首页 > 最新文献

Future Generation Computer Systems-The International Journal of Escience最新文献

英文 中文
A message-driven system for processing highly skewed graphs 一种处理高倾斜图的消息驱动系统
IF 6.2 2区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-07-01 Epub Date: 2026-01-22 DOI: 10.1016/j.future.2026.108394
Bibrak Qamar Chandio, Maciej Brodowicz, Thomas Sterling
The paper provides a unified co-design of: 1) a non-Von Neumann architecture for fine-grain irregular memory computations, 2) a programming and execution model that allows spawning tasks from within the graph vertex data at runtime, 3) language constructs for actions that send work to where the data resides, combining parallel expressiveness of local control objects (LCOs) to implement asynchronous graph processing primitives, 4) and an innovative vertex-centric data-structure, using the concept of Rhizomes, that parallelizes both the out and in-degree load of vertex objects across many cores and yet provides a single programming abstraction to the vertex objects. The data structure hierarchically parallelizes the out-degree load of vertices and the in-degree load laterally. The rhizomes internally communicate and remain consistent, using event-driven synchronization mechanisms, to provide a unified and correct view of the vertex.
Simulated experimental results show performance gains for BFS, SSSP, and Page Rank on large chip sizes for the tested input graph datasets containing highly skewed degree distributions. The improvements come from the ability to express and create fine-grain dynamic computing task in the form of actions, language constructs that aid the compiler to generate code that the runtime system uses to optimally schedule tasks, and the data structure that shares both in and out-degree compute workload among memory-processing elements.
本文提供了一个统一的协同设计:1)用于细粒度不规则内存计算的非冯·诺伊曼架构,2)允许在运行时从图顶点数据中生成任务的编程和执行模型,3)用于将工作发送到数据所在位置的操作的语言结构,结合本地控制对象(LCOs)的并行表达性来实现异步图处理原语,4)和创新的以顶点为中心的数据结构,使用根状茎的概念,这使得顶点对象的出度和入度负载在多个内核上并行化,并为顶点对象提供了一个单一的编程抽象。该数据结构分层并行化顶点的外度负载和内度负载。根茎内部通信并保持一致,使用事件驱动的同步机制,以提供统一和正确的顶点视图。模拟实验结果显示,对于包含高度偏斜度分布的测试输入图数据集,在大芯片尺寸上,BFS、SSSP和Page Rank的性能有所提高。这些改进来自于以动作的形式表达和创建细粒度动态计算任务的能力、帮助编译器生成运行时系统用于优化调度任务的代码的语言构造,以及在内存处理元素之间共享度内和度外计算工作负载的数据结构。
{"title":"A message-driven system for processing highly skewed graphs","authors":"Bibrak Qamar Chandio,&nbsp;Maciej Brodowicz,&nbsp;Thomas Sterling","doi":"10.1016/j.future.2026.108394","DOIUrl":"10.1016/j.future.2026.108394","url":null,"abstract":"<div><div>The paper provides a unified co-design of: 1) a non-Von Neumann architecture for fine-grain irregular memory computations, 2) a programming and execution model that allows spawning tasks from within the graph vertex data at runtime, 3) language constructs for <em>actions</em> that send work to where the data resides, combining parallel expressiveness of local control objects (LCOs) to implement asynchronous graph processing primitives, 4) and an innovative vertex-centric data-structure, using the concept of Rhizomes, that parallelizes both the out and in-degree load of vertex objects across many cores and yet provides a single programming abstraction to the vertex objects. The data structure hierarchically parallelizes the out-degree load of vertices and the in-degree load laterally. The rhizomes internally communicate and remain consistent, using event-driven synchronization mechanisms, to provide a unified and correct view of the vertex.</div><div>Simulated experimental results show performance gains for BFS, SSSP, and Page Rank on large chip sizes for the tested input graph datasets containing highly skewed degree distributions. The improvements come from the ability to express and create fine-grain dynamic computing task in the form of <em>actions</em>, language constructs that aid the compiler to generate code that the runtime system uses to optimally schedule tasks, and the data structure that shares both in and out-degree compute workload among memory-processing elements.</div></div>","PeriodicalId":55132,"journal":{"name":"Future Generation Computer Systems-The International Journal of Escience","volume":"180 ","pages":"Article 108394"},"PeriodicalIF":6.2,"publicationDate":"2026-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146033296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LOTL-hunter: Detecting multi-stage living-off-the-land attacks in cyber-physical systems using decision fusion techniques with digital twins LOTL-Hunter:利用数字孪生决策融合技术检测网络物理系统中的多阶段攻击
IF 6.2 2区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-07-01 Epub Date: 2026-01-20 DOI: 10.1016/j.future.2026.108382
Carol Lo , Thu Yein Win , Zeinab Rezaeifar , Zaheer Khan , Phil Legg
The integration of smart sensors and actuators in industrial environments has expanded the cyber-physical attack surface, making it increasingly difficult to distinguish anomalies caused by cyberattacks from those due to mechanical or electrical faults. This challenge is exacerbated by stealthy, multi-stage attacks leveraging Living off the Land (LOTL) techniques, which often evade conventional anomaly detection or intrusion detection systems (IDS).
This study presents a Digital Twin-based testbed for safe, repeatable simulation of multi-stage cyber-physical attacks targeting Cyber-Physical Systems (CPS) and Industrial Control Systems (ICS). We propose a two-level decision fusion method that aggregates and aligns anomalies across network, process, and host domains in synchronized 1-minute intervals. The first-level fusion improves OT-layer detection by applying confidence-aware decision logic to outputs combined from (a) a supervised deep learning model (LSTM-FCN) for process anomalies, (b) an unsupervised model (Isolation Forest) for OPC UA network anomalies, and (c) process alarm signals. The second-level fusion integrates these results with host-based anomalies, computed through point-based scoring of Wazuh alerts, to provide comprehensive IT/OT situational awareness. Experimental results demonstrate improved detection of stealthy, multi-stage APT attack behaviours. Additionally, Large Language Models (LLM) provide summarization of the integrated IT/OT anomaly logs into human-readable insights, enhancing interpretability and supporting cyber threat hunting.
工业环境中智能传感器和执行器的集成扩大了网络物理攻击面,使得越来越难以区分网络攻击引起的异常与机械或电气故障引起的异常。利用“陆上生存”(LOTL)技术的隐蔽的多阶段攻击加剧了这一挑战,这些攻击通常会避开常规的异常检测或入侵检测系统(IDS)。本研究提出了一个基于数字孪生的测试平台,用于安全、可重复地模拟针对网络物理系统(CPS)和工业控制系统(ICS)的多阶段网络物理攻击。我们提出了一种两级决策融合方法,该方法在同步的1分钟间隔内聚合和对齐跨网络、进程和主机域的异常。第一级融合通过将信任感知决策逻辑应用于以下输出组合来改进ot层检测:(a)过程异常的监督深度学习模型(LSTM-FCN), (b) OPC UA网络异常的无监督模型(隔离森林),以及(c)过程报警信号。第二级融合将这些结果与基于主机的异常情况结合起来,通过基于点的Wazuh警报评分计算,提供全面的IT/OT态势感知。实验结果表明,改进的检测隐身,多阶段APT攻击行为。此外,大型语言模型(LLM)将集成的IT/OT异常日志总结为人类可读的见解,增强了可解释性并支持网络威胁搜索。
{"title":"LOTL-hunter: Detecting multi-stage living-off-the-land attacks in cyber-physical systems using decision fusion techniques with digital twins","authors":"Carol Lo ,&nbsp;Thu Yein Win ,&nbsp;Zeinab Rezaeifar ,&nbsp;Zaheer Khan ,&nbsp;Phil Legg","doi":"10.1016/j.future.2026.108382","DOIUrl":"10.1016/j.future.2026.108382","url":null,"abstract":"<div><div>The integration of smart sensors and actuators in industrial environments has expanded the cyber-physical attack surface, making it increasingly difficult to distinguish anomalies caused by cyberattacks from those due to mechanical or electrical faults. This challenge is exacerbated by stealthy, multi-stage attacks leveraging Living off the Land (LOTL) techniques, which often evade conventional anomaly detection or intrusion detection systems (IDS).</div><div>This study presents a Digital Twin-based testbed for safe, repeatable simulation of multi-stage cyber-physical attacks targeting Cyber-Physical Systems (CPS) and Industrial Control Systems (ICS). We propose a two-level decision fusion method that aggregates and aligns anomalies across network, process, and host domains in synchronized 1-minute intervals. The first-level fusion improves OT-layer detection by applying confidence-aware decision logic to outputs combined from (a) a supervised deep learning model (LSTM-FCN) for process anomalies, (b) an unsupervised model (Isolation Forest) for OPC UA network anomalies, and (c) process alarm signals. The second-level fusion integrates these results with host-based anomalies, computed through point-based scoring of Wazuh alerts, to provide comprehensive IT/OT situational awareness. Experimental results demonstrate improved detection of stealthy, multi-stage APT attack behaviours. Additionally, Large Language Models (LLM) provide summarization of the integrated IT/OT anomaly logs into human-readable insights, enhancing interpretability and supporting cyber threat hunting.</div></div>","PeriodicalId":55132,"journal":{"name":"Future Generation Computer Systems-The International Journal of Escience","volume":"180 ","pages":"Article 108382"},"PeriodicalIF":6.2,"publicationDate":"2026-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146014879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A knowledge graph-driven framework for deploying AI-powered patient digital twins 用于部署人工智能患者数字双胞胎的知识图谱驱动框架
IF 6.2 2区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-07-01 Epub Date: 2026-01-20 DOI: 10.1016/j.future.2026.108380
Alberto Marfoglia , Christian D’Errico , Sabato Mellone , Antonella Carbonaro
Background: The healthcare sector faces diverse challenges, including poor interoperability and a lack of personalized approaches, which limit patient outcomes. Ineffective data exchange and one-size-fits-all treatments fail to meet individual needs. Emerging technologies like digital twins (DTs), the semantic web, and AI show promise in tackling these obstacles. For this reason, we introduced CONNECTED, a conceptual multi-level framework that combines these techniques to deploy general-purpose patient DTs. Objective: This study assesses CONNECTED’s comprehensiveness, applicability, and utility for developing intelligent, personalized healthcare applications. Specifically, we deliver a preliminary version of the framework to predict future patient states and demonstrate its automation benefits in deploying semantically enriched, AI-powered patient DTs. Methods: We enhanced the CONNECTED architecture by providing a formal definition of DT and modularizing its core functionalities into four microservices (Properties, State, Capabilities, and Manifest). The Manifest service facilitates AI model integration through the Model Interface Manifest Ontology (MIMO), enabling automatic data-to-model binding via a reasoner. Using the HeartBeatKG quality assessment tool, we validated MIMO and tested the internal logic by integrating a well-established stroke-risk model. Results: Our implementation comprehends: (1) deploying a FHIR-compliant, patient-centric API for clinical history access, real-time monitoring, and predictive simulation; (2) publishing MIMO; (3) establishing the Manifest protocol for seamless, general-purpose AI model integration tailored to individual patient profiles; and (4) a proof-of-concept benchmarking application comparing multiple stroke risk classifiers. Conclusion: CONNECTED establishes a flexible, scalable foundation for interoperable semantic patient DTs. Automation reduces technical overhead and enables users to focus on delivering personalized, insight-driven care.
背景:医疗保健行业面临着各种各样的挑战,包括互操作性差和缺乏个性化的方法,这限制了患者的治疗效果。无效的数据交换和一刀切的处理不能满足个人需求。数字孪生(DTs)、语义网和人工智能等新兴技术有望解决这些障碍。出于这个原因,我们引入了CONNECTED,这是一个概念性的多层框架,它结合了这些技术来部署通用的患者DTs。目的:本研究评估CONNECTED在开发智能、个性化医疗保健应用方面的全面性、适用性和实用性。具体来说,我们提供了一个框架的初步版本,以预测未来的患者状态,并展示其在部署语义丰富、人工智能驱动的患者DTs方面的自动化优势。方法:我们通过提供DT的正式定义并将其核心功能模块化为四个微服务(属性、状态、能力和清单)来增强CONNECTED架构。Manifest服务通过模型接口清单本体(model Interface Manifest Ontology, MIMO)促进AI模型集成,通过推理器实现数据到模型的自动绑定。使用HeartBeatKG质量评估工具,我们验证了MIMO,并通过整合一个完善的卒中风险模型测试了内部逻辑。结果:我们的实施包括:(1)部署符合fhir的、以患者为中心的API,用于临床病史访问、实时监测和预测模拟;(2)发布MIMO;(3)建立Manifest协议,实现针对个体患者情况的无缝通用AI模型集成;(4)一个比较多个中风风险分类器的概念验证基准应用程序。结论:CONNECTED为可互操作的语义患者DTs建立了一个灵活、可扩展的基础。自动化减少了技术开销,使用户能够专注于提供个性化的、洞察力驱动的护理。
{"title":"A knowledge graph-driven framework for deploying AI-powered patient digital twins","authors":"Alberto Marfoglia ,&nbsp;Christian D’Errico ,&nbsp;Sabato Mellone ,&nbsp;Antonella Carbonaro","doi":"10.1016/j.future.2026.108380","DOIUrl":"10.1016/j.future.2026.108380","url":null,"abstract":"<div><div>Background: The healthcare sector faces diverse challenges, including poor interoperability and a lack of personalized approaches, which limit patient outcomes. Ineffective data exchange and one-size-fits-all treatments fail to meet individual needs. Emerging technologies like digital twins (DTs), the semantic web, and AI show promise in tackling these obstacles. For this reason, we introduced CONNECTED, a conceptual multi-level framework that combines these techniques to deploy general-purpose patient DTs. Objective: This study assesses CONNECTED’s comprehensiveness, applicability, and utility for developing intelligent, personalized healthcare applications. Specifically, we deliver a preliminary version of the framework to predict future patient states and demonstrate its automation benefits in deploying semantically enriched, AI-powered patient DTs. Methods: We enhanced the CONNECTED architecture by providing a formal definition of DT and modularizing its core functionalities into four microservices (Properties, State, Capabilities, and Manifest). The Manifest service facilitates AI model integration through the Model Interface Manifest Ontology (MIMO), enabling automatic data-to-model binding via a reasoner. Using the HeartBeatKG quality assessment tool, we validated MIMO and tested the internal logic by integrating a well-established stroke-risk model. Results: Our implementation comprehends: (1) deploying a FHIR-compliant, patient-centric API for clinical history access, real-time monitoring, and predictive simulation; (2) publishing MIMO; (3) establishing the Manifest protocol for seamless, general-purpose AI model integration tailored to individual patient profiles; and (4) a proof-of-concept benchmarking application comparing multiple stroke risk classifiers. Conclusion: CONNECTED establishes a flexible, scalable foundation for interoperable semantic patient DTs. Automation reduces technical overhead and enables users to focus on delivering personalized, insight-driven care.</div></div>","PeriodicalId":55132,"journal":{"name":"Future Generation Computer Systems-The International Journal of Escience","volume":"180 ","pages":"Article 108380"},"PeriodicalIF":6.2,"publicationDate":"2026-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146014895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Concord: A scalable, trace-driven, and reproducible framework for resilient container warming in serverless IoT Concord:无服务器物联网中弹性容器升温的可扩展、跟踪驱动和可复制框架
IF 6.2 2区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-07-01 Epub Date: 2026-02-03 DOI: 10.1016/j.future.2026.108409
Seyed Hossein Ahmadpanah
Cold start latency poses a fundamental challenge to the promise of real-time, serverless computing for the Internet of Things (IoT). while there are container warming techniques, they are frequently created for centralized, trusted clouds and do not take into account the size, resource limitations, and hostile environment of decentralized edge environments. Moreover, they usually base their performance claims on oversimplified models that don’t accurately represent operational dynamics in the real world. In this paper, we present Concord, a scalability-focused framework for resilient container warming that has undergone unprecedented validation. Concord formulates the warming problem as a constrained stochastic game, allowing clusters of IoT devices to collaboratively manage shared container instances. A lightweight Byzantine Fault Tolerance (BFT) protocol ensures robustness against malicious actors and secures this collaboration. The main contribution of the framework is its observable performance in real-world scenarios: we demonstrate that Concord reduces the cold start probability to less than 1.2% across 10,000 devices with low energy and traffic overhead using the Azure Functions 2023 public trace. The entire system, evaluation environment, and analysis scripts are made available as a one-click, publicly accessible, and reproducible artifact to support scientific transparency.
冷启动延迟对物联网(IoT)的实时、无服务器计算的承诺构成了根本性的挑战。虽然存在容器升温技术,但它们通常是为集中式可信云创建的,并且没有考虑到分散边缘环境的大小、资源限制和敌对环境。此外,他们通常将性能声明建立在过于简化的模型上,这些模型不能准确地表示现实世界中的操作动态。在本文中,我们提出了Concord,这是一个以可扩展性为重点的弹性集装箱升温框架,已经经历了前所未有的验证。Concord将变暖问题描述为一个受限的随机博弈,允许物联网设备集群协作管理共享容器实例。轻量级的拜占庭容错(BFT)协议确保了对恶意参与者的鲁棒性,并确保了这种协作。该框架的主要贡献在于其在现实场景中的可观察性能:我们证明,使用Azure Functions 2023公共跟踪,Concord在10,000台设备上以低能耗和低流量开销将冷启动概率降低到不到1.2%。整个系统、评估环境和分析脚本作为一键式、可公开访问和可重复的工件提供,以支持科学透明度。
{"title":"Concord: A scalable, trace-driven, and reproducible framework for resilient container warming in serverless IoT","authors":"Seyed Hossein Ahmadpanah","doi":"10.1016/j.future.2026.108409","DOIUrl":"10.1016/j.future.2026.108409","url":null,"abstract":"<div><div>Cold start latency poses a fundamental challenge to the promise of real-time, serverless computing for the Internet of Things (IoT). while there are container warming techniques, they are frequently created for centralized, trusted clouds and do not take into account the size, resource limitations, and hostile environment of decentralized edge environments. Moreover, they usually base their performance claims on oversimplified models that don’t accurately represent operational dynamics in the real world. In this paper, we present Concord, a scalability-focused framework for resilient container warming that has undergone unprecedented validation. Concord formulates the warming problem as a constrained stochastic game, allowing clusters of IoT devices to collaboratively manage shared container instances. A lightweight Byzantine Fault Tolerance (BFT) protocol ensures robustness against malicious actors and secures this collaboration. The main contribution of the framework is its observable performance in real-world scenarios: we demonstrate that Concord reduces the cold start probability to less than 1.2% across 10,000 devices with low energy and traffic overhead using the Azure Functions 2023 public trace. The entire system, evaluation environment, and analysis scripts are made available as a one-click, publicly accessible, and reproducible artifact to support scientific transparency.</div></div>","PeriodicalId":55132,"journal":{"name":"Future Generation Computer Systems-The International Journal of Escience","volume":"180 ","pages":"Article 108409"},"PeriodicalIF":6.2,"publicationDate":"2026-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146110186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DQVeriChain: Distributed quantum-state-verified and DID-based self-attentive large language model for criminal tracking using blockchain DQVeriChain:使用区块链的分布式量子态验证和基于did的自关注大语言模型
IF 6.2 2区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-07-01 Epub Date: 2026-02-03 DOI: 10.1016/j.future.2026.108412
Rabi Shaw , Suman Majumder
The increasing complexity of cybercrime and identity manipulation activities demands a secure, verifiable, and quantum-resilient framework for criminal identification. This study introduces ‘DQVeriChain’, a distributed quantum-state-verified and decentralized identity-based large language model (LLM) designed for criminal tracking using blockchain. The system integrates quantum principal component analysis (QPCA), GHZ state-fidelity validation, and ZZ-feature mapping to ensure high-fidelity quantum entanglement and secure feature encoding. The verification process combines both the Quantum Self-Attention Mechanism (QSAM) and the Quantum Self-Correcting Attention Mechanism (QSCAM) with LLM-driven inference for intelligent anomaly detection. In addition, validation was performed using IBM Qiskit with 10-fold cross-validation and fidelity thresholds (F ≥ 0.5), achieving prediction accuracy greater than 99% with minimal quantum circuit complexity (5/5 qubits). These experimental results confirm that ‘DQVeriChain’ offers an efficient, tamper-resistant, and scalable architecture suitable for real-time forensic and cybersecurity applications.
网络犯罪和身份操纵活动日益复杂,需要一个安全、可验证和量子弹性的犯罪识别框架。本研究介绍了“DQVeriChain”,这是一种分布式量子状态验证和分散的基于身份的大型语言模型(LLM),专为使用区块链跟踪犯罪而设计。该系统集成了量子主成分分析(QPCA)、GHZ状态保真度验证和zz特征映射,以确保高保真量子纠缠和安全特征编码。验证过程将量子自注意机制(QSAM)和量子自纠正注意机制(QSCAM)与llm驱动推理相结合,实现智能异常检测。此外,使用IBM Qiskit进行验证,具有10倍交叉验证和保真阈值(F ≥ 0.5),以最小的量子电路复杂度(5/5量子比特)实现了大于99%的预测精度。这些实验结果证实,“DQVeriChain”提供了一种高效、防篡改、可扩展的架构,适用于实时取证和网络安全应用。
{"title":"DQVeriChain: Distributed quantum-state-verified and DID-based self-attentive large language model for criminal tracking using blockchain","authors":"Rabi Shaw ,&nbsp;Suman Majumder","doi":"10.1016/j.future.2026.108412","DOIUrl":"10.1016/j.future.2026.108412","url":null,"abstract":"<div><div>The increasing complexity of cybercrime and identity manipulation activities demands a secure, verifiable, and quantum-resilient framework for criminal identification. This study introduces ‘DQVeriChain’, a distributed quantum-state-verified and decentralized identity-based large language model (LLM) designed for criminal tracking using blockchain. The system integrates quantum principal component analysis (QPCA), GHZ state-fidelity validation, and ZZ-feature mapping to ensure high-fidelity quantum entanglement and secure feature encoding. The verification process combines both the Quantum Self-Attention Mechanism (QSAM) and the Quantum Self-Correcting Attention Mechanism (QSCAM) with LLM-driven inference for intelligent anomaly detection. In addition, validation was performed using IBM Qiskit with 10-fold cross-validation and fidelity thresholds (<em>F</em> ≥ 0.5), achieving prediction accuracy greater than 99% with minimal quantum circuit complexity (5/5 qubits). These experimental results confirm that ‘DQVeriChain’ offers an efficient, tamper-resistant, and scalable architecture suitable for real-time forensic and cybersecurity applications.</div></div>","PeriodicalId":55132,"journal":{"name":"Future Generation Computer Systems-The International Journal of Escience","volume":"180 ","pages":"Article 108412"},"PeriodicalIF":6.2,"publicationDate":"2026-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146110192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spatial-temporal dual interactive graph convolutional networks for traffic flow forecasting 交通流预测的时空双交互图卷积网络
IF 6.2 2区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-06-01 Epub Date: 2025-12-09 DOI: 10.1016/j.future.2025.108298
Wensheng Zhang , Hao Cai , Hongli Shi , Zhenzhen Han
Traffic flow forecasting is central to intelligent transportation systems but remains challenging due to tightly coupled spatial temporal dependencies and high-order interactions. Existing deep models often assume static or single-view spatial structure, emphasize only pairwise relations, and struggle to represent dynamic spatial-temporal interactions, leading to a persistent accuracy-efficiency trade-off. To overcome this challenge, we propose a Spatial-Temporal Dual Interactive Graph Convolutional Network (STDIGCN) built around three coordinated components: (i) an adaptive traffic graph learner with macro-micro branches that infer long- and short-term topologies; (ii) a dynamic hypergraph obtained via dual transformations and embedding-based association learning to capture high-order group interactions; and (iii) a spatial-temporal dual-graph interactive convolution module that exchanges information between the graph and hypergraph streams, aligning pairwise node dependencies with high-order edge patterns while preserving multiscale temporal structure. Extensive experiments across six benchmark traffic datasets and multiple horizons demonstrate that STDIGCN outperforms strong baselines while maintaining computational efficiency.
交通流预测是智能交通系统的核心,但由于紧密耦合的时空依赖性和高阶相互作用,交通流预测仍然具有挑战性。现有的深度模型通常假设静态或单视图空间结构,只强调成对关系,并且难以表示动态的时空相互作用,导致持久的准确性和效率权衡。为了克服这一挑战,我们提出了一个围绕三个协调组件构建的时空双交互图卷积网络(STDIGCN):(i)一个具有宏微观分支的自适应交通图学习器,可以推断长期和短期拓扑;(ii)通过对偶变换和基于嵌入的关联学习获得的动态超图,以捕获高阶群体交互;(iii)一个时空双图交互卷积模块,它在图和超图流之间交换信息,在保留多尺度时间结构的同时,用高阶边缘模式对齐两两节点依赖关系。在六个基准流量数据集和多个视界上进行的广泛实验表明,STDIGCN在保持计算效率的同时优于强基线。
{"title":"Spatial-temporal dual interactive graph convolutional networks for traffic flow forecasting","authors":"Wensheng Zhang ,&nbsp;Hao Cai ,&nbsp;Hongli Shi ,&nbsp;Zhenzhen Han","doi":"10.1016/j.future.2025.108298","DOIUrl":"10.1016/j.future.2025.108298","url":null,"abstract":"<div><div>Traffic flow forecasting is central to intelligent transportation systems but remains challenging due to tightly coupled spatial temporal dependencies and high-order interactions. Existing deep models often assume static or single-view spatial structure, emphasize only pairwise relations, and struggle to represent dynamic spatial-temporal interactions, leading to a persistent accuracy-efficiency trade-off. To overcome this challenge, we propose a Spatial-Temporal Dual Interactive Graph Convolutional Network (STDIGCN) built around three coordinated components: (i) an adaptive traffic graph learner with macro-micro branches that infer long- and short-term topologies; (ii) a dynamic hypergraph obtained via dual transformations and embedding-based association learning to capture high-order group interactions; and (iii) a spatial-temporal dual-graph interactive convolution module that exchanges information between the graph and hypergraph streams, aligning pairwise node dependencies with high-order edge patterns while preserving multiscale temporal structure. Extensive experiments across six benchmark traffic datasets and multiple horizons demonstrate that STDIGCN outperforms strong baselines while maintaining computational efficiency.</div></div>","PeriodicalId":55132,"journal":{"name":"Future Generation Computer Systems-The International Journal of Escience","volume":"179 ","pages":"Article 108298"},"PeriodicalIF":6.2,"publicationDate":"2026-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145731208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software aging issues and rejuvenation strategies for a container orchestration system 容器编排系统的软件老化问题和复兴策略
IF 6.2 2区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-06-01 Epub Date: 2025-12-28 DOI: 10.1016/j.future.2025.108274
Marcelo Santos , Rubens Matos , Marco Vieira , Jean Araujo
Software Aging and Rejuvenation (SAR) has been extensively studied due to its critical role in ensuring the reliable operation of systems. Although container orchestration is essential for efficiently managing and scaling cloud resources, the impact of SAR is not yet fully understood. This paper presents experiments conducted on two versions of Ubuntu Linux, simulating the operational scenarios of a private cloud. Each cluster includes one Main node and three Worker nodes, utilizing Containerd as the container runtime and Kubernetes as the orchestrator, across four distinct scenarios. The primary experimental conditions were maintained across all scenarios, including configurations, workloads, and test duration. Throughout each experiment, metrics such as CPU utilization, memory usage and disk utilization were monitored, considering system-wide values and observations for the Containerd and Kubelet services. The experiments also included measuring the response time of a web server for external HTTP requests submitted to the clusters. The initial scenario focused on investigating the effects of software aging, while subsequent scenarios explored the adoption of different rejuvenation strategies. Effects of software aging were observed across all scenarios, with resource leaks identified, particularly in memory usage, even when the cluster was under no load. The issues observed can lead to performance degradation and compromise reliability and availability if the system crashes due to memory exhaustion.
软件老化与返老还老(SAR)是保证系统可靠运行的关键问题,因此得到了广泛的研究。尽管容器编排对于有效地管理和扩展云资源是必不可少的,但是SAR的影响还没有被完全理解。本文在两个版本的Ubuntu Linux上进行了实验,模拟了私有云的操作场景。每个集群包括一个Main节点和三个Worker节点,使用Containerd作为容器运行时,使用Kubernetes作为编排器,跨越四个不同的场景。在所有场景中维持主要实验条件,包括配置、工作负载和测试持续时间。在每次实验中,考虑到Containerd和Kubelet服务的系统范围值和观察结果,对CPU利用率、内存使用和磁盘利用率等指标进行了监控。实验还包括测量web服务器对提交到集群的外部HTTP请求的响应时间。最初的场景侧重于调查软件老化的影响,而随后的场景则探讨了采用不同的恢复策略。在所有场景中都可以观察到软件老化的影响,即使集群处于无负载状态,也会发现资源泄漏,特别是内存使用。如果系统由于内存耗尽而崩溃,所观察到的问题可能导致性能下降,并损害可靠性和可用性。
{"title":"Software aging issues and rejuvenation strategies for a container orchestration system","authors":"Marcelo Santos ,&nbsp;Rubens Matos ,&nbsp;Marco Vieira ,&nbsp;Jean Araujo","doi":"10.1016/j.future.2025.108274","DOIUrl":"10.1016/j.future.2025.108274","url":null,"abstract":"<div><div>Software Aging and Rejuvenation (SAR) has been extensively studied due to its critical role in ensuring the reliable operation of systems. Although container orchestration is essential for efficiently managing and scaling cloud resources, the impact of SAR is not yet fully understood. This paper presents experiments conducted on two versions of Ubuntu Linux, simulating the operational scenarios of a private cloud. Each cluster includes one Main node and three Worker nodes, utilizing Containerd as the container runtime and Kubernetes as the orchestrator, across four distinct scenarios. The primary experimental conditions were maintained across all scenarios, including configurations, workloads, and test duration. Throughout each experiment, metrics such as CPU utilization, memory usage and disk utilization were monitored, considering system-wide values and observations for the Containerd and Kubelet services. The experiments also included measuring the response time of a web server for external HTTP requests submitted to the clusters. The initial scenario focused on investigating the effects of software aging, while subsequent scenarios explored the adoption of different rejuvenation strategies. Effects of software aging were observed across all scenarios, with resource leaks identified, particularly in memory usage, even when the cluster was under no load. The issues observed can lead to performance degradation and compromise reliability and availability if the system crashes due to memory exhaustion.</div></div>","PeriodicalId":55132,"journal":{"name":"Future Generation Computer Systems-The International Journal of Escience","volume":"179 ","pages":"Article 108274"},"PeriodicalIF":6.2,"publicationDate":"2026-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145845123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GPU acceleration of hybrid FETI solver for problems of transient nonlinear dynamics 瞬态非线性动力学问题的混合fei求解器的GPU加速
IF 6.2 2区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-06-01 Epub Date: 2025-12-25 DOI: 10.1016/j.future.2025.108341
Jakub Homola, Ondřej Meca, Lubomír Říha, Tomáš Brzobohatý
FETI methods, which build on the Finite Element Method, are utilized for large-scale engineering simulations. They use domain decomposition techniques to divide a large domain into many smaller subdomains, which can be processed in parallel.
Current trends in HPC focus on GPU-accelerated clusters. To utilize them efficiently, FETI solvers should be able to use these accelerators. Recent developments have demonstrated that the fundamental component of the FETI methods, the dual operator, can be successfully offloaded to the GPU.
In this paper, we focus on GPU acceleration of the Hybrid FETI variant. It reduces the size of the projector by using a two-level decomposition, thus allowing for a significantly higher number of compute nodes to be efficiently utilized. In turn, it allows us to split the problem into a larger number of smaller subdomains, which improves single-process performance.
We demonstrate the performance on a real-world problem of transient nonlinear dynamics that requires reassembling of the dual operator, preconditioner, and projector during each call of the solver. On the MareNostrum 5 supercomputer, using Nvidia H100 GPUs, we achieved a speedup of 2.9 for the whole Hybrid FETI solver compared to a CPU-only run.
FETI方法建立在有限元方法的基础上,用于大规模工程模拟。它们使用域分解技术将一个大域划分为许多较小的子域,这些子域可以并行处理。当前HPC的趋势集中在gpu加速集群上。为了有效地利用它们,fei求解器应该能够使用这些加速器。最近的发展表明,FETI方法的基本组成部分,对偶算子,可以成功地卸载到GPU。本文主要研究Hybrid FETI变体的GPU加速问题。它通过使用两级分解来减小投影仪的尺寸,从而允许有效地利用更多数量的计算节点。反过来,它允许我们将问题分解为大量较小的子域,从而提高单进程性能。我们展示了在一个实际的瞬态非线性动力学问题上的性能,该问题需要在每次调用求解器时重新组装对偶算子、预调节器和投影器。在使用Nvidia H100 gpu的MareNostrum 5超级计算机上,与仅使用cpu运行相比,我们实现了整个混合FETI求解器的2.9倍加速。
{"title":"GPU acceleration of hybrid FETI solver for problems of transient nonlinear dynamics","authors":"Jakub Homola,&nbsp;Ondřej Meca,&nbsp;Lubomír Říha,&nbsp;Tomáš Brzobohatý","doi":"10.1016/j.future.2025.108341","DOIUrl":"10.1016/j.future.2025.108341","url":null,"abstract":"<div><div>FETI methods, which build on the Finite Element Method, are utilized for large-scale engineering simulations. They use domain decomposition techniques to divide a large domain into many smaller subdomains, which can be processed in parallel.</div><div>Current trends in HPC focus on GPU-accelerated clusters. To utilize them efficiently, FETI solvers should be able to use these accelerators. Recent developments have demonstrated that the fundamental component of the FETI methods, the dual operator, can be successfully offloaded to the GPU.</div><div>In this paper, we focus on GPU acceleration of the Hybrid FETI variant. It reduces the size of the projector by using a two-level decomposition, thus allowing for a significantly higher number of compute nodes to be efficiently utilized. In turn, it allows us to split the problem into a larger number of smaller subdomains, which improves single-process performance.</div><div>We demonstrate the performance on a real-world problem of transient nonlinear dynamics that requires reassembling of the dual operator, preconditioner, and projector during each call of the solver. On the MareNostrum 5 supercomputer, using Nvidia H100 GPUs, we achieved a speedup of 2.9 for the whole Hybrid FETI solver compared to a CPU-only run.</div></div>","PeriodicalId":55132,"journal":{"name":"Future Generation Computer Systems-The International Journal of Escience","volume":"179 ","pages":"Article 108341"},"PeriodicalIF":6.2,"publicationDate":"2026-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145845128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Clean up the mess: Addressing data pollution in cryptocurrency abuse reporting services 清理混乱:解决加密货币滥用报告服务中的数据污染
IF 6.2 2区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-06-01 Epub Date: 2025-12-15 DOI: 10.1016/j.future.2025.108313
Gibran Gomez , Kevin van Liebergen , Davide Sanvito , Giuseppe Siracusano , Roberto Gonzalez , Juan Caballero
Cryptocurrency abuse reporting services are a valuable data source about abusive blockchain addresses, prevalent types of cryptocurrency abuse, and their financial impact on victims. However, they may suffer data pollution due to their crowd-sourced nature. This work analyzes the extent and impact of data pollution in cryptocurrency abuse reporting services and proposes a novel LLM-based defense to address the pollution. We collect 289K abuse reports submitted over 6 years to two popular services and use them to answer three research questions. RQ1 analyzes the extent and impact of pollution. We show that spam reports will eventually flood unchecked abuse reporting services, with BitcoinAbuse receiving 75 % of spam before stopping operations. We build a public dataset of 19,443 abuse reports labeled with 19 popular abuse types and use it to reveal the inaccuracy of user-reported abuse types. We identified 91 (0.1 %) benign addresses reported, responsible for 60 % of all the received funds. RQ2 examines whether we can automate identifying valid reports and their classification into abuse types. We propose an unsupervised LLM-based classifier that achieves an F1 score of 0.95 when classifying reports, an F1 of 0.89 when classifying out-of-distribution data, and an F1 of 0.99 when identifying spam reports. Our unsupervised LLM-based classifier clearly outperforms two baselines: a supervised classifier and a naive usage of the LLM. Finally, RQ3 demonstrates the usefulness of our LLM-based classifier for quantifying the financial impact of different cryptocurrency abuse types. We show that victim-reported losses heavily underestimate cybercriminal revenue by estimating a 29 times higher revenue from deposit transactions. We identified that investment scams have the highest financial impact and that extortions have lower conversion rates but compensate for them with massive email campaigns.
加密货币滥用报告服务是关于滥用区块链地址、流行的加密货币滥用类型及其对受害者的经济影响的宝贵数据源。然而,由于它们的众包性质,它们可能会遭受数据污染。这项工作分析了加密货币滥用报告服务中数据污染的程度和影响,并提出了一种新的基于法学硕士的防御方法来解决污染问题。我们收集了28.9万份在过去6年里提交到两个热门服务的虐待报告,并用它们来回答三个研究问题。RQ1分析污染的程度和影响。我们表明,垃圾邮件报告最终会淹没未经检查的滥用报告服务,BitcoinAbuse在停止运营之前会收到75%的垃圾邮件。我们建立了一个包含19443份虐待报告的公共数据集,标记了19种常见的虐待类型,并使用它来揭示用户报告的虐待类型的不准确性。我们确定了91个(0.1%)良性地址报告,负责60%的所有收到的资金。RQ2检查我们是否可以自动识别有效的报告并将其分类为滥用类型。我们提出了一个无监督的基于llm的分类器,在对报告进行分类时F1得分为0.95,在对分布外数据进行分类时F1得分为0.89,在识别垃圾邮件报告时F1得分为0.99。我们的无监督的基于LLM的分类器明显优于两个基线:监督分类器和朴素的LLM使用。最后,RQ3展示了我们基于llm的分类器在量化不同加密货币滥用类型的财务影响方面的有用性。我们发现,受害者报告的损失严重低估了网络犯罪的收入,因为他们估计存款交易的收入是网络犯罪收入的29倍。我们发现,投资诈骗的经济影响最大,敲诈勒索的转化率较低,但可以通过大规模的电子邮件活动来弥补。
{"title":"Clean up the mess: Addressing data pollution in cryptocurrency abuse reporting services","authors":"Gibran Gomez ,&nbsp;Kevin van Liebergen ,&nbsp;Davide Sanvito ,&nbsp;Giuseppe Siracusano ,&nbsp;Roberto Gonzalez ,&nbsp;Juan Caballero","doi":"10.1016/j.future.2025.108313","DOIUrl":"10.1016/j.future.2025.108313","url":null,"abstract":"<div><div>Cryptocurrency abuse reporting services are a valuable data source about abusive blockchain addresses, prevalent types of cryptocurrency abuse, and their financial impact on victims. However, they may suffer data pollution due to their crowd-sourced nature. This work analyzes the extent and impact of data pollution in cryptocurrency abuse reporting services and proposes a novel LLM-based defense to address the pollution. We collect 289K abuse reports submitted over 6 years to two popular services and use them to answer three research questions. RQ1 analyzes the extent and impact of pollution. We show that spam reports will eventually flood unchecked abuse reporting services, with BitcoinAbuse receiving 75 % of spam before stopping operations. We build a public dataset of 19,443 abuse reports labeled with 19 popular abuse types and use it to reveal the inaccuracy of user-reported abuse types. We identified 91 (0.1 %) benign addresses reported, responsible for 60 % of all the received funds. RQ2 examines whether we can automate identifying valid reports and their classification into abuse types. We propose an unsupervised LLM-based classifier that achieves an F1 score of 0.95 when classifying reports, an F1 of 0.89 when classifying out-of-distribution data, and an F1 of 0.99 when identifying spam reports. Our unsupervised LLM-based classifier clearly outperforms two baselines: a supervised classifier and a naive usage of the LLM. Finally, RQ3 demonstrates the usefulness of our LLM-based classifier for quantifying the financial impact of different cryptocurrency abuse types. We show that victim-reported losses heavily underestimate cybercriminal revenue by estimating a 29 times higher revenue from deposit transactions. We identified that investment scams have the highest financial impact and that extortions have lower conversion rates but compensate for them with massive email campaigns.</div></div>","PeriodicalId":55132,"journal":{"name":"Future Generation Computer Systems-The International Journal of Escience","volume":"179 ","pages":"Article 108313"},"PeriodicalIF":6.2,"publicationDate":"2026-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145785052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Artificial Intelligence for Interoperability (AIFI) - FGCS Editorial summary 人工智能互操作性(AIFI) - FGCS编辑摘要
IF 6.2 2区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-06-01 Epub Date: 2026-01-02 DOI: 10.1016/j.future.2025.108366
Luca Sciullo , Ivan Zyrianoff , Ronaldo C. Prati , Lionel Medini
{"title":"Artificial Intelligence for Interoperability (AIFI) - FGCS Editorial summary","authors":"Luca Sciullo ,&nbsp;Ivan Zyrianoff ,&nbsp;Ronaldo C. Prati ,&nbsp;Lionel Medini","doi":"10.1016/j.future.2025.108366","DOIUrl":"10.1016/j.future.2025.108366","url":null,"abstract":"","PeriodicalId":55132,"journal":{"name":"Future Generation Computer Systems-The International Journal of Escience","volume":"179 ","pages":"Article 108366"},"PeriodicalIF":6.2,"publicationDate":"2026-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145893747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Future Generation Computer Systems-The International Journal of Escience
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1