首页 > 最新文献

Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises最新文献

英文 中文
Introduction to Ubiquitous Computing 普适计算概论
Pub Date : 2008-06-01 DOI: 10.4018/978-1-59904-832-1.CH001
M. Mühlhäuser, Iryna Gurevych
The present chapter is intended as a lightweight introduction to ubiquitous computing as a whole, in preparation for the more specific book parts and chapters that cover selected aspects. This chapter thus assumes the preface of this book to be prior knowledge. In the following, a brief history of ubiquitous computing (UC) is given first, concentrating on selected facts considered as necessary background for understanding the rest of the book. Some terms and a few important standards are subsequently mentioned that are considered necessary for understanding related literature. For traditional standards like those widespread in the computer networks world, at least superficial knowledge must be assumed since their coverage is impractical for a field with such diverse roots as UC. In the last part of this chapter, we will discuss two kinds of reference architectures, explain why they are important for the furthering of Ubiquitous Computing and for the reader’s understanding, and briefly sketch a few of these architectures by way of example.
本章旨在作为泛在计算整体的轻量级介绍,为更具体的书的部分和章节做准备,这些部分和章节涵盖了选定的方面。因此,本章假定本书的序言是先验知识。在下面,首先给出了普适计算(UC)的简史,重点介绍了一些事实,这些事实被认为是理解本书其余部分的必要背景。随后提到的一些术语和一些重要的标准被认为是理解相关文献所必需的。对于那些在计算机网络世界中广泛传播的传统标准,至少必须假定有肤浅的知识,因为它们的覆盖范围对于UC这样具有多种根源的领域是不切实际的。在本章的最后一部分,我们将讨论两种参考架构,解释为什么它们对普惠计算的进一步发展和读者的理解很重要,并以示例的方式简要概述其中的一些架构。
{"title":"Introduction to Ubiquitous Computing","authors":"M. Mühlhäuser, Iryna Gurevych","doi":"10.4018/978-1-59904-832-1.CH001","DOIUrl":"https://doi.org/10.4018/978-1-59904-832-1.CH001","url":null,"abstract":"The present chapter is intended as a lightweight introduction to ubiquitous computing as a whole, in preparation for the more specific book parts and chapters that cover selected aspects. This chapter thus assumes the preface of this book to be prior knowledge. In the following, a brief history of ubiquitous computing (UC) is given first, concentrating on selected facts considered as necessary background for understanding the rest of the book. Some terms and a few important standards are subsequently mentioned that are considered necessary for understanding related literature. For traditional standards like those widespread in the computer networks world, at least superficial knowledge must be assumed since their coverage is impractical for a field with such diverse roots as UC. In the last part of this chapter, we will discuss two kinds of reference architectures, explain why they are important for the furthering of Ubiquitous Computing and for the reader’s understanding, and briefly sketch a few of these architectures by way of example.","PeriodicalId":443285,"journal":{"name":"Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124150988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Business Grids 业务网格
Pub Date : 1900-01-01 DOI: 10.4018/9781599048321.ch029
W. Gerteis
{"title":"Business Grids","authors":"W. Gerteis","doi":"10.4018/9781599048321.ch029","DOIUrl":"https://doi.org/10.4018/9781599048321.ch029","url":null,"abstract":"","PeriodicalId":443285,"journal":{"name":"Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115934499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Accounting and Charging 会计核算及收费
Pub Date : 1900-01-01 DOI: 10.4018/9781599048321.ch014
B. Stiller, D. Hausheer, Jan Gerke, P. Rácz, C. Morariu, M. Waldburger
{"title":"Accounting and Charging","authors":"B. Stiller, D. Hausheer, Jan Gerke, P. Rácz, C. Morariu, M. Waldburger","doi":"10.4018/9781599048321.ch014","DOIUrl":"https://doi.org/10.4018/9781599048321.ch014","url":null,"abstract":"","PeriodicalId":443285,"journal":{"name":"Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131252080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Adaptive Security for Ubiquitous Computing Systems 泛在计算系统的自适应安全研究
Pub Date : 1900-01-01 DOI: 10.4018/978-1-59904-832-1.ch027
V. Lotz, L. Compagna, K. Wrona
{"title":"Towards Adaptive Security for Ubiquitous Computing Systems","authors":"V. Lotz, L. Compagna, K. Wrona","doi":"10.4018/978-1-59904-832-1.ch027","DOIUrl":"https://doi.org/10.4018/978-1-59904-832-1.ch027","url":null,"abstract":"","PeriodicalId":443285,"journal":{"name":"Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121510587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multimodal Warehouse Project 多式联运仓库项目
Pub Date : 1900-01-01 DOI: 10.4018/978-1-59904-832-1.CH028
Samir Raiyani, Matthias Winkler
In this chapter, we present the Multimodal Warehouse Project, which aimed at applying multimodal interaction to a warehouse picking process. We provide an overview of the warehouse picking procedure as well as the overall architecture of the multimodal picking application and technologies applied to design the application. Furthermore, we describe the execution of user tests of the picking application at a warehouse and present the results of these tests. In this way, the authors hope to provide the reader with a better understanding of how multimodal systems can be built and the opportunities as well as the challenges of applying multimodal technology to real-world application scenarios.
在本章中,我们介绍了多式联运仓库项目,该项目旨在将多式联运交互应用于仓库拣选过程。我们提供了仓库拣选过程的概述,以及多式联运拣选应用程序的整体架构和应用于设计应用程序的技术。此外,我们描述了在仓库中拾取应用程序的用户测试的执行,并给出了这些测试的结果。通过这种方式,作者希望读者能够更好地理解如何构建多式联运系统,以及将多式联运技术应用于实际应用场景的机会和挑战。
{"title":"Multimodal Warehouse Project","authors":"Samir Raiyani, Matthias Winkler","doi":"10.4018/978-1-59904-832-1.CH028","DOIUrl":"https://doi.org/10.4018/978-1-59904-832-1.CH028","url":null,"abstract":"In this chapter, we present the Multimodal Warehouse Project, which aimed at applying multimodal interaction to a warehouse picking process. We provide an overview of the warehouse picking procedure as well as the overall architecture of the multimodal picking application and technologies applied to design the application. Furthermore, we describe the execution of user tests of the picking application at a warehouse and present the results of these tests. In this way, the authors hope to provide the reader with a better understanding of how multimodal systems can be built and the opportunities as well as the challenges of applying multimodal technology to real-world application scenarios.","PeriodicalId":443285,"journal":{"name":"Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128325301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Adapting to the User 适应用户
Pub Date : 1900-01-01 DOI: 10.4018/978-1-59904-832-1.CH013
Matthias Jöst
Adaptation is one of the key requirements to handle the increasing complexity in today’s computing environments. This chapter focuses on the aspect of adaptation that puts the user into focus. In this context it introduces the different adaptation types possible for ubiquitous computing services like interaction, content, and presentation. To allow for an automatic adaptation it is important to get some means about the users. Basic requirements to model the users and approaches to personalize applications will be presented.
适应是处理当今计算环境中日益增加的复杂性的关键需求之一。本章的重点是将用户置于焦点的适应方面。在此上下文中,本文介绍了可能用于泛在计算服务(如交互、内容和表示)的不同适应类型。为了实现自动适应,获取一些关于用户的信息是很重要的。将介绍对用户建模的基本要求和个性化应用程序的方法。
{"title":"Adapting to the User","authors":"Matthias Jöst","doi":"10.4018/978-1-59904-832-1.CH013","DOIUrl":"https://doi.org/10.4018/978-1-59904-832-1.CH013","url":null,"abstract":"Adaptation is one of the key requirements to handle the increasing complexity in today’s computing environments. This chapter focuses on the aspect of adaptation that puts the user into focus. In this context it introduces the different adaptation types possible for ubiquitous computing services like interaction, content, and presentation. To allow for an automatic adaptation it is important to get some means about the users. Basic requirements to model the users and approaches to personalize applications will be presented.","PeriodicalId":443285,"journal":{"name":"Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127619607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Intelligent User Interfaces for Ubiquitous Computing 泛在计算的智能用户界面
Pub Date : 1900-01-01 DOI: 10.4018/978-1-59904-832-1.CH020
R. Malaka
Designing user interfaces for ubiquitous computing applications is a challenging task. In this chapter we discuss how to build intelligent interfaces. The foundations are usability criteria that are valid for all computer products. There are a number of established methods for the design process that can help to meet these goals. In particular participatory and iterative so-called human centered approaches are important for interfaces in ubiquitous computing. The question on how to make interfaces more intelligent is not trivial and there are multiple approaches to enhance either the intelligence of the system or that of the user. Novel interface approaches follow the idea of embodied interaction and put particular emphasis on the situated use of a system and the mental models humans develop in their real-world environment.
为无处不在的计算应用程序设计用户界面是一项具有挑战性的任务。在本章中,我们将讨论如何构建智能接口。其基础是适用于所有计算机产品的可用性标准。有许多既定的设计过程方法可以帮助实现这些目标。特别是参与式和迭代式的所谓以人为中心的方法对于普适计算中的接口非常重要。如何使界面更智能的问题并不是微不足道的,有多种方法可以增强系统或用户的智能。新的界面方法遵循具身交互的思想,并特别强调系统的情境使用和人类在现实世界环境中发展的心理模型。
{"title":"Intelligent User Interfaces for Ubiquitous Computing","authors":"R. Malaka","doi":"10.4018/978-1-59904-832-1.CH020","DOIUrl":"https://doi.org/10.4018/978-1-59904-832-1.CH020","url":null,"abstract":"Designing user interfaces for ubiquitous computing applications is a challenging task. In this chapter we discuss how to build intelligent interfaces. The foundations are usability criteria that are valid for all computer products. There are a number of established methods for the design process that can help to meet these goals. In particular participatory and iterative so-called human centered approaches are important for interfaces in ubiquitous computing. The question on how to make interfaces more intelligent is not trivial and there are multiple approaches to enhance either the intelligence of the system or that of the user. Novel interface approaches follow the idea of embodied interaction and put particular emphasis on the situated use of a system and the mental models humans develop in their real-world environment.","PeriodicalId":443285,"journal":{"name":"Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116816486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Context Models and Context Awareness 上下文模型和上下文感知
Pub Date : 1900-01-01 DOI: 10.4018/978-1-59904-832-1.CH011
M. Hartmann, Gerhard Austaller
Humans use all kinds of information characterizing their current situation, like time, location and identity of persons nearby, to adapt their behavior to the situation and to make decisions. For example, when we speak to a person, we adapt what we say and how we say it to the social rank of the person (e.g., most people would not say “that’s nonsense” to their boss, but would to a friend). All this information is not easily captured, represented and processed by a computer. However, this information can help to build more user-friendly applications that adapt and respond to the user’s current situation. If the computer were aware of the user’s context and its interpretation, it would be able to make decisions on behalf of the user, anticipating user needs like another human would. For example, it would be possible to provide the user only with information relevant to the current situation and thus reduce the cognitive load. This is especially necessary in the area of ubiquitous computing (UC), where the user has to deal with a multitude of different computers, and thus with a multitude of possible distractions. To enable all these devices disappear into background, they have to anticipate the user’s future demands and adapt to the user’s context to reduce the amount of interaction needed. abstract
人类利用各种表征其当前情况的信息,如时间、地点和附近人员的身份,使自己的行为适应这种情况并做出决定。例如,当我们和一个人说话时,我们会根据这个人的社会地位来调整我们说的话和说话的方式(例如,大多数人不会对他们的老板说“那是胡说八道”,但会对朋友说)。所有这些信息都不容易被计算机捕获、表示和处理。但是,这些信息可以帮助构建更加用户友好的应用程序,以适应和响应用户的当前情况。如果计算机知道用户的上下文及其解释,它将能够代表用户做出决定,像另一个人一样预测用户的需求。例如,可以只向用户提供与当前情况有关的信息,从而减少认知负荷。这在无处不在的计算(UC)领域尤其必要,因为用户必须处理大量不同的计算机,因此可能会有大量的干扰。为了使所有这些设备消失在背景中,它们必须预测用户未来的需求,并适应用户的环境,以减少所需的交互量。摘要
{"title":"Context Models and Context Awareness","authors":"M. Hartmann, Gerhard Austaller","doi":"10.4018/978-1-59904-832-1.CH011","DOIUrl":"https://doi.org/10.4018/978-1-59904-832-1.CH011","url":null,"abstract":"Humans use all kinds of information characterizing their current situation, like time, location and identity of persons nearby, to adapt their behavior to the situation and to make decisions. For example, when we speak to a person, we adapt what we say and how we say it to the social rank of the person (e.g., most people would not say “that’s nonsense” to their boss, but would to a friend). All this information is not easily captured, represented and processed by a computer. However, this information can help to build more user-friendly applications that adapt and respond to the user’s current situation. If the computer were aware of the user’s context and its interpretation, it would be able to make decisions on behalf of the user, anticipating user needs like another human would. For example, it would be possible to provide the user only with information relevant to the current situation and thus reduce the cognitive load. This is especially necessary in the area of ubiquitous computing (UC), where the user has to deal with a multitude of different computers, and thus with a multitude of possible distractions. To enable all these devices disappear into background, they have to anticipate the user’s future demands and adapt to the user’s context to reduce the amount of interaction needed. abstract","PeriodicalId":443285,"journal":{"name":"Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124121395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Security for Ubiquitous Computing 普适计算的安全性
Pub Date : 1900-01-01 DOI: 10.4018/978-1-59904-832-1.CH015
Tobias Straub, A. Heinemann
Taking typical ubiquitous computing settings as a starting point, this chapter motivates the need for security. The reader will learn what makes security challenging and what the risks predominant in ubiquitous computing are. The major part of this chapter is dedicated to the description of sample solutions in order to illustrate the wealth of protection mechanisms. A background in IT security is not required as this chapter is self-contained. A brief introduction to the subject is given as well as an overview of cryptographic tools.
本章以典型的普适计算设置为起点,激发了对安全的需求。读者将了解是什么使安全具有挑战性,以及无处不在的计算中主要的风险是什么。本章的主要部分致力于描述示例解决方案,以说明丰富的保护机制。不需要有IT安全方面的背景,因为本章是独立的。简要介绍了该主题以及加密工具的概述。
{"title":"Security for Ubiquitous Computing","authors":"Tobias Straub, A. Heinemann","doi":"10.4018/978-1-59904-832-1.CH015","DOIUrl":"https://doi.org/10.4018/978-1-59904-832-1.CH015","url":null,"abstract":"Taking typical ubiquitous computing settings as a starting point, this chapter motivates the need for security. The reader will learn what makes security challenging and what the risks predominant in ubiquitous computing are. The major part of this chapter is dedicated to the description of sample solutions in order to illustrate the wealth of protection mechanisms. A background in IT security is not required as this chapter is self-contained. A brief introduction to the subject is given as well as an overview of cryptographic tools.","PeriodicalId":443285,"journal":{"name":"Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131340034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart Items in Real Time Enterprises 实时企业中的智能物品
Pub Date : 1900-01-01 DOI: 10.4018/978-1-59904-832-1.CH010
Zoltán Nochta
As you may know, in today’s enterprises many business processes are supported by software systems. Just think of a system that automatically orders machine spare parts ensuring continuous production, and at the same time optimizes warehouse utilization and asset costs of the given company. Traditional enterprise software systems rely on manual collection of data. Since manual data collection is in many cases error prone (think of mistyped product codes, for example), software systems often do not have the correct information to take the best decisions in a given situation. Consequently, this has a negative effect on the quality of the business processes they implement. Examples are delayed order fulfillment, trouble with customers, increasing storage costs, or out of stock situations. When using UC technologies, this situation can be improved: UC technology may help the company capture the status of the enterprise more adequately, or even exactly in the ideal case, and represent in software systems what is happening in reality. abstract
您可能知道,在当今的企业中,许多业务流程是由软件系统支持的。试想一个系统,它可以自动订购机器备件,确保连续生产,同时优化给定公司的仓库利用率和资产成本。传统的企业软件系统依赖于人工收集数据。由于手动数据收集在许多情况下容易出错(例如,想想打错的产品代码),软件系统通常没有正确的信息来在给定情况下做出最佳决策。因此,这对他们实现的业务流程的质量有负面影响。例如延迟订单履行、客户麻烦、存储成本增加或缺货情况。当使用统一通信技术时,这种情况可以得到改善:统一通信技术可以帮助公司更充分地捕捉企业的状态,甚至在理想情况下准确地捕捉企业的状态,并在软件系统中表示现实中正在发生的事情。摘要
{"title":"Smart Items in Real Time Enterprises","authors":"Zoltán Nochta","doi":"10.4018/978-1-59904-832-1.CH010","DOIUrl":"https://doi.org/10.4018/978-1-59904-832-1.CH010","url":null,"abstract":"As you may know, in today’s enterprises many business processes are supported by software systems. Just think of a system that automatically orders machine spare parts ensuring continuous production, and at the same time optimizes warehouse utilization and asset costs of the given company. Traditional enterprise software systems rely on manual collection of data. Since manual data collection is in many cases error prone (think of mistyped product codes, for example), software systems often do not have the correct information to take the best decisions in a given situation. Consequently, this has a negative effect on the quality of the business processes they implement. Examples are delayed order fulfillment, trouble with customers, increasing storage costs, or out of stock situations. When using UC technologies, this situation can be improved: UC technology may help the company capture the status of the enterprise more adequately, or even exactly in the ideal case, and represent in software systems what is happening in reality. abstract","PeriodicalId":443285,"journal":{"name":"Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134550713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1