首页 > 最新文献

2012 IEEE 31st Symposium on Reliable Distributed Systems最新文献

英文 中文
Energy-Efficient and Fault-Tolerant Structural Health Monitoring in Wireless Sensor Networks 无线传感器网络中节能和容错结构健康监测
Pub Date : 2012-10-08 DOI: 10.1109/SRDS.2012.26
Md. Zakirul Alam Bhuiyan, Jiannong Cao, Guojun Wang, Xuefeng Liu
Wireless sensor networks (WSNs) have become an increasingly compelling platform for structural health monitoring (SHM) due to relatively low-cost, easy installation, etc. However, the challenge of effectively monitoring structural health condition (e.g., damage) under WSN constraints (e.g., limited energy, narrow bandwidth) and sensor faults has not been studied before. In this paper, we focus on tolerating sensor faults in WSN-based SHM. We design a distributed WSN framework for SHM and then examine its ability to cope with sensor faults. We bring attention to an undiscovered yet interesting fact, i.e., the real measured signals introduced by faulty sensors may cause an undamaged location to be identified as damaged (false positive) or a damaged location as undamaged (false negative) diagnosis. This can be caused by faults in sensor bonding, precision degradation, amplification gain, bias, drift, noise, and so forth. We present a distributed algorithm to detect such types of faults, and offer an online signal reconstruction algorithm to recover from the wrong diagnosis. Through simulations and a WSN prototype system, we evaluate the effectiveness of our proposed algorithms.
无线传感器网络(WSNs)由于其相对低成本、易于安装等优点,已成为结构健康监测(SHM)的一个越来越受欢迎的平台。然而,在WSN约束(如有限能量、窄带宽)和传感器故障情况下,有效监测结构健康状况(如损伤)的挑战此前尚未得到研究。本文主要研究基于wsn的SHM中传感器故障的容错问题。我们设计了一个基于SHM的分布式WSN框架,并检验了其处理传感器故障的能力。我们注意到一个未被发现但有趣的事实,即由故障传感器引入的真实测量信号可能导致未损坏位置被识别为损坏(假阳性)或损坏位置被识别为未损坏(假阴性)诊断。这可能是由传感器连接故障、精度下降、放大增益、偏置、漂移、噪声等引起的。我们提出了一种分布式算法来检测这类故障,并提供了一种在线信号重建算法来从错误诊断中恢复。通过仿真和一个WSN原型系统,我们评估了所提出算法的有效性。
{"title":"Energy-Efficient and Fault-Tolerant Structural Health Monitoring in Wireless Sensor Networks","authors":"Md. Zakirul Alam Bhuiyan, Jiannong Cao, Guojun Wang, Xuefeng Liu","doi":"10.1109/SRDS.2012.26","DOIUrl":"https://doi.org/10.1109/SRDS.2012.26","url":null,"abstract":"Wireless sensor networks (WSNs) have become an increasingly compelling platform for structural health monitoring (SHM) due to relatively low-cost, easy installation, etc. However, the challenge of effectively monitoring structural health condition (e.g., damage) under WSN constraints (e.g., limited energy, narrow bandwidth) and sensor faults has not been studied before. In this paper, we focus on tolerating sensor faults in WSN-based SHM. We design a distributed WSN framework for SHM and then examine its ability to cope with sensor faults. We bring attention to an undiscovered yet interesting fact, i.e., the real measured signals introduced by faulty sensors may cause an undamaged location to be identified as damaged (false positive) or a damaged location as undamaged (false negative) diagnosis. This can be caused by faults in sensor bonding, precision degradation, amplification gain, bias, drift, noise, and so forth. We present a distributed algorithm to detect such types of faults, and offer an online signal reconstruction algorithm to recover from the wrong diagnosis. Through simulations and a WSN prototype system, we evaluate the effectiveness of our proposed algorithms.","PeriodicalId":447700,"journal":{"name":"2012 IEEE 31st Symposium on Reliable Distributed Systems","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115719020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
TAIRO: Trust-Aware Automatic Incremental Routing for Opportunistic Resource Utilization Networks TAIRO:机会资源利用网络的信任感知自动增量路由
Pub Date : 2012-10-08 DOI: 10.1109/SRDS.2012.73
Joseph W. Baird
Oppnets, or Opportunistic Resource Utilization Networks, are a kind of ad hoc computer network that grows by discovering and integrating previously unencountered devices or systems with desirable resources (Oppnets are a predecessor and a generalization of opportunistic networks proposed by others). We present work in progress on TAIRO or Trust-aware Automatic Incremental Routing for Oppnets. TAIRO is based on the innovative AIR routing scheme. AIR uses specially designed prefix labels to manage routing in an ad hoc network, which is especially well-suited for meeting the goals of Oppnets.
Oppnets或机会资源利用网络,是一种通过发现和整合以前未遇到的具有理想资源的设备或系统而发展起来的自组织计算机网络(Oppnets是其他人提出的机会网络的前身和推广)。我们介绍了正在进行的TAIRO或Oppnets的信任感知自动增量路由。TAIRO基于创新的AIR路由方案。AIR使用特别设计的前缀标签来管理ad hoc网络中的路由,这特别适合于满足Oppnets的目标。
{"title":"TAIRO: Trust-Aware Automatic Incremental Routing for Opportunistic Resource Utilization Networks","authors":"Joseph W. Baird","doi":"10.1109/SRDS.2012.73","DOIUrl":"https://doi.org/10.1109/SRDS.2012.73","url":null,"abstract":"Oppnets, or Opportunistic Resource Utilization Networks, are a kind of ad hoc computer network that grows by discovering and integrating previously unencountered devices or systems with desirable resources (Oppnets are a predecessor and a generalization of opportunistic networks proposed by others). We present work in progress on TAIRO or Trust-aware Automatic Incremental Routing for Oppnets. TAIRO is based on the innovative AIR routing scheme. AIR uses specially designed prefix labels to manage routing in an ad hoc network, which is especially well-suited for meeting the goals of Oppnets.","PeriodicalId":447700,"journal":{"name":"2012 IEEE 31st Symposium on Reliable Distributed Systems","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116441320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Quick and Reliable Routing for Infrastructure Surveillance with Wireless Sensor Networks 基于无线传感器网络的基础设施监控的快速可靠路由
Pub Date : 2012-10-08 DOI: 10.1109/SRDS.2012.83
Zhen Jiang, Jie Wu, M. Guo, Zhenping Zhao, Donghong Wu
In many applications, WSNs are deployed to monitor the impact of the forces of nature on the infrastructure safety, e.g. bridge collapse detection [6]. It is very important for the routing to send surveillance results without any unnecessary delay, which can be caused by extra transmissions in a detour or an unexpected wait for the availability of the relay successor and the corresponding link connection.
在许多应用中,无线传感器网络被用于监测自然力量对基础设施安全的影响,例如桥梁倒塌检测[6]。对于路由发送监控结果来说,避免不必要的延迟是非常重要的,这些延迟可能是由于绕路或意外等待中继后继者和相应链路连接的可用性而导致的额外传输。
{"title":"A Quick and Reliable Routing for Infrastructure Surveillance with Wireless Sensor Networks","authors":"Zhen Jiang, Jie Wu, M. Guo, Zhenping Zhao, Donghong Wu","doi":"10.1109/SRDS.2012.83","DOIUrl":"https://doi.org/10.1109/SRDS.2012.83","url":null,"abstract":"In many applications, WSNs are deployed to monitor the impact of the forces of nature on the infrastructure safety, e.g. bridge collapse detection [6]. It is very important for the routing to send surveillance results without any unnecessary delay, which can be caused by extra transmissions in a detour or an unexpected wait for the availability of the relay successor and the corresponding link connection.","PeriodicalId":447700,"journal":{"name":"2012 IEEE 31st Symposium on Reliable Distributed Systems","volume":"185 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122771093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reliable Distributed Real-Time and Embedded Systems through Safe Middleware Adaptation 基于安全中间件适配的可靠分布式实时嵌入式系统
Pub Date : 2012-10-01 DOI: 10.1109/SRDS.2012.59
Akshay Dabholkar, A. Dubey, A. Gokhale, G. Karsai, N. Mahadevan
Distributed real-time and embedded (DRE) systems are a class of real-time systems formed through a composition of predominantly legacy, closed and statically scheduled real-time subsystems, which comprise over-provisioned resources to deal with worst-case failure scenarios. The formation of the system-of-systems leads to a new range of faults that manifest at different granularities for which no statically defined fault tolerance scheme applies. Thus, dynamic and adaptive fault tolerance mechanisms are needed which must execute within the available resources without compromising the safety and timeliness of existing real-time tasks in the individual subsystems. To address these requirements, this paper describes a middleware solution called Safe Middleware Adaptation for Real-Time Fault Tolerance (SafeMAT), which opportunistically leverages the available slack in the over-provisioned resources of individual subsystems. SafeMAT comprises three primary artifacts: (1) a flexible and configurable distributed, runtime resource monitoring framework that can pinpoint in real-time the available slack in the system that is used in making dynamic and adaptive fault tolerance decisions, (2) a safe and resource aware dynamic failure adaptation algorithm that enables efficient recovery from different granularities of failures within the available slack in the execution schedule while ensuring real-time constraints are not violated and resources are not overloaded, and (3) a framework that empirically validates the correctness of the dynamic mechanisms and the safety of the DRE system. Experimental results evaluating SafeMAT on an avionics application indicates that SafeMAT incurs only 9-15% runtime fail over and 2-6% processor utilization overheads thereby providing safe and predictable failure adaptability in real-time.
分布式实时和嵌入式(DRE)系统是一类实时系统,主要由遗留的、封闭的和静态调度的实时子系统组成,这些子系统包括过度供应的资源来处理最坏的故障场景。系统的系统的形成导致了一系列新的故障,这些故障在不同的粒度上表现出来,而静态定义的容错方案不适用于这些故障。因此,需要动态和自适应容错机制,该机制必须在可用资源内执行,而不会损害各个子系统中现有实时任务的安全性和及时性。为了满足这些需求,本文描述了一种称为安全中间件适应实时容错(SafeMAT)的中间件解决方案,该解决方案利用了单个子系统过度供应的资源中的可用空闲。SafeMAT包括三个主要构件:(1)一个灵活可配置的分布式运行时资源监控框架,可以实时精确定位系统中可用的空闲时间,用于动态和自适应容错决策;(2)一个安全和资源感知的动态故障自适应算法,可以在执行计划中的可用空闲时间内从不同粒度的故障中高效恢复,同时确保不违反实时约束和资源不过载;(3)实证验证DRE系统动态机制正确性和安全性的框架。在航空电子应用中评估SafeMAT的实验结果表明,SafeMAT仅产生9-15%的运行时故障转移和2-6%的处理器使用开销,从而提供安全和可预测的实时故障适应性。
{"title":"Reliable Distributed Real-Time and Embedded Systems through Safe Middleware Adaptation","authors":"Akshay Dabholkar, A. Dubey, A. Gokhale, G. Karsai, N. Mahadevan","doi":"10.1109/SRDS.2012.59","DOIUrl":"https://doi.org/10.1109/SRDS.2012.59","url":null,"abstract":"Distributed real-time and embedded (DRE) systems are a class of real-time systems formed through a composition of predominantly legacy, closed and statically scheduled real-time subsystems, which comprise over-provisioned resources to deal with worst-case failure scenarios. The formation of the system-of-systems leads to a new range of faults that manifest at different granularities for which no statically defined fault tolerance scheme applies. Thus, dynamic and adaptive fault tolerance mechanisms are needed which must execute within the available resources without compromising the safety and timeliness of existing real-time tasks in the individual subsystems. To address these requirements, this paper describes a middleware solution called Safe Middleware Adaptation for Real-Time Fault Tolerance (SafeMAT), which opportunistically leverages the available slack in the over-provisioned resources of individual subsystems. SafeMAT comprises three primary artifacts: (1) a flexible and configurable distributed, runtime resource monitoring framework that can pinpoint in real-time the available slack in the system that is used in making dynamic and adaptive fault tolerance decisions, (2) a safe and resource aware dynamic failure adaptation algorithm that enables efficient recovery from different granularities of failures within the available slack in the execution schedule while ensuring real-time constraints are not violated and resources are not overloaded, and (3) a framework that empirically validates the correctness of the dynamic mechanisms and the safety of the DRE system. Experimental results evaluating SafeMAT on an avionics application indicates that SafeMAT incurs only 9-15% runtime fail over and 2-6% processor utilization overheads thereby providing safe and predictable failure adaptability in real-time.","PeriodicalId":447700,"journal":{"name":"2012 IEEE 31st Symposium on Reliable Distributed Systems","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125662993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Regenerating Codes: A System Perspective 代码再生:系统视角
Pub Date : 2012-04-23 DOI: 10.1145/2506164.2506170
Steve Jiekak, Anne-Marie Kermarrec, Nicolas Le Scouarnec, G. Straub, Alexandre van Kempen
The explosion of the amount of data stored in cloud systems calls for more efficient paradigms for redundancy. While replication is widely used to ensure data availability, erasure correcting codes provide a much better trade-off between storage and availability. Regenerating codes are good candidates for they also offer low repair costs in term of network bandwidth. While they have been proven optimal, they are difficult to understand and parameterize. In this paper we provide an analysis of regenerating codes for practitioners to grasp the various trade-offs. More specifically we make two contributions: (i) we study the impact of the parameters by conducting an analysis at the level of the system, rather than at the level of a single device, (ii) we compare the computational costs of various implementations of codes and highlight the most efficient ones. Our goal is to provide system designers with concrete information to help them choose the best parameters and design for regenerating codes.
存储在云系统中的数据量的爆炸式增长需要更有效的冗余模式。虽然复制被广泛用于确保数据可用性,但擦除纠错码在存储和可用性之间提供了更好的权衡。再生代码是很好的选择,因为它们在网络带宽方面提供了较低的修复成本。虽然它们已被证明是最佳的,但它们难以理解和参数化。在本文中,我们为从业者提供了一个再生代码的分析,以掌握各种权衡。更具体地说,我们做出了两个贡献:(i)我们通过在系统层面进行分析来研究参数的影响,而不是在单个设备层面,(ii)我们比较了各种代码实现的计算成本,并突出了最有效的代码。我们的目标是为系统设计人员提供具体的信息,以帮助他们选择最佳参数和设计再生代码。
{"title":"Regenerating Codes: A System Perspective","authors":"Steve Jiekak, Anne-Marie Kermarrec, Nicolas Le Scouarnec, G. Straub, Alexandre van Kempen","doi":"10.1145/2506164.2506170","DOIUrl":"https://doi.org/10.1145/2506164.2506170","url":null,"abstract":"The explosion of the amount of data stored in cloud systems calls for more efficient paradigms for redundancy. While replication is widely used to ensure data availability, erasure correcting codes provide a much better trade-off between storage and availability. Regenerating codes are good candidates for they also offer low repair costs in term of network bandwidth. While they have been proven optimal, they are difficult to understand and parameterize. In this paper we provide an analysis of regenerating codes for practitioners to grasp the various trade-offs. More specifically we make two contributions: (i) we study the impact of the parameters by conducting an analysis at the level of the system, rather than at the level of a single device, (ii) we compare the computational costs of various implementations of codes and highlight the most efficient ones. Our goal is to provide system designers with concrete information to help them choose the best parameters and design for regenerating codes.","PeriodicalId":447700,"journal":{"name":"2012 IEEE 31st Symposium on Reliable Distributed Systems","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132390708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
Private Anonymous Messaging 私人匿名消息
Pub Date : 2012-04-03 DOI: 10.1109/SRDS.2012.51
R. Fernando, B. Bhargava, M. Linderman
Messaging systems where a user maintains a set of contacts and broadcasts messages to them is very common. We address the problem of a contact obtaining a message that it missed, from other contacts of the user while maintaining anonymity of all parties involved. We identify a set of requirements in addressing this problem and propose a modification to the hierarchical identity based encryption scheme proposed by Boneh et. al. We briefly present an implementation of the proposed cryptographic primitives as a proof of concept.
在消息传递系统中,用户维护一组联系人并向他们广播消息是非常常见的。我们解决了联系人从用户的其他联系人那里获得它错过的消息的问题,同时保持了所有相关方的匿名性。我们确定了解决此问题的一组要求,并提出了对Boneh等人提出的基于分层身份的加密方案的修改。我们简要地介绍了所提出的加密原语的实现,作为概念证明。
{"title":"Private Anonymous Messaging","authors":"R. Fernando, B. Bhargava, M. Linderman","doi":"10.1109/SRDS.2012.51","DOIUrl":"https://doi.org/10.1109/SRDS.2012.51","url":null,"abstract":"Messaging systems where a user maintains a set of contacts and broadcasts messages to them is very common. We address the problem of a contact obtaining a message that it missed, from other contacts of the user while maintaining anonymity of all parties involved. We identify a set of requirements in addressing this problem and propose a modification to the hierarchical identity based encryption scheme proposed by Boneh et. al. We briefly present an implementation of the proposed cryptographic primitives as a proof of concept.","PeriodicalId":447700,"journal":{"name":"2012 IEEE 31st Symposium on Reliable Distributed Systems","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131290602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
LogMaster: Mining Event Correlations in Logs of Large-Scale Cluster Systems LogMaster:挖掘大规模集群系统日志中的事件相关性
Pub Date : 2010-03-03 DOI: 10.1109/SRDS.2012.40
Xiaoyu Fu, Rui Ren, Jianfeng Zhan, Wei Zhou, Zhen Jia, Gang Lu
This paper presents a set of innovative algorithms and a system, named Log Master, for mining correlations of events that have multiple attributions, i.e., node ID, application ID, event type, and event severity, in logs of large-scale cloud and HPC systems. Different from traditional transactional data, e.g., supermarket purchases, system logs have their unique characteristics, and hence we propose several innovative approaches to mining their correlations. We parse logs into an n-ary sequence where each event is identified by an informative nine-tuple. We propose a set of enhanced apriori-like algorithms for improving sequence mining efficiency, we propose an innovative abstraction-event correlation graphs (ECGs) to represent event correlations, and present an ECGs-based algorithm for fast predicting events. The experimental results on three logs of production cloud and HPC systems, varying from 433490 entries to 4747963 entries, show that our method can predict failures with a high precision and an acceptable recall rates.
本文提出了一套创新的算法和Log Master系统,用于挖掘大型云和高性能计算系统日志中具有多个属性(节点ID、应用ID、事件类型和事件严重性)的事件相关性。与传统的事务性数据(如超市购买)不同,系统日志有其独特的特征,因此我们提出了几种创新的方法来挖掘它们的相关性。我们将日志解析为n元序列,其中每个事件由一个信息丰富的九元组标识。我们提出了一套增强的类先验算法来提高序列挖掘效率,我们提出了一种创新的抽象-事件关联图(ECGs)来表示事件相关性,并提出了一种基于ECGs的快速预测事件的算法。在生产云和高性能计算系统的3个日志上,从433490条到4747963条的实验结果表明,我们的方法能够以较高的准确率和可接受的召回率预测故障。
{"title":"LogMaster: Mining Event Correlations in Logs of Large-Scale Cluster Systems","authors":"Xiaoyu Fu, Rui Ren, Jianfeng Zhan, Wei Zhou, Zhen Jia, Gang Lu","doi":"10.1109/SRDS.2012.40","DOIUrl":"https://doi.org/10.1109/SRDS.2012.40","url":null,"abstract":"This paper presents a set of innovative algorithms and a system, named Log Master, for mining correlations of events that have multiple attributions, i.e., node ID, application ID, event type, and event severity, in logs of large-scale cloud and HPC systems. Different from traditional transactional data, e.g., supermarket purchases, system logs have their unique characteristics, and hence we propose several innovative approaches to mining their correlations. We parse logs into an n-ary sequence where each event is identified by an informative nine-tuple. We propose a set of enhanced apriori-like algorithms for improving sequence mining efficiency, we propose an innovative abstraction-event correlation graphs (ECGs) to represent event correlations, and present an ECGs-based algorithm for fast predicting events. The experimental results on three logs of production cloud and HPC systems, varying from 433490 entries to 4747963 entries, show that our method can predict failures with a high precision and an acceptable recall rates.","PeriodicalId":447700,"journal":{"name":"2012 IEEE 31st Symposium on Reliable Distributed Systems","volume":"59 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116383266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 101
期刊
2012 IEEE 31st Symposium on Reliable Distributed Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1