首页 > 最新文献

Performance Evaluation最新文献

英文 中文
Age- and deviation-of-information of hybrid time- and event-triggered systems: What matters more, determinism or resource conservation? 时间和事件触发混合系统的信息年龄和偏差:决定论和资源保护哪个更重要?
IF 2.2 4区 计算机科学 Q2 Mathematics Pub Date : 2024-03-19 DOI: 10.1016/j.peva.2024.102412
Mahsa Noroozi, Markus Fidler

Age-of-information is a metric that quantifies the freshness of information obtained by sampling a remote sensor. In signal-agnostic sampling, sensor updates are triggered at certain times without being conditioned on the actual sensor signal. Optimal update policies have been researched and it is accepted that periodic updates achieve smaller age-of-information than random updates. We contribute a study of a signal-aware policy, where updates are triggered randomly by a defined sensor event. By definition, this implies random updates and as a consequence inferior age-of-information. Considering a notion of deviation-of-information as a signal-aware metric, our results show, however, that event-triggered systems can perform equally well as time-triggered systems while causing smaller mean network utilization. We use the stochastic network calculus to derive bounds of age- and deviation-of-information that are exceeded at most with a small, defined probability. We include simulation results that confirm the tail decay of the bounds. We also evaluate a hybrid time- and event-triggered policy where the event-triggered system is complemented by a minimal and a maximal update interval.

信息年龄(Age-of-information)是量化远程传感器采样所获信息新鲜度的指标。在信号无关性采样中,传感器更新在特定时间触发,而不以实际传感器信号为条件。对最佳更新策略进行了研究,发现定期更新比随机更新能获得更小的信息年龄。我们对一种信号感知策略进行了研究,在这种策略中,更新由定义的传感器事件随机触发。根据定义,这意味着随机更新,因此信息年龄较小。不过,考虑到信息偏差概念是一种信号感知指标,我们的研究结果表明,事件触发系统与时间触发系统性能相当,但平均网络利用率较低。我们利用随机网络微积分推导出信息年龄和信息偏差的界限,这些界限最多以很小的概率被超出。我们的模拟结果证实了这些界限的尾部衰减。我们还评估了一种混合时间和事件触发策略,其中事件触发系统通过最小和最大更新间隔进行补充。
{"title":"Age- and deviation-of-information of hybrid time- and event-triggered systems: What matters more, determinism or resource conservation?","authors":"Mahsa Noroozi,&nbsp;Markus Fidler","doi":"10.1016/j.peva.2024.102412","DOIUrl":"10.1016/j.peva.2024.102412","url":null,"abstract":"<div><p>Age-of-information is a metric that quantifies the freshness of information obtained by sampling a remote sensor. In signal-agnostic sampling, sensor updates are triggered at certain times without being conditioned on the actual sensor signal. Optimal update policies have been researched and it is accepted that periodic updates achieve smaller age-of-information than random updates. We contribute a study of a signal-aware policy, where updates are triggered randomly by a defined sensor event. By definition, this implies random updates and as a consequence inferior age-of-information. Considering a notion of deviation-of-information as a signal-aware metric, our results show, however, that event-triggered systems can perform equally well as time-triggered systems while causing smaller mean network utilization. We use the stochastic network calculus to derive bounds of age- and deviation-of-information that are exceeded at most with a small, defined probability. We include simulation results that confirm the tail decay of the bounds. We also evaluate a hybrid time- and event-triggered policy where the event-triggered system is complemented by a minimal and a maximal update interval.</p></div>","PeriodicalId":19964,"journal":{"name":"Performance Evaluation","volume":null,"pages":null},"PeriodicalIF":2.2,"publicationDate":"2024-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0166531624000178/pdfft?md5=8cf8b229cde1a9343b74d531721bff2d&pid=1-s2.0-S0166531624000178-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140170536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stepwise migration of a monolith to a microservice architecture: Performance and migration effort evaluation 逐步将单体迁移到微服务架构:性能和迁移工作量评估
IF 2.2 4区 计算机科学 Q2 Mathematics Pub Date : 2024-03-12 DOI: 10.1016/j.peva.2024.102411
Diogo Faustino , Nuno Gonçalves , Manuel Portela , António Rito Silva

Due to scalability requirements and the split of large software development projects into small agile teams, there is a current trend toward the migration of monolith systems to the microservice architecture. However, the split of the monolith into microservices, its encapsulation through well-defined interfaces, and the introduction of inter-microservice communication add a cost in terms of performance. In this paper, we describe a case study of the migration of a monolith to a microservice architecture, where a modular monolith architecture is used as an intermediate step. The impact on migration effort and performance is measured for both steps. Current state-of-the-art analyses the migration of monolith systems to a microservice architecture, but we observed that migration effort and performance issues are already significant in the migration to a modular monolith. Therefore, a clear distinction is established for each of the steps, which may inform software architects on the planning of the migration of monolith systems. In particular, we consider the trade-offs of doing all the migration process or just migrating to a modular monolith.

由于对可扩展性的要求以及大型软件开发项目被拆分为小型敏捷团队,目前的趋势是将单体系统迁移到微服务架构。然而,将单体拆分为微服务、通过定义明确的接口对其进行封装以及引入微服务间通信都会在性能方面增加成本。在本文中,我们介绍了一个将单体迁移到微服务架构的案例研究,其中使用了模块化单体架构作为中间步骤。我们测量了这两个步骤对迁移工作量和性能的影响。目前最先进的分析方法是将单体系统迁移到微服务架构,但我们注意到,在向模块化单体迁移的过程中,迁移工作量和性能问题已经非常严重。因此,我们对每个步骤进行了明确区分,这可以为软件架构师规划单体系统迁移提供参考。特别是,我们考虑了进行所有迁移过程或仅迁移到模块化单体的利弊权衡。
{"title":"Stepwise migration of a monolith to a microservice architecture: Performance and migration effort evaluation","authors":"Diogo Faustino ,&nbsp;Nuno Gonçalves ,&nbsp;Manuel Portela ,&nbsp;António Rito Silva","doi":"10.1016/j.peva.2024.102411","DOIUrl":"https://doi.org/10.1016/j.peva.2024.102411","url":null,"abstract":"<div><p>Due to scalability requirements and the split of large software development projects into small agile teams, there is a current trend toward the migration of monolith systems to the microservice architecture. However, the split of the monolith into microservices, its encapsulation through well-defined interfaces, and the introduction of inter-microservice communication add a cost in terms of performance. In this paper, we describe a case study of the migration of a monolith to a microservice architecture, where a modular monolith architecture is used as an intermediate step. The impact on migration effort and performance is measured for both steps. Current state-of-the-art analyses the migration of monolith systems to a microservice architecture, but we observed that migration effort and performance issues are already significant in the migration to a modular monolith. Therefore, a clear distinction is established for each of the steps, which may inform software architects on the planning of the migration of monolith systems. In particular, we consider the trade-offs of doing all the migration process or just migrating to a modular monolith.</p></div>","PeriodicalId":19964,"journal":{"name":"Performance Evaluation","volume":null,"pages":null},"PeriodicalIF":2.2,"publicationDate":"2024-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140141848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The impact of load comparison errors on the power-of-d load balancing 负载比较误差对负载平衡功率的影响
IF 2.2 4区 计算机科学 Q2 Mathematics Pub Date : 2024-02-28 DOI: 10.1016/j.peva.2024.102408
Sanidhay Bhambay , Arpan Mukhopadhyay , Thirupathaiah Vasantam

We consider a system with n unit-rate servers where jobs arrive according a Poisson process with rate nλ (λ<1). In the standard Power-of-d or Pod scheme with d2, for each incoming job, a dispatcher samples d servers uniformly at random and sends the incoming job to the least loaded of the d sampled servers. However, in practice, load comparisons may not always be accurate. In this paper, we analyse the effects of noisy load comparisons on the performance of the Pod scheme. To test the robustness of the Pod scheme against load comparison errors, we assume an adversarial setting where, in the event of an error, the adversary assigns the incoming job to the worst possible server, i.e., the server with the maximum load among the d sampled servers. We consider two error models: load-dependent and load-independent errors. In the load-dependent error model, the adversary has limited power in that it is able to cause an error with probability ϵ[0,1] only when the difference in the minimum and the maximum queue lengths of the d sampled servers is bounded by a constant threshold g0. For this type of errors, we show that, in the large system limit, the benefits of the Pod scheme are retained even if g and ϵ are arbitrarily large as long as the system is heavily loaded, i.e., λ is close to 1. In the load-independent error model, the adversary is assumed to be more powerful in that it can cause an error with probability ϵ independent of the loads of the sampled servers. For this model, we show that the performance benefits of the Pod scheme are retained only if ϵ1/d; for ϵ>1/d we show that the stability region of the system reduces and the system performs poorly in comparison to the random scheme. Our mean-field analysis uses a new approach to characterise fixed points which neither have closed form solutions nor admit any recursion. Furthermore, we develop a generic approach to prove tightness and stability for any state-dependent load balancing scheme.

我们考虑一个有 n 台单位速率服务器的系统,在这个系统中,作业是按照速率为 nλ (λ<1) 的泊松过程到达的。在 d≥2 的标准 Power-of-d 或 Pod 方案中,对于每个到达的作业,调度员都会随机均匀地抽样 d 台服务器,并将到达的作业发送给 d 台抽样服务器中负载最小的一台。然而,在实际操作中,负载比较不一定总是准确的。本文分析了有噪声的负载比较对 Pod 方案性能的影响。为了测试 Pod 方案对负载比较误差的鲁棒性,我们假设了一个对抗环境,在出现误差的情况下,对抗者会将接收到的任务分配给最差的服务器,即 d 个采样服务器中负载最大的服务器。我们考虑了两种错误模型:与负载相关的错误和与负载无关的错误。在与负载相关的错误模型中,对手的能力有限,只有当 d 台采样服务器的最小队列长度和最大队列长度之差被一个恒定阈值 g≥0 限定时,它才能以概率ϵ∈[0,1]引发错误。对于这类错误,我们的研究表明,在大系统极限中,只要系统负载较重,即使 g 和ϵ 任意大,Pod 方案的优势依然存在,即在与负载无关的错误模型中,假定对手更强大,因为它能以与采样服务器负载无关的概率 ϵ 引发错误。对于这个模型,我们表明,只有当ϵ≤1/d 时,才能保留 Pod 方案的性能优势;当ϵ>1/d 时,我们表明系统的稳定区域缩小,与随机方案相比,系统性能较差。我们的均值场分析采用了一种新方法来描述固定点的特征,这些固定点既没有封闭形式解,也不允许任何递归。此外,我们还开发了一种通用方法来证明任何与状态相关的负载平衡方案的严密性和稳定性。
{"title":"The impact of load comparison errors on the power-of-d load balancing","authors":"Sanidhay Bhambay ,&nbsp;Arpan Mukhopadhyay ,&nbsp;Thirupathaiah Vasantam","doi":"10.1016/j.peva.2024.102408","DOIUrl":"https://doi.org/10.1016/j.peva.2024.102408","url":null,"abstract":"<div><p>We consider a system with <span><math><mi>n</mi></math></span> unit-rate servers where jobs arrive according a Poisson process with rate <span><math><mrow><mi>n</mi><mi>λ</mi></mrow></math></span> (<span><math><mrow><mi>λ</mi><mo>&lt;</mo><mn>1</mn></mrow></math></span>). In the standard <em>Power-of-</em><span><math><mi>d</mi></math></span> or Pod scheme with <span><math><mrow><mi>d</mi><mo>≥</mo><mn>2</mn></mrow></math></span>, for each incoming job, a dispatcher samples <span><math><mi>d</mi></math></span> servers uniformly at random and sends the incoming job to the least loaded of the <span><math><mi>d</mi></math></span> sampled servers. However, in practice, load comparisons may not always be accurate. In this paper, we analyse the effects of noisy load comparisons on the performance of the Pod scheme. To test the robustness of the Pod scheme against load comparison errors, we assume an adversarial setting where, in the event of an error, the adversary assigns the incoming job to the worst possible server, i.e., the server with the maximum load among the <span><math><mi>d</mi></math></span> sampled servers. We consider two error models: <em>load-dependent</em> and <em>load-independent</em> errors. In the load-dependent error model, the adversary has limited power in that it is able to cause an error with probability <span><math><mrow><mi>ϵ</mi><mo>∈</mo><mrow><mo>[</mo><mn>0</mn><mo>,</mo><mn>1</mn><mo>]</mo></mrow></mrow></math></span> only when the difference in the minimum and the maximum queue lengths of the <span><math><mi>d</mi></math></span> sampled servers is bounded by a constant threshold <span><math><mrow><mi>g</mi><mo>≥</mo><mn>0</mn></mrow></math></span>. For this type of errors, we show that, in the large system limit, the benefits of the Pod scheme are retained even if <span><math><mi>g</mi></math></span> and <span><math><mi>ϵ</mi></math></span> are arbitrarily large as long as the system is heavily loaded, i.e., <span><math><mi>λ</mi></math></span> is close to 1. In the load-independent error model, the adversary is assumed to be more powerful in that it can cause an error with probability <span><math><mi>ϵ</mi></math></span> independent of the loads of the sampled servers. For this model, we show that the performance benefits of the Pod scheme are retained only if <span><math><mrow><mi>ϵ</mi><mo>≤</mo><mn>1</mn><mo>/</mo><mi>d</mi></mrow></math></span>; for <span><math><mrow><mi>ϵ</mi><mo>&gt;</mo><mn>1</mn><mo>/</mo><mi>d</mi></mrow></math></span> we show that the stability region of the system reduces and the system performs poorly in comparison to the <em>random scheme</em>. Our mean-field analysis uses a new approach to characterise fixed points which neither have closed form solutions nor admit any recursion. Furthermore, we develop a generic approach to prove tightness and stability for any state-dependent load balancing scheme.</p></div>","PeriodicalId":19964,"journal":{"name":"Performance Evaluation","volume":null,"pages":null},"PeriodicalIF":2.2,"publicationDate":"2024-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0166531624000130/pdfft?md5=e219034bb5ef6f93c589b57673e3885d&pid=1-s2.0-S0166531624000130-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139993482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A dependence graph pattern mining method for processor performance analysis 一种用于处理器性能分析的依赖图模式挖掘方法
IF 2.2 4区 计算机科学 Q2 Mathematics Pub Date : 2024-02-28 DOI: 10.1016/j.peva.2024.102409
Yawen Zheng , Chenji Han , Tingting Zhang , Fuxin Zhang , Jian Wang

As the complexity of processor microarchitecture and applications increases, obtaining performance optimization knowledge, such as critical dependent chains, becomes more challenging. To tackle this issue, this paper employs pattern mining methods to analyze the critical path of processor micro-execution dependence graphs. We propose a high average utility pattern mining algorithm called Dependence Graph Miner (DG-Miner) based on the characteristics of dependence graphs. DG-Miner overcomes the limitations of current pattern mining algorithms for dependence graph pattern mining by offering support for variable utility, candidate generation using endpoint matching, the adjustable upper bound, and the concise pattern judgment mechanism. Experiments reveal that, compared with existing upper bound candidate generation methods, the adjustable upper bound reduces the number of candidate patterns by 28.14% and the running time by 27% on average. The concise pattern judgment mechanism enhances the conciseness of mining results by 16.31% and reduces the running time by 39.82%. Furthermore, DG-Miner aids in identifying critical dependent chains, critical program regions, and performance exceptions.

随着处理器微体系结构和应用复杂性的增加,获取性能优化知识(如关键依赖链)变得更具挑战性。为解决这一问题,本文采用模式挖掘方法来分析处理器微执行依赖图的关键路径。我们根据依赖图的特点,提出了一种名为依赖图挖掘器(DG-Miner)的高平均效用模式挖掘算法。DG-Miner 通过支持可变效用、使用端点匹配生成候选、可调上界和简洁的模式判断机制,克服了当前模式挖掘算法在依赖图模式挖掘方面的局限性。实验表明,与现有的上界候选生成方法相比,可调上界平均减少了 28.14% 的候选模式数量和 27% 的运行时间。简洁模式判断机制使挖掘结果的简洁性提高了 16.31%,运行时间缩短了 39.82%。此外,DG-Miner 还有助于识别关键依赖链、关键程序区域和性能异常。
{"title":"A dependence graph pattern mining method for processor performance analysis","authors":"Yawen Zheng ,&nbsp;Chenji Han ,&nbsp;Tingting Zhang ,&nbsp;Fuxin Zhang ,&nbsp;Jian Wang","doi":"10.1016/j.peva.2024.102409","DOIUrl":"https://doi.org/10.1016/j.peva.2024.102409","url":null,"abstract":"<div><p>As the complexity of processor microarchitecture and applications increases, obtaining performance optimization knowledge, such as critical dependent chains, becomes more challenging. To tackle this issue, this paper employs pattern mining methods to analyze the critical path of processor micro-execution dependence graphs. We propose a high average utility pattern mining algorithm called Dependence Graph Miner (DG-Miner) based on the characteristics of dependence graphs. DG-Miner overcomes the limitations of current pattern mining algorithms for dependence graph pattern mining by offering support for variable utility, candidate generation using endpoint matching, the adjustable upper bound, and the concise pattern judgment mechanism. Experiments reveal that, compared with existing upper bound candidate generation methods, the adjustable upper bound reduces the number of candidate patterns by 28.14% and the running time by 27% on average. The concise pattern judgment mechanism enhances the conciseness of mining results by 16.31% and reduces the running time by 39.82%. Furthermore, DG-Miner aids in identifying critical dependent chains, critical program regions, and performance exceptions.</p></div>","PeriodicalId":19964,"journal":{"name":"Performance Evaluation","volume":null,"pages":null},"PeriodicalIF":2.2,"publicationDate":"2024-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140014628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Accelerating multi-tier storage cache simulations using knee detection 利用膝点检测加速多层存储缓存模拟
IF 2.2 4区 计算机科学 Q2 Mathematics Pub Date : 2024-02-27 DOI: 10.1016/j.peva.2024.102410
Tyler Estro , Mário Antunes , Pranav Bhandari , Anshul Gandhi , Geoff Kuenning , Yifei Liu , Carl Waldspurger , Avani Wildani , Erez Zadok

Storage cache hierarchies include diverse topologies, assorted parameters and policies, and devices with varied performance characteristics. Simulation enables efficient exploration of their configuration space while avoiding expensive physical experiments. Miss Ratio Curves (MRCs) efficiently characterize the performance of a cache over a range of cache sizes, revealing “key points” for cache simulation, such as knees in the curve that immediately follow sharp cliffs. Unfortunately, there are no automated techniques for efficiently finding key points in MRCs, and the cross-application of existing knee-detection algorithms yields inaccurate results.

We present a multi-stage framework that identifies key points in any MRC, for both stack-based (e.g., LRU) and more sophisticated eviction algorithms (e.g., ARC). Our approach quickly locates candidates using efficient hash-based sampling, curve simplification, knee detection, and novel post-processing filters. We introduce Z-Method, a new multi-knee detection algorithm that employs statistical outlier detection to choose promising points robustly and efficiently.

We evaluated our framework against seven other knee-detection algorithms, identifying key points in multi-tier MRCs with both ARC and LRU policies for 106 diverse real-world workloads. Compared to naïve approaches, our framework reduced the total number of points needed to accurately identify the best two-tier cache hierarchies by an average factor of approximately 5.5× for ARC and 7.7× for LRU.

We also show how our framework can be used to seed the initial population for evolutionary algorithms. We ran 32,616 experiments requiring over three million cache simulations, on 151 samples, from three datasets, using a diverse set of population initialization techniques, evolutionary algorithms, knee-detection algorithms, cache replacement algorithms, and stopping criteria. Our results showed an overall acceleration rate of 34% across all configurations.

存储缓存层次结构包括不同的拓扑结构、各种参数和策略以及具有不同性能特征的设备。仿真可以有效探索其配置空间,同时避免昂贵的物理实验。未命中率曲线(MRC)能有效地描述不同大小缓存的性能,揭示缓存仿真的 "关键点",如紧随急崖之后的曲线膝点。我们提出了一个多阶段框架,可识别任何 MRC 中的关键点,既适用于基于堆栈的算法(如 LRU),也适用于更复杂的驱逐算法(如 ARC)。我们的方法利用高效的哈希采样、曲线简化、膝点检测和新型后处理滤波器快速定位候选点。我们针对其他七种膝点检测算法对我们的框架进行了评估,针对 106 种不同的实际工作负载,在采用 ARC 和 LRU 策略的多层 MRC 中识别关键点。与天真方法相比,我们的框架减少了准确识别最佳双层缓存层次结构所需的点总数,ARC 和 LRU 的平均系数分别约为 5.5 倍和 7.7 倍。我们在三个数据集的 151 个样本上进行了 32616 次实验,需要 300 多万次缓存模拟,使用了一系列不同的种群初始化技术、进化算法、膝检测算法、缓存替换算法和停止标准。我们的结果表明,在所有配置中,总体加速率为 34%。
{"title":"Accelerating multi-tier storage cache simulations using knee detection","authors":"Tyler Estro ,&nbsp;Mário Antunes ,&nbsp;Pranav Bhandari ,&nbsp;Anshul Gandhi ,&nbsp;Geoff Kuenning ,&nbsp;Yifei Liu ,&nbsp;Carl Waldspurger ,&nbsp;Avani Wildani ,&nbsp;Erez Zadok","doi":"10.1016/j.peva.2024.102410","DOIUrl":"https://doi.org/10.1016/j.peva.2024.102410","url":null,"abstract":"<div><p>Storage cache hierarchies include diverse topologies, assorted parameters and policies, and devices with varied performance characteristics. Simulation enables efficient exploration of their configuration space while avoiding expensive physical experiments. Miss Ratio Curves (MRCs) efficiently characterize the performance of a cache over a range of cache sizes, revealing “key points” for cache simulation, such as knees in the curve that immediately follow sharp cliffs. Unfortunately, there are no automated techniques for efficiently finding key points in MRCs, and the cross-application of existing knee-detection algorithms yields inaccurate results.</p><p>We present a multi-stage framework that identifies key points in <em>any</em> MRC, for both stack-based (<em>e.g.</em>, LRU) and more sophisticated eviction algorithms (<em>e.g.</em>, ARC). Our approach quickly locates candidates using efficient hash-based sampling, curve simplification, knee detection, and novel post-processing filters. We introduce <em>Z-Method</em>, a new multi-knee detection algorithm that employs statistical outlier detection to choose promising points robustly and efficiently.</p><p>We evaluated our framework against seven other knee-detection algorithms, identifying key points in multi-tier MRCs with both ARC and LRU policies for 106 diverse real-world workloads. Compared to naïve approaches, our framework reduced the total number of points needed to accurately identify the best two-tier cache hierarchies by an average factor of approximately <span><math><mrow><mn>5</mn><mo>.</mo><mn>5</mn><mo>×</mo></mrow></math></span> for ARC and <span><math><mrow><mn>7</mn><mo>.</mo><mn>7</mn><mo>×</mo></mrow></math></span> for LRU.</p><p>We also show how our framework can be used to seed the initial population for evolutionary algorithms. We ran 32,616 experiments requiring over three million cache simulations, on 151 samples, from three datasets, using a diverse set of population initialization techniques, evolutionary algorithms, knee-detection algorithms, cache replacement algorithms, and stopping criteria. Our results showed an overall acceleration rate of 34% across all configurations.</p></div>","PeriodicalId":19964,"journal":{"name":"Performance Evaluation","volume":null,"pages":null},"PeriodicalIF":2.2,"publicationDate":"2024-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140069358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Age of information minimization in hybrid cognitive radio networks under a timely throughput constraint 及时吞吐量约束下混合认知无线电网络的信息最小化时代
IF 2.2 4区 计算机科学 Q2 Mathematics Pub Date : 2024-02-23 DOI: 10.1016/j.peva.2024.102407
Mohamed F. El-Sherif , Sherif I. Rabia , Ahmed H. Abd El-Malek , W.K. Zahra

Exchanging time-critical information is prevalent in various industrial applications where low latency and timely delivery are paramount. Through this work, we consider a cognitive radio network comprised of multiple secondary users with time-sensitive traffic, and they can access the licensed channel under the hybrid interweave/underlay scheme to enhance spectrum utilization. Traffic in the secondary system is divided into two distinct categories: deadline-constrained data and status updates. Quality of service of data with expiration time, such as multimedia streams, is assessed through the timely throughput metric. However, the age of information metric is used to characterize the freshness of the status update packets, which is vital in several emerging applications. Within an interference constraint imposed by the primary user, a dynamic scheduling policy is proposed to optimize the weighted sum of the average age of information of the status update users under a strict timely throughput requirement for each user with deadline-constrained traffic. We formulate the optimization problem as a constrained Markov decision process. Then, through the drift-plus-penalty method, the problem is reduced into a series of unconstrained Markov decision problems. Finally, each subproblem is tackled using the backward dynamic programming technique. Simulation results illustrate the effect of the main system parameters, such as the PU transmitted power and transmission rate level, on the performance of the secondary system. Moreover, the model feasibility regarding the fulfillment of the constraints against PU activity is experimentally investigated under the proposed hybrid mode and classical interweave mode. The performance of the proposed policy is compared to two other low-complexity scheduling schemes, which ensure the satisfaction of the constraints; results show the performance superiority of our proposed policy.

交换时间关键型信息在各种工业应用中非常普遍,在这些应用中,低延迟和及时交付是最重要的。通过这项工作,我们考虑了一个由多个具有时间敏感性流量的次级用户组成的认知无线电网络,它们可以在混合交织/下层方案下访问许可信道,以提高频谱利用率。二次系统中的流量分为两类:有截止时间限制的数据和状态更新。通过及时吞吐量指标来评估过期数据(如多媒体流)的服务质量。然而,信息年龄指标用于描述状态更新数据包的新鲜度,这在一些新兴应用中至关重要。在主用户施加的干扰约束条件下,我们提出了一种动态调度策略,在严格的及时吞吐量要求下优化状态更新用户平均信息年龄的加权和,每个用户的流量都有截止日期限制。我们将优化问题表述为一个受限马尔可夫决策过程。然后,通过漂移加惩罚方法,将问题简化为一系列无约束马尔可夫决策问题。最后,利用后向动态编程技术处理每个子问题。仿真结果表明了主要系统参数(如 PU 发射功率和传输速率水平)对二次系统性能的影响。此外,在所提出的混合模式和经典交织模式下,实验研究了针对 PU 活动的约束条件满足情况的模型可行性。将所提策略的性能与其他两种确保满足约束条件的低复杂度调度方案进行了比较,结果显示了所提策略的性能优越性。
{"title":"Age of information minimization in hybrid cognitive radio networks under a timely throughput constraint","authors":"Mohamed F. El-Sherif ,&nbsp;Sherif I. Rabia ,&nbsp;Ahmed H. Abd El-Malek ,&nbsp;W.K. Zahra","doi":"10.1016/j.peva.2024.102407","DOIUrl":"10.1016/j.peva.2024.102407","url":null,"abstract":"<div><p>Exchanging time-critical information is prevalent in various industrial applications where low latency and timely delivery are paramount. Through this work, we consider a cognitive radio network comprised of multiple secondary users with time-sensitive traffic, and they can access the licensed channel under the hybrid interweave/underlay scheme to enhance spectrum utilization. Traffic in the secondary system is divided into two distinct categories: deadline-constrained data and status updates. Quality of service of data with expiration time, such as multimedia streams, is assessed through the timely throughput metric. However, the age of information metric is used to characterize the freshness of the status update packets, which is vital in several emerging applications. Within an interference constraint imposed by the primary user, a dynamic scheduling policy is proposed to optimize the weighted sum of the average age of information of the status update users under a strict timely throughput requirement for each user with deadline-constrained traffic. We formulate the optimization problem as a constrained Markov decision process. Then, through the drift-plus-penalty method, the problem is reduced into a series of unconstrained Markov decision problems. Finally, each subproblem is tackled using the backward dynamic programming technique. Simulation results illustrate the effect of the main system parameters, such as the PU transmitted power and transmission rate level, on the performance of the secondary system. Moreover, the model feasibility regarding the fulfillment of the constraints against PU activity is experimentally investigated under the proposed hybrid mode and classical interweave mode. The performance of the proposed policy is compared to two other low-complexity scheduling schemes, which ensure the satisfaction of the constraints; results show the performance superiority of our proposed policy.</p></div>","PeriodicalId":19964,"journal":{"name":"Performance Evaluation","volume":null,"pages":null},"PeriodicalIF":2.2,"publicationDate":"2024-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139987786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Average delay analysis of soft deadline messages scheduled in the dynamic segment of FlexRay protocol 在 FlexRay 协议动态段中调度的软截止时间报文的平均延迟分析
IF 2.2 4区 计算机科学 Q2 Mathematics Pub Date : 2024-01-30 DOI: 10.1016/j.peva.2024.102404
Sunil Kumar P.R. , Vinod V. , Manjunath A.S.

The FlexRay communication protocol provides high bandwidth for supporting both hard deadline and soft deadline traffic in in-vehicle communication networks. In this paper, we carry out delay analysis of soft deadline traffic which is handled by the dynamic segment of FlexRay. We model the arrival of these messages as Poisson processes, and use queuing theory to evaluate the average delay that they experience. Initially, we consider three nodes competing for service, assuming that two out of three can transmit messages in any FlexRay cycle and obtain expressions for the evolution of the corresponding queues. We also determine the range of message arrival rates for which the queues are stable. These results are then extended to the general case of N queues. The analytical results are compared with those obtained by simulation for a typical system.

FlexRay 通信协议为车载通信网络中的硬截止日期和软截止日期流量提供了高带宽支持。在本文中,我们对 FlexRay 动态段处理的软截止日期流量进行了延迟分析。我们将这些信息的到达建模为泊松过程,并使用排队理论来评估它们所经历的平均延迟。最初,我们考虑了三个节点竞争服务的情况,假设三个节点中有两个可以在任何 FlexRay 周期中传输信息,并获得了相应队列的演化表达式。我们还确定了队列稳定的报文到达率范围。然后将这些结果扩展到 N 个队列的一般情况。分析结果与典型系统的模拟结果进行了比较。
{"title":"Average delay analysis of soft deadline messages scheduled in the dynamic segment of FlexRay protocol","authors":"Sunil Kumar P.R. ,&nbsp;Vinod V. ,&nbsp;Manjunath A.S.","doi":"10.1016/j.peva.2024.102404","DOIUrl":"10.1016/j.peva.2024.102404","url":null,"abstract":"<div><p><span>The FlexRay<span> communication protocol provides high bandwidth for supporting both hard deadline and soft deadline traffic in in-vehicle communication networks. In this paper, we carry out delay analysis of soft deadline traffic which is handled by the dynamic segment of FlexRay. We model the arrival of these messages as Poisson processes, and use queuing theory to evaluate the average delay that they experience. Initially, we consider three nodes competing for service, assuming that two out of three can transmit messages in any FlexRay cycle and obtain expressions for the evolution of the corresponding queues. We also determine the range of message </span></span>arrival rates for which the queues are stable. These results are then extended to the general case of N queues. The analytical results are compared with those obtained by simulation for a typical system.</p></div>","PeriodicalId":19964,"journal":{"name":"Performance Evaluation","volume":null,"pages":null},"PeriodicalIF":2.2,"publicationDate":"2024-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139656073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the sensitivity of stationary solutions of Markov regenerative processes 论马尔可夫再生过程静止解的敏感性
IF 2.2 4区 计算机科学 Q2 Mathematics Pub Date : 2024-01-29 DOI: 10.1016/j.peva.2024.102397
Junjun Zheng , Hiroyuki Okamura , Tadashi Dohi

Markov regenerative process (MRGP) is favored for modeling and evaluating system dependability due to its high power and flexibility. However, its analysis presents challenges because of its inherent renewal nature. The embedded Markov chain (EMC) method offers a stationary solution to the MRGP, while the phase expansion approach delivers both stationary and transient solutions. From these solutions, one can derive performance or dependability measures as outputs from the MRGP model. It is crucial to conduct a sensitivity analysis on MRGP to understand the influence of input factor changes on model outputs, aiding efficient system optimization. Yet, a clear analytical method for sensitivity analysis of MRGP models is currently lacking. Filling this gap, this paper introduces an analytical approach to assess parametric sensitivity for steady-state MRGP, utilizing the EMC method for obtaining the stationary solution. Specifically, since system availability closely correlates with the average system available duration, this paper also shifts its focus from mere model parameters to representative values, like the average available time of a system.

马尔可夫再生过程(MRGP)因其强大的功能和灵活性,在系统可靠性建模和评估中备受青睐。然而,由于其固有的更新特性,对其进行分析面临着挑战。嵌入式马尔可夫链(EMC)方法提供了 MRGP 的静态解决方案,而相位扩展方法则提供了静态和瞬态解决方案。从这些解决方案中,我们可以得出 MRGP 模型输出的性能或可靠性指标。对 MRGP 进行灵敏度分析,以了解输入因素变化对模型输出的影响,从而帮助进行有效的系统优化,这一点至关重要。然而,目前还缺乏对 MRGP 模型进行敏感性分析的明确分析方法。为了填补这一空白,本文介绍了一种分析方法,利用 EMC 方法获取静态解,评估稳态 MRGP 的参数敏感性。具体而言,由于系统可用性与系统平均可用时间密切相关,本文还将重点从单纯的模型参数转移到代表性值,如系统的平均可用时间。
{"title":"On the sensitivity of stationary solutions of Markov regenerative processes","authors":"Junjun Zheng ,&nbsp;Hiroyuki Okamura ,&nbsp;Tadashi Dohi","doi":"10.1016/j.peva.2024.102397","DOIUrl":"10.1016/j.peva.2024.102397","url":null,"abstract":"<div><p><span>Markov regenerative process (MRGP) is favored for modeling and evaluating system dependability due to its </span>high power<span><span><span> and flexibility. However, its analysis presents challenges because of its inherent renewal nature. The embedded Markov chain (EMC) method offers a stationary solution to the MRGP, while the phase expansion approach delivers both stationary and transient solutions. From these solutions, one can derive performance or dependability measures as outputs from the MRGP model. It is crucial to conduct a sensitivity analysis on MRGP to understand the influence of input factor changes on model outputs, aiding efficient system optimization. Yet, a clear analytical method for sensitivity analysis of MRGP models is currently lacking. Filling this gap, this paper introduces an analytical approach to assess </span>parametric sensitivity for steady-state MRGP, utilizing the EMC method for obtaining the stationary solution. Specifically, since </span>system availability closely correlates with the average system available duration, this paper also shifts its focus from mere model parameters to representative values, like the average available time of a system.</span></p></div>","PeriodicalId":19964,"journal":{"name":"Performance Evaluation","volume":null,"pages":null},"PeriodicalIF":2.2,"publicationDate":"2024-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139659358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards the optimal dynamic size-aware dispatching 实现最佳动态规模感知调度
IF 2.2 4区 计算机科学 Q2 Mathematics Pub Date : 2024-01-26 DOI: 10.1016/j.peva.2024.102396
Esa Hyytiä , Rhonda Righter

In this paper, we study dispatching systems that appear in manufacturing, service, healthcare systems, as well as, in various information, communication and computer systems. Such systems comprise a dispatcher and a pool of parallel servers, to which jobs are assigned upon arrival. A common objective is to minimize the mean waiting or response time. In large systems, due to the state-space explosion and scalability reasons, it is impossible to utilize full state information of the system. We therefore consider systems with a small number of servers, and assume that the job sizes become known upon arrival. In such settings, it is plausible to carefully evaluate each server for every new job. First we study a system with a Poisson arrival process, and derive Bellman equations. Then we generalize to the case with general i.i.d. inter-arrival times. The Bellman equations are essentially functional equations that can be solved numerically via value iteration. From their solutions, the optimal dispatching policy and corresponding mean performance can be determined. Our solution framework is illustrated with examples, which show that significant performance gains compared to popular heuristic policies are available in our setting.

在本文中,我们将研究出现在制造、服务、医疗保健系统以及各种信息、通信和计算机系统中的调度系统。这类系统由一个调度员和一组并行服务器组成,作业到达后将被分配给这些服务器。一个共同的目标是尽量缩短平均等待时间或响应时间。在大型系统中,由于状态空间爆炸和可扩展性的原因,不可能利用系统的全部状态信息。我们假设作业大小在到达时就已知晓,并考虑服务器数量较少的系统。在这种情况下,为每个新任务仔细评估每个服务器是可行的。首先,我们研究泊松到达过程的系统,并推导出贝尔曼方程。然后,我们将其推广到一般 i.i.d. 到达时间的情况。贝尔曼方程本质上是函数方程,可以通过数值迭代进行数值求解。根据它们的解,可以确定最优调度策略和相应的平均性能。我们用实例说明了我们的求解框架,这些实例表明,与流行的启发式策略相比,我们的设置能显著提高性能。
{"title":"Towards the optimal dynamic size-aware dispatching","authors":"Esa Hyytiä ,&nbsp;Rhonda Righter","doi":"10.1016/j.peva.2024.102396","DOIUrl":"10.1016/j.peva.2024.102396","url":null,"abstract":"<div><p>In this paper, we study dispatching systems that appear in manufacturing, service, healthcare systems, as well as, in various information, communication and computer systems. Such systems comprise a dispatcher and a pool of parallel servers, to which jobs are assigned upon arrival. A common objective is to minimize the mean waiting or response time. In large systems, due to the state-space explosion and scalability reasons, it is impossible to utilize full state information of the system. We therefore consider systems with a small number of servers, and assume that the job sizes become known upon arrival. In such settings, it is plausible to carefully evaluate each server for every new job. First we study a system with a Poisson arrival process, and derive Bellman equations. Then we generalize to the case with general i.i.d. inter-arrival times. The Bellman equations are essentially functional equations that can be solved numerically via value iteration. From their solutions, the optimal dispatching policy and corresponding mean performance can be determined. Our solution framework is illustrated with examples, which show that significant performance gains compared to popular heuristic policies are available in our setting.</p></div>","PeriodicalId":19964,"journal":{"name":"Performance Evaluation","volume":null,"pages":null},"PeriodicalIF":2.2,"publicationDate":"2024-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139585222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decentralized fault tolerant source localization without sensor parameters in wireless sensor networks 无线传感器网络中无需传感器参数的分散容错源定位
IF 2.2 4区 计算机科学 Q2 Mathematics Pub Date : 2023-12-08 DOI: 10.1016/j.peva.2023.102395
Akram Hussain, Yuan Luo

In this paper, we study the source (event) localization problem in decentralized wireless sensor networks (WSNs) under faulty sensor nodes without knowledge of the sensor parameters. Source localization has many applications, such as localizing WiFi hotspots and mobile users. Some works in the literature localize the source by utilizing the knowledge or estimates of the fault probability of each sensor node or the region of influence of the source. However, this paper proposes two approaches: the hitting set and feature selection for estimating the source location without any knowledge of the sensor parameters under faulty sensor nodes in WSN. The proposed approaches provide better or comparable source localization performances. For the hitting set approach, we also derive a lower bound on the required number of samples. In addition, we extend the proposed methods for localizing multiple sources. Finally, we provide extensive simulations to illustrate the performances of the proposed methods against the centroid, maximum likelihood (ML), fault-tolerant ML (FTML), and subtract on negative add on positive (SNAP) estimators. The proposed approaches significantly outperform the centroid and maximum likelihood estimators for faulty sensor nodes while providing comparable or better performance to FTML or SNAP algorithm. In addition, we use real-world WiFi data set to localize the source in comparison to the support vector machine based estimator in the literature, where the proposed methods outperformed the estimator.

本文研究了分散式无线传感器网络(WSN)中,在不知道传感器参数的情况下,传感器节点出现故障时的源(事件)定位问题。源定位有很多应用,如定位 WiFi 热点和移动用户。文献中的一些作品通过利用每个传感器节点的故障概率或源影响区域的知识或估计值来定位源。然而,本文提出了两种方法:命中集和特征选择,用于在不了解 WSN 中故障传感器节点的传感器参数的情况下估计信号源位置。这两种方法都能提供更好或相当的源定位性能。对于命中集方法,我们还推导出了所需样本数量的下限。此外,我们还扩展了建议的多源定位方法。最后,我们提供了大量仿真,说明了所提方法与中心点、最大似然 (ML)、容错 ML (FTML) 和正负相减 (SNAP) 预估器的性能对比。对于故障传感器节点,所提出的方法明显优于中心点和最大似然估计法,同时与 FTML 或 SNAP 算法的性能相当或更好。此外,我们使用真实世界的 WiFi 数据集来定位信号源,与文献中基于支持向量机的估计器进行比较,发现所提出的方法优于该估计器。
{"title":"Decentralized fault tolerant source localization without sensor parameters in wireless sensor networks","authors":"Akram Hussain,&nbsp;Yuan Luo","doi":"10.1016/j.peva.2023.102395","DOIUrl":"10.1016/j.peva.2023.102395","url":null,"abstract":"<div><p>In this paper, we study the source (event) localization problem in decentralized wireless sensor networks (WSNs) under faulty sensor nodes without knowledge of the sensor parameters. Source localization has many applications, such as localizing WiFi hotspots and mobile users. Some works in the literature localize the source by utilizing the knowledge or estimates of the fault probability of each sensor node or the region of influence of the source. However, this paper proposes two approaches: the hitting set and feature selection for estimating the source location without any knowledge of the sensor parameters under faulty sensor nodes in WSN. The proposed approaches provide better or comparable source localization performances. For the hitting set approach, we also derive a lower bound on the required number of samples. In addition, we extend the proposed methods for localizing multiple sources. Finally, we provide extensive simulations to illustrate the performances of the proposed methods against the centroid, maximum likelihood (ML), fault-tolerant ML (FTML), and subtract on negative add on positive (SNAP) estimators. The proposed approaches significantly outperform the centroid and maximum likelihood estimators for faulty sensor nodes while providing comparable or better performance to FTML or SNAP algorithm. In addition, we use real-world WiFi data set to localize the source in comparison to the support vector machine based estimator in the literature, where the proposed methods outperformed the estimator.</p></div>","PeriodicalId":19964,"journal":{"name":"Performance Evaluation","volume":null,"pages":null},"PeriodicalIF":2.2,"publicationDate":"2023-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0166531623000652/pdfft?md5=917546a42fc91c4d2235d2f09f3e4318&pid=1-s2.0-S0166531623000652-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138553529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Performance Evaluation
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1