首页 > 最新文献

J. Inf. Technol. Educ. Discuss. Cases最新文献

英文 中文
Standard Bank: The Agile Transformation 标准银行:敏捷转型
Pub Date : 2017-12-22 DOI: 10.28945/3923
K. Johnston, T. Gill
Josef Langerman, Head of IT Transformation for Standard Bank, reflected on the extraordinary transformation that his organization’s IT group had recently experienced. Over the past three years, Standard Bank’s IT group had changed from the relatively well accepted systems development lifecycle/waterfall model to a revolutionary large scale agile approach. The results had been gratifying. But it left a question unanswered. Now that things were starting to stabilize, what should be the next steps? The 154-year-old Standard Bank was the largest banking group in Africa, and the 5 largest company headquartered in South Africa. The bank offered a range of corporate, business and personal banking as well as financial services. Its 49,000 employees served over 15 million customers, in 20 countries across the continent of Africa, as well as other countries scattered around the globe.
Josef Langerman, Standard Bank的IT转型主管,回顾了他所在组织的IT团队最近经历的非凡转型。在过去的三年中,Standard Bank的IT团队已经从相对较好接受的系统开发生命周期/瀑布模型转变为革命性的大规模敏捷方法。结果令人满意。但它留下了一个悬而未决的问题。既然情况开始稳定下来,下一步应该做什么?拥有154年历史的标准银行是非洲最大的银行集团,也是总部设在南非的第五大公司。该银行提供一系列公司、商业和个人银行业务以及金融服务。其49,000名员工为非洲大陆20个国家以及全球其他国家的1500多万客户提供服务。
{"title":"Standard Bank: The Agile Transformation","authors":"K. Johnston, T. Gill","doi":"10.28945/3923","DOIUrl":"https://doi.org/10.28945/3923","url":null,"abstract":"Josef Langerman, Head of IT Transformation for Standard Bank, reflected on the extraordinary transformation that his organization’s IT group had recently experienced. Over the past three years, Standard Bank’s IT group had changed from the relatively well accepted systems development lifecycle/waterfall model to a revolutionary large scale agile approach. The results had been gratifying. But it left a question unanswered. Now that things were starting to stabilize, what should be the next steps? The 154-year-old Standard Bank was the largest banking group in Africa, and the 5 largest company headquartered in South Africa. The bank offered a range of corporate, business and personal banking as well as financial services. Its 49,000 employees served over 15 million customers, in 20 countries across the continent of Africa, as well as other countries scattered around the globe.","PeriodicalId":202502,"journal":{"name":"J. Inf. Technol. Educ. Discuss. Cases","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116965184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
SiteWit Corporation: SQL or NoSQL that is the Question SiteWit公司:SQL还是NoSQL,这是个问题
Pub Date : 2017-12-22 DOI: 10.28945/3908
D. Berndt, Ricardo Lasa, J. McCart
This teaching case focuses on a start-up company in the Web analytics and online advertising space, which faces a database scaling challenge. The case covers the rapidly emerging NoSQL database products that can be used to implement very large distributed databases. These are exciting times in the database marketplace, with a flock of new companies offering scalable database systems for the cloud. These products challenge existing relational database vendors that have come to dominate the market. The case outlines four potential solutions and asks students to make a choice or suggest a different alternative to meet database scaling goals.
本教学案例关注的是一家网络分析和在线广告领域的初创公司,该公司面临着数据库扩展的挑战。本案例涵盖了快速出现的NoSQL数据库产品,这些产品可用于实现非常大的分布式数据库。现在是数据库市场上令人兴奋的时刻,有一群新公司为云提供可扩展的数据库系统。这些产品挑战了主导市场的现有关系数据库供应商。该案例概述了四种可能的解决方案,并要求学生做出选择或提出不同的替代方案,以满足数据库扩展目标。
{"title":"SiteWit Corporation: SQL or NoSQL that is the Question","authors":"D. Berndt, Ricardo Lasa, J. McCart","doi":"10.28945/3908","DOIUrl":"https://doi.org/10.28945/3908","url":null,"abstract":"This teaching case focuses on a start-up company in the Web analytics and online advertising space, which faces a database scaling challenge. The case covers the rapidly emerging NoSQL database products that can be used to implement very large distributed databases. These are exciting times in the database marketplace, with a flock of new companies offering scalable database systems for the cloud. These products challenge existing relational database vendors that have come to dominate the market. The case outlines four potential solutions and asks students to make a choice or suggest a different alternative to meet database scaling goals.","PeriodicalId":202502,"journal":{"name":"J. Inf. Technol. Educ. Discuss. Cases","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124586100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Behind Enemy Lines 敌后
Pub Date : 2017-12-22 DOI: 10.28945/3928
J. Elder, Nicole Jacobson, Natalie Remsen, Kim Wilmath
In case you happen to be planning to know how to obtain Behind Enemy Lines eBooks, you need to go thorough study on popular search engines like google together with the keywords and phrases download John R. Hibbing PDF eBooks in order for you personally to only get PDF formatted books to download which are safer and virus-free you will discover an array of sites catering to your demands. The majority of these web sites possess a enormous collection of PDF eBooks which you are able to use to your advantage.
如果你碰巧计划知道如何获得敌后电子书,你需要去深入研究流行的搜索引擎,如谷歌与关键词和短语一起下载约翰R.希宾PDF电子书,为了让你个人只得到PDF格式的书下载,这是更安全,无病毒,你会发现一系列网站迎合你的需求。这些网站中的大多数都拥有大量的PDF电子书,你可以利用它们来发挥你的优势。
{"title":"Behind Enemy Lines","authors":"J. Elder, Nicole Jacobson, Natalie Remsen, Kim Wilmath","doi":"10.28945/3928","DOIUrl":"https://doi.org/10.28945/3928","url":null,"abstract":"In case you happen to be planning to know how to obtain Behind Enemy Lines eBooks, you need to go thorough study on popular search engines like google together with the keywords and phrases download John R. Hibbing PDF eBooks in order for you personally to only get PDF formatted books to download which are safer and virus-free you will discover an array of sites catering to your demands. The majority of these web sites possess a enormous collection of PDF eBooks which you are able to use to your advantage.","PeriodicalId":202502,"journal":{"name":"J. Inf. Technol. Educ. Discuss. Cases","volume":"141 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120884759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Grandon.com Got Hacked! Grandon.com被黑了!
Pub Date : 2017-12-22 DOI: 10.28945/3914
Taufeeq Mohammed, Utkarsh Shrivastava, Ashish K. Das, Q. Nguyen
Dr. T. Grandon Gill, a Professor in the Information Systems and Decision Sciences Department at the University of South Florida, was traveling with his family in England when he received a strange phone message. Not being able to respond, he ignored it until—a couple of days later—he was notified that access to his personal website had been suspended (see Exhibit 1). Grandon.com had, once again, been hacked--for the 7 time.
T. Grandon Gill博士是南佛罗里达大学信息系统和决策科学系的教授,当他和家人在英国旅行时,他收到了一条奇怪的电话短信。由于无法回应,他忽略了它,直到几天后,他接到通知,他的个人网站已被暂停访问(见表1)。Grandon.com再次被黑客入侵,这是第七次。
{"title":"Grandon.com Got Hacked!","authors":"Taufeeq Mohammed, Utkarsh Shrivastava, Ashish K. Das, Q. Nguyen","doi":"10.28945/3914","DOIUrl":"https://doi.org/10.28945/3914","url":null,"abstract":"Dr. T. Grandon Gill, a Professor in the Information Systems and Decision Sciences Department at the University of South Florida, was traveling with his family in England when he received a strange phone message. Not being able to respond, he ignored it until—a couple of days later—he was notified that access to his personal website had been suspended (see Exhibit 1). Grandon.com had, once again, been hacked--for the 7 time.","PeriodicalId":202502,"journal":{"name":"J. Inf. Technol. Educ. Discuss. Cases","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114066179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Employing Dynamic Logic in Cybersecurity 动态逻辑在网络安全中的应用
Pub Date : 2017-12-22 DOI: 10.28945/3915
T. Gill, Bernardo Rodrigues
Dr. Leonid Perlovsky, distinguished physicist and cognitive scientist, pondered this question, which could have a significant impact on his research direction in the years to come. Over the past few decades, he had developed and refined algorithms for distinguishing objects in images, an approach that had found its way into various classified U.S. Department of Defense (DoD) applications. Now he was looking for new potential opportunities to see his research applied, allowing it to evolve further. One of the most interesting aspects of Perlovsky’s approach was that it was very similar to that taken by the human brain in processing sensory information. It began with a very vague model of what might or might not be present in the data being examined. Through successive iterations, analogous to the layers of processing used in human sensory systems, the patterns in the data corresponding to objects would grow more and more distinct until, finally, they became recognizable. Unlike most statistical techniques, this approach— termed “dynamic logic” by Perlovsky—did not require that a model be specified in advance. As such, it was well suited for contexts that required discovery.
杰出的物理学家和认知科学家列昂尼德·佩洛夫斯基(Leonid Perlovsky)博士思考了这个问题,这可能对他未来几年的研究方向产生重大影响。在过去的几十年里,他开发并改进了识别图像中物体的算法,这种方法已经进入了美国国防部的各种机密应用程序。现在,他正在寻找新的潜在机会,让他的研究得到应用,使其进一步发展。Perlovsky的方法最有趣的一个方面是,它与人类大脑处理感官信息的方式非常相似。它从一个非常模糊的模型开始,即在被检查的数据中可能存在或不存在什么。通过连续的迭代,类似于人类感官系统中使用的层层处理,与物体相对应的数据模式将变得越来越明显,直到最后,它们变得可识别。与大多数统计技术不同,这种被perlovsky称为“动态逻辑”的方法不需要事先指定模型。因此,它非常适合需要发现的环境。
{"title":"Employing Dynamic Logic in Cybersecurity","authors":"T. Gill, Bernardo Rodrigues","doi":"10.28945/3915","DOIUrl":"https://doi.org/10.28945/3915","url":null,"abstract":"Dr. Leonid Perlovsky, distinguished physicist and cognitive scientist, pondered this question, which could have a significant impact on his research direction in the years to come. Over the past few decades, he had developed and refined algorithms for distinguishing objects in images, an approach that had found its way into various classified U.S. Department of Defense (DoD) applications. Now he was looking for new potential opportunities to see his research applied, allowing it to evolve further. One of the most interesting aspects of Perlovsky’s approach was that it was very similar to that taken by the human brain in processing sensory information. It began with a very vague model of what might or might not be present in the data being examined. Through successive iterations, analogous to the layers of processing used in human sensory systems, the patterns in the data corresponding to objects would grow more and more distinct until, finally, they became recognizable. Unlike most statistical techniques, this approach— termed “dynamic logic” by Perlovsky—did not require that a model be specified in advance. As such, it was well suited for contexts that required discovery.","PeriodicalId":202502,"journal":{"name":"J. Inf. Technol. Educ. Discuss. Cases","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123958890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Digitally Enabled Strategic Sourcing Process to Mitigate Risk 数字化战略采购流程降低风险
Pub Date : 2017-12-22 DOI: 10.28945/3912
Kim Cupido, Jean-Paul Van Belle
(ICT4D); by
(ICT4D);由
{"title":"A Digitally Enabled Strategic Sourcing Process to Mitigate Risk","authors":"Kim Cupido, Jean-Paul Van Belle","doi":"10.28945/3912","DOIUrl":"https://doi.org/10.28945/3912","url":null,"abstract":"(ICT4D); by","PeriodicalId":202502,"journal":{"name":"J. Inf. Technol. Educ. Discuss. Cases","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129913928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Virtualization Footprint: Why Re-Invest? 虚拟化足迹:为什么要重新投资?
Pub Date : 2017-12-22 DOI: 10.28945/3922
Marc Thomas, Jean-Paul Van Belle
{"title":"Virtualization Footprint: Why Re-Invest?","authors":"Marc Thomas, Jean-Paul Van Belle","doi":"10.28945/3922","DOIUrl":"https://doi.org/10.28945/3922","url":null,"abstract":"","PeriodicalId":202502,"journal":{"name":"J. Inf. Technol. Educ. Discuss. Cases","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116422319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Cybersecurity Executive DBA? 网络安全执行DBA?
Pub Date : 2017-12-22 DOI: 10.28945/3925
Utkarsh Shrivastava, Taufeeq Mohammed
Grandon Gill, Academic Director of the Doctorate of Business Administration Program (DBA) at the University of South Florida’s (USF) Muma College of Business pondered the email he had just sent to Moez Limayem, the dean of the college (see Exhibit 1). In that email, he had raised the possibility of developing a version of the college’s highly successful DBA program specifically targeting cybersecurity professionals. He also noted the possibility of funding from the National Science Foundation (NSF) to help cover the costs of launching the program.
南佛罗里达大学(USF)穆玛商学院(Muma College of Business)工商管理博士项目(DBA)学术主任格兰顿•吉尔(Grandon Gill)仔细考虑了他刚刚发给学院院长莫兹•利马耶姆(Moez Limayem)的那封邮件(见表1)。在那封邮件中,他提出了开发一个专门针对网络安全专业人士的、非常成功的学院DBA项目的可能性。他还指出,有可能从美国国家科学基金会(NSF)获得资助,以帮助支付启动该计划的费用。
{"title":"A Cybersecurity Executive DBA?","authors":"Utkarsh Shrivastava, Taufeeq Mohammed","doi":"10.28945/3925","DOIUrl":"https://doi.org/10.28945/3925","url":null,"abstract":"Grandon Gill, Academic Director of the Doctorate of Business Administration Program (DBA) at the University of South Florida’s (USF) Muma College of Business pondered the email he had just sent to Moez Limayem, the dean of the college (see Exhibit 1). In that email, he had raised the possibility of developing a version of the college’s highly successful DBA program specifically targeting cybersecurity professionals. He also noted the possibility of funding from the National Science Foundation (NSF) to help cover the costs of launching the program.","PeriodicalId":202502,"journal":{"name":"J. Inf. Technol. Educ. Discuss. Cases","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115306116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LifeInsure: Choosing a PAS to Manage and Maintain Their Product Lifecycle 人寿保险:选择一个PAS来管理和维护他们的产品生命周期
Pub Date : 2017-12-22 DOI: 10.28945/3921
Kaasiefa Gasant, J. V. Belle
{"title":"LifeInsure: Choosing a PAS to Manage and Maintain Their Product Lifecycle","authors":"Kaasiefa Gasant, J. V. Belle","doi":"10.28945/3921","DOIUrl":"https://doi.org/10.28945/3921","url":null,"abstract":"","PeriodicalId":202502,"journal":{"name":"J. Inf. Technol. Educ. Discuss. Cases","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116791692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
These Models Need Enterprise Data Management! 这些模型需要企业数据管理!
Pub Date : 2017-01-26 DOI: 10.28945/3651
J. Hoecker, D. Bernal, Alex Brito, Arda Ergonen, Richard Stiftinger
After 28 years of public service, the Information Technology Bureau Chief for the Southwest Florida Water Management District (SWFWMD), Dr. Steven Dicks, was still passionate about serving the public. By first focusing on the needs of people in the District, Dr. Dicks was able to objectively observe the many aspects of operations for which he was responsible. His observations led him to believe that the use of technology within his organization wasn’t as effective and efficient as he knew it could be.
经过28年的公共服务,西南佛罗里达水管理区(SWFWMD)信息技术局局长史蒂文·迪克斯博士仍然热衷于为公众服务。迪克斯医生首先关注的是该区人民的需要,因此他能够客观地观察他所负责的行动的许多方面。他的观察让他相信,在他的组织中,技术的使用并不像他想象的那样有效和高效。
{"title":"These Models Need Enterprise Data Management!","authors":"J. Hoecker, D. Bernal, Alex Brito, Arda Ergonen, Richard Stiftinger","doi":"10.28945/3651","DOIUrl":"https://doi.org/10.28945/3651","url":null,"abstract":"After 28 years of public service, the Information Technology Bureau Chief for the Southwest Florida Water Management District (SWFWMD), Dr. Steven Dicks, was still passionate about serving the public. By first focusing on the needs of people in the District, Dr. Dicks was able to objectively observe the many aspects of operations for which he was responsible. His observations led him to believe that the use of technology within his organization wasn’t as effective and efficient as he knew it could be.","PeriodicalId":202502,"journal":{"name":"J. Inf. Technol. Educ. Discuss. Cases","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130499261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
J. Inf. Technol. Educ. Discuss. Cases
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1