首页 > 最新文献

Formal Aspects of Computing最新文献

英文 中文
From Non-punctuality to Non-adjacency: A Quest for Decidability of Timed Temporal Logics with Quantifiers 从非准时性到非邻接性:带量词的时间逻辑的可决性探索
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2023-06-23 DOI: https://dl.acm.org/doi/10.1145/3571749
Shankara Narayanan Krishna, Khushraj Madnani, Manuel Mazo Jr., Paritosh Pandya

Metric Temporal Logic (MTL) and Timed Propositional Temporal Logic (TPTL) are prominent real-time extensions of Linear Temporal Logic (LTL). In general, the satisfiability checking problem for these extensions is undecidable when both the future (Until, U) and the past (Since, S) modalities are used (denoted by MTL[U,S] and TPTL[U,S]). In a classical result, the satisfiability checking for Metric Interval Temporal Logic (MITL[U,S]), a non-punctual fragment of MTL[U,S], is shown to be decidable with EXPSPACE complete complexity. A straightforward adoption of non-punctuality does not recover decidability in the case of TPTL[U,S]. Hence, we propose a more refined notion called non-adjacency for TPTL[U,S] and focus on its 1-variable fragment, 1-TPTL[U,S]. We show that non-adjacent 1-TPTL[U,S] is strictly more expressive than MITL. As one of our main results, we show that the satisfiability checking problem for non-adjacent 1-TPTL[U,S] is decidable with EXPSPACE complete complexity. Our decidability proof relies on a novel technique of anchored interval word abstraction and its reduction to a non-adjacent version of the newly proposed logic called PnEMTL. We further propose an extension of MSO [<] (Monadic Second Order Logic of Orders) with Guarded Metric Quantifiers (GQMSO) and show that it characterizes the expressiveness of PnEMTL. That apart, we introduce the notion of non-adjacency in the context of GQMSO (NA-GQMSO), which is a syntactic generalization of logic Q2MLO due to Hirshfeld and Rabinovich and show the decidability of satisfiability checking for NA-GQMSO.

度量时间逻辑(MTL)和时间命题时间逻辑(TPTL)是线性时间逻辑(LTL)的突出的实时扩展。一般来说,当使用未来(Until, U)和过去(Since, S)模态(用MTL[U,S]和TPTL[U,S]表示)时,这些扩展的可满足性检查问题是不可确定的。在一个经典的结果中,证明了度量区间时间逻辑(Metric Interval Temporal Logic, MITL[U,S])的可满足性检验在EXPSPACE完全复杂度下是可判定的。在TPTL的情况下,直接采用非准时性并不能恢复可决性[U,S]。因此,我们为TPTL[U,S]提出了一个更精细的概念,称为非邻接性,并专注于它的1变量片段,1-TPTL[U,S]。我们证明了非相邻的1-TPTL[U,S]严格地比MITL更具表达性。作为我们的主要结果之一,我们证明了非相邻1-TPTL[U,S]的可满足性检验问题具有EXPSPACE完全复杂度。我们的可判定性证明依赖于一种锚定区间词抽象的新技术,并将其还原为新提出的逻辑的非相邻版本,称为PnEMTL。我们进一步提出了带保护度量量词(GQMSO)的MSO [<]扩展,并证明了它表征了PnEMTL的可表达性。此外,我们在Hirshfeld和Rabinovich的逻辑q2mso的句法推广中引入了非邻接性的概念(NA-GQMSO),并证明了NA-GQMSO的可满足性检验的可判定性。
{"title":"From Non-punctuality to Non-adjacency: A Quest for Decidability of Timed Temporal Logics with Quantifiers","authors":"Shankara Narayanan Krishna, Khushraj Madnani, Manuel Mazo Jr., Paritosh Pandya","doi":"https://dl.acm.org/doi/10.1145/3571749","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3571749","url":null,"abstract":"<p>Metric Temporal Logic (MTL) and Timed Propositional Temporal Logic (TPTL) are prominent real-time extensions of Linear Temporal Logic (LTL). In general, the satisfiability checking problem for these extensions is undecidable when both the future (Until, U) and the past (Since, S) modalities are used (denoted by MTL[U,S] and TPTL[U,S]). In a classical result, the satisfiability checking for Metric Interval Temporal Logic (MITL[U,S]), a non-punctual fragment of MTL[U,S], is shown to be decidable with EXPSPACE complete complexity. A straightforward adoption of non-punctuality does not recover decidability in the case of TPTL[U,S]. Hence, we propose a more refined notion called <i>non-adjacency</i> for TPTL[U,S] and focus on its 1-variable fragment, 1-TPTL[U,S]. We show that non-adjacent 1-TPTL[U,S] is strictly more expressive than MITL. As one of our main results, we show that the satisfiability checking problem for non-adjacent 1-TPTL[U,S] is decidable with EXPSPACE complete complexity. Our decidability proof relies on a novel technique of anchored interval word abstraction and its reduction to a non-adjacent version of the newly proposed logic called PnEMTL. We further propose an extension of MSO [&lt;] (Monadic Second Order Logic of Orders) with Guarded Metric Quantifiers (GQMSO) and show that it characterizes the expressiveness of PnEMTL. That apart, we introduce the notion of non-adjacency in the context of GQMSO (NA-GQMSO), which is a syntactic generalization of logic Q2MLO due to Hirshfeld and Rabinovich and show the decidability of satisfiability checking for NA-GQMSO.</p>","PeriodicalId":50432,"journal":{"name":"Formal Aspects of Computing","volume":"40 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138517792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Kaki: Efficient Concurrent Update Synthesis for SDN Kaki: SDN的高效并发更新综合
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2023-06-23 DOI: https://dl.acm.org/doi/10.1145/3605952
Nicklas S. Johansen, Lasse B. Kær, Andreas L. Madsen, Kristian Ø. Nielsen, Jiří Srba, Rasmus G. Tollund

Modern computer networks based on the software-defined networking (SDN) paradigm are becoming increasingly complex and often require frequent configuration changes in order to react to traffic fluctuations. It is essential that forwarding policies are preserved not only before and after the configuration update but also at any moment during the inherently distributed execution of such an update. We present Kaki, a Petri game based tool for automatic synthesis of switch batches which can be updated in parallel without violating a given (regular) forwarding policy like waypointing or service chaining. Kaki guarantees to find the minimum number of concurrent batches and supports both splittable and nonsplittable flow forwarding. In order to achieve optimal performance, we introduce two novel optimisation techniques based on static analysis: decomposition into independent subproblems and identification of switches that can be collectively updated in the same batch. These techniques considerably improve the performance of our tool Kaki, relying on TAPAAL’s verification engine for Petri games as its backend. Experiments on a large benchmark of real networks from the Internet Topology Zoo database demonstrate that Kaki outperforms the state-of-the-art tools Netstack and FLIP. Kaki computes concurrent update synthesis significantly faster than Netstack and compared to FLIP, it provides shorter (and provably optimal) concurrent update sequences at similar runtimes.

基于软件定义网络(SDN)范例的现代计算机网络正变得越来越复杂,并且经常需要频繁更改配置以应对流量波动。重要的是,不仅在配置更新之前和之后,而且在这种更新的固有分布式执行期间的任何时刻都要保留转发策略。我们提出了Kaki,一个基于Petri游戏的工具,用于自动合成开关批次,可以并行更新,而不会违反给定的(常规)转发策略,如路径指向或服务链。Kaki保证找到并发批的最小数量,并支持可分割和不可分割的流转发。为了获得最佳性能,我们引入了两种基于静态分析的新型优化技术:分解为独立的子问题和识别可以在同一批中集体更新的开关。这些技术极大地提高了我们的工具Kaki的性能,它依赖于TAPAAL的Petri游戏验证引擎作为后端。在来自Internet Topology Zoo数据库的大型真实网络基准测试中进行的实验表明,Kaki优于最先进的工具Netstack和FLIP。Kaki计算并发更新合成的速度比Netstack快得多,与FLIP相比,它在类似的运行时提供了更短的(并且可以证明是最优的)并发更新序列。
{"title":"Kaki: Efficient Concurrent Update Synthesis for SDN","authors":"Nicklas S. Johansen, Lasse B. Kær, Andreas L. Madsen, Kristian Ø. Nielsen, Jiří Srba, Rasmus G. Tollund","doi":"https://dl.acm.org/doi/10.1145/3605952","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3605952","url":null,"abstract":"<p>Modern computer networks based on the software-defined networking (SDN) paradigm are becoming increasingly complex and often require frequent configuration changes in order to react to traffic fluctuations. It is essential that forwarding policies are preserved not only before and after the configuration update but also at any moment during the inherently distributed execution of such an update. We present Kaki, a Petri game based tool for automatic synthesis of switch batches which can be updated in parallel without violating a given (regular) forwarding policy like waypointing or service chaining. Kaki guarantees to find the minimum number of concurrent batches and supports both splittable and nonsplittable flow forwarding. In order to achieve optimal performance, we introduce two novel optimisation techniques based on static analysis: decomposition into independent subproblems and identification of switches that can be collectively updated in the same batch. These techniques considerably improve the performance of our tool Kaki, relying on TAPAAL’s verification engine for Petri games as its backend. Experiments on a large benchmark of real networks from the Internet Topology Zoo database demonstrate that Kaki outperforms the state-of-the-art tools Netstack and FLIP. Kaki computes concurrent update synthesis significantly faster than Netstack and compared to FLIP, it provides shorter (and provably optimal) concurrent update sequences at similar runtimes.</p>","PeriodicalId":50432,"journal":{"name":"Formal Aspects of Computing","volume":"12 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138517765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Compositional Reasoning for Non-multicopy Atomic Architectures 非多拷贝原子体系结构的组合推理
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2023-06-23 DOI: https://dl.acm.org/doi/10.1145/3574137
Nicholas Coughlin, Kirsten Winter, Graeme Smith

Rely/guarantee reasoning provides a compositional approach to reasoning about concurrent programs. However, such reasoning traditionally assumes a sequentially consistent memory model and hence is unsound on modern hardware in the presence of data races. In this article, we present a rely/guarantee-based approach for non-multicopy atomic weak memory models, i.e., where a thread’s stores are not simultaneously propagated to all other threads and hence are not observable by other threads at the same time. Such memory models include those of the earlier versions of the ARM processor as well as the POWER processor.

This article builds on our approach to compositional reasoning for multicopy atomic architectures, i.e., where a thread’s stores are simultaneously propagated to all other threads. In that context, an operational semantics can be based on thread-local instruction reordering. We exploit this to provide an efficient compositional proof technique in which weak memory behaviour can be shown to preserve rely/guarantee reasoning on a sequentially consistent memory model. To achieve this, we introduce a side-condition, reordering interference freedom on each thread, reducing the complexity of weak memory to checks over pairs of reorderable instructions.

In this article, we extend our approach to non-multicopy atomic weak memory models. We utilise the idea of reordering interference freedom between parallel components. This by itself would break compositionality but serves as a vehicle to derive a refined compatibility check between rely and guarantee conditions, which takes into account the effects of propagations of stores that are only partial, i.e., not covering all threads. All aspects of our approach have been encoded and proved sound in Isabelle/HOL.

依赖/保证推理提供了一种组合方法来推理并发程序。然而,这种推理传统上假设了顺序一致的内存模型,因此在存在数据竞争的现代硬件上是不可靠的。在本文中,我们为非多拷贝原子弱内存模型提供了一种基于依赖/保证的方法,即线程的存储不会同时传播到所有其他线程,因此其他线程无法同时观察到。这些内存模型包括早期版本的ARM处理器和POWER处理器。本文建立在我们对多副本原子体系结构进行组合推理的方法之上,即一个线程的存储同时传播给所有其他线程。在这种情况下,操作语义可以基于线程本地指令重排序。我们利用这一点来提供一种有效的组合证明技术,在这种技术中,弱记忆行为可以显示在顺序一致的记忆模型上保持依赖/保证推理。为了实现这一目标,我们引入了一个侧条件,在每个线程上重新排序干扰自由,减少了对可重新排序指令对进行检查的弱内存的复杂性。在本文中,我们将这种方法扩展到非多拷贝原子弱内存模型。我们利用了平行分量间干涉自由度重排序的思想。这本身会破坏组合性,但可以作为在依赖条件和保证条件之间派生精细兼容性检查的工具,它考虑了仅部分存储(即不覆盖所有线程)传播的影响。我们的方法的所有方面都在Isabelle/HOL中进行了编码和验证。
{"title":"Compositional Reasoning for Non-multicopy Atomic Architectures","authors":"Nicholas Coughlin, Kirsten Winter, Graeme Smith","doi":"https://dl.acm.org/doi/10.1145/3574137","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3574137","url":null,"abstract":"<p>Rely/guarantee reasoning provides a compositional approach to reasoning about concurrent programs. However, such reasoning traditionally assumes a sequentially consistent memory model and hence is unsound on modern hardware in the presence of data races. In this article, we present a rely/guarantee-based approach for <i>non-multicopy atomic</i> weak memory models, i.e., where a thread’s stores are not simultaneously propagated to all other threads and hence are not observable by other threads at the same time. Such memory models include those of the earlier versions of the ARM processor as well as the POWER processor.</p><p>This article builds on our approach to compositional reasoning for <i>multicopy atomic</i> architectures, i.e., where a thread’s stores are simultaneously propagated to all other threads. In that context, an operational semantics can be based on thread-local instruction reordering. We exploit this to provide an efficient compositional proof technique in which weak memory behaviour can be shown to preserve rely/guarantee reasoning on a sequentially consistent memory model. To achieve this, we introduce a side-condition, <i>reordering interference freedom</i> on each thread, reducing the complexity of weak memory to checks over pairs of reorderable instructions.</p><p>In this article, we extend our approach to non-multicopy atomic weak memory models. We utilise the idea of reordering interference freedom between parallel components. This by itself would break compositionality but serves as a vehicle to derive a refined compatibility check between rely and guarantee conditions, which takes into account the effects of propagations of stores that are only partial, i.e., not covering all threads. All aspects of our approach have been encoded and proved sound in Isabelle/HOL.</p>","PeriodicalId":50432,"journal":{"name":"Formal Aspects of Computing","volume":"18 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138517740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mechanised Operational Reasoning for C11 Programs with Relaxed Dependencies 具有放松依赖关系的C11程序的机械化操作推理
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2023-06-23 DOI: https://dl.acm.org/doi/10.1145/3580285
Daniel Wright, Sadegh Dalvandi, Mark Batty, Brijesh Dongol

Verification techniques for C11 programs have advanced significantly in recent years with the development of operational semantics and associated logics for increasingly large fragments of C11. However, these semantics and logics have been developed in a restricted setting to avoid the thin-air-read problem. In this article, we propose an operational semantics that leverages an intra-thread partial order (called semantic dependencies) induced by a recently developed denotational event-structure-based semantics. We prove that our operational semantics is sound and complete with respect to the denotational semantics. We present an associated logic that generalises a recent Owicki–Gries framework for RC11 RAR (repaired C11) with relaxed and release-acquire accesses. We describe the mechanisation of the logic in the Isabelle/HOL theorem prover, which we use to prove correctness of a number of examples.

近年来,随着操作语义和相关逻辑的发展,C11程序的验证技术有了显著的进步。然而,这些语义和逻辑是在受限的环境中开发的,以避免稀薄空气读取问题。在本文中,我们提出了一种操作语义,它利用了最近开发的基于指称事件结构的语义引起的线程内部分顺序(称为语义依赖)。我们证明了我们的操作语义相对于指称语义是健全和完备的。我们提出了一个相关的逻辑,该逻辑推广了RC11 RAR(修复C11)的最新Owicki-Gries框架,该框架具有放松和释放获取访问。我们在Isabelle/HOL定理证明器中描述了逻辑的机械化,我们用它来证明一些例子的正确性。
{"title":"Mechanised Operational Reasoning for C11 Programs with Relaxed Dependencies","authors":"Daniel Wright, Sadegh Dalvandi, Mark Batty, Brijesh Dongol","doi":"https://dl.acm.org/doi/10.1145/3580285","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3580285","url":null,"abstract":"<p>Verification techniques for C11 programs have advanced significantly in recent years with the development of operational semantics and associated logics for increasingly large fragments of C11. However, these semantics and logics have been developed in a restricted setting to avoid the <i>thin-air-read</i> problem. In this article, we propose an operational semantics that leverages an intra-thread partial order (called <i>semantic dependencies</i>) induced by a recently developed denotational event-structure-based semantics. We prove that our operational semantics is sound and complete with respect to the denotational semantics. We present an associated logic that generalises a recent Owicki–Gries framework for RC11 RAR (repaired C11) with relaxed and release-acquire accesses. We describe the mechanisation of the logic in the Isabelle/HOL theorem prover, which we use to prove correctness of a number of examples.</p>","PeriodicalId":50432,"journal":{"name":"Formal Aspects of Computing","volume":"17 7","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138517766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Introduction to the Special Section on FM 2021 FM 2021特别部分介绍
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2023-06-23 DOI: 10.1145/3604594
M. Huisman, C. Pasareanu, N. Zhan
Formal methods have been used in a wide range of domains, including software, cyber-physical systems, and integrated computer-based systems. In recent years, we have seen in particular the application of formal methods in a wide range of areas, such as systems-of-systems, security, artificial intelligence, human-computer interaction, manufacturing, sustainability, power, transport, smart cities, healthcare, and biology. Formal methods also get used more and more in industry. All of these developments are supported by the design and validation of various formal method tools. Formal Methods 2021 (FM 2021) solicited high-quality papers reporting novel research results, as well as tool papers and case study reports. To establish the program of FM 2021, we assembled a program committee of 46 renowned scientists from all over the world. We received a total of 161 abstract submissions, which resulted in 131 full paper submissions from authors in 28 different countries, from which we selected 33 full papers and 2 short tool papers. This special section contains a selection of the best theory papers from the FM 2021 conference that have been selected by the program committee. The articles cover a broad spectrum of topics in the area of formal methods. The six accepted articles include the following:
形式化方法已广泛应用于软件、网络物理系统和基于计算机的集成系统等领域。近年来,我们特别看到形式化方法在广泛领域的应用,如系统的系统、安全、人工智能、人机交互、制造、可持续性、电力、交通、智慧城市、医疗保健和生物学。形式方法在工业中也得到越来越多的应用。所有这些开发都得到各种形式化方法工具的设计和验证的支持。正式方法2021 (FM 2021)征集报告新颖研究成果的高质量论文,以及工具论文和案例研究报告。为了制定FM 2021计划,我们召集了一个由46名来自世界各地的知名科学家组成的计划委员会。我们共收到161篇摘要投稿,其中来自28个不同国家的作者投稿了131篇全文,我们从中选出了33篇全文和2篇简短的工具论文。这个特别的部分包含了由项目委员会选出的FM 2021会议的最佳理论论文。这些文章涵盖了形式化方法领域中广泛的主题。获接纳的六项条款包括:
{"title":"Introduction to the Special Section on FM 2021","authors":"M. Huisman, C. Pasareanu, N. Zhan","doi":"10.1145/3604594","DOIUrl":"https://doi.org/10.1145/3604594","url":null,"abstract":"Formal methods have been used in a wide range of domains, including software, cyber-physical systems, and integrated computer-based systems. In recent years, we have seen in particular the application of formal methods in a wide range of areas, such as systems-of-systems, security, artificial intelligence, human-computer interaction, manufacturing, sustainability, power, transport, smart cities, healthcare, and biology. Formal methods also get used more and more in industry. All of these developments are supported by the design and validation of various formal method tools. Formal Methods 2021 (FM 2021) solicited high-quality papers reporting novel research results, as well as tool papers and case study reports. To establish the program of FM 2021, we assembled a program committee of 46 renowned scientists from all over the world. We received a total of 161 abstract submissions, which resulted in 131 full paper submissions from authors in 28 different countries, from which we selected 33 full papers and 2 short tool papers. This special section contains a selection of the best theory papers from the FM 2021 conference that have been selected by the program committee. The articles cover a broad spectrum of topics in the area of formal methods. The six accepted articles include the following:","PeriodicalId":50432,"journal":{"name":"Formal Aspects of Computing","volume":" ","pages":"1 - 2"},"PeriodicalIF":1.0,"publicationDate":"2023-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44866233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Lexicographic Proof Rules for Probabilistic Termination 论概率终止的词典证明规则
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2023-06-23 DOI: https://dl.acm.org/doi/10.1145/3585391
Krishnendu Chatterjee, Ehsan Kafshdar Goharshady, Petr Novotný, Jiří Zárevúcky, Đorđe Žikelić

We consider the almost-sure (a.s.) termination problem for probabilistic programs, which are a stochastic extension of classical imperative programs. Lexicographic ranking functions provide a sound and practical approach for termination of non-probabilistic programs, and their extension to probabilistic programs is achieved via lexicographic ranking supermartingales (LexRSMs). However, LexRSMs introduced in the previous work have a limitation that impedes their automation: all of their components have to be non-negative in all reachable states. This might result in a LexRSM not existing even for simple terminating programs. Our contributions are twofold. First, we introduce a generalization of LexRSMs that allows for some components to be negative. This standard feature of non-probabilistic termination proofs was hitherto not known to be sound in the probabilistic setting, as the soundness proof requires a careful analysis of the underlying stochastic process. Second, we present polynomial-time algorithms using our generalized LexRSMs for proving a.s. termination in broad classes of linear-arithmetic programs.

考虑概率规划的几乎确定终止问题,它是经典命令式规划的一种随机扩展。字典排序函数为非概率程序的终止提供了一种可靠而实用的方法,并通过字典排序上鞅(LexRSMs)实现了它们对概率程序的扩展。然而,在前面的工作中引入的lexrsm有一个限制,阻碍了它们的自动化:它们的所有组件在所有可达状态下都必须是非负的。这可能导致即使对于简单的终止程序也不存在LexRSM。我们的贡献是双重的。首先,我们介绍了lexrsm的一般化,它允许某些组件为负。这种非概率终止证明的标准特征迄今为止还不知道在概率设置中是可靠的,因为可靠性证明需要对潜在的随机过程进行仔细的分析。其次,我们提出了多项式时间算法,使用我们的广义LexRSMs来证明广义线性算术程序中的自动终止。
{"title":"On Lexicographic Proof Rules for Probabilistic Termination","authors":"Krishnendu Chatterjee, Ehsan Kafshdar Goharshady, Petr Novotný, Jiří Zárevúcky, Đorđe Žikelić","doi":"https://dl.acm.org/doi/10.1145/3585391","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3585391","url":null,"abstract":"<p>We consider the almost-sure (a.s.) termination problem for probabilistic programs, which are a stochastic extension of classical imperative programs. Lexicographic ranking functions provide a sound and practical approach for termination of non-probabilistic programs, and their extension to probabilistic programs is achieved via lexicographic ranking supermartingales (LexRSMs). However, LexRSMs introduced in the previous work have a limitation that impedes their automation: all of their components have to be non-negative in all reachable states. This might result in a LexRSM not existing even for simple terminating programs. Our contributions are twofold. First, we introduce a generalization of LexRSMs that allows for some components to be negative. This standard feature of non-probabilistic termination proofs was hitherto not known to be sound in the probabilistic setting, as the soundness proof requires a careful analysis of the underlying stochastic process. Second, we present polynomial-time algorithms using our generalized LexRSMs for proving a.s. termination in broad classes of linear-arithmetic programs.</p>","PeriodicalId":50432,"journal":{"name":"Formal Aspects of Computing","volume":"39 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138517742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Benchmarking Combinations of Learning and Testing Algorithms for Automata Learning 自动机学习的学习和测试算法的基准组合
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2023-06-21 DOI: https://dl.acm.org/doi/10.1145/3605360
Bernhard K. Aichernig, Martin Tappler, Felix Wallner

Automata learning enables model-based analysis of black-box systems by automatically constructing models from system observations, which are often collected via testing. The required testing budget to learn adequate models heavily depends on the applied learning and testing techniques.

Test cases executed for learning (1) collect behavioural information and (2) falsify learned hypothesis automata. Falsification test-cases are commonly selected through conformance testing. Active learning algorithms additionally implement test-case selection strategies to gain information, whereas passive algorithms derive models solely from given data. In an active setting, such algorithms require external test-case selection, like repeated conformance testing to extend the available data.

There exist various approaches to learning and conformance testing, where interdependencies among them affect performance. We investigate the performance of combinations of six learning algorithms, including a passive algorithm, and seven testing algorithms, by performing experiments using 153 benchmark models. We discuss insights regarding the performance of different configurations for various types of systems. Our findings may provide guidance for future users of automata learning. For example, counterexample processing during learning strongly impacts efficiency, which is further affected by testing approach and system type. Testing with the random Wp-method performs best overall, while mutation-based testing performs well on smaller models.

自动机学习通过从系统观察(通常是通过测试收集的)中自动构建模型来支持基于模型的黑盒系统分析。学习足够的模型所需的测试预算在很大程度上取决于应用的学习和测试技术。为学习而执行的测试用例(1)收集行为信息,(2)伪造学习到的假设自动机。伪造测试用例通常通过一致性测试来选择。主动学习算法另外实现测试用例选择策略以获取信息,而被动算法仅从给定数据中导出模型。在活动设置中,这样的算法需要外部测试用例选择,比如重复的一致性测试来扩展可用数据。存在各种学习和一致性测试的方法,其中它们之间的相互依赖关系会影响性能。我们通过使用153个基准模型进行实验,研究了六种学习算法(包括一种被动算法)和七种测试算法的组合性能。我们将讨论关于不同类型系统的不同配置的性能的见解。我们的发现可能为未来的自动学习用户提供指导。例如,学习过程中的反例处理对效率的影响很大,而效率又受到测试方法和系统类型的影响。使用随机wp方法的测试总体上表现最好,而基于突变的测试在较小的模型上表现良好。
{"title":"Benchmarking Combinations of Learning and Testing Algorithms for Automata Learning","authors":"Bernhard K. Aichernig, Martin Tappler, Felix Wallner","doi":"https://dl.acm.org/doi/10.1145/3605360","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3605360","url":null,"abstract":"<p>Automata learning enables model-based analysis of black-box systems by automatically constructing models from system observations, which are often collected via testing. The required testing budget to learn adequate models heavily depends on the applied learning and testing techniques. </p><p>Test cases executed for learning (1) collect behavioural information and (2) falsify learned hypothesis automata. Falsification test-cases are commonly selected through conformance testing. Active learning algorithms additionally implement test-case selection strategies to gain information, whereas passive algorithms derive models solely from given data. In an active setting, such algorithms require external test-case selection, like repeated conformance testing to extend the available data. </p><p>There exist various approaches to learning and conformance testing, where interdependencies among them affect performance. We investigate the performance of combinations of six learning algorithms, including a passive algorithm, and seven testing algorithms, by performing experiments using 153 benchmark models. We discuss insights regarding the performance of different configurations for various types of systems. Our findings may provide guidance for future users of automata learning. For example, counterexample processing during learning strongly impacts efficiency, which is further affected by testing approach and system type. Testing with the random Wp-method performs best overall, while mutation-based testing performs well on smaller models.</p>","PeriodicalId":50432,"journal":{"name":"Formal Aspects of Computing","volume":"15 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138517743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Benchmarking Combinations of Learning and Testing Algorithms for Automata Learning 用于自动机学习的学习和测试算法的基准组合
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2023-06-21 DOI: 10.1145/3605360
B. Aichernig, Martin Tappler, Felix Wallner
Automata learning enables model-based analysis of black-box systems by automatically constructing models from system observations, which are often collected via testing. The required testing budget to learn adequate models heavily depends on the applied learning and testing techniques. Test cases executed for learning (1) collect behavioural information and (2) falsify learned hypothesis automata. Falsification test-cases are commonly selected through conformance testing. Active learning algorithms additionally implement test-case selection strategies to gain information, whereas passive algorithms derive models solely from given data. In an active setting, such algorithms require external test-case selection, like repeated conformance testing to extend the available data. There exist various approaches to learning and conformance testing, where interdependencies among them affect performance. We investigate the performance of combinations of six learning algorithms, including a passive algorithm, and seven testing algorithms, by performing experiments using 153 benchmark models. We discuss insights regarding the performance of different configurations for various types of systems. Our findings may provide guidance for future users of automata learning. For example, counterexample processing during learning strongly impacts efficiency, which is further affected by testing approach and system type. Testing with the random Wp-method performs best overall, while mutation-based testing performs well on smaller models.
自动机学习通过从系统观测值自动构建模型,实现了对黑匣子系统的基于模型的分析,这些观测值通常是通过测试收集的。学习足够模型所需的测试预算在很大程度上取决于应用的学习和测试技术。为学习而执行的测试用例(1)收集行为信息,(2)伪造学习到的假设自动机。伪造测试用例通常是通过一致性测试来选择的。主动学习算法还实现了测试用例选择策略以获取信息,而被动算法仅从给定数据中导出模型。在活动设置中,此类算法需要外部测试用例选择,如重复一致性测试以扩展可用数据。存在各种学习和一致性测试方法,它们之间的相互依赖性会影响性能。我们通过使用153个基准模型进行实验,研究了六种学习算法(包括一种被动算法和七种测试算法)的组合的性能。我们讨论了关于不同类型系统的不同配置的性能的见解。我们的发现可能为未来的自动机学习用户提供指导。例如,学习过程中的反例处理强烈影响效率,而效率又受到测试方法和系统类型的影响。随机Wp方法的测试总体表现最好,而基于突变的测试在较小的模型上表现良好。
{"title":"Benchmarking Combinations of Learning and Testing Algorithms for Automata Learning","authors":"B. Aichernig, Martin Tappler, Felix Wallner","doi":"10.1145/3605360","DOIUrl":"https://doi.org/10.1145/3605360","url":null,"abstract":"Automata learning enables model-based analysis of black-box systems by automatically constructing models from system observations, which are often collected via testing. The required testing budget to learn adequate models heavily depends on the applied learning and testing techniques. Test cases executed for learning (1) collect behavioural information and (2) falsify learned hypothesis automata. Falsification test-cases are commonly selected through conformance testing. Active learning algorithms additionally implement test-case selection strategies to gain information, whereas passive algorithms derive models solely from given data. In an active setting, such algorithms require external test-case selection, like repeated conformance testing to extend the available data. There exist various approaches to learning and conformance testing, where interdependencies among them affect performance. We investigate the performance of combinations of six learning algorithms, including a passive algorithm, and seven testing algorithms, by performing experiments using 153 benchmark models. We discuss insights regarding the performance of different configurations for various types of systems. Our findings may provide guidance for future users of automata learning. For example, counterexample processing during learning strongly impacts efficiency, which is further affected by testing approach and system type. Testing with the random Wp-method performs best overall, while mutation-based testing performs well on smaller models.","PeriodicalId":50432,"journal":{"name":"Formal Aspects of Computing","volume":" ","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49533006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FVF-AKA: A Formal Verification Framework of AKA Protocols for Multi-server IoT FVF-AKA:多服务器物联网AKA协议的正式验证框架
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2023-05-25 DOI: https://dl.acm.org/doi/10.1145/3599731
Yuan Fei, Huibiao Zhu, Jiaqi Yin

As IoT in multi-server environment increases resources utilization, more and more problems of IoT authentication and key agreement are revealed. Authentication and Key Agreement (AKA) protocol plays an important role in solving these problems. Many AKA protocols have been proposed, and some of them support their own verifications. However, there lacks a unifying verification framework for multi-server IoT. In this paper, we propose a formal verification framework of AKA protocols for multi-server IoT (FVF-AKA). It supports the construction of CSP models for the AKA protocol, the implementation of the CSP models in PAT with C#, and the verification of formal models. With the help of C#, many complex functions in AKA protocol can be implemented. We also design an algorithm to support automatic conversion from CSP model to PAT model. FVF-AKA can verify four fundamental properties (deadlock freedom, entity legitimacy, timeout delay, and session key consistency). It also supports the verification of security properties for the AKA protocol suffering from four different attacks (relay attacks, denial of service attacks, server spoofing attacks, and session key attacks). Our approach can be applied to most AKA protocols for multi-server IoT generally. By applying FVF-AKA to two AKA protocols, we can verify whether they satisfy the fundamental properties and analyze their security properties in vulnerable environments. Our work would help to analyze the AKA protocol for multi-server IoT and provide the foundation for the analysis of enhancing its security and robustness.

随着多服务器环境下物联网资源利用率的提高,越来越多的物联网认证和密钥协议问题暴露出来。认证与密钥协议(AKA)在解决这些问题方面发挥了重要作用。已经提出了许多AKA协议,其中一些协议支持自己的验证。然而,多服务器物联网缺乏统一的验证框架。在本文中,我们提出了一个多服务器物联网AKA协议的正式验证框架(FVF-AKA)。它支持为AKA协议构建CSP模型,用c#在PAT中实现CSP模型,以及对形式化模型的验证。在c#的帮助下,可以实现AKA协议中的许多复杂功能。我们还设计了一种算法,支持从CSP模型到PAT模型的自动转换。FVF-AKA可以验证四个基本属性(死锁自由、实体合法性、超时延迟和会话密钥一致性)。它还支持验证遭受四种不同攻击(中继攻击、拒绝服务攻击、服务器欺骗攻击和会话密钥攻击)的AKA协议的安全属性。我们的方法通常可以应用于多服务器物联网的大多数AKA协议。通过将FVF-AKA应用于两种AKA协议,验证其是否满足基本属性,并分析其在脆弱环境下的安全属性。我们的工作将有助于分析多服务器物联网的AKA协议,并为提高其安全性和鲁棒性的分析提供基础。
{"title":"FVF-AKA: A Formal Verification Framework of AKA Protocols for Multi-server IoT","authors":"Yuan Fei, Huibiao Zhu, Jiaqi Yin","doi":"https://dl.acm.org/doi/10.1145/3599731","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3599731","url":null,"abstract":"<p>As IoT in multi-server environment increases resources utilization, more and more problems of IoT authentication and key agreement are revealed. Authentication and Key Agreement (AKA) protocol plays an important role in solving these problems. Many AKA protocols have been proposed, and some of them support their own verifications. However, there lacks a unifying verification framework for multi-server IoT. In this paper, we propose a formal verification framework of AKA protocols for multi-server IoT (FVF-AKA). It supports the construction of CSP models for the AKA protocol, the implementation of the CSP models in PAT with C#, and the verification of formal models. With the help of C#, many complex functions in AKA protocol can be implemented. We also design an algorithm to support automatic conversion from CSP model to PAT model. FVF-AKA can verify four fundamental properties (deadlock freedom, entity legitimacy, timeout delay, and session key consistency). It also supports the verification of security properties for the AKA protocol suffering from four different attacks (relay attacks, denial of service attacks, server spoofing attacks, and session key attacks). Our approach can be applied to most AKA protocols for multi-server IoT generally. By applying FVF-AKA to two AKA protocols, we can verify whether they satisfy the fundamental properties and analyze their security properties in vulnerable environments. Our work would help to analyze the AKA protocol for multi-server IoT and provide the foundation for the analysis of enhancing its security and robustness.</p>","PeriodicalId":50432,"journal":{"name":"Formal Aspects of Computing","volume":"12 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138517744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FVF-AKA: A Formal Verification Framework of AKA Protocols for Multi-server IoT FVF-AKA:多服务器物联网AKA协议的正式验证框架
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2023-05-25 DOI: 10.1145/3599731
Yuan Fei, Huibiao Zhu, Jiaqi Yin
As IoT in multi-server environment increases resources utilization, more and more problems of IoT authentication and key agreement are revealed. Authentication and Key Agreement (AKA) protocol plays an important role in solving these problems. Many AKA protocols have been proposed, and some of them support their own verifications. However, there lacks a unifying verification framework for multi-server IoT. In this paper, we propose a formal verification framework of AKA protocols for multi-server IoT (FVF-AKA). It supports the construction of CSP models for the AKA protocol, the implementation of the CSP models in PAT with C#, and the verification of formal models. With the help of C#, many complex functions in AKA protocol can be implemented. We also design an algorithm to support automatic conversion from CSP model to PAT model. FVF-AKA can verify four fundamental properties (deadlock freedom, entity legitimacy, timeout delay, and session key consistency). It also supports the verification of security properties for the AKA protocol suffering from four different attacks (relay attacks, denial of service attacks, server spoofing attacks, and session key attacks). Our approach can be applied to most AKA protocols for multi-server IoT generally. By applying FVF-AKA to two AKA protocols, we can verify whether they satisfy the fundamental properties and analyze their security properties in vulnerable environments. Our work would help to analyze the AKA protocol for multi-server IoT and provide the foundation for the analysis of enhancing its security and robustness.
随着多服务器环境下物联网资源利用率的提高,越来越多的物联网认证和密钥协议问题暴露出来。认证与密钥协议(AKA)在解决这些问题方面发挥了重要作用。已经提出了许多AKA协议,其中一些协议支持自己的验证。然而,多服务器物联网缺乏统一的验证框架。在本文中,我们提出了一个多服务器物联网AKA协议的正式验证框架(FVF-AKA)。它支持为AKA协议构建CSP模型,用c#在PAT中实现CSP模型,以及对形式化模型的验证。在c#的帮助下,可以实现AKA协议中的许多复杂功能。我们还设计了一种算法,支持从CSP模型到PAT模型的自动转换。FVF-AKA可以验证四个基本属性(死锁自由、实体合法性、超时延迟和会话密钥一致性)。它还支持验证遭受四种不同攻击(中继攻击、拒绝服务攻击、服务器欺骗攻击和会话密钥攻击)的AKA协议的安全属性。我们的方法通常可以应用于多服务器物联网的大多数AKA协议。通过将FVF-AKA应用于两种AKA协议,验证其是否满足基本属性,并分析其在脆弱环境下的安全属性。我们的工作将有助于分析多服务器物联网的AKA协议,并为提高其安全性和鲁棒性的分析提供基础。
{"title":"FVF-AKA: A Formal Verification Framework of AKA Protocols for Multi-server IoT","authors":"Yuan Fei, Huibiao Zhu, Jiaqi Yin","doi":"10.1145/3599731","DOIUrl":"https://doi.org/10.1145/3599731","url":null,"abstract":"As IoT in multi-server environment increases resources utilization, more and more problems of IoT authentication and key agreement are revealed. Authentication and Key Agreement (AKA) protocol plays an important role in solving these problems. Many AKA protocols have been proposed, and some of them support their own verifications. However, there lacks a unifying verification framework for multi-server IoT. In this paper, we propose a formal verification framework of AKA protocols for multi-server IoT (FVF-AKA). It supports the construction of CSP models for the AKA protocol, the implementation of the CSP models in PAT with C#, and the verification of formal models. With the help of C#, many complex functions in AKA protocol can be implemented. We also design an algorithm to support automatic conversion from CSP model to PAT model. FVF-AKA can verify four fundamental properties (deadlock freedom, entity legitimacy, timeout delay, and session key consistency). It also supports the verification of security properties for the AKA protocol suffering from four different attacks (relay attacks, denial of service attacks, server spoofing attacks, and session key attacks). Our approach can be applied to most AKA protocols for multi-server IoT generally. By applying FVF-AKA to two AKA protocols, we can verify whether they satisfy the fundamental properties and analyze their security properties in vulnerable environments. Our work would help to analyze the AKA protocol for multi-server IoT and provide the foundation for the analysis of enhancing its security and robustness.","PeriodicalId":50432,"journal":{"name":"Formal Aspects of Computing","volume":" ","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46326242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Formal Aspects of Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1