现有私有web搜索解决方案的实用性。我们分两个阶段评估请求的敏感性:语义敏感性分析(基于查询的主题)和请求可链接性分析(基于当前查询和请求者的查询历史之间的相似性)。最后,敏感性评估用于根据确定的敏感性来调整给定查询的保护级别:查询越敏感,保护程度越高。对真实数据集的实验表明,我们的方法可以通过减少过度保护的查询数量来提高最先进的私有Web搜索解决方案的性能,同时确保用户的隐私水平相似,使它们更有可能在实践中使用。
{"title":"Leveraging Query Sensitivity for Practical Private Web Search","authors":"A. Boutet, Albin Petit, Sonia Ben Mokhtar, Léa Laporte","doi":"10.1145/3007592.3007595","DOIUrl":"https://doi.org/10.1145/3007592.3007595","url":null,"abstract":"Several private Web search solutions have been proposed to preserve the user privacy while querying search engines. However, most of these solutions are costly in term of processing, network overhead and latency as they mostly rely on cryptographic techniques and/or the generation of fake requests. Furthermore, all these solutions protect all queries similarly, ignoring whether the original request contains sensitive content (e.g., religious, political or sexual orientation) or not. Based on an analysis of a real dataset of Web search requests, we show that queries related to sensitive matters are in practice a minority. As a consequence, protecting all queries similarly results in poor performance as a large number of queries get overprotected. In this paper, we propose a request sensitivity assessment module that we use for improving the practicability of existing private web search solutions. We assess the sensitivity of a request in two phases: a semantic sensitivity analysis (based on the topic of the query) and a request linkability analysis (based on the similarity between the current query and the query history of the requester). Finally, the sensitivity assessment is used to adapt the level of protection of a given query according to its identified degree of sensitivity: the more sensitive a query is, the more protected it will be. Experiments with a real dataset show that our approach can improve the performance of state-of-the-arts private Web search solutions by reducing the number of queries overprotected, while ensuring a similar level of privacy to the users, making them more likely to be used in practice.","PeriodicalId":125362,"journal":{"name":"Proceedings of the Posters and Demos Session of the 17th International Middleware Conference","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127604498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evidential Reasoning Based Fault Diagnosis 基于证据推理的故障诊断
B. Viswanathan, Seep Goel, Mudit Verma, Ravina Kothari
Fault diagnosis in IT environments is complicated because (i) most monitors have shared specificity (high amount of memory utilization can result from a large number of causes), (ii) it is hard to deploy and maintain enough sensors to ensure adequate coverage, and (iii) some functionality may be provided as-a-service by external parties with limited visibility and simultaneous availability of alert data. To systematically incorporate uncertainty and to be able to fuse information from multiple sources, we propose the use of Dempster-Shafer Theory (DST) of evidential reasoning for fault diagnosis and show its efficacy in the context of a distributed application.
IT环境中的故障诊断是复杂的,因为(i)大多数监视器具有共享的特异性(大量的原因可能导致大量的内存利用率),(ii)很难部署和维护足够的传感器以确保足够的覆盖范围,以及(iii)某些功能可能由外部方作为服务提供,具有有限的可见性和警报数据的同时可用性。为了系统地纳入不确定性并能够融合来自多个来源的信息,我们提出使用证据推理的Dempster-Shafer理论(DST)进行故障诊断,并显示其在分布式应用环境中的有效性。
{"title":"Evidential Reasoning Based Fault Diagnosis","authors":"B. Viswanathan, Seep Goel, Mudit Verma, Ravina Kothari","doi":"10.1145/3007592.3007602","DOIUrl":"https://doi.org/10.1145/3007592.3007602","url":null,"abstract":"Fault diagnosis in IT environments is complicated because (i) most monitors have shared specificity (high amount of memory utilization can result from a large number of causes), (ii) it is hard to deploy and maintain enough sensors to ensure adequate coverage, and (iii) some functionality may be provided as-a-service by external parties with limited visibility and simultaneous availability of alert data. To systematically incorporate uncertainty and to be able to fuse information from multiple sources, we propose the use of Dempster-Shafer Theory (DST) of evidential reasoning for fault diagnosis and show its efficacy in the context of a distributed application.","PeriodicalId":125362,"journal":{"name":"Proceedings of the Posters and Demos Session of the 17th International Middleware Conference","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114183932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy-enhancing Federated Middleware for the Internet of Things 增强隐私的物联网联邦中间件
Paul Fremantle, B. Aziz
OAuthing and IGNITE are federated middleware that together provide an improved model for sharing data from Internet of Things (IoT) devices to Cloud Services. OAuthing provides an identity broker and authorization server that issues OAuth2 anonymised credentials based on upstream identities from the User's Identity Provider. IGNITE is a cloud-based message router that uses identity and authorization policies from OAuthing to instantiate each user a cloud-based container for sharing their data. The demonstration will show the post-manufacturing process to register a device with OAuthing, together with a user "claiming" a device. Once the device is claimed it will be connected to a third-party cloud service, with full user consent to create an policy. We will then demonstrate the policy in action and the creation of a cloud-instance on behalf of the user.
OAuthing和IGNITE是联合中间件,它们共同提供了一个改进的模型,用于从物联网(IoT)设备到云服务的数据共享。OAuthing提供了一个身份代理和授权服务器,它根据来自用户身份提供者的上游身份颁发OAuth2匿名凭据。IGNITE是一个基于云的消息路由器,它使用OAuthing的身份和授权策略来为每个用户实例化一个基于云的容器,用于共享他们的数据。该演示将展示在OAuthing上注册设备的制造后流程,以及用户“声明”设备的过程。一旦设备被认领,它将被连接到第三方云服务,并获得用户的完全同意来创建策略。然后,我们将演示实际操作的策略以及代表用户创建云实例的过程。
{"title":"Privacy-enhancing Federated Middleware for the Internet of Things","authors":"Paul Fremantle, B. Aziz","doi":"10.1145/3007592.3007596","DOIUrl":"https://doi.org/10.1145/3007592.3007596","url":null,"abstract":"OAuthing and IGNITE are federated middleware that together provide an improved model for sharing data from Internet of Things (IoT) devices to Cloud Services. OAuthing provides an identity broker and authorization server that issues OAuth2 anonymised credentials based on upstream identities from the User's Identity Provider. IGNITE is a cloud-based message router that uses identity and authorization policies from OAuthing to instantiate each user a cloud-based container for sharing their data. The demonstration will show the post-manufacturing process to register a device with OAuthing, together with a user \"claiming\" a device. Once the device is claimed it will be connected to a third-party cloud service, with full user consent to create an policy. We will then demonstrate the policy in action and the creation of a cloud-instance on behalf of the user.","PeriodicalId":125362,"journal":{"name":"Proceedings of the Posters and Demos Session of the 17th International Middleware Conference","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128417377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Self-stabilizing Reconfiguration 具有自我稳定功能的重新配置
S. Dolev, Chryssis Georgiou, Ioannis Marcoullis, E. Schiller
Current reconfiguration techniques depend on starting the system in a consistent configuration, in which all participating entities are in a predefined state. Starting from that state, the system must preserve consistency as long as a predefined churn rate of processors joins and leaves is not violated, and unbounded storage is available. Many systems cannot control this churn rate and lack access to unbounded storage. System designers that neglect the outcome of violating the above assumptions may doom the system to exhibit illegal behaviors. We present the first automatically recovering reconfiguration scheme that recovers from transient faults, such as temporal violations of the above assumptions. Our self-stabilizing solutions regain safety automatically by assuming temporal access to reliable failure detectors (FDs). Once safety is established, the FD reliability is no longer needed. Still, liveness is conditioned by the FD’s unreliable signals. Our self-stabilizing reconfiguration techniques can serve as the basis for the implementation of several dynamic services over message passing systems. Examples include self-stabilizing reconfigurable virtual synchrony, extendable to a self-stabilizing reconfigurable state machine replication.
当前的重新配置技术依赖于在一致的配置中启动系统,其中所有参与的实体都处于预定义的状态。从那个状态开始,系统必须保持一致性,只要不违反预定义的处理器加入和离开的流失率,并且有无限的存储可用。许多系统无法控制这种流失率,并且无法访问无限存储。如果系统设计者忽视了违反上述假设的结果,则可能导致系统出现非法行为。我们提出了第一个自动恢复重构方案,该方案可以从瞬态故障中恢复,例如暂时违反上述假设。我们的自稳定解决方案通过假定临时访问可靠的故障检测器(fd)来自动恢复安全性。一旦建立了安全性,FD的可靠性就不再需要了。尽管如此,生命还是受到FD不可靠信号的制约。我们的自稳定重新配置技术可以作为在消息传递系统上实现多个动态服务的基础。示例包括自稳定可重构虚拟同步,可扩展到自稳定可重构状态机复制。
{"title":"Self-stabilizing Reconfiguration","authors":"S. Dolev, Chryssis Georgiou, Ioannis Marcoullis, E. Schiller","doi":"10.1145/3007592.3007600","DOIUrl":"https://doi.org/10.1145/3007592.3007600","url":null,"abstract":"Current reconfiguration techniques depend on starting the system in a consistent configuration, in which all participating entities are in a predefined state. Starting from that state, the system must preserve consistency as long as a predefined churn rate of processors joins and leaves is not violated, and unbounded storage is available. Many systems cannot control this churn rate and lack access to unbounded storage. System designers that neglect the outcome of violating the above assumptions may doom the system to exhibit illegal behaviors. We present the first automatically recovering reconfiguration scheme that recovers from transient faults, such as temporal violations of the above assumptions. Our self-stabilizing solutions regain safety automatically by assuming temporal access to reliable failure detectors (FDs). Once safety is established, the FD reliability is no longer needed. Still, liveness is conditioned by the FD’s unreliable signals. Our self-stabilizing reconfiguration techniques can serve as the basis for the implementation of several dynamic services over message passing systems. Examples include self-stabilizing reconfigurable virtual synchrony, extendable to a self-stabilizing reconfigurable state machine replication.","PeriodicalId":125362,"journal":{"name":"Proceedings of the Posters and Demos Session of the 17th International Middleware Conference","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116462359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Proceedings of the Posters and Demos Session of the 17th International Middleware Conference 第十七届国际中间件会议的海报和演示会议记录
{"title":"Proceedings of the Posters and Demos Session of the 17th International Middleware Conference","authors":"","doi":"10.1145/3007592","DOIUrl":"https://doi.org/10.1145/3007592","url":null,"abstract":"","PeriodicalId":125362,"journal":{"name":"Proceedings of the Posters and Demos Session of the 17th International Middleware Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124902542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the Posters and Demos Session of the 17th International Middleware Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1