首页 > 最新文献

Queue最新文献

英文 中文
The Security Jawbreaker 安全钳
Q3 Computer Science Pub Date : 2023-10-31 DOI: 10.1145/3631478
Phil Vachon
When someone stands at the front door of your home, what are the steps to let them in? If it is a member of the family, they use their house key, unlocking the door using the authority the key confers. For others, a knock at the door or doorbell ring prompts you to make a decision. Once in your home, different individuals have differing authority based on who they are. Family members have access to your whole home. A close friend can roam around unsupervised, with a high level of trust. An appliance repair person is someone you might supervise for the duration of the job to be done. For more sensitive locations in your home, you can lock a few doors, giving you further assurance. Making these decisions is an implicit form of evaluating risk tolerance, or your willingness to accept the chance that something might go against your best interests.
当有人站在您家门前时,让他们进来的步骤是什么?如果是家庭成员,他们会使用家里的钥匙,利用钥匙赋予的权力打开房门。对于其他人,敲门声或门铃响起会提示您做出决定。进入家中后,不同的人根据其身份拥有不同的权限。家庭成员可以进入您的整个家。亲密朋友可以在无人看管的情况下四处走动,信任度很高。电器维修人员是您可以在工作期间进行监督的人。对于家中比较敏感的地方,您可以锁上几扇门,进一步确保安全。做出这些决定是评估风险承受能力的一种隐性形式,或者说,您愿意接受某些事情可能会违背您最佳利益的可能性。
{"title":"The Security Jawbreaker","authors":"Phil Vachon","doi":"10.1145/3631478","DOIUrl":"https://doi.org/10.1145/3631478","url":null,"abstract":"When someone stands at the front door of your home, what are the steps to let them in? If it is a member of the family, they use their house key, unlocking the door using the authority the key confers. For others, a knock at the door or doorbell ring prompts you to make a decision. Once in your home, different individuals have differing authority based on who they are. Family members have access to your whole home. A close friend can roam around unsupervised, with a high level of trust. An appliance repair person is someone you might supervise for the duration of the job to be done. For more sensitive locations in your home, you can lock a few doors, giving you further assurance. Making these decisions is an implicit form of evaluating risk tolerance, or your willingness to accept the chance that something might go against your best interests.","PeriodicalId":39042,"journal":{"name":"Queue","volume":"88 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139309342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Use Cases are Essential 用例是必要的
Q3 Computer Science Pub Date : 2023-10-31 DOI: 10.1145/3631182
Ivar Jacobson, Alistair Cockburn
While the software industry is a fast-paced and exciting world in which new tools, technologies, and techniques are constantly being developed to serve business and society, it is also forgetful. In its haste for fast-forward motion, it is subject to the whims of fashion and can forget or ignore proven solutions to some of the eternal problems that it faces. Use cases, first introduced in 1986 and popularized later, are one of those proven solutions. Ivar Jacobson and Alistair Cockburn, the two primary actors in this domain, are writing this article to describe to a new generation what use cases are and how they serve.
虽然软件行业是一个快节奏和令人兴奋的世界,在这个世界中,新的工具、技术和技术不断地被开发出来,以服务于商业和社会,但它也是健忘的。在追求快速发展的匆忙中,它受制于时尚的突发奇想,可能会忘记或忽视一些它所面临的永恒问题的行之有效的解决方案。用例最早是在1986年引入的,后来得到了推广,它是一种经过验证的解决方案。Ivar Jacobson和Alistair Cockburn是这个领域的两位主要参与者,他们正在撰写这篇文章,向新一代描述用例是什么以及它们是如何服务的。
{"title":"Use Cases are Essential","authors":"Ivar Jacobson, Alistair Cockburn","doi":"10.1145/3631182","DOIUrl":"https://doi.org/10.1145/3631182","url":null,"abstract":"While the software industry is a fast-paced and exciting world in which new tools, technologies, and techniques are constantly being developed to serve business and society, it is also forgetful. In its haste for fast-forward motion, it is subject to the whims of fashion and can forget or ignore proven solutions to some of the eternal problems that it faces. Use cases, first introduced in 1986 and popularized later, are one of those proven solutions. Ivar Jacobson and Alistair Cockburn, the two primary actors in this domain, are writing this article to describe to a new generation what use cases are and how they serve.","PeriodicalId":39042,"journal":{"name":"Queue","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135979837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Low-code Development Productivity 低代码开发生产率
Q3 Computer Science Pub Date : 2023-10-31 DOI: 10.1145/3631183
João Varajão, António Trigo, Miguel Almeida
This article aims to provide new insights on the subject by presenting the results of laboratory experiments carried out with code-based, low-code, and extreme low-code technologies to study differences in productivity. Low-code technologies have clearly shown higher levels of productivity, providing strong arguments for low-code to dominate the software development mainstream in the short/medium term. The article reports the procedure and protocols, results, limitations, and opportunities for future research.
本文旨在通过介绍基于代码、低代码和极端低代码技术的实验室实验结果,研究生产率的差异,从而为这一主题提供新的见解。低代码技术明显表现出更高的生产力水平,为低代码在中短期内成为软件开发主流提供了有力的论据。文章报告了程序和协议、结果、局限性以及未来研究的机会。
{"title":"Low-code Development Productivity","authors":"João Varajão, António Trigo, Miguel Almeida","doi":"10.1145/3631183","DOIUrl":"https://doi.org/10.1145/3631183","url":null,"abstract":"This article aims to provide new insights on the subject by presenting the results of laboratory experiments carried out with code-based, low-code, and extreme low-code technologies to study differences in productivity. Low-code technologies have clearly shown higher levels of productivity, providing strong arguments for low-code to dominate the software development mainstream in the short/medium term. The article reports the procedure and protocols, results, limitations, and opportunities for future research.","PeriodicalId":39042,"journal":{"name":"Queue","volume":"168 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139308899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving Testing of Deep-learning Systems 改进深度学习系统的测试
Q3 Computer Science Pub Date : 2023-10-31 DOI: 10.1145/3631340
Harsh Deokuliar, R. Sangwan, Y. Badr, S. Srinivasan
We used differential testing to generate test data to improve diversity of data points in the test dataset and then used mutation testing to check the quality of the test data in terms of diversity. Combining differential and mutation testing in this fashion improves mutation score, a test data quality metric, indicating overall improvement in testing effectiveness and quality of the test data when testing deep learning systems.
我们使用差分测试生成测试数据,以提高测试数据集中数据点的多样性,然后使用突变测试检查测试数据在多样性方面的质量。以这种方式结合差分测试和突变测试,可以提高测试数据质量指标--突变得分,这表明在测试深度学习系统时,测试效率和测试数据质量都得到了全面提高。
{"title":"Improving Testing of Deep-learning Systems","authors":"Harsh Deokuliar, R. Sangwan, Y. Badr, S. Srinivasan","doi":"10.1145/3631340","DOIUrl":"https://doi.org/10.1145/3631340","url":null,"abstract":"We used differential testing to generate test data to improve diversity of data points in the test dataset and then used mutation testing to check the quality of the test data in terms of diversity. Combining differential and mutation testing in this fashion improves mutation score, a test data quality metric, indicating overall improvement in testing effectiveness and quality of the test data when testing deep learning systems.","PeriodicalId":39042,"journal":{"name":"Queue","volume":"101 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139306446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dear Diary 亲爱的日记
Q3 Computer Science Pub Date : 2023-10-31 DOI: 10.1145/3631181
George Neville-Neil
While a debug log is helpful, it's not the same thing as a laboratory notebook. If more computer scientists acted like scientists, we wouldn't have to fight over whether computing is an art or a science.
虽然调试日志很有帮助,但它与实验笔记本并不相同。如果有更多的计算机科学家像科学家一样行事,我们就不必为计算机是一门艺术还是一门科学而争论不休了。
{"title":"Dear Diary","authors":"George Neville-Neil","doi":"10.1145/3631181","DOIUrl":"https://doi.org/10.1145/3631181","url":null,"abstract":"While a debug log is helpful, it's not the same thing as a laboratory notebook. If more computer scientists acted like scientists, we wouldn't have to fight over whether computing is an art or a science.","PeriodicalId":39042,"journal":{"name":"Queue","volume":"4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139309453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Creating the First Confidential GPUs 创建第一个机密gpu
Q3 Computer Science Pub Date : 2023-08-31 DOI: 10.1145/3623393.3623391
Gobikrishna Dhanuskodi, Sudeshna Guha, Vidhya Krishnan, Aruna Manjunatha, Michael O'Connor, Rob Nertney, Phil Rogers
Today's datacenter GPU has a long and storied 3D graphics heritage. In the 1990s, graphics chips for PCs and consoles had fixed pipelines for geometry, rasterization, and pixels using integer and fixed-point arithmetic. In 1999, NVIDIA invented the modern GPU, which put a set of programmable cores at the heart of the chip, enabling rich 3D scene generation with great efficiency. It did not take long for developers and researchers to realize 'I could run compute on those parallel cores, and it would be blazing fast.' In 2004, Ian Buck created Brook at Stanford, the first compute library for GPUs, and in 2006, NVIDIA created CUDA, which is the gold standard for accelerated computing on GPUs today.
今天的数据中心GPU有着悠久而传奇的3D图形传统。在20世纪90年代,用于pc和主机的图形芯片具有固定的几何、光栅化和使用整数和定点算法的像素管道。1999年,NVIDIA发明了现代GPU,它在芯片的核心放置了一组可编程的内核,能够以极高的效率生成丰富的3D场景。没过多久,开发人员和研究人员就意识到,“我可以在这些并行核上运行计算,而且速度会非常快。”2004年,伊恩·巴克在斯坦福大学创建了布鲁克,这是第一个gpu计算库。2006年,英伟达创建了CUDA,这是当今gpu加速计算的黄金标准。
{"title":"Creating the First Confidential GPUs","authors":"Gobikrishna Dhanuskodi, Sudeshna Guha, Vidhya Krishnan, Aruna Manjunatha, Michael O'Connor, Rob Nertney, Phil Rogers","doi":"10.1145/3623393.3623391","DOIUrl":"https://doi.org/10.1145/3623393.3623391","url":null,"abstract":"Today's datacenter GPU has a long and storied 3D graphics heritage. In the 1990s, graphics chips for PCs and consoles had fixed pipelines for geometry, rasterization, and pixels using integer and fixed-point arithmetic. In 1999, NVIDIA invented the modern GPU, which put a set of programmable cores at the heart of the chip, enabling rich 3D scene generation with great efficiency. It did not take long for developers and researchers to realize 'I could run compute on those parallel cores, and it would be blazing fast.' In 2004, Ian Buck created Brook at Stanford, the first compute library for GPUs, and in 2006, NVIDIA created CUDA, which is the gold standard for accelerated computing on GPUs today.","PeriodicalId":39042,"journal":{"name":"Queue","volume":"21 1","pages":"68 - 93"},"PeriodicalIF":0.0,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46415908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Protecting Secrets from Computers 保护电脑机密
Q3 Computer Science Pub Date : 2023-08-31 DOI: 10.1145/3623614
Terence Kelly
Bob is in prison and Alice is dead; they trusted computers with secrets. Review time-tested tricks that can help you avoid the grim fate of the old crypto couple.
鲍勃在监狱里,爱丽丝死了;他们把秘密托付给电脑。回顾一下久经考验的技巧,这些技巧可以帮助你避免老密码夫妇的悲惨命运。
{"title":"Protecting Secrets from Computers","authors":"Terence Kelly","doi":"10.1145/3623614","DOIUrl":"https://doi.org/10.1145/3623614","url":null,"abstract":"Bob is in prison and Alice is dead; they trusted computers with secrets. Review time-tested tricks that can help you avoid the grim fate of the old crypto couple.","PeriodicalId":39042,"journal":{"name":"Queue","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135990601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Halfway Around the World 绕了半个地球
Q3 Computer Science Pub Date : 2023-08-31 DOI: 10.1145/3623426
George V. Neville-Neil
Not only do different cultures treat different features differently, but they also treat each other differently. How people act with respect to each other is a topic that can, and does, fill volumes of books that, as nerds, we probably have never read, but finding out a bit about where you're heading is a good idea. You can try to ask the locals, although people generally are so enmeshed in their own cultures that they have a hard time explaining them to others. It's best to observe with an open mind, watch how your new team reacts to each other and to you, and then ask simple questions when you see something you don't understand.
不同的文化不仅对不同的特征有不同的看法,而且对彼此也有不同的看法。作为书呆子,我们可能从来没有读过几卷书,但了解一下你的方向是个好主意。人们如何相互尊重,这是一个可以写满几卷书的话题。你可以试着问问当地人,尽管人们通常都沉浸在自己的文化中,很难向别人解释清楚。最好以开放的心态去观察,观察你的新团队如何相互反应,以及对你的反应,当你看到不理解的地方时,问一些简单的问题。
{"title":"Halfway Around the World","authors":"George V. Neville-Neil","doi":"10.1145/3623426","DOIUrl":"https://doi.org/10.1145/3623426","url":null,"abstract":"Not only do different cultures treat different features differently, but they also treat each other differently. How people act with respect to each other is a topic that can, and does, fill volumes of books that, as nerds, we probably have never read, but finding out a bit about where you're heading is a good idea. You can try to ask the locals, although people generally are so enmeshed in their own cultures that they have a hard time explaining them to others. It's best to observe with an open mind, watch how your new team reacts to each other and to you, and then ask simple questions when you see something you don't understand.","PeriodicalId":39042,"journal":{"name":"Queue","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135990600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Why Should I Trust Your Code? 为什么我应该相信你的代码?
Q3 Computer Science Pub Date : 2023-08-31 DOI: 10.1145/3623460
Antoine Delignat-Lavaud, C. Fournet, K. Vaswani, S. Clebsch, Maik Riechert, Manuel Costa, M. Russinovich
For Confidential Computing to become ubiquitous in the cloud, in the same way that HTTPS became the default for networking, a different, more flexible approach is needed. Although there is no guarantee that every malicious code behavior will be caught upfront, precise auditability can be guaranteed: Anyone who suspects that trust has been broken by a confidential service should be able to audit any part of its attested code base, including all updates, dependencies, policies, and tools. To achieve this, we propose an architecture to track code provenance and to hold code providers accountable. At its core, a new Code Transparency Service (CTS) maintains a public, append-only ledger that records all code deployed for confidential services. Before registering new code, CTS automatically applies policies to enforce code-integrity properties. For example, it can enforce the use of authorized releases of library dependencies and verify that code has been compiled with specific runtime checks and analyzed by specific tools. These upfront checks prevent common supply-chain attacks.
为了使机密计算在云中变得无处不在,就像HTTPS成为网络的默认方式一样,需要一种不同的、更灵活的方法。虽然不能保证每个恶意代码行为都能被预先发现,但可以保证精确的可审计性:任何怀疑信任已被机密服务破坏的人都应该能够审计其经过认证的代码库的任何部分,包括所有更新、依赖项、策略和工具。为了实现这一点,我们提出了一个体系结构来跟踪代码的来源,并让代码提供者负责。其核心是一个新的代码透明服务(CTS),它维护一个公共的、仅追加的分类账,记录为机密服务部署的所有代码。在注册新代码之前,CTS会自动应用策略来强制执行代码完整性属性。例如,它可以强制使用库依赖项的授权版本,并验证代码已通过特定的运行时检查进行编译,并由特定的工具进行分析。这些预先检查可以防止常见的供应链攻击。
{"title":"Why Should I Trust Your Code?","authors":"Antoine Delignat-Lavaud, C. Fournet, K. Vaswani, S. Clebsch, Maik Riechert, Manuel Costa, M. Russinovich","doi":"10.1145/3623460","DOIUrl":"https://doi.org/10.1145/3623460","url":null,"abstract":"For Confidential Computing to become ubiquitous in the cloud, in the same way that HTTPS became the default for networking, a different, more flexible approach is needed. Although there is no guarantee that every malicious code behavior will be caught upfront, precise auditability can be guaranteed: Anyone who suspects that trust has been broken by a confidential service should be able to audit any part of its attested code base, including all updates, dependencies, policies, and tools. To achieve this, we propose an architecture to track code provenance and to hold code providers accountable. At its core, a new Code Transparency Service (CTS) maintains a public, append-only ledger that records all code deployed for confidential services. Before registering new code, CTS automatically applies policies to enforce code-integrity properties. For example, it can enforce the use of authorized releases of library dependencies and verify that code has been compiled with specific runtime checks and analyzed by specific tools. These upfront checks prevent common supply-chain attacks.","PeriodicalId":39042,"journal":{"name":"Queue","volume":"21 1","pages":"94 - 122"},"PeriodicalIF":0.0,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47355272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Knowing What You Neeed to Know 知道你需要知道的
Q3 Computer Science Pub Date : 2023-08-31 DOI: 10.1145/3623425
Thomas A. Limoncelli
Blockers can take a tiny task and stretch it over days or weeks. Taking a moment at the beginning of a project to look for and prevent possible blockers can improve productivity. These examples of personal, team, and organizational levels show how gathering the right information and performing preflight checks can save hours of wasted time later.
阻滞剂可以把一个小任务拖上几天或几周。在项目开始时花点时间寻找和防止可能的障碍可以提高生产力。这些个人、团队和组织层面的例子表明,收集正确的信息和执行飞行前检查如何节省以后浪费的时间。
{"title":"Knowing What You Neeed to Know","authors":"Thomas A. Limoncelli","doi":"10.1145/3623425","DOIUrl":"https://doi.org/10.1145/3623425","url":null,"abstract":"Blockers can take a tiny task and stretch it over days or weeks. Taking a moment at the beginning of a project to look for and prevent possible blockers can improve productivity. These examples of personal, team, and organizational levels show how gathering the right information and performing preflight checks can save hours of wasted time later.","PeriodicalId":39042,"journal":{"name":"Queue","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135991407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Queue
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1