首页 > 最新文献

Journal of Systems Architecture最新文献

英文 中文
SEDCPT: A secure and efficient Dynamic Searchable Encryption scheme with cluster padding assisted by TEE SEDCPT:一种由 TEE 辅助的带有集群填充的安全高效的动态可搜索加密方案
IF 3.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-05 DOI: 10.1016/j.sysarc.2024.103221
Bao Li , Fucai Zhou , Qiang Wang , Jian Xu , Da Feng

Dynamic Searchable Symmetric Encryption (DSSE), which enables users to search and update encrypted data on an untrusted server without decryption, is a proven method when dealing with availability issues for outsourced data. However, the existing DSSE schemes suffer from forward and backward privacy problems. Although forward and backward privacy DSSE schemes can prevent these attacks, they still suffer from other challenges, such as count attacks, high communication overhead, and low computing efficiency. To solve the above problems simultaneously, we propose a secure and efficient dynamic searchable encryption scheme, which integrates a clustering algorithm, padding strategy, and trusted execution environments (TEE). The purpose of the scheme is to prevent count attacks while ensuring forward and backward privacy security. Our scheme also reduces the computing overhead and storage cost of the client by using TEE (e.g. Intel Software Guard Extension, Intel SGX) while maximizing the protection of client privacy. Furthermore, the scheme provides a secure hardware isolation environment for the cluster padding and search/update process to prevent malicious attacks from external software or super administrators. Finally, we provide corresponding security proofs and experimental evaluation which demonstrate both the security and efficiency of our scheme, respectively.

动态可搜索对称加密(DSSE)使用户能够在不信任的服务器上搜索和更新加密数据而无需解密,是处理外包数据可用性问题的一种行之有效的方法。然而,现有的 DSSE 方案存在前向和后向隐私问题。尽管前向和后向隐私 DSSE 方案可以防止这些攻击,但它们仍然面临其他挑战,如计数攻击、高通信开销和低计算效率。为了同时解决上述问题,我们提出了一种安全高效的动态可搜索加密方案,该方案集成了聚类算法、填充策略和可信执行环境(TEE)。该方案的目的是防止计数攻击,同时确保前向和后向隐私安全。我们的方案还通过使用 TEE(如 Intel Software Guard Extension,Intel SGX)降低了客户端的计算开销和存储成本,同时最大限度地保护了客户端的隐私。此外,该方案还为集群填充和搜索/更新过程提供了安全的硬件隔离环境,以防止来自外部软件或超级管理员的恶意攻击。最后,我们提供了相应的安全证明和实验评估,分别证明了我们方案的安全性和效率。
{"title":"SEDCPT: A secure and efficient Dynamic Searchable Encryption scheme with cluster padding assisted by TEE","authors":"Bao Li ,&nbsp;Fucai Zhou ,&nbsp;Qiang Wang ,&nbsp;Jian Xu ,&nbsp;Da Feng","doi":"10.1016/j.sysarc.2024.103221","DOIUrl":"https://doi.org/10.1016/j.sysarc.2024.103221","url":null,"abstract":"<div><p>Dynamic Searchable Symmetric Encryption (DSSE), which enables users to search and update encrypted data on an untrusted server without decryption, is a proven method when dealing with availability issues for outsourced data. However, the existing DSSE schemes suffer from forward and backward privacy problems. Although forward and backward privacy DSSE schemes can prevent these attacks, they still suffer from other challenges, such as count attacks, high communication overhead, and low computing efficiency. To solve the above problems simultaneously, we propose a secure and efficient dynamic searchable encryption scheme, which integrates a clustering algorithm, padding strategy, and trusted execution environments (TEE). The purpose of the scheme is to prevent count attacks while ensuring forward and backward privacy security. Our scheme also reduces the computing overhead and storage cost of the client by using TEE (e.g. Intel Software Guard Extension, Intel SGX) while maximizing the protection of client privacy. Furthermore, the scheme provides a secure hardware isolation environment for the cluster padding and search/update process to prevent malicious attacks from external software or super administrators. Finally, we provide corresponding security proofs and experimental evaluation which demonstrate both the security and efficiency of our scheme, respectively.</p></div>","PeriodicalId":50027,"journal":{"name":"Journal of Systems Architecture","volume":"154 ","pages":"Article 103221"},"PeriodicalIF":3.7,"publicationDate":"2024-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141596350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-enabled data sharing for IoT: A lightweight, secure and searchable scheme 物联网的区块链数据共享:轻量级、安全且可搜索的方案
IF 3.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-05 DOI: 10.1016/j.sysarc.2024.103230
Qingqing Xie , Fatong Zhu , Xia Feng

With the popularity of Internet of Things (IoT) applications, data sharing among IoT devices has become more frequent. Many researchers have proposed fine-grained access control schemes and searchable encryption algorithms to support privacy-preserving data sharing. But there still exist two challenges. First, the existing schemes are computationally intensive, making them unsuitable for resource-limited IoT terminals. Second, they rely on a central server to honestly conduct search operations, making them unable to tackle malicious servers. To this end, we propose a blockchain-enabled data-sharing scheme for IoT that supports lightweight, secure, and searchable data sharing. We design an outsourcing attribute-based encryption algorithm to alleviate the overhead of resource-limited IoT terminals, which reduces the local encryption and decryption to a constant level. Instead of relying on central servers, we leverage smart contract to execute ciphertext retrieval, ensuring the accuracy of search results. Formal security analysis demonstrates that the proposed scheme is chosen-plaintext secure under the DBDH assumption. Experimental simulation shows that it reduces the search time by at least 79.9%, the encryption and decryption complexities to both O(1).

随着物联网(IoT)应用的普及,物联网设备之间的数据共享变得越来越频繁。许多研究人员提出了细粒度访问控制方案和可搜索加密算法,以支持保护隐私的数据共享。但仍然存在两个挑战。首先,现有方案计算量大,不适合资源有限的物联网终端。其次,它们依赖于中央服务器来诚实地执行搜索操作,因此无法应对恶意服务器。为此,我们提出了一种支持轻量级、安全和可搜索数据共享的物联网区块链数据共享方案。我们设计了一种基于外包属性的加密算法,以减轻资源有限的物联网终端的开销,从而将本地加密和解密降低到恒定水平。我们不依赖中央服务器,而是利用智能合约来执行密文检索,确保了搜索结果的准确性。形式安全分析表明,在 DBDH 假设下,所提出的方案是选择-明文安全的。实验仿真表明,该方案至少缩短了 79.9% 的搜索时间,加密和解密复杂度均降低到了.0%。
{"title":"Blockchain-enabled data sharing for IoT: A lightweight, secure and searchable scheme","authors":"Qingqing Xie ,&nbsp;Fatong Zhu ,&nbsp;Xia Feng","doi":"10.1016/j.sysarc.2024.103230","DOIUrl":"10.1016/j.sysarc.2024.103230","url":null,"abstract":"<div><p>With the popularity of Internet of Things (IoT) applications, data sharing among IoT devices has become more frequent. Many researchers have proposed fine-grained access control schemes and searchable encryption algorithms to support privacy-preserving data sharing. But there still exist two challenges. First, the existing schemes are computationally intensive, making them unsuitable for resource-limited IoT terminals. Second, they rely on a central server to honestly conduct search operations, making them unable to tackle malicious servers. To this end, we propose a blockchain-enabled data-sharing scheme for IoT that supports lightweight, secure, and searchable data sharing. We design an outsourcing attribute-based encryption algorithm to alleviate the overhead of resource-limited IoT terminals, which reduces the local encryption and decryption to a constant level. Instead of relying on central servers, we leverage smart contract to execute ciphertext retrieval, ensuring the accuracy of search results. Formal security analysis demonstrates that the proposed scheme is chosen-plaintext secure under the DBDH assumption. Experimental simulation shows that it reduces the search time by at least 79.9%, the encryption and decryption complexities to both <span><math><mrow><mi>O</mi><mrow><mo>(</mo><mn>1</mn><mo>)</mo></mrow></mrow></math></span>.</p></div>","PeriodicalId":50027,"journal":{"name":"Journal of Systems Architecture","volume":"154 ","pages":"Article 103230"},"PeriodicalIF":3.7,"publicationDate":"2024-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141587634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A revocable and comparable attribute-based signature scheme from lattices for IoMT 用于 IoMT 的可撤销和可比较的基于属性的网格签名方案
IF 3.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-04 DOI: 10.1016/j.sysarc.2024.103222
Liu Liu , Chingfang Hsu , Man Ho Au , Lein Harn , Jianqun Cui , Zhuo Zhao

The Internet of Medical Things (IoMT) refers to the utilization of the Internet of Things (IoT) technology in the healthcare industry. Access control is particularly important for IoMT due to the sensitive nature of patient data, such as electronic health records (EHR). Although fine-grained access control can be achieved by attribute-based signature (ABS), existing ABS schemes lacks the ability to provide range comparison access policy in which patients can check whether the attribute value is within a certain range. In addition, the dynamic change of doctors’ permissions and the development of quantum technology also require that ABS can provide user revocation and resist quantum attacks. In order to solve these problems and make ABS schemes for IoMT more useful and more secure, we come up with a novel revocable and comparable ABS (RC-ABS) from lattices for IoMT, enabling fine-grained access control, attribute range comparison, and user revocation. First of all, we provide a proof of the unforgeability of our scheme in the standard model (SM) under the selective user revocation list semi-adaptive attribute adaptive message attack, which can resist attacks by semi-honest adversaries and prevent adversaries from attacking the weaknesses of hash functions in IoMT. Furthermore, our ABS scheme leverages the small integer solution problem (SIS) to effectively defends against quantum algorithm attacks. Finally, detailed performance analysis demonstrates that our solution not only possesses enhanced security features and functionalities, such as revocability, comparability, and resistance against quantum attacks, but also maintains a constant computation cost of user revocation, making it more efficient compared to other revocation schemes.

医疗物联网(IoMT)是指在医疗保健行业利用物联网(IoT)技术。由于电子健康记录(EHR)等患者数据的敏感性,访问控制对 IoMT 尤为重要。虽然基于属性的签名(ABS)可以实现细粒度访问控制,但现有的 ABS 方案缺乏提供范围比较访问策略的能力,患者无法检查属性值是否在一定范围内。此外,医生权限的动态变化和量子技术的发展也要求 ABS 能够提供用户撤销和抵御量子攻击的功能。为了解决这些问题,使用于物联网医疗的 ABS 方案更有用、更安全,我们提出了一种新颖的可撤销和可比较的 ABS(RC-ABS),它来自用于物联网医疗的网格,能够实现细粒度访问控制、属性范围比较和用户撤销。首先,我们证明了在标准模型(SM)中,我们的方案在选择性用户撤销列表半自适应属性自适应消息攻击下的不可伪造性,可以抵御半诚实对手的攻击,防止对手攻击 IoMT 中哈希函数的弱点。此外,我们的 ABS 方案利用小整数解问题(SIS)有效抵御了量子算法攻击。最后,详细的性能分析表明,我们的方案不仅具有更强的安全特性和功能,如可撤销性、可比性和抗量子攻击性,还能保持用户撤销的计算成本不变,因此与其他撤销方案相比更高效。
{"title":"A revocable and comparable attribute-based signature scheme from lattices for IoMT","authors":"Liu Liu ,&nbsp;Chingfang Hsu ,&nbsp;Man Ho Au ,&nbsp;Lein Harn ,&nbsp;Jianqun Cui ,&nbsp;Zhuo Zhao","doi":"10.1016/j.sysarc.2024.103222","DOIUrl":"10.1016/j.sysarc.2024.103222","url":null,"abstract":"<div><p>The Internet of Medical Things (IoMT) refers to the utilization of the Internet of Things (IoT) technology in the healthcare industry. Access control is particularly important for IoMT due to the sensitive nature of patient data, such as electronic health records (EHR). Although fine-grained access control can be achieved by attribute-based signature (ABS), existing ABS schemes lacks the ability to provide range comparison access policy in which patients can check whether the attribute value is within a certain range. In addition, the dynamic change of doctors’ permissions and the development of quantum technology also require that ABS can provide user revocation and resist quantum attacks. In order to solve these problems and make ABS schemes for IoMT more useful and more secure, we come up with a novel revocable and comparable ABS (RC-ABS) from lattices for IoMT, enabling fine-grained access control, attribute range comparison, and user revocation. First of all, we provide a proof of the unforgeability of our scheme in the standard model (SM) under the selective user revocation list semi-adaptive attribute adaptive message attack, which can resist attacks by semi-honest adversaries and prevent adversaries from attacking the weaknesses of hash functions in IoMT. Furthermore, our ABS scheme leverages the small integer solution problem (SIS) to effectively defends against quantum algorithm attacks. Finally, detailed performance analysis demonstrates that our solution not only possesses enhanced security features and functionalities, such as revocability, comparability, and resistance against quantum attacks, but also maintains a constant computation cost of user revocation, making it more efficient compared to other revocation schemes.</p></div>","PeriodicalId":50027,"journal":{"name":"Journal of Systems Architecture","volume":"154 ","pages":"Article 103222"},"PeriodicalIF":3.7,"publicationDate":"2024-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141587635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A framework for static analysis and verification of low-level RTOS code 低级实时操作系统代码的静态分析和验证框架
IF 3.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-02 DOI: 10.1016/j.sysarc.2024.103220
Vignesh Manjunath , Marcel Baunach

Modern embedded software development uses model-based methods to support long-term maintenance, portability, and correctness. A growing trend is to use formal methods to create software models and verify their correctness against requirement specifications. However, modeling and verifying low-level Real-Time Operating Systems (RTOS) or Basic Software (BSW) code sequences remains a major challenge, as it requires correctness against the internal hardware behavior and timing. To ensure this correctness, we need formal models of the complex hardware architecture, and due to the increased model complexity, the verification can lead to a state space explosion.

In this paper, we mitigate these challenges by using an existing static Worst-Case Execution Time (WCET) analysis tool, OTAWA, for microarchitecture analysis. We use the intermediate results of the WCET analysis as input to our process, which verifies the correctness of the low-level implementations against the runtime effects of the hardware (e.g., synchronization dependencies, memory race conditions) and analyzes the timing and performance of the low-level code with respect to the data hazards in the pipeline. After successful verification, the results can be used in a formal method environment to model and verify the low-level code for correctness against the timing and requirement specifications. We demonstrate the proposed framework by analyzing and verifying the low-level context switch sequence of a classic AUTOSAR-based RTOS and the kernel startup sequence of FreeRTOS for correctness against hardware effects in the AURIX TriCore architecture. In addition, we show an empirical evaluation of our framework to examine the scalability, performance, and state space.

现代嵌入式软件开发使用基于模型的方法来支持长期维护、可移植性和正确性。一个日益增长的趋势是使用形式化方法创建软件模型,并根据需求规范验证其正确性。然而,低级实时操作系统(RTOS)或基本软件(BSW)代码序列的建模和验证仍然是一项重大挑战,因为它需要与内部硬件行为和时序保持一致。为了确保这种正确性,我们需要复杂硬件架构的正式模型,而由于模型复杂性的增加,验证可能会导致状态空间爆炸。
{"title":"A framework for static analysis and verification of low-level RTOS code","authors":"Vignesh Manjunath ,&nbsp;Marcel Baunach","doi":"10.1016/j.sysarc.2024.103220","DOIUrl":"10.1016/j.sysarc.2024.103220","url":null,"abstract":"<div><p>Modern embedded software development uses model-based methods to support long-term maintenance, portability, and correctness. A growing trend is to use formal methods to create software models and verify their correctness against requirement specifications. However, modeling and verifying low-level Real-Time Operating Systems (RTOS) or Basic Software (BSW) code sequences remains a major challenge, as it requires correctness against the internal hardware behavior and timing. To ensure this correctness, we need formal models of the complex hardware architecture, and due to the increased model complexity, the verification can lead to a state space explosion.</p><p>In this paper, we mitigate these challenges by using an existing static Worst-Case Execution Time (WCET) analysis tool, OTAWA, for microarchitecture analysis. We use the intermediate results of the WCET analysis as input to our process, which verifies the correctness of the low-level implementations against the runtime effects of the hardware (e.g., synchronization dependencies, memory race conditions) and analyzes the timing and performance of the low-level code with respect to the data hazards in the pipeline. After successful verification, the results can be used in a formal method environment to model and verify the low-level code for correctness against the timing and requirement specifications. We demonstrate the proposed framework by analyzing and verifying the low-level context switch sequence of a classic AUTOSAR-based RTOS and the kernel startup sequence of FreeRTOS for correctness against hardware effects in the AURIX TriCore architecture. In addition, we show an empirical evaluation of our framework to examine the scalability, performance, and state space.</p></div>","PeriodicalId":50027,"journal":{"name":"Journal of Systems Architecture","volume":"154 ","pages":"Article 103220"},"PeriodicalIF":3.7,"publicationDate":"2024-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1383762124001577/pdfft?md5=f8ab16a378db24f589f963588c5eb922&pid=1-s2.0-S1383762124001577-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141587636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assuring the safety of rechargeable energy storage systems in electric vehicles 确保电动汽车充电储能系统的安全性
IF 3.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-02 DOI: 10.1016/j.sysarc.2024.103218
Faiz Ul Muram , Paul Pop , Muhammad Atif Javed

Energy storage systems, especially lithium-ion batteries have gained significant attention and interest due to their potential in storing electrical energy and environmental sustainability. They play a crucial role in electric vehicles and significantly impact their performance, particularly in terms of electric driving range and quick acceleration. Despite their advantages, lithium-ion batteries also have limitations. These include the potential for thermal runaway, which can lead to safety hazards if not properly managed, such as outgassing, fire, and explosion that in turn cause significant property damage and fatalities. Published studies on road vehicles have not adequately considered the safety assurance of rechargeable energy storage systems in accordance with ISO 26262 standard. Accordingly in this paper, we focus on the safety assurance of a battery management system (BMS) that prevents thermal runaway and keeps lithium-ion batteries safe in electric vehicles. To this end, the safety life cycle process is performed. At first, the potential hazards that lead to thermal runaway impacting the functions of electric vehicles have been identified and safety goals related to means for preventing and controlling hazards are formulated. Next, the functional safety requirements are derived from each safety goal, and subsequently technical safety requirements are derived. To demonstrate the acceptable safety of electric vehicles using the BMS strategy, the safety cases are developed from the functional safety activities. The safety contracts are derived from battery specifications and chemistry and are associated with safety cases that provide the means for performing necessary adaptations at the operational phase. We leveraged a simulation for performing the verification and validation as well as finetuning of the BMS strategy. Simulation data is gathered, and the critical parameters are monitored to determine safety violations, control actions are triggered to resolve them, and safety cases are updated to reflect the current system safety.

储能系统,尤其是锂离子电池,因其在储存电能和环境可持续性方面的潜力而备受关注和青睐。锂离子电池在电动汽车中发挥着至关重要的作用,并对其性能产生重大影响,尤其是在电动行驶里程和快速加速方面。尽管锂离子电池具有优势,但也存在局限性。其中包括热失控的可能性,如果管理不当,可能会导致安全隐患,如放气、起火和爆炸,进而造成重大财产损失和人员伤亡。已发表的有关道路车辆的研究并未充分考虑到可充电储能系统符合 ISO 26262 标准的安全保证。因此,在本文中,我们将重点关注电池管理系统(BMS)的安全保证,以防止热失控,确保电动汽车中锂离子电池的安全。为此,我们采用了安全生命周期流程。首先,确定了导致影响电动汽车功能的热失控的潜在危害,并制定了与预防和控制危害的手段相关的安全目标。然后,根据每个安全目标得出功能安全要求,最后得出技术安全要求。为了证明使用 BMS 战略的电动汽车具有可接受的安全性,安全案例是根据功能安全活动制定的。安全合同源于电池规格和化学性质,并与安全案例相关联,为在运行阶段进行必要的调整提供了手段。我们利用模拟来进行验证和确认,以及对 BMS 策略进行微调。我们收集仿真数据,监控关键参数以确定安全违规情况,触发控制行动以解决这些问题,并更新安全案例以反映当前的系统安全性。
{"title":"Assuring the safety of rechargeable energy storage systems in electric vehicles","authors":"Faiz Ul Muram ,&nbsp;Paul Pop ,&nbsp;Muhammad Atif Javed","doi":"10.1016/j.sysarc.2024.103218","DOIUrl":"10.1016/j.sysarc.2024.103218","url":null,"abstract":"<div><p>Energy storage systems, especially lithium-ion batteries have gained significant attention and interest due to their potential in storing electrical energy and environmental sustainability. They play a crucial role in electric vehicles and significantly impact their performance, particularly in terms of electric driving range and quick acceleration. Despite their advantages, lithium-ion batteries also have limitations. These include the potential for thermal runaway, which can lead to safety hazards if not properly managed, such as outgassing, fire, and explosion that in turn cause significant property damage and fatalities. Published studies on road vehicles have not adequately considered the safety assurance of rechargeable energy storage systems in accordance with ISO 26262 standard. Accordingly in this paper, we focus on the safety assurance of a battery management system (BMS) that prevents thermal runaway and keeps lithium-ion batteries safe in electric vehicles. To this end, the safety life cycle process is performed. At first, the potential hazards that lead to thermal runaway impacting the functions of electric vehicles have been identified and safety goals related to means for preventing and controlling hazards are formulated. Next, the functional safety requirements are derived from each safety goal, and subsequently technical safety requirements are derived. To demonstrate the acceptable safety of electric vehicles using the BMS strategy, the safety cases are developed from the functional safety activities. The safety contracts are derived from battery specifications and chemistry and are associated with safety cases that provide the means for performing necessary adaptations at the operational phase. We leveraged a simulation for performing the verification and validation as well as finetuning of the BMS strategy. Simulation data is gathered, and the critical parameters are monitored to determine safety violations, control actions are triggered to resolve them, and safety cases are updated to reflect the current system safety.</p></div>","PeriodicalId":50027,"journal":{"name":"Journal of Systems Architecture","volume":"154 ","pages":"Article 103218"},"PeriodicalIF":3.7,"publicationDate":"2024-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1383762124001553/pdfft?md5=e270f615885e127de48e72584a008a64&pid=1-s2.0-S1383762124001553-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141587638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The MATERIAL framework: Modeling and AuTomatic code Generation of Edge Real-TIme AppLications under the QNX RTOS MATERIAL 框架:QNX 实时操作系统下边缘实时应用程序的建模和自动代码生成
IF 3.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-06-29 DOI: 10.1016/j.sysarc.2024.103219
Matthias Becker , Daniel Casini

Modern edge real-time automotive applications are becoming more complex, dynamic, and distributed, moving away from conventional static operating environments to support advanced driving assistance and autonomous driving functionalities. This shift necessitates formulating more complex task models to represent the evolving nature of these applications aptly. Modeling of real-time automotive systems is typically performed leveraging Architectural Languages (ALs) such as Amalthea, which are commonly used by the industry to describe the characteristics of processing platforms, operating systems, and tasks. However, these architectural languages are originally derived for classical automotive applications and need to evolve to meet the needs of next-generation applications. This paper proposes an automatic framework for the modeling and automatic code generation of dynamic automotive applications under the QNX RTOS. To this end, we extend Amalthea to describe chains of communicating tasks with multiple operating modes and to consider the QNX’s reservation-based scheduler, called APS, which allows providing temporal isolation between applications co-located on the same hardware platform. Finally, an evaluation is presented to compare different implementation alternatives under QNX that are automatically generated by our code generation framework.

现代边缘实时汽车应用正变得越来越复杂、动态和分布式,从传统的静态操作环境转向支持高级驾驶辅助和自动驾驶功能。这种转变要求制定更复杂的任务模型,以恰当地表示这些应用不断发展的性质。实时汽车系统的建模通常利用架构语言(AL)(如 Amalthea)进行,业界通常使用这些语言来描述处理平台、操作系统和任务的特性。然而,这些架构语言最初是为经典汽车应用而设计的,需要不断发展以满足下一代应用的需求。本文为 QNX 实时操作系统下的动态汽车应用建模和自动代码生成提出了一个自动框架。为此,我们对 Amalthea 进行了扩展,以描述具有多种运行模式的通信任务链,并考虑了 QNX 基于预约的调度程序(APS),该程序允许在同一硬件平台上的应用程序之间实现时间隔离。最后,我们还介绍了一项评估,以比较我们的代码生成框架自动生成的 QNX 下的不同实施方案。
{"title":"The MATERIAL framework: Modeling and AuTomatic code Generation of Edge Real-TIme AppLications under the QNX RTOS","authors":"Matthias Becker ,&nbsp;Daniel Casini","doi":"10.1016/j.sysarc.2024.103219","DOIUrl":"10.1016/j.sysarc.2024.103219","url":null,"abstract":"<div><p>Modern edge real-time automotive applications are becoming more complex, dynamic, and distributed, moving away from conventional static operating environments to support advanced driving assistance and autonomous driving functionalities. This shift necessitates formulating more complex task models to represent the evolving nature of these applications aptly. Modeling of real-time automotive systems is typically performed leveraging Architectural Languages (ALs) such as Amalthea, which are commonly used by the industry to describe the characteristics of processing platforms, operating systems, and tasks. However, these architectural languages are originally derived for classical automotive applications and need to evolve to meet the needs of next-generation applications. This paper proposes an automatic framework for the modeling and automatic code generation of dynamic automotive applications under the QNX RTOS. To this end, we extend Amalthea to describe chains of communicating tasks with multiple operating modes and to consider the QNX’s reservation-based scheduler, called APS, which allows providing temporal isolation between applications co-located on the same hardware platform. Finally, an evaluation is presented to compare different implementation alternatives under QNX that are automatically generated by our code generation framework.</p></div>","PeriodicalId":50027,"journal":{"name":"Journal of Systems Architecture","volume":"154 ","pages":"Article 103219"},"PeriodicalIF":3.7,"publicationDate":"2024-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1383762124001565/pdfft?md5=258b0f60a13dd33f7e69709261bad3e1&pid=1-s2.0-S1383762124001565-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141636814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integrated analysis of reliability, power, and performance for IoT devices and servers 对物联网设备和服务器的可靠性、功耗和性能进行综合分析
IF 3.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-06-28 DOI: 10.1016/j.sysarc.2024.103216
Keqin Li

The Internet of Things (IoT) is currently widely used in various sectors and spaces. IoT devices are becoming small yet powerful servers and perform server-like functions. Reliability is a critical aspect in both IoT devices and servers, as they work together to create a robust and dependable IoT ecosystem. Power and performance are two other major considerations of an IoT system. Modeling, analysis, evaluation, and optimization of reliability, power, and performance for IoT devices and servers are major components in IoT systems development and deployment. In this paper, we conduct an integrated study of reliability, power, and performance for IoT devices and servers by mathematically rigorous modeling and analysis. The contributions of the paper can be summarized as follows. We establish a continuous-time Markov chain (CTMC) model that incorporates server failure rate, server repair rate, task arrival rate, and task processing rate. Using such an analytical model, we can calculate the server availability, the average task response time, and the average power consumption. We point out that there is an optimal server speed that minimizes the power-time product and a combined cost-performance metric of power, performance, and reliability. We show the impact of server reliability on response time, power consumption, server utilization, and the power-performance tradeoff. To the best of the author’s knowledge, this is the first paper that takes a combined approach to modeling and analysis of reliability, power, and performance for IoT devices and servers. It has been noticed that there has been little such theoretically solid investigation in the existing literature. Therefore, this paper has made tangible contributions and significant advances in the joint understanding of reliability, power, performance, and their interplay in IoT devices and servers quantitatively and mathematically.

物联网(IoT)目前已广泛应用于各个领域和空间。物联网设备正在成为小型但功能强大的服务器,并执行类似服务器的功能。可靠性是物联网设备和服务器的一个重要方面,因为它们共同打造了一个强大而可靠的物联网生态系统。功耗和性能是物联网系统的另外两个主要考虑因素。对物联网设备和服务器的可靠性、功耗和性能进行建模、分析、评估和优化,是物联网系统开发和部署的主要组成部分。本文通过严格的数学建模和分析,对物联网设备和服务器的可靠性、功耗和性能进行了综合研究。本文的贡献可概括如下。我们建立了一个包含服务器故障率、服务器修复率、任务到达率和任务处理率的连续时间马尔可夫链(CTMC)模型。利用这种分析模型,我们可以计算服务器可用性、平均任务响应时间和平均功耗。我们指出,有一种最佳服务器速度能使功耗-时间乘积以及功耗、性能和可靠性的综合性价比指标最小化。我们展示了服务器可靠性对响应时间、功耗、服务器利用率以及功耗-性能权衡的影响。据作者所知,这是第一篇采用综合方法对物联网设备和服务器的可靠性、功耗和性能进行建模和分析的论文。我们注意到,现有文献中很少有这种理论扎实的研究。因此,本文在从定量和数学角度共同理解物联网设备和服务器的可靠性、功耗、性能及其相互影响方面做出了切实的贡献,并取得了重大进展。
{"title":"Integrated analysis of reliability, power, and performance for IoT devices and servers","authors":"Keqin Li","doi":"10.1016/j.sysarc.2024.103216","DOIUrl":"https://doi.org/10.1016/j.sysarc.2024.103216","url":null,"abstract":"<div><p>The Internet of Things (IoT) is currently widely used in various sectors and spaces. IoT devices are becoming small yet powerful servers and perform server-like functions. Reliability is a critical aspect in both IoT devices and servers, as they work together to create a robust and dependable IoT ecosystem. Power and performance are two other major considerations of an IoT system. Modeling, analysis, evaluation, and optimization of reliability, power, and performance for IoT devices and servers are major components in IoT systems development and deployment. In this paper, we conduct an integrated study of reliability, power, and performance for IoT devices and servers by mathematically rigorous modeling and analysis. The contributions of the paper can be summarized as follows. We establish a continuous-time Markov chain (CTMC) model that incorporates server failure rate, server repair rate, task arrival rate, and task processing rate. Using such an analytical model, we can calculate the server availability, the average task response time, and the average power consumption. We point out that there is an optimal server speed that minimizes the power-time product and a combined cost-performance metric of power, performance, and reliability. We show the impact of server reliability on response time, power consumption, server utilization, and the power-performance tradeoff. To the best of the author’s knowledge, this is the first paper that takes a combined approach to modeling and analysis of reliability, power, and performance for IoT devices and servers. It has been noticed that there has been little such theoretically solid investigation in the existing literature. Therefore, this paper has made tangible contributions and significant advances in the joint understanding of reliability, power, performance, and their interplay in IoT devices and servers quantitatively and mathematically.</p></div>","PeriodicalId":50027,"journal":{"name":"Journal of Systems Architecture","volume":"154 ","pages":"Article 103216"},"PeriodicalIF":3.7,"publicationDate":"2024-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141541478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automated level-based clustering of dataflow actors for controlled scheduling complexity 基于级别的数据流行为体自动聚类,控制调度复杂性
IF 3.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-06-28 DOI: 10.1016/j.sysarc.2024.103217
Ophélie Renaud, Hugo Miomandre, Karol Desnos, Jean-François Nezan

Dataflow Models of Computation (MoCs) significantly enhance parallel computing by efficiently expressing application parallelism on multicore architectures, unlocking greater performance and throughput. However, the complexity of graphs within dataflow-based systems can result in a time-consuming resource allocation process. To address this issue, a solution is to cluster computations to ease heuristic solving. The information encompassing the context of computations and the constraints of the architecture plays a crucial role in determining application performance. This paper presents an automated approach that leverages this information to control graph complexity prior to the resource allocation process. Experiments demonstrate that the proposed method, driven by clustering, not only yields improved throughput but also provides better mapping decisions and data transfer efficiency, achieving a throughput up to 1.8 times higher than state-of-the-art techniques.

数据流计算模型(MoCs)通过在多核架构上有效地表达应用并行性,大大提高了并行计算能力,从而释放出更高的性能和吞吐量。然而,基于数据流的系统中图形的复杂性会导致资源分配过程耗时。为解决这一问题,一种解决方案是将计算集群化,以方便启发式求解。包含计算背景和架构限制的信息在决定应用性能方面起着至关重要的作用。本文提出了一种自动化方法,可利用这些信息在资源分配过程之前控制图的复杂性。实验证明,由聚类驱动的拟议方法不仅提高了吞吐量,还提供了更好的映射决策和数据传输效率,其吞吐量是最先进技术的 1.8 倍。
{"title":"Automated level-based clustering of dataflow actors for controlled scheduling complexity","authors":"Ophélie Renaud,&nbsp;Hugo Miomandre,&nbsp;Karol Desnos,&nbsp;Jean-François Nezan","doi":"10.1016/j.sysarc.2024.103217","DOIUrl":"10.1016/j.sysarc.2024.103217","url":null,"abstract":"<div><p>Dataflow Models of Computation (MoCs) significantly enhance parallel computing by efficiently expressing application parallelism on multicore architectures, unlocking greater performance and throughput. However, the complexity of graphs within dataflow-based systems can result in a time-consuming resource allocation process. To address this issue, a solution is to cluster computations to ease heuristic solving. The information encompassing the context of computations and the constraints of the architecture plays a crucial role in determining application performance. This paper presents an automated approach that leverages this information to control graph complexity prior to the resource allocation process. Experiments demonstrate that the proposed method, driven by clustering, not only yields improved throughput but also provides better mapping decisions and data transfer efficiency, achieving a throughput up to 1.8 times higher than state-of-the-art techniques.</p></div>","PeriodicalId":50027,"journal":{"name":"Journal of Systems Architecture","volume":"154 ","pages":"Article 103217"},"PeriodicalIF":3.7,"publicationDate":"2024-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141622831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Expanding hardware accelerator system design space exploration with gem5-SALAMv2 利用 gem5-SALAMv2 扩展硬件加速器系统设计空间探索
IF 3.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-06-27 DOI: 10.1016/j.sysarc.2024.103211
Zephaniah Spencer, Samuel Rogers, Joshua Slycord, Hamed Tabkhi

With the prevalence of hardware accelerators as an integral part of the modern systems on chip (SoCs), the ability to model accelerators quickly and accurately within the system in which it operates is critical. This paper presents gem5-SALAMv2 as a novel system architecture for LLVM-based modeling and simulation of custom hardware accelerators integrated into the gem5 framework. It overcomes the inherent limitations of state-of-the-art trace-based pre-register-transfer level (RTL) simulators by offering a truly “execute-in-execute” LLVM-based model. It enables scalable modeling of multiple dynamically interacting accelerators with full-system simulation support. To create long-term sustainable expansion compatible with the gem5 system framework, gem5-SALAM offers a general-purpose and modular communication interface and memory hierarchy integrated into the gem5 ecosystem, streamlining designing and modeling accelerators for new and emerging applications. gem5-SALAMv2 expands upon the framework established in gem5-SALAMv1 with improved LLVM-based elaboration and simulation, improved and more extensible system integration, and new automations to simplify rapid prototyping and design space exploration. 1

Validation on the MachSuite (Reagen et al., 2014) benchmarks presents a timing estimation error of less than 1% against the Vivado High-Level Synthesis (HLS) tool. Results also show less than a 4% area and power estimation error against Synopsys Design Compiler. Additionally, system validation against implementations on an Ultrascale+ ZCU102 shows an average end-to-end timing error of less than 2%. Lastly, we demonstrate the upgraded capabilities of gem5-SALAMv2 by exploring accelerator platforms for two deep neural networks, LeNet5 and MobileNetv2. In these explorations, we demonstrate how gem5-SALAMv2 can simulate such systems and guide architectural optimizations for these types of accelerator-rich architectures. 2

随着硬件加速器成为现代片上系统(SoC)不可分割的一部分,在其运行的系统中快速、准确地对加速器进行建模的能力至关重要。本文介绍的 gem5-SALAMv2 是一种新型系统架构,用于对集成到 gem5 框架中的定制硬件加速器进行基于 LLVM 的建模和仿真。它通过提供真正基于 LLVM 的 "执行中执行"(execute-in-execute)模型,克服了最先进的基于跟踪的寄存器传输层前(RTL)仿真器的固有局限性。它可对多个动态交互加速器进行可扩展建模,并支持全系统仿真。gem5-SALAMv2在gem5-SALAMv1建立的框架基础上进行了扩展,改进了基于LLVM的阐述和仿真,提高了系统集成的可扩展性,并提供了新的自动化功能来简化快速原型开发和设计空间探索。
{"title":"Expanding hardware accelerator system design space exploration with gem5-SALAMv2","authors":"Zephaniah Spencer,&nbsp;Samuel Rogers,&nbsp;Joshua Slycord,&nbsp;Hamed Tabkhi","doi":"10.1016/j.sysarc.2024.103211","DOIUrl":"10.1016/j.sysarc.2024.103211","url":null,"abstract":"<div><p>With the prevalence of hardware accelerators as an integral part of the modern systems on chip (SoCs), the ability to model accelerators quickly and accurately within the system in which it operates is critical. This paper presents gem5-SALAMv2 as a novel system architecture for LLVM-based modeling and simulation of custom hardware accelerators integrated into the gem5 framework. It overcomes the inherent limitations of state-of-the-art trace-based pre-register-transfer level (RTL) simulators by offering a truly “execute-in-execute” LLVM-based model. It enables scalable modeling of multiple dynamically interacting accelerators with full-system simulation support. To create long-term sustainable expansion compatible with the gem5 system framework, gem5-SALAM offers a general-purpose and modular communication interface and memory hierarchy integrated into the gem5 ecosystem, streamlining designing and modeling accelerators for new and emerging applications. gem5-SALAMv2 expands upon the framework established in gem5-SALAMv1 with improved LLVM-based elaboration and simulation, improved and more extensible system integration, and new automations to simplify rapid prototyping and design space exploration. <span><sup>1</sup></span></p><p>Validation on the MachSuite (Reagen et al., 2014) benchmarks presents a timing estimation error of less than 1% against the Vivado High-Level Synthesis (HLS) tool. Results also show less than a 4% area and power estimation error against Synopsys Design Compiler. Additionally, system validation against implementations on an Ultrascale+ ZCU102 shows an average end-to-end timing error of less than 2%. Lastly, we demonstrate the upgraded capabilities of gem5-SALAMv2 by exploring accelerator platforms for two deep neural networks, LeNet5 and MobileNetv2. In these explorations, we demonstrate how gem5-SALAMv2 can simulate such systems and guide architectural optimizations for these types of accelerator-rich architectures. <span><sup>2</sup></span></p></div>","PeriodicalId":50027,"journal":{"name":"Journal of Systems Architecture","volume":"154 ","pages":"Article 103211"},"PeriodicalIF":3.7,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141568155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
UAV-assisted dependency-aware computation offloading in device–edge–cloud collaborative computing based on improved actor–critic DRL 基于改进的行为批判 DRL 的设备边缘云协同计算中的无人机辅助依赖感知计算卸载
IF 3.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-06-24 DOI: 10.1016/j.sysarc.2024.103215
Longxin Zhang , Runti Tan , Yanfen Zhang , Jiwu Peng , Jing Liu , Keqin Li

Unmanned aerial vehicle (UAV)-assisted mobile edge computing (MEC) has become a popular research topic, addressing challenges posed by the pressure of cloud computing and the limited service scope of MEC. However, the limited computing resources of UAVs and the data dependency of specific tasks hinder the practical implementation of efficient computational offloading (CO). Accordingly, a device–edge–cloud collaborative computing model is proposed in this study to provide complementary offloading services. This model considers stochastic movement and channel obstacles, representing the dependency relationships as a directed acyclic graph. An optimization problem is formulated to simultaneously optimize system costs (i.e., delay and energy consumption) and UAV endurance, taking into account resource and task-dependent constraints. Additionally, a saturated training SAC-based UAV-assisted dependency-aware computation offloading algorithm (STS-UDCO) is developed. STS-UDCO learns the entropy and value of the CO policy to efficiently approximate the optimal solution. The adaptive saturation training rule proposed in STS-UDCO dynamically controls the update frequency of the critic based on the current fitted state to enhance training stability. Finally, extensive experiments demonstrate that STS-UDCO achieves superior convergence and stability, while also reducing the system total cost and convergence speed by at least 11.83% and 39.10%, respectively, compared with other advanced algorithms.

无人飞行器(UAV)辅助移动边缘计算(MEC)已成为一个热门研究课题,它解决了云计算压力和 MEC 服务范围有限所带来的挑战。然而,无人机有限的计算资源和特定任务的数据依赖性阻碍了高效计算卸载(CO)的实际实施。因此,本研究提出了一种设备-边缘-云协同计算模型,以提供互补的卸载服务。该模型考虑了随机移动和信道障碍,将依赖关系表示为有向无环图。考虑到资源和任务约束,提出了一个优化问题,以同时优化系统成本(即延迟和能耗)和无人机续航时间。此外,还开发了一种基于饱和训练 SAC 的无人机辅助依赖感知计算卸载算法(STS-UDCO)。STS-UDCO 可学习 CO 策略的熵和值,从而有效逼近最优解。STS-UDCO 中提出的自适应饱和训练规则可根据当前拟合状态动态控制批判者的更新频率,以提高训练的稳定性。最后,大量实验证明,与其他先进算法相比,STS-UDCO 实现了卓越的收敛性和稳定性,同时还将系统总成本和收敛速度分别降低了至少 11.83% 和 39.10%。
{"title":"UAV-assisted dependency-aware computation offloading in device–edge–cloud collaborative computing based on improved actor–critic DRL","authors":"Longxin Zhang ,&nbsp;Runti Tan ,&nbsp;Yanfen Zhang ,&nbsp;Jiwu Peng ,&nbsp;Jing Liu ,&nbsp;Keqin Li","doi":"10.1016/j.sysarc.2024.103215","DOIUrl":"https://doi.org/10.1016/j.sysarc.2024.103215","url":null,"abstract":"<div><p>Unmanned aerial vehicle (UAV)-assisted mobile edge computing (MEC) has become a popular research topic, addressing challenges posed by the pressure of cloud computing and the limited service scope of MEC. However, the limited computing resources of UAVs and the data dependency of specific tasks hinder the practical implementation of efficient computational offloading (CO). Accordingly, a device–edge–cloud collaborative computing model is proposed in this study to provide complementary offloading services. This model considers stochastic movement and channel obstacles, representing the dependency relationships as a directed acyclic graph. An optimization problem is formulated to simultaneously optimize system costs (i.e., delay and energy consumption) and UAV endurance, taking into account resource and task-dependent constraints. Additionally, a saturated training SAC-based UAV-assisted dependency-aware computation offloading algorithm (STS-UDCO) is developed. STS-UDCO learns the entropy and value of the CO policy to efficiently approximate the optimal solution. The adaptive saturation training rule proposed in STS-UDCO dynamically controls the update frequency of the critic based on the current fitted state to enhance training stability. Finally, extensive experiments demonstrate that STS-UDCO achieves superior convergence and stability, while also reducing the system total cost and convergence speed by at least 11.83% and 39.10%, respectively, compared with other advanced algorithms.</p></div>","PeriodicalId":50027,"journal":{"name":"Journal of Systems Architecture","volume":"154 ","pages":"Article 103215"},"PeriodicalIF":3.7,"publicationDate":"2024-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141541477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Systems Architecture
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1