ACM Transactions on Autonomous and Adaptive Systems最新文献

筛选
英文 中文
Best ACM SAC Articles on Coordination and Self-Adaptation 关于协调和自适应的最佳ACM SAC文章
IF 2.7 4区 计算机科学
ACM Transactions on Autonomous and Adaptive Systems Pub Date : 2014-07-01 DOI: 10.1145/2628613
J. Fernandez-Marquez, Mirko Viroli, G. Castelli
{"title":"Best ACM SAC Articles on Coordination and Self-Adaptation","authors":"J. Fernandez-Marquez, Mirko Viroli, G. Castelli","doi":"10.1145/2628613","DOIUrl":"https://doi.org/10.1145/2628613","url":null,"abstract":"The continuous evolution of information and communication technology (ICT) systems opens a broad range of potential applications in domains such as smart environments, transportation, and energy management. However, it also brings a dramatic increase in complexity: the envisioned ICT systems run in highly dynamic socio-technico-physical environments, often composed of thousands or even millions of connected heterogeneous components, including social networks, web services, mobile computational devices , data centers, and environmental sensors. Traditional centralized approaches hardly deal with those new requirements, especially as far as robustness, resiliency, and complexity are concerned. Rather, computation needs to be carried out in a fully distributed way, and each computational component needs to be autonomous, adaptive, able to perceive contextual information from its environment, and able to collaborate with other components to coordinate emerging complex behaviors. Coordination models and languages, traditionally introduced to tackle interactions in complex systems by suitably designed abstractions such as shared spaces and channels , play a key role in such future and emerging ICT systems. A coordination model simplifies the integration of heterogeneous components (processes, objects, agents, services) and makes the resulting ensemble more smoothly executed as a whole, forming a distributed software system with desired characteristics and functionalities. More specifically, due to the clear separation between computation and interaction they promote , coordination models provide a natural support for injecting self-adaption and self-organization into applications, allowing one to achieve very complex and robust behaviors in terms of a coherent and simple set of coordination rules and mechanisms. All of this is carried out by means of coordination abstractions, languages, algorithms, mechanisms, and middleware specifically focused on the management of component interactions. The \" Coordination Models, languages and applications \" (CM) track started in 1998 at the ACM Symposium on Applied Computing (SAC) as one of the main scientific events under the umbrella of Coordination, specifically focused to fill the gap between theory and applications. During the successful series of its 17 editions, we have witnessed the emergence of models, formalisms, and mechanisms supporting distributed systems in a number of application scenarios. Most contributions crosscut a number of contemporary software engineering approaches and fields, attracting researchers from many areas inside ICT systems, such as multiagent systems, embedded systems, mobile computing, and robotics. In particular, the latest editions featured an increasing interest in self-adaptive and self-organizing mechanisms and systems. As a result, we decided to foster the development of coordination models …","PeriodicalId":50919,"journal":{"name":"ACM Transactions on Autonomous and Adaptive Systems","volume":"66 1","pages":"6:1-6:2"},"PeriodicalIF":2.7,"publicationDate":"2014-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91335940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Programming Urban-Area Applications by Exploiting Public Transportation 利用公共交通规划城市区域应用
IF 2.7 4区 计算机科学
ACM Transactions on Autonomous and Adaptive Systems Pub Date : 2014-07-01 DOI: 10.1145/2619999
Dries Harnie, E. G. Boix, T. D'Hondt, W. Meuter
{"title":"Programming Urban-Area Applications by Exploiting Public Transportation","authors":"Dries Harnie, E. G. Boix, T. D'Hondt, W. Meuter","doi":"10.1145/2619999","DOIUrl":"https://doi.org/10.1145/2619999","url":null,"abstract":"The evolution of smartphones has given rise to urban-area applications: applications that communicate in a city by means of the public (moving) infrastructure (e.g., buses and trams). In this setting, applications need to communicate with and discover each other using intermediaries that move around the city and transfer data between them. This requires programmers to scatter code that deals with routing messages to the correct place and deal with network failures all over their programs. Our approach allows the programmer to specify urban-area applications in a high-level manner without the burden of directly encoding communication using intermediaries. We present this as a translation from a high-level object-oriented programming paradigm to a low-level communication mechanism. This translation allows the programmer to restrict routing of messages to, for example, a certain number of hops, geographic areas, or even types of carrier devices. In addition, we show how high-level group messaging can be efficiently represented in the low-level communication. Finally, we document our experiences in setting up a small-scale real-world urban-area application.","PeriodicalId":50919,"journal":{"name":"ACM Transactions on Autonomous and Adaptive Systems","volume":"3 1","pages":"8:1-8:20"},"PeriodicalIF":2.7,"publicationDate":"2014-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76810947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Transactional Auto Scaler: Elastic Scaling of Replicated In-Memory Transactional Data Grids 事务性自动缩放器:内存中复制事务性数据网格的弹性缩放
IF 2.7 4区 计算机科学
ACM Transactions on Autonomous and Adaptive Systems Pub Date : 2014-07-01 DOI: 10.1145/2620001
Diego Didona, P. Romano, Sebastiano Peluso, F. Quaglia
{"title":"Transactional Auto Scaler: Elastic Scaling of Replicated In-Memory Transactional Data Grids","authors":"Diego Didona, P. Romano, Sebastiano Peluso, F. Quaglia","doi":"10.1145/2620001","DOIUrl":"https://doi.org/10.1145/2620001","url":null,"abstract":"In this article, we introduce TAS (Transactional Auto Scaler), a system for automating the elastic scaling of replicated in-memory transactional data grids, such as NoSQL data stores or Distributed Transactional Memories. Applications of TAS range from online self-optimization of in-production applications to the automatic generation of QoS/cost-driven elastic scaling policies, as well as to support for what-if analysis on the scalability of transactional applications.\u0000 In this article, we present the key innovation at the core of TAS, namely, a novel performance forecasting methodology that relies on the joint usage of analytical modeling and machine learning. By exploiting these two classically competing approaches in a synergic fashion, TAS achieves the best of the two worlds, namely, high extrapolation power and good accuracy, even when faced with complex workloads deployed over public cloud infrastructures.\u0000 We demonstrate the accuracy and feasibility of TAS’s performance forecasting methodology via an extensive experimental study based on a fully fledged prototype implementation integrated with a popular open-source in-memory transactional data grid (Red Hat’s Infinispan) and industry-standard benchmarks generating a breadth of heterogeneous workloads.","PeriodicalId":50919,"journal":{"name":"ACM Transactions on Autonomous and Adaptive Systems","volume":"13 1","pages":"11:1-11:32"},"PeriodicalIF":2.7,"publicationDate":"2014-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90077570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Adaptive Resource Provisioning for Virtualized Servers Using Kalman Filters 基于卡尔曼滤波的虚拟化服务器自适应资源发放
IF 2.7 4区 计算机科学
ACM Transactions on Autonomous and Adaptive Systems Pub Date : 2014-07-01 DOI: 10.1145/2626290
Evangelia Kalyvianaki, Themistoklis Charalambous, S. Hand
{"title":"Adaptive Resource Provisioning for Virtualized Servers Using Kalman Filters","authors":"Evangelia Kalyvianaki, Themistoklis Charalambous, S. Hand","doi":"10.1145/2626290","DOIUrl":"https://doi.org/10.1145/2626290","url":null,"abstract":"Resource management of virtualized servers in data centers has become a critical task, since it enables cost-effective consolidation of server applications. Resource management is an important and challenging task, especially for multitier applications with unpredictable time-varying workloads. Work in resource management using control theory has shown clear benefits of dynamically adjusting resource allocations to match fluctuating workloads. However, little work has been done toward adaptive controllers for unknown workload types. This work presents a new resource management scheme that incorporates the Kalman filter into feedback controllers to dynamically allocate CPU resources to virtual machines hosting server applications. We present a set of controllers that continuously detect and self-adapt to unforeseen workload changes. Furthermore, our most advanced controller also self-configures itself without any a priori information and with a small 4.8% performance penalty in the case of high-intensity workload changes. In addition, our controllers are enhanced to deal with multitier server applications: by using the pair-wise resource coupling between tiers, they improve server response to large workload increases as compared to controllers with no such resource-coupling mechanism. Our approaches are evaluated and their performance is illustrated on a 3-tier Rubis benchmark website deployed on a prototype Xen-virtualized cluster.","PeriodicalId":50919,"journal":{"name":"ACM Transactions on Autonomous and Adaptive Systems","volume":"283 1","pages":"10:1-10:35"},"PeriodicalIF":2.7,"publicationDate":"2014-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78110698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
A Cooperative Predictive Control Approach to Improve the Reconfiguration Stability of Adaptive Distributed Parallel Applications 一种提高自适应分布式并行系统重构稳定性的协同预测控制方法
IF 2.7 4区 计算机科学
ACM Transactions on Autonomous and Adaptive Systems Pub Date : 2014-03-01 DOI: 10.1145/2567929
G. Mencagli, M. Vanneschi, E. Vespa
{"title":"A Cooperative Predictive Control Approach to Improve the Reconfiguration Stability of Adaptive Distributed Parallel Applications","authors":"G. Mencagli, M. Vanneschi, E. Vespa","doi":"10.1145/2567929","DOIUrl":"https://doi.org/10.1145/2567929","url":null,"abstract":"Adaptiveness in distributed parallel applications is a key feature to provide satisfactory performance results in the face of unexpected events such as workload variations and time-varying user requirements. The adaptation process is based on the ability to change specific characteristics of parallel components (e.g., their parallelism degree) and to guarantee that such modifications of the application configuration are effective and durable. Reconfigurations often incur a cost on the execution (a performance overhead and/or an economic cost). For this reason advanced adaptation strategies have become of paramount importance. Effective strategies must achieve properties like control optimality (making decisions that optimize the global application QoS), reconfiguration stability expressed in terms of the average time between consecutive reconfigurations of the same component, and optimizing the reconfiguration amplitude (number of allocated/deallocated resources). To control such parameters, in this article we propose a method based on a Cooperative Model-based Predictive Control approach in which application controllers cooperate to make optimal reconfigurations and taking account of the durability and amplitude of their control decisions. The effectiveness and the feasibility of the methodology is demonstrated through experiments performed in a simulation environment and by comparing it with other existing techniques.","PeriodicalId":50919,"journal":{"name":"ACM Transactions on Autonomous and Adaptive Systems","volume":"67 1","pages":"2:1-2:27"},"PeriodicalIF":2.7,"publicationDate":"2014-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78676945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Fostering Cooperation through Dynamic Coalition Formation and Partner Switching 通过动态联盟形成和伙伴转换促进合作
IF 2.7 4区 计算机科学
ACM Transactions on Autonomous and Adaptive Systems Pub Date : 2014-03-01 DOI: 10.1145/2567928
Ana Peleteiro-Ramallo, J. C. Burguillo, J. Arcos, J. Rodríguez-Aguilar
{"title":"Fostering Cooperation through Dynamic Coalition Formation and Partner Switching","authors":"Ana Peleteiro-Ramallo, J. C. Burguillo, J. Arcos, J. Rodríguez-Aguilar","doi":"10.1145/2567928","DOIUrl":"https://doi.org/10.1145/2567928","url":null,"abstract":"In this article we tackle the problem of maximizing cooperation among self-interested agents in a resource exchange environment. Our main concern is the design of mechanisms for maximizing cooperation among self-interested agents in a way that their profits increase by exchanging or trading with resources. Although dynamic coalition formation and partner switching (rewiring) have been shown to promote the emergence and maintenance of cooperation for self-interested agents, no prior work in the literature has investigated whether merging both mechanisms exhibits positive synergies that lead to increase cooperation even further. Therefore, we introduce and analyze a novel dynamic coalition formation mechanism, that uses partner switching, to help self-interested agents to increase their profits in a resource exchange environment. Our experiments show the effectiveness of our mechanism at increasing the agents’ profits, as well as the emergence of trading as the preferred behavior over different types of complex networks.","PeriodicalId":50919,"journal":{"name":"ACM Transactions on Autonomous and Adaptive Systems","volume":"21 1","pages":"1:1-1:31"},"PeriodicalIF":2.7,"publicationDate":"2014-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78703156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Modeling and Defending against Adaptive BitTorrent Worms in Peer-to-Peer Networks 点对点网络中自适应bt蠕虫的建模和防御
IF 2.7 4区 计算机科学
ACM Transactions on Autonomous and Adaptive Systems Pub Date : 2014-03-01 DOI: 10.1145/2567925
Jiaqing Luo, Bin Xiao, Qingjun Xiao, Jiannong Cao, M. Guo
{"title":"Modeling and Defending against Adaptive BitTorrent Worms in Peer-to-Peer Networks","authors":"Jiaqing Luo, Bin Xiao, Qingjun Xiao, Jiannong Cao, M. Guo","doi":"10.1145/2567925","DOIUrl":"https://doi.org/10.1145/2567925","url":null,"abstract":"BitTorrent (BT) is one of the most common Peer-to-Peer (P2P) file sharing protocols. Rather than downloading a file from a single source, the protocol allows users to join a swarm of peers to download and upload from each other simultaneously. Worms exploiting information from BT servers or trackers can cause serious damage to participating peers, which unfortunately has been neglected previously. In this article, we first present a new worm, called Adaptive BitTorrent worm (A-BT worm), which finds new victims and propagates sending forged requests to trackers. To reduce its abnormal behavior, the worm estimates the ratio of infected peers and adaptively adjusts its propagation speed. We then build a hybrid model to precisely characterize the propagation behavior of the worm. We also propose a statistical method to automatically detect the worm from the tracker by estimating the variance of the time intervals of requests. To slow down the worm propagation, we design a safe strategy in which the tracker returns secured peers when receives a request. Finally, we evaluate the accuracy of the hybrid model, and the effectiveness of our detection method and containment strategy through simulations.","PeriodicalId":50919,"journal":{"name":"ACM Transactions on Autonomous and Adaptive Systems","volume":"20 1","pages":"5:1-5:17"},"PeriodicalIF":2.7,"publicationDate":"2014-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88985134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Bionic Autonomic Nervous Systems for Self-Defense against DoS, Spyware, Malware, Virus, and Fishing 用于防御DoS,间谍软件,恶意软件,病毒和钓鱼的仿生自主神经系统
IF 2.7 4区 计算机科学
ACM Transactions on Autonomous and Adaptive Systems Pub Date : 2014-03-01 DOI: 10.1145/2567924
Yuan-Shun Dai, Yanping Xiang, Yi Pan
{"title":"Bionic Autonomic Nervous Systems for Self-Defense against DoS, Spyware, Malware, Virus, and Fishing","authors":"Yuan-Shun Dai, Yanping Xiang, Yi Pan","doi":"10.1145/2567924","DOIUrl":"https://doi.org/10.1145/2567924","url":null,"abstract":"Computing systems and networks become increasingly large and complex with a variety of compromises and vulnerabilities. The network security and privacy are of great concern today, where self-defense against different kinds of attacks in an autonomous and holistic manner is a challenging topic. To address this problem, we developed an innovative technology called Bionic Autonomic Nervous System (BANS). The BANS is analogous to biological nervous system, which consists of basic modules like cyber axon, cyber neuron, peripheral nerve and central nerve. We also presented an innovative self-defense mechanism which utilizes the Fuzzy Logic, Neural Networks, and Entropy Awareness, etc. Equipped with the BANS, computer and network systems can intelligently self-defend against both known and unknown compromises/attacks including denial of services (DoS), spyware, malware, and virus. BANS also enabled multiple computers to collaboratively fight against some distributed intelligent attacks like DDoS. We have implemented the BANS in practice. Some case studies and experimental results exhibited the effectiveness and efficiency of the BANS and the self-defense mechanism.","PeriodicalId":50919,"journal":{"name":"ACM Transactions on Autonomous and Adaptive Systems","volume":"28 1","pages":"4:1-4:20"},"PeriodicalIF":2.7,"publicationDate":"2014-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77738282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Mitigating DoS Attacks Using Performance Model-Driven Adaptive Algorithms 使用性能模型驱动的自适应算法减轻DoS攻击
IF 2.7 4区 计算机科学
ACM Transactions on Autonomous and Adaptive Systems Pub Date : 2014-03-01 DOI: 10.1145/2567926
C. Barna, Mark Shtern, Michael Smit, Vassilios Tzerpos, Marin Litoiu
{"title":"Mitigating DoS Attacks Using Performance Model-Driven Adaptive Algorithms","authors":"C. Barna, Mark Shtern, Michael Smit, Vassilios Tzerpos, Marin Litoiu","doi":"10.1145/2567926","DOIUrl":"https://doi.org/10.1145/2567926","url":null,"abstract":"Denial of Service (DoS) attacks overwhelm online services, preventing legitimate users from accessing a service, often with impact on revenue or consumer trust. Approaches exist to filter network-level attacks, but application-level attacks are harder to detect at the firewall. Filtering at this level can be computationally expensive and difficult to scale, while still producing false positives that block legitimate users.\u0000 This article presents a model-based adaptive architecture and algorithm for detecting DoS attacks at the web application level and mitigating them. Using a performance model to predict the impact of arriving requests, a decision engine adaptively generates rules for filtering traffic and sending suspicious traffic for further review, where the end user is given the opportunity to demonstrate they are a legitimate user. If no legitimate user responds to the challenge, the request is dropped. Experiments performed on a scalable implementation demonstrate effective mitigation of attacks launched using a real-world DoS attack tool.","PeriodicalId":50919,"journal":{"name":"ACM Transactions on Autonomous and Adaptive Systems","volume":"4 1","pages":"3:1-3:26"},"PeriodicalIF":2.7,"publicationDate":"2014-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90442699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Design and Performance Evaluation of Data Dissemination Systems for Opportunistic Networks Based on Cognitive Heuristics 基于认知启发式的机会网络数据传播系统设计与性能评估
IF 2.7 4区 计算机科学
ACM Transactions on Autonomous and Adaptive Systems Pub Date : 2013-09-01 DOI: 10.1145/2518017.2518018
M. Conti, M. Mordacchini, A. Passarella
{"title":"Design and Performance Evaluation of Data Dissemination Systems for Opportunistic Networks Based on Cognitive Heuristics","authors":"M. Conti, M. Mordacchini, A. Passarella","doi":"10.1145/2518017.2518018","DOIUrl":"https://doi.org/10.1145/2518017.2518018","url":null,"abstract":"In the convergence of the Cyber-Physical World, user devices will act as proxies of the humans in the cyber world. They will be required to act in a vast information landscape, asserting the relevance of data spread in the cyber world, in order to let their human users become aware of the content they really need. This is a remarkably similar situation to what the human brain has to do all the time when deciding what information coming from the surrounding environment is interesting and what can simply be ignored. The brain performs this task using so called cognitive heuristics, i.e. simple, rapid, yet very effective schemes. In this article, we propose a new approach that exploits one of these heuristics, the recognition heuristic, for developing a self-adaptive system that deals with effective data dissemination in opportunistic networks. We show how to implement it and provide an extensive analysis via simulation. Specifically, results show that the proposed solution is as effective as state-of-the-art solutions for data dissemination in opportunistic networks, while requiring far less resources. Finally, our sensitiveness analysis shows how various parameters depend on the context where nodes are situated, and suggest corresponding optimal configurations for the algorithm.","PeriodicalId":50919,"journal":{"name":"ACM Transactions on Autonomous and Adaptive Systems","volume":"40 1","pages":"12:1-12:32"},"PeriodicalIF":2.7,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78107695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信