首页 > 最新文献

Proceedings IEEE International Symposium on Network Computing and Applications. NCA 2001最新文献

英文 中文
Application routing load balancing (ARLB) to support QoS for VoIP application over a VPNs environment 应用路由负载均衡(ARLB),支持vpn环境下VoIP应用的QoS
S. Chimmanee, K. Wipusitwarakun
VoIP (B. Douskalis, 2000) is not appropriate for non-QoS networks, which are the majority of networks in the Internet. It is therefore difficult to guarantee QoS for a VoIP over Virtual Private Networks (VPNs) environment (M. Gunter et al., 1999; Yoshihiro Ito et al., 1998). The paper presents an idea which will alleviate such a limit. The proposed idea is to use a dial up line as an additional connection to elevate degrading bandwidth performance, due to the unreliability of the Internet. However, existing load balancing tools implemented on the router are not appropriate for implementation over a VPN environment. Therefore, the authors propose application routing load balancing (ARLB) for a VPN environment.
VoIP (B. Douskalis, 2000)不适用于非qos网络,这是互联网中大多数网络。因此,很难保证虚拟专用网(vpn)环境下VoIP的QoS (M. Gunter et al., 1999;伊藤义宏等人,1998)。本文提出了一种可以缓解这种限制的想法。提议的想法是使用拨号线路作为额外的连接,以提高由于互联网不可靠而不断下降的带宽性能。但是,在路由器上实现的现有负载平衡工具不适合在VPN环境上实现。因此,作者提出了VPN环境下的应用路由负载均衡(ARLB)。
{"title":"Application routing load balancing (ARLB) to support QoS for VoIP application over a VPNs environment","authors":"S. Chimmanee, K. Wipusitwarakun","doi":"10.1109/NCA.2001.962519","DOIUrl":"https://doi.org/10.1109/NCA.2001.962519","url":null,"abstract":"VoIP (B. Douskalis, 2000) is not appropriate for non-QoS networks, which are the majority of networks in the Internet. It is therefore difficult to guarantee QoS for a VoIP over Virtual Private Networks (VPNs) environment (M. Gunter et al., 1999; Yoshihiro Ito et al., 1998). The paper presents an idea which will alleviate such a limit. The proposed idea is to use a dial up line as an additional connection to elevate degrading bandwidth performance, due to the unreliability of the Internet. However, existing load balancing tools implemented on the router are not appropriate for implementation over a VPN environment. Therefore, the authors propose application routing load balancing (ARLB) for a VPN environment.","PeriodicalId":385607,"journal":{"name":"Proceedings IEEE International Symposium on Network Computing and Applications. NCA 2001","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123135109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Data logistics in network computing: the logistical session layer 网络计算中的数据物流:逻辑会话层
D. M. Swany, R. Wolski
Presents a strategy for optimizing end-to-end TCP/IP throughput over long-haul networks (i.e. those where the product of the bandwidth and the delay is high.) Our approach defines a logistical session layer (LSL) that uses intermediate process-level "depots" along the network route from source to sink to implement an end-to-end communication session. Despite the additional processing overhead resulting from TCP/IP protocol stack-Unix kernel boundary traversals at each depot, our experiments show that dramatic end-to-end bandwidth improvements are possible. We also describe a prototype implementation of LSL that does not require any Unix kernel modification or root access privilege, which we used to generate the results, and we discuss its utility in the context of extant TCP/IP tuning methodologies.
提出了一种在长途网络(即带宽和延迟的乘积很高的网络)上优化端到端TCP/IP吞吐量的策略。我们的方法定义了一个逻辑会话层(LSL),它使用从源到接收的网络路由上的中间流程级“仓库”来实现端到端的通信会话。尽管每个仓库的TCP/IP协议栈- unix内核边界遍历会带来额外的处理开销,但我们的实验表明,显著的端到端带宽改进是可能的。我们还描述了LSL的原型实现,它不需要任何Unix内核修改或根访问权限(我们使用它来生成结果),并讨论了它在现有TCP/IP调优方法上下文中的实用性。
{"title":"Data logistics in network computing: the logistical session layer","authors":"D. M. Swany, R. Wolski","doi":"10.1109/NCA.2001.962530","DOIUrl":"https://doi.org/10.1109/NCA.2001.962530","url":null,"abstract":"Presents a strategy for optimizing end-to-end TCP/IP throughput over long-haul networks (i.e. those where the product of the bandwidth and the delay is high.) Our approach defines a logistical session layer (LSL) that uses intermediate process-level \"depots\" along the network route from source to sink to implement an end-to-end communication session. Despite the additional processing overhead resulting from TCP/IP protocol stack-Unix kernel boundary traversals at each depot, our experiments show that dramatic end-to-end bandwidth improvements are possible. We also describe a prototype implementation of LSL that does not require any Unix kernel modification or root access privilege, which we used to generate the results, and we discuss its utility in the context of extant TCP/IP tuning methodologies.","PeriodicalId":385607,"journal":{"name":"Proceedings IEEE International Symposium on Network Computing and Applications. NCA 2001","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116889195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
A law-abiding peer-to-peer network for free-software distribution 一个守法的自由软件分发点对点网络
A. Bakker, M. Steen, A. Tanenbaum
The Globe Distribution Network (GDN) is an application for worldwide distribution of freely redistributable software packages. The GDN takes a novel, optimistic approach to stop the illegal distribution of copyrighted and illicit material via the network. Instead of having moderators check the software archives at upload time, illegal content is removed and its uploader's access to the network permanently revoked only when the content is discovered. An important feature of the GDN is that the objects containing the software can run on untrustworthy servers. A first version of the GDN has been implemented and has been running since October 2000 across four European sites.
全球分发网络(GDN)是一个用于在全球范围内分发可自由再分发的软件包的应用程序。GDN采用了一种新颖、乐观的方法来阻止通过网络非法传播受版权保护的非法材料。而不是让版主在上传时检查软件档案,非法内容被删除,只有在内容被发现时,其上传者的网络访问权限才会被永久撤销。GDN的一个重要特性是包含该软件的对象可以在不可信的服务器上运行。GDN的第一个版本已经实现,并从2000年10月开始在四个欧洲站点上运行。
{"title":"A law-abiding peer-to-peer network for free-software distribution","authors":"A. Bakker, M. Steen, A. Tanenbaum","doi":"10.1109/NCA.2001.962516","DOIUrl":"https://doi.org/10.1109/NCA.2001.962516","url":null,"abstract":"The Globe Distribution Network (GDN) is an application for worldwide distribution of freely redistributable software packages. The GDN takes a novel, optimistic approach to stop the illegal distribution of copyrighted and illicit material via the network. Instead of having moderators check the software archives at upload time, illegal content is removed and its uploader's access to the network permanently revoked only when the content is discovered. An important feature of the GDN is that the objects containing the software can run on untrustworthy servers. A first version of the GDN has been implemented and has been running since October 2000 across four European sites.","PeriodicalId":385607,"journal":{"name":"Proceedings IEEE International Symposium on Network Computing and Applications. NCA 2001","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115618074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 56
Simulation experiments of a high-performance RapidIO-based processing architecture 基于rapidio的高性能处理体系结构的仿真实验
Jonathan Adams, C. Katsinis, W. Rosen, D. Hecht, V. Adams, H. Narravula, Satyen Sukhtankar
Describes the results of our simulation analysis of a high-performance processing architecture based on the RapidIO network protocol. RapidIO is a 10-Gb/s, low-latency packet-switched interconnect technology designed for processor-to-processor, processor-to-memory, and processor-to-peripheral interconnects. Two network topologies were simulated, a simple network consisting of an 8-port switch and eight processing nodes and a more extensive network consisting of five 8-port switches and 24 processing nodes. The results indicate that latencies as low as 92 ns for a remote 64-bit read request/response transaction may be achieved in an unloaded single-switch system. The effectiveness of various flow control mechanisms provided by the protocol are also explored, and when used in combination, a 10% increase in link utilization is achieved.
描述了基于RapidIO网络协议的高性能处理体系结构的仿真分析结果。RapidIO是一种10gb /s、低延迟的分组交换互连技术,专为处理器到处理器、处理器到内存和处理器到外设互连而设计。模拟了两种网络拓扑,一种是由一个8口交换机和8个处理节点组成的简单网络,另一种是由5个8口交换机和24个处理节点组成的更广泛的网络。结果表明,在无负载的单交换机系统中,远程64位读请求/响应事务的延迟可低至92 ns。还探讨了协议提供的各种流量控制机制的有效性,当组合使用时,链路利用率提高了10%。
{"title":"Simulation experiments of a high-performance RapidIO-based processing architecture","authors":"Jonathan Adams, C. Katsinis, W. Rosen, D. Hecht, V. Adams, H. Narravula, Satyen Sukhtankar","doi":"10.1109/NCA.2001.962550","DOIUrl":"https://doi.org/10.1109/NCA.2001.962550","url":null,"abstract":"Describes the results of our simulation analysis of a high-performance processing architecture based on the RapidIO network protocol. RapidIO is a 10-Gb/s, low-latency packet-switched interconnect technology designed for processor-to-processor, processor-to-memory, and processor-to-peripheral interconnects. Two network topologies were simulated, a simple network consisting of an 8-port switch and eight processing nodes and a more extensive network consisting of five 8-port switches and 24 processing nodes. The results indicate that latencies as low as 92 ns for a remote 64-bit read request/response transaction may be achieved in an unloaded single-switch system. The effectiveness of various flow control mechanisms provided by the protocol are also explored, and when used in combination, a 10% increase in link utilization is achieved.","PeriodicalId":385607,"journal":{"name":"Proceedings IEEE International Symposium on Network Computing and Applications. NCA 2001","volume":"EM-25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126525156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Scalability challenges and solutions for emerging networks 新兴网络的可扩展性挑战和解决方案
K. Birman
Summary form only given. Computer networks are becoming increasingly common, and are used in sensitive applications in which serious damage could be done by a network failure. There is a need for design principles that would enable a new generation of solutions having the required properties. Needed are technologies that would be inherently robust, provably scalable, and sufficiently self-organizing to adapt as conditions change in the network. The Spinglass project has been successful in solving an important class of such problems. At the core of our work is a new style of gossip-based communication protocol. We are using this protocol in support of a variety of systems programming tools. The article discusses two of them: Bimodal Multicast, a scalable reliable multicast protocol having probabilistic reliability properties, and Astrolabe, a virtual distributed database constructed entirely through peer-to-peer interactions among the components of a large system. Both technologies are shown to be stable under stress, arbitrarily scalable without growth in communication or processing loads, and to have real-time properties.
只提供摘要形式。计算机网络正变得越来越普遍,并被用于敏感应用中,在这些应用中,网络故障可能造成严重损害。需要一些设计原则,使新一代的解决方案具有所需的属性。我们需要的是固有的健壮性、可扩展性和足够的自组织技术,以适应网络中的条件变化。spingglass项目成功地解决了一类重要的此类问题。我们工作的核心是一种新型的基于八卦的通信协议。我们使用这个协议来支持各种系统编程工具。本文讨论了其中的两个:双峰多播(Bimodal Multicast),一种具有概率可靠性属性的可扩展可靠多播协议,以及Astrolabe,一种完全通过大型系统组件之间的点对点交互构建的虚拟分布式数据库。这两种技术在压力下都是稳定的,可以在不增加通信或处理负载的情况下任意扩展,并且具有实时性。
{"title":"Scalability challenges and solutions for emerging networks","authors":"K. Birman","doi":"10.1109/NCA.2001.962509","DOIUrl":"https://doi.org/10.1109/NCA.2001.962509","url":null,"abstract":"Summary form only given. Computer networks are becoming increasingly common, and are used in sensitive applications in which serious damage could be done by a network failure. There is a need for design principles that would enable a new generation of solutions having the required properties. Needed are technologies that would be inherently robust, provably scalable, and sufficiently self-organizing to adapt as conditions change in the network. The Spinglass project has been successful in solving an important class of such problems. At the core of our work is a new style of gossip-based communication protocol. We are using this protocol in support of a variety of systems programming tools. The article discusses two of them: Bimodal Multicast, a scalable reliable multicast protocol having probabilistic reliability properties, and Astrolabe, a virtual distributed database constructed entirely through peer-to-peer interactions among the components of a large system. Both technologies are shown to be stable under stress, arbitrarily scalable without growth in communication or processing loads, and to have real-time properties.","PeriodicalId":385607,"journal":{"name":"Proceedings IEEE International Symposium on Network Computing and Applications. NCA 2001","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117038296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Micro-firewalls for dynamic network security with distributed intrusion detection 带有分布式入侵检测的动态网络安全微防火墙
K. Hwang, Muralidaran Gangadharan
This paper reports the design experiences and research findings of a new distributed security architecture for protecting exposed Intranets or clusters of computers from malicious attacks. We present a new approach of building micro-firewalls on network hosts to enable distributed intrusion detection with dynamic policy change, as the threat pattern changes. This distributed security can effectively counteract attacks from intruders or insiders. Three policy-update mechanisms are evaluated for achieving dynamic security. Mobile agents are shown most scalable and robust for policy update, but prone to attacks by other agents or hosts. The CORBA has the best speed performance with lower overhead The Java-based RMI demonstrates the highest security based on the sandbox model. The optimal choice depends on the tradeoffs among operating speed, Intranet scalability, host robustness, and the security level demanded by specific network applications.
本文报告了一种新的分布式安全体系结构的设计经验和研究成果,用于保护暴露的内部网或计算机集群免受恶意攻击。本文提出了一种在网络主机上构建微防火墙的新方法,使分布式入侵检测能够随着威胁模式的变化而动态改变策略。这种分布式安全性可以有效地抵御来自入侵者或内部人员的攻击。为了实现动态安全性,评估了三种策略更新机制。移动代理在策略更新方面具有最高的可伸缩性和健壮性,但容易受到其他代理或主机的攻击。CORBA具有最佳的速度性能和较低的开销,基于java的RMI基于沙盒模型展示了最高的安全性。最佳选择取决于在操作速度、Intranet可伸缩性、主机健壮性和特定网络应用程序所需的安全级别之间的权衡。
{"title":"Micro-firewalls for dynamic network security with distributed intrusion detection","authors":"K. Hwang, Muralidaran Gangadharan","doi":"10.1109/NCA.2001.962517","DOIUrl":"https://doi.org/10.1109/NCA.2001.962517","url":null,"abstract":"This paper reports the design experiences and research findings of a new distributed security architecture for protecting exposed Intranets or clusters of computers from malicious attacks. We present a new approach of building micro-firewalls on network hosts to enable distributed intrusion detection with dynamic policy change, as the threat pattern changes. This distributed security can effectively counteract attacks from intruders or insiders. Three policy-update mechanisms are evaluated for achieving dynamic security. Mobile agents are shown most scalable and robust for policy update, but prone to attacks by other agents or hosts. The CORBA has the best speed performance with lower overhead The Java-based RMI demonstrates the highest security based on the sandbox model. The optimal choice depends on the tradeoffs among operating speed, Intranet scalability, host robustness, and the security level demanded by specific network applications.","PeriodicalId":385607,"journal":{"name":"Proceedings IEEE International Symposium on Network Computing and Applications. NCA 2001","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125535143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Automated validation of distributed software using the IF environment 使用中频环境的分布式软件的自动验证
M. Bozga, S. Graf, L. Mounier
This paper summarizes our experience with IF, an open validation environment for distributed software systems. Indeed, face to the increasing complexity of such systems, none of the existing tools can cover by itself the whole validation process. The IF environment was built upon an expressive intermediate language and allows to connect several validation tools, providing most of the advanced techniques currently available. The results obtained on several large case-studies, including telecommunication protocols and embedded software systems, confirm the practical interest of this approach.
本文总结了我们在分布式软件系统的开放验证环境IF方面的经验。事实上,面对这些系统日益增加的复杂性,没有一个现有的工具能够单独覆盖整个验证过程。IF环境建立在一种富有表现力的中间语言之上,并允许连接多个验证工具,提供当前可用的大多数高级技术。在包括电信协议和嵌入式软件系统在内的几个大型案例研究中获得的结果证实了这种方法的实际意义。
{"title":"Automated validation of distributed software using the IF environment","authors":"M. Bozga, S. Graf, L. Mounier","doi":"10.1109/NCA.2001.962542","DOIUrl":"https://doi.org/10.1109/NCA.2001.962542","url":null,"abstract":"This paper summarizes our experience with IF, an open validation environment for distributed software systems. Indeed, face to the increasing complexity of such systems, none of the existing tools can cover by itself the whole validation process. The IF environment was built upon an expressive intermediate language and allows to connect several validation tools, providing most of the advanced techniques currently available. The results obtained on several large case-studies, including telecommunication protocols and embedded software systems, confirm the practical interest of this approach.","PeriodicalId":385607,"journal":{"name":"Proceedings IEEE International Symposium on Network Computing and Applications. NCA 2001","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122449462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
The challenges of delivering content on the internet 在互联网上发布内容的挑战
F. Leighton
In this talk, we will give an overview of how content is distributed on the internet, with an emphasis on the approach being used by Akamai. We will describe some of the technical challenges involved in operating a network of thousands of content servers across multiple geographies on behalf of thousands of customers. The talk will be introductory in nature and should be accessible to a broad audience.
在这次演讲中,我们将概述内容是如何在互联网上分发的,重点是Akamai正在使用的方法。我们将描述代表数千名客户在多个地区运营由数千台内容服务器组成的网络所涉及的一些技术挑战。这次演讲本质上是介绍性的,应该让广大听众都能理解。
{"title":"The challenges of delivering content on the internet","authors":"F. Leighton","doi":"10.1145/375551.375601","DOIUrl":"https://doi.org/10.1145/375551.375601","url":null,"abstract":"In this talk, we will give an overview of how content is distributed on the internet, with an emphasis on the approach being used by Akamai. We will describe some of the technical challenges involved in operating a network of thousands of content servers across multiple geographies on behalf of thousands of customers. The talk will be introductory in nature and should be accessible to a broad audience.","PeriodicalId":385607,"journal":{"name":"Proceedings IEEE International Symposium on Network Computing and Applications. NCA 2001","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123056930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
Proceedings IEEE International Symposium on Network Computing and Applications. NCA 2001
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1