首页 > 最新文献

Proceedings of the eighth annual ACM Symposium on Principles of distributed computing最新文献

英文 中文
A structural induction theorem for processes 过程的结构归纳法定理
R. Kurshan, K. McMillan
In verifying finite state systems such as communication protocols or hardware controllers, we may be required to reason about systems comprised of a finite but effectively unbounded number of components. Examples are a network with an unspecified number of hosts, a multiprocessor with an unspecified number of CPU’s, or a queue with an unspecified number of buffers. We would like to show that the system performs a certain set of tasks, regardless of the number of components. There are two problems which prevent the direct application of automatic verification systems which use state-space search (e.g., COSPAN [HK88]) to such a problem. The first problem is that such methods can be applied directly only to a fixed state space; it is generally not possible to quantify over the number of processes. The second problem is commonly referred to as the state space explosion problem. In principle, the verification method could be applied exhaustively to the l-process system, the 2-process system, etc., until the largest possible system was verified. In practice, the fact that the number of states in a system increases geometrically with the number of components makes this approach infeasible. We present an induction method that allows us to infer properties of systems of unbounded size, but constructed by a uniform rule, from properties automatically verified on a system of fixed (and, presumably, small) size. The basis of this method is the sirvctzlral induction theorem for processes. Three methods have been described previously for verifying properties of systems with an unbounded number of identical processes. Homomorphic reduction [Kur85, Kur87] is a general framework for reducing the complexity of testing arbitrary w-regular properties in finite-state systems. The regularity of systems
在验证有限状态系统(如通信协议或硬件控制器)时,我们可能需要对由有限但实际上无限数量的组件组成的系统进行推理。例如,具有未指定数量的主机的网络,具有未指定数量的CPU的多处理器,或者具有未指定数量的缓冲区的队列。我们想要展示系统执行特定的一组任务,而不考虑组件的数量。有两个问题阻碍了使用状态空间搜索(例如,COSPAN [HK88])的自动验证系统直接应用于此类问题。第一个问题是,这种方法只能直接应用于固定状态空间;通常不可能对过程的数量进行量化。第二个问题通常被称为状态空间爆炸问题。原则上,验证方法可以穷尽地应用于l-工艺系统、2-工艺系统等,直到验证最大可能的系统为止。在实践中,系统中状态的数量随着组件的数量呈几何级数增加,这使得这种方法不可行。我们提出了一种归纳法,它允许我们从固定(大概是小)尺寸系统上自动验证的性质中推断出无界大小系统的性质,但由统一规则构造。该方法的基础是过程的西尔维茨拉尔归纳定理。前面已经描述了三种方法来验证具有无限数量的相同过程的系统的性质。同态约简[Kur85, Kur87]是降低有限状态系统中任意w正则性质测试复杂性的一般框架。系统的规律性
{"title":"A structural induction theorem for processes","authors":"R. Kurshan, K. McMillan","doi":"10.1145/72981.72998","DOIUrl":"https://doi.org/10.1145/72981.72998","url":null,"abstract":"In verifying finite state systems such as communication protocols or hardware controllers, we may be required to reason about systems comprised of a finite but effectively unbounded number of components. Examples are a network with an unspecified number of hosts, a multiprocessor with an unspecified number of CPU’s, or a queue with an unspecified number of buffers. We would like to show that the system performs a certain set of tasks, regardless of the number of components. There are two problems which prevent the direct application of automatic verification systems which use state-space search (e.g., COSPAN [HK88]) to such a problem. The first problem is that such methods can be applied directly only to a fixed state space; it is generally not possible to quantify over the number of processes. The second problem is commonly referred to as the state space explosion problem. In principle, the verification method could be applied exhaustively to the l-process system, the 2-process system, etc., until the largest possible system was verified. In practice, the fact that the number of states in a system increases geometrically with the number of components makes this approach infeasible. We present an induction method that allows us to infer properties of systems of unbounded size, but constructed by a uniform rule, from properties automatically verified on a system of fixed (and, presumably, small) size. The basis of this method is the sirvctzlral induction theorem for processes. Three methods have been described previously for verifying properties of systems with an unbounded number of identical processes. Homomorphic reduction [Kur85, Kur87] is a general framework for reducing the complexity of testing arbitrary w-regular properties in finite-state systems. The regularity of systems","PeriodicalId":167067,"journal":{"name":"Proceedings of the eighth annual ACM Symposium on Principles of distributed computing","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130162151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 281
Bounded polynomial randomized consensus 有界多项式随机一致
H. Attiya, D. Dolev, N. Shavit
Abstract : In (A88), Abrahamson presented a solution to the randomized consensus problem of Chor, Israeli and Li (CIL87), without assuming the existence of anatomic coin flip operation. This elegant algorithm uses unbounded memory, and has expected exponential running time. In (AH89), Aspens and Herlihy provide a breakthrough polynomial-time algorithm. However, it too is based on the use of unbounded memory. In this paper, we present a solution to the randomized consensus problem, that is bounded in space and runs in polynomial expected time.
摘要:在(A88)中,Abrahamson提出了Chor, israel和Li (CIL87)的随机共识问题的解决方案,而不假设存在解剖上的抛硬币操作。这种优雅的算法使用无界内存,并具有预期的指数级运行时间。在(AH89)中,Aspens和Herlihy提供了一个突破性的多项式时间算法。然而,它也是基于无限内存的使用。本文给出了随机共识问题的一个解,该解在空间上有界,在多项式期望时间内运行。
{"title":"Bounded polynomial randomized consensus","authors":"H. Attiya, D. Dolev, N. Shavit","doi":"10.1145/72981.73001","DOIUrl":"https://doi.org/10.1145/72981.73001","url":null,"abstract":"Abstract : In (A88), Abrahamson presented a solution to the randomized consensus problem of Chor, Israeli and Li (CIL87), without assuming the existence of anatomic coin flip operation. This elegant algorithm uses unbounded memory, and has expected exponential running time. In (AH89), Aspens and Herlihy provide a breakthrough polynomial-time algorithm. However, it too is based on the use of unbounded memory. In this paper, we present a solution to the randomized consensus problem, that is bounded in space and runs in polynomial expected time.","PeriodicalId":167067,"journal":{"name":"Proceedings of the eighth annual ACM Symposium on Principles of distributed computing","volume":"561 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116450746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 54
Multiple communication in multi-hop radio networks 多跳无线网络中的多重通信
R. Bar-Yehuda, A. Israeli
Two tasks of communication in a multi-hop synchronous radio network are considered: point-to-point communication and broadcast (sending a message to all nodes of a network). Efficient protocols for both problems are presented. Even though the protocols are probabilistic, it is shown how to acknowledge messages deterministically. Let n, D, and ∆ be the number of nodes, the diameter and the maximum degree of our network, respectively. Both protocols require a setup phase in which a BFS tree is constructed. This phase takes O ((n + Dlogn)log∆) time. After the setup, k point-to-point transmissions require O ((k +D)log∆) time on the average. Therefore the network allows a new transmission every O (log∆) time slots. Also, k broadcasts require an average of O ((k +D)log∆logn) time. Hence the average throughput of the network is a broadcast every O(log∆logn) time slots. Both protocols pipeline the messages along the BFS tree. They are always successful on the graph spanned by the BFS tree. Their probabilistic behavior refers only to the running time. Using the above protocols the ranking problem is solved in O (nlognlog∆) time. The performance analysis of both protocols constitutes a new application of queueing theory.
考虑了多跳同步无线网络中的两个通信任务:点对点通信和广播(向网络的所有节点发送消息)。针对这两个问题提出了有效的协议。尽管协议是概率性的,但它展示了如何确定地确认消息。设n、D、∆分别为网络的节点数、直径和最大程度。这两种协议都需要一个构建BFS树的设置阶段。这一阶段需要O ((n + Dlogn)log∆)时间。设置完成后,k次点对点传输平均需要O ((k +D)log∆)时间。因此,网络允许每O (log∆)个时隙进行一次新的传输。同样,k次广播需要平均O ((k +D)log∆logn)时间。因此,网络的平均吞吐量是每O(log∆logn)个时隙广播一次。这两个协议都沿着BFS树传递消息。它们在BFS树生成的图上总是成功的。它们的概率行为只与运行时间有关。使用上述协议,排序问题在O (nloglog∆)时间内得到解决。这两种协议的性能分析构成了排队理论的一个新的应用。
{"title":"Multiple communication in multi-hop radio networks","authors":"R. Bar-Yehuda, A. Israeli","doi":"10.1145/72981.73005","DOIUrl":"https://doi.org/10.1145/72981.73005","url":null,"abstract":"Two tasks of communication in a multi-hop synchronous radio network are considered: point-to-point communication and broadcast (sending a message to all nodes of a network). Efficient protocols for both problems are presented. Even though the protocols are probabilistic, it is shown how to acknowledge messages deterministically. Let n, D, and ∆ be the number of nodes, the diameter and the maximum degree of our network, respectively. Both protocols require a setup phase in which a BFS tree is constructed. This phase takes O ((n + Dlogn)log∆) time. After the setup, k point-to-point transmissions require O ((k +D)log∆) time on the average. Therefore the network allows a new transmission every O (log∆) time slots. Also, k broadcasts require an average of O ((k +D)log∆logn) time. Hence the average throughput of the network is a broadcast every O(log∆logn) time slots. Both protocols pipeline the messages along the BFS tree. They are always successful on the graph spanned by the BFS tree. Their probabilistic behavior refers only to the running time. Using the above protocols the ranking problem is solved in O (nlognlog∆) time. The performance analysis of both protocols constitutes a new application of queueing theory.","PeriodicalId":167067,"journal":{"name":"Proceedings of the eighth annual ACM Symposium on Principles of distributed computing","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114297592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 138
A hundred impossibility proofs for distributed computing 分布式计算的一百个不可能证明
N. Lynch
Abstract : This talk is about impossibility results in the area of distributed computing. In this category, I include not just results that say that a particular task cannot be accomplished, but also lower bound results, which say that a task cannot be accomplished within a certain bound on cost. I started out with a simple plan for preparing this talk: I would spend a couple of weeks reading all the impossibility proofs in our fields, and would categorize them according to the ideas used. Then I would make wise and general observations, and try to predict where the future of this area is headed. That turned out to be a bit too ambitious; there are many more such results than I thought. Although it is often hard to say what constitutes ad different results, I managed to count over 100 such impossibility proofs And my search wasn't even very systematic or exhaustive. It's not quite as hopeless to understand this area as it might seem from the number of papers. Although there are 100 different results, there aren't 100 different ideas. I thought I could contribute something by identifying some of the commonality among the different results.
摘要:本演讲是关于分布式计算领域的不可能结果。在这一类别中,我不仅包括不能完成特定任务的结果,还包括下界结果,即不能在一定的成本范围内完成任务的结果。为了准备这次演讲,我从一个简单的计划开始:我会花几个星期的时间阅读我们领域中所有的不可能证明,并根据所使用的思想对它们进行分类。然后,我会做出明智而全面的观察,并试图预测这一领域的未来走向。事实证明,这有点太雄心勃勃了;这样的结果比我想象的要多得多。虽然通常很难说是什么构成了不同的结果,但我设法数出了100多个这样的不可能证明,我的搜索甚至不是很系统或详尽。从论文的数量来看,理解这个领域并不是完全没有希望。虽然有100种不同的结果,但没有100种不同的想法。我认为我可以通过找出不同结果之间的一些共性来做出一些贡献。
{"title":"A hundred impossibility proofs for distributed computing","authors":"N. Lynch","doi":"10.1145/72981.72982","DOIUrl":"https://doi.org/10.1145/72981.72982","url":null,"abstract":"Abstract : This talk is about impossibility results in the area of distributed computing. In this category, I include not just results that say that a particular task cannot be accomplished, but also lower bound results, which say that a task cannot be accomplished within a certain bound on cost. I started out with a simple plan for preparing this talk: I would spend a couple of weeks reading all the impossibility proofs in our fields, and would categorize them according to the ideas used. Then I would make wise and general observations, and try to predict where the future of this area is headed. That turned out to be a bit too ambitious; there are many more such results than I thought. Although it is often hard to say what constitutes ad different results, I managed to count over 100 such impossibility proofs And my search wasn't even very systematic or exhaustive. It's not quite as hopeless to understand this area as it might seem from the number of papers. Although there are 100 different results, there aren't 100 different ideas. I thought I could contribute something by identifying some of the commonality among the different results.","PeriodicalId":167067,"journal":{"name":"Proceedings of the eighth annual ACM Symposium on Principles of distributed computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130588169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 110
Knowledge, probability, and adversaries 知识、概率和对手
Joseph Y. Halpern, M. Tuttle
What should it mean for an agent to know or believe an assertion is true with probability 9.99? Different papers [2, 6, 15] give different answers, choosing to use quite different probability spaces when computing the probability that an agent assigns to an event. We show that each choice can be understood in terms of a betting game. This betting game itself can be understood in terms of three types of adversaries influencing three different aspects of the game. The first selects the outcome of all nondeterministic choices in the system; the second represents the knowledge of the agent's opponent in the betting game (this is the key place the papers mentioned above differ); and the third is needed in asynchronous systems to choose the time the bet is placed. We illustrate the need for considering all three types of adversaries with a number of examples. Given a class of adversaries, we show how to assign probability spaces to agents in a way most appropriate for that class, where “most appropriate” is made precise in terms of this betting game. We conclude by showing how different assignments of probability spaces (corresponding to different opponents) yield different levels of guarantees in probabilistic coordinated attack.
对于一个代理来说,知道或相信一个断言以9.99的概率为真意味着什么?不同的论文[2,6,15]给出了不同的答案,在计算agent分配给事件的概率时选择使用完全不同的概率空间。我们展示了每个选择都可以被理解为一个赌博游戏。这种赌博游戏本身可以理解为三种类型的对手影响游戏的三个不同方面。第一个选择系统中所有不确定性选择的结果;第二个代表代理在赌博游戏中的对手的知识(这是上述论文的关键不同之处);第三个是在异步系统中用来选择下注的时间。我们用一些例子说明了考虑所有三种类型的对手的必要性。给定一类对手,我们展示了如何以最适合该类的方式将概率空间分配给代理,其中“最合适”在这个赌博游戏中是精确的。我们通过展示概率空间的不同分配(对应于不同的对手)如何在概率协调攻击中产生不同水平的保证来得出结论。
{"title":"Knowledge, probability, and adversaries","authors":"Joseph Y. Halpern, M. Tuttle","doi":"10.1145/153724.153770","DOIUrl":"https://doi.org/10.1145/153724.153770","url":null,"abstract":"What should it mean for an agent to know or believe an assertion is true with probability 9.99? Different papers [2, 6, 15] give different answers, choosing to use quite different probability spaces when computing the probability that an agent assigns to an event. We show that each choice can be understood in terms of a betting game. This betting game itself can be understood in terms of three types of adversaries influencing three different aspects of the game. The first selects the outcome of all nondeterministic choices in the system; the second represents the knowledge of the agent's opponent in the betting game (this is the key place the papers mentioned above differ); and the third is needed in asynchronous systems to choose the time the bet is placed. We illustrate the need for considering all three types of adversaries with a number of examples. Given a class of adversaries, we show how to assign probability spaces to agents in a way most appropriate for that class, where “most appropriate” is made precise in terms of this betting game. We conclude by showing how different assignments of probability spaces (corresponding to different opponents) yield different levels of guarantees in probabilistic coordinated attack.","PeriodicalId":167067,"journal":{"name":"Proceedings of the eighth annual ACM Symposium on Principles of distributed computing","volume":"317 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131836477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 173
Equational reasoning about nondeterministic processes 关于不确定性过程的等式推理
J. Misra
A deterministic message-communicating process can be characterised by a “continuous” functionf which describes the relationship between the inputs and the outputs of the process. The operational behaviour of a network of deterministic processes can be deduced from the least fixpoint of a functiong, whereg is obtained from the functions that characterise the component processes of the network. We show in this paper that a nondeter-ministic process can be characterised by a “description” consisting of a pair of functions. The behaviour of a network consisting of such processes can be obtained from the “smooth” solutions of the descriptions characterising its component processes. The notion of smooth solution is a generalisation of least fixpoint. Descriptions enjoy the crucial property that a variable may be replaced by its definition.
确定性消息通信过程可以用描述过程输入和输出之间关系的“连续”函数来表征。确定性过程网络的操作行为可以从函数的最小不动点推导出来,函数的最小不动点是从表征网络组成过程的函数中获得的。本文证明了一个非确定性过程可以用由一对函数组成的“描述”来表征。由这些过程组成的网络的行为可以从表征其组成过程的描述的“光滑”解中获得。光滑解的概念是最小不动点的推广。描述具有一个重要的属性,即变量可以被它的定义所替换。
{"title":"Equational reasoning about nondeterministic processes","authors":"J. Misra","doi":"10.1145/72981.72983","DOIUrl":"https://doi.org/10.1145/72981.72983","url":null,"abstract":"A deterministic message-communicating process can be characterised by a “continuous” functionf which describes the relationship between the inputs and the outputs of the process. The operational behaviour of a network of deterministic processes can be deduced from the least fixpoint of a functiong, whereg is obtained from the functions that characterise the component processes of the network. We show in this paper that a nondeter-ministic process can be characterised by a “description” consisting of a pair of functions. The behaviour of a network consisting of such processes can be obtained from the “smooth” solutions of the descriptions characterising its component processes. The notion of smooth solution is a generalisation of least fixpoint. Descriptions enjoy the crucial property that a variable may be replaced by its definition.","PeriodicalId":167067,"journal":{"name":"Proceedings of the eighth annual ACM Symposium on Principles of distributed computing","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124775937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Proceedings of the eighth annual ACM Symposium on Principles of distributed computing 第八届ACM分布式计算原理研讨会论文集
{"title":"Proceedings of the eighth annual ACM Symposium on Principles of distributed computing","authors":"","doi":"10.1145/72981","DOIUrl":"https://doi.org/10.1145/72981","url":null,"abstract":"","PeriodicalId":167067,"journal":{"name":"Proceedings of the eighth annual ACM Symposium on Principles of distributed computing","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121589963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
Proceedings of the eighth annual ACM Symposium on Principles of distributed computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1