2020 6th IEEE Conference on Network Softwarization (NetSoft)最新文献

筛选
英文 中文
Provenance for Intent-Based Networking 基于意图的网络的来源
2020 6th IEEE Conference on Network Softwarization (NetSoft) Pub Date : 2020-06-01 DOI: 10.1109/NetSoft48620.2020.9165519
Benjamin E. Ujcich, Adam Bates, W. Sanders
{"title":"Provenance for Intent-Based Networking","authors":"Benjamin E. Ujcich, Adam Bates, W. Sanders","doi":"10.1109/NetSoft48620.2020.9165519","DOIUrl":"https://doi.org/10.1109/NetSoft48620.2020.9165519","url":null,"abstract":"Intent-based networking (IBN) promises to simplify the network management and automated orchestration of high-level policies in future networking architectures such as software-defined networking (SDN). However, such abstraction and automation creates new network visibility challenges. Existing SDN network forensics and diagnostics tools operate at a lower level of network abstraction, which makes intent-level reasoning difficult. We present PRovINTENT, a framework extension for SDN control plane tools that accounts for intent semantics. PRovINTENT records the provenance and evolution of intents as the network's state and apps' requests change over time and enables reasoning at multiple abstractions. We define an intent provenance model, we implement a proof-of-concept tool, and we evaluate the efficacy of PRovINTENT'S explanatory capabilities by using a representative intent-driven network application.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124215947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Adaptive Network Slicing with Multi-Site Deployment in 5G Core Networks 5G核心网多站部署自适应网络切片
2020 6th IEEE Conference on Network Softwarization (NetSoft) Pub Date : 2020-06-01 DOI: 10.1109/netsoft48620.2020.9165512
Shwetha Vittal, M. Singh, A. Franklin
{"title":"Adaptive Network Slicing with Multi-Site Deployment in 5G Core Networks","authors":"Shwetha Vittal, M. Singh, A. Franklin","doi":"10.1109/netsoft48620.2020.9165512","DOIUrl":"https://doi.org/10.1109/netsoft48620.2020.9165512","url":null,"abstract":"In today's moving world to ambitious 5G, 3GPP has defined three fundamental and promising services, namely enhanced Mobile Broadband (eMBB), ultra Reliable Low Latency Communication (uRLLC), and massive Machine Type Communication (mMTC) by tuning user's needs on these services to network slicing. While the Network Function Virtualization (NFV) and Software Defined Networking (SDN) are used to enable the network slicing in the mobile network, an effective end-to-end slice management in 5G system is still a challenge to improve the network performance in terms of throughput, latency, and connectivity for each of these envisioned services. In this paper, we focus on the end-to-end network slice life cycle management of network slices on different sites using a single management and orchestration entity with a coherent proof of concept. We propose algorithms for efficiently activating, deactivating, and decommissioning the network slices, using real time status information of network slices from Network Slice Management Function (NSMF). Our results show that by adopting better strategy in these algorithms and considering learned user traffic from the past, in controlling various phases of slice life cycle, we can reduce the response time for a user request by 50%.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121083841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
When Raft Meets SDN: How to Elect a Leader over a Network 当Raft遇到SDN:如何在网络上选举领导者
2020 6th IEEE Conference on Network Softwarization (NetSoft) Pub Date : 2020-06-01 DOI: 10.1109/NetSoft48620.2020.9165534
Konstantinos Choumas, T. Korakis
{"title":"When Raft Meets SDN: How to Elect a Leader over a Network","authors":"Konstantinos Choumas, T. Korakis","doi":"10.1109/NetSoft48620.2020.9165534","DOIUrl":"https://doi.org/10.1109/NetSoft48620.2020.9165534","url":null,"abstract":"This paper discusses the benefits in the operation of a Raft based SDN controller cluster, when the election of the cluster leader becomes more or less “fair. Raft is a leader based consensus algorithm, which is used by the most popular open-source SDN controllers for replicating the network state. It requires all state changes to be confirmed by the leader, thus the leader election is very crucial for the Raft performance. In case that the inter-controller communication delay is the same for all controller pairs, the election process is absolute fair, meaning that the leadership is shared equally among the controllers. In all other cases, some controllers become leaders more frequently in benefit or at a cost of the average time required for a network state update. In this paper, we model this time as a function of the leadership probabilities of the cluster controllers. We also model these probabilities as a function of the time that each controller is waiting after detecting the current leader failure and before starting its campaign. We configure different ranges for the controller waiting times, adjusting the leadership probabilities and decreasing the average response time. Our model is confirmed by testbed experimentation.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122700926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The GNPy Open Source Library of Applications for Software Abstraction of WDM Data Transport in Open Optical Networks 开放光网络中WDM数据传输软件抽象的GNPy开源应用程序库
2020 6th IEEE Conference on Network Softwarization (NetSoft) Pub Date : 2020-06-01 DOI: 10.1109/NetSoft48620.2020.9165313
Alessio Ferrari, J. Kundrát, E. L. Rouzic, M. Filer, Andrea Campanella, A. D’Amico, Karthikeyan Balasubramanian, Yawei Yin, O. Havlis, M. Hazlinsky, J. Vojtěch, Jean-Luc Augé, G. Grammel, G. Galimberti, V. Curri
{"title":"The GNPy Open Source Library of Applications for Software Abstraction of WDM Data Transport in Open Optical Networks","authors":"Alessio Ferrari, J. Kundrát, E. L. Rouzic, M. Filer, Andrea Campanella, A. D’Amico, Karthikeyan Balasubramanian, Yawei Yin, O. Havlis, M. Hazlinsky, J. Vojtěch, Jean-Luc Augé, G. Grammel, G. Galimberti, V. Curri","doi":"10.1109/NetSoft48620.2020.9165313","DOIUrl":"https://doi.org/10.1109/NetSoft48620.2020.9165313","url":null,"abstract":"GNPy is an open source project of the Telecom Infra Project (TIP). It aims at the development of a software library for the abstraction of physical layer data transport, implemented as wavelength division multiplexing (WDM) through open-source code and open APIs, with the purpose of automatizing disaggregated, multi-vendor open optical networks. We first introduce the GNPy library of applications and functionalities, then, we present validation of the GNPy core. The quality-of-transmission estimator (QoT-E) enables a quick and accurate prediction of the unique performance metric in WDM data transport of optical networks: the Generalized Signal-to-Noise Ratio (GSNR). The presented validation experiments show an excellent accuracy in predicting the GSNR compared to the values obtained experimentally. Finally, we present the GNPy integration with the ONOS network OS in a multi-vendor scenario including open reconfigurable add drop multiplexers (ROADMs) and the related validation experiment.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127431972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Attack Detection on the Software Defined Networking Switches 软件定义组网交换机攻击检测
2020 6th IEEE Conference on Network Softwarization (NetSoft) Pub Date : 2020-06-01 DOI: 10.1109/NetSoft48620.2020.9165459
U. Tupakula, V. Varadharajan, K. Karmakar
{"title":"Attack Detection on the Software Defined Networking Switches","authors":"U. Tupakula, V. Varadharajan, K. Karmakar","doi":"10.1109/NetSoft48620.2020.9165459","DOIUrl":"https://doi.org/10.1109/NetSoft48620.2020.9165459","url":null,"abstract":"Software Defined Networking (SDN) is disruptive networking technology which adopts a centralised framework to facilitate fine-grained network management. However security in SDN is still in its infancy and there is need for significant work to deal with different attacks in SDN. In this paper we discuss some of the possible attacks on SDN switches and propose techniques for detecting the attacks on switches. We have developed a Switch Security Application (SSA)for SDN Controller which makes use of trusted computing technology and some additional components for detecting attacks on the switches. In particular TPM attestation is used to ensure that switches are in trusted state during boot time before configuring the flow rules on the switches. The additional components are used for storing and validating messages related to the flow rule configuration of the switches. The stored information is used for generating a trusted report on the expected flow rules in the switches and using this information for validating the flow rules that are actually enforced in the switches. If there is any variation to flow rules that are enforced in the switches compared to the expected flow rules by the SSA, then, the switch is considered to be under attack and an alert is raised to the SDN Administrator. The administrator can isolate the switch from network or make use of trusted report for restoring the flow rules in the switches. We will also present a prototype implementation of our technique.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114407113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Human-centric Quality Management of Immersive Multimedia Applications 沉浸式多媒体应用以人为本的质量管理
2020 6th IEEE Conference on Network Softwarization (NetSoft) Pub Date : 2020-06-01 DOI: 10.1109/NetSoft48620.2020.9165335
S. V. Damme, M. T. Vega, F. Turck
{"title":"Human-centric Quality Management of Immersive Multimedia Applications","authors":"S. V. Damme, M. T. Vega, F. Turck","doi":"10.1109/NetSoft48620.2020.9165335","DOIUrl":"https://doi.org/10.1109/NetSoft48620.2020.9165335","url":null,"abstract":"Augmented Reality (AR) and Virtual Reality (VR) multimodal systems are the latest trend within the field of multimedia. As they emulate the senses by means of omnidirectional visuals, 360° sound, motion tracking and touch simulation, they are able to create a strong feeling of presence and interaction with the virtual environment. These experiences can be applied for virtual training (Industry 4.0), tele-surgery (healthcare) or remote learning (education). However, given the strong time and task sensitiveness of these applications, it is of great importance to sustain the end-user quality, i.e. the Quality-of-Experience (QoE), at all times. Lack of synchronization and quality degradation need to be reduced to a minimum to avoid feelings of cybersickness or loss of immersiveness and concentration. This means that there is a need to shift the quality management from system-centered performance metrics towards a more human, QoE-centered approach. However, this requires for novel techniques in the three areas of the QoE-management loop (monitoring, modelling and control). This position paper identifies open areas of research to fully enable human-centric driven management of immersive multimedia. To this extent, four main dimensions are put forward: (1) Task and well-being driven subjective assessment; (2) Real-time QoE modelling; (3) Accurate viewport prediction; (4) Machine Learning (ML)-based quality optimization and content recreation. This paper discusses the state-of-the-art, and provides with possible solutions to tackle the open challenges.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123004836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Coordination Algorithm for Migration of Shared VNFs in Federated Environments 联邦环境下共享VNFs迁移的协调算法
2020 6th IEEE Conference on Network Softwarization (NetSoft) Pub Date : 2020-06-01 DOI: 10.1109/NetSoft48620.2020.9165333
Josué Castañeda Cisneros, Sami Yangui, S. Hernández, Julio César Pérez Sansalvador, K. Drira
{"title":"Coordination Algorithm for Migration of Shared VNFs in Federated Environments","authors":"Josué Castañeda Cisneros, Sami Yangui, S. Hernández, Julio César Pérez Sansalvador, K. Drira","doi":"10.1109/NetSoft48620.2020.9165333","DOIUrl":"https://doi.org/10.1109/NetSoft48620.2020.9165333","url":null,"abstract":"Several works in the literature have proposed migration mechanisms for VNFs, however they only consider the migration of isolated Virtual Network Functions (VNFs) instead of the migration under a shared and chained scenario. Reconfiguration of VNFs, like in the case of migration, is necessary to handle dynamic requirements for the service. However, it is not a straightforward operation. On one hand, it is necessary to coordinate VNFs to achieve migration while maintaining the end-to-end service availability. On the other hand, the new deployment can disrupt the chain and violate predefined services constraints. Moreover if there is no access to global references, migration can introduce inconsistent services due to a lack of knowledge from orchestrators. This paper focuses on the problem of coordinating orchestrators in a NFV federation to achieve migration of shared VNFs with only local domain information. It introduces a novel coordination algorithm that relies on ETSI/MANO specifications. The proposed algorithm is implemented and evaluated for validation purposes. Results show that migration satisfies the constraints for seamless migration and the algorithm obtains better performance compared to state of the art solution with a slight overhead cost when considering the shared VNFs instead of isolated VNFS.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134512276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Hybrid Network Slicing: Composing Network Slices based on VNFs, CNFs Network Services 混合网络切片:基于VNFs、CNFs网络服务组成网络切片
2020 6th IEEE Conference on Network Softwarization (NetSoft) Pub Date : 2020-06-01 DOI: 10.1109/netsoft48620.2020.9165378
P. Alemany, R. Vilalta, Felipe Vicens, Ignacio Domínguez Gómez, R. Casellas, R. Martínez, Sonia Castro, Josep Martrat, R. Muñoz
{"title":"Hybrid Network Slicing: Composing Network Slices based on VNFs, CNFs Network Services","authors":"P. Alemany, R. Vilalta, Felipe Vicens, Ignacio Domínguez Gómez, R. Casellas, R. Martínez, Sonia Castro, Josep Martrat, R. Muñoz","doi":"10.1109/netsoft48620.2020.9165378","DOIUrl":"https://doi.org/10.1109/netsoft48620.2020.9165378","url":null,"abstract":"This paper presents the creation of Network Slices, which are composed of Network Services that are either composed of Cloud-native Network Functions or Virtual Network Functions. This is referred to as Hybrid Network Slice. In addition to describing this idea, this paper demonstrates the benefits of Hybrid Network Slices. This idea has been validated in an immersive-media pilot. An Hybrid Network Slice and a classical Network Slice deployments have been compared in order to validate the benefits from the hybrid case.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130118151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Benchmarking and Profiling 5G Verticals' Applications: An Industrial IoT Use Case 对标和分析5G垂直应用:一个工业物联网用例
2020 6th IEEE Conference on Network Softwarization (NetSoft) Pub Date : 2020-06-01 DOI: 10.1109/NetSoft48620.2020.9165393
A. Zafeiropoulos, Eleni Fotopoulou, Manuel Peuster, Stefan Schneider, P. Gouvas, D. Behnke, M. Müller, Patrick-Benjamin Bök, P. Trakadas, P. Karkazis, H. Karl
{"title":"Benchmarking and Profiling 5G Verticals' Applications: An Industrial IoT Use Case","authors":"A. Zafeiropoulos, Eleni Fotopoulou, Manuel Peuster, Stefan Schneider, P. Gouvas, D. Behnke, M. Müller, Patrick-Benjamin Bök, P. Trakadas, P. Karkazis, H. Karl","doi":"10.1109/NetSoft48620.2020.9165393","DOIUrl":"https://doi.org/10.1109/NetSoft48620.2020.9165393","url":null,"abstract":"The Industry 4.0 sector is evolving in a tremendous pace by introducing a set of industrial automation mechanisms tightly coupled with the exploitation of Internet of Things (IoT), 5G and Artificial Intelligence (AI) technologies. By combining such emerging technologies, interconnected sensors, instruments, and other industrial devices are networked together with industrial applications, formulating the Industrial IoT (IIoT) and aiming to improve the efficiency and reliability of the deployed applications and provide Quality of Service (QoS) guarantees. However, in a 5G era, efficient, reliable and highly performant applications' provision has to be combined with exploitation of capabilities offered by 5G networks. Optimal usage of the available resources has to be realised, while guaranteeing strict QoS requirements such as high data rates, ultra-low latency and jitter. The first step towards this direction is based on the accurate profiling of vertical industries' applications in terms of resources usage, capacity limits and reliability characteristics. To achieve so, in this paper we provide an integrated methodology and approach for benchmarking and profiling 5G vertical industries' applications. This approach covers the realisation of benchmarking experiments and the extraction of insights based on the analysis of the collected data. Such insights are considered the cornerstones for the development of AI models that can lead to optimal infrastructure usage along with assurance of high QoS provision. The detailed approach is applied in a real IIoT use case, leading to profiling of a set of 5G network functions.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"224 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132074255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
A Federated Learning Approach to Routing in Challenged SDN-Enabled Edge Networks 基于sdn的边缘网络中路由的联邦学习方法
2020 6th IEEE Conference on Network Softwarization (NetSoft) Pub Date : 2020-06-01 DOI: 10.1109/NetSoft48620.2020.9165506
Alessio Sacco, Flavio Esposito, G. Marchetto
{"title":"A Federated Learning Approach to Routing in Challenged SDN-Enabled Edge Networks","authors":"Alessio Sacco, Flavio Esposito, G. Marchetto","doi":"10.1109/NetSoft48620.2020.9165506","DOIUrl":"https://doi.org/10.1109/NetSoft48620.2020.9165506","url":null,"abstract":"The edge computing paradigm allows computationally intensive tasks to be offloaded from small devices to nearby (more) powerful servers, via an edge network. The intersection between such edge computing paradigm and Machine Learning (ML), in general, and deep learning in particular, has brought to light several advantages for network operators: from automating management tasks, to gain additional insights on their networks. Most of the existing approaches that use ML to drive routing and traffic control decisions are valuable but rarely focus on challenged networks, that are characterized by continually varying network conditions and the high volume of traffic generated by edge devices. In particular, recently proposed distributed ML-based architectures require either a long synchronization phase or a training phase that is unsustainable for challenged networks. In this paper, we fill this knowledge gap with Blaster, a federated architecture for routing packets within a distributed edge network, to improve the application's performance and allow scalability of data-intensive applications. We also propose a novel path selection model that uses Long Short Term Memory (LSTM) to predict the optimal route. Finally, we present some initial results obtained by testing our approach via simulations and with a prototype deployed over the GENI testbed. By leveraging a Federated Learning (FL) model, our approach shows that we can optimize the communication between SDN controllers, preserving bandwidth for the data traffic.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132591815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信