首页 > 最新文献

ACM Transactions on Internet Technology最新文献

英文 中文
Dynamic Personalized POI Sequence Recommendation with Fine-Grained Contexts 基于细粒度上下文的动态个性化POI序列推荐
IF 5.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-02-13 DOI: 10.1145/3583687
Jing Chen, Wenjun Jiang, Jie Wu, Kenli Li, Keqin Li
The Point Of Interest (POI) sequence recommendation is the key task in itinerary and travel route planning. Existing works usually consider the temporal and spatial factors in travel planning. However, the external environment, such as the weather, is usually overlooked. In fact, the weather is an important factor because it can affect a user’s check-in behaviors. Furthermore, most of the existing research is based on a static environment for POI sequence recommendation. While the external environment (e.g., the weather) may change during travel, it is difficult for existing works to adjust the POI sequence in time. What’s more, people usually prefer the attractive routes when traveling. To address these issues, we first conduct comprehensive data analysis on two real-world check-in datasets to study the effects of weather and time, as well as the features of the POI sequence. Based on this, we propose a model of Dynamic Personalized POI Sequence Recommendation with fine-grained contexts (DPSR for short). It extracts user interest and POI popularity with fine-grained contexts and captures the attractiveness of the POI sequence. Next, we apply the Monte Carlo Tree Search model (MCTS for short) to simulate the process of recommending POI sequence in the dynamic environment, i.e., the weather and time change after visiting a POI. What’s more, we consider different speeds to reflect the fact that people may take different transportation to transfer between POIs. To validate the efficacy of DPSR, we conduct extensive experiments. The results show that our model can improve the accuracy of the recommendation significantly. Furthermore, it can better meet user preferences and enhance experiences.
兴趣点(POI)序列推荐是行程和旅行路线规划中的关键任务。现有的工作通常会考虑旅行规划中的时间和空间因素。然而,外部环境,如天气,通常被忽视。事实上,天气是一个重要因素,因为它会影响用户的入住行为。此外,现有的大多数研究都是基于POI序列推荐的静态环境。虽然外部环境(例如天气)可能在旅行过程中发生变化,但现有作品很难及时调整POI序列。更重要的是,人们在旅行时通常更喜欢有吸引力的路线。为了解决这些问题,我们首先对两个真实世界的报到数据集进行了全面的数据分析,以研究天气和时间的影响,以及POI序列的特征。在此基础上,我们提出了一个具有细粒度上下文的动态个性化POI序列推荐模型(简称DPSR)。它利用细粒度上下文提取用户兴趣和POI流行度,并捕捉POI序列的吸引力。接下来,我们应用蒙特卡罗树搜索模型(简称MCTS)来模拟在动态环境中推荐POI序列的过程,即访问POI后的天气和时间变化。更重要的是,我们考虑不同的速度,以反映人们在POI之间可能乘坐不同的交通工具进行换乘的事实。为了验证DPSR的有效性,我们进行了广泛的实验。结果表明,我们的模型可以显著提高推荐的准确性。此外,它可以更好地满足用户的偏好,增强体验。
{"title":"Dynamic Personalized POI Sequence Recommendation with Fine-Grained Contexts","authors":"Jing Chen, Wenjun Jiang, Jie Wu, Kenli Li, Keqin Li","doi":"10.1145/3583687","DOIUrl":"https://doi.org/10.1145/3583687","url":null,"abstract":"The Point Of Interest (POI) sequence recommendation is the key task in itinerary and travel route planning. Existing works usually consider the temporal and spatial factors in travel planning. However, the external environment, such as the weather, is usually overlooked. In fact, the weather is an important factor because it can affect a user’s check-in behaviors. Furthermore, most of the existing research is based on a static environment for POI sequence recommendation. While the external environment (e.g., the weather) may change during travel, it is difficult for existing works to adjust the POI sequence in time. What’s more, people usually prefer the attractive routes when traveling. To address these issues, we first conduct comprehensive data analysis on two real-world check-in datasets to study the effects of weather and time, as well as the features of the POI sequence. Based on this, we propose a model of Dynamic Personalized POI Sequence Recommendation with fine-grained contexts (DPSR for short). It extracts user interest and POI popularity with fine-grained contexts and captures the attractiveness of the POI sequence. Next, we apply the Monte Carlo Tree Search model (MCTS for short) to simulate the process of recommending POI sequence in the dynamic environment, i.e., the weather and time change after visiting a POI. What’s more, we consider different speeds to reflect the fact that people may take different transportation to transfer between POIs. To validate the efficacy of DPSR, we conduct extensive experiments. The results show that our model can improve the accuracy of the recommendation significantly. Furthermore, it can better meet user preferences and enhance experiences.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":" ","pages":"1 - 28"},"PeriodicalIF":5.3,"publicationDate":"2023-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47225148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MWPoW+: A Strong Consensus Protocol for Intra-Shard Consensus in Blockchain Sharding MWPoW+:一种用于区块链共享的强共识协议
IF 5.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-02-13 DOI: 10.1145/3584020
Yibin Xu, Jia-Jung Shao, Tijs Slaats, Boris Düdder
Blockchain sharding splits a blockchain into several shards where consensus is reached at the shard level rather than over the entire blockchain. It improves transaction throughput and reduces the computational resources required of individual nodes. But a derivation of trustworthy consensus within a shard becomes an issue as the longest chain based mechanisms used in conventional blockchains can no longer be used. Instead, a vote-based consensus mechanism must be employed. However, existing vote-based Byzantine fault tolerance consensus protocols do not offer sufficient security guarantees for sharded blockchains. First, when used to support consensus where only one block is allowed at a time (binary consensus), these protocols are susceptible to progress-hindering attacks (i.e., unable to reach a consensus). Second, when used to support a stronger type of consensus where multiple concurrent blocks are allowed (strong consensus), their tolerance of adversary nodes is low. This article proposes a new consensus protocol to address all these issues. We call the new protocol MWPoW+, as its basic framework is based on the existing Multiple Winners Proof of Work (MWPoW) protocol but includes new mechanisms to address the issues mentioned previously. MWPoW+ is a vote-based protocol for strong consensus, asynchronous in consensus derivation but synchronous in communication. We prove that it can tolerate up to f < n/2 adversary nodes in a n-node system as if using a binary consensus protocol and does not suffer from progress-hindering attacks.
区块链分片将区块链拆分为多个分片,在分片级别而不是整个区块链上达成共识。它提高了事务吞吐量,并减少了单个节点所需的计算资源。但是,由于传统区块链中使用的最长的基于链的机制无法再使用,因此在碎片内推导可信的共识成为了一个问题。相反,必须采用基于投票的协商一致机制。然而,现有的基于投票的拜占庭容错共识协议并不能为分块区块链提供足够的安全保障。首先,当用于支持一次只允许一个块的共识(二进制共识)时,这些协议容易受到阻碍进展的攻击(即无法达成共识)。其次,当用于支持允许多个并发块的更强类型的一致性(强一致性)时,它们对对手节点的容忍度较低。本文提出了一个新的协商一致协议来解决所有这些问题。我们将新协议称为MWPoW+,因为其基本框架基于现有的多赢家工作证明(MWPoW)协议,但包括解决前面提到的问题的新机制。MWPoW+是一种基于投票的强一致性协议,在一致性推导中是异步的,但在通信中是同步的。我们证明,在n节点系统中,它可以容忍多达f
{"title":"MWPoW+: A Strong Consensus Protocol for Intra-Shard Consensus in Blockchain Sharding","authors":"Yibin Xu, Jia-Jung Shao, Tijs Slaats, Boris Düdder","doi":"10.1145/3584020","DOIUrl":"https://doi.org/10.1145/3584020","url":null,"abstract":"Blockchain sharding splits a blockchain into several shards where consensus is reached at the shard level rather than over the entire blockchain. It improves transaction throughput and reduces the computational resources required of individual nodes. But a derivation of trustworthy consensus within a shard becomes an issue as the longest chain based mechanisms used in conventional blockchains can no longer be used. Instead, a vote-based consensus mechanism must be employed. However, existing vote-based Byzantine fault tolerance consensus protocols do not offer sufficient security guarantees for sharded blockchains. First, when used to support consensus where only one block is allowed at a time (binary consensus), these protocols are susceptible to progress-hindering attacks (i.e., unable to reach a consensus). Second, when used to support a stronger type of consensus where multiple concurrent blocks are allowed (strong consensus), their tolerance of adversary nodes is low. This article proposes a new consensus protocol to address all these issues. We call the new protocol MWPoW+, as its basic framework is based on the existing Multiple Winners Proof of Work (MWPoW) protocol but includes new mechanisms to address the issues mentioned previously. MWPoW+ is a vote-based protocol for strong consensus, asynchronous in consensus derivation but synchronous in communication. We prove that it can tolerate up to f < n/2 adversary nodes in a n-node system as if using a binary consensus protocol and does not suffer from progress-hindering attacks.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":"23 1","pages":"1 - 27"},"PeriodicalIF":5.3,"publicationDate":"2023-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45019870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Finding the Source in Networks: An Approach Based on Structural Entropy 在网络中寻找源:一种基于结构熵的方法
IF 5.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-02-06 DOI: 10.1145/3568309
Chong Zhang, Qiang Guo, Luoyi Fu, Jiaxin Ding, Xinde Cao, Fei Long, Xinbing Wang, Cheng Zhou
The popularity of intelligent devices provides straightforward access to the Internet and online social networks. However, the quick and easy data updates from networks also benefit the risk spreading, such as rumor, malware, or computer viruses. To this end, this article studies the problem of source detection, which is to infer the source node out of an aftermath of a cascade, that is, the observed infected graph GN of the network at some time. Prior arts have adopted various statistical quantities such as degree, distance, or infection size to reflect the structural centrality of the source. In this article, we propose a new metric that we call the infected tree entropy (ITE), to utilize richer underlying structural features for source detection. Our idea of ITE is inspired by the conception of structural entropy [21], which demonstrated that the minimization of average bits to encode the network structures with different partitions is the principle for detecting the natural or true structures in real-world networks. Accordingly, our proposed ITE based estimator for the source tries to minimize the coding of network partitions brought by the infected tree rooted at all the potential sources, thus minimizing the structural deviation between the cascades from the potential sources and the actual infection process included in GN. On polynomially growing geometric trees, with increasing tree heterogeneity, the ITE estimator remarkably yields more reliable detection under only moderate infection sizes, and returns an asymptotically complete detection. In contrast, for regular expanding trees, we still observe guaranteed detection probability of ITE estimator even with an infinite infection size, thanks to the degree regularity property. We also algorithmically realize the ITE based detection that enjoys linear time complexity via a message-passing scheme, and further extend it to general graphs. Extensive experiments on synthetic and real datasets confirm the superiority of ITE to the baselines. For example, ITE returns an accuracy of 85%, ranking the source among the top 10%, far exceeding 55% of the classic algorithm on scale-free networks.
智能设备的普及提供了直接访问互联网和在线社交网络的途径。然而,网络上快速便捷的数据更新也有利于风险的传播,如谣言、恶意软件或计算机病毒。为此,本文研究了源检测问题,即从级联的余波中推断出源节点,即从某一时刻观察到的网络感染图GN中推断出源节点。现有技术采用了各种统计量,如程度、距离或感染大小来反映源的结构中心性。在本文中,我们提出了一种新的度量,我们称之为感染树熵(ITE),以利用更丰富的底层结构特征进行源检测。我们的ITE思想受到结构熵[21]概念的启发,该概念证明了对不同分区的网络结构进行编码的平均比特的最小化是检测现实世界网络中自然或真实结构的原则。因此,我们提出的基于ITE的源估计器试图最小化扎根于所有潜在源的感染树所带来的网络分区编码,从而最小化来自潜在源的级联与GN中包含的实际感染过程之间的结构偏差。在多项式生长的几何树上,随着树异质性的增加,ITE估计器在中等感染规模下显著地产生更可靠的检测,并返回渐近完全检测。相比之下,对于规则扩展树,由于程度正则性,即使感染规模无限,我们仍然观察到ITE估计器的检测概率是有保证的。我们还通过消息传递方案算法实现了具有线性时间复杂度的基于ITE的检测,并将其进一步扩展到一般图中。在合成数据集和真实数据集上进行的大量实验证实了ITE相对于基线的优越性。例如,ITE返回的准确率为85%,将源排在前10%,远远超过无标度网络上经典算法的55%。
{"title":"Finding the Source in Networks: An Approach Based on Structural Entropy","authors":"Chong Zhang, Qiang Guo, Luoyi Fu, Jiaxin Ding, Xinde Cao, Fei Long, Xinbing Wang, Cheng Zhou","doi":"10.1145/3568309","DOIUrl":"https://doi.org/10.1145/3568309","url":null,"abstract":"The popularity of intelligent devices provides straightforward access to the Internet and online social networks. However, the quick and easy data updates from networks also benefit the risk spreading, such as rumor, malware, or computer viruses. To this end, this article studies the problem of source detection, which is to infer the source node out of an aftermath of a cascade, that is, the observed infected graph GN of the network at some time. Prior arts have adopted various statistical quantities such as degree, distance, or infection size to reflect the structural centrality of the source. In this article, we propose a new metric that we call the infected tree entropy (ITE), to utilize richer underlying structural features for source detection. Our idea of ITE is inspired by the conception of structural entropy [21], which demonstrated that the minimization of average bits to encode the network structures with different partitions is the principle for detecting the natural or true structures in real-world networks. Accordingly, our proposed ITE based estimator for the source tries to minimize the coding of network partitions brought by the infected tree rooted at all the potential sources, thus minimizing the structural deviation between the cascades from the potential sources and the actual infection process included in GN. On polynomially growing geometric trees, with increasing tree heterogeneity, the ITE estimator remarkably yields more reliable detection under only moderate infection sizes, and returns an asymptotically complete detection. In contrast, for regular expanding trees, we still observe guaranteed detection probability of ITE estimator even with an infinite infection size, thanks to the degree regularity property. We also algorithmically realize the ITE based detection that enjoys linear time complexity via a message-passing scheme, and further extend it to general graphs. Extensive experiments on synthetic and real datasets confirm the superiority of ITE to the baselines. For example, ITE returns an accuracy of 85%, ranking the source among the top 10%, far exceeding 55% of the classic algorithm on scale-free networks.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":"23 1","pages":"1 - 25"},"PeriodicalIF":5.3,"publicationDate":"2023-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42896656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Movie Account Recommendation on Instagram 推荐Instagram上的电影账号
IF 5.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-01-13 DOI: 10.1145/3579852
Yu-Jhen Wang, Anthony J. T. Lee
With the increasing popularity of social networks, many businesses have started implementing their branding or targeted advertising strategies to reach potential customers through social media platforms. It is desirable and essential to help businesses to reach mass audiences and assist users to find favorite business accounts on social media platforms. In the movie industry, movie companies often create business accounts (movie accounts) to promote their movies and capture the attention of followers on Instagram. Instagram contains rich information about movies and user feedback, while IMDb, one of the most popular online databases, contains well-organized information related to movies. The features extracted from the data collected from Instagram and IMDb can complement each other. Therefore, in this study, we propose a framework for recommending movie accounts to users on Instagram by using the data collected from Instagram and IMDb platforms. The experiment results show that our proposed framework outperforms the comparing methods in terms of precision, recall, F1-score, and Normalized Discounted Cumulative Gain (NDCG), and mitigates the effect of cold start problems. The proposed framework can help movie companies or businesses reach potential audiences and implement effective targeted advertising strategies.
随着社交网络的日益普及,许多企业已经开始实施他们的品牌或有针对性的广告策略,通过社交媒体平台接触潜在客户。帮助企业接触大众受众,帮助用户在社交媒体平台上找到喜欢的企业账户,这是可取的,也是必不可少的。在电影行业,电影公司经常在Instagram上创建商业账号(电影账号)来宣传自己的电影,吸引粉丝的关注。Instagram包含丰富的电影信息和用户反馈,而IMDb是最受欢迎的在线数据库之一,包含了组织良好的电影相关信息。从Instagram和IMDb收集的数据中提取的特征可以互补。因此,在本研究中,我们利用从Instagram和IMDb平台收集的数据,提出了一个向Instagram用户推荐电影账户的框架。实验结果表明,该框架在查全率、查全率、f1分数和归一化贴现累积增益(NDCG)等方面优于其他方法,并减轻了冷启动问题的影响。所提出的框架可以帮助电影公司或企业接触到潜在的观众,并实施有效的定向广告策略。
{"title":"Movie Account Recommendation on Instagram","authors":"Yu-Jhen Wang, Anthony J. T. Lee","doi":"10.1145/3579852","DOIUrl":"https://doi.org/10.1145/3579852","url":null,"abstract":"With the increasing popularity of social networks, many businesses have started implementing their branding or targeted advertising strategies to reach potential customers through social media platforms. It is desirable and essential to help businesses to reach mass audiences and assist users to find favorite business accounts on social media platforms. In the movie industry, movie companies often create business accounts (movie accounts) to promote their movies and capture the attention of followers on Instagram. Instagram contains rich information about movies and user feedback, while IMDb, one of the most popular online databases, contains well-organized information related to movies. The features extracted from the data collected from Instagram and IMDb can complement each other. Therefore, in this study, we propose a framework for recommending movie accounts to users on Instagram by using the data collected from Instagram and IMDb platforms. The experiment results show that our proposed framework outperforms the comparing methods in terms of precision, recall, F1-score, and Normalized Discounted Cumulative Gain (NDCG), and mitigates the effect of cold start problems. The proposed framework can help movie companies or businesses reach potential audiences and implement effective targeted advertising strategies.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":"23 1","pages":"1 - 21"},"PeriodicalIF":5.3,"publicationDate":"2023-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43478361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Breaking Bad: Quantifying the Addiction of Web Elements to JavaScript 《绝命毒师:量化Web元素对JavaScript的依赖
IF 5.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-01-12 DOI: 10.1145/3579846
Romain Fouquet, Pierre Laperdrix, Romain Rouvoy
While JavaScript established itself as a cornerstone of the modern web, it also constitutes a major tracking and security vector, thus raising critical privacy and security concerns. In this context, some browser extensions propose to systematically block scripts reported by crowdsourced trackers lists. However, this solution heavily depends on the quality of these built-in lists, which may be deprecated or incomplete, thus exposing the visitor to unknown trackers. In this article, we explore a different strategy by investigating the benefits of disabling JavaScript in the browser. More specifically, by adopting such a strict policy, we aim to quantify the JavaScript addiction of web elements composing a web page through the observation of web breakages. As there is no standard mechanism for detecting such breakages, we introduce a framework to inspect several page features when blocking JavaScript, that we deploy to analyze 6,384 pages, including landing and internal web pages. We discover that 43% of web pages are not strictly dependent on JavaScript and that more than 67% of pages are likely to be usable as long as the visitor only requires the content from the main section of the page, for which the user most likely reached the page, while reducing the number of tracking requests by 85% on average. Finally, we discuss the viability of currently browsing the web without JavaScript and detail multiple incentives for websites to be kept usable without JavaScript.
虽然JavaScript将自己确立为现代网络的基石,但它也构成了主要的跟踪和安全向量,因此引发了关键的隐私和安全问题。在这种情况下,一些浏览器扩展建议系统地阻止由众包跟踪列表报告的脚本。然而,这个解决方案在很大程度上依赖于这些内置列表的质量,这些列表可能被弃用或不完整,从而将访问者暴露给未知的跟踪器。在本文中,我们通过研究在浏览器中禁用JavaScript的好处来探索另一种策略。更具体地说,通过采用如此严格的策略,我们的目标是通过观察网页破坏来量化组成网页的web元素的JavaScript成瘾程度。由于没有检测此类破坏的标准机制,我们引入了一个框架,在阻止JavaScript时检查几个页面特性,我们部署该框架来分析6384个页面,包括登陆页面和内部网页。我们发现,43%的网页并不严格依赖于JavaScript,超过67%的网页可能是可用的,只要访问者只需要页面的主要部分的内容,用户最有可能到达的页面,同时减少了85%的跟踪请求的数量平均。最后,我们讨论了目前在没有JavaScript的情况下浏览网页的可行性,并详细介绍了在没有JavaScript的情况下保持网站可用性的多种激励措施。
{"title":"Breaking Bad: Quantifying the Addiction of Web Elements to JavaScript","authors":"Romain Fouquet, Pierre Laperdrix, Romain Rouvoy","doi":"10.1145/3579846","DOIUrl":"https://doi.org/10.1145/3579846","url":null,"abstract":"While JavaScript established itself as a cornerstone of the modern web, it also constitutes a major tracking and security vector, thus raising critical privacy and security concerns. In this context, some browser extensions propose to systematically block scripts reported by crowdsourced trackers lists. However, this solution heavily depends on the quality of these built-in lists, which may be deprecated or incomplete, thus exposing the visitor to unknown trackers. In this article, we explore a different strategy by investigating the benefits of disabling JavaScript in the browser. More specifically, by adopting such a strict policy, we aim to quantify the JavaScript addiction of web elements composing a web page through the observation of web breakages. As there is no standard mechanism for detecting such breakages, we introduce a framework to inspect several page features when blocking JavaScript, that we deploy to analyze 6,384 pages, including landing and internal web pages. We discover that 43% of web pages are not strictly dependent on JavaScript and that more than 67% of pages are likely to be usable as long as the visitor only requires the content from the main section of the page, for which the user most likely reached the page, while reducing the number of tracking requests by 85% on average. Finally, we discuss the viability of currently browsing the web without JavaScript and detail multiple incentives for websites to be kept usable without JavaScript.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":"77 1","pages":"1 - 28"},"PeriodicalIF":5.3,"publicationDate":"2023-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"64063297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tolerance Analysis of Cyber-Manufacturing Systems to Cascading Failures 网络制造系统对级联故障的容忍度分析
IF 5.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-01-12 DOI: 10.1145/3579847
Xiuwen Fu, P. Pace, G. Aloi, A. Guerrieri, Wenfeng Li, G. Fortino
In practical cyber-manufacturing systems (CMS), the node component is the forwarder of information and the provider of services. This dual role makes the whole system have the typical physical-services interaction characteristic, making CMS more vulnerable to cascading failures than general manufacturing systems. In this work, in order to reasonably characterize the cascading process of CMS, we first develop an interdependent network model for CMS from a physical-service networking perspective. On this basis, a realistic cascading failure model for CMS is designed with full consideration of the routing-oriented load distribution characteristics of the physical network and selective load distribution characteristics of the service network. Through extensive experiments, the soundness of the proposed model has been verified and some meaningful findings have been obtained: 1) attacks on the physical network are more likely to trigger cascading failures and may cause more damage; 2) interdependency failures are the main cause of performance degradation in the service network during cascading failures; 3) isolation failures are the main cause of performance degradation in the physical network during cascading failures. The obtained results can certainly help users to design a more reliable CMS against cascading failures.
在实际的网络制造系统(CMS)中,节点组件是信息的转发器和服务的提供者。这种双重作用使整个系统具有典型的物理服务交互特性,使CMS比一般制造系统更容易受到级联故障的影响。在这项工作中,为了合理地描述CMS的级联过程,我们首先从物理服务网络的角度为CMS开发了一个相互依赖的网络模型。在此基础上,充分考虑了物理网络面向路由的负载分布特性和服务网络的选择性负载分布特性,设计了一个实用的CMS级联故障模型。通过大量实验,验证了所提出模型的可靠性,并获得了一些有意义的发现:1)对物理网络的攻击更有可能引发级联故障,并可能造成更大的破坏;2) 在级联故障过程中,相互依赖故障是导致服务网络性能下降的主要原因;3) 在级联故障期间,隔离故障是物理网络性能下降的主要原因。所获得的结果当然可以帮助用户设计一个更可靠的CMS来应对级联故障。
{"title":"Tolerance Analysis of Cyber-Manufacturing Systems to Cascading Failures","authors":"Xiuwen Fu, P. Pace, G. Aloi, A. Guerrieri, Wenfeng Li, G. Fortino","doi":"10.1145/3579847","DOIUrl":"https://doi.org/10.1145/3579847","url":null,"abstract":"In practical cyber-manufacturing systems (CMS), the node component is the forwarder of information and the provider of services. This dual role makes the whole system have the typical physical-services interaction characteristic, making CMS more vulnerable to cascading failures than general manufacturing systems. In this work, in order to reasonably characterize the cascading process of CMS, we first develop an interdependent network model for CMS from a physical-service networking perspective. On this basis, a realistic cascading failure model for CMS is designed with full consideration of the routing-oriented load distribution characteristics of the physical network and selective load distribution characteristics of the service network. Through extensive experiments, the soundness of the proposed model has been verified and some meaningful findings have been obtained: 1) attacks on the physical network are more likely to trigger cascading failures and may cause more damage; 2) interdependency failures are the main cause of performance degradation in the service network during cascading failures; 3) isolation failures are the main cause of performance degradation in the physical network during cascading failures. The obtained results can certainly help users to design a more reliable CMS against cascading failures.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":" ","pages":""},"PeriodicalIF":5.3,"publicationDate":"2023-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48427794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Enabling Short-Term Energy Flexibility Markets Through Blockchain 通过bbb实现短期能源灵活性市场
IF 5.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-12-12 DOI: 10.1145/3542949
Michell Boerger, Philipp Lämmel, Nikolay Tcholtchev, M. Hauswirth
Climate change has put significant pressure on energy markets. Political decisions such as the plan of the German government to shut down coal power plants by 2038 are shifting electricity production towards renewable and distributed energy resources. The share of these resources will continue to grow significantly in the coming years. This trend changes the ways how energy markets work which mandates fundamental changes in the underlying IT infrastructure. In this paper, we propose a blockchain-based solution which enables an economically viable and grid-serving integration of distributed energy resources into the existing energy system. Our blockchain-based approach targets intraday and day-ahead operating reserve markets, on which energy grid operators and operators of distributed energy resources can trade flexibilities within the schedulable energy production and consumption of their resources. By utilizing these flexibilities as an operating reserve, renewable and climate-friendly technologies can contribute to maintaining the grid stability and security of supply while simultaneously creating economically interesting business models for their operators. We propose to define blockchain-based short-term energy markets by utilizing the concept of general-purpose smart contracts and cryptocurrencies. This enables direct and decentralized trading of energy flexibilities without any intermediary or central instance. We demonstrate the feasibility of our approach through an implementation of a prototype of the proposed markets based on the Ethereum blockchain and provide a detailed evaluation of its efficiency and scalability.
气候变化给能源市场带来了巨大压力。德国政府计划在2038年前关闭燃煤电厂等政治决策,正在将电力生产转向可再生能源和分布式能源。这些资源的份额在未来几年将继续显著增长。这一趋势改变了能源市场的运作方式,要求对底层IT基础设施进行根本性的改变。在本文中,我们提出了一种基于区块链的解决方案,该解决方案能够将分布式能源整合到现有的能源系统中,从而实现经济上可行的并网服务。我们基于区块链的方法针对当日和日前运营储备市场,在这个市场上,能源电网运营商和分布式能源运营商可以在可调度的能源生产和资源消耗范围内交易灵活性。通过利用这些灵活性作为运营储备,可再生能源和气候友好型技术可以有助于维护电网的稳定性和供应安全,同时为运营商创造经济上有趣的商业模式。我们建议利用通用智能合约和加密货币的概念来定义基于区块链的短期能源市场。这使得能源灵活性的直接和分散交易无需任何中介或中心实例。我们通过实施基于以太坊区块链的拟议市场原型来证明我们方法的可行性,并对其效率和可扩展性进行了详细评估。
{"title":"Enabling Short-Term Energy Flexibility Markets Through Blockchain","authors":"Michell Boerger, Philipp Lämmel, Nikolay Tcholtchev, M. Hauswirth","doi":"10.1145/3542949","DOIUrl":"https://doi.org/10.1145/3542949","url":null,"abstract":"Climate change has put significant pressure on energy markets. Political decisions such as the plan of the German government to shut down coal power plants by 2038 are shifting electricity production towards renewable and distributed energy resources. The share of these resources will continue to grow significantly in the coming years. This trend changes the ways how energy markets work which mandates fundamental changes in the underlying IT infrastructure. In this paper, we propose a blockchain-based solution which enables an economically viable and grid-serving integration of distributed energy resources into the existing energy system. Our blockchain-based approach targets intraday and day-ahead operating reserve markets, on which energy grid operators and operators of distributed energy resources can trade flexibilities within the schedulable energy production and consumption of their resources. By utilizing these flexibilities as an operating reserve, renewable and climate-friendly technologies can contribute to maintaining the grid stability and security of supply while simultaneously creating economically interesting business models for their operators. We propose to define blockchain-based short-term energy markets by utilizing the concept of general-purpose smart contracts and cryptocurrencies. This enables direct and decentralized trading of energy flexibilities without any intermediary or central instance. We demonstrate the feasibility of our approach through an implementation of a prototype of the proposed markets based on the Ethereum blockchain and provide a detailed evaluation of its efficiency and scalability.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":"22 1","pages":"1 - 25"},"PeriodicalIF":5.3,"publicationDate":"2022-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41369045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tuneman: Customizing Networks to Guarantee Application Bandwidth and Latency Tuneman:定制网络以保证应用程序带宽和延迟
IF 5.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-12-09 DOI: 10.1145/3575657
Sidharth Sharma, Aniruddha Kushwaha, Mohammad Alizadeh, G. Varghese, Ashwin Gumaste
We examine how to provide applications with dedicated bandwidth and guaranteed latency in a programmable mission-critical network. Unlike other SDN approaches such as B4 or SWAN, our system Tuneman optimizes both routes and packet schedules at each node to provide flows with sub-second bandwidth changes. Tuneman uses node-level optimization to compute node schedules in a slotted switch and does dynamic routing using a search procedure with Quality of Service– (QoS) based weights. This allows Tuneman to provide an efficient solution for mission-critical networks that have stringent QoS requirements. We evaluate Tuneman on a telesurgery network using a switch prototype built using FPGAs and also via simulations on India’s Tata Network. For mission-critical networks with multiple QoS levels, Tuneman has comparable or better utilization than SWAN while providing delay bounds guarantees.
我们研究如何在可编程任务关键型网络中为应用程序提供专用带宽和有保证的延迟。与B4或SWAN等其他SDN方法不同,我们的系统Tuneman优化了每个节点的路由和数据包调度,以提供具有亚秒带宽变化的流。Tuneman使用节点级优化来计算时隙交换机中的节点调度,并使用基于服务质量(QoS)权重的搜索过程进行动态路由。这使得Tuneman能够为具有严格QoS要求的任务关键型网络提供高效的解决方案。我们使用FPGA构建的交换机原型,并通过印度塔塔网络的模拟,在远程手术网络上评估了Tuneman。对于具有多个QoS级别的任务关键型网络,Tuneman在提供延迟边界保证的同时,具有与SWAN相当或更好的利用率。
{"title":"Tuneman: Customizing Networks to Guarantee Application Bandwidth and Latency","authors":"Sidharth Sharma, Aniruddha Kushwaha, Mohammad Alizadeh, G. Varghese, Ashwin Gumaste","doi":"10.1145/3575657","DOIUrl":"https://doi.org/10.1145/3575657","url":null,"abstract":"We examine how to provide applications with dedicated bandwidth and guaranteed latency in a programmable mission-critical network. Unlike other SDN approaches such as B4 or SWAN, our system Tuneman optimizes both routes and packet schedules at each node to provide flows with sub-second bandwidth changes. Tuneman uses node-level optimization to compute node schedules in a slotted switch and does dynamic routing using a search procedure with Quality of Service– (QoS) based weights. This allows Tuneman to provide an efficient solution for mission-critical networks that have stringent QoS requirements. We evaluate Tuneman on a telesurgery network using a switch prototype built using FPGAs and also via simulations on India’s Tata Network. For mission-critical networks with multiple QoS levels, Tuneman has comparable or better utilization than SWAN while providing delay bounds guarantees.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":"23 1","pages":"1 - 26"},"PeriodicalIF":5.3,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49063778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Conco-ERNIE: Complex User Intent Detect Model for Smart Healthcare Cognitive Bot Conco ERNIE:智能医疗认知机器人的复杂用户意图检测模型
IF 5.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-12-08 DOI: 10.1145/3574135
Bolin Zhang, Zhiying Tu, Shaoshi Hang, Dian-Hui Chu, Xiaofei Xu
The outbreak of Covid-19 has exposed the lack of medical resources, especially the lack of medical personnel. This results in time and space restrictions for medical services, and patients cannot obtain health information all the time and everywhere. Based on the medical knowledge graph, healthcare bots alleviate this burden effectively by providing patients with diagnosis guidance, pre-diagnosis, and post-diagnosis consultation services in the way of human-machine dialogue. However, the medical utterance is more complicated in language structure, and there are complex intention phenomena in semantics. It is a challenge to detect the single intent, multi-intent, and implicit intent of a patient’s utterance. To this end, we create a high-quality annotated Chinese Medical query (utterance) dataset, CMedQ (about 16.8k queries in medical domain which includes single, multiple, and implicit intents). It is hard to detect intent on such a complex dataset through traditional text classification models. Thus, we propose a novel detect model Conco-ERNIE, using concept co-occurrence patterns to enhance the representation of pre-trained model ERNIE. These patterns are mined using Apriori algorithm and will be embedded via Node2Vec. Their features will be aggregated with semantic features into Conco-ERNIE by using an attention module, which can catch user explicit intents and also predict user implicit intents. Experiments on CMedQ demonstrates that Conco-ERNIE achieves outstanding performance over baseline. Based on Conco-ERNIE, we develop an intelligent healthcare bot, MedicalBot. To provide knowledge support for MedicalBot, we also build a Chinese medical graph, CMedKG (about 45k entities and 283k relationships).
新冠肺炎的爆发暴露了医疗资源的缺乏,尤其是医务人员的缺乏。这导致了医疗服务的时间和空间限制,患者无法随时随地获得健康信息。基于医学知识图谱,医疗机器人通过人机对话的方式为患者提供诊断指导、诊断前和诊断后咨询服务,有效减轻了这一负担。然而,医学话语在语言结构上更为复杂,在语义上也存在着复杂的意向现象。检测患者话语的单一意图、多意图和隐含意图是一项挑战。为此,我们创建了一个高质量的注释中医查询(话语)数据集CMedQ(医学领域中约有16.8k个查询,包括单个、多个和隐含意图)。通过传统的文本分类模型很难检测出对如此复杂的数据集的意图。因此,我们提出了一种新的检测模型Conco ERNIE,使用概念共现模式来增强预训练模型ERNIE的表示。这些模式是使用Apriori算法挖掘的,并将通过Node2Vec嵌入。他们的特征将通过使用注意力模块与语义特征聚合到Conco ERNIE中,该模块可以捕捉用户的显性意图,也可以预测用户的隐性意图。在CMedQ上的实验表明,Conco ERNIE在基线上取得了卓越的性能。基于Conco ERNIE,我们开发了一个智能医疗机器人MedicalBot。为了为MedicalBot提供知识支持,我们还构建了一个中文医学图CMedKG(约45k个实体和283k个关系)。
{"title":"Conco-ERNIE: Complex User Intent Detect Model for Smart Healthcare Cognitive Bot","authors":"Bolin Zhang, Zhiying Tu, Shaoshi Hang, Dian-Hui Chu, Xiaofei Xu","doi":"10.1145/3574135","DOIUrl":"https://doi.org/10.1145/3574135","url":null,"abstract":"The outbreak of Covid-19 has exposed the lack of medical resources, especially the lack of medical personnel. This results in time and space restrictions for medical services, and patients cannot obtain health information all the time and everywhere. Based on the medical knowledge graph, healthcare bots alleviate this burden effectively by providing patients with diagnosis guidance, pre-diagnosis, and post-diagnosis consultation services in the way of human-machine dialogue. However, the medical utterance is more complicated in language structure, and there are complex intention phenomena in semantics. It is a challenge to detect the single intent, multi-intent, and implicit intent of a patient’s utterance. To this end, we create a high-quality annotated Chinese Medical query (utterance) dataset, CMedQ (about 16.8k queries in medical domain which includes single, multiple, and implicit intents). It is hard to detect intent on such a complex dataset through traditional text classification models. Thus, we propose a novel detect model Conco-ERNIE, using concept co-occurrence patterns to enhance the representation of pre-trained model ERNIE. These patterns are mined using Apriori algorithm and will be embedded via Node2Vec. Their features will be aggregated with semantic features into Conco-ERNIE by using an attention module, which can catch user explicit intents and also predict user implicit intents. Experiments on CMedQ demonstrates that Conco-ERNIE achieves outstanding performance over baseline. Based on Conco-ERNIE, we develop an intelligent healthcare bot, MedicalBot. To provide knowledge support for MedicalBot, we also build a Chinese medical graph, CMedKG (about 45k entities and 283k relationships).","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":" ","pages":"1 - 24"},"PeriodicalIF":5.3,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44518505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Introduction to the Special Section on Recent Advances in Networks and Distributed Systems 网络和分布式系统最新进展专题介绍
IF 5.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-11-30 DOI: 10.1145/3584743
Mathias Fischer, W. Lamersdorf, J. Liebeherr, M. Mühlhäuser
The history of research and development for the Internet has alternated between time periods of grand new visions and time periods concerned with integrating new advances in information and communication technology. As we entered the 21st century, many voices called for a redesign of the Internet architecture. The Internet was said to be ossified in the sense that its ability to incorporate major upgrades had been largely lost. Viewed as being in a state beyond repair, the era saw calls for and many efforts on a clean-slate design of the Internet architecture. A decade on – and with the Internet architecture largely unchanged – the appetite for big solutions has largely waned, and been replaced by efforts that seek to adapt networks and distributed systems to challenges posed by the advent of the Internet-of-Things, network softwarization, mission-critical applications, and artificial intelligence: IoT. The Internet-of-Things (IoT) will boost the number of Internet nodes well beyond the billions, which will lead to new traffic patterns (e.g., high-frequency low-volume) and resource requirements. SDN++. Softwarization is ‘conquering’ the net. Technologies such as software-defined networking (SDN) and network function virtualization (NFV) will continue to deliver increased flexibility for providing network services. As this softwarization significantly increases the complexity of today’s networks, new security problems will emerge. MCA. Mission-critical applications (MCA), which used to be confined to dedicated real-time systems and networks, such as time-sensitive networks (TSN), industrial Ethernet, and so on, are migrating to public and wide area networks. This impacts technologies and protocols, such as ultrareliable low latency communications (URLLC) in 5G networks. Moreover, delay requirements of real-time applications create a need to move cloud functionality closer to the action scene, e.g., via fog and edge computing. AI. The resurgence of artificial intelligence (AI), evoked by stunning successes of machine learning, boosts the need for computing resources that cannot be embedded in IoT devices and
互联网研究和发展的历史在充满宏伟新愿景的时期和关注整合信息和通信技术新进展的时期之间交替进行。当我们进入21世纪时,许多声音要求重新设计互联网架构。互联网被认为是僵化的,因为它整合重大升级的能力在很大程度上已经丧失。这个时代被视为一种无法修复的状态,人们呼吁并努力重新设计互联网架构。十年过去了——互联网架构基本没有改变——对大型解决方案的兴趣已经大大减弱,取而代之的是寻求调整网络和分布式系统以应对物联网、网络软件化、关键任务应用程序和人工智能(IoT)的出现所带来的挑战。物联网(IoT)将推动互联网节点的数量远远超过数十亿,这将导致新的流量模式(例如,高频低容量)和资源需求。SDN + +。软件化正在“征服”网络。软件定义网络(SDN)和网络功能虚拟化(NFV)等技术将继续为提供网络服务提供更大的灵活性。随着这种软件化大大增加了当今网络的复杂性,新的安全问题将会出现。MCA。过去局限于专用实时系统和网络(如时间敏感网络(TSN)、工业以太网等)的关键任务应用程序(MCA)正在向公共和广域网迁移。这将影响5G网络中的超可靠低延迟通信(URLLC)等技术和协议。此外,实时应用程序的延迟要求需要将云功能移动到更接近动作场景的地方,例如,通过雾和边缘计算。人工智能。机器学习的惊人成功引发了人工智能(AI)的复苏,这增加了对无法嵌入物联网设备和设备的计算资源的需求
{"title":"Introduction to the Special Section on Recent Advances in Networks and Distributed Systems","authors":"Mathias Fischer, W. Lamersdorf, J. Liebeherr, M. Mühlhäuser","doi":"10.1145/3584743","DOIUrl":"https://doi.org/10.1145/3584743","url":null,"abstract":"The history of research and development for the Internet has alternated between time periods of grand new visions and time periods concerned with integrating new advances in information and communication technology. As we entered the 21st century, many voices called for a redesign of the Internet architecture. The Internet was said to be ossified in the sense that its ability to incorporate major upgrades had been largely lost. Viewed as being in a state beyond repair, the era saw calls for and many efforts on a clean-slate design of the Internet architecture. A decade on – and with the Internet architecture largely unchanged – the appetite for big solutions has largely waned, and been replaced by efforts that seek to adapt networks and distributed systems to challenges posed by the advent of the Internet-of-Things, network softwarization, mission-critical applications, and artificial intelligence: IoT. The Internet-of-Things (IoT) will boost the number of Internet nodes well beyond the billions, which will lead to new traffic patterns (e.g., high-frequency low-volume) and resource requirements. SDN++. Softwarization is ‘conquering’ the net. Technologies such as software-defined networking (SDN) and network function virtualization (NFV) will continue to deliver increased flexibility for providing network services. As this softwarization significantly increases the complexity of today’s networks, new security problems will emerge. MCA. Mission-critical applications (MCA), which used to be confined to dedicated real-time systems and networks, such as time-sensitive networks (TSN), industrial Ethernet, and so on, are migrating to public and wide area networks. This impacts technologies and protocols, such as ultrareliable low latency communications (URLLC) in 5G networks. Moreover, delay requirements of real-time applications create a need to move cloud functionality closer to the action scene, e.g., via fog and edge computing. AI. The resurgence of artificial intelligence (AI), evoked by stunning successes of machine learning, boosts the need for computing resources that cannot be embedded in IoT devices and","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":"22 1","pages":"1 - 3"},"PeriodicalIF":5.3,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41869274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ACM Transactions on Internet Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1