首页 > 最新文献

AFIPS '72 (Fall, part I)最新文献

英文 中文
The in-house computer department 内部计算机部门
Pub Date : 1972-12-05 DOI: 10.1145/1479992.1480005
John J. Pendray
Over fifteen years ago, in some inner recess of some large corporation, a perplexed company official stood pondering before a large corporate organizational chart on his office wall. In his hand he held a small square of paper on which the words "Computer Department" were inscribed. Behold one of the modern frontiersmen of twentieth century business: the first man to try to stick the in-house computer department on the company organizational chart. He probably failed to find a place with which he felt comfortable, thereby becoming the first of many who have failed to resolve this problem.
15年前,在一家大公司的内部休息处,一位困惑的公司官员站在办公室墙上的一幅大型公司组织结构图前沉思。他手里拿着一张小方纸,上面刻着“计算机系”几个字。看看20世纪商业的现代拓荒者之一:第一个试图将内部计算机部门纳入公司组织结构图的人。他可能没能找到一个让他感到舒适的地方,因此成为许多没能解决这个问题的人中的第一个。
{"title":"The in-house computer department","authors":"John J. Pendray","doi":"10.1145/1479992.1480005","DOIUrl":"https://doi.org/10.1145/1479992.1480005","url":null,"abstract":"Over fifteen years ago, in some inner recess of some large corporation, a perplexed company official stood pondering before a large corporate organizational chart on his office wall. In his hand he held a small square of paper on which the words \"Computer Department\" were inscribed. Behold one of the modern frontiersmen of twentieth century business: the first man to try to stick the in-house computer department on the company organizational chart. He probably failed to find a place with which he felt comfortable, thereby becoming the first of many who have failed to resolve this problem.","PeriodicalId":262093,"journal":{"name":"AFIPS '72 (Fall, part I)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1972-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129451455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A production implementation of an associative array processor: STARAN 关联数组处理器的生产实现:STARAN
Pub Date : 1972-12-05 DOI: 10.1145/1479992.1480023
J. Rudolph
The associative or content-addressed memory has been an attractive concept to computer designers ever since Slade and McMahon's 1957 paper described a "catalog" memory. Associative memories offered relief from the continuing problem presented by the typical coordinate-addressed memory which requires that an "address" be obtained or calculated before data stored at that address may be retrieved. The associative memory could acquire in a single memory access any data from memory without pre-knowledge of its location. Ordered files and sorting operations could be eliminated. Unfortunately, early associative memories were expensive, hence none found their way as the "main frame" memory into any commercial computer design.
自从Slade和McMahon在1957年的论文中描述了“目录”记忆以来,联想或内容寻址记忆对计算机设计师来说一直是一个有吸引力的概念。典型的坐标寻址存储器要求在检索存储在该地址的数据之前先获得或计算一个“地址”,而联想存储器则解决了这一持续存在的问题。联想记忆可以在不预先知道其位置的情况下,从单个记忆中获取任何数据。可以消除有序文件和排序操作。不幸的是,早期的联想存储器价格昂贵,因此没有一种作为“主框架”存储器进入任何商用计算机设计。
{"title":"A production implementation of an associative array processor: STARAN","authors":"J. Rudolph","doi":"10.1145/1479992.1480023","DOIUrl":"https://doi.org/10.1145/1479992.1480023","url":null,"abstract":"The associative or content-addressed memory has been an attractive concept to computer designers ever since Slade and McMahon's 1957 paper described a \"catalog\" memory. Associative memories offered relief from the continuing problem presented by the typical coordinate-addressed memory which requires that an \"address\" be obtained or calculated before data stored at that address may be retrieved. The associative memory could acquire in a single memory access any data from memory without pre-knowledge of its location. Ordered files and sorting operations could be eliminated. Unfortunately, early associative memories were expensive, hence none found their way as the \"main frame\" memory into any commercial computer design.","PeriodicalId":262093,"journal":{"name":"AFIPS '72 (Fall, part I)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1972-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130540711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 105
A methodology for computer model building 计算机模型建立的方法
Pub Date : 1972-12-05 DOI: 10.1145/1479992.1480032
A. DeCegama
System performance evaluation techniques are of vital importance in the system design process. As depicted schematically in Figure 1, the selection of the design variables is generally accomplished by an iterative process in which the evaluation of the system cost and performance plays a crucial part.
系统性能评估技术在系统设计过程中至关重要。如图1所示,设计变量的选择通常是通过一个迭代过程来完成的,在这个过程中,对系统成本和性能的评估起着至关重要的作用。
{"title":"A methodology for computer model building","authors":"A. DeCegama","doi":"10.1145/1479992.1480032","DOIUrl":"https://doi.org/10.1145/1479992.1480032","url":null,"abstract":"System performance evaluation techniques are of vital importance in the system design process. As depicted schematically in Figure 1, the selection of the design variables is generally accomplished by an iterative process in which the evaluation of the system cost and performance plays a crucial part.","PeriodicalId":262093,"journal":{"name":"AFIPS '72 (Fall, part I)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1972-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129099238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Privacy and security in databank systems: measures of effectiveness, costs, and protector-intruder interactions 数据库系统中的隐私和安全:有效性、成本和保护者-入侵者交互的度量
Pub Date : 1972-12-05 DOI: 10.1145/1479992.1480052
R. Turn, N. Shapiro
The nearly seven years of concern with data privacy and security in computerized information systems have produced a variety of hardware and software techniques for protecting sensitive information against unauthorized access or modification. However, systematic procedures for cost-effective implementation of these safeguards are still lacking.
计算机信息系统对数据隐私和安全的关注已经持续了近七年,已经产生了各种各样的硬件和软件技术来保护敏感信息免遭未经授权的访问或修改。但是,仍然缺乏具有成本效益地执行这些保障措施的系统程序。
{"title":"Privacy and security in databank systems: measures of effectiveness, costs, and protector-intruder interactions","authors":"R. Turn, N. Shapiro","doi":"10.1145/1479992.1480052","DOIUrl":"https://doi.org/10.1145/1479992.1480052","url":null,"abstract":"The nearly seven years of concern with data privacy and security in computerized information systems have produced a variety of hardware and software techniques for protecting sensitive information against unauthorized access or modification. However, systematic procedures for cost-effective implementation of these safeguards are still lacking.","PeriodicalId":262093,"journal":{"name":"AFIPS '72 (Fall, part I)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1972-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134289254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Snapshot 1971: how Canada organizes information about people 快照1971:加拿大如何组织人们的信息
Pub Date : 1972-12-05 DOI: 10.1145/1479992.1480053
John Millar Carroll
In 1971 the Government of Canada initiated a study to determine whether the computerization of personally identifiable records concerning or describing Canadian residents would diminish their quality of life or adversely affect their life chances, and to propose remedial action in the event this premise proved to be true.
1971年,加拿大政府发起了一项研究,以确定将有关或描述加拿大居民的可识别个人身份的记录电脑化是否会降低他们的生活质量或对他们的生活机会产生不利影响,并在证明这一前提属实的情况下提出补救行动。
{"title":"Snapshot 1971: how Canada organizes information about people","authors":"John Millar Carroll","doi":"10.1145/1479992.1480053","DOIUrl":"https://doi.org/10.1145/1479992.1480053","url":null,"abstract":"In 1971 the Government of Canada initiated a study to determine whether the computerization of personally identifiable records concerning or describing Canadian residents would diminish their quality of life or adversely affect their life chances, and to propose remedial action in the event this premise proved to be true.","PeriodicalId":262093,"journal":{"name":"AFIPS '72 (Fall, part I)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1972-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134501444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Procedures for increasing fault coverage for digital networks 增加数字网络故障覆盖率的程序
Pub Date : 1972-12-05 DOI: 10.1145/1479992.1480043
L. R. Hoover, J. H. Tracey
The following definition for a fault detection test (fdt) will be used throughout this paper: an input sequence x (of length one or more) for a given network m is a fault detection test for fault fi, located in m, if the output response to x for m with no faults present and the output response to x for m with fi present, differ.
故障检测测试(fdt)的以下定义将贯穿本文:给定网络m的输入序列x(长度为1或多个)是故障fi的故障检测测试,位于m中,如果无故障时m对x的输出响应与存在fi时m对x的输出响应不同。
{"title":"Procedures for increasing fault coverage for digital networks","authors":"L. R. Hoover, J. H. Tracey","doi":"10.1145/1479992.1480043","DOIUrl":"https://doi.org/10.1145/1479992.1480043","url":null,"abstract":"The following definition for a fault detection test (<i>fdt</i>) will be used throughout this paper: an input sequence <i>x</i> (of length one or more) for a given network <i>m</i> is a fault detection test for fault <i>f</i><sup><i>i</i></sup>, located in <i>m</i>, if the output response to <i>x</i> for <i>m</i> with no faults present and the output response to <i>x</i> for <i>m</i> with <i>f</i><sup><i>i</i></sup> present, differ.","PeriodicalId":262093,"journal":{"name":"AFIPS '72 (Fall, part I)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1972-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124397233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Microtext: the design of a microprogrammed finite state search machine for full-text retrieval 微文本:用于全文检索的微程序有限状态搜索机的设计
Pub Date : 1972-12-05 DOI: 10.1145/1479992.1480059
R. Bullen, J. Millen
The Microtext system represents a new approach to the design and implementation of a full-text retrieval system. The approach is unusual in that it integrates hardware, firmware, and software components in an attempt to provide a solution to the problems involved in processing large files of unformatted textual data. The system is based on a minicomputer specialized for high-speed full-text retrieval, through the use of a finite state search algorithm implemented in firmware.
微文本系统代表了一种设计和实现全文检索系统的新方法。这种方法的不同之处在于,它集成了硬件、固件和软件组件,试图为处理大型未格式化文本数据文件所涉及的问题提供解决方案。该系统基于专用于高速全文检索的小型计算机,通过使用在固件中实现的有限状态搜索算法。
{"title":"Microtext: the design of a microprogrammed finite state search machine for full-text retrieval","authors":"R. Bullen, J. Millen","doi":"10.1145/1479992.1480059","DOIUrl":"https://doi.org/10.1145/1479992.1480059","url":null,"abstract":"The Microtext system represents a new approach to the design and implementation of a full-text retrieval system. The approach is unusual in that it integrates hardware, firmware, and software components in an attempt to provide a solution to the problems involved in processing large files of unformatted textual data. The system is based on a minicomputer specialized for high-speed full-text retrieval, through the use of a finite state search algorithm implemented in firmware.","PeriodicalId":262093,"journal":{"name":"AFIPS '72 (Fall, part I)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1972-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127066181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Dynamic confirmation of system integrity 系统完整性的动态确认
Pub Date : 1972-12-05 DOI: 10.1145/1479992.1480003
B. Borgerson
It is always desirable to know the current state of any system. However, with most computing systems, a large class of failures can remain undetected by the system long enough to cause an integrity violation. What is needed is a technique, or set of techniques, for detecting when a system is not functioning correctly. That is, we need some way of observing the integrity of a system.
了解任何系统的当前状态总是可取的。然而,对于大多数计算系统,大量的故障可能长时间未被系统检测到,从而导致完整性破坏。所需要的是一种技术,或一组技术,用于检测系统何时不能正常运行。也就是说,我们需要某种方法来观察系统的完整性。
{"title":"Dynamic confirmation of system integrity","authors":"B. Borgerson","doi":"10.1145/1479992.1480003","DOIUrl":"https://doi.org/10.1145/1479992.1480003","url":null,"abstract":"It is always desirable to know the current state of any system. However, with most computing systems, a large class of failures can remain undetected by the system long enough to cause an integrity violation. What is needed is a technique, or set of techniques, for detecting when a system is not functioning correctly. That is, we need some way of observing the integrity of a system.","PeriodicalId":262093,"journal":{"name":"AFIPS '72 (Fall, part I)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1972-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117092557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
An adaptive error correction scheme for computer memory system 计算机存储系统的自适应纠错方案
Pub Date : 1972-12-05 DOI: 10.1145/1479992.1480002
Arvind M. Patel, M. Hsiao
Many of the modern computer memories contain single-error correction capability in order to enhance reliability. In a large scale memory, an even more powerful error correction code may be desirable. In particular, a double-error correction capability can reduce the maintenance cost significantly, while keeping the unscheduled system interruptions within tolerable limits. Since most faults are effectively masked and logged out, the permanent failures can be replaced at the time of scheduled maintenance, thus leaving the user unaffected. The cost and complexity of the known double error correcting code, however, seems to outweigh the advantages. The long decoding time and large amount of redundancy in double error correction cannot be justified in every fetch instruction for the sake of correcting an occasional double error.
为了提高可靠性,许多现代计算机存储器都具有单错误校正能力。在大规模存储器中,可能需要更强大的纠错码。特别是,双错误纠正能力可以显著降低维护成本,同时将计划外的系统中断保持在可容忍的范围内。由于大多数故障都被有效地屏蔽并注销,因此可以在定期维护时替换永久性故障,从而不影响用户。然而,已知的双重纠错码的成本和复杂性似乎超过了它的优点。双纠错的译码时间长,冗余量大,不能为了纠正偶然的双纠错而在每条取指令中进行。
{"title":"An adaptive error correction scheme for computer memory system","authors":"Arvind M. Patel, M. Hsiao","doi":"10.1145/1479992.1480002","DOIUrl":"https://doi.org/10.1145/1479992.1480002","url":null,"abstract":"Many of the modern computer memories contain single-error correction capability in order to enhance reliability. In a large scale memory, an even more powerful error correction code may be desirable. In particular, a double-error correction capability can reduce the maintenance cost significantly, while keeping the unscheduled system interruptions within tolerable limits. Since most faults are effectively masked and logged out, the permanent failures can be replaced at the time of scheduled maintenance, thus leaving the user unaffected. The cost and complexity of the known double error correcting code, however, seems to outweigh the advantages. The long decoding time and large amount of redundancy in double error correction cannot be justified in every fetch instruction for the sake of correcting an occasional double error.","PeriodicalId":262093,"journal":{"name":"AFIPS '72 (Fall, part I)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1972-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115774944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A design methodology for reliable software systems 可靠软件系统的设计方法
Pub Date : 1972-12-05 DOI: 10.1145/1479992.1480018
B. Liskov
Any user of a computer system is aware that current systems are unreliable because of errors in their software components. While system designers and implementers recognize the need for reliable software, they have been unable to produce it. For example, operating systems such as OS/360 are released to the public with hundreds of errors still in them.
计算机系统的任何用户都知道,由于软件组件中的错误,当前的系统是不可靠的。虽然系统设计者和实现者认识到需要可靠的软件,但他们无法生产出可靠的软件。例如,OS/360等操作系统向公众发布时仍然存在数百个错误。
{"title":"A design methodology for reliable software systems","authors":"B. Liskov","doi":"10.1145/1479992.1480018","DOIUrl":"https://doi.org/10.1145/1479992.1480018","url":null,"abstract":"Any user of a computer system is aware that current systems are unreliable because of errors in their software components. While system designers and implementers recognize the need for reliable software, they have been unable to produce it. For example, operating systems such as OS/360 are released to the public with hundreds of errors still in them.","PeriodicalId":262093,"journal":{"name":"AFIPS '72 (Fall, part I)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1972-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121170507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 109
期刊
AFIPS '72 (Fall, part I)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1