首页 > 最新文献

Computer Standards & Interfaces最新文献

英文 中文
Fast bicriteria streaming algorithms for submodular cover problem under noise models 噪声模型下亚模态覆盖问题的快速双标准流算法
IF 4.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-06-29 DOI: 10.1016/j.csi.2024.103883
Bich-Ngan T. Nguyen , Phuong N.H. Pham , Canh V. Pham , Vaclav Snasel

The Submodular Cover (SC) problem has attracted the attention of researchers because of its wide variety of applications in many domains. Previous studies on this problem have focused on solving it under the assumption of a non-noise environment or using the greedy algorithm to solve it under noise. However, in some applications, the data is often large-scale and brings a noisy version, so the existing solutions are ineffective or not applicable to large and noisy data. Motivated by this phenomenon, we study the Submodular Cover under Noises (SCN) problem and propose two efficient streaming algorithms, which provide a solution with theoretical bounds under two common noise models, multiplicative and additive noises. The experimental results indicate that our proposed algorithms not only provide the solution with a high objective function value but also outperform the state-of-the-art algorithm in terms of both the number of queries and the running time.

子模覆盖(SC)问题因其在许多领域的广泛应用而备受研究人员的关注。以往对这一问题的研究主要集中在非噪声环境假设下的求解,或在噪声环境下使用贪婪算法求解。然而,在一些应用中,数据往往是大规模的,而且会带来噪声版本,因此现有的解决方案对大规模和噪声数据无效或不适用。受这一现象的启发,我们研究了噪声下的次模态覆盖(SCN)问题,并提出了两种高效的流算法,在乘法噪声和加法噪声两种常见噪声模型下提供了具有理论边界的解决方案。实验结果表明,我们提出的算法不仅能提供目标函数值较高的解决方案,而且在查询次数和运行时间方面都优于最先进的算法。
{"title":"Fast bicriteria streaming algorithms for submodular cover problem under noise models","authors":"Bich-Ngan T. Nguyen ,&nbsp;Phuong N.H. Pham ,&nbsp;Canh V. Pham ,&nbsp;Vaclav Snasel","doi":"10.1016/j.csi.2024.103883","DOIUrl":"https://doi.org/10.1016/j.csi.2024.103883","url":null,"abstract":"<div><p>The Submodular Cover (<span><math><mi>SC</mi></math></span>) problem has attracted the attention of researchers because of its wide variety of applications in many domains. Previous studies on this problem have focused on solving it under the assumption of a non-noise environment or using the greedy algorithm to solve it under noise. However, in some applications, the data is often large-scale and brings a noisy version, so the existing solutions are ineffective or not applicable to large and noisy data. Motivated by this phenomenon, we study the Submodular Cover under Noises (<span><math><mi>SCN</mi></math></span>) problem and propose two efficient streaming algorithms, which provide a solution with theoretical bounds under two common noise models, multiplicative and additive noises. The experimental results indicate that our proposed algorithms not only provide the solution with a high objective function value but also outperform the state-of-the-art algorithm in terms of both the number of queries and the running time.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"91 ","pages":"Article 103883"},"PeriodicalIF":4.1,"publicationDate":"2024-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141541837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Metric cake shop: A serious game for supporting education on ISO/IEC/IEEE 15939:2017 – Systems and software engineering – Measurement process in the context of an undergraduate software engineering course 公制蛋糕店:支持 ISO/IEC/IEEE 15939:2017 - 系统和软件工程 - 本科软件工程课程中的测量过程教育的严肃游戏
IF 4.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-06-24 DOI: 10.1016/j.csi.2024.103879
Ivan García , Carla Pacheco , Itahí López , Jose A. Calvo-Manzano , Brenda L. Flores-Rios

The educational use of serious games has increased in recent years and their pedagogical benefits have been widely documented, especially for teaching specialized knowledge on Software Engineering at undergraduate level. The results achieved by several studies in this area show that it has been possible to increase the student interest and motivation in learning complex topics that tend to be difficult to understand when knowledge is imparted through traditional lectures, as is the case with software process standards. In this regard, the ISO/IEC/IEEE 15939:2017 standard describes a software measurement process, one of the main topics that must be addressed in any curriculum for undergraduate degree programs in Software Engineering. However, despite their relevance in industry, many students are leaving university without basic software measurement skills. With the aim of identifying serious games for teaching the software measurement process at undergraduate level, a Systematic Literature Review was conducted in order to collect, classify and analyze information which enabled the authors of this study to propose a serious game that improves the understanding and education on the ISO/IEC/IEEE 15939:2017 standard. The results from an empirical evaluation involving Computer Science undergraduates provided evidence that positive learning experiences occurred when playing the created serious game.

近年来,严肃游戏在教育领域的应用越来越多,其教学优势已被广泛记录,特别是在本科阶段教授软件工程专业知识时。该领域的多项研究结果表明,严肃游戏可以提高学生学习复杂主题的兴趣和动力,而这些主题在通过传统授课方式传授知识时往往难以理解,软件过程标准就是一个例子。在这方面,ISO/IEC/IEEE 15939:2017 标准描述了软件测量过程,这是任何软件工程本科学位课程都必须涉及的主要课题之一。然而,尽管软件测量与工业相关,但许多学生在离开大学时却没有掌握基本的软件测量技能。为了确定在本科阶段教授软件测量过程的严肃游戏,我们进行了系统的文献综述,以收集、分类和分析信息,从而使本研究的作者能够提出一种严肃游戏,以提高对 ISO/IEC/IEEE 15939:2017 标准的理解和教育。由计算机科学专业本科生参与的实证评估结果表明,在玩所创建的严肃游戏时,他们获得了积极的学习体验。
{"title":"Metric cake shop: A serious game for supporting education on ISO/IEC/IEEE 15939:2017 – Systems and software engineering – Measurement process in the context of an undergraduate software engineering course","authors":"Ivan García ,&nbsp;Carla Pacheco ,&nbsp;Itahí López ,&nbsp;Jose A. Calvo-Manzano ,&nbsp;Brenda L. Flores-Rios","doi":"10.1016/j.csi.2024.103879","DOIUrl":"https://doi.org/10.1016/j.csi.2024.103879","url":null,"abstract":"<div><p>The educational use of serious games has increased in recent years and their pedagogical benefits have been widely documented, especially for teaching specialized knowledge on Software Engineering at undergraduate level. The results achieved by several studies in this area show that it has been possible to increase the student interest and motivation in learning complex topics that tend to be difficult to understand when knowledge is imparted through traditional lectures, as is the case with software process standards. In this regard, the ISO/IEC/IEEE 15939:2017 standard describes a software measurement process, one of the main topics that must be addressed in any curriculum for undergraduate degree programs in Software Engineering. However, despite their relevance in industry, many students are leaving university without basic software measurement skills. With the aim of identifying serious games for teaching the software measurement process at undergraduate level, a Systematic Literature Review was conducted in order to collect, classify and analyze information which enabled the authors of this study to propose a serious game that improves the understanding and education on the ISO/IEC/IEEE 15939:2017 standard. The results from an empirical evaluation involving Computer Science undergraduates provided evidence that positive learning experiences occurred when playing the created serious game.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"91 ","pages":"Article 103879"},"PeriodicalIF":4.1,"publicationDate":"2024-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141483958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Agile governance practices by aligning CMMI V2.0 with portfolio SAFe 5.0 将 CMMI V2.0 与组合 SAFe 5.0 相结合的敏捷管理实践
IF 4.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-06-22 DOI: 10.1016/j.csi.2024.103881
Valeria Henriquez , Jose A. Calvo-Manzano , Ana M. Moreno , Tomas San Feliu

Agile is now a mainstream approach used by developer teams at software organizations. However, many of these organizations still employ traditional governance methods, negatively impacting agile team performance, quality and morale. To address this issue, we applied the Design Science Research Framework to develop Agile governance guidelines by harmonizing CMMI V2.0 and SAFe 5.0. Specifically, we matched CMMI V2.0 governance practices to SAFe 5.0 roles, practices and artefacts. The resulting guidelines were validated, first by means of a survey and then through interviews with process improvement practitioners and agile experts who worked on a fictitious case study. The survey participants, especially those more familiar with SAFe practices, stated that the proposed harmonization was meaningful. Agile experts participating in the case study confirmed that the proposed guidelines were practical and comprehensive, as well as consistent and complete. Pending further empirical validation, these guidelines constitute a crucial step towards Agile governance.

敏捷目前已成为软件企业开发人员团队使用的主流方法。然而,其中许多组织仍在使用传统的治理方法,这对敏捷团队的绩效、质量和士气产生了负面影响。为了解决这个问题,我们应用了设计科学研究框架,通过协调 CMMI V2.0 和 SAFe 5.0 来制定敏捷治理指南。具体来说,我们将 CMMI V2.0 治理实践与 SAFe 5.0 角色、实践和工件相匹配。我们首先通过调查,然后通过与流程改进实践者和从事虚构案例研究的敏捷专家进行访谈,验证了由此产生的指南。调查参与者,尤其是那些更熟悉 SAFe 实践的人,都表示建议的协调是有意义的。参与案例研究的敏捷专家确认,建议的指南实用、全面、一致且完整。在进一步的经验验证之前,这些指导方针是实现敏捷管理的关键一步。
{"title":"Agile governance practices by aligning CMMI V2.0 with portfolio SAFe 5.0","authors":"Valeria Henriquez ,&nbsp;Jose A. Calvo-Manzano ,&nbsp;Ana M. Moreno ,&nbsp;Tomas San Feliu","doi":"10.1016/j.csi.2024.103881","DOIUrl":"https://doi.org/10.1016/j.csi.2024.103881","url":null,"abstract":"<div><p>Agile is now a mainstream approach used by developer teams at software organizations. However, many of these organizations still employ traditional governance methods, negatively impacting agile team performance, quality and morale. To address this issue, we applied the Design Science Research Framework to develop Agile governance guidelines by harmonizing CMMI V2.0 and SAFe 5.0. Specifically, we matched CMMI V2.0 governance practices to SAFe 5.0 roles, practices and artefacts. The resulting guidelines were validated, first by means of a survey and then through interviews with process improvement practitioners and agile experts who worked on a fictitious case study. The survey participants, especially those more familiar with SAFe practices, stated that the proposed harmonization was meaningful. Agile experts participating in the case study confirmed that the proposed guidelines were practical and comprehensive, as well as consistent and complete. Pending further empirical validation, these guidelines constitute a crucial step towards Agile governance.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"91 ","pages":"Article 103881"},"PeriodicalIF":4.1,"publicationDate":"2024-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141483957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Leveraging complex event processing for monitoring and automatically detecting anomalies in Ethereum-based blockchain networks 利用复杂事件处理监控和自动检测基于以太坊的区块链网络中的异常情况
IF 4.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-06-22 DOI: 10.1016/j.csi.2024.103882
Jesús Rosa-Bilbao , Juan Boubeta-Puig , Jesús Lagares-Galán , Mark Vella

Blockchain is a relatively recent technology that provides immutability, traceability and transparency of information, thus building trust in the digital society. Blockchain networks generate a large amount of logs which capture and describe data flowing through the network in the form of transactions, blocks and events. Monitoring these blockchain data from the off-chain world is needed to detect anomalies with the aim of mitigating the risks that may arise as a result of using blockchain technology. However, the real-time monitoring of these logs by off-chain systems has become a challenge from the beginning of 2018 when the blockchain networks reached a high number of daily transactions. In this paper, we propose a portable, maintainable and easily configurable architecture integrating blockchain and complex event processing technologies that allows for both the real-time monitoring of logs generated in Ethereum Virtual Machine (EVM)-compatible blockchain networks and the automatic detection of anomalies in these networks by matching event patterns. This architecture was tested by using vast amounts of blockchain data already publicly registered in Ethereum and Polygon networks. The results demonstrate that the proposed architecture is able to automatically detect anomalies which occur in different blockchain networks, making analytics of blockchain data possible by off-chain systems.

区块链是一种相对较新的技术,可提供信息的不可更改性、可追溯性和透明度,从而在数字社会中建立信任。区块链网络会生成大量日志,以交易、区块和事件的形式捕捉和描述流经网络的数据。需要从链外世界监控这些区块链数据,以检测异常情况,从而降低使用区块链技术可能产生的风险。然而,从 2018 年初开始,当区块链网络达到很高的日交易量时,链外系统对这些日志的实时监控就成为了一项挑战。在本文中,我们提出了一种集成了区块链和复杂事件处理技术的可移植、可维护、易配置的架构,既可以实时监控以太坊虚拟机(EVM)兼容的区块链网络中生成的日志,又可以通过匹配事件模式自动检测这些网络中的异常情况。通过使用以太坊和多边形网络中已公开注册的大量区块链数据,对该架构进行了测试。结果表明,所提出的架构能够自动检测不同区块链网络中出现的异常情况,从而使链外系统对区块链数据进行分析成为可能。
{"title":"Leveraging complex event processing for monitoring and automatically detecting anomalies in Ethereum-based blockchain networks","authors":"Jesús Rosa-Bilbao ,&nbsp;Juan Boubeta-Puig ,&nbsp;Jesús Lagares-Galán ,&nbsp;Mark Vella","doi":"10.1016/j.csi.2024.103882","DOIUrl":"https://doi.org/10.1016/j.csi.2024.103882","url":null,"abstract":"<div><p>Blockchain is a relatively recent technology that provides immutability, traceability and transparency of information, thus building trust in the digital society. Blockchain networks generate a large amount of logs which capture and describe data flowing through the network in the form of transactions, blocks and events. Monitoring these blockchain data from the off-chain world is needed to detect anomalies with the aim of mitigating the risks that may arise as a result of using blockchain technology. However, the real-time monitoring of these logs by off-chain systems has become a challenge from the beginning of 2018 when the blockchain networks reached a high number of daily transactions. In this paper, we propose a portable, maintainable and easily configurable architecture integrating blockchain and complex event processing technologies that allows for both the real-time monitoring of logs generated in Ethereum Virtual Machine (EVM)-compatible blockchain networks and the automatic detection of anomalies in these networks by matching event patterns. This architecture was tested by using vast amounts of blockchain data already publicly registered in Ethereum and Polygon networks. The results demonstrate that the proposed architecture is able to automatically detect anomalies which occur in different blockchain networks, making analytics of blockchain data possible by off-chain systems.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"91 ","pages":"Article 103882"},"PeriodicalIF":4.1,"publicationDate":"2024-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0920548924000515/pdfft?md5=894c93d9ed7ae669b6deb8fe4431f790&pid=1-s2.0-S0920548924000515-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141483952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ISH: Isogeny-based Secret Handshakes with friendly communication costs ISH:基于同源性的秘密握手,通信成本友好
IF 4.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-06-17 DOI: 10.1016/j.csi.2024.103880
Chao Chen , Fangguo Zhang , Zhiyuan An , Jing Zhang

Secret handshake schemes allow members from the same organization to authenticate each other anonymously. After its proposal, various schemes have been introduced to achieve advanced privacy protection. Regrettably, all the schemes based on number theoretic assumptions are insecure under quantum computers, and the known post-quantum designs are impractical because of the overhead cost (> 10 MB). To fill the gap, we present the first isogeny-based secret handshake scheme (i.e., ISH) with a friendly communication cost (67 KB). In particular, we apply the CSI-FiSh signature scheme to generate group keys and credentials. For each zero-knowledge transcript in the credential, we generate a signature for handshake via the Fiat–Shamir paradigm, while it fails anonymous authentication. To fix the issue, we modify the Fiat–Shamir-type signature by embedding the CSIDH ephemeral private key into the challenge space. After verifying the modified signatures, two users recover the right ephemeral private key if they are in the same group, then they can negotiate a session key and authenticate each other. Our scheme is proved secure under the Group Action Inverse Problems (GAIP) in the random oracle model, and deniability, as an attractive property, also holds for ISH, enabling user’s ability to deny their interactions in the finished handshakes. Via choosing appropriate parameters, the communication cost surpasses all the existing post-quantum secret handshakes.

秘密握手方案允许同一组织的成员匿名相互验证。秘密握手方案提出后,人们推出了各种方案来实现高级隐私保护。遗憾的是,所有基于数论假设的方案在量子计算机下都不安全,而已知的后量子设计也因开销成本(10 MB)而不切实际。为了填补这一空白,我们提出了第一个基于同源的秘密握手方案(即 ISH),其通信成本非常低(67 KB)。具体而言,我们采用 CSI-FiSh 签名方案来生成组密钥和凭证。对于凭证中的每个零知识副本,我们通过 Fiat-Shamir 范式生成用于握手的签名,但它无法进行匿名验证。为了解决这个问题,我们修改了 Fiat-Shamir 类型的签名,将 CSIDH 瞬时私钥嵌入挑战空间。验证修改后的签名后,如果两个用户在同一个组中,他们就能恢复正确的短暂私钥,然后他们就能协商一个会话密钥并相互认证。我们的方案在随机甲骨文模型中的群行动逆问题(GAIP)下证明是安全的,而且作为一个有吸引力的属性,可否认性也适用于 ISH,使用户能够否认他们在完成握手过程中的互动。通过选择适当的参数,通信成本超过了所有现有的后量子秘密握手算法。
{"title":"ISH: Isogeny-based Secret Handshakes with friendly communication costs","authors":"Chao Chen ,&nbsp;Fangguo Zhang ,&nbsp;Zhiyuan An ,&nbsp;Jing Zhang","doi":"10.1016/j.csi.2024.103880","DOIUrl":"https://doi.org/10.1016/j.csi.2024.103880","url":null,"abstract":"<div><p>Secret handshake schemes allow members from the same organization to authenticate each other anonymously. After its proposal, various schemes have been introduced to achieve advanced privacy protection. Regrettably, all the schemes based on number theoretic assumptions are insecure under quantum computers, and the known post-quantum designs are impractical because of the overhead cost (<span><math><mo>&gt;</mo></math></span> 10 MB). To fill the gap, we present the first isogeny-based secret handshake scheme (i.e., <span><math><mi>ISH</mi></math></span>) with a friendly communication cost (67 KB). In particular, we apply the CSI-FiSh signature scheme to generate group keys and credentials. For each zero-knowledge transcript in the credential, we generate a signature for handshake via the Fiat–Shamir paradigm, while it fails anonymous authentication. To fix the issue, we modify the Fiat–Shamir-type signature by embedding the CSIDH ephemeral private key into the challenge space. After verifying the modified signatures, two users recover the right ephemeral private key if they are in the same group, then they can negotiate a session key and authenticate each other. Our scheme is proved secure under the Group Action Inverse Problems (GAIP) in the random oracle model, and deniability, as an attractive property, also holds for <span><math><mi>ISH</mi></math></span>, enabling user’s ability to deny their interactions in the finished handshakes. Via choosing appropriate parameters, the communication cost surpasses all the existing post-quantum secret handshakes.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"91 ","pages":"Article 103880"},"PeriodicalIF":4.1,"publicationDate":"2024-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141483959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pricing4APIs: A rigorous model for RESTful API pricings Pricing4APIs:RESTful API 定价的严格模型
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-06-10 DOI: 10.1016/j.csi.2024.103878
Rafael Fresno-Aranda , Pablo Fernandez , Antonio Gamez-Diaz , Amador Duran , Antonio Ruiz-Cortes

APIs are increasingly becoming new business assets for organizations and consequently, API functionality and its pricing should be precisely defined for customers. Pricing is typically composed by different plans that specify a range of limitations, e.g., a Free plan allows 100 monthly requests while a Gold plan has 10 000 requests per month. In this context, the OpenAPI Specification (OAS) has emerged to model the functional part of an API, becoming a de facto industry standard and boosting a rich ecosystem of vendor-neutral tools to assist API providers and consumers. In contrast, there is no proposal for modeling API pricings (i.e., their plans and limitations) and this lack hinders the creation of tools that can leverage this information. To deal with this gap, this paper presents a pricing modeling framework that includes: (a) Pricing4APIs model, a comprehensive and rigorous model of API pricings, along SLA4OAI, a serialization that extends OAS; (b) an operation to validate the description of API pricings, with a toolset (sla4oai-analyzer) that has been developed to automate this operation. Additionally, we analyzed 268 real-world APIs to assess the expressiveness of our proposal and created a representative dataset of 54 pricing models to validate our framework.

应用程序接口正日益成为企业的新业务资产,因此,应为客户精确定义应用程序接口的功能及其定价。定价通常由不同的计划组成,这些计划规定了一系列限制,例如,免费计划每月允许 100 个请求,而黄金计划每月允许 10 000 个请求。在这种情况下,开放式应用程序接口规范(OAS)应运而生,对应用程序接口的功能部分进行建模,成为事实上的行业标准,并促进了丰富的厂商中立工具生态系统,为应用程序接口提供商和消费者提供帮助。相比之下,目前还没有为应用程序接口定价(即其计划和限制)建模的建议,这种缺失阻碍了可利用该信息的工具的创建。为了弥补这一不足,本文提出了一个定价建模框架,其中包括(a) Pricing4APIs 模型,这是一个全面、严谨的 API 定价模型,同时还有 SLA4OAI(一种扩展了 OAS 的序列化);(b) 验证 API 定价描述的操作,以及为实现该操作自动化而开发的工具集(sla4oai-analyzer)。此外,我们还分析了 268 个现实世界中的应用程序接口,以评估我们建议的表达能力,并创建了一个包含 54 个定价模型的代表性数据集,以验证我们的框架。
{"title":"Pricing4APIs: A rigorous model for RESTful API pricings","authors":"Rafael Fresno-Aranda ,&nbsp;Pablo Fernandez ,&nbsp;Antonio Gamez-Diaz ,&nbsp;Amador Duran ,&nbsp;Antonio Ruiz-Cortes","doi":"10.1016/j.csi.2024.103878","DOIUrl":"https://doi.org/10.1016/j.csi.2024.103878","url":null,"abstract":"<div><p>APIs are increasingly becoming new business assets for organizations and consequently, API functionality and its pricing should be precisely defined for customers. Pricing is typically composed by different plans that specify a range of limitations, e.g., a Free plan allows 100 monthly requests while a Gold plan has 10<!--> <!-->000 requests per month. In this context, the OpenAPI Specification (OAS) has emerged to model the functional part of an API, becoming a de facto industry standard and boosting a rich ecosystem of vendor-neutral tools to assist API providers and consumers. In contrast, there is no proposal for modeling API pricings (i.e., their plans and limitations) and this lack hinders the creation of tools that can leverage this information. To deal with this gap, this paper presents a pricing modeling framework that includes: (a) <em>Pricing4APIs</em> model, a comprehensive and rigorous model of API pricings, along <em>SLA4OAI</em>, a serialization that extends OAS; (b) an operation to validate the description of API pricings, with a toolset (<em>sla4oai-analyzer</em>) that has been developed to automate this operation. Additionally, we analyzed 268 real-world APIs to assess the expressiveness of our proposal and created a representative dataset of 54 pricing models to validate our framework.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"91 ","pages":"Article 103878"},"PeriodicalIF":5.0,"publicationDate":"2024-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141423423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Testability-driven development: An improvement to the TDD efficiency 可测试性驱动开发:提高 TDD 效率
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-05-29 DOI: 10.1016/j.csi.2024.103877
Saeed Parsa , Morteza Zakeri-Nasrabadi , Burak Turhan

Test-first development (TFD) is a software development approach involving automated tests before writing the actual code. TFD offers many benefits, such as improving code quality, reducing debugging time, and enabling easier refactoring. However, TFD also poses challenges and limitations, requiring more effort and time to write and maintain test cases, especially for large and complex projects. Refactoring for testability is improving the internal structure of source code to make it easier to test. Refactoring for testability can reduce the cost and complexity of software testing and speed up the test-first life cycle. However, measuring testability is a vital step before refactoring for testability, as it provides a baseline for evaluating the current state of the software and identifying the areas that need improvement. This paper proposes a mathematical model for calculating class testability based on test effectiveness and effort and a machine-learning regression model that predicts testability using source code metrics. It also introduces a testability-driven development (TsDD) method that conducts the TFD process toward developing testable code. TsDD focuses on improving testability and reducing testing costs by measuring testability frequently and refactoring to increase testability without running the program. Our testability prediction model has a mean squared error of 0.0311 and an R2 score of 0.6285. We illustrate the usefulness of TsDD by applying it to 50 Java classes from three open-source projects. TsDD achieves an average of 77.81 % improvement in the testability of these classes. Experts’ manual evaluation confirms the potential of TsDD in accelerating the TDD process.

测试优先开发(TFD)是一种软件开发方法,包括在编写实际代码前进行自动测试。TFD 有很多优点,如提高代码质量、减少调试时间、简化重构等。然而,TFD 也带来了挑战和限制,需要花费更多精力和时间来编写和维护测试用例,尤其是对于大型复杂项目而言。可测试性重构是指改进源代码的内部结构,使其更易于测试。可测试性重构可以降低软件测试的成本和复杂性,加快测试优先的生命周期。然而,测量可测试性是重构可测试性之前的一个重要步骤,因为它为评估软件的当前状态和确定需要改进的领域提供了一个基准。本文提出了一个基于测试效果和工作量计算类可测试性的数学模型,以及一个利用源代码指标预测可测试性的机器学习回归模型。本文还介绍了可测试性驱动开发(TSDD)方法,该方法将 TFD 流程用于开发可测试代码。TsDD 专注于提高可测试性,并通过频繁测量可测试性和重构来降低测试成本,从而在不运行程序的情况下提高可测试性。我们的可测试性预测模型的均方误差为 0.0311,R2 得分为 0.6285。我们将 TsDD 应用于三个开源项目的 50 个 Java 类,以此说明 TsDD 的实用性。TsDD 使这些类的可测试性平均提高了 77.81%。专家的人工评估证实了 TsDD 在加速 TDD 流程方面的潜力。
{"title":"Testability-driven development: An improvement to the TDD efficiency","authors":"Saeed Parsa ,&nbsp;Morteza Zakeri-Nasrabadi ,&nbsp;Burak Turhan","doi":"10.1016/j.csi.2024.103877","DOIUrl":"https://doi.org/10.1016/j.csi.2024.103877","url":null,"abstract":"<div><p>Test-first development (TFD) is a software development approach involving automated tests before writing the actual code. TFD offers many benefits, such as improving code quality, reducing debugging time, and enabling easier refactoring. However, TFD also poses challenges and limitations, requiring more effort and time to write and maintain test cases, especially for large and complex projects. Refactoring for testability is improving the internal structure of source code to make it easier to test. Refactoring for testability can reduce the cost and complexity of software testing and speed up the test-first life cycle. However, measuring testability is a vital step before refactoring for testability, as it provides a baseline for evaluating the current state of the software and identifying the areas that need improvement. This paper proposes a mathematical model for calculating class testability based on test effectiveness and effort and a machine-learning regression model that predicts testability using source code metrics. It also introduces a testability-driven development (TsDD) method that conducts the TFD process toward developing testable code. TsDD focuses on improving testability and reducing testing costs by measuring testability frequently and refactoring to increase testability without running the program. Our testability prediction model has a mean squared error of 0.0311 and an R<sup>2</sup> score of 0.6285. We illustrate the usefulness of TsDD by applying it to 50 Java classes from three open-source projects. TsDD achieves an average of 77.81 % improvement in the testability of these classes. Experts’ manual evaluation confirms the potential of TsDD in accelerating the TDD process.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"91 ","pages":"Article 103877"},"PeriodicalIF":5.0,"publicationDate":"2024-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141322444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BLPCA-ledger: A lightweight plenum consensus protocols for consortium blockchain based on the hyperledger indy BLPCA-ledger:基于 Hyperledger Indy 的联盟区块链轻量级全体会议共识协议
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-05-28 DOI: 10.1016/j.csi.2024.103876
Faisal Mehmood , Abdullah Ayub Khan , Han Wang , Shahid Karim , Umara Khalid , Feng Zhao

An examination of different distributed real-time applications operating on the blockchain platform is conducted. These applications can be broadly classified into three types: permissionless public, permissioned private, and consortium chains. In order for a decentralized network to function independently, consensus mechanisms are needed to facilitate the delivery of transactions and keep track of them in a ledger. But the fundamental idea behind Blockchain technology is the use of several consensus protocols, like Proof of Stake, Proof of Elapsed Time, etc., which requires greater processing power. In order to arrange transactions, it increases the demand for buying more computing units. Furthermore, present consortia blockchain consensus mechanisms lack a policy to collect socio-economic financial levies, including monies for charitable donations, education, and social activities. To collect socio-economic taxes, this study suggests a lightweight Plenum consensus algorithm called "BLPCA" for consortium blockchains built on Hyperledger Indy. The Byzantine Fault Tolerance concept combined with optimization is used in the suggested BLPCA systems to manage large-scale decentralized traffic of socioeconomic hierarchy. Because there are no transaction costs, BLPCA encourages government analysts to review funds using fewer resources. By including a multithreading heterogeneous technique, the BLPCA can effectively handle multi-transaction needs and execute this protocol in an industrial setting that operates in real-time. It is observed from the simulations that even in the worst-case network scenario—such as a fork—the suggested consortium blockchain does not crash a single transaction. In order to guarantee node scalability, a high propagation speed is determined. Furthermore, the BLPCA shows an excellent average time while constructing socioeconomic transaction blocks.

对在区块链平台上运行的不同分布式实时应用进行了研究。这些应用可大致分为三种类型:无权限公有链、有权限私有链和联盟链。为了使去中心化网络独立运行,需要有共识机制来促进交易的交付,并在分类账中记录这些交易。但区块链技术背后的基本思想是使用多个共识协议,如 "权益证明"、"时间证明 "等,这需要更强的处理能力。为了安排交易,它增加了购买更多计算单元的需求。此外,目前的财团区块链共识机制缺乏征收社会经济财政税的政策,包括用于慈善捐赠、教育和社会活动的资金。为了征收社会经济税,本研究为基于 Hyperledger Indy 构建的联盟区块链提出了一种名为 "BLPCA "的轻量级 Plenum 共识算法。在建议的 BLPCA 系统中,拜占庭容错概念与优化相结合,用于管理社会经济层级的大规模去中心化流量。由于没有交易成本,BLPCA 鼓励政府分析人员使用更少的资源审查资金。通过采用多线程异构技术,BLPCA 可以有效处理多交易需求,并在实时运行的工业环境中执行该协议。模拟结果表明,即使在最糟糕的网络情况下(如分叉),建议的联盟区块链也不会出现单笔交易崩溃的情况。为了保证节点的可扩展性,确定了较高的传播速度。此外,BLPCA 在构建社会经济交易区块时显示出极佳的平均时间。
{"title":"BLPCA-ledger: A lightweight plenum consensus protocols for consortium blockchain based on the hyperledger indy","authors":"Faisal Mehmood ,&nbsp;Abdullah Ayub Khan ,&nbsp;Han Wang ,&nbsp;Shahid Karim ,&nbsp;Umara Khalid ,&nbsp;Feng Zhao","doi":"10.1016/j.csi.2024.103876","DOIUrl":"10.1016/j.csi.2024.103876","url":null,"abstract":"<div><p>An examination of different distributed real-time applications operating on the blockchain platform is conducted. These applications can be broadly classified into three types: permissionless public, permissioned private, and consortium chains. In order for a decentralized network to function independently, consensus mechanisms are needed to facilitate the delivery of transactions and keep track of them in a ledger. But the fundamental idea behind Blockchain technology is the use of several consensus protocols, like Proof of Stake, Proof of Elapsed Time, etc., which requires greater processing power. In order to arrange transactions, it increases the demand for buying more computing units. Furthermore, present consortia blockchain consensus mechanisms lack a policy to collect socio-economic financial levies, including monies for charitable donations, education, and social activities. To collect socio-economic taxes, this study suggests a lightweight Plenum consensus algorithm called \"BLPCA\" for consortium blockchains built on Hyperledger Indy. The Byzantine Fault Tolerance concept combined with optimization is used in the suggested BLPCA systems to manage large-scale decentralized traffic of socioeconomic hierarchy. Because there are no transaction costs, BLPCA encourages government analysts to review funds using fewer resources. By including a multithreading heterogeneous technique, the BLPCA can effectively handle multi-transaction needs and execute this protocol in an industrial setting that operates in real-time. It is observed from the simulations that even in the worst-case network scenario—such as a fork—the suggested consortium blockchain does not crash a single transaction. In order to guarantee node scalability, a high propagation speed is determined. Furthermore, the BLPCA shows an excellent average time while constructing socioeconomic transaction blocks.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"91 ","pages":"Article 103876"},"PeriodicalIF":5.0,"publicationDate":"2024-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141189788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Safeguarding the Internet of Things: Elevating IoT routing security through trust management excellence 保护物联网:通过卓越的信任管理提升物联网路由安全性
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-05-24 DOI: 10.1016/j.csi.2024.103873
Anup W. Burange , Vaishali M. Deshmukh , Yugandhara A. Thakare , Nitin Arvind Shelke

This study presents an innovative IoT routing security model that integrates trust management to bolster network reliability, improve resilience against routing attacks, and isolate malicious activities. The model, emphasizing node behavior, reputation, and past performance, offers a nuanced approach to network security. Through comprehensive comparisons between dynamic and static models in IoT routing, the impact on crucial performance parameters, including throughput, packet delivery ratio, control traffic overhead, and energy consumption, is quantified. Simulations showcase the model's effectiveness in securing IoT communication, achieving an impressive 98 % accuracy in detecting and mitigating attacks. Comparative analysis against prior studies underscores its exceptional performance, particularly in identifying and classifying attack types such as wormhole, Sybil, and rank, alongside normal traffic. This trust-based IoT routing security model represents a substantial advancement in securing dynamic IoT environments, standing out as a valuable contribution. Noteworthy is its low average power consumption, contributing to its exceptional lightweight nature.

本研究提出了一种创新的物联网路由安全模型,该模型整合了信任管理,可增强网络可靠性、提高抵御路由攻击的能力并隔离恶意活动。该模型强调节点行为、声誉和过往表现,为网络安全提供了一种细致入微的方法。通过对物联网路由动态模型和静态模型进行综合比较,量化了对吞吐量、数据包传送率、控制流量开销和能耗等关键性能参数的影响。模拟展示了该模型在确保物联网通信安全方面的有效性,在检测和缓解攻击方面达到了令人印象深刻的 98% 的准确率。与之前研究的对比分析凸显了该模型的卓越性能,尤其是在识别和分类虫洞、Sybil 和等级等攻击类型以及正常流量方面。这种基于信任的物联网路由安全模型代表了动态物联网环境安全方面的重大进步,是一项有价值的贡献。值得注意的是,它的平均功耗很低,这也是其特别轻量级的原因之一。
{"title":"Safeguarding the Internet of Things: Elevating IoT routing security through trust management excellence","authors":"Anup W. Burange ,&nbsp;Vaishali M. Deshmukh ,&nbsp;Yugandhara A. Thakare ,&nbsp;Nitin Arvind Shelke","doi":"10.1016/j.csi.2024.103873","DOIUrl":"https://doi.org/10.1016/j.csi.2024.103873","url":null,"abstract":"<div><p>This study presents an innovative IoT routing security model that integrates trust management to bolster network reliability, improve resilience against routing attacks, and isolate malicious activities. The model, emphasizing node behavior, reputation, and past performance, offers a nuanced approach to network security. Through comprehensive comparisons between dynamic and static models in IoT routing, the impact on crucial performance parameters, including throughput, packet delivery ratio, control traffic overhead, and energy consumption, is quantified. Simulations showcase the model's effectiveness in securing IoT communication, achieving an impressive 98 % accuracy in detecting and mitigating attacks. Comparative analysis against prior studies underscores its exceptional performance, particularly in identifying and classifying attack types such as wormhole, Sybil, and rank, alongside normal traffic. This trust-based IoT routing security model represents a substantial advancement in securing dynamic IoT environments, standing out as a valuable contribution. Noteworthy is its low average power consumption, contributing to its exceptional lightweight nature.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"91 ","pages":"Article 103873"},"PeriodicalIF":5.0,"publicationDate":"2024-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141095635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A secure and lightweight data management scheme based on redactable blockchain for Digital Copyright 基于数字版权区块链的安全轻量级数据管理方案
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-05-17 DOI: 10.1016/j.csi.2024.103875
Chuxin Zhuang , Qingyun Dai , Yue Zhang

Traditional Digital Copyright (DC) management system faces a single point of failure, and has no strict traceability. Meanwhile, the current blockchain-based DC schemes take less consideration to the authenticity of DC information stored on the blockchain. Additionally, the full node storage overhead and computation overhead of information retrieval and traceability increase significantly with the number of blocks. Therefore, in this paper, we propose a secure and lightweight data management scheme based on the redactable blockchain for DC. Users generate their public and private keys, which provide a legitimate signature. Then, we propose a transaction control mechanism based on ECDSA, which means that the storage of DC information can only be accomplished by providing a legitimate and verifiable signature, including registration and transaction information. Furthermore, we adopt blockchain to record DC information and the chameleon hash algorithm to modify DC information stored on the blockchain when making DC transactions, while keeping the block headers unchanged. System analysis and experimental results confirm that our scheme can address a single point of failure and ensure the authenticity of the information. Meanwhile, our scheme effectively reduces full node storage overhead, and computation overhead of information retrieval and traceability.

传统的数字版权(DC)管理系统面临单点故障,没有严格的可追溯性。同时,目前基于区块链的 DC 方案对存储在区块链上的 DC 信息的真实性考虑较少。此外,随着区块数量的增加,全节点存储开销以及信息检索和溯源的计算开销也大幅增加。因此,本文提出了一种基于可删节区块链的安全轻量级 DC 数据管理方案。用户生成自己的公钥和私钥,提供合法签名。然后,我们提出了基于 ECDSA 的交易控制机制,即只有提供合法且可验证的签名才能完成 DC 信息的存储,包括注册和交易信息。此外,我们采用区块链来记录 DC 信息,并采用变色龙哈希算法在进行 DC 交易时修改存储在区块链上的 DC 信息,同时保持区块头不变。系统分析和实验结果证实,我们的方案可以解决单点故障,确保信息的真实性。同时,我们的方案有效降低了全节点存储开销,以及信息检索和溯源的计算开销。
{"title":"A secure and lightweight data management scheme based on redactable blockchain for Digital Copyright","authors":"Chuxin Zhuang ,&nbsp;Qingyun Dai ,&nbsp;Yue Zhang","doi":"10.1016/j.csi.2024.103875","DOIUrl":"10.1016/j.csi.2024.103875","url":null,"abstract":"<div><p>Traditional Digital Copyright (DC) management system faces a single point of failure, and has no strict traceability. Meanwhile, the current blockchain-based DC schemes take less consideration to the authenticity of DC information stored on the blockchain. Additionally, the full node storage overhead and computation overhead of information retrieval and traceability increase significantly with the number of blocks. Therefore, in this paper, we propose a secure and lightweight data management scheme based on the redactable blockchain for DC. Users generate their public and private keys, which provide a legitimate signature. Then, we propose a transaction control mechanism based on ECDSA, which means that the storage of DC information can only be accomplished by providing a legitimate and verifiable signature, including registration and transaction information. Furthermore, we adopt blockchain to record DC information and the chameleon hash algorithm to modify DC information stored on the blockchain when making DC transactions, while keeping the block headers unchanged. System analysis and experimental results confirm that our scheme can address a single point of failure and ensure the authenticity of the information. Meanwhile, our scheme effectively reduces full node storage overhead, and computation overhead of information retrieval and traceability.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"91 ","pages":"Article 103875"},"PeriodicalIF":5.0,"publicationDate":"2024-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141052198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Standards & Interfaces
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1