首页 > 最新文献

ACM Transactions on Embedded Computing Systems最新文献

英文 中文
Robust Embedded Autonomous Driving Positioning System Fusing LiDAR and Inertial Sensors 融合激光雷达和惯性传感器的鲁棒嵌入式自动驾驶定位系统
3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-10-17 DOI: 10.1145/3626098
Zhijian He, Bohuan Xue, Xiangcheng Hu, Zhaoyan Shen, Xiangyue Zeng, Ming Liu
Autonomous driving emphasizes precise multi-sensor fusion positioning on limit resource embedded system. LiDAR-centered sensor fusion system serves as mainstream navigation system due to its insensitivity to illumination and viewpoint change. However, these types of system suffer from handling large-scale sequential LiDAR data using limit resouce on board, leading LiDAR-centralized sensor fusion unpractical. As a result, hand-crafted feature such as plane and edge are leveraged in majority mainstream positioning methods to alleviate this unsatisfaction, triggering a new cornerstone in LiDAR Inertial sensor fusion. However, such super light weight feature extraction, although achieves real-time constraint in LiDAR-centered sensor fusion, encounters severe vulnerability under high speed rotational or translational perturbation. In this paper, we propose a sparse tensor based LiDAR Inertial fusion method for autonomous driving embedded system. Leveraging the power of sparse tensor, the global geometrical feature is fetched so that the point cloud sparsity defect is alleviated. Inertial sensor is deployed to conquer the time-consuming step caused by the coarse level point-wise inlier matching. We construct our experiments on both representative dataset benchmarks and realistic scenes. The evaluation results show the robustness and accuracy of our proposed solution comparing to classical methods.
自动驾驶强调在有限资源的嵌入式系统上进行精确的多传感器融合定位。以激光雷达为中心的传感器融合系统对光照和视点变化不敏感,成为主流导航系统。然而,这些类型的系统在使用有限的机载资源处理大规模顺序LiDAR数据时受到影响,导致LiDAR集中式传感器融合不切实际。因此,在大多数主流定位方法中,利用平面和边缘等手工制作的特征来缓解这种不满意,从而引发LiDAR惯性传感器融合的新基石。然而,这种超轻量的特征提取虽然在以lidar为中心的传感器融合中实现了实时约束,但在高速旋转或平移扰动下存在严重的脆弱性。本文提出了一种基于稀疏张量的激光雷达惯性融合方法,用于自动驾驶嵌入式系统。利用稀疏张量的力量提取全局几何特征,减轻了点云稀疏性的缺陷。采用惯性传感器克服了粗阶逐点内线匹配费时的问题。我们在代表性的数据集基准和现实场景上构建我们的实验。评价结果表明,与经典方法相比,该方法具有较好的鲁棒性和准确性。
{"title":"Robust Embedded Autonomous Driving Positioning System Fusing LiDAR and Inertial Sensors","authors":"Zhijian He, Bohuan Xue, Xiangcheng Hu, Zhaoyan Shen, Xiangyue Zeng, Ming Liu","doi":"10.1145/3626098","DOIUrl":"https://doi.org/10.1145/3626098","url":null,"abstract":"Autonomous driving emphasizes precise multi-sensor fusion positioning on limit resource embedded system. LiDAR-centered sensor fusion system serves as mainstream navigation system due to its insensitivity to illumination and viewpoint change. However, these types of system suffer from handling large-scale sequential LiDAR data using limit resouce on board, leading LiDAR-centralized sensor fusion unpractical. As a result, hand-crafted feature such as plane and edge are leveraged in majority mainstream positioning methods to alleviate this unsatisfaction, triggering a new cornerstone in LiDAR Inertial sensor fusion. However, such super light weight feature extraction, although achieves real-time constraint in LiDAR-centered sensor fusion, encounters severe vulnerability under high speed rotational or translational perturbation. In this paper, we propose a sparse tensor based LiDAR Inertial fusion method for autonomous driving embedded system. Leveraging the power of sparse tensor, the global geometrical feature is fetched so that the point cloud sparsity defect is alleviated. Inertial sensor is deployed to conquer the time-consuming step caused by the coarse level point-wise inlier matching. We construct our experiments on both representative dataset benchmarks and realistic scenes. The evaluation results show the robustness and accuracy of our proposed solution comparing to classical methods.","PeriodicalId":50914,"journal":{"name":"ACM Transactions on Embedded Computing Systems","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135944886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reachability Analysis of Sigmoidal Neural Networks s型神经网络的可达性分析
3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-10-17 DOI: 10.1145/3627991
Sung Woo Choi, Michael Ivashchenko, Luan V. Nguyen, Hoang-Dung Tran
This paper extends the star set reachability approach to verify the robustness of feed-forward neural networks (FNNs) with sigmoidal activation functions such as Sigmoid and TanH. The main drawbacks of the star set approach in Sigmoid/TanH FNN verification are scalability, feasibility, and optimality issues in some cases due to the linear programming solver usage. We overcome this challenge by proposing a relaxed star (RStar) with symbolic intervals, which allows the usage of the back-substitution technique in DeepPoly to find bounds when overapproximating activation functions while maintaining the valuable features of a star set. RStar can overapproximate a sigmoidal activation function using four linear constraints (RStar4) or two linear constraints (RStar2), or only the output bounds (RStar0). We implement our RStar reachability algorithms in NNV and compare them to DeepPoly via robustness verification of image classification DNNs benchmarks. The experimental results show that the original star approach (i.e., no relaxation) is the least conservative of all methods yet the slowest. RStar4 is computationally much faster than the original star method and is the second least conservative approach. It certifies up to 40% more images against adversarial attacks than DeepPoly and on average 51 times faster than the star set. Last but not least, RStar0 is the most conservative method, which could only verify two cases for the CIFAR10 small Sigmoid network, δ = 0.014. However, it is the fastest method that can verify neural networks up to 3528 times faster than the star set and up to 46 times faster than DeepPoly in our evaluation.
本文扩展了星集可达性方法来验证具有Sigmoid和TanH等s型激活函数的前馈神经网络(fnn)的鲁棒性。星集方法在Sigmoid/TanH FNN验证中的主要缺点是可扩展性、可行性和在某些情况下由于线性规划求解器的使用而出现的最优性问题。我们通过提出具有符号间隔的松弛星形(RStar)来克服这一挑战,该方法允许在DeepPoly中使用反向替换技术在过度逼近激活函数时找到边界,同时保持星形集的有价值特征。RStar可以使用四个线性约束(RStar4)或两个线性约束(RStar2)或仅使用输出边界(RStar0)来过度逼近s型激活函数。我们在NNV中实现了RStar可达性算法,并通过图像分类dnn基准的鲁棒性验证将其与DeepPoly进行了比较。实验结果表明,原始恒星方法(即无松弛)是所有方法中最不保守但最慢的方法。RStar4在计算上比原来的星型方法快得多,并且是第二不保守的方法。与DeepPoly相比,它能多证明40%的图像免受对抗性攻击,平均速度是star set的51倍。最后,RStar0是最保守的方法,对于CIFAR10小Sigmoid网络,RStar0只能验证两种情况,δ = 0.014。然而,在我们的评估中,它是最快的方法,可以验证神经网络,比star set快3528倍,比DeepPoly快46倍。
{"title":"Reachability Analysis of Sigmoidal Neural Networks","authors":"Sung Woo Choi, Michael Ivashchenko, Luan V. Nguyen, Hoang-Dung Tran","doi":"10.1145/3627991","DOIUrl":"https://doi.org/10.1145/3627991","url":null,"abstract":"This paper extends the star set reachability approach to verify the robustness of feed-forward neural networks (FNNs) with sigmoidal activation functions such as Sigmoid and TanH. The main drawbacks of the star set approach in Sigmoid/TanH FNN verification are scalability, feasibility, and optimality issues in some cases due to the linear programming solver usage. We overcome this challenge by proposing a relaxed star (RStar) with symbolic intervals, which allows the usage of the back-substitution technique in DeepPoly to find bounds when overapproximating activation functions while maintaining the valuable features of a star set. RStar can overapproximate a sigmoidal activation function using four linear constraints (RStar4) or two linear constraints (RStar2), or only the output bounds (RStar0). We implement our RStar reachability algorithms in NNV and compare them to DeepPoly via robustness verification of image classification DNNs benchmarks. The experimental results show that the original star approach (i.e., no relaxation) is the least conservative of all methods yet the slowest. RStar4 is computationally much faster than the original star method and is the second least conservative approach. It certifies up to 40% more images against adversarial attacks than DeepPoly and on average 51 times faster than the star set. Last but not least, RStar0 is the most conservative method, which could only verify two cases for the CIFAR10 small Sigmoid network, δ = 0.014. However, it is the fastest method that can verify neural networks up to 3528 times faster than the star set and up to 46 times faster than DeepPoly in our evaluation.","PeriodicalId":50914,"journal":{"name":"ACM Transactions on Embedded Computing Systems","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135994171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deterministic Coordination Across Multiple Timelines 跨多个时间线的确定性协调
3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-10-16 DOI: 10.1145/3615357
Marten Lohstroh, Soroush Bateni, Christian Menard, Alexander Schulz-Rosengarten, Jeronimo Castrillon, Edward A. Lee
We discuss a novel approach for constructing deterministic reactive systems that revolves around a temporal model that incorporates a multiplicity of timelines. This model is central to Lingua Franca (LF), a polyglot coordination language and compiler toolchain we are developing for the definition and composition of concurrent components called reactors, which are objects that react to and emit discrete events. Our temporal model differs from existing models like the logical execution time (LET) paradigm and synchronous languages in that it reflects that there are always at least two distinct timelines involved in a reactive system; a logical one and a physical one—and possibly multiple of each kind. This paper explains how the relationship between events across timelines facilitates reasoning about consistency and availability across components in Cyber-Physical Systems (CPS).
我们讨论了一种构建确定性反应系统的新方法,该系统围绕一个包含多种时间线的时间模型。该模型是Lingua Franca (LF)的核心,LF是一种多语言协调语言和编译器工具链,我们正在开发用于定义和组合称为反应器的并发组件,这些组件是对离散事件作出反应并发出离散事件的对象。我们的时间模型不同于现有的模型,如逻辑执行时间(LET)范式和同步语言,因为它反映了至少有两个不同的时间线涉及到响应式系统;一个是逻辑上的,一个是物理上的,可能是每一种的多个。本文解释了跨时间线事件之间的关系如何促进对信息物理系统(CPS)中跨组件的一致性和可用性的推理。
{"title":"Deterministic Coordination Across Multiple Timelines","authors":"Marten Lohstroh, Soroush Bateni, Christian Menard, Alexander Schulz-Rosengarten, Jeronimo Castrillon, Edward A. Lee","doi":"10.1145/3615357","DOIUrl":"https://doi.org/10.1145/3615357","url":null,"abstract":"We discuss a novel approach for constructing deterministic reactive systems that revolves around a temporal model that incorporates a multiplicity of timelines. This model is central to Lingua Franca (LF), a polyglot coordination language and compiler toolchain we are developing for the definition and composition of concurrent components called reactors, which are objects that react to and emit discrete events. Our temporal model differs from existing models like the logical execution time (LET) paradigm and synchronous languages in that it reflects that there are always at least two distinct timelines involved in a reactive system; a logical one and a physical one—and possibly multiple of each kind. This paper explains how the relationship between events across timelines facilitates reasoning about consistency and availability across components in Cyber-Physical Systems (CPS).","PeriodicalId":50914,"journal":{"name":"ACM Transactions on Embedded Computing Systems","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136078825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Synchronised Shared Memory and Model Checking 同步共享内存和模型检查
3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-10-02 DOI: 10.1145/3626188
Joaquín Aguado, Alejandra Duenas
In this paper, a formal generic framework for defining and reasoning about deterministic concurrency in synchronous systems is implemented in the Spin model checker. Concretely, the paper implements the clock-synchronised shared memory ( csm ) theory , which extends synchronous programming with more and higher level csm data types. These csm data types are equipped with a synchronisation policy prescribing how concurrent calls to objects methods must be organised. In a policy constructive system, all methods of every object can be scheduled in a policy-conformant manner without deadlocking. In our framework, synchronous policies get codified as Promela never-claims. In this form, the model checker can search for executions (interleavings) that satisfy the synchronous product of all the never-claims, namely policy-conformant schedules for all the csm objects. The existence of such a policy-conformant schedules, verifies that the concurrent synchronous system is deterministic. The approach of this paper extends beyond a single semantics since it can handle the synchronous programming model as well as the various forms of the sequentially constructive model found in the literature.
本文在Spin模型检查器中实现了同步系统中确定性并发定义和推理的形式化通用框架。具体来说,本文实现了时钟同步共享内存(csm)理论,将同步编程扩展到更多更高级别的csm数据类型。这些csm数据类型配备了一个同步策略,该策略规定了必须如何组织对对象方法的并发调用。在策略构建系统中,每个对象的所有方法都可以以符合策略的方式进行调度,而不会出现死锁。在我们的框架中,同步策略被编码为Promela never-claims。在这种形式中,模型检查器可以搜索满足所有未声明的同步产品的执行(交错),即所有csm对象的策略一致性调度。这种符合策略的调度的存在,验证了并发同步系统是确定性的。本文的方法超越了单一语义,因为它可以处理同步编程模型以及文献中发现的各种形式的顺序构造模型。
{"title":"Synchronised Shared Memory and Model Checking","authors":"Joaquín Aguado, Alejandra Duenas","doi":"10.1145/3626188","DOIUrl":"https://doi.org/10.1145/3626188","url":null,"abstract":"In this paper, a formal generic framework for defining and reasoning about deterministic concurrency in synchronous systems is implemented in the Spin model checker. Concretely, the paper implements the clock-synchronised shared memory ( csm ) theory , which extends synchronous programming with more and higher level csm data types. These csm data types are equipped with a synchronisation policy prescribing how concurrent calls to objects methods must be organised. In a policy constructive system, all methods of every object can be scheduled in a policy-conformant manner without deadlocking. In our framework, synchronous policies get codified as Promela never-claims. In this form, the model checker can search for executions (interleavings) that satisfy the synchronous product of all the never-claims, namely policy-conformant schedules for all the csm objects. The existence of such a policy-conformant schedules, verifies that the concurrent synchronous system is deterministic. The approach of this paper extends beyond a single semantics since it can handle the synchronous programming model as well as the various forms of the sequentially constructive model found in the literature.","PeriodicalId":50914,"journal":{"name":"ACM Transactions on Embedded Computing Systems","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135834569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Asynchronous Compaction Acceleration Scheme for Near-Data Processing-enabled LSM-Tree-based KV Stores 基于lsm树的近数据处理KV存储异步压缩加速方案
3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-09-29 DOI: 10.1145/3626097
Hui Sun, Bendong Lou, Chao Zhao, Deyan Kong, Chaowei Zhang, Jianzhong Huang, Yinliang Yue, Xiao Qin
LSM-tree-based key-value stores (KV stores) convert random-write requests to sequence-write ones to achieve high I/O performance. Meanwhile, compaction operations in KV stores update SSTables in forms of reorganizing low-level data components to high-level ones, thereby guaranteeing an orderly data layout in each component. Repeated writes caused by compaction ( a.k.a, write amplification) impacts I/O bandwidth and overall system performance. Near-data processing (NDP) is one of effective approaches to addressing this write-amplification issue. Most NDP-based techniques adopt synchronous parallel schemes to perform a compaction task on both the host and its NDP-enabled device. In synchronous parallel compaction schemes, the execution time of compaction is determined by a subsystem that has lower compaction performance coupled by under-utilized computing resources in a NDP framework. To solve this problem, we propose an asynchronous parallel scheme named PStore to improve the compaction performance in KV stores. In PStore, we designed a multi-tasks queue and three priority-based scheduling methods. PStore elects proper compaction tasks to be offloaded in host- and device-side compaction modules. Our proposed cross-leveled compaction mechanism mitigates write amplification induced by asynchronous compaction. PStore featured with the asynchronous compaction mechanism fully utilizes computing resources in both host and device-side subsystems. Compared with the two popular synchronous compaction modes based on KV stores (TStore and LevelDB), our PStore immensely improves the throughput by up to a factor of 14 and 10.52 with an average of a factor of 2.09 and 1.73, respectively.
基于lsm树的键值存储(KV存储)将随机写请求转换为顺序写请求,以实现高I/O性能。同时,KV存储中的压缩操作以将底层数据组件重组为高层数据组件的形式更新sstable,从而保证了各个组件中的数据有序布局。由于写压缩(又称写放大)导致的重复写会影响I/O带宽和系统整体性能。近数据处理(NDP)是解决这个写放大问题的有效方法之一。大多数基于ndp的技术采用同步并行方案,在主机及其支持ndp的设备上执行压缩任务。在同步并行压缩方案中,压缩的执行时间由压缩性能较低的子系统以及NDP框架中未充分利用的计算资源决定。为了解决这个问题,我们提出了一种名为PStore的异步并行方案来提高KV存储的压缩性能。在PStore中,我们设计了一个多任务队列和三种基于优先级的调度方法。PStore在主机侧和设备侧的压缩模块中选择适当的压缩任务进行卸载。我们提出的交叉级别压缩机制减轻了异步压缩引起的写放大。PStore采用异步压缩机制,充分利用主机端和设备端子系统的计算资源。与基于KV存储的两种流行的同步压缩模式(TStore和LevelDB)相比,我们的PStore极大地提高了吞吐量,最高可达14倍和10.52倍,平均分别为2.09和1.73倍。
{"title":"An Asynchronous Compaction Acceleration Scheme for Near-Data Processing-enabled LSM-Tree-based KV Stores","authors":"Hui Sun, Bendong Lou, Chao Zhao, Deyan Kong, Chaowei Zhang, Jianzhong Huang, Yinliang Yue, Xiao Qin","doi":"10.1145/3626097","DOIUrl":"https://doi.org/10.1145/3626097","url":null,"abstract":"LSM-tree-based key-value stores (KV stores) convert random-write requests to sequence-write ones to achieve high I/O performance. Meanwhile, compaction operations in KV stores update SSTables in forms of reorganizing low-level data components to high-level ones, thereby guaranteeing an orderly data layout in each component. Repeated writes caused by compaction ( a.k.a, write amplification) impacts I/O bandwidth and overall system performance. Near-data processing (NDP) is one of effective approaches to addressing this write-amplification issue. Most NDP-based techniques adopt synchronous parallel schemes to perform a compaction task on both the host and its NDP-enabled device. In synchronous parallel compaction schemes, the execution time of compaction is determined by a subsystem that has lower compaction performance coupled by under-utilized computing resources in a NDP framework. To solve this problem, we propose an asynchronous parallel scheme named PStore to improve the compaction performance in KV stores. In PStore, we designed a multi-tasks queue and three priority-based scheduling methods. PStore elects proper compaction tasks to be offloaded in host- and device-side compaction modules. Our proposed cross-leveled compaction mechanism mitigates write amplification induced by asynchronous compaction. PStore featured with the asynchronous compaction mechanism fully utilizes computing resources in both host and device-side subsystems. Compared with the two popular synchronous compaction modes based on KV stores (TStore and LevelDB), our PStore immensely improves the throughput by up to a factor of 14 and 10.52 with an average of a factor of 2.09 and 1.73, respectively.","PeriodicalId":50914,"journal":{"name":"ACM Transactions on Embedded Computing Systems","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135194176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evolution Function Based Reach-Avoid Verification for Time-varying Systems with Disturbances 基于演化函数的时变扰动系统可达避免验证
3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-09-28 DOI: 10.1145/3626099
Ruiqi Hu, Kairong Liu, Zhikun She
In this work, we investigate the reach-avoid problem of a class of time-varying analytic systems with disturbances described by uncertain parameters. Firstly, by proposing the concepts of maximal and minimal reachable sets, we connect the avoidability and reachability with maximal and minimal reachable sets respectively. Then, for a given disturbance parameter, we introduce the evolution function for exactly describing the reachable set, and find a series representation of this evolution function with its Lie derivatives, which can also be regarded as a series function with respect to the uncertain parameter. Afterward, based on the partial sums of this series, over- and under-approximations of the evolution function are constructed, which can be realized by interval arithmetics with designated precision. Further, we propose sufficient conditions for avoidability and reachability and design a numerical quantifier elimination based algorithm to verify these conditions; moreover, we improve the algorithm with a time-splitting technique. We implement the algorithms and use some benchmarks with comparisons to show that our methodology is both efficient and promising. Finally, we additionally extend our methodology to deal with systems with complex initial sets and time-dependent switchings. The performance of our extended method for these systems is also shown by four examples with comparisons and discussions.
本文研究了一类具有不确定参数扰动的时变分析系统的达避问题。首先,通过提出最大和最小可达集的概念,将可避免性和可达性分别与最大和最小可达集联系起来。然后,对于给定的扰动参数,引入精确描述可达集的演化函数,并找到该演化函数及其李导数的级数表示形式,该演化函数也可以看作是关于不确定参数的级数函数。然后,基于该级数的部分和,构造演化函数的过逼近和欠逼近,用指定精度的区间算法实现。进一步,我们提出了可避免性和可达性的充分条件,并设计了一个基于数值量词消除的算法来验证这些条件;此外,我们还利用时间分割技术对算法进行了改进。我们实现了这些算法,并使用一些基准进行比较,以表明我们的方法既有效又有前途。最后,我们进一步扩展了我们的方法来处理具有复杂初始集和时间相关切换的系统。通过4个实例对该方法的性能进行了比较和讨论。
{"title":"Evolution Function Based Reach-Avoid Verification for Time-varying Systems with Disturbances","authors":"Ruiqi Hu, Kairong Liu, Zhikun She","doi":"10.1145/3626099","DOIUrl":"https://doi.org/10.1145/3626099","url":null,"abstract":"In this work, we investigate the reach-avoid problem of a class of time-varying analytic systems with disturbances described by uncertain parameters. Firstly, by proposing the concepts of maximal and minimal reachable sets, we connect the avoidability and reachability with maximal and minimal reachable sets respectively. Then, for a given disturbance parameter, we introduce the evolution function for exactly describing the reachable set, and find a series representation of this evolution function with its Lie derivatives, which can also be regarded as a series function with respect to the uncertain parameter. Afterward, based on the partial sums of this series, over- and under-approximations of the evolution function are constructed, which can be realized by interval arithmetics with designated precision. Further, we propose sufficient conditions for avoidability and reachability and design a numerical quantifier elimination based algorithm to verify these conditions; moreover, we improve the algorithm with a time-splitting technique. We implement the algorithms and use some benchmarks with comparisons to show that our methodology is both efficient and promising. Finally, we additionally extend our methodology to deal with systems with complex initial sets and time-dependent switchings. The performance of our extended method for these systems is also shown by four examples with comparisons and discussions.","PeriodicalId":50914,"journal":{"name":"ACM Transactions on Embedded Computing Systems","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135385297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AMULET: a Mutation Language Enabling Automatic Enrichment of SysML Models AMULET:一种能够自动充实SysML模型的突变语言
3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-09-16 DOI: 10.1145/3624583
Bastien Sultan, Léon Frénot, Ludovic Apvrille, Philippe Jaillon, Sophie Coudert
SysML models are widely used for designing and analyzing complex systems. Model-based design methods often require successive modifications of the models, whether for incrementally refining the design (e.g. in agile development methods) or for testing different design options. Such modifications, or mutations, are also used in mutation-based testing approaches. However, the definition of mutation operators can be a complex issue and applying them to models is sometimes performed by hand: this is time consuming and error prone. The paper addresses this issue thanks to the introduction of AMULET, the first mutation language for SysML. AMULET encompasses the modifications targeting SysML block and state-machine diagrams, and is supported by a compiler the paper presents. This compiler is integrated in TTool, an open-source SysML toolkit, enabling the full support of design methods including model design, mutation and verification tasks in a unique toolkit. The paper also introduces two case-studies providing concrete examples of AMULET use for modeling vulnerabilities and cyber attacks, and highlighting the benefits of AMULET for SysML mutations.
SysML模型广泛用于复杂系统的设计和分析。基于模型的设计方法通常需要对模型进行连续的修改,无论是为了逐步细化设计(例如在敏捷开发方法中)还是为了测试不同的设计选项。这种修改或突变也用于基于突变的测试方法中。然而,突变操作符的定义可能是一个复杂的问题,将它们应用到模型中有时需要手工执行:这既耗时又容易出错。本文通过引入AMULET来解决这个问题,AMULET是SysML的第一个突变语言。AMULET包含针对SysML块图和状态机图的修改,并由本文提出的编译器支持。该编译器集成在TTool中,这是一个开源的SysML工具包,可以在一个独特的工具包中全面支持设计方法,包括模型设计,突变和验证任务。本文还介绍了两个案例研究,提供了AMULET用于建模漏洞和网络攻击的具体示例,并强调了AMULET对SysML突变的好处。
{"title":"AMULET: a Mutation Language Enabling Automatic Enrichment of SysML Models","authors":"Bastien Sultan, Léon Frénot, Ludovic Apvrille, Philippe Jaillon, Sophie Coudert","doi":"10.1145/3624583","DOIUrl":"https://doi.org/10.1145/3624583","url":null,"abstract":"SysML models are widely used for designing and analyzing complex systems. Model-based design methods often require successive modifications of the models, whether for incrementally refining the design (e.g. in agile development methods) or for testing different design options. Such modifications, or mutations, are also used in mutation-based testing approaches. However, the definition of mutation operators can be a complex issue and applying them to models is sometimes performed by hand: this is time consuming and error prone. The paper addresses this issue thanks to the introduction of AMULET, the first mutation language for SysML. AMULET encompasses the modifications targeting SysML block and state-machine diagrams, and is supported by a compiler the paper presents. This compiler is integrated in TTool, an open-source SysML toolkit, enabling the full support of design methods including model design, mutation and verification tasks in a unique toolkit. The paper also introduces two case-studies providing concrete examples of AMULET use for modeling vulnerabilities and cyber attacks, and highlighting the benefits of AMULET for SysML mutations.","PeriodicalId":50914,"journal":{"name":"ACM Transactions on Embedded Computing Systems","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135308316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Analytical Model-based Capacity Planning Approach for Building CSD-based Storage Systems 基于分析模型的储能系统容量规划方法
3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-09-14 DOI: 10.1145/3623677
Hongsu Byun, Safdar Jamil, Jungwook Han, Sungyong Park, Myungcheol Lee, Changsoo Kim, Beongjun Choi, Youngjae Kim
The data movement in large-scale computing facilities (from compute nodes to data nodes) is categorized as one of the major contributors to high cost and energy utilization. To tackle it, in-storage processing (ISP) within storage devices, such as Solid-State Drives (SSDs), has been explored actively. The introduction of computational storage drives (CSDs) enabled ISP within the same form factor as regular SSDs and made it easy to replace SSDs within traditional compute nodes. With CSDs, host systems can offload various operations such as search, filter, and count. However, commercialized CSDs have different hardware resources and performance characteristics. Thus, it requires careful consideration of hardware, performance, and workload characteristics for building a CSD-based storage system within a compute node. Therefore, storage architects are hesitant to build a storage system based on CSDs as there are no tools to determine the benefits of CSD-based compute nodes to meet the performance requirements compared to traditional nodes based on SSDs. In this work, we proposed an analytical model-based storage capacity planner called CsdPlan for system architects to build performance-effective CSD-based compute nodes. Our model takes into account the performance characteristics of the host system, targeted workloads, and hardware and performance characteristics of CSDs to be deployed and provides optimal configuration based on the number of CSDs for a compute node. Furthermore, CsdPlan estimates and reduces the total cost of ownership (TCO) for building a CSD-based compute node. To evaluate the efficacy of CsdPlan , we selected two commercially available CSDs and 4 representative big data analysis workloads.
大规模计算设施中的数据移动(从计算节点到数据节点)被归类为高成本和能源利用率的主要贡献者之一。为了解决这一问题,人们一直在积极探索存储设备(如固态硬盘)内的存储处理(ISP)。计算存储驱动器(csd)的引入使ISP具有与常规ssd相同的外形,并使替换传统计算节点中的ssd变得容易。使用csd,主机系统可以卸载各种操作,如搜索、筛选和计数。但是,商业化的cd具有不同的硬件资源和性能特征。因此,在计算节点内构建基于sd的存储系统时,需要仔细考虑硬件、性能和工作负载特征。因此,存储架构师对于构建基于ssd的存储系统犹豫不决,因为没有工具可以确定基于ssd的计算节点与基于ssd的传统节点相比在满足性能要求方面的优势。在这项工作中,我们提出了一个基于分析模型的存储容量规划器,称为CsdPlan,用于系统架构师构建性能有效的基于csd的计算节点。我们的模型考虑了主机系统的性能特征、目标工作负载以及要部署的csd的硬件和性能特征,并根据计算节点的csd数量提供最佳配置。此外,CsdPlan估算并降低了构建基于csd的计算节点的总拥有成本(TCO)。为了评估CsdPlan的有效性,我们选择了两个市售的csd和4个具有代表性的大数据分析工作负载。
{"title":"An Analytical Model-based Capacity Planning Approach for Building CSD-based Storage Systems","authors":"Hongsu Byun, Safdar Jamil, Jungwook Han, Sungyong Park, Myungcheol Lee, Changsoo Kim, Beongjun Choi, Youngjae Kim","doi":"10.1145/3623677","DOIUrl":"https://doi.org/10.1145/3623677","url":null,"abstract":"The data movement in large-scale computing facilities (from compute nodes to data nodes) is categorized as one of the major contributors to high cost and energy utilization. To tackle it, in-storage processing (ISP) within storage devices, such as Solid-State Drives (SSDs), has been explored actively. The introduction of computational storage drives (CSDs) enabled ISP within the same form factor as regular SSDs and made it easy to replace SSDs within traditional compute nodes. With CSDs, host systems can offload various operations such as search, filter, and count. However, commercialized CSDs have different hardware resources and performance characteristics. Thus, it requires careful consideration of hardware, performance, and workload characteristics for building a CSD-based storage system within a compute node. Therefore, storage architects are hesitant to build a storage system based on CSDs as there are no tools to determine the benefits of CSD-based compute nodes to meet the performance requirements compared to traditional nodes based on SSDs. In this work, we proposed an analytical model-based storage capacity planner called CsdPlan for system architects to build performance-effective CSD-based compute nodes. Our model takes into account the performance characteristics of the host system, targeted workloads, and hardware and performance characteristics of CSDs to be deployed and provides optimal configuration based on the number of CSDs for a compute node. Furthermore, CsdPlan estimates and reduces the total cost of ownership (TCO) for building a CSD-based compute node. To evaluate the efficacy of CsdPlan , we selected two commercially available CSDs and 4 representative big data analysis workloads.","PeriodicalId":50914,"journal":{"name":"ACM Transactions on Embedded Computing Systems","volume":"214 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134911851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scheduling Dynamic Software Updates in Mobile Robots 移动机器人动态软件更新调度
3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-09-13 DOI: 10.1145/3623676
Ahmed El Yaacoub, Luca Mottola, Thiemo Voigt, Philipp Rümmer
We present NeRTA ( Ne xt R elease T ime A nalysis), a technique to enable dynamic software updates for low-level control software of mobile robots. Dynamic software updates enable software correction and evolution during system operation. In mobile robotics, they are crucial to resolve software defects without interrupting system operation or to enable on-the-fly extensions. Low-level control software for mobile robots, however, is time sensitive and runs on resource-constrained hardware with no operating system support. To minimize the impact of the update process, NeRTA safely schedules updates during times when the computing unit would otherwise be idle. It does so by utilizing information from the existing scheduling algorithm without impacting its operation. As such, NeRTA works orthogonal to the existing scheduler, retaining the existing platform-specific optimizations and fine-tuning, and may simply operate as a plug-in component. To enable larger dynamic updates, we further conceive an additional mechanism called bounded reactive control and apply mixed criticality concepts. The former cautiously reduces the overall control frequency, whereas the latter excludes less critical tasks from NeRTA processing. Their use increases the available idle times. We combine real-world experiments on embedded hardware with simulations to evaluate NeRTA. Our experimental evaluation shows that the difference between NeRTA’s estimated idle times and the measured idle times is less than 15% in more than three-quarters of the samples. The combined effect of bounded reactive control and mixed-criticality concepts results in a 150+% increase in available idle times. We also show that the processing overhead of NeRTA and of the additional mechanisms is essentially negligible.
我们提出了NeRTA (nenext R release time A analysis),这是一种能够对移动机器人的底层控制软件进行动态软件更新的技术。动态软件更新使软件在系统运行过程中得以修正和演进。在移动机器人中,它们对于解决软件缺陷而不中断系统运行或实现动态扩展至关重要。然而,用于移动机器人的低级控制软件是时间敏感的,并且运行在没有操作系统支持的资源受限的硬件上。为了尽量减少更新过程的影响,NeRTA在计算单元空闲时安全地安排更新。它通过利用现有调度算法中的信息而不影响其操作来实现这一目标。因此,NeRTA与现有的调度器是正交的,保留了现有的特定于平台的优化和微调,并且可以简单地作为插件组件操作。为了实现更大的动态更新,我们进一步构思了一种称为有界反应控制的附加机制,并应用了混合临界概念。前者谨慎地减少总体控制频率,而后者则从NeRTA处理中排除不太关键的任务。它们的使用增加了可用的空闲时间。我们将嵌入式硬件上的真实实验与模拟相结合来评估NeRTA。我们的实验评估表明,在超过四分之三的样本中,NeRTA估计的空闲时间与测量的空闲时间之间的差异小于15%。有界反应控制和混合临界概念的综合作用使可用空闲时间增加了150%以上。我们还表明,NeRTA和附加机制的处理开销基本上可以忽略不计。
{"title":"Scheduling Dynamic Software Updates in Mobile Robots","authors":"Ahmed El Yaacoub, Luca Mottola, Thiemo Voigt, Philipp Rümmer","doi":"10.1145/3623676","DOIUrl":"https://doi.org/10.1145/3623676","url":null,"abstract":"We present NeRTA ( Ne xt R elease T ime A nalysis), a technique to enable dynamic software updates for low-level control software of mobile robots. Dynamic software updates enable software correction and evolution during system operation. In mobile robotics, they are crucial to resolve software defects without interrupting system operation or to enable on-the-fly extensions. Low-level control software for mobile robots, however, is time sensitive and runs on resource-constrained hardware with no operating system support. To minimize the impact of the update process, NeRTA safely schedules updates during times when the computing unit would otherwise be idle. It does so by utilizing information from the existing scheduling algorithm without impacting its operation. As such, NeRTA works orthogonal to the existing scheduler, retaining the existing platform-specific optimizations and fine-tuning, and may simply operate as a plug-in component. To enable larger dynamic updates, we further conceive an additional mechanism called bounded reactive control and apply mixed criticality concepts. The former cautiously reduces the overall control frequency, whereas the latter excludes less critical tasks from NeRTA processing. Their use increases the available idle times. We combine real-world experiments on embedded hardware with simulations to evaluate NeRTA. Our experimental evaluation shows that the difference between NeRTA’s estimated idle times and the measured idle times is less than 15% in more than three-quarters of the samples. The combined effect of bounded reactive control and mixed-criticality concepts results in a 150+% increase in available idle times. We also show that the processing overhead of NeRTA and of the additional mechanisms is essentially negligible.","PeriodicalId":50914,"journal":{"name":"ACM Transactions on Embedded Computing Systems","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135740150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Robust and Energy Efficient Hyperdimensional Computing System for Voltage-scaled Circuits 一种用于电压标度电路的鲁棒高能效超维计算系统
3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-09-11 DOI: 10.1145/3620671
Dehua Liang, Hiromitsu Awano, Noriyuki Miura, Jun Shiomi
Voltage scaling is one of the most promising approaches for energy efficiency improvement but also brings challenges to fully guaranteeing stable operation in modern VLSI. To tackle such issues, we further extend the DependableHD to the second version DependableHDv2 , a HyperDimensional Computing (HDC) system that can tolerate bit-level memory failure in the low voltage region with high robustness. DependableHDv2 introduces the concept of margin enhancement for model retraining and utilizes noise injection to improve the robustness, which is capable of application in most state-of-the-art HDC algorithms. We additionally propose the dimension-swapping technique, which aims at handling the stuck-at errors induced by aggressive voltage scaling in the memory cells. Our experiment shows that under 8% memory stuck-at error, DependableHDv2 exhibits a 2.42% accuracy loss on average, which achieves a 14.1 × robustness improvement compared to the baseline HDC solution. The hardware evaluation shows that DependableHDv2 supports the systems to reduce the supply voltage from 430mV to 340mV for both item Memory and Associative Memory, which provides a 41.8% energy consumption reduction while maintaining competitive accuracy performance.
电压缩放是提高能效最有希望的方法之一,但也给现代超大规模集成电路的稳定运行带来了挑战。为了解决这些问题,我们进一步将DependableHD扩展到第二个版本DependableHDv2,这是一个超维计算(HDC)系统,可以在低电压区域以高鲁棒性容忍位级内存故障。DependableHDv2引入了边际增强的概念用于模型再训练,并利用噪声注入来提高鲁棒性,这能够应用于大多数最先进的HDC算法。此外,我们还提出了一种尺寸交换技术,该技术旨在处理存储单元中由电压缩放引起的卡在错误。我们的实验表明,在8%的内存卡错情况下,DependableHDv2的平均精度损失为2.42%,与基线HDC解决方案相比,鲁棒性提高了14.1倍。硬件评估表明,DependableHDv2支持系统将项目存储器和联想存储器的供电电压从430mV降低到340mV,在保持具有竞争力的精度性能的同时,降低41.8%的能耗。
{"title":"A Robust and Energy Efficient Hyperdimensional Computing System for Voltage-scaled Circuits","authors":"Dehua Liang, Hiromitsu Awano, Noriyuki Miura, Jun Shiomi","doi":"10.1145/3620671","DOIUrl":"https://doi.org/10.1145/3620671","url":null,"abstract":"Voltage scaling is one of the most promising approaches for energy efficiency improvement but also brings challenges to fully guaranteeing stable operation in modern VLSI. To tackle such issues, we further extend the DependableHD to the second version DependableHDv2 , a HyperDimensional Computing (HDC) system that can tolerate bit-level memory failure in the low voltage region with high robustness. DependableHDv2 introduces the concept of margin enhancement for model retraining and utilizes noise injection to improve the robustness, which is capable of application in most state-of-the-art HDC algorithms. We additionally propose the dimension-swapping technique, which aims at handling the stuck-at errors induced by aggressive voltage scaling in the memory cells. Our experiment shows that under 8% memory stuck-at error, DependableHDv2 exhibits a 2.42% accuracy loss on average, which achieves a 14.1 × robustness improvement compared to the baseline HDC solution. The hardware evaluation shows that DependableHDv2 supports the systems to reduce the supply voltage from 430mV to 340mV for both item Memory and Associative Memory, which provides a 41.8% energy consumption reduction while maintaining competitive accuracy performance.","PeriodicalId":50914,"journal":{"name":"ACM Transactions on Embedded Computing Systems","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135980673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ACM Transactions on Embedded Computing Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1