首页 > 最新文献

2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)最新文献

英文 中文
Human Behavior Challenge Winning Solution 人类行为挑战获胜解决方案
Saket Kunwar
This paper describes the winning method and results of the Human Behaviour Challenge 201811https://competitions.codalab.org/competitions/17401. GPS trajectories from smartphones and associated metadata of people involved in a game of finding hidden objects were collected at Nagoya Institute of Technology, Japan. The competition, hosted at codalab.org, challenged the participants to find a solution that could predict the future destination and past starting point from the given data. Knowing the future and past track data of users could enable the organizers to provide personalized and localized services. The source code22https://github.com/saketkunwar/hbc2018 under open source license has been released at github.
本文描述了人类行为挑战赛201811https://competitions.codalab.org/competitions/17401的获胜方法和结果。日本名古屋工业大学收集了参与寻找隐藏物品游戏的人的智能手机GPS轨迹和相关元数据。这项竞赛由codalab.org主办,参赛者需要找到一种解决方案,可以根据给定的数据预测未来的目的地和过去的起点。了解用户未来和过去的轨迹数据,可以为组织者提供个性化和本地化的服务。开源许可下的源代码22https://github.com/saketkunwar/hbc2018已经在github上发布。
{"title":"Human Behavior Challenge Winning Solution","authors":"Saket Kunwar","doi":"10.1109/PERCOMW.2019.8730758","DOIUrl":"https://doi.org/10.1109/PERCOMW.2019.8730758","url":null,"abstract":"This paper describes the winning method and results of the Human Behaviour Challenge 201811https://competitions.codalab.org/competitions/17401. GPS trajectories from smartphones and associated metadata of people involved in a game of finding hidden objects were collected at Nagoya Institute of Technology, Japan. The competition, hosted at codalab.org, challenged the participants to find a solution that could predict the future destination and past starting point from the given data. Knowing the future and past track data of users could enable the organizers to provide personalized and localized services. The source code22https://github.com/saketkunwar/hbc2018 under open source license has been released at github.","PeriodicalId":437017,"journal":{"name":"2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132943934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Designing IoT Systems: Patterns and Managerial Conflicts 设计物联网系统:模式和管理冲突
L. Rahman, T. Ozcelebi, J. Lukkien
The first step in a system design process is to perform domain analysis. This entails acquiring stakeholder concerns throughout the life cycle of the system. The second step is to design solutions addressing those stakeholder concerns. This entails applying patterns for solving known, recurring problems. For these there are architecture patterns and design patterns for architecture design and detailed design respectively. For Internet of Things (IoT) systems such patterns are hardly defined yet since experience is just evolving. In this paper, we propose our definition of an IoT pattern along with its formal specification, explained by a running example. IoT systems are characterized by the variety of stakeholders involved throughout their life cycle, therefore our pattern specification includes means for identifying possible conflicts between these stakeholders.
系统设计过程的第一步是执行领域分析。这需要在系统的整个生命周期中获取涉众关注。第二步是设计解决这些涉众关注的解决方案。这需要应用模式来解决已知的、反复出现的问题。其中有建筑模式和设计模式,分别用于建筑设计和详细设计。对于物联网(IoT)系统来说,这种模式还很难定义,因为经验还在不断发展。在本文中,我们提出了物联网模式的定义及其正式规范,并通过一个运行的示例进行了解释。物联网系统的特点是在其整个生命周期中涉及各种利益相关者,因此我们的模式规范包括识别这些利益相关者之间可能冲突的方法。
{"title":"Designing IoT Systems: Patterns and Managerial Conflicts","authors":"L. Rahman, T. Ozcelebi, J. Lukkien","doi":"10.1109/PERCOMW.2019.8730573","DOIUrl":"https://doi.org/10.1109/PERCOMW.2019.8730573","url":null,"abstract":"The first step in a system design process is to perform domain analysis. This entails acquiring stakeholder concerns throughout the life cycle of the system. The second step is to design solutions addressing those stakeholder concerns. This entails applying patterns for solving known, recurring problems. For these there are architecture patterns and design patterns for architecture design and detailed design respectively. For Internet of Things (IoT) systems such patterns are hardly defined yet since experience is just evolving. In this paper, we propose our definition of an IoT pattern along with its formal specification, explained by a running example. IoT systems are characterized by the variety of stakeholders involved throughout their life cycle, therefore our pattern specification includes means for identifying possible conflicts between these stakeholders.","PeriodicalId":437017,"journal":{"name":"2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127843532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
BiRD'19 - International Workshop on Behavior analysis and Recognition for knowledge Discovery - Welcome and Committees BiRD'19 -知识发现的行为分析和识别国际研讨会-欢迎与委员会
{"title":"BiRD'19 - International Workshop on Behavior analysis and Recognition for knowledge Discovery - Welcome and Committees","authors":"","doi":"10.1109/percomw.2019.8730774","DOIUrl":"https://doi.org/10.1109/percomw.2019.8730774","url":null,"abstract":"","PeriodicalId":437017,"journal":{"name":"2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122252862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Limitations and Approaches in Access Control and Identity Management for Constrained IoT Resources 受限物联网资源访问控制和身份管理的限制与方法
S. Pal
The Internet of Things (IoT), smart sensors and mobile wearable devices are helping to provide services that are more ubiquitous, smarter, faster and easily accessible to users. However, security is a significant concern for the IoT, with access control and identity management are being two major issues. With the growing size and presence of these systems and the resource constrained nature of the IoT devices, an important question is how to manage policies in a manner that is both scalable and flexible. In this research, we aim at proposing a fine-grained and flexible access control architecture, and to examine an identity model for constrained IoT resources. To achieve this, first, we outline some key limitations in the state of the art access control and identity management for IoT. Then we devise our approach to address those limitations in a systematic way.
物联网(IoT)、智能传感器和移动可穿戴设备正在帮助用户提供更无处不在、更智能、更快速、更容易访问的服务。然而,安全是物联网的一个重要问题,访问控制和身份管理是两个主要问题。随着这些系统的规模和存在以及物联网设备的资源约束性质的不断增长,一个重要的问题是如何以可扩展和灵活的方式管理策略。在本研究中,我们旨在提出一种细粒度和灵活的访问控制架构,并研究受限物联网资源的身份模型。为了实现这一目标,首先,我们概述了物联网最先进的访问控制和身份管理中的一些关键限制。然后我们设计我们的方法,以系统的方式解决这些限制。
{"title":"Limitations and Approaches in Access Control and Identity Management for Constrained IoT Resources","authors":"S. Pal","doi":"10.1109/PERCOMW.2019.8730651","DOIUrl":"https://doi.org/10.1109/PERCOMW.2019.8730651","url":null,"abstract":"The Internet of Things (IoT), smart sensors and mobile wearable devices are helping to provide services that are more ubiquitous, smarter, faster and easily accessible to users. However, security is a significant concern for the IoT, with access control and identity management are being two major issues. With the growing size and presence of these systems and the resource constrained nature of the IoT devices, an important question is how to manage policies in a manner that is both scalable and flexible. In this research, we aim at proposing a fine-grained and flexible access control architecture, and to examine an identity model for constrained IoT resources. To achieve this, first, we outline some key limitations in the state of the art access control and identity management for IoT. Then we devise our approach to address those limitations in a systematic way.","PeriodicalId":437017,"journal":{"name":"2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115755822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
SmartEdge'19 - The Third International Workshop on Smart Edge Computing and Networking - Welcome and Committeees 第三届智能边缘计算和网络国际研讨会-欢迎和委员会
{"title":"SmartEdge'19 - The Third International Workshop on Smart Edge Computing and Networking - Welcome and Committeees","authors":"","doi":"10.1109/percomw.2019.8730592","DOIUrl":"https://doi.org/10.1109/percomw.2019.8730592","url":null,"abstract":"","PeriodicalId":437017,"journal":{"name":"2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115946203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
PerVehicle'19: PerVehicle'19 – 1st International Workshop on Pervasive Computing for Vehicular Systems - Program PerVehicle'19:第一届车载系统普适计算国际研讨会-程序
{"title":"PerVehicle'19: PerVehicle'19 – 1st International Workshop on Pervasive Computing for Vehicular Systems - Program","authors":"","doi":"10.1109/percomw.2019.8730704","DOIUrl":"https://doi.org/10.1109/percomw.2019.8730704","url":null,"abstract":"","PeriodicalId":437017,"journal":{"name":"2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122666297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trajectories Prediction of the Black-Tailed Gull Using the Inverse Reinforcement Learning 基于逆强化学习的黑尾鸥飞行轨迹预测
Kanon Takemura, Tsubasa Hirakawa, Y. Mizutani, Hirokazu Suzuki, Michi Tsuruya, K. Yoda
Revealing the route selection of wild animals is of fundamental importance in understanding their movements and foraging strategy. In this study, we attached GPS loggers to black-tailed gulls Larus crassirostris and recorded their movement trajectories during their foraging trips. Using inverse reinforcement learning (IRL), we analyzed the factors that affected their route selection. During the training phase, using pre-defined feature maps, we estimated a reward map that may affect the decision making of black-tailed gulls. The reward map can be used for predicting the trajectories of the gulls during the test phase. In addition, the resultant weight vector enabled us to analyze to which degree the black-tailed gulls favor each area.
揭示野生动物的路径选择对了解它们的运动和觅食策略具有重要意义。在本研究中,我们将GPS记录仪安装在黑尾鸥身上,记录了它们觅食过程中的运动轨迹。利用逆强化学习(IRL),分析了影响其路径选择的因素。在训练阶段,使用预定义的特征图,我们估计了一个可能影响黑尾鸥决策的奖励图。奖励图可以用来预测测试阶段海鸥的飞行轨迹。此外,所得的权重向量使我们能够分析黑尾鸥对每个区域的偏好程度。
{"title":"Trajectories Prediction of the Black-Tailed Gull Using the Inverse Reinforcement Learning","authors":"Kanon Takemura, Tsubasa Hirakawa, Y. Mizutani, Hirokazu Suzuki, Michi Tsuruya, K. Yoda","doi":"10.1109/PERCOMW.2019.8730653","DOIUrl":"https://doi.org/10.1109/PERCOMW.2019.8730653","url":null,"abstract":"Revealing the route selection of wild animals is of fundamental importance in understanding their movements and foraging strategy. In this study, we attached GPS loggers to black-tailed gulls Larus crassirostris and recorded their movement trajectories during their foraging trips. Using inverse reinforcement learning (IRL), we analyzed the factors that affected their route selection. During the training phase, using pre-defined feature maps, we estimated a reward map that may affect the decision making of black-tailed gulls. The reward map can be used for predicting the trajectories of the gulls during the test phase. In addition, the resultant weight vector enabled us to analyze to which degree the black-tailed gulls favor each area.","PeriodicalId":437017,"journal":{"name":"2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131226226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PerCom PhD Forum 2019: PhD Forum on Pervasive Computing and Communications 2019 - Welcome and Committees PerCom博士论坛2019:普适计算与通信博士论坛2019 -欢迎和委员会
{"title":"PerCom PhD Forum 2019: PhD Forum on Pervasive Computing and Communications 2019 - Welcome and Committees","authors":"","doi":"10.1109/percomw.2019.8730726","DOIUrl":"https://doi.org/10.1109/percomw.2019.8730726","url":null,"abstract":"","PeriodicalId":437017,"journal":{"name":"2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131447252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An investigation of transfer learning for deep architectures in group activity recognition 基于迁移学习的深层架构群体活动识别研究
Karl Casserfelt, R. Mihailescu
Pervasive technologies permeating our immediate surroundings provide a wide variety of means for sensing and actuating in our environment, having a great potential to impact the way we live, but also how we work. In this paper, we address the problem of activity recognition in office environments, as a means for inferring contextual information in order to automatically and proactively assists people in their daily activities. To this end we employ state-of-the-art image processing techniques and evaluate their capabilities in a real-world setup. Traditional machine learning is characterized by instances where both the training and test data share the same distribution. When this is not the case, the performance of the learned model is deteriorated. However, often times, the data is expensive or difficult to collect and label. It is therefore important to develop techniques that are able to make the best possible use of existing data sets from related domains, relative to the target domain. To this end, we further investigate in this work transfer learning techniques in deep learning architectures for the task of activity recognition in office settings. We provide herein a solution model that attains a 94% accuracy under the right conditions.
无处不在的技术渗透到我们周围的环境中,为我们的环境提供了各种各样的传感和驱动手段,有很大的潜力影响我们的生活方式,也影响我们的工作方式。在本文中,我们解决了办公环境中的活动识别问题,作为推断上下文信息的一种手段,以便自动和主动地帮助人们进行日常活动。为此,我们采用了最先进的图像处理技术,并在现实世界中评估了它们的能力。传统机器学习的特点是训练数据和测试数据共享相同的分布。如果不是这样,学习模型的性能就会下降。然而,通常情况下,数据是昂贵的或难以收集和标记。因此,重要的是开发能够尽可能充分利用相对于目标领域的相关领域的现有数据集的技术。为此,我们在这项工作中进一步研究了用于办公环境中活动识别任务的深度学习架构中的迁移学习技术。我们在此提供了一个解决方案模型,在适当的条件下达到94%的准确率。
{"title":"An investigation of transfer learning for deep architectures in group activity recognition","authors":"Karl Casserfelt, R. Mihailescu","doi":"10.1109/PERCOMW.2019.8730589","DOIUrl":"https://doi.org/10.1109/PERCOMW.2019.8730589","url":null,"abstract":"Pervasive technologies permeating our immediate surroundings provide a wide variety of means for sensing and actuating in our environment, having a great potential to impact the way we live, but also how we work. In this paper, we address the problem of activity recognition in office environments, as a means for inferring contextual information in order to automatically and proactively assists people in their daily activities. To this end we employ state-of-the-art image processing techniques and evaluate their capabilities in a real-world setup. Traditional machine learning is characterized by instances where both the training and test data share the same distribution. When this is not the case, the performance of the learned model is deteriorated. However, often times, the data is expensive or difficult to collect and label. It is therefore important to develop techniques that are able to make the best possible use of existing data sets from related domains, relative to the target domain. To this end, we further investigate in this work transfer learning techniques in deep learning architectures for the task of activity recognition in office settings. We provide herein a solution model that attains a 94% accuracy under the right conditions.","PeriodicalId":437017,"journal":{"name":"2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132535416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Origin-Destination Tracking Analysis of an Intelligent Transit Bus System using Internet of Things 基于物联网的智能公交系统始发目的地跟踪分析
Samy El-Tawab, Zachary Yorio, A. Salman, Raymond Oram, B. Park
There is a dramatic increase in the deployment of Internet of Things (IoT) devices in the last couple of years. In Intelligent Transportation Systems (ITS), we introduced a cyber-physical system that monitors the quality of service (QoS) for transit buses around a mid-size university city using Internet of Things (IoT). The sensing IoT devices detected the number of riders waiting for the bus system at each bus station. The experiments ran for six weeks continuously to monitor seven different bus stations around the university. The collected data reports the number of people waiting for the bus at each station, the wait time for a particular bus station at different time/day(s). In this paper, we analyze the collected data for the various bus stations and the origin/destination of some riders who used one of the seven stations as origin and destination stations. Also, several security measurements have been added to address privacy concerns that might occur with the collection, transmission, and storage of data in the Cloud (e.g., the privacy of the ridership Media Access Control (MAC) addresses and tracking of a particular bus rider in the system). We implement security measurements to emphasize the privacy protection of bus riders.
在过去几年中,物联网(IoT)设备的部署急剧增加。在智能交通系统(ITS)中,我们介绍了一个网络物理系统,该系统使用物联网(IoT)监控中型大学城周围公交巴士的服务质量(QoS)。感应物联网设备检测每个公交车站等待公交系统的乘客数量。实验连续进行了六周,监测了大学周围七个不同的公交车站。收集到的数据报告了在每个站点等待公共汽车的人数,在不同时间/天(s)等待特定公共汽车站点的时间。在本文中,我们分析了收集到的各个公交车站的数据,以及使用七个车站中的一个作为出发地和目的地的乘客的出发地/目的地。此外,还增加了一些安全措施,以解决在云中收集、传输和存储数据时可能出现的隐私问题(例如,乘客媒体访问控制(MAC)地址的隐私和系统中特定公交乘客的跟踪)。我们实施保安措施,强调保护巴士乘客的私隐。
{"title":"Origin-Destination Tracking Analysis of an Intelligent Transit Bus System using Internet of Things","authors":"Samy El-Tawab, Zachary Yorio, A. Salman, Raymond Oram, B. Park","doi":"10.1109/PERCOMW.2019.8730746","DOIUrl":"https://doi.org/10.1109/PERCOMW.2019.8730746","url":null,"abstract":"There is a dramatic increase in the deployment of Internet of Things (IoT) devices in the last couple of years. In Intelligent Transportation Systems (ITS), we introduced a cyber-physical system that monitors the quality of service (QoS) for transit buses around a mid-size university city using Internet of Things (IoT). The sensing IoT devices detected the number of riders waiting for the bus system at each bus station. The experiments ran for six weeks continuously to monitor seven different bus stations around the university. The collected data reports the number of people waiting for the bus at each station, the wait time for a particular bus station at different time/day(s). In this paper, we analyze the collected data for the various bus stations and the origin/destination of some riders who used one of the seven stations as origin and destination stations. Also, several security measurements have been added to address privacy concerns that might occur with the collection, transmission, and storage of data in the Cloud (e.g., the privacy of the ridership Media Access Control (MAC) addresses and tracking of a particular bus rider in the system). We implement security measurements to emphasize the privacy protection of bus riders.","PeriodicalId":437017,"journal":{"name":"2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132922196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1