Proceedings of the Twentieth ACM International Symposium on Mobile Ad Hoc Networking and Computing最新文献

筛选
英文 中文
A Probabilistic Approach for Demand-Aware Ride-Sharing Optimization 需求感知型拼车优化的概率方法
Qiulin Lin, Wenjie Xu, Minghua Chen, Xiaojun Lin
{"title":"A Probabilistic Approach for Demand-Aware Ride-Sharing Optimization","authors":"Qiulin Lin, Wenjie Xu, Minghua Chen, Xiaojun Lin","doi":"10.1145/3323679.3326512","DOIUrl":"https://doi.org/10.1145/3323679.3326512","url":null,"abstract":"Ride-sharing is a modern urban-mobility paradigm with tremendous potential in reducing congestion and pollution. Demand-aware design is a promising avenue for addressing a critical challenge in ridesharing systems, namely joint optimization of request-vehicle assignment and routing for a fleet of vehicles. In this paper, we develop a probabilistic demand-aware framework to tackle the challenge. We focus on maximizing the expected number of passenger pickups, given the probability distributions of future demands. The key idea of our approach is to assign requests to vehicles in a probabilistic manner. It differentiates our work from existing ones and allows us to explore a richer design space to tackle the request-vehicle assignment puzzle with a performance guarantee but still keeping the final solution practically implementable. The optimization problem is non-convex, combinatorial, and NP-hard in nature. As a key contribution, we explore the problem structure and propose an elegant approximation of the objective function to develop a dual-subgradient heuristic. We characterize a condition under which the heuristic generates a (1 -- 1/e) approximation solution. Our solution is simple and scalable, amendable for practical implementation. Results of numerical experiments based on real-world traces in Manhattan show that, as compared to a conventional demand-oblivious scheme, our demand-aware solution improves the passenger pickups by up to 46%. The results also show that joint optimization at the fleet level leads to 19% more pickups than that by separate optimizations at individual vehicles.","PeriodicalId":205641,"journal":{"name":"Proceedings of the Twentieth ACM International Symposium on Mobile Ad Hoc Networking and Computing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129178284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Quantized VCG Mechanisms for Polymatroid Environments 多边形环境的量化VCG机制
Hao Ge, R. Berry
{"title":"Quantized VCG Mechanisms for Polymatroid Environments","authors":"Hao Ge, R. Berry","doi":"10.1145/3323679.3326524","DOIUrl":"https://doi.org/10.1145/3323679.3326524","url":null,"abstract":"Many network resource allocation problems can be viewed as allocating a divisible resource, where the allocations are constrained to lie in a polymatroid. We consider market-based mechanisms for such problems. Though the Vickrey-Clarke-Groves (VCG) mechanism can provide the efficient allocation with strong incentive properties (namely dominant strategy incentive compatibility), its well-known high communication requirements can prevent it from being used. There have been a number of approaches for reducing the communication costs of VCG by weakening its incentive properties. Here, instead we take a different approach of reducing communication costs via quantization while maintaining VCG's dominant strategy incentive properties. The cost for this approach is a loss in efficiency which we characterize. We first consider quantizing the resource allocations so that agents need only submit a finite number of bids instead of full utility function. We subsequently consider quantizing the agent's bids.","PeriodicalId":205641,"journal":{"name":"Proceedings of the Twentieth ACM International Symposium on Mobile Ad Hoc Networking and Computing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114792644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Jam Sessions: Analysis and Experimental Evaluation of Advanced Jamming Attacks in MIMO Networks 干扰环节:MIMO网络中高级干扰攻击的分析与实验评估
Liyang Zhang, Francesco Restuccia, T. Melodia, Scott M. Pudlewski
{"title":"Jam Sessions: Analysis and Experimental Evaluation of Advanced Jamming Attacks in MIMO Networks","authors":"Liyang Zhang, Francesco Restuccia, T. Melodia, Scott M. Pudlewski","doi":"10.1145/3323679.3326504","DOIUrl":"https://doi.org/10.1145/3323679.3326504","url":null,"abstract":"Recent research advances in wireless security have shown that advanced jamming can significantly decrease the performance of wireless communications. In advanced jamming, the adversary intentionally concentrates the available energy budget on specific critical components (e.g., pilot symbols, acknowledgement packets, etc.) to (i) increase the jamming effectiveness, as more targets can be jammed with the same energy budget; and (ii) decrease the likelihood of being detected, as the channel is jammed for a shorter period of time. These key aspects make advanced jamming very stealthy yet exceptionally effective in practical scenarios. One of the fundamental challenges in designing defense mechanisms against an advanced jammer is understanding which jamming strategies yields the lowest throughput, for a given channel condition and a given amount of energy. To the best of our knowledge, this problem still remains unsolved, as an analytic model to quantitatively compare advanced jamming schemes is still missing in existing literature. To fill this gap, in this paper we conduct a comparative analysis of several most viable advanced jamming schemes in the widely-used MIMO networks. We first mathematically model a number of advanced jamming schemes at the signal processing level, so that a quantitative relationship between the jamming energy and the jamming effect is established. Based on the model, theorems are derived on the optimal advanced jamming scheme for an arbitrary channel condition. The theoretical findings are validated through extensive simulations and experiments on a 5-radio 2x2 MIMO testbed. Our results show that the theorems are able to predict jamming efficiency with high accuracy. Moreover, to further demonstrate that the theoretical findings are applicable to address crucial real-world jamming problems, we show that the theorems can be incorporated to state-of-art reinforcement-learning based jamming algorithms and boost the action exploration phase so that a faster convergence is achieved.","PeriodicalId":205641,"journal":{"name":"Proceedings of the Twentieth ACM International Symposium on Mobile Ad Hoc Networking and Computing","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114669149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
DeepRadioID: Real-Time Channel-Resilient Optimization of Deep Learning-based Radio Fingerprinting Algorithms DeepRadioID:基于深度学习的无线电指纹识别算法的实时信道弹性优化
Francesco Restuccia, Salvatore D’oro, Amani Al-Shawabka, M. Belgiovine, Luca Angioloni, Stratis Ioannidis, K. Chowdhury, T. Melodia
{"title":"DeepRadioID: Real-Time Channel-Resilient Optimization of Deep Learning-based Radio Fingerprinting Algorithms","authors":"Francesco Restuccia, Salvatore D’oro, Amani Al-Shawabka, M. Belgiovine, Luca Angioloni, Stratis Ioannidis, K. Chowdhury, T. Melodia","doi":"10.1145/3323679.3326503","DOIUrl":"https://doi.org/10.1145/3323679.3326503","url":null,"abstract":"Radio fingerprinting provides a reliable and energy-efficient IoT authentication strategy by leveraging the unique hardware-level imperfections imposed on the received wireless signal by the transmitter's radio circuitry. Most of existing approaches utilize hand-tailored protocol-specific feature extraction techniques, which can identify devices operating under a pre-defined wireless protocol only. Conversely, by mapping inputs onto a very large feature space, deep learning algorithms can be trained to fingerprint large populations of devices operating under any wireless standard. One of the most crucial challenges in radio fingerprinting is to counteract the action of the wireless channel, which decreases fingerprinting accuracy significantly by disrupting hardware impairments. On the other hand, due to their sheer size, deep learning algorithms are hardly re-trainable in real-time. Another aspect that is yet to be investigated is whether an adversary can successfully impersonate another device's fingerprint. To address these key issues, this paper proposes DeepRadioID, a system to optimize the accuracy of deep-learning-based radio fingerprinting algorithms without retraining the underlying deep learning model. The key intuition is that through the application of a carefully-optimized digital finite input response filter (FIR) at the transmitter's side, we can apply tiny modifications to the waveform to strengthen its fingerprint according to the current channel conditions. We mathematically formulate the Waveform Optimization Problem (WOP) as the problem of finding, for a given trained neural network, the optimum FIR to be used by the transmitter to improve its fingerprinting accuracy. We extensively evaluate DeepRadioID on a experimental testbed of 20 nominally-identical software-defined radios, as well as on two datasets made up by 500 ADS-B devices and by 500 WiFi devices provided by the DARPA RFMLS program. Experimental results show that DeepRadioID (i) increases fingerprinting accuracy by about 35%, 50% and 58% on the three scenarios considered; (ii) decreases an adversary's accuracy by about 54% when trying to imitate other device's fingerprints by using their filters; (iii) achieves 27% improvement over the state of the art on a 100-device dataset.","PeriodicalId":205641,"journal":{"name":"Proceedings of the Twentieth ACM International Symposium on Mobile Ad Hoc Networking and Computing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122566019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 93
Timely-Throughput Optimal Coded Computing over Cloud Networks 云网络上的实时吞吐量最优编码计算
Chien-Sheng Yang, Ramtin Pedarsani, A. Avestimehr
{"title":"Timely-Throughput Optimal Coded Computing over Cloud Networks","authors":"Chien-Sheng Yang, Ramtin Pedarsani, A. Avestimehr","doi":"10.1145/3323679.3326528","DOIUrl":"https://doi.org/10.1145/3323679.3326528","url":null,"abstract":"In modern distributed computing systems, unpredictable and unreliable infrastructures result in high variability of computing resources. Meanwhile, there is significantly increasing demand for timely and event-driven services with deadline constraints. Motivated by measurements over Amazon EC2 clusters, we consider a two-state Markov model for variability of computing speed in cloud networks. In this model, each worker can be either in a good state or a bad state in terms of the computation speed, and the transition between these states is modeled as a Markov chain which is unknown to the scheduler. We then consider a Coded Computing framework, in which the data is possibly encoded and stored at the worker nodes in order to provide robustness against nodes that may be in a bad state. With timely computation requests submitted to the system with computation deadlines, our goal is to design the optimal computation-load allocation scheme and the optimal data encoding scheme that maximize the timely computation throughput (i.e, the average number of computation tasks that are accomplished before their deadline). Our main result is the development of a dynamic computation strategy called Lagrange Estimate-and-Allocate (LEA) strategy, which achieves the optimal timely computation throughput. It is shown that compared to the static allocation strategy, LEA improves the timely computation throughput by 1.4x ~ 17.5x in various scenarios via simulations and by 1.27x ~ 6.5x in experiments over Amazon EC2 clusters.","PeriodicalId":205641,"journal":{"name":"Proceedings of the Twentieth ACM International Symposium on Mobile Ad Hoc Networking and Computing","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123962788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Economics of Age of Information Management under Network Externalities 网络外部性下的信息管理时代经济学
Shugang Hao, Lingjie Duan
{"title":"Economics of Age of Information Management under Network Externalities","authors":"Shugang Hao, Lingjie Duan","doi":"10.1145/3323679.3326511","DOIUrl":"https://doi.org/10.1145/3323679.3326511","url":null,"abstract":"Online content platforms are concerned about the freshness of their content updates to their end customers, and increasingly more platforms now invite and pay the crowd to share real-time information (e.g., news and sensor data) to help reduce their ages of information (AoI). How much crowdsourced data to sample and buy over time is a critical question for a platform's AoI management, requiring a good balance between its AoI and the incurred sampling cost. This question becomes more interesting by considering the stage after sampling, where two platforms coexist in sharing the content delivery network of limited bandwidth, and one platform's update may jam or preempt the other's under negative network externalities. When the two selfish platforms know each other's sampling costs, we formulate their interaction as a non-cooperative game and show both want to over-sample to reduce their own AoI, causing the price of anarchy (PoA) to be infinity. To remedy this huge efficiency loss, we propose a non-monetary trigger mechanism of punishment in a repeated game to enforce the platforms' cooperation to achieve the social optimum. We also study the more challenging incomplete information scenario that platform 1 knows more information about sampling cost than platform 2 by hiding its sampling cost information in the Bayesian game. Perhaps surprisingly, we show that even platform 1 may get hurt by knowing more information. We successfully redesign the trigger-and-punishment mechanism to negate platform 1's information advantage and ensure no cheating. As compared to the social optimum, extensive simulations show that the mechanisms can remedy the huge efficiency loss due to platform competition in different information scenarios.","PeriodicalId":205641,"journal":{"name":"Proceedings of the Twentieth ACM International Symposium on Mobile Ad Hoc Networking and Computing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126965812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Transient Dynamics of Epidemic Spreading and Its Mitigation on Large Networks 大网络上流行病传播的暂态动力学及其缓解
Chul-Ho Lee, Srinivasarao Tenneti, Do Young Eun
{"title":"Transient Dynamics of Epidemic Spreading and Its Mitigation on Large Networks","authors":"Chul-Ho Lee, Srinivasarao Tenneti, Do Young Eun","doi":"10.1145/3323679.3326517","DOIUrl":"https://doi.org/10.1145/3323679.3326517","url":null,"abstract":"In this paper, we aim to understand the transient dynamics of a susceptible-infected (SI) epidemic spreading process on a large network. The SI model has been largely overlooked in the literature, while it is naturally a better fit for modeling the malware propagation in early times when patches/vaccines are not available, or over a wider range of timescales when massive patching is practically infeasible. Nonetheless, its analysis is simply non-trivial, as its important dynamics are all transient and the usual stability/steady-state analysis no longer applies. To this end, we develop a theoretical framework that allows us to obtain an accurate closed-form approximate solution to the original SI dynamics on any arbitrary network, which captures the temporal dynamics over all time and is tighter than the existing approximation, and also to provide a new interpretation via reliability theory. As its applications, we further develop vaccination policies with or without knowledge of already-infected nodes, to mitigate the future epidemic spreading to the extent possible, and demonstrate their effectiveness through numerical simulations.","PeriodicalId":205641,"journal":{"name":"Proceedings of the Twentieth ACM International Symposium on Mobile Ad Hoc Networking and Computing","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117081685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Competition with Three-Tier Spectrum Access and Spectrum Monitoring 与三层频谱接入和频谱监控的竞争
A. Ghosh, R. Berry
{"title":"Competition with Three-Tier Spectrum Access and Spectrum Monitoring","authors":"A. Ghosh, R. Berry","doi":"10.1145/3323679.3326522","DOIUrl":"https://doi.org/10.1145/3323679.3326522","url":null,"abstract":"The Citizens Broadband Radio Service (CBRS) recently adopted in the U.S. enables two tiers of commercial users to share spectrum with a third tier of incumbent users. This sharing can be further assisted by Environmental Sensing Capability operators (ESCs), that monitor the spectrum occupancy to determine when use of the spectrum will not harm incumbents. Two key aspects of this framework that impact how firms may compete are the differences in information provided by different ESCs and the different tiers in which a firm may access the spectrum. We develop a game theoretic model that captures both of these features and analyze it to gain insight into their impact. Specifically, we consider a priority access (PA) tier firm has access to the both a licensed band and an unlicensed band, and a general authorized access (GAA) tier firm has access only to the unlicensed band. The PA tier and GAA tier firms compete for users. Our analysis reveals that the amount of unlicensed and licensed bandwidth must be chosen judiciously in order to maximize the social welfare. We also show that a limited amount of unlicensed access by the PA tier firm is beneficial to the user's surplus as well as to the social welfare.","PeriodicalId":205641,"journal":{"name":"Proceedings of the Twentieth ACM International Symposium on Mobile Ad Hoc Networking and Computing","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123451859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
QFlow: A Reinforcement Learning Approach to High QoE Video Streaming over Wireless Networks QFlow:无线网络上高QoE视频流的强化学习方法
Rajarshi Bhattacharyya, Archana Bura, Desik Rengarajan, Mason Rumuly, S. Shakkottai, D. Kalathil, Ricky K. P. Mok, A. Dhamdhere
{"title":"QFlow: A Reinforcement Learning Approach to High QoE Video Streaming over Wireless Networks","authors":"Rajarshi Bhattacharyya, Archana Bura, Desik Rengarajan, Mason Rumuly, S. Shakkottai, D. Kalathil, Ricky K. P. Mok, A. Dhamdhere","doi":"10.1145/3323679.3326523","DOIUrl":"https://doi.org/10.1145/3323679.3326523","url":null,"abstract":"Wireless Internet access has brought legions of heterogeneous applications all sharing the same resources. However, current wireless edge networks that cater to worst or average case performance lack the agility to best serve these diverse sessions. Simultaneously, software reconfigurable infrastructure has become increasingly mainstream to the point that dynamic per packet and per flow decisions are possible at multiple layers of the communications stack. Exploiting such reconfigurability requires the design of a system that can enable a configuration, measure the impact on the application performance (Quality of Experience), and adaptively select a new configuration. Effectively, this feedback loop is a Markov Decision Process whose parameters are unknown. The goal of this work is to design, develop and demonstrate QFlow that instantiates this feedback loop as an application of reinforcement learning (RL). Our context is that of reconfigurable (priority) queueing, and we use the popular application of video streaming as our use case. We develop both model-free and model-based RL approaches that are tailored to the problem of determining which clients should be assigned to which queue at each decision period. Through experimental validation, we show how the RL-based control policies on QFlow are able to schedule the right clients for prioritization in a high-load scenario to outperform the status quo, as well as the best known solutions with over 25% improvement in QoE, and a perfect QoE score of 5 over 85% of the time.","PeriodicalId":205641,"journal":{"name":"Proceedings of the Twentieth ACM International Symposium on Mobile Ad Hoc Networking and Computing","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132224515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Age-optimal Sampling and Transmission Scheduling in Multi-Source Systems 多源系统中年龄最优采样与传输调度
A. Bedewy, Yin Sun, S. Kompella, N. Shroff
{"title":"Age-optimal Sampling and Transmission Scheduling in Multi-Source Systems","authors":"A. Bedewy, Yin Sun, S. Kompella, N. Shroff","doi":"10.1145/3323679.3326510","DOIUrl":"https://doi.org/10.1145/3323679.3326510","url":null,"abstract":"In this paper, we consider the problem of minimizing the age of information in a multi-source system, where samples are taken from multiple sources and sent to a destination via a channel with random delay. Due to interference, only one source can be scheduled at a time. We consider the problem of finding a decision policy that determines the sampling times and transmission order of the sources for minimizing the total average peak age (TaPA) and the total average age (TaA) of the sources. Our investigation of this problem results in an important separation principle: The optimal scheduling strategy and the optimal sampling strategy are independent of each other. In particular, we prove that, for any given sampling strategy, the Maximum Age First (MAF) scheduling strategy provides the best age performance among all scheduling strategies. This transforms our overall optimization problem into an optimal sampling problem, given that the decision policy follows the MAF scheduling strategy. While the zero-wait sampling strategy (in which a sample is generated once the channel becomes idle) is shown to be optimal for minimizing the TaPA, it does not always minimize the TaA. We use Dynamic Programming (DP) to investigate the optimal sampling problem for minimizing the TaA. Finally, we provide an approximate analysis of Bellman's equation to approximate the TaA-optimal sampling strategy by a water-filling solution which is shown to be very close to optimal through numerical evaluations.","PeriodicalId":205641,"journal":{"name":"Proceedings of the Twentieth ACM International Symposium on Mobile Ad Hoc Networking and Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125813432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 63
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信