2015 IEEE 35th International Conference on Distributed Computing Systems最新文献

筛选
英文 中文
POP: Privacy-Preserving Outsourced Photo Sharing and Searching for Mobile Devices POP:保护私隐的外购照片分享及搜寻流动装置
2015 IEEE 35th International Conference on Distributed Computing Systems Pub Date : 2015-07-23 DOI: 10.1109/ICDCS.2015.39
Lan Zhang, Taeho Jung, Cihang Liu, Xuan Ding, Xiangyang Li, Yunhao Liu
{"title":"POP: Privacy-Preserving Outsourced Photo Sharing and Searching for Mobile Devices","authors":"Lan Zhang, Taeho Jung, Cihang Liu, Xuan Ding, Xiangyang Li, Yunhao Liu","doi":"10.1109/ICDCS.2015.39","DOIUrl":"https://doi.org/10.1109/ICDCS.2015.39","url":null,"abstract":"Facing a large number of personal photos and limited resource of mobile devices, cloud plays an important role in photo storing, sharing and searching. Meanwhile, some recent reputation damage and stalk events caused by photo leakage increase people's concern about photo privacy. Though most would agree that photo search function and privacy are both valuable, few cloud system supports both of them simultaneously. The center of such an ideal system is privacy-preserving outsourced image similarity measurement, which is extremely challenging when the cloud is untrusted and a high extra overhead is disliked. In this work, we introduce a framework POP, which enables privacy-seeking mobile device users to outsource burdensome photo sharing and searching safely to untrusted servers. Unauthorized parties, including the server, learn nothing about photos or search queries. This is achieved by our carefully designed architecture and novel non-interactive privacy-preserving protocols for image similarity computation. Our framework is compatible with the state-of-the-art image search techniques, and it requires few changes to existing cloud systems. For efficiency and good user experience, our framework allows users to define personalized private content by a simple check-box configuration and then enjoy the sharing and searching services as usual. All privacy protection modules are transparent to users. The evaluation of our prototype implementation with 31,772 real-life images shows little extra communication and computation overhead caused by our system.","PeriodicalId":129182,"journal":{"name":"2015 IEEE 35th International Conference on Distributed Computing Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129089087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 71
Cost-Effective Low-Delay Cloud Video Conferencing 具有成本效益的低延迟云视频会议
2015 IEEE 35th International Conference on Distributed Computing Systems Pub Date : 2015-07-23 DOI: 10.1109/ICDCS.2015.19
M. Hajiesmaili, Lok To Mak, Zhi Wang, Chuan Wu, Minghua Chen, A. Khonsari
{"title":"Cost-Effective Low-Delay Cloud Video Conferencing","authors":"M. Hajiesmaili, Lok To Mak, Zhi Wang, Chuan Wu, Minghua Chen, A. Khonsari","doi":"10.1109/ICDCS.2015.19","DOIUrl":"https://doi.org/10.1109/ICDCS.2015.19","url":null,"abstract":"The cloud computing paradigm has been advocated in recent video conferencing system design, which exploits the rich on-demand resources spanning multiple geographic regions of a distributed cloud, for better conferencing experience. A typical architectural design in cloud environment is to create video conferencing agents, i.e., Virtual machines, in each cloud site, assign users to the agents, and enable inter-user communication through the agents. Given the diversity of devices and network connectivities of the users, the agents may also transcode the conferencing streams to the best formats and bitrates. In this architecture, two key issues exist on how to effectively assign users to agents and how to identify the best agent to perform a Transco ding task, which are nontrivial due to the following: (1) the existing proximity-based assignment may not be optimal in terms of inter-user delay, which fails to consider the whereabouts of the other users in a conferencing session, (2) the agents may have heterogeneous bandwidth and processing availability, such that the best Transco ding agents should be carefully identified, for cost minimization while best serving all the users requiring the transcoded streams. To address these challenges, we formulate the user-to-agent assignment and Transco ding-agent selection problems, which targets at minimizing the operational cost of the conferencing provider while keeping the conferencing delay low. The optimization problem is combinatorial in nature and difficult to solve. Using Markov approximation framework, we design a decentralized algorithm that provably converges to a bounded neighborhood of the optimal solution. An agent ranking scheme is also proposed to properly initialize our algorithm so as to improve its convergence. The results from a prototype system implementation show that our design in a set of Internet-scale scenarios reduces the operational cost by 77% as compared to a commonly-adopted alternative, while simultaneously yielding lower conferencing delays.","PeriodicalId":129182,"journal":{"name":"2015 IEEE 35th International Conference on Distributed Computing Systems","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124546007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Point-to-Point Traffic Volume Measurement through Variable-Length Bit Array Masking in Vehicular Cyber-Physical Systems 车载信息物理系统中可变长度位阵列掩蔽的点对点流量测量
2015 IEEE 35th International Conference on Distributed Computing Systems Pub Date : 2015-07-23 DOI: 10.1109/ICDCS.2015.14
Yian Zhou, Shigang Chen, Zhen Mo, Qingjun Xiao
{"title":"Point-to-Point Traffic Volume Measurement through Variable-Length Bit Array Masking in Vehicular Cyber-Physical Systems","authors":"Yian Zhou, Shigang Chen, Zhen Mo, Qingjun Xiao","doi":"10.1109/ICDCS.2015.14","DOIUrl":"https://doi.org/10.1109/ICDCS.2015.14","url":null,"abstract":"In this paper, we consider an important problem of privacy-preserving point-to-point traffic volume measurement in vehicular cyber physical systems (VCPS), whose focus is utilizing VCPS to enable automatic traffic data collection, and measuring point-to-point traffic volume while preserving the location privacy of all participating vehicles. The novel scheme that we propose tackles the efficiency, privacy, and accuracy problems encountered by previous solutions. Its applicability is demonstrated through both mathematical and numerical analysis. The simulation results also show its superior performance.","PeriodicalId":129182,"journal":{"name":"2015 IEEE 35th International Conference on Distributed Computing Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131169646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Rain Bar: Robust Application-Driven Visual Communication Using Color Barcodes 雨吧:使用彩色条形码的健壮的应用驱动的视觉交流
2015 IEEE 35th International Conference on Distributed Computing Systems Pub Date : 2015-07-23 DOI: 10.1109/ICDCS.2015.61
Qian Wang, Man Zhou, K. Ren, Tao Lei, Jikun Li, Zhibo Wang
{"title":"Rain Bar: Robust Application-Driven Visual Communication Using Color Barcodes","authors":"Qian Wang, Man Zhou, K. Ren, Tao Lei, Jikun Li, Zhibo Wang","doi":"10.1109/ICDCS.2015.61","DOIUrl":"https://doi.org/10.1109/ICDCS.2015.61","url":null,"abstract":"Color barcode-based visible light communication (VLC) over screen-camera links has attracted great research interest in recent years due to its many desirable properties, including free of charge, free of interference, free of complex network configuration and well-controlled communication security. To achieve high-throughput barcode streaming, previous systems separately address design challenges such as image blur, imperfect frame synchronization and error correction etc., without being investigated as an interrelated whole. This does not fully exploit the capacity of color barcode streaming, and these solutions all have their own limitations from a practical perspective. This paper proposes RainBar, a new and improved color barcode-based visual communication system, which features a carefully-designed high-capacity barcode layout design to allow flexible frame synchronization and accurate code extraction. A progressive code locator detection and localization scheme and a robust color recognition scheme are proposed to enhance system robustness and hence the decoding rate under various working conditions. An extensive experimental study is presented to demonstrate the effectiveness and flexibility of RainBar. Results on Android smartphones show that our system achieves higher average throughput than previous systems, under various working environments.","PeriodicalId":129182,"journal":{"name":"2015 IEEE 35th International Conference on Distributed Computing Systems","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115895921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
Phase Detection with Hidden Markov Models for DVFS on Many-Core Processors 基于隐马尔可夫模型的多核DVFS相位检测
2015 IEEE 35th International Conference on Distributed Computing Systems Pub Date : 2015-07-23 DOI: 10.1109/ICDCS.2015.27
J. Booth, Jagadish B. Kotra, Hui Zhao, M. Kandemir, P. Raghavan
{"title":"Phase Detection with Hidden Markov Models for DVFS on Many-Core Processors","authors":"J. Booth, Jagadish B. Kotra, Hui Zhao, M. Kandemir, P. Raghavan","doi":"10.1109/ICDCS.2015.27","DOIUrl":"https://doi.org/10.1109/ICDCS.2015.27","url":null,"abstract":"The energy concerns of many-core processors are increasing with the number of cores. We provide a new method that reduces energy consumption of an application on many-core processors by identifying unique segments to apply dynamic voltage and frequency scaling (DVFS). Our method, phase-based voltage and frequency scaling (PVFS), hinges on the identification of phases, i.e., Segments of code with unique performance and power attributes, using hidden Markov Models. In particular, we demonstrate the use of this method to target hardware components on many-core processors such as Network-on-Chip (NoC). PVFS uses these phases to construct a static power schedule that uses DVFS to reduce energy with minimal performance penalty. This general scheme can be used with a variety of performance and power metrics to match the needs of the system and application. More importantly, the flexibility in the general scheme allows for targeting of the unique hardware components of future many-core processors. We provide an in-depth analysis of PVFS applied to five threaded benchmark applications, and demonstrate the advantage of using PVFS for 4 to 32 cores in a single socket. Empirical results of PVFS show a reduction of up to 10.1% of total energy while only impacting total time by at most 2.7% across all core counts. Furthermore, PVFS outperforms standard coarse-grain time-driven DVFS, while scaling better in terms of energy savings with increasing core counts.","PeriodicalId":129182,"journal":{"name":"2015 IEEE 35th International Conference on Distributed Computing Systems","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121828649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Urban Traffic Monitoring with the Help of Bus Riders 公交乘客帮助下的城市交通监测
2015 IEEE 35th International Conference on Distributed Computing Systems Pub Date : 2015-07-23 DOI: 10.1109/ICDCS.2015.11
Pengfei Zhou, Shiqi Jiang, Mo Li
{"title":"Urban Traffic Monitoring with the Help of Bus Riders","authors":"Pengfei Zhou, Shiqi Jiang, Mo Li","doi":"10.1109/ICDCS.2015.11","DOIUrl":"https://doi.org/10.1109/ICDCS.2015.11","url":null,"abstract":"Real-time urban traffic conditions are critical to wide populations in the city and serve the needs of many transportation dependent applications. This paper presents our experience of building a participatory urban traffic monitoring system that exploits the power of bus riders' mobile phones. The system takes lightweight sensor hints and collects minimum set of cellular data from the bus riders' mobile phones. Based on such a participatory sensing framework, the system turns buses into dummy probes, monitors their travel statuses, and derives the instant traffic map of the city. Unlike previous works that rely on intrusive detection or full cooperation from \"probe vehicles\", our approach resorts to the crowd-participation of ordinary bus riders, who are the information source providers and major consumers of the final traffic output. The experiment results demonstrate the feasibility of such an approach achieving fine-grained traffic estimation with modest sensing and computation overhead at the crowd.","PeriodicalId":129182,"journal":{"name":"2015 IEEE 35th International Conference on Distributed Computing Systems","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116615660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
On Multipath Link Characterization and Adaptation for Device-Free Human Detection 无设备人体检测的多路径链路表征与自适应研究
2015 IEEE 35th International Conference on Distributed Computing Systems Pub Date : 2015-07-23 DOI: 10.1109/ICDCS.2015.47
Zimu Zhou, Zheng Yang, Chenshu Wu, Yunhao Liu, L. Ni
{"title":"On Multipath Link Characterization and Adaptation for Device-Free Human Detection","authors":"Zimu Zhou, Zheng Yang, Chenshu Wu, Yunhao Liu, L. Ni","doi":"10.1109/ICDCS.2015.47","DOIUrl":"https://doi.org/10.1109/ICDCS.2015.47","url":null,"abstract":"Wireless-based device-free human sensing has raised increasing research interest and stimulated a range of novel location-based services and human-computer interaction applications for recreation, asset security and elderly care. A primary functionality of these applications is to first detect the presence of humans before extracting higher-level contexts such as physical coordinates, body gestures, or even daily activities. In the presence of dense multipath propagation, however, it is non-trivial to even reliably identify the presence of humans. The multipath effect can invalidate simplified propagation models and distort received signal signatures, thus deteriorating detection rates and shrinking detection range. In this paper, we characterize the impact of human presence on wireless signals via ray-bouncing models, and propose a measurable metric on commodity WiFi infrastructure as a proxy for detection sensitivity. To achieve higher detection rate and wider sensing coverage in multipath-dense indoor scenarios, we design a lightweight sub carrier and path configuration scheme harnessing frequency diversity and spatial diversity. We prototype our scheme with standard WiFi devices. Evaluations conducted in two typical office environments demonstrate a detection rate of 92.0% with a false positive of 4.5%, and almost 1x gain in detection range given a minimal detection rate of 90%.","PeriodicalId":129182,"journal":{"name":"2015 IEEE 35th International Conference on Distributed Computing Systems","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117153198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Experimental Study for Multi-layer Parameter Configuration of WSN Links WSN链路多层参数配置的实验研究
2015 IEEE 35th International Conference on Distributed Computing Systems Pub Date : 2015-07-23 DOI: 10.1109/ICDCS.2015.45
Songwei Fu, Yan Zhang, Yuming Jiang, Chengchen Hu, Chia-Yen Shih, P. Marrón
{"title":"Experimental Study for Multi-layer Parameter Configuration of WSN Links","authors":"Songwei Fu, Yan Zhang, Yuming Jiang, Chengchen Hu, Chia-Yen Shih, P. Marrón","doi":"10.1109/ICDCS.2015.45","DOIUrl":"https://doi.org/10.1109/ICDCS.2015.45","url":null,"abstract":"Many applications of wireless sensor networks (WSNs) need to balance multiple yet often conflicting performance requirements such as high energy efficiency, high throughput, low delay and low loss. Finding appropriate WSN parameter configuration to achieve the best trade-off requires in depth understanding of the joint effect of key parameters residing at different layers on the performance. In this paper, we present an extensive experimental study on the data delivery performance of aWSN link, where 4 major performance metrics, namely energy, throughput, delay and loss, were measured over 6 months under around 50 thousand parameter configurations of 7 key stack parameters. Different from existing work, rich observations are made out of the extensive measurement data, with the focus on the joint effect of these parameters on the performance. Specifically, for each of the four performance metrics, a set of guidelines is derived for parameter optimization. In addition, we propose empirical models for each performance metric to quantify the joint effects, which enable finding optimal settings for parameters such as payload size or retransmissions, in consideration of link quality and other parameter settings, to achieve better performance trade-offs. To demonstrate the potential of this work, the obtained joint parameter optimization results are applied to an example. The outcome is compared with those achieved by following representative single-parameter tuning guidelines from the literature. The comparison reveals that by considering the joint effect of multi-layer parameters together, a WSN application can obtain a much improved performance trade-off.","PeriodicalId":129182,"journal":{"name":"2015 IEEE 35th International Conference on Distributed Computing Systems","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125779480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Foreseer: Workload-Aware Data Storage for MapReduce Foreseer:面向MapReduce的工作负载感知数据存储
2015 IEEE 35th International Conference on Distributed Computing Systems Pub Date : 2015-07-23 DOI: 10.1109/ICDCS.2015.89
Jia Zou, Juwei Shi, Tongping Liu, Zhao Cao, Chen Wang
{"title":"Foreseer: Workload-Aware Data Storage for MapReduce","authors":"Jia Zou, Juwei Shi, Tongping Liu, Zhao Cao, Chen Wang","doi":"10.1109/ICDCS.2015.89","DOIUrl":"https://doi.org/10.1109/ICDCS.2015.89","url":null,"abstract":"Inter-job Write once read many (WORM) scenario is ubiquitous in MapReduce applications that are widely deployed on enterprise production systems. However, traditional MapReduce auto-tuning techniques can not address the inter-job WORM scenario. To address the shortcomings in existing works, this work presents a novel online cross-layer solution, FORESEER. It can automatically predict workloads' data access information and tune data placement parameters to optimize the over-all performance for an inter-job WORM scenario. In our experiments, we observe that FORESEER can achieve significant performance speedup (up to 37%) compared with previous work.","PeriodicalId":129182,"journal":{"name":"2015 IEEE 35th International Conference on Distributed Computing Systems","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127470973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Shuttle: Intrusion Recovery for PaaS 穿梭:PaaS的入侵恢复
2015 IEEE 35th International Conference on Distributed Computing Systems Pub Date : 2015-07-23 DOI: 10.1109/ICDCS.2015.72
Dario Nascimento, M. Correia
{"title":"Shuttle: Intrusion Recovery for PaaS","authors":"Dario Nascimento, M. Correia","doi":"10.1109/ICDCS.2015.72","DOIUrl":"https://doi.org/10.1109/ICDCS.2015.72","url":null,"abstract":"The number of applications being deployed using the Platform as a Service (PaaS) cloud computing model is increasing. Despite the security controls implemented by cloud service providers, we expect intrusions to strike such applications. We present Shuttle, a novel intrusion recovery service. Shuttle recovers from intrusions in applications deployed in PaaS platforms. Our approach allows undoing changes to the state of PaaS applications due to intrusions, without loosing the effect of legitimate operations performed after the intrusions take place. We combine a record-and-replay approach with the elasticity provided by cloud offerings to recover applications deployed on various instances and backed by distributed databases. The service loads a database snapshot taken before the intrusion and replays subsequent requests, as much in parallel as possible, while continuing to execute incoming requests. We present an experimental evaluation of Shuttle on Amazon Web Services. We show Shuttle can replay 1 million requests in 10 minutes and that it can duplicate the number of requests replayed per second by increasing the number of application servers from 1 to 3.","PeriodicalId":129182,"journal":{"name":"2015 IEEE 35th International Conference on Distributed Computing Systems","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121369912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信