首页 > 最新文献

International Conference on Internet Computing最新文献

英文 中文
BMML: Braille Music Markup Language bml:盲文音乐标记语言
Pub Date : 2009-08-26 DOI: 10.2174/1874133900903020123
Benoît Encelle, Nadine Baptiste-Jessel, J. Mothe, Bachelin Ralalason
Thanks to the WAI (Web Accessibility Initiative) guidelines for producing accessible HTML documents, visually impaired people can have better access to a lot of textual information. Concerning musical score, several encoding formats are available, focusing on the representation of different aspects of this kind of content. As XML is the standard for exchanging content through the Web, several XML applications have already been specified for representing musical scores, using the traditional music notation. As a result, users can access and share a lot of different types of musical content using the Web. However, for specific notations – like the Braille one - no dedicated XML application has been developed yet. Therefore, visually impaired musicians cannot easily represent, share, and access scores using the Web. This paper presents the application we have developed to respond to this need: BMML (Braille Music Markup Language). BMML handles specificities of Braille Music notation and takes into account the core features of existing formats. The main objective of BMML is to improve the accessibility of Braille musical scores.
多亏了WAI (Web Accessibility Initiative,无障碍网页倡议)关于制作无障碍HTML文档的指导方针,视障人士可以更好地访问大量文本信息。对于乐谱,有几种编码格式可供选择,重点关注这类内容的不同方面的表示。由于XML是通过Web交换内容的标准,因此已经指定了几个XML应用程序来使用传统音乐符号表示乐谱。因此,用户可以通过网络访问和分享许多不同类型的音乐内容。但是,对于特定的表示法(如Braille表示法),还没有开发专门的XML应用程序。因此,视障音乐家不能通过网络轻松地表示、分享和访问乐谱。本文介绍了我们为满足这一需求而开发的应用程序:bml(盲文音乐标记语言)。BMML处理盲文音乐符号的特殊性,并考虑到现有格式的核心特性。bml的主要目标是提高盲文乐谱的可访问性。
{"title":"BMML: Braille Music Markup Language","authors":"Benoît Encelle, Nadine Baptiste-Jessel, J. Mothe, Bachelin Ralalason","doi":"10.2174/1874133900903020123","DOIUrl":"https://doi.org/10.2174/1874133900903020123","url":null,"abstract":"Thanks to the WAI (Web Accessibility Initiative) guidelines for producing accessible HTML documents, visually impaired people can have better access to a lot of textual information. Concerning musical score, several encoding formats are available, focusing on the representation of different aspects of this kind of content. As XML is the standard for exchanging content through the Web, several XML applications have already been specified for representing musical scores, using the traditional music notation. As a result, users can access and share a lot of different types of musical content using the Web. However, for specific notations – like the Braille one - no dedicated XML application has been developed yet. Therefore, visually impaired musicians cannot easily represent, share, and access scores using the Web. This paper presents the application we have developed to respond to this need: BMML (Braille Music Markup Language). BMML handles specificities of Braille Music notation and takes into account the core features of existing formats. The main objective of BMML is to improve the accessibility of Braille musical scores.","PeriodicalId":126578,"journal":{"name":"International Conference on Internet Computing","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132539711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Review on Computational Trust Models for Multi-agent Systems 多智能体系统计算信任模型研究进展
Pub Date : 2009-02-26 DOI: 10.2174/1874947X00902010018
Gehao Lu, Joan Lu, Shaowen Yao, Y. J. Yip
Trust plays important roles on effective interaction and cooperation for multi-agent systems(MAS). This study aims at finding out the current situation and future trends of computational trustfor multi-agent systems. Through defining seven common compositional elements for the computational trust models, the study points out significant weaknesses in the current design. Finally, the paper figures out the future research trends through discussion and analysis around the strengths and weaknesses identified. Also the paper proposes an idea of using ontology and XML technologies such as RDF that allow systems to provide both human and machine readable annotations for trust models.
信任对多智能体系统的有效交互与合作起着重要作用。本研究旨在了解多智能体系统计算信任的现状和未来趋势。通过定义计算信任模型的七个常见组成元素,研究指出了当前设计中的重大缺陷。最后,本文围绕所发现的优势和不足进行了讨论和分析,指出了未来的研究趋势。本文还提出了使用本体和XML技术(如RDF)的想法,这些技术允许系统为信任模型提供人类和机器可读的注释。
{"title":"A Review on Computational Trust Models for Multi-agent Systems","authors":"Gehao Lu, Joan Lu, Shaowen Yao, Y. J. Yip","doi":"10.2174/1874947X00902010018","DOIUrl":"https://doi.org/10.2174/1874947X00902010018","url":null,"abstract":"Trust plays important roles on effective interaction and cooperation for multi-agent systems(MAS). This study aims at finding out the current situation and future trends of computational trustfor multi-agent systems. Through defining seven common compositional elements for the computational trust models, the study points out significant weaknesses in the current design. Finally, the paper figures out the future research trends through discussion and analysis around the strengths and weaknesses identified. Also the paper proposes an idea of using ontology and XML technologies such as RDF that allow systems to provide both human and machine readable annotations for trust models.","PeriodicalId":126578,"journal":{"name":"International Conference on Internet Computing","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130402773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
Native Temporal Slicing Support for XML Databases 原生时间切片支持XML数据库
Pub Date : 2009-02-26 DOI: 10.2174/1874947X00902020002
F. Mandreoli, R. Martoglia, E. Ronchetti
XML databases, providing structural querying support, are becoming more and more popular. As we know, XML data may change over time and providing an efficient support to queries which also involve temporal aspects is still an open issue. In this paper we present our native Temporal XML Query Processor, which exploits an ad-hoc temporal in- dexing scheme relying on relational approaches and a technology supporting temporal slicing. As we show through an ex- tensive experimental evaluation, our solution achieves good efficiency results, outperforming stratum-based solutions when dealing with time-related application requirements while continuing to guarantee good performance in traditional scenarios.
提供结构化查询支持的XML数据库正变得越来越流行。正如我们所知,XML数据可能会随着时间的推移而变化,因此为涉及时间方面的查询提供有效的支持仍然是一个有待解决的问题。在本文中,我们提出了我们的本地时态XML查询处理器,它利用了一种依赖于关系方法的临时索引方案和支持时态切片的技术。正如我们通过广泛的实验评估所显示的那样,我们的解决方案获得了良好的效率结果,在处理与时间相关的应用需求时优于基于地层的解决方案,同时继续保证传统场景中的良好性能。
{"title":"Native Temporal Slicing Support for XML Databases","authors":"F. Mandreoli, R. Martoglia, E. Ronchetti","doi":"10.2174/1874947X00902020002","DOIUrl":"https://doi.org/10.2174/1874947X00902020002","url":null,"abstract":"XML databases, providing structural querying support, are becoming more and more popular. As we know, XML data may change over time and providing an efficient support to queries which also involve temporal aspects is still an open issue. In this paper we present our native Temporal XML Query Processor, which exploits an ad-hoc temporal in- dexing scheme relying on relational approaches and a technology supporting temporal slicing. As we show through an ex- tensive experimental evaluation, our solution achieves good efficiency results, outperforming stratum-based solutions when dealing with time-related application requirements while continuing to guarantee good performance in traditional scenarios.","PeriodicalId":126578,"journal":{"name":"International Conference on Internet Computing","volume":"326 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122631921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mobile Agent based Data Fusion for Wireless Sensor Networks with a XML Framework 基于移动代理的XML框架无线传感器网络数据融合
Pub Date : 2008-07-15 DOI: 10.2174/1874133900903020136
Gehao Lu, Joan Lu, Y. J. Yip
A device for preventing a motor from being locked comprises a position indicator for indicating a position to be moved in response to rotation of the motor, a position detector for detecting the position being moved in response to rotation of the motor, a servo control unit for supplying a current to the motor so that an output signal from the position detector will be equalized with an indication by the position indicator, a stop detector for detecting stoppage of the motor in response to a differential of the output signal from the position detector, and a cutoff control unit for cutting off the current supplied from the servo control unit to the motor in response to an output signal from the stop detector.
一种防止电机被锁定的装置,包括用于指示响应于电机旋转的待移动位置的位置指示器、用于检测响应于电机旋转的待移动位置的位置检测器、用于向电机供电以使位置检测器的输出信号与位置指示器的指示相平衡的伺服控制单元。一种停止检测器,用于检测响应于位置检测器输出信号的差动所述电机的停止,以及一种切断控制单元,用于切断响应于所述停止检测器输出信号所述伺服控制单元提供给所述电机的电流。
{"title":"Mobile Agent based Data Fusion for Wireless Sensor Networks with a XML Framework","authors":"Gehao Lu, Joan Lu, Y. J. Yip","doi":"10.2174/1874133900903020136","DOIUrl":"https://doi.org/10.2174/1874133900903020136","url":null,"abstract":"A device for preventing a motor from being locked comprises a position indicator for indicating a position to be moved in response to rotation of the motor, a position detector for detecting the position being moved in response to rotation of the motor, a servo control unit for supplying a current to the motor so that an output signal from the position detector will be equalized with an indication by the position indicator, a stop detector for detecting stoppage of the motor in response to a differential of the output signal from the position detector, and a cutoff control unit for cutting off the current supplied from the servo control unit to the motor in response to an output signal from the stop detector.","PeriodicalId":126578,"journal":{"name":"International Conference on Internet Computing","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114591852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The RTP Payload Format for Telepointing 远程指示的RTP有效载荷格式
Pub Date : 2002-03-01 DOI: 10.3745/KIPSTA.2002.9A.1.029
Jaewoo Jeon, S. Oh
For the efficient collaboration awareness, the CSCW (Computer-Supported Cooperative Work) systems provide functions such as telepointing, snap-shot, and document/project tracking. Among these, telepointing allows an event occurrence on the shared window of a local computing system to be presented in remote computing systems. Although telepointing has been mentioned in the literature, few research papers deal with the functional requirements and protocols for telepointing. This parer describes the functional requirements and payload format for RTP (Real-Time Transport Protocol)-based telepointing. In order to evaluate the performance of the proposed RTP-barred telepointing, we have implemented a whiteboard and compared it with that of the Microsoft Netmeeting. The evaluation results show that the proposed telepointing performs better in terms of CPU usage and the amount of network traffic.
为了有效的协作意识,CSCW(计算机支持的协同工作)系统提供了远程指示、快照和文档/项目跟踪等功能。其中,远程指示允许在远程计算系统中呈现本地计算系统的共享窗口上发生的事件。虽然在文献中已经提到了远程指示,但很少有研究论文涉及远程指示的功能需求和协议。本文描述了基于RTP(实时传输协议)的远程指示的功能需求和有效载荷格式。为了评估提议的rtp禁止远程指示的性能,我们实现了一个白板,并将其与Microsoft Netmeeting的白板进行了比较。评估结果表明,该方法在CPU利用率和网络流量方面具有更好的性能。
{"title":"The RTP Payload Format for Telepointing","authors":"Jaewoo Jeon, S. Oh","doi":"10.3745/KIPSTA.2002.9A.1.029","DOIUrl":"https://doi.org/10.3745/KIPSTA.2002.9A.1.029","url":null,"abstract":"For the efficient collaboration awareness, the CSCW (Computer-Supported Cooperative Work) systems provide functions such as telepointing, snap-shot, and document/project tracking. Among these, telepointing allows an event occurrence on the shared window of a local computing system to be presented in remote computing systems. Although telepointing has been mentioned in the literature, few research papers deal with the functional requirements and protocols for telepointing. This parer describes the functional requirements and payload format for RTP (Real-Time Transport Protocol)-based telepointing. In order to evaluate the performance of the proposed RTP-barred telepointing, we have implemented a whiteboard and compared it with that of the Microsoft Netmeeting. The evaluation results show that the proposed telepointing performs better in terms of CPU usage and the amount of network traffic.","PeriodicalId":126578,"journal":{"name":"International Conference on Internet Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116069972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing Email Communication with XML Technology 用XML技术保护电子邮件通信
Pub Date : 1900-01-01 DOI: 10.4018/978-1-59904-855-0.CH017
L. Liao, Jörg Schwenk
This chapter deals with the issues concerning e-mail communication security. We analyze the most popular security mechanisms and standards related to the e-mail communication and identify potential threats and vulnerabilities. The most significant drawback of all current approaches is the impossibility of keeping headers information authentic. This leads to possible impersonation attacks and profiling of the e-mail communication, and encourages spam and phishing activities. Furthermore, none of the currently available security mechanisms supports partial signature generation of the e-mail content by distinct signers, which might be useful in commercial scenarios. To handle these problems, we suggest a new approach, called XMaiL, which can be considered as an advanced email security mechanism based on the popular XML technologies. The proposed XMaiL supersedes all currently available e-mail security standards in the sense of the higher flexibility and security.
本章讨论有关电子邮件通信安全的问题。我们分析了与电子邮件通信相关的最流行的安全机制和标准,并确定了潜在的威胁和漏洞。当前所有方法的最大缺点是无法保证报头信息的真实性。这可能导致对电子邮件通信的模拟攻击和分析,并鼓励垃圾邮件和网络钓鱼活动。此外,目前可用的安全机制都不支持由不同的签名者生成电子邮件内容的部分签名,这在商业场景中可能很有用。为了处理这些问题,我们建议采用一种称为XMaiL的新方法,可以将其视为基于流行XML技术的高级电子邮件安全机制。拟议的XMaiL在更高的灵活性和安全性方面取代了所有当前可用的电子邮件安全标准。
{"title":"Securing Email Communication with XML Technology","authors":"L. Liao, Jörg Schwenk","doi":"10.4018/978-1-59904-855-0.CH017","DOIUrl":"https://doi.org/10.4018/978-1-59904-855-0.CH017","url":null,"abstract":"This chapter deals with the issues concerning e-mail communication security. We analyze the most popular security mechanisms and standards related to the e-mail communication and identify potential threats and vulnerabilities. The most significant drawback of all current approaches is the impossibility of keeping headers information authentic. This leads to possible impersonation attacks and profiling of the e-mail communication, and encourages spam and phishing activities. Furthermore, none of the currently available security mechanisms supports partial signature generation of the e-mail content by distinct signers, which might be useful in commercial scenarios. To handle these problems, we suggest a new approach, called XMaiL, which can be considered as an advanced email security mechanism based on the popular XML technologies. The proposed XMaiL supersedes all currently available e-mail security standards in the sense of the higher flexibility and security.","PeriodicalId":126578,"journal":{"name":"International Conference on Internet Computing","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114380129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A J2EE Technology Based Distributed Software Architecture for Web Usage Mining 基于J2EE技术的分布式Web使用挖掘软件体系结构
Pub Date : 1900-01-01 DOI: 10.4018/978-1-59140-414-9.CH017
Juan Manuel Hernansaez, J. A. Blaya, A. Gómez-Skarmeta
{"title":"A J2EE Technology Based Distributed Software Architecture for Web Usage Mining","authors":"Juan Manuel Hernansaez, J. A. Blaya, A. Gómez-Skarmeta","doi":"10.4018/978-1-59140-414-9.CH017","DOIUrl":"https://doi.org/10.4018/978-1-59140-414-9.CH017","url":null,"abstract":"","PeriodicalId":126578,"journal":{"name":"International Conference on Internet Computing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125301171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
How To Exchange Secrets By OT 如何通过OT交换秘密
Pub Date : 1900-01-01 DOI: 10.3745/kipstc.2003.10c.5.541
Yong Ju Yis, Sang-Choon Kim, Sang-Ho Lee
A fair exchange protocol enable two parties to exchange secrets with fairness, so that neither can gain any information advantage by quitting prematurely or otherwise misbehaving. Therefore a fair exchange is the most important for electronic transactions between untrusted parties. To design new fair exchange, after describing basic concepts, definitions and existing protocols and designing a non-interactive OT protocol using ELGamal`s public key system, I will design new protocol to support fair exchange. In my designed new protocol, untrusted parties exchange secrets obliviously and verify that their received secrets are true by using transformed Zero Knowledge Interactive Proof extended to duplex. At this time, concerned two parties can`t decrypt the other`s ciphertext. .After all of the steps, two parties can do it. It is the most important to provide perfect fairness and anonymity to untrusted parties in this protocol.
公平的交换协议使双方能够公平地交换秘密,因此任何一方都不能通过过早退出或其他不当行为获得任何信息优势。因此,在不可信方之间的电子交易中,公平交换是最重要的。为了设计新的公平交换,在描述了基本概念、定义和现有协议,并使用ELGamal的公钥系统设计了一个非交互式OT协议之后,我将设计新的协议来支持公平交换。在我设计的新协议中,不受信任的各方以不可见的方式交换秘密,并通过扩展到双工的转换零知识交互证明来验证他们接收的秘密是否真实。此时,相关的双方都无法解密对方的密文。经过以上步骤,双方就可以解密了。在该协议中,为不可信方提供完美的公平性和匿名性是最重要的。
{"title":"How To Exchange Secrets By OT","authors":"Yong Ju Yis, Sang-Choon Kim, Sang-Ho Lee","doi":"10.3745/kipstc.2003.10c.5.541","DOIUrl":"https://doi.org/10.3745/kipstc.2003.10c.5.541","url":null,"abstract":"A fair exchange protocol enable two parties to exchange secrets with fairness, so that neither can gain any information advantage by quitting prematurely or otherwise misbehaving. Therefore a fair exchange is the most important for electronic transactions between untrusted parties. To design new fair exchange, after describing basic concepts, definitions and existing protocols and designing a non-interactive OT protocol using ELGamal`s public key system, I will design new protocol to support fair exchange. In my designed new protocol, untrusted parties exchange secrets obliviously and verify that their received secrets are true by using transformed Zero Knowledge Interactive Proof extended to duplex. At this time, concerned two parties can`t decrypt the other`s ciphertext. .After all of the steps, two parties can do it. It is the most important to provide perfect fairness and anonymity to untrusted parties in this protocol.","PeriodicalId":126578,"journal":{"name":"International Conference on Internet Computing","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123188085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Stealthy Ciphertext 隐形密文
Pub Date : 1900-01-01 DOI: 10.31979/etd.bmj6-cqmb
M. Simova, M. Stamp, C. Pollett
To insure the confidentiality of data, it can be encrypted before it is transmitted. However, most data today is unencrypted. As a result, encrypted data might attract unwanted attention, simply due to the fact that it is encrypted. To avoid such attention, we propose a method of converting ciphertext into data that can pass certain automated tests for English text. Our goal is to foil automated detection methods, and we want to expand the encrypted data as little as possible in the process. Our technique can be considered as a form of steganography.
为了确保数据的机密性,可以在传输之前对数据进行加密。然而,今天的大多数数据都是未加密的。因此,加密的数据可能会引起不必要的注意,仅仅是因为它是加密的。为了避免这种注意,我们提出了一种将密文转换为可以通过某些英文文本自动测试的数据的方法。我们的目标是挫败自动检测方法,并且我们希望在此过程中尽可能少地扩展加密数据。我们的技术可以看作是隐写术的一种形式。
{"title":"Stealthy Ciphertext","authors":"M. Simova, M. Stamp, C. Pollett","doi":"10.31979/etd.bmj6-cqmb","DOIUrl":"https://doi.org/10.31979/etd.bmj6-cqmb","url":null,"abstract":"To insure the confidentiality of data, it can be encrypted before it is transmitted. However, most data today is unencrypted. As a result, encrypted data might attract unwanted attention, simply due to the fact that it is encrypted. To avoid such attention, we propose a method of converting ciphertext into data that can pass certain automated tests for English text. Our goal is to foil automated detection methods, and we want to expand the encrypted data as little as possible in the process. Our technique can be considered as a form of steganography.","PeriodicalId":126578,"journal":{"name":"International Conference on Internet Computing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130594580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
International Conference on Internet Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1