首页 > 最新文献

6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010)最新文献

英文 中文
An utility-driven routing scheme for scaling multicast applications 用于扩展多播应用的实用驱动路由方案
Yuehua Wang, Ling Liu, C. Pu, Gong Zhang
Multicast is a common platform for supporting group communication applications, such as IPTV, multimedia content delivery, and location-based advertisements. Distributed hash table (DHT) based overlay networks such as Chord and CAN presents a popular distributed computing architecture for multicast applications. However, existing research efforts have been mostly dedicated to efficient message delivery techniques to alleviate the influence of network dynamics on geo-distance based routing, such as reducing the delivery path length or optimizing routing path by utilizing network locality. In this paper, we argue that the geo-distance based routing protocols used in existing overlay networks are inefficient in terms of both resource use and environmental accommodation for multicast applications. We devise a utility driven routing scheme to improve the routing efficiency with three unique features. First, our utility function is defined based on a careful combination of hop counts and routing path latency. Second, we use CAN-like routing as an example and extend it by utilizing shortcuts to reduce the routing path length and by introducing a utility function to combine path latency with geo-distance based metric in determining the near-optimal route for each routing request. Third and most importantly, our utility function is designed by using a tunable influence parameter to allow nodes to adaptively make the most promising routing decision according to their specific network state and circumstances, such as overlay connectivity and next hop latency. Our experimental evaluation shows that the utility-driven routing scheme is highly scalable and efficient compared to existing geo-distance based routing protocols and demonstrates that by combining shortcuts, path latency with geo-distance can effectively enhance the multicast delivery efficiency for large scale group communication applications.
多播是支持群组通信应用(如IPTV、多媒体内容传送和基于位置的广告)的通用平台。基于分布式哈希表(DHT)的覆盖网络如Chord和CAN为多播应用提供了一种流行的分布式计算架构。然而,现有的研究工作大多致力于有效的消息传递技术,以减轻网络动态对基于地理距离的路由的影响,如减少传递路径长度或利用网络局部性优化路由路径。在本文中,我们认为现有覆盖网络中使用的基于地理距离的路由协议在多播应用的资源使用和环境适应方面效率低下。我们设计了一个实用驱动的路由方案,以提高路由效率,具有三个独特的特点。首先,我们的效用函数是基于跳数和路由路径延迟的谨慎组合来定义的。其次,我们使用类似can的路由作为一个例子,并通过利用捷径来减少路由路径长度,并通过引入实用函数来将路径延迟与基于地理距离的度量相结合,以确定每个路由请求的近最佳路由,从而扩展它。第三,也是最重要的,我们的效用函数是通过使用可调的影响参数来设计的,允许节点根据其特定的网络状态和情况(如覆盖连接和下一跳延迟)自适应地做出最有希望的路由决策。实验结果表明,与现有的基于地理距离的路由协议相比,实用驱动的路由方案具有很高的可扩展性和效率,并且通过将捷径、路径延迟与地理距离相结合,可以有效地提高大规模组播通信应用的组播传输效率。
{"title":"An utility-driven routing scheme for scaling multicast applications","authors":"Yuehua Wang, Ling Liu, C. Pu, Gong Zhang","doi":"10.4108/ICST.COLLABORATECOM.2010.20","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2010.20","url":null,"abstract":"Multicast is a common platform for supporting group communication applications, such as IPTV, multimedia content delivery, and location-based advertisements. Distributed hash table (DHT) based overlay networks such as Chord and CAN presents a popular distributed computing architecture for multicast applications. However, existing research efforts have been mostly dedicated to efficient message delivery techniques to alleviate the influence of network dynamics on geo-distance based routing, such as reducing the delivery path length or optimizing routing path by utilizing network locality. In this paper, we argue that the geo-distance based routing protocols used in existing overlay networks are inefficient in terms of both resource use and environmental accommodation for multicast applications. We devise a utility driven routing scheme to improve the routing efficiency with three unique features. First, our utility function is defined based on a careful combination of hop counts and routing path latency. Second, we use CAN-like routing as an example and extend it by utilizing shortcuts to reduce the routing path length and by introducing a utility function to combine path latency with geo-distance based metric in determining the near-optimal route for each routing request. Third and most importantly, our utility function is designed by using a tunable influence parameter to allow nodes to adaptively make the most promising routing decision according to their specific network state and circumstances, such as overlay connectivity and next hop latency. Our experimental evaluation shows that the utility-driven routing scheme is highly scalable and efficient compared to existing geo-distance based routing protocols and demonstrates that by combining shortcuts, path latency with geo-distance can effectively enhance the multicast delivery efficiency for large scale group communication applications.","PeriodicalId":354101,"journal":{"name":"6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133339672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Building parallel regeneration trees in distributed storage systems with asymmetric links 非对称链路分布式存储系统中并行再生树的构建
Jun Li, Shuang Yang, Xin Wang
Distributed storage systems provide reliable storage service by storing data, with a certain amount of redundancy, into a substantial number of storage nodes. In order to compensate the data loss incurred by node failures, the lost data should be regenerated. Tree-structured regeneration, during which storage nodes may relay the network traffic, has shown its potential to improve the efficiency of the regeneration process in the network with symmetric links. In this paper, we consider tree-structured regeneration in the network with asymmetric links, and analyze its expected time spend during the regeneration. Moreover, we further reduce the regeneration time by constructing multiple parallel regeneration trees. We proposed two optimal algorithms with polynomial time complexity, to construct multiple edge-disjoint and multiple edge-sharing parallel regeneration trees, respectively. We evaluate our algorithms by the simulation using real data measured in PlanetLab. The simulation results show that multiple parallel regeneration trees can reduce the regeneration time by 75% and keep the file availability more than 98%.
分布式存储系统将具有一定冗余的数据存储在数量可观的存储节点中,为用户提供可靠的存储服务。为了补偿节点故障造成的数据丢失,需要重新生成丢失的数据。在具有对称链路的网络中,树状结构再生可以提高再生过程的效率。在树状结构再生过程中,存储节点可以转发网络流量。本文考虑具有非对称链路的网络中的树结构再生,并分析了再生过程中的预期时间。此外,我们通过构建多个并行再生树来进一步缩短再生时间。提出了两种时间复杂度为多项式的最优算法,分别构建了多条边不相交和多条边共享的并行再生树。我们通过使用PlanetLab测量的真实数据进行模拟来评估我们的算法。仿真结果表明,多个并行再生树可使再生时间减少75%,使文件可用性保持在98%以上。
{"title":"Building parallel regeneration trees in distributed storage systems with asymmetric links","authors":"Jun Li, Shuang Yang, Xin Wang","doi":"10.4108/ICST.COLLABORATECOM.2010.30","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2010.30","url":null,"abstract":"Distributed storage systems provide reliable storage service by storing data, with a certain amount of redundancy, into a substantial number of storage nodes. In order to compensate the data loss incurred by node failures, the lost data should be regenerated. Tree-structured regeneration, during which storage nodes may relay the network traffic, has shown its potential to improve the efficiency of the regeneration process in the network with symmetric links. In this paper, we consider tree-structured regeneration in the network with asymmetric links, and analyze its expected time spend during the regeneration. Moreover, we further reduce the regeneration time by constructing multiple parallel regeneration trees. We proposed two optimal algorithms with polynomial time complexity, to construct multiple edge-disjoint and multiple edge-sharing parallel regeneration trees, respectively. We evaluate our algorithms by the simulation using real data measured in PlanetLab. The simulation results show that multiple parallel regeneration trees can reduce the regeneration time by 75% and keep the file availability more than 98%.","PeriodicalId":354101,"journal":{"name":"6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132277848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Mining DNS for malicious domain registrations 挖掘DNS恶意域名注册
Yuanchen He, Zhenyu Zhong, S. Krasser, Yuchun Tang
Millions of new domains are registered every day and the many of them are malicious. It is challenging to keep track of malicious domains by only Web content analysis due to the large number of domains. One interesting pattern in legitimate domain names is that many of them consist of English words or look like meaningful English while many malicious domain names are randomly generated and do not include meaningful words. We show that it is possible to transform this intuitive observation into statistically informative features using second order Markov models. Four transition matrices are built from known legitimate domain names, known malicious domain names, English words in a dictionary, and based on a uniform distribution. The probabilities from these Markov models, as well as other features extracted from DNS data, are used to build a Random Forest classifier. The experimental results demonstrate that our system can quickly catch malicious domains with a low false positive rate.
每天都有数百万个新域名注册,其中许多都是恶意域名。由于恶意域的数量众多,仅通过Web内容分析来跟踪恶意域具有一定的挑战性。合法域名中一个有趣的模式是,许多域名由英语单词组成,或者看起来像有意义的英语,而许多恶意域名是随机生成的,不包括有意义的单词。我们表明,可以使用二阶马尔可夫模型将这种直观的观察转化为统计信息特征。四个转换矩阵是根据已知的合法域名、已知的恶意域名、字典中的英语单词以及基于均匀分布构建的。这些马尔可夫模型的概率,以及从DNS数据中提取的其他特征,用于构建随机森林分类器。实验结果表明,该系统可以快速捕获恶意域,误报率低。
{"title":"Mining DNS for malicious domain registrations","authors":"Yuanchen He, Zhenyu Zhong, S. Krasser, Yuchun Tang","doi":"10.4108/ICST.COLLABORATECOM.2010.5","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2010.5","url":null,"abstract":"Millions of new domains are registered every day and the many of them are malicious. It is challenging to keep track of malicious domains by only Web content analysis due to the large number of domains. One interesting pattern in legitimate domain names is that many of them consist of English words or look like meaningful English while many malicious domain names are randomly generated and do not include meaningful words. We show that it is possible to transform this intuitive observation into statistically informative features using second order Markov models. Four transition matrices are built from known legitimate domain names, known malicious domain names, English words in a dictionary, and based on a uniform distribution. The probabilities from these Markov models, as well as other features extracted from DNS data, are used to build a Random Forest classifier. The experimental results demonstrate that our system can quickly catch malicious domains with a low false positive rate.","PeriodicalId":354101,"journal":{"name":"6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132757251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
A selective encryption approach to fine-grained access control for P2P file sharing 一种用于P2P文件共享的细粒度访问控制的选择性加密方法
Aditi Gupta, Salmin Sultana, Michael S. Kirkpatrick, E. Bertino
As the use of peer-to-peer (P2P) services for distributed file sharing has grown, the need for fine-grained access control (FGAC) has emerged. Existing access control frameworks use an all-or-nothing approach that is inadequate for sensitive content that may be shared by multiple users. In this paper, we propose a FGAC mechanism based on selective encryption techniques. Using this approach, the owner of a file specifies access control policies over various byte ranges in the file. The separate byte ranges are then encrypted and signed with different keys. Users of the file only receive the encryption keys for the ranges they are authorized to read and signing keys for the ranges they are authorized to write. We also propose an optional enhancement of the scheme where a file owner can hide location of the file. Our approach includes a key distribution scheme based on a public key infrastructure (PKI) and access control vectors. We also discuss how policy changes and file modifications are handled in our scheme. We have integrated our FGAC mechanism with the Chord structured P2P network. In this paper, we discuss relevant issues concerning the implementation and integration with Chord and present the performance results for our prototype implementation.
随着点对点(P2P)服务用于分布式文件共享的增长,对细粒度访问控制(FGAC)的需求已经出现。现有的访问控制框架使用全有或全无的方法,对于可能由多个用户共享的敏感内容是不够的。在本文中,我们提出了一种基于选择性加密技术的FGAC机制。使用这种方法,文件的所有者可以在文件的不同字节范围内指定访问控制策略。然后用不同的密钥对单独的字节范围进行加密和签名。该文件的用户仅接收其有权读取的范围的加密密钥,并对其有权写入的范围的密钥进行签名。我们还提出了一个可选的增强方案,其中文件所有者可以隐藏文件的位置。我们的方法包括一个基于公钥基础设施(PKI)和访问控制向量的密钥分发方案。我们还讨论了在我们的方案中如何处理策略更改和文件修改。我们将FGAC机制与Chord结构化的P2P网络集成在一起。在本文中,我们讨论了与Chord实现和集成的相关问题,并给出了我们的原型实现的性能结果。
{"title":"A selective encryption approach to fine-grained access control for P2P file sharing","authors":"Aditi Gupta, Salmin Sultana, Michael S. Kirkpatrick, E. Bertino","doi":"10.4108/ICST.COLLABORATECOM.2010.4","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2010.4","url":null,"abstract":"As the use of peer-to-peer (P2P) services for distributed file sharing has grown, the need for fine-grained access control (FGAC) has emerged. Existing access control frameworks use an all-or-nothing approach that is inadequate for sensitive content that may be shared by multiple users. In this paper, we propose a FGAC mechanism based on selective encryption techniques. Using this approach, the owner of a file specifies access control policies over various byte ranges in the file. The separate byte ranges are then encrypted and signed with different keys. Users of the file only receive the encryption keys for the ranges they are authorized to read and signing keys for the ranges they are authorized to write. We also propose an optional enhancement of the scheme where a file owner can hide location of the file. Our approach includes a key distribution scheme based on a public key infrastructure (PKI) and access control vectors. We also discuss how policy changes and file modifications are handled in our scheme. We have integrated our FGAC mechanism with the Chord structured P2P network. In this paper, we discuss relevant issues concerning the implementation and integration with Chord and present the performance results for our prototype implementation.","PeriodicalId":354101,"journal":{"name":"6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123930362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Fixed-precision approximate continuous aggregate queries in peer-to-peer databases 点对点数据库中固定精度近似连续聚合查询
F. Kashani, C. Shahabi
In this paper, we propose an efficient sample-based approach to answer fixed-precision approximate continuous aggregate queries in peer-to-peer databases. First, we define practical semantics to formulate fixed-precision approximate continuous aggregate queries. Second, we propose “Digest”, a two-tier system for correct and efficient query answering by sampling. At the top tier, we develop a query evaluation engine that uses the samples collected from the peer-to-peer database to continually estimate the running result of the approximate continuous aggregate query with guaranteed precision. For efficient query evaluation, we propose an extrapolation algorithm that predicts the evolution of the running result and adapts the frequency of the continual sampling occasions accordingly to avoid redundant samples. We also introduce a repeated sampling algorithm that draws on the correlation between the samples at successive sampling occasions and exploits linear regression to minimize the number of the samples derived at each occasion. At the bottom tier, we introduce a distributed sampling algorithm for random sampling (uniform and nonuniform) from peer-to-peer databases with arbitrary network topology and tuple distribution. Our sampling algorithm is based on the Metropolis Markov Chain Monte Carlo method that guarantees randomness of the sample with arbitrary small variation difference with the desired distribution, while it is comparable to optimal sampling in sampling cost/time. We evaluate the efficiency of Digest via simulation using real data.
在本文中,我们提出了一种有效的基于样本的方法来回答点对点数据库中固定精度的近似连续聚合查询。首先,我们定义了实用的语义,以形成固定精度的近似连续聚合查询。其次,我们提出了“文摘”(Digest),这是一个两层的系统,通过抽样来实现正确和高效的查询回答。在顶层,我们开发了一个查询评估引擎,该引擎使用从点对点数据库收集的样本,在保证精度的情况下持续估计近似连续聚合查询的运行结果。为了有效地评估查询,我们提出了一种外推算法,该算法可以预测运行结果的演变,并相应地调整连续采样场合的频率,以避免冗余样本。我们还介绍了一种重复采样算法,该算法利用连续采样场合中样本之间的相关性,并利用线性回归来最小化每次导出的样本数量。在底层,我们引入了一种分布式采样算法,用于从具有任意网络拓扑和元组分布的对等数据库中随机采样(均匀和非均匀)。我们的抽样算法基于Metropolis马尔可夫链蒙特卡罗方法,保证了样本与期望分布的任意小差异的随机性,同时在抽样成本/时间上与最优抽样相当。通过对实际数据的仿真,对Digest的效率进行了评价。
{"title":"Fixed-precision approximate continuous aggregate queries in peer-to-peer databases","authors":"F. Kashani, C. Shahabi","doi":"10.4108/ICST.COLLABORATECOM.2010.2","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2010.2","url":null,"abstract":"In this paper, we propose an efficient sample-based approach to answer fixed-precision approximate continuous aggregate queries in peer-to-peer databases. First, we define practical semantics to formulate fixed-precision approximate continuous aggregate queries. Second, we propose “Digest”, a two-tier system for correct and efficient query answering by sampling. At the top tier, we develop a query evaluation engine that uses the samples collected from the peer-to-peer database to continually estimate the running result of the approximate continuous aggregate query with guaranteed precision. For efficient query evaluation, we propose an extrapolation algorithm that predicts the evolution of the running result and adapts the frequency of the continual sampling occasions accordingly to avoid redundant samples. We also introduce a repeated sampling algorithm that draws on the correlation between the samples at successive sampling occasions and exploits linear regression to minimize the number of the samples derived at each occasion. At the bottom tier, we introduce a distributed sampling algorithm for random sampling (uniform and nonuniform) from peer-to-peer databases with arbitrary network topology and tuple distribution. Our sampling algorithm is based on the Metropolis Markov Chain Monte Carlo method that guarantees randomness of the sample with arbitrary small variation difference with the desired distribution, while it is comparable to optimal sampling in sampling cost/time. We evaluate the efficiency of Digest via simulation using real data.","PeriodicalId":354101,"journal":{"name":"6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129940288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1