首页 > 最新文献

2008 The 28th International Conference on Distributed Computing Systems最新文献

英文 中文
A Formal Specification and Verification Framework for Designing and Verifying Reliable and Dependable Software for Computerized Numerical Control (CNC) Systems 计算机数控系统可靠可靠软件设计与验证的形式化规范与验证框架
Pub Date : 2008-06-01 DOI: 10.1109/ICDCS.2008.21
Y. Cao, Z. Shao, M. Wang, C. Xue, Youdong Chen, Hongxing Wei, Tianmiao Wang
As a distributed computing system, a CNC system needs to be operated reliably, dependably and safely. How to design reliable and dependable software and perform effective verification for CNC systems becomes an important research problem. In this paper, we propose a new modeling method called TTM/ATRTTL (Timed Transition Models/All-Time Real-Time Temporal Logics) for specifying CNCsystems. TTM/ATRTTL provides full supports for specifying hard real-time and feedback that are needed for modeling CNC systems. We also propose a verification framework with verification rules and theorems and implement it with STeP and SF2STeP. The proposed verification framework can check reliability, dependability and safety of systems specified by our TTM/ATRTTL method. We apply our modeling and verification techniques on an open architecture CNC (OAC) system and conduct comprehensive studies on modeling and verifying a logical controller that is the key part of OAC. The results show that our method can effectively model and verify CNC systems and generate CNC software that can satisfy system requirements in reliability, dependability and safety.
数控系统作为一个分布式计算系统,需要可靠、可靠、安全的运行。如何为数控系统设计可靠可靠的软件并进行有效的验证成为一个重要的研究问题。在本文中,我们提出了一种新的建模方法,称为TTM/ATRTTL(定时转换模型/全时实时时间逻辑),用于指定cnc系统。TTM/ATRTTL为CNC系统建模所需的指定硬实时和反馈提供全面支持。我们还提出了一个包含验证规则和定理的验证框架,并用STeP和SF2STeP实现了该框架。所提出的验证框架可以对我们的TTM/ATRTTL方法所指定的系统进行可靠性、可靠性和安全性检查。我们将建模和验证技术应用于开放式体系结构CNC (OAC)系统,并对OAC的关键部分逻辑控制器的建模和验证进行了全面的研究。结果表明,该方法能够有效地对数控系统进行建模和验证,生成的数控软件能够满足系统在可靠性、可靠性和安全性方面的要求。
{"title":"A Formal Specification and Verification Framework for Designing and Verifying Reliable and Dependable Software for Computerized Numerical Control (CNC) Systems","authors":"Y. Cao, Z. Shao, M. Wang, C. Xue, Youdong Chen, Hongxing Wei, Tianmiao Wang","doi":"10.1109/ICDCS.2008.21","DOIUrl":"https://doi.org/10.1109/ICDCS.2008.21","url":null,"abstract":"As a distributed computing system, a CNC system needs to be operated reliably, dependably and safely. How to design reliable and dependable software and perform effective verification for CNC systems becomes an important research problem. In this paper, we propose a new modeling method called TTM/ATRTTL (Timed Transition Models/All-Time Real-Time Temporal Logics) for specifying CNCsystems. TTM/ATRTTL provides full supports for specifying hard real-time and feedback that are needed for modeling CNC systems. We also propose a verification framework with verification rules and theorems and implement it with STeP and SF2STeP. The proposed verification framework can check reliability, dependability and safety of systems specified by our TTM/ATRTTL method. We apply our modeling and verification techniques on an open architecture CNC (OAC) system and conduct comprehensive studies on modeling and verifying a logical controller that is the key part of OAC. The results show that our method can effectively model and verify CNC systems and generate CNC software that can satisfy system requirements in reliability, dependability and safety.","PeriodicalId":240205,"journal":{"name":"2008 The 28th International Conference on Distributed Computing Systems","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130011112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LHT: A Low-Maintenance Indexing Scheme over DHTs 基于dht的低维护索引方案
Pub Date : 2008-06-01 DOI: 10.1109/ICDCS.2008.61
Y. Tang, Shuigeng Zhou
DHT is a widely-used building block in P2P systems, and complex queries are gaining popularity in P2P applications. To support efficient query processing over DHTs, effective indexing structures are essential. Recently, a number of indexing schemes have been proposed. However, these schemes have focused on improving query efficiency, and as a trade-off, sacrificed maintenance efficiency - an important performance measure in the P2P context, where frequent data updating and high peer dynamism are typically incurred. In this paper, we propose LHT, a Low maintenance Hash Tree, for efficient data indexing over DHTs. LHT employs a novel naming function and a tree summarization strategy to gracefully distribute its index structure. It is adaptable to any DHT substrates, and is easy to be implemented and deployed. Experiments show that in comparison with the state-of-the-art indexing technique, LHT saves up to 75% (at least 50%) maintenance cost, and achieves better performance for exact-match queries and range queries.
DHT是P2P系统中广泛使用的构建块,复杂查询在P2P应用中越来越流行。为了支持高效的dht查询处理,有效的索引结构是必不可少的。最近,人们提出了许多索引方案。然而,这些方案关注的是提高查询效率,作为代价,牺牲了维护效率——这是P2P环境中一个重要的性能指标,在P2P环境中,频繁的数据更新和高度的对等动态通常会产生。在本文中,我们提出了一种低维护哈希树LHT,用于在dht上进行有效的数据索引。LHT采用了一种新颖的命名函数和树状摘要策略来优雅地分布其索引结构。它适用于任何DHT基材,易于实施和部署。实验表明,与最先进的索引技术相比,LHT节省了高达75%(至少50%)的维护成本,并且在精确匹配查询和范围查询方面取得了更好的性能。
{"title":"LHT: A Low-Maintenance Indexing Scheme over DHTs","authors":"Y. Tang, Shuigeng Zhou","doi":"10.1109/ICDCS.2008.61","DOIUrl":"https://doi.org/10.1109/ICDCS.2008.61","url":null,"abstract":"DHT is a widely-used building block in P2P systems, and complex queries are gaining popularity in P2P applications. To support efficient query processing over DHTs, effective indexing structures are essential. Recently, a number of indexing schemes have been proposed. However, these schemes have focused on improving query efficiency, and as a trade-off, sacrificed maintenance efficiency - an important performance measure in the P2P context, where frequent data updating and high peer dynamism are typically incurred. In this paper, we propose LHT, a Low maintenance Hash Tree, for efficient data indexing over DHTs. LHT employs a novel naming function and a tree summarization strategy to gracefully distribute its index structure. It is adaptable to any DHT substrates, and is easy to be implemented and deployed. Experiments show that in comparison with the state-of-the-art indexing technique, LHT saves up to 75% (at least 50%) maintenance cost, and achieves better performance for exact-match queries and range queries.","PeriodicalId":240205,"journal":{"name":"2008 The 28th International Conference on Distributed Computing Systems","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130263225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Hotness-Aware Sensor Networks 热感知传感器网络
Pub Date : 2008-06-01 DOI: 10.1109/ICDCS.2008.50
Dong Li, Yanmin Zhu, Li Cui, L. Ni
In a realistic sensor network, in particular with a non-uniform deployment, sensor nodes inevitably have varying workloads. This causes a natural problem that some sensor nodes are subject to excessive power consumption and thus become hot. These hot nodes deplete much earlier resulting in system performance degradation. This paper proposes a systematic approach to design a hotness-aware sensor network where each node is able to obtain its own hotness information. Based on these vital information, the system is able to provide various technologies to protect the critical set of hot nodes. More specifically, we design a centralized optimal algorithm to derive the precise hotness of each node. In addition, we develop a completely distributed algorithm to estimate hotness with high accuracy. An effective hotness-aware MAC is developed to offer medium access priority to the nodes with higher hotness to protect and prolong their lifetimes. It is demonstrated, through both theoretical analysis and comprehensive simulations, that our approach is valuable to improving system performance of practical sensor networks.
在现实的传感器网络中,特别是在非均匀部署的情况下,传感器节点不可避免地会有不同的工作负载。这就导致了一个自然的问题,即一些传感器节点受到过多的功耗而变得热。这些热节点消耗得更早,导致系统性能下降。本文提出了一种系统的方法来设计一个热感知传感器网络,每个节点都能获得自己的热信息。基于这些关键信息,系统能够提供各种技术来保护关键的热节点集。更具体地说,我们设计了一个中心化的最优算法来获得每个节点的精确热度。此外,我们还开发了一种完全分布式的算法,以获得高精度的热度估计。提出了一种有效的热感知MAC,为高热节点提供中等访问优先级,以保护和延长热节点的生命周期。通过理论分析和综合仿真,证明了该方法对提高实际传感器网络的系统性能是有价值的。
{"title":"Hotness-Aware Sensor Networks","authors":"Dong Li, Yanmin Zhu, Li Cui, L. Ni","doi":"10.1109/ICDCS.2008.50","DOIUrl":"https://doi.org/10.1109/ICDCS.2008.50","url":null,"abstract":"In a realistic sensor network, in particular with a non-uniform deployment, sensor nodes inevitably have varying workloads. This causes a natural problem that some sensor nodes are subject to excessive power consumption and thus become hot. These hot nodes deplete much earlier resulting in system performance degradation. This paper proposes a systematic approach to design a hotness-aware sensor network where each node is able to obtain its own hotness information. Based on these vital information, the system is able to provide various technologies to protect the critical set of hot nodes. More specifically, we design a centralized optimal algorithm to derive the precise hotness of each node. In addition, we develop a completely distributed algorithm to estimate hotness with high accuracy. An effective hotness-aware MAC is developed to offer medium access priority to the nodes with higher hotness to protect and prolong their lifetimes. It is demonstrated, through both theoretical analysis and comprehensive simulations, that our approach is valuable to improving system performance of practical sensor networks.","PeriodicalId":240205,"journal":{"name":"2008 The 28th International Conference on Distributed Computing Systems","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121185923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Weak vs. Self vs. Probabilistic Stabilization 弱vs自我vs概率稳定
Pub Date : 2007-11-22 DOI: 10.1142/S0129054115500173
Stéphane Devismes, S. Tixeuil, M. Yamashita
Self-stabilization is a strong property which guarantees that a network always resume a correct behavior starting from an arbitrary initial state. Weaker guarantees have later been introduced to cope with impossibility results: probabilistic stabilization only gives probabilistic convergence to a correct behavior. Also, weak-stabilization only gives the possibility of convergence. In this paper, we investigate the relative power of weak, self, and probabilistic stabilization, with respect to the set of problems that can be solved. We formally prove that in that sense, weak stabilization is strictly stronger that self-stabilization. Also, we refine previous results on weak stabilization to prove that, for practical schedule instances, a deterministic weak-stabilizing protocol can be turned into a probabilistic self-stabilizing one. This latter result hints at more practical use of weak-stabilization, as such algorithms are easier to design and prove than their (probabilistic) self-stabilizing counterparts.
自稳定是一种强大的特性,它保证网络从任意初始状态开始总是恢复到正确的行为。后来引入了较弱的保证来处理不可能的结果:概率稳定只提供正确行为的概率收敛。而且,弱稳定只给出收敛的可能性。在本文中,我们研究了弱镇定、自镇定和概率镇定对于可解问题集的相对威力。在这种意义上,我们正式证明了弱稳定严格强于自稳定。同时,我们改进了先前关于弱稳定的结果,证明了对于实际调度实例,确定性弱稳定协议可以转化为概率自稳定协议。后一种结果暗示了弱稳定的更实际应用,因为这种算法比它们的(概率)自稳定对应物更容易设计和证明。
{"title":"Weak vs. Self vs. Probabilistic Stabilization","authors":"Stéphane Devismes, S. Tixeuil, M. Yamashita","doi":"10.1142/S0129054115500173","DOIUrl":"https://doi.org/10.1142/S0129054115500173","url":null,"abstract":"Self-stabilization is a strong property which guarantees that a network always resume a correct behavior starting from an arbitrary initial state. Weaker guarantees have later been introduced to cope with impossibility results: probabilistic stabilization only gives probabilistic convergence to a correct behavior. Also, weak-stabilization only gives the possibility of convergence. In this paper, we investigate the relative power of weak, self, and probabilistic stabilization, with respect to the set of problems that can be solved. We formally prove that in that sense, weak stabilization is strictly stronger that self-stabilization. Also, we refine previous results on weak stabilization to prove that, for practical schedule instances, a deterministic weak-stabilizing protocol can be turned into a probabilistic self-stabilizing one. This latter result hints at more practical use of weak-stabilization, as such algorithms are easier to design and prove than their (probabilistic) self-stabilizing counterparts.","PeriodicalId":240205,"journal":{"name":"2008 The 28th International Conference on Distributed Computing Systems","volume":"281 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131485819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 48
Towards Multi-Site Collaboration in 3D Tele-Immersive Environments 面向3D远程沉浸式环境中的多站点协作
Pub Date : 2007-09-29 DOI: 10.1145/1291233.1291406
Wanmin Wu, Zhenyu Yang, K. Nahrstedt, G. Kurillo, R. Bajcsy
3D tele-immersion (3DTI) has recently emerged as a new way of video-mediated collaboration across the Internet. Unlike conventional 2D video-conferencing systems, it can immerse remote users into a shared 3D virtual space so that they can interact or collaborate "virtually". However, most existing 3DTI systems can support only two sites of collaboration, due to the huge demand of networking resources and the lack of a simple yet efficient data dissemination model. In this paper, we propose to use a general publish-subscribe model for multi-site 3DTI systems, which efficiently utilizes limited network resources by leveraging user interest. We focus on the overlay construction problem in the publish-subscribe model by exploring a spectrum of heuristic algorithms for data dissemination. With extensive simulation, we identify the advantages of a simple randomized algorithm. We present optimization to further improve the randomized algorithm by exploiting semantic correlation. Experimental results demonstrate that we can achieve an improvement by a factor of five.
最近,3D远程沉浸(3DTI)作为一种新的互联网视频媒介协作方式出现了。与传统的2D视频会议系统不同,它可以让远程用户沉浸在共享的3D虚拟空间中,这样他们就可以“虚拟”地互动或协作。然而,由于对网络资源的巨大需求和缺乏一种简单而高效的数据传播模型,大多数现有的3DTI系统只能支持两个站点的协作。在本文中,我们建议在多站点3DTI系统中使用通用发布-订阅模型,该模型通过利用用户兴趣有效地利用有限的网络资源。通过探索数据传播的启发式算法,我们重点研究了发布-订阅模型中的覆盖构造问题。通过大量的仿真,我们确定了一种简单的随机化算法的优点。我们提出了利用语义关联进一步改进随机化算法的优化方法。实验结果表明,我们可以实现五倍的改进。
{"title":"Towards Multi-Site Collaboration in 3D Tele-Immersive Environments","authors":"Wanmin Wu, Zhenyu Yang, K. Nahrstedt, G. Kurillo, R. Bajcsy","doi":"10.1145/1291233.1291406","DOIUrl":"https://doi.org/10.1145/1291233.1291406","url":null,"abstract":"3D tele-immersion (3DTI) has recently emerged as a new way of video-mediated collaboration across the Internet. Unlike conventional 2D video-conferencing systems, it can immerse remote users into a shared 3D virtual space so that they can interact or collaborate \"virtually\". However, most existing 3DTI systems can support only two sites of collaboration, due to the huge demand of networking resources and the lack of a simple yet efficient data dissemination model. In this paper, we propose to use a general publish-subscribe model for multi-site 3DTI systems, which efficiently utilizes limited network resources by leveraging user interest. We focus on the overlay construction problem in the publish-subscribe model by exploring a spectrum of heuristic algorithms for data dissemination. With extensive simulation, we identify the advantages of a simple randomized algorithm. We present optimization to further improve the randomized algorithm by exploiting semantic correlation. Experimental results demonstrate that we can achieve an improvement by a factor of five.","PeriodicalId":240205,"journal":{"name":"2008 The 28th International Conference on Distributed Computing Systems","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123711735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
stdchk: A Checkpoint Storage System for Desktop Grid Computing stdchk:桌面网格计算的检查点存储系统
Pub Date : 2007-06-24 DOI: 10.1109/ICDCS.2008.19
S. Al-Kiswany, M. Ripeanu, Sudharshan S. Vazhkudai, Abdullah Gharaibeh
Checkpointing is an indispensable technique to provide fault tolerance for long-running high-throughput applications like those running on desktop grids. This article argues that a checkpoint storage system, optimized to operate in these environments, can offer multiple benefits: reduce the load on a traditional file system, offer high-performance through specialization, and, finally, optimize data management by taking into account checkpoint application semantics. Such a storage system can present a unifying abstraction to checkpoint operations, while hiding the fact that there are no dedicated resources to store the checkpoint data. We prototype stdchk, a checkpoint storage system that uses scavenged disk space from participating desktops to build a low-cost storage system, offering a traditional file system interface for easy integration with applications. This article presents the stdchk architecture, key performance optimizations, and its support for incremental checkpointing and increased data availability. Our evaluation confirms that the stdchk approach is viable in a desktop grid setting and offers a low cost storage system with desirable performance characteristics: high write throughput as well as reduced storage space and network effort to save checkpoint images.
检查点是为长时间运行的高吞吐量应用程序(如在桌面网格上运行的应用程序)提供容错的一项不可或缺的技术。本文认为,针对这些环境进行了优化的检查点存储系统可以提供多种好处:减少传统文件系统的负载,通过专门化提供高性能,最后,通过考虑检查点应用程序语义来优化数据管理。这样的存储系统可以为检查点操作提供统一的抽象,同时隐藏了没有专用资源来存储检查点数据的事实。我们对stdchk进行了原型设计,这是一个检查点存储系统,它使用从参与的桌面收集的磁盘空间来构建一个低成本的存储系统,提供一个传统的文件系统接口,以便与应用程序轻松集成。本文介绍了stdchk架构、关键性能优化,以及它对增量检查点和增强数据可用性的支持。我们的评估证实,stdchk方法在桌面网格设置中是可行的,并且提供了具有理想性能特征的低成本存储系统:高写吞吐量以及减少存储空间和网络保存检查点映像的工作量。
{"title":"stdchk: A Checkpoint Storage System for Desktop Grid Computing","authors":"S. Al-Kiswany, M. Ripeanu, Sudharshan S. Vazhkudai, Abdullah Gharaibeh","doi":"10.1109/ICDCS.2008.19","DOIUrl":"https://doi.org/10.1109/ICDCS.2008.19","url":null,"abstract":"Checkpointing is an indispensable technique to provide fault tolerance for long-running high-throughput applications like those running on desktop grids. This article argues that a checkpoint storage system, optimized to operate in these environments, can offer multiple benefits: reduce the load on a traditional file system, offer high-performance through specialization, and, finally, optimize data management by taking into account checkpoint application semantics. Such a storage system can present a unifying abstraction to checkpoint operations, while hiding the fact that there are no dedicated resources to store the checkpoint data. We prototype stdchk, a checkpoint storage system that uses scavenged disk space from participating desktops to build a low-cost storage system, offering a traditional file system interface for easy integration with applications. This article presents the stdchk architecture, key performance optimizations, and its support for incremental checkpointing and increased data availability. Our evaluation confirms that the stdchk approach is viable in a desktop grid setting and offers a low cost storage system with desirable performance characteristics: high write throughput as well as reduced storage space and network effort to save checkpoint images.","PeriodicalId":240205,"journal":{"name":"2008 The 28th International Conference on Distributed Computing Systems","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124903504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 76
期刊
2008 The 28th International Conference on Distributed Computing Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1