Software Quality Journal最新文献

筛选
英文 中文
ASDMG: business topic clustering-based architecture smell detection for microservice granularity ASDMG:基于业务主题聚类的微服务粒度架构气味检测
IF 1.9 3区 计算机科学
Software Quality Journal Pub Date : 2024-07-08 DOI: 10.1007/s11219-024-09681-5
Sixuan Wang, Baoqing Jin, Dongjin Yu, Shuhan Cheng
{"title":"ASDMG: business topic clustering-based architecture smell detection for microservice granularity","authors":"Sixuan Wang, Baoqing Jin, Dongjin Yu, Shuhan Cheng","doi":"10.1007/s11219-024-09681-5","DOIUrl":"https://doi.org/10.1007/s11219-024-09681-5","url":null,"abstract":"<p>Microservices architecture smells can significantly affect the quality of microservices due to poor design decisions, especially the granularity smells of microservice architectures will greatly affect the quality of a microservices architecture. The state-of-the-art methods of microservice architectural granularity detection primarily focus on the service level, which lacks consideration of detailed information such as interfaces, and these methods also lack considerations about semantic information related to business logic, leading to lower accuracy in the detection results. To address these issues, we introduce ASDMG, which takes semantic information within the Abstract Syntax Tree (AST) into consideration, integrating them with data dependency to extract business topic relationships of functions. It performs interface-oriented business topic clustering, allowing comprehensive detection of granularity smells both within individual microservices as well as the overall microservice architecture. Experiments were conducted using 5 open-source microservice systems in different scales and domains. Results show that ASDMG achieves an average precision of 83.41%, an average recall of 95.84%, and an average accuracy of 95.85% in detecting architectural granularity smells. Compared to state-of-the-art methods, it achieves better detection results and can improve the quality of microservice architecture.</p>","PeriodicalId":21827,"journal":{"name":"Software Quality Journal","volume":"8 1","pages":""},"PeriodicalIF":1.9,"publicationDate":"2024-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141569078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Periodic and random incremental backup policies in reliability theory 可靠性理论中的周期和随机增量备份策略
IF 1.9 3区 计算机科学
Software Quality Journal Pub Date : 2024-07-05 DOI: 10.1007/s11219-024-09685-1
Xufeng Zhao, Yilei Bu, Wendi Pang, Jiajia Cai
{"title":"Periodic and random incremental backup policies in reliability theory","authors":"Xufeng Zhao, Yilei Bu, Wendi Pang, Jiajia Cai","doi":"10.1007/s11219-024-09685-1","DOIUrl":"https://doi.org/10.1007/s11219-024-09685-1","url":null,"abstract":"<p>For a 24/7 database system, backups should be implemented right after a large volume of data has been updated, putting their backup windows in non-busy states with user’s convenience.From this viewpoint, this paper studies periodic and random incremental backup policies, in which, incremental backup is implemented right after data update and full backup is performed at periodic times <span>(varvec{KT})</span>, or at a number <span>(varvec{N})</span> of data updates, respectively. We firstly describe the stochastic processes of data update and database failure, and then model the expected cost rates for data backup and data restoration.Respective <span>(varvec{K^*, N^*, K_f^*})</span>, and <span>(varvec{N_f^*})</span> are obtained to minimize their expected cost rates in analytical ways, respectively. Finally, numerical examples are given to illustrate the optimum policies.</p>","PeriodicalId":21827,"journal":{"name":"Software Quality Journal","volume":"85 1","pages":""},"PeriodicalIF":1.9,"publicationDate":"2024-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141546997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integrated multi-view modeling for reliable machine learning-intensive software engineering 为可靠的机器学习密集型软件工程建立综合多视角模型
IF 1.9 3区 计算机科学
Software Quality Journal Pub Date : 2024-07-03 DOI: 10.1007/s11219-024-09687-z
Jati H. Husen, Hironori Washizaki, Jomphon Runpakprakun, Nobukazu Yoshioka, Hnin Thandar Tun, Yoshiaki Fukazawa, Hironori Takeuchi
{"title":"Integrated multi-view modeling for reliable machine learning-intensive software engineering","authors":"Jati H. Husen, Hironori Washizaki, Jomphon Runpakprakun, Nobukazu Yoshioka, Hnin Thandar Tun, Yoshiaki Fukazawa, Hironori Takeuchi","doi":"10.1007/s11219-024-09687-z","DOIUrl":"https://doi.org/10.1007/s11219-024-09687-z","url":null,"abstract":"<p>Development of machine learning (ML) systems differs from traditional approaches. The probabilistic nature of ML leads to a more experimentative development approach, which often results in a disparity between the quality of ML models with other aspects such as business, safety, and the overall system architecture. Herein the Multi-view Modeling Framework for ML Systems (M<sup>3</sup>S) is proposed as a solution to this problem. M<sup>3</sup>S provides an analysis framework that integrates different views. It is supported by an integrated metamodel to ensure the connection and consistency between different models. To facilitate the experimentative nature of ML training, M<sup>3</sup>S provides an integrated platform between the modeling environment and the ML training pipeline. M<sup>3</sup>S is validated through a case study and a controlled experiment. M<sup>3</sup>S shows promise, but future research needs to confirm its generality.</p>","PeriodicalId":21827,"journal":{"name":"Software Quality Journal","volume":"20 1","pages":""},"PeriodicalIF":1.9,"publicationDate":"2024-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141523169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comparative study of software defect binomial classification prediction models based on machine learning 基于机器学习的软件缺陷二项式分类预测模型比较研究
IF 1.9 3区 计算机科学
Software Quality Journal Pub Date : 2024-07-03 DOI: 10.1007/s11219-024-09683-3
Hongwei Tao, Xiaoxu Niu, Lang Xu, Lianyou Fu, Qiaoling Cao, Haoran Chen, Songtao Shang, Yang Xian
{"title":"A comparative study of software defect binomial classification prediction models based on machine learning","authors":"Hongwei Tao, Xiaoxu Niu, Lang Xu, Lianyou Fu, Qiaoling Cao, Haoran Chen, Songtao Shang, Yang Xian","doi":"10.1007/s11219-024-09683-3","DOIUrl":"https://doi.org/10.1007/s11219-024-09683-3","url":null,"abstract":"<p>As information technology continues to advance, software applications are becoming increasingly critical. However, the growing size and complexity of software development can lead to serious flaws resulting in significant financial losses. To address this issue, Software Defect Prediction (SDP) technology is being developed to detect and resolve defects early in the software development process, ensuring high software quality. As a result, SDP research has become a major focus for academics worldwide. This study aims to compare various machine learning-based SDP algorithm models and determine if traditional machine learning algorithms affect SDP outcomes. Unlike previous studies that aimed to identify the best prediction model for all datasets, this paper constructs SDP superiority models separately for different datasets. Using the publicly available ESEM2016 dataset, 13 machine learning classification algorithms are employed to predict software defects. Evaluation indicators such as Accuracy, AUC(Area Under the Curve), F-measure, and Running Time(RT) are utilized to assess the performance of the classification algorithms. Due to the serious class imbalance problem in this dataset, 10 sampling methods are combined with the 13 machine learning algorithms to explore the effect of sampling techniques on the performance of traditional machine learning classification models. Finally, a comprehensive evaluation is conducted to identify the best combination of sampling techniques and classification models to construct the final dominant model for SDP.</p>","PeriodicalId":21827,"journal":{"name":"Software Quality Journal","volume":"189 1","pages":""},"PeriodicalIF":1.9,"publicationDate":"2024-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141523168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring behaviours of RESTful APIs in an industrial setting 在工业环境中探索 RESTful API 的行为
IF 1.9 3区 计算机科学
Software Quality Journal Pub Date : 2024-07-03 DOI: 10.1007/s11219-024-09686-0
Stefan Karlsson, Robbert Jongeling, Adnan Čaušević, Daniel Sundmark
{"title":"Exploring behaviours of RESTful APIs in an industrial setting","authors":"Stefan Karlsson, Robbert Jongeling, Adnan Čaušević, Daniel Sundmark","doi":"10.1007/s11219-024-09686-0","DOIUrl":"https://doi.org/10.1007/s11219-024-09686-0","url":null,"abstract":"<p>A common way of exposing functionality in contemporary systems is by providing a Web-API based on the REST API architectural guidelines. To describe REST APIs, the industry standard is currently OpenAPI-specifications. Test generation and fuzzing methods targeting OpenAPI-described REST APIs have been a very active research area in recent years. An open research challenge is to aid users in better understanding their API, in addition to finding faults and to cover all the code. In this paper, we address this challenge by proposing a set of behavioural properties, common to REST APIs, which are used to generate examples of behaviours that these APIs exhibit. These examples can be used both (i) to further the understanding of the API and (ii) as a source of automatic test cases. Our evaluation shows that our approach can generate examples deemed <i>relevant</i> for understanding the system and for a source of test generation by practitioners. In addition, we show that basing test generation on behavioural properties provides tests that are less dependent on the state of the system, while at the same time yielding a similar code coverage as state-of-the-art methods in REST API fuzzing in a given time limit.</p>","PeriodicalId":21827,"journal":{"name":"Software Quality Journal","volume":"33 1","pages":""},"PeriodicalIF":1.9,"publicationDate":"2024-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141546998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancement and formal verification of the ICC mechanism with a sandbox approach in android system 在安卓系统中采用沙盒方法增强和正式验证 ICC 机制
IF 1.9 3区 计算机科学
Software Quality Journal Pub Date : 2024-06-27 DOI: 10.1007/s11219-024-09684-2
Jiaqi Yin, Sini Chen, Yixiao Lv, Huibiao Zhu
{"title":"Enhancement and formal verification of the ICC mechanism with a sandbox approach in android system","authors":"Jiaqi Yin, Sini Chen, Yixiao Lv, Huibiao Zhu","doi":"10.1007/s11219-024-09684-2","DOIUrl":"https://doi.org/10.1007/s11219-024-09684-2","url":null,"abstract":"<p>Inter-Component Communication (ICC) plays a crucial role in facilitating information exchange and functionality integration within the complex ecosystem of Android systems. However, the security and safety implications arising from ICC interactions pose significant challenges. This paper is an extended work building upon our previously published research that focuses on the verification of safety properties in the ICC mechanism. We address the previously observed issues of data leakage and privilege escalation by incorporating a sandbox mechanism and permission control. The sandbox mechanism provides an isolated and controlled environment in which ICC components can operate while permission control mechanisms are introduced to enforce fine-grained access controls, ensuring that only authorized entities have access to sensitive resources. We further leverage formal methods, specifically communicating sequential processes (CSP), to verify several properties of the enhanced ICC mechanism. By employing CSP, we aim to systematically model and analyze the flow of information, the behavior of components, and the potential vulnerabilities associated with the enhanced ICC mechanism. The verification results highlight the effectiveness of our approach in enhancing the security and reliability of ICC mechanisms, ultimately contributing to the development of safer and more trustworthy Android Systems.</p>","PeriodicalId":21827,"journal":{"name":"Software Quality Journal","volume":"60 1","pages":""},"PeriodicalIF":1.9,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141529571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unraveling the code: an in-depth empirical study on the impact of development practices in auxiliary functions implementation 解读代码:关于辅助功能实施过程中开发实践影响的深入实证研究
IF 1.9 3区 计算机科学
Software Quality Journal Pub Date : 2024-06-25 DOI: 10.1007/s11219-024-09682-4
Otávio Lemos, Fábio Silveira, Fabiano Ferrari, Tiago Silva, Eduardo Guerra, Alessandro Garcia
{"title":"Unraveling the code: an in-depth empirical study on the impact of development practices in auxiliary functions implementation","authors":"Otávio Lemos, Fábio Silveira, Fabiano Ferrari, Tiago Silva, Eduardo Guerra, Alessandro Garcia","doi":"10.1007/s11219-024-09682-4","DOIUrl":"https://doi.org/10.1007/s11219-024-09682-4","url":null,"abstract":"<p>Auxiliary functions in software systems, often overlooked due to their perceived simplicity, play a crucial role in overall system reliability. This study focuses on the effectiveness of agile practices, specifically the pair programming and the test-first programming practices. Despite the importance of these functions, there exists a dearth of empirical evidence on the impact of agile practices on their development, raising questions about their potential to enhance correctness without affecting time-to-market. This paper aims to bridge this gap by comparing the application of agile practices with traditional approaches in the context of auxiliary function development. We conducted six experiments involving 122 participants (85 novices and 37 professionals) who used both traditional and agile methods to develop six auxiliary functions across three different domains. Our analysis of 244 implementations suggests the potential benefits of agile practices in auxiliary function development. Pair programming showed a tendency towards improved correctness, while test-first programming did not significantly extend the total development time, particularly among professionals. However, these findings should be interpreted cautiously as they do not conclusively establish that agile practices outperform traditional approaches universally. As indicated by our results, the potential benefits of agile practices may vary depending on factors such as the programmer’s experience level and the nature of the functions being developed. Further research is needed to fully understand the contexts in which these practices can be most effectively applied and to address the potential limitations of our study.</p>","PeriodicalId":21827,"journal":{"name":"Software Quality Journal","volume":"25 1","pages":""},"PeriodicalIF":1.9,"publicationDate":"2024-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141507337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automated SC-MCC test case generation using coverage-guided fuzzing 利用覆盖引导模糊自动生成 SC-MCC 测试用例
IF 1.9 3区 计算机科学
Software Quality Journal Pub Date : 2024-05-14 DOI: 10.1007/s11219-024-09667-3
Monika Rani Golla, Sangharatna Godboley
{"title":"Automated SC-MCC test case generation using coverage-guided fuzzing","authors":"Monika Rani Golla, Sangharatna Godboley","doi":"10.1007/s11219-024-09667-3","DOIUrl":"https://doi.org/10.1007/s11219-024-09667-3","url":null,"abstract":"<p>One of the main objectives of testing is to achieve adequate code coverage. Modern code coverage standards suggest MC/DC (Modified Condition/Decision Coverage) instead of MCC (Multiple Condition Coverage) due to its ability to generate a feasible number of test cases. In contrast to the MC/DC, which only takes independent pairs into consideration, the MCC often considers each and every test case. In our work, we suggest SC-MCC, i.e., MCC with Short-Circuit. The key aspect of this paper is to demonstrate the effectiveness of SC-MCC-based test cases compared to MC/DC using Coverage-Guided Fuzzing (CGF) technique. In this work, we have considered American Fuzzy Lop (AFL) tool to generate both the SC-MCC and MC/DC test cases for 54 RERS benchmark programs. As part of this paper, we propose unique goal constraint generation and fuzz-instrumentation techniques that help in mitigating the masking problem of AFL. Subsequently, we performed mutation testing by employing the GCOV tool and computed the mutation score in order to evaluate the quality of the generated test cases. Finally, based on our observations, SC-MCC has performed better for over 85% of the programs taken into consideration.</p>","PeriodicalId":21827,"journal":{"name":"Software Quality Journal","volume":"161 1","pages":""},"PeriodicalIF":1.9,"publicationDate":"2024-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140939100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CLOUD-QM: a quality model for benchmarking cloud-based enterprise information systems CLOUD-QM:基于云的企业信息系统基准质量模型
IF 1.9 3区 计算机科学
Software Quality Journal Pub Date : 2024-05-14 DOI: 10.1007/s11219-024-09669-1
Umut Şener, Ebru Gökalp, P. Erhan Eren
{"title":"CLOUD-QM: a quality model for benchmarking cloud-based enterprise information systems","authors":"Umut Şener, Ebru Gökalp, P. Erhan Eren","doi":"10.1007/s11219-024-09669-1","DOIUrl":"https://doi.org/10.1007/s11219-024-09669-1","url":null,"abstract":"<p>Organizations are increasingly migrating from on-premise enterprise information systems (EIS) to cloud products due to cloud computing benefits, such as flexibility, elasticity, and on-demand service. However, identifying the most suitable option becomes challenging with the proliferation of Cloud-EIS solutions in the market. To address this challenge, this study introduces a novel quality model named Cloud-QM, based on ISO/IEC 250nn standards. It diagnoses the quality of Cloud-EIS products, benchmarks available options, and identifies the most suitable choice for the organization. Cloud-QM comprises 10 main dimensions, 33 sub-dimensions, and corresponding metrics for a systematic quality assessment. Furthermore, the practical use of Cloud-QM is illustrated through a case study that evaluates two substitute Cloud-EIS products. The results from the case study highlight the effectiveness of Cloud-QM in enabling decision-makers to delve into the quality dimensions and facilitate the selection of the most suitable product for their organizations. The main contributions are as follows: (1) proposing a comprehensive and hierarchically structured quality model for Cloud-EIS products; (2) offering a quantifiable and standardized assessment approach through a set of metrics for quality evaluation; and (3) demonstrating applicability and usability of Cloud-QM by benchmarking Cloud-EIS products.</p>","PeriodicalId":21827,"journal":{"name":"Software Quality Journal","volume":"98 1","pages":""},"PeriodicalIF":1.9,"publicationDate":"2024-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140939288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
KAD: a knowledge formalization-based anomaly detection approach for distributed systems KAD:基于知识形式化的分布式系统异常检测方法
IF 1.9 3区 计算机科学
Software Quality Journal Pub Date : 2024-05-10 DOI: 10.1007/s11219-024-09670-8
Xinjie Wei, Chang-ai Sun, Xiao-Yi Zhang
{"title":"KAD: a knowledge formalization-based anomaly detection approach for distributed systems","authors":"Xinjie Wei, Chang-ai Sun, Xiao-Yi Zhang","doi":"10.1007/s11219-024-09670-8","DOIUrl":"https://doi.org/10.1007/s11219-024-09670-8","url":null,"abstract":"<p>Large-scale distributed systems are becoming key engines of the IT industry due to their scalability and extensibility. A distributed system often involves numerous complex interactions among components, suffering anomalies such as data inconsistencies between components and unanticipated delays in response times. Existing anomaly detection techniques, which extract knowledge from system logs using either statistical or machine learning techniques, exhibit limitations. Statistical techniques often miss implicit anomalies that are related to complex interactions manifested by logs, whereas machine learning techniques lack explainability and they are usually sensitive to log variations. In this paper, we propose KAD, a knowledge formalization-based anomaly detection approach for distributed systems. KAD includes a general knowledge description language (KDL), leveraging the general structure of system logs and extended Backus-Naur form (EBNF) for complex knowledge extraction. Particularly, the semantic set is constructed based on the bidirectional encoder representation from the transformer (BERT) model to improve the expressive capabilities of KDL in knowledge description. In addition, KAD incorporates distributed scheduling computation module to improve the efficiency of anomaly detection processes. Experimental results based on two widely used benchmarks show that KAD can accurately describe the knowledge associated with anomalies, with a high F1-score in detecting various anomaly types.</p>","PeriodicalId":21827,"journal":{"name":"Software Quality Journal","volume":"40 1","pages":""},"PeriodicalIF":1.9,"publicationDate":"2024-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140939196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信