首页 > 最新文献

2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)最新文献

英文 中文
Demonstration of a library prototype to build LoRa mesh networks for the IoT 演示为物联网构建LoRa网状网络的库原型
Pub Date : 2022-07-01 DOI: 10.1109/ICDCS54860.2022.00150
J. M. Solé, Sergi Miralles Nogués, R. P. Centelles, Felix Freitag
LoRa has become popular in the Internet of Things (IoT) domain as a Low Power, Wide Area Network (LPWAN) radio technology providing low-power and long-range communication. In a typical IoT application, the LoRaWAN architecture is applied, where LoRa end nodes communicate their data to a gateway, which then over the Internet sends these data to a cloud-based service for further processing. However, LoRa can also be used standalone for the communication between LoRa nodes forming a mesh network. In this demo paper we present a library called LoRaMesher, which runs on LoRa nodes and forms a mesh network among these nodes. By implementing a distance vector routing protocol, LoRaMesher enables two nodes to communicate data packets with each other while the other nodes in the mesh network operate as routers. LoRaMesher can open the possibility for new distributed applications hosted only on such tiny IoT nodes.
LoRa作为一种提供低功耗和远程通信的低功耗广域网(LPWAN)无线电技术在物联网(IoT)领域已经变得流行。在典型的物联网应用中,应用LoRaWAN架构,其中LoRa端节点将其数据通信到网关,然后网关通过互联网将这些数据发送到基于云的服务进行进一步处理。但是,LoRa也可以单独使用,用于组成网状网络的LoRa节点之间的通信。在这篇演示论文中,我们介绍了一个名为LoRaMesher的库,它运行在LoRa节点上,并在这些节点之间形成网状网络。通过实现距离矢量路由协议,LoRaMesher使两个节点能够相互通信数据包,而网状网络中的其他节点则作为路由器运行。LoRaMesher可以为仅托管在如此微小的物联网节点上的新分布式应用程序打开可能性。
{"title":"Demonstration of a library prototype to build LoRa mesh networks for the IoT","authors":"J. M. Solé, Sergi Miralles Nogués, R. P. Centelles, Felix Freitag","doi":"10.1109/ICDCS54860.2022.00150","DOIUrl":"https://doi.org/10.1109/ICDCS54860.2022.00150","url":null,"abstract":"LoRa has become popular in the Internet of Things (IoT) domain as a Low Power, Wide Area Network (LPWAN) radio technology providing low-power and long-range communication. In a typical IoT application, the LoRaWAN architecture is applied, where LoRa end nodes communicate their data to a gateway, which then over the Internet sends these data to a cloud-based service for further processing. However, LoRa can also be used standalone for the communication between LoRa nodes forming a mesh network. In this demo paper we present a library called LoRaMesher, which runs on LoRa nodes and forms a mesh network among these nodes. By implementing a distance vector routing protocol, LoRaMesher enables two nodes to communicate data packets with each other while the other nodes in the mesh network operate as routers. LoRaMesher can open the possibility for new distributed applications hosted only on such tiny IoT nodes.","PeriodicalId":225883,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122145130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ZonedStore: A Concurrent ZNS-Aware Cache System for Cloud Data Storage ZonedStore:用于云数据存储的并发zns感知缓存系统
Pub Date : 2022-07-01 DOI: 10.1109/ICDCS54860.2022.00148
Yanqi Lv, Peiquan Jin, Xiaoliang Wang, Ruicheng Liu, Liming Fang, Yuanjin Lin, Kuankuan Guo
Cloud data storage relies on efficient cache systems to offer high performance for intensive reads/writes on big data. Due to the large data volume of cloud data storage and the limited capacity of DRAM, current cloud vendors prefer to use SSDs (Solid State Drives) but not DRAM to build the cache system. However, traditional SSDs have a serious over-provisioning problem and a high cost in garbage collection. Thus, the performance of SSD-based cache systems will drop quickly when the usage of SSDs increases. Recently, Zoned Namespaces (ZNS) SSDs have emerged as a hot topic in both academics and industries. Compared to conventional SSDs, ZNS SSDs have the advantages of less overhead of garbage collection and lower over-provisioning costs. Therefore, ZNS SSDs have been a better candidate for the cache system for cloud storage. However, ZNS SSDs only accept sequential writes, and the zones inside ZNS SSDs need to be carefully managed to maximize the advantages of ZNS SSDs. Therefore, making the cache system adapt to ZNS SSDs is becoming a challenging issue. In this paper, we demonstrate ZonedStore, a novel ZNS-aware cache system for cloud data storage. After a brief introduction to the architecture of ZonedStore, we present the key designs of ZonedStore, including a Zone Manager to control the space allocation and operations on ZNS SSDs, a Multi-Layer Buffer Manager, and an In-Memory Concurrent Index to accelerate accesses. Finally, we present a case study to demonstrate the working process and performance of ZonedStore.
云数据存储依赖于高效的缓存系统,为大数据的密集读写提供高性能。由于云数据存储的数据量大,而DRAM的容量有限,目前的云厂商更倾向于使用ssd (Solid State Drives)而不是DRAM来构建缓存系统。然而,传统ssd存在严重的供应过剩问题,并且垃圾收集成本高。因此,当ssd的使用增加时,基于ssd的缓存系统的性能将迅速下降。最近,分区命名空间(ZNS) ssd已经成为学术界和工业界的热门话题。与传统ssd相比,ZNS ssd具有较少的垃圾收集开销和较低的过度配置成本的优点。因此,ZNS ssd已经成为云存储缓存系统的更好候选。但是,ZNS ssd只接受顺序写入,并且需要仔细管理ZNS ssd内部的区域,以最大限度地发挥ZNS ssd的优势。因此,使缓存系统适应ZNS ssd成为一个具有挑战性的问题。在本文中,我们展示了ZonedStore,一种用于云数据存储的新型zns感知缓存系统。在简要介绍了ZonedStore的架构后,我们介绍了ZonedStore的关键设计,包括控制ZNS ssd上的空间分配和操作的Zone Manager,多层缓冲区管理器和内存并发索引以加速访问。最后,我们提出了一个案例研究来展示ZonedStore的工作过程和性能。
{"title":"ZonedStore: A Concurrent ZNS-Aware Cache System for Cloud Data Storage","authors":"Yanqi Lv, Peiquan Jin, Xiaoliang Wang, Ruicheng Liu, Liming Fang, Yuanjin Lin, Kuankuan Guo","doi":"10.1109/ICDCS54860.2022.00148","DOIUrl":"https://doi.org/10.1109/ICDCS54860.2022.00148","url":null,"abstract":"Cloud data storage relies on efficient cache systems to offer high performance for intensive reads/writes on big data. Due to the large data volume of cloud data storage and the limited capacity of DRAM, current cloud vendors prefer to use SSDs (Solid State Drives) but not DRAM to build the cache system. However, traditional SSDs have a serious over-provisioning problem and a high cost in garbage collection. Thus, the performance of SSD-based cache systems will drop quickly when the usage of SSDs increases. Recently, Zoned Namespaces (ZNS) SSDs have emerged as a hot topic in both academics and industries. Compared to conventional SSDs, ZNS SSDs have the advantages of less overhead of garbage collection and lower over-provisioning costs. Therefore, ZNS SSDs have been a better candidate for the cache system for cloud storage. However, ZNS SSDs only accept sequential writes, and the zones inside ZNS SSDs need to be carefully managed to maximize the advantages of ZNS SSDs. Therefore, making the cache system adapt to ZNS SSDs is becoming a challenging issue. In this paper, we demonstrate ZonedStore, a novel ZNS-aware cache system for cloud data storage. After a brief introduction to the architecture of ZonedStore, we present the key designs of ZonedStore, including a Zone Manager to control the space allocation and operations on ZNS SSDs, a Multi-Layer Buffer Manager, and an In-Memory Concurrent Index to accelerate accesses. Finally, we present a case study to demonstrate the working process and performance of ZonedStore.","PeriodicalId":225883,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122693086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Distributed and Decentralized Edge Caching in 5G Networks Using Non-Volatile Memory Systems 使用非易失性存储系统的5G网络中的分布式和分散边缘缓存
Pub Date : 2022-07-01 DOI: 10.1109/ICDCS54860.2022.00048
Yiming Zeng, Yaodong Huang, Zhen Liu, Ji Liu
Edge caching is an effective way to reduce congestion and latency in 5G networks. Non-volatile memory (NVM) devices are developing fast, with the potential of fast access, and higher endurance versus traditional storage devices, to further boost mobile data offloading efficiency in 5G networks. This paper studies how to effectively use the two-layer storage system (NVM-enhanced) in 5G edge caching. We first model an edge caching optimization problem with NVM storage devices included and develop a parallel distributed algorithm with guaranteed convergence in joint caching and routing decisions. A fully decentralized algorithm for scenarios without any coordination is further developed which also guarantees the convergence. Real-world trace-driven simulations and experiments over a small-scale system demonstrate that NVM significantly boosts the performance of edge caching and the proposed algorithms outperform the existing ones.
边缘缓存是减少5G网络拥塞和延迟的有效方法。非易失性存储器(NVM)设备发展迅速,与传统存储设备相比,具有快速访问和更高耐用性的潜力,可以进一步提高5G网络中的移动数据卸载效率。本文研究了如何在5G边缘缓存中有效利用两层存储系统(nvm增强型)。我们首先模拟了一个包含NVM存储设备的边缘缓存优化问题,并开发了一个并行分布式算法,保证了联合缓存和路由决策的收敛性。进一步开发了一种完全去中心化的无协调场景算法,保证了算法的收敛性。在一个小规模系统上的真实跟踪驱动仿真和实验表明,NVM显著提高了边缘缓存的性能,并且所提出的算法优于现有算法。
{"title":"Distributed and Decentralized Edge Caching in 5G Networks Using Non-Volatile Memory Systems","authors":"Yiming Zeng, Yaodong Huang, Zhen Liu, Ji Liu","doi":"10.1109/ICDCS54860.2022.00048","DOIUrl":"https://doi.org/10.1109/ICDCS54860.2022.00048","url":null,"abstract":"Edge caching is an effective way to reduce congestion and latency in 5G networks. Non-volatile memory (NVM) devices are developing fast, with the potential of fast access, and higher endurance versus traditional storage devices, to further boost mobile data offloading efficiency in 5G networks. This paper studies how to effectively use the two-layer storage system (NVM-enhanced) in 5G edge caching. We first model an edge caching optimization problem with NVM storage devices included and develop a parallel distributed algorithm with guaranteed convergence in joint caching and routing decisions. A fully decentralized algorithm for scenarios without any coordination is further developed which also guarantees the convergence. Real-world trace-driven simulations and experiments over a small-scale system demonstrate that NVM significantly boosts the performance of edge caching and the proposed algorithms outperform the existing ones.","PeriodicalId":225883,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129666976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Thwarting Longitudinal Location Exposure Attacks in Advertising Ecosystem via Edge Computing 利用边缘计算阻止广告生态系统中的纵向位置暴露攻击
Pub Date : 2022-07-01 DOI: 10.1109/ICDCS54860.2022.00052
Le Yu, Shufan Zhang, Lu Zhou, Yan Meng, Suguo Du, Haojin Zhu
As geo-location data has been increasingly adopted as a high-profile feature in targeted advertising, exposing user real locations to untrusted cloud services or advertisers has raised severe privacy concerns. To protect location privacy with formal guarantee, a wide-stretched line of recent studies focuses on injecting controlled geo-indistinguishability (geo-IND) noise as per each location exposure. However, in advertising, over the course of 2 years, a single user can report and contribute near 1k location data points on average, which allows a longitudinal attacker to infer some statistics from the perturbed locations.In this study, we demonstrate the above-mentioned privacy risk via revealing an inference attack mechanism, coined as a longitudinal location exposure attack. This novel attack illustrates the possibility of recovering 75%∼90% of user top-1 locations (within only 200-meter range) among 37k users. In light of this deficiency, we propose a novel edge-assisted location privacy protection system, entitled Edge-PrivLocAd, that is adapted to location-based advertising. The novelty of Edge-PrivLocAd stems from our n-fold Gaussian mechanism, which adds permanent noise to the statistical user location profile and thus can defend against longitudinal attackers while balancing the privacy-utility trade-off. In addition, our system incorporates a posterior-based sampling technique into the location re-mapping process, that boosts location utility without privacy loss. We develop a fully-functioning prototype and empirically evaluate the proposed system. Our experimental results show that Edge-PrivLocAd is practical and scalable in real-world scenarios.
随着地理位置数据越来越多地被用作定向广告中的一项引人注目的功能,将用户的真实位置暴露给不可信的云服务或广告商已经引发了严重的隐私问题。为了正式保证位置隐私,最近的研究广泛关注于根据每个位置暴露注入可控的地理不可分辨性(geo-IND)噪声。然而,在广告中,在2年的时间里,单个用户平均可以报告和贡献近1000个位置数据点,这使得纵向攻击者可以从受干扰的位置推断出一些统计数据。在本研究中,我们通过揭示一种推理攻击机制来证明上述隐私风险,该机制被称为纵向位置暴露攻击。这种新颖的攻击说明了在37k用户中恢复75% ~ 90%的用户top-1位置(仅200米范围内)的可能性。鉴于这一不足,我们提出了一种新的边缘辅助位置隐私保护系统,名为Edge-PrivLocAd,适用于基于位置的广告。Edge-PrivLocAd的新颖性源于我们的n倍高斯机制,该机制为统计用户位置配置文件添加了永久噪声,因此可以在平衡隐私-效用权衡的同时防御纵向攻击者。此外,我们的系统将基于后验的采样技术集成到位置重新映射过程中,在不丢失隐私的情况下提高了位置效用。我们开发了一个功能齐全的原型,并对提出的系统进行了经验评估。我们的实验结果表明Edge-PrivLocAd在现实场景中是实用的和可扩展的。
{"title":"Thwarting Longitudinal Location Exposure Attacks in Advertising Ecosystem via Edge Computing","authors":"Le Yu, Shufan Zhang, Lu Zhou, Yan Meng, Suguo Du, Haojin Zhu","doi":"10.1109/ICDCS54860.2022.00052","DOIUrl":"https://doi.org/10.1109/ICDCS54860.2022.00052","url":null,"abstract":"As geo-location data has been increasingly adopted as a high-profile feature in targeted advertising, exposing user real locations to untrusted cloud services or advertisers has raised severe privacy concerns. To protect location privacy with formal guarantee, a wide-stretched line of recent studies focuses on injecting controlled geo-indistinguishability (geo-IND) noise as per each location exposure. However, in advertising, over the course of 2 years, a single user can report and contribute near 1k location data points on average, which allows a longitudinal attacker to infer some statistics from the perturbed locations.In this study, we demonstrate the above-mentioned privacy risk via revealing an inference attack mechanism, coined as a longitudinal location exposure attack. This novel attack illustrates the possibility of recovering 75%∼90% of user top-1 locations (within only 200-meter range) among 37k users. In light of this deficiency, we propose a novel edge-assisted location privacy protection system, entitled Edge-PrivLocAd, that is adapted to location-based advertising. The novelty of Edge-PrivLocAd stems from our n-fold Gaussian mechanism, which adds permanent noise to the statistical user location profile and thus can defend against longitudinal attackers while balancing the privacy-utility trade-off. In addition, our system incorporates a posterior-based sampling technique into the location re-mapping process, that boosts location utility without privacy loss. We develop a fully-functioning prototype and empirically evaluate the proposed system. Our experimental results show that Edge-PrivLocAd is practical and scalable in real-world scenarios.","PeriodicalId":225883,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128982739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Demo:Dynamic Suppression of Selfish Node Attack Motivation in the Process of VANET Communication 演示:VANET通信过程中自私节点攻击动机的动态抑制
Pub Date : 2022-07-01 DOI: 10.1109/ICDCS54860.2022.00137
Bowei Zhang, Xiaoliang Wang, Ru Xie, Huazhe Zhang, Frank Jiang
The selfish On-Board-Unit (OBU) attacks Vehicular Ad-Hoc Network (VANET) by various attacks for profit. However, many existing methods are based on the principle of direct reciprocity for communication, and when an attack occurs, it is easy to crash in the case of large-scale networks. In order to reduce the number of attackers in the vehicle ad-hoc network and restrain the attack motivation of the OBUs, we propose an indirect reciprocal incentive mechanism based on reputation to encourage the OBUs in the VANET to help each other. Since most OBUs are in great need of network services, including potential attackers, when the loss of network services is far greater than the illegal benefits of their attacks, selfish and rational OBU will give up attacks and take desirable behavior. In addition, to prevent some attacks from tampering with information, we also apply blockchain technology to record the behavior of OBU. The indirect reciprocity process of each OBU in VANET can be regarded as a Markov Decision Process (MDP). In order to restrain the attack motivation of selfish nodes and communicate normally without knowing the attack model, an algorithm based on Deep Reinforcement Learning (DRL) is proposed to suppress attack motivation, so as to activate OBU learning in dynamic environment and make wise decisions. Finally, through a large number of simulation experiments, the performance of our proposed algorithm is obviously better than that of the baseline strategy, and is verified by the simulation results.
自私的车载单元OBU (self - on - board unit)通过各种攻击手段攻击VANET (Vehicular Ad-Hoc Network)以获取利益。然而,现有的许多方法都是基于直接对等原则进行通信,在发生攻击时,在大规模网络的情况下很容易崩溃。为了减少车辆自组织网络中的攻击者数量,抑制OBUs的攻击动机,我们提出了一种基于声誉的间接互惠激励机制,鼓励车辆自组织网络中的OBUs相互帮助。由于大多数OBU都非常需要网络服务,包括潜在的攻击者,当网络服务的损失远远大于其攻击的非法收益时,自私和理性的OBU就会放弃攻击,采取可取的行为。此外,为了防止一些攻击者篡改信息,我们还使用区块链技术来记录OBU的行为。VANET中各OBU的间接互易过程可以看作是一个马尔可夫决策过程。为了抑制自私节点的攻击动机,在不知道攻击模型的情况下正常通信,提出了一种基于深度强化学习(Deep Reinforcement Learning, DRL)的算法来抑制攻击动机,从而激活OBU在动态环境中的学习,做出明智的决策。最后,通过大量的仿真实验,我们提出的算法的性能明显优于基线策略,并通过仿真结果进行验证。
{"title":"Demo:Dynamic Suppression of Selfish Node Attack Motivation in the Process of VANET Communication","authors":"Bowei Zhang, Xiaoliang Wang, Ru Xie, Huazhe Zhang, Frank Jiang","doi":"10.1109/ICDCS54860.2022.00137","DOIUrl":"https://doi.org/10.1109/ICDCS54860.2022.00137","url":null,"abstract":"The selfish On-Board-Unit (OBU) attacks Vehicular Ad-Hoc Network (VANET) by various attacks for profit. However, many existing methods are based on the principle of direct reciprocity for communication, and when an attack occurs, it is easy to crash in the case of large-scale networks. In order to reduce the number of attackers in the vehicle ad-hoc network and restrain the attack motivation of the OBUs, we propose an indirect reciprocal incentive mechanism based on reputation to encourage the OBUs in the VANET to help each other. Since most OBUs are in great need of network services, including potential attackers, when the loss of network services is far greater than the illegal benefits of their attacks, selfish and rational OBU will give up attacks and take desirable behavior. In addition, to prevent some attacks from tampering with information, we also apply blockchain technology to record the behavior of OBU. The indirect reciprocity process of each OBU in VANET can be regarded as a Markov Decision Process (MDP). In order to restrain the attack motivation of selfish nodes and communicate normally without knowing the attack model, an algorithm based on Deep Reinforcement Learning (DRL) is proposed to suppress attack motivation, so as to activate OBU learning in dynamic environment and make wise decisions. Finally, through a large number of simulation experiments, the performance of our proposed algorithm is obviously better than that of the baseline strategy, and is verified by the simulation results.","PeriodicalId":225883,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)","volume":"532 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117220548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Game Theoretical Balancing Approach for Offloaded Tasks in Edge Datacenters 边缘数据中心卸载任务的博弈理论平衡方法
Pub Date : 2022-07-01 DOI: 10.1109/ICDCS54860.2022.00057
Hongli Lu, Guangping Xu, C. Sung, Salwa Mostafa, Yulei Wu
Edge computing is the next-generation computing paradigm that brings the processing capability closer to the location where it is needed. 5G and beyond 5G aim to achieve substantial improvement for the performance of edge computing in terms of e.g. higher throughput and lower latency. Smart base stations are often attached with edge datacenters consisting of many edge servers equipped with computing and storage capabilities. These servers are used to execute offloaded tasks from edge equipment such as Internet of Things. It is important to have an efficient offloading algorithm that can guarantee specific service-level objectives (SLOs) by assigning tasks to appropriate edge servers. Traditional offloading schemes such as static and learning-based algorithms either have limited performance or result in high overhead for task assignment to servers. In this paper, we propose an efficient game-theoretical scheduling algorithm for offloaded tasks at edge datacenters. The core contribution of the algorithm is to design a public goods investment model for edge servers. Based on the model, we design a lightweight scheduling algorithm to reduce the average load of edge servers and enhance the stability of edge datacenter systems. Experimental results demonstrate the significant benefits of the proposed algorithm in reducing the response latency of tasks and balancing the workload of edge servers.
边缘计算是下一代计算范式,它使处理能力更接近需要的位置。5G和超越5G的目标是在更高的吞吐量和更低的延迟方面实现边缘计算性能的实质性改进。智能基站通常与边缘数据中心相连,这些数据中心由许多配备了计算和存储功能的边缘服务器组成。这些服务器用于执行来自边缘设备(如物联网)的卸载任务。重要的是要有一个有效的卸载算法,它可以通过将任务分配给适当的边缘服务器来保证特定的服务水平目标(slo)。传统的卸载方案,如静态和基于学习的算法,要么性能有限,要么导致服务器任务分配的高开销。本文针对边缘数据中心的卸载任务,提出了一种有效的博弈论调度算法。该算法的核心贡献在于设计了边缘服务器的公共产品投资模型。在此基础上,设计了一种轻量级调度算法,以降低边缘服务器的平均负载,提高边缘数据中心系统的稳定性。实验结果表明,该算法在减少任务响应延迟和平衡边缘服务器工作负载方面具有显著的优势。
{"title":"A Game Theoretical Balancing Approach for Offloaded Tasks in Edge Datacenters","authors":"Hongli Lu, Guangping Xu, C. Sung, Salwa Mostafa, Yulei Wu","doi":"10.1109/ICDCS54860.2022.00057","DOIUrl":"https://doi.org/10.1109/ICDCS54860.2022.00057","url":null,"abstract":"Edge computing is the next-generation computing paradigm that brings the processing capability closer to the location where it is needed. 5G and beyond 5G aim to achieve substantial improvement for the performance of edge computing in terms of e.g. higher throughput and lower latency. Smart base stations are often attached with edge datacenters consisting of many edge servers equipped with computing and storage capabilities. These servers are used to execute offloaded tasks from edge equipment such as Internet of Things. It is important to have an efficient offloading algorithm that can guarantee specific service-level objectives (SLOs) by assigning tasks to appropriate edge servers. Traditional offloading schemes such as static and learning-based algorithms either have limited performance or result in high overhead for task assignment to servers. In this paper, we propose an efficient game-theoretical scheduling algorithm for offloaded tasks at edge datacenters. The core contribution of the algorithm is to design a public goods investment model for edge servers. Based on the model, we design a lightweight scheduling algorithm to reduce the average load of edge servers and enhance the stability of edge datacenter systems. Experimental results demonstrate the significant benefits of the proposed algorithm in reducing the response latency of tasks and balancing the workload of edge servers.","PeriodicalId":225883,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117229782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Defending against Cross-Technology Jamming in Heterogeneous IoT Systems 防御异构物联网系统中的跨技术干扰
Pub Date : 2022-07-01 DOI: 10.1109/ICDCS54860.2022.00073
Sihan Yu, ChunChih Lin, Xiaonan Zhang, Linke Guo
The wide deployment of IoT devices has resulted in a critical shortage of spectrum resources. Many IoT devices coexist on the same spectrum band, where the network performance is always degraded. As a promising solution, the Cross-Technology Communication (CTC) enables the direct communication among heterogeneous IoT devices. Unfortunately, the emerging cross-technology attacks have demonstrated their high success rates in terms of spoofing the end IoT devices or jamming the communication channels. In this paper, we investigate a novel cross-technology jamming issue for a distributed heterogeneous IoT system. Compared with traditional jamming methods, the cross-technology jammer has a much higher jamming power, wider jamming bandwidth, and stronger stealthiness, all of which deserve a complete re-thinking of defensive mechanisms. Therefore, we propose a hybrid anti-jamming scheme that jointly considers frequency hopping and power control techniques. Specifically, we model the anti-jamming process as a Markov Decision Process (MDP) and adopt Deep Q-Network (DQN) to find the optimal strategy. Extensive real-world experiments show that the goodput (payload data) of our anti-jamming scheme can achieve up to 2X and 1.39X than the passive and random anti-jamming approaches, respectively. In particular, our anti-jamming scheme provides 78% of goodput with the presence of a cross-technology jammer, outperforming existing passive and random anti-jamming scheme designs at 37.6% and 54.1%.
物联网设备的广泛部署导致频谱资源严重短缺。许多物联网设备共存于同一频段,网络性能总是下降。跨技术通信(Cross-Technology Communication, CTC)是一种很有前途的解决方案,可以实现异构物联网设备之间的直接通信。不幸的是,新兴的跨技术攻击在欺骗终端物联网设备或干扰通信渠道方面显示出很高的成功率。在本文中,我们研究了分布式异构物联网系统的一种新的跨技术干扰问题。与传统干扰方式相比,跨技术干扰具有更高的干扰功率、更宽的干扰带宽和更强的隐身性,值得对防御机制进行彻底的反思。因此,我们提出了一种综合考虑跳频和功率控制技术的混合抗干扰方案。具体来说,我们将抗干扰过程建模为马尔可夫决策过程(MDP),并采用深度q -网络(DQN)来寻找最优策略。大量的实际实验表明,我们的抗干扰方案的有效载荷数据分别比无源和随机抗干扰方法高2倍和1.39倍。特别是,我们的抗干扰方案在存在交叉技术干扰器的情况下提供了78%的良好性能,优于现有的无源和随机抗干扰方案设计,分别为37.6%和54.1%。
{"title":"Defending against Cross-Technology Jamming in Heterogeneous IoT Systems","authors":"Sihan Yu, ChunChih Lin, Xiaonan Zhang, Linke Guo","doi":"10.1109/ICDCS54860.2022.00073","DOIUrl":"https://doi.org/10.1109/ICDCS54860.2022.00073","url":null,"abstract":"The wide deployment of IoT devices has resulted in a critical shortage of spectrum resources. Many IoT devices coexist on the same spectrum band, where the network performance is always degraded. As a promising solution, the Cross-Technology Communication (CTC) enables the direct communication among heterogeneous IoT devices. Unfortunately, the emerging cross-technology attacks have demonstrated their high success rates in terms of spoofing the end IoT devices or jamming the communication channels. In this paper, we investigate a novel cross-technology jamming issue for a distributed heterogeneous IoT system. Compared with traditional jamming methods, the cross-technology jammer has a much higher jamming power, wider jamming bandwidth, and stronger stealthiness, all of which deserve a complete re-thinking of defensive mechanisms. Therefore, we propose a hybrid anti-jamming scheme that jointly considers frequency hopping and power control techniques. Specifically, we model the anti-jamming process as a Markov Decision Process (MDP) and adopt Deep Q-Network (DQN) to find the optimal strategy. Extensive real-world experiments show that the goodput (payload data) of our anti-jamming scheme can achieve up to 2X and 1.39X than the passive and random anti-jamming approaches, respectively. In particular, our anti-jamming scheme provides 78% of goodput with the presence of a cross-technology jammer, outperforming existing passive and random anti-jamming scheme designs at 37.6% and 54.1%.","PeriodicalId":225883,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116001819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Jenga: Orchestrating Smart Contracts in Sharding-Based Blockchain for Efficient Processing Jenga:在基于分片的区块链中编排智能合约以实现高效处理
Pub Date : 2022-07-01 DOI: 10.1109/ICDCS54860.2022.00022
Mingzhe Li, You-lin Li, Jin Zhang, Wei Wang
Sharding is a promising way to achieve blockchain scalability, increasing the throughput by partitioning nodes into multiple smaller groups, splitting the workload. However, when tackling the increasingly important smart contracts, existing blockchain sharding protocols do not scale well. They usually require complex multi-round cross-shard consensus protocols for contract execution and extensive cross-shard communication during state transmission, mainly because that each shard stores and executes an isolated, disjoint subset of contracts. In this paper, we present Jenga, a novel sharding-based approach for efficient smart contract processing. Its main idea is to break the isolation between shards by orchestrating the logic storage, state storage, and execution of smart contracts. In Jenga, all shards share the logic for all contracts. Therefore, multiple contracts involved in a smart contract transaction can be executed together by the same shard within one round. Moreover, different shards store distinct states (named state shards), several "orthogonal" execution channels are established based on the state shards, where each channel overlaps with all shards. Each node simultaneously belongs to a shard and an "orthogonal" channel, different channels execute different contracts. Therefore, via the overlapped nodes, the contract states can be directly broadcast between the state shards and the execution channels without additional cross-shard communication. We implement Jenga and evaluation results show that it provides outstanding performance gains in terms of throughput and transaction confirmation latency.
分片是实现区块链可扩展性的一种很有前途的方法,它通过将节点划分为多个较小的组来增加吞吐量,从而划分工作负载。然而,在处理日益重要的智能合约时,现有的区块链分片协议无法很好地扩展。它们通常需要复杂的多轮跨分片共识协议来执行合约,并在状态传输期间进行广泛的跨分片通信,主要是因为每个分片存储和执行一个孤立的、不相交的合约子集。在本文中,我们提出了Jenga,一种新颖的基于分片的高效智能合约处理方法。其主要思想是通过编排智能合约的逻辑存储、状态存储和执行来打破分片之间的隔离。在叠叠游戏中,所有的分片共享所有合约的逻辑。因此,一个智能合约交易中涉及的多个合约可以由同一个分片在一轮内一起执行。此外,不同的分片存储不同的状态(称为状态分片),基于状态分片建立了几个“正交”的执行通道,其中每个通道与所有分片重叠。每个节点同时属于一个分片和一个“正交”通道,不同的通道执行不同的合约。因此,通过重叠节点,合约状态可以直接在状态分片和执行通道之间广播,而无需额外的跨分片通信。我们实现了Jenga,评估结果表明,它在吞吐量和事务确认延迟方面提供了出色的性能提升。
{"title":"Jenga: Orchestrating Smart Contracts in Sharding-Based Blockchain for Efficient Processing","authors":"Mingzhe Li, You-lin Li, Jin Zhang, Wei Wang","doi":"10.1109/ICDCS54860.2022.00022","DOIUrl":"https://doi.org/10.1109/ICDCS54860.2022.00022","url":null,"abstract":"Sharding is a promising way to achieve blockchain scalability, increasing the throughput by partitioning nodes into multiple smaller groups, splitting the workload. However, when tackling the increasingly important smart contracts, existing blockchain sharding protocols do not scale well. They usually require complex multi-round cross-shard consensus protocols for contract execution and extensive cross-shard communication during state transmission, mainly because that each shard stores and executes an isolated, disjoint subset of contracts. In this paper, we present Jenga, a novel sharding-based approach for efficient smart contract processing. Its main idea is to break the isolation between shards by orchestrating the logic storage, state storage, and execution of smart contracts. In Jenga, all shards share the logic for all contracts. Therefore, multiple contracts involved in a smart contract transaction can be executed together by the same shard within one round. Moreover, different shards store distinct states (named state shards), several \"orthogonal\" execution channels are established based on the state shards, where each channel overlaps with all shards. Each node simultaneously belongs to a shard and an \"orthogonal\" channel, different channels execute different contracts. Therefore, via the overlapped nodes, the contract states can be directly broadcast between the state shards and the execution channels without additional cross-shard communication. We implement Jenga and evaluation results show that it provides outstanding performance gains in terms of throughput and transaction confirmation latency.","PeriodicalId":225883,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124423655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Self-Sovereign Digital Agents for a Grassroots Digital Society 草根数字社会的自主数字代理
Pub Date : 2022-07-01 DOI: 10.1109/ICDCS54860.2022.00028
Ouri Poupko, E. Shapiro, Nimrod Talmon
Mainstream cryptocurrencies, based on proof of work or stake, require paying miners for the capital-intensive execution of a consensus protocol, and hence are unsuitable as a foundation for capital-free digital communities and for the bootstrap of a grassroots digital society. We aim to adapt and adjust the concepts, tools and technologies developed by the cryptocurrencies ecosystem, together with related networking technologies, into a foundation for a healthy grassroots digital economy and society. In this context we present the design and proof-of-concept implementation of a self-sovereign digital agent (ssDA), as an essential building block for a grassroots digital economy and society. The ssDA serves as a party, on behalf of its sovereign—a person—in digital social contracts, which are smart contracts among vetted participants, who are its sovereign in that they jointly execute the contract with an egalitarian consensus protocol. Digital social contracts may realize social networks, sharing economy applications, social governance of a digital community, and more. The ssDA is a software application that allows a person to partake in multiple digital social contracts simultaneously. Participation in a contract can be realized by initiating it or by being invited to it. Extra confidence in the integrity of the data is achieved by each person maintaining a blockchain containing all the person’s transactions in all contracts.
基于工作量证明或权益的主流加密货币需要向矿工支付执行共识协议的资本密集型费用,因此不适合作为无资本数字社区和基层数字社会引导的基础。我们的目标是适应和调整加密货币生态系统开发的概念、工具和技术,以及相关的网络技术,为健康的基层数字经济和社会奠定基础。在此背景下,我们提出了自主数字代理(ssDA)的设计和概念验证实现,作为基层数字经济和社会的重要组成部分。ssDA作为一方,代表其主权——一个人——参与数字社会合约,这是经过审查的参与者之间的智能合约,他们是其主权,因为他们以平等的共识协议共同执行合同。数字社会契约可以实现社交网络、共享经济应用、数字社区的社会治理等。ssDA是一个软件应用程序,允许一个人同时参与多个数字社会契约。对合同的参与可以通过发起合同或被邀请加入合同来实现。通过每个人维护一个包含所有合同中所有人交易的区块链,可以实现对数据完整性的额外信任。
{"title":"Self-Sovereign Digital Agents for a Grassroots Digital Society","authors":"Ouri Poupko, E. Shapiro, Nimrod Talmon","doi":"10.1109/ICDCS54860.2022.00028","DOIUrl":"https://doi.org/10.1109/ICDCS54860.2022.00028","url":null,"abstract":"Mainstream cryptocurrencies, based on proof of work or stake, require paying miners for the capital-intensive execution of a consensus protocol, and hence are unsuitable as a foundation for capital-free digital communities and for the bootstrap of a grassroots digital society. We aim to adapt and adjust the concepts, tools and technologies developed by the cryptocurrencies ecosystem, together with related networking technologies, into a foundation for a healthy grassroots digital economy and society. In this context we present the design and proof-of-concept implementation of a self-sovereign digital agent (ssDA), as an essential building block for a grassroots digital economy and society. The ssDA serves as a party, on behalf of its sovereign—a person—in digital social contracts, which are smart contracts among vetted participants, who are its sovereign in that they jointly execute the contract with an egalitarian consensus protocol. Digital social contracts may realize social networks, sharing economy applications, social governance of a digital community, and more. The ssDA is a software application that allows a person to partake in multiple digital social contracts simultaneously. Participation in a contract can be realized by initiating it or by being invited to it. Extra confidence in the integrity of the data is achieved by each person maintaining a blockchain containing all the person’s transactions in all contracts.","PeriodicalId":225883,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125179404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Demo: EdgeNet, a Production Internet-Scale Container-Based Distributed System Testbed 演示:EdgeNet,一个生产互联网规模的基于容器的分布式系统测试平台
Pub Date : 2022-07-01 DOI: 10.1109/ICDCS54860.2022.00141
Berat Can Senel, Maxime Mouchet, Justin Cappos, T. Friedman, Olivier Fourmaux, R. McGeer
The EdgeNet software is free, open-source, liberally licensed code that extends the Kubernetes container orchestration system to the edge cloud. We use this code to run the EdgeNet testbed, an internet-scale edge cloud for distributed systems researchers. This demonstration showcases three features of EdgeNet: its multitenancy model, its multi-provider aspect, and its geographically-based selective deployment capability. Multitenancy allows multiple teams to use the platform concurrently; being multi-provider, independent contributors can make nodes available to the platform; and selective deployment facilitates location-based placement of software. Under our guidance, demo participants invoke the Kubernetes command-line interface to use the testbed. In so doing, they get experience with the testbed, which they can continue to use afterwards. They also gain insight into how the demonstrated features are useful for edge cloud container deployment in general. Participants who volunteer to help EdgeNet nodes receive Odroid devices to host in their homes or workplaces.
EdgeNet软件是免费的、开源的、自由许可的代码,它将Kubernetes容器编排系统扩展到边缘云。我们使用这段代码来运行EdgeNet测试平台,这是一个面向分布式系统研究人员的互联网规模的边缘云。这个演示展示了EdgeNet的三个特性:多租户模型、多提供者方面以及基于地理位置的选择性部署功能。多租户允许多个团队同时使用该平台;作为多提供者,独立的贡献者可以使节点对平台可用;选择性部署有助于基于位置的软件放置。在我们的指导下,演示参与者调用Kubernetes命令行接口来使用测试平台。在这样做的过程中,他们获得了测试平台的经验,之后他们可以继续使用。他们还将深入了解所演示的特性对边缘云容器部署的一般用处。自愿帮助EdgeNet节点的参与者在家中或工作场所接收Odroid设备。
{"title":"Demo: EdgeNet, a Production Internet-Scale Container-Based Distributed System Testbed","authors":"Berat Can Senel, Maxime Mouchet, Justin Cappos, T. Friedman, Olivier Fourmaux, R. McGeer","doi":"10.1109/ICDCS54860.2022.00141","DOIUrl":"https://doi.org/10.1109/ICDCS54860.2022.00141","url":null,"abstract":"The EdgeNet software is free, open-source, liberally licensed code that extends the Kubernetes container orchestration system to the edge cloud. We use this code to run the EdgeNet testbed, an internet-scale edge cloud for distributed systems researchers. This demonstration showcases three features of EdgeNet: its multitenancy model, its multi-provider aspect, and its geographically-based selective deployment capability. Multitenancy allows multiple teams to use the platform concurrently; being multi-provider, independent contributors can make nodes available to the platform; and selective deployment facilitates location-based placement of software. Under our guidance, demo participants invoke the Kubernetes command-line interface to use the testbed. In so doing, they get experience with the testbed, which they can continue to use afterwards. They also gain insight into how the demonstrated features are useful for edge cloud container deployment in general. Participants who volunteer to help EdgeNet nodes receive Odroid devices to host in their homes or workplaces.","PeriodicalId":225883,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)","volume":" 15","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132125386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1