2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)最新文献

筛选
英文 中文
SEABED: An Open-Source Software Engineering Case-Based Learning Database 海床:一个开源软件工程案例学习数据库
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC) Pub Date : 2017-07-04 DOI: 10.1109/COMPSAC.2017.204
Veena Saini, Paramvir Singh, A. Sureka
{"title":"SEABED: An Open-Source Software Engineering Case-Based Learning Database","authors":"Veena Saini, Paramvir Singh, A. Sureka","doi":"10.1109/COMPSAC.2017.204","DOIUrl":"https://doi.org/10.1109/COMPSAC.2017.204","url":null,"abstract":"Case-Based Learning (CBL) is a teaching methodology based on discussing and analyzing real world problems and solutions. A case is like a story, related to a real world situation that sources a number of challenging problems, which have no obvious solutions. There have been various applications of CBL in the fields of Medicine, Law, and Business. However, there are a limited number of evidences related to the application of CBL in the field of Software Engineering (SE). In this paper, we present an open source web application called SEABED (Software Engineering Case-Based Learning Database). The feature set supported by SEABED comprises Case Submission, Case Collection, Case Search, Case Review, and Case Evolution. SEABED aims to develop and evolve a rich repository of SE cases that might become a basis for enabling the students, instructors, practitioners, and experts to enhance their SE knowledge in an effective way. Further, we present our approach to build a vibrant SE case-based learning community that triggers enough activity around SEABED, required for the platform to reach a critical and wider mass. We communicated with several SE educators around the world and received positive responses on SEABED. In order to investigate the effectiveness of the CBL methodology followed by SEABED, we conducted an experimental study at an Institute of National Importance in India. We present the empirical analysis results of this study and explore the impact of CBL on students' learning abilities.","PeriodicalId":6556,"journal":{"name":"2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)","volume":"80 1","pages":"426-431"},"PeriodicalIF":0.0,"publicationDate":"2017-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84112495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Model-Based Framework for Cloud API Testing 基于模型的云API测试框架
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC) Pub Date : 2017-07-04 DOI: 10.1109/COMPSAC.2017.24
Junyi Wang, Xiaoying Bai, Linyi Li, Zhicheng Ji, Haoran Ma
{"title":"A Model-Based Framework for Cloud API Testing","authors":"Junyi Wang, Xiaoying Bai, Linyi Li, Zhicheng Ji, Haoran Ma","doi":"10.1109/COMPSAC.2017.24","DOIUrl":"https://doi.org/10.1109/COMPSAC.2017.24","url":null,"abstract":"Following the Service-Oriented Architecture, a large number of diversified Cloud services are exposed as Web APIs (Application Program Interface), which serve as the contracts between the service providers and service consumers. Due to their massive and broad applications, any flaw in the cloud APIs may lead to serious consequences. API testing is thus necessary to ensure the availability, reliability, and stability of cloud services. The research proposes a model-based approach to automating API testing. The semi-structured API specifications, like XML/HTML specifications, are gathered from the Web sites using web crawlers, and translated into YAML-encoded standard representations. A scenario editor is designed to specify the dependencies among API operations. Test generators are built to derive test scripts from the specifications and scenarios, including test data, test cases for individual operations as well as operations sequences. Various algorithms can be used for test generation, such as combinatorial data generation, heuristic graph search, and optimization algorithms. The produced test scripts, together with a load model, can be deployed on Cloud and scheduled for execution. A prototype system, called ATCloud, was constructed to illustrate the process of API understanding, test scenario modeling using directed diagraph annotated with transfer probabilities between operations, cloud-based test resources management, distributed workload simulation, and performance monitoring.","PeriodicalId":6556,"journal":{"name":"2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)","volume":"26 1","pages":"60-65"},"PeriodicalIF":0.0,"publicationDate":"2017-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82228048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Verifiable Delegated Authorization for User-Centric Architectures and an OAuth2 Implementation 以用户为中心架构的可验证委托授权和OAuth2实现
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC) Pub Date : 2017-07-04 DOI: 10.1109/COMPSAC.2017.260
Luca Ferretti, Mirco Marchetti, M. Colajanni
{"title":"Verifiable Delegated Authorization for User-Centric Architectures and an OAuth2 Implementation","authors":"Luca Ferretti, Mirco Marchetti, M. Colajanni","doi":"10.1109/COMPSAC.2017.260","DOIUrl":"https://doi.org/10.1109/COMPSAC.2017.260","url":null,"abstract":"Delegated authorization protocols have become wide-spread to implement Web applications and services, where some popular providers managing people identity information and personal data allow their users to delegate third party Web services to access their data. In this paper, we analyze the risks related to untrusted providers not behaving correctly, and we solve this problem by proposing the first verifiable delegated authorization protocol that allows third party services to verify the correctness of users data returned by the provider. The contribution of the paper is twofold: we show how delegated authorization can be cryptographically enforced through authenticated data structures protocols, we extend the standard OAuth2 protocol by supporting efficient and verifiable delegated authorization including database updates and privileges revocation.","PeriodicalId":6556,"journal":{"name":"2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)","volume":"64 1","pages":"718-723"},"PeriodicalIF":0.0,"publicationDate":"2017-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82544363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Towards Container Orchestration in Fog Computing Infrastructures 迈向雾计算基础设施中的容器编排
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC) Pub Date : 2017-07-04 DOI: 10.1109/COMPSAC.2017.248
S. Hoque, Mathias Santos de Brito, A. Willner, Oliver Keil, T. Magedanz
{"title":"Towards Container Orchestration in Fog Computing Infrastructures","authors":"S. Hoque, Mathias Santos de Brito, A. Willner, Oliver Keil, T. Magedanz","doi":"10.1109/COMPSAC.2017.248","DOIUrl":"https://doi.org/10.1109/COMPSAC.2017.248","url":null,"abstract":"The Cloud Computing paradigm promoted the outsourcing of IT infrastructure and enterprise applications paving the way to save costs of building and maintaining computing infrastructures on-premise. In this environment, scale up of applications to attend demands in high peaks become easier and highly automated. Virtualization was a key technology to enable these characteristics. Nowadays, Container technology became popular as an alternative to Virtual Machines, and is being widely applied, as a consequence, Orchestration tools are being extensively applied in the Cloud environment. Despite its success, when it comes to the Internet of Things (IoT), Cloud Computing falls short to meet several requirements. Fog Computing appear as a complimentary technology to the Cloud to deliver the missing requirements in the IoT scene. Managing services deployed in a Fog Environment is a complex task and infrastructure management and orchestration tools can make it seamless. In this paper, we evaluate how Containers can affect the overall performance of applications in Fog Nodes. We analyze different Container Orchestration tools and how they meet Fog requirements to run applications. We also propose a Container Orchestration Framework for Fog Computing infrastructures.","PeriodicalId":6556,"journal":{"name":"2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)","volume":"164 1","pages":"294-299"},"PeriodicalIF":0.0,"publicationDate":"2017-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72775602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 74
IoT Solutions for Precision Farming and Food Manufacturing: Artificial Intelligence Applications in Digital Food 精准农业和食品制造的物联网解决方案:人工智能在数字食品中的应用
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC) Pub Date : 2017-07-04 DOI: 10.1109/COMPSAC.2017.157
R. Dolci
{"title":"IoT Solutions for Precision Farming and Food Manufacturing: Artificial Intelligence Applications in Digital Food","authors":"R. Dolci","doi":"10.1109/COMPSAC.2017.157","DOIUrl":"https://doi.org/10.1109/COMPSAC.2017.157","url":null,"abstract":"In many respects, farming and food processing have lagged other industries when it comes to adoption of innovative technology. Whilst bioengineering has brought about seeds with much higher yield and less need for water and nutrients, it is only now with IoT that farmers can work on the intensive use of natural resources to increase the sustainability of their operations. In the last ten years, high-end machinery has evolved primarily to the benefit of larger corporations, with the introduction of satellite driven machines, sensors and all components of precision farming. The most recent IoT advances bring about a level of simplification and cost reduction that enable all farmers to benefit and a true adoption of prescription agriculture. In this conference presentation, we will examine a practical case of a Malthouse, where careful modeling of how CO2, Temperature, Humidity and PH vary in the three steps of the malting process, enabled an artificial intelligence system to prescribe different setting and schedules. The end result is malt with higher content of starch and proteins, which in turn means higher alcohol in the downstream process. A second example on the cultivation of Medical Marijuana, where similarly but in a more complex fashion (138 variables) the artificial intelligence supported the tuning of many settings and schedules, is presented only in the conference.","PeriodicalId":6556,"journal":{"name":"2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)","volume":"1 1","pages":"384-385"},"PeriodicalIF":0.0,"publicationDate":"2017-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89713698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
A Spoofed E-Mail Countermeasure Method by Scoring the Reliability of DKIM Signature Using Communication Data 一种利用通信数据对DKIM签名可靠性打分的欺骗电子邮件对抗方法
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC) Pub Date : 2017-07-04 DOI: 10.1109/COMPSAC.2017.37
Kanako Konno, Kenya Dan, Naoya Kitagawa
{"title":"A Spoofed E-Mail Countermeasure Method by Scoring the Reliability of DKIM Signature Using Communication Data","authors":"Kanako Konno, Kenya Dan, Naoya Kitagawa","doi":"10.1109/COMPSAC.2017.37","DOIUrl":"https://doi.org/10.1109/COMPSAC.2017.37","url":null,"abstract":"Recently, spoofed e-mails become sophisticated and the messages that cannot be identified by visual confirmation have been increasing. DKIM is one of the most famous methods as countermeasure of spoofed e-mail. However, since DKIM allows a signature by third party domains, a recipient server can be unable to determine whether the attached signature is the legitimate. To solve the problem, although a method using data of DKIM signature domain passed DKIM verification is proposed, this method only verifies the existence of the past deliveries, therefore it has an issue in reliability. To overcome the issue, in this paper, we propose a method to score the reliability of combinations of sender's Header-From domain and DKIM signature domain by analyzing fluctuation of the existence of e-mail delivery obtained from the past communication data. By utilizing this method, the recipients can obtain the reliability score for each message including spoofed e-mail which was uniformly verified successfully in the ordinary DKIM verification, and can utilize our mechanism to spoofed e-mails countermeasure system.","PeriodicalId":6556,"journal":{"name":"2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)","volume":"7 1","pages":"43-48"},"PeriodicalIF":0.0,"publicationDate":"2017-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89118005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LXC Container Migration in Cloudlets under Multipath TCP 多路径TCP下Cloudlets中的LXC容器迁移
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC) Pub Date : 2017-07-04 DOI: 10.1109/COMPSAC.2017.163
Yuqing Qiu, Chung-Horng Lung, S. Ajila, Pradeep Srivastava
{"title":"LXC Container Migration in Cloudlets under Multipath TCP","authors":"Yuqing Qiu, Chung-Horng Lung, S. Ajila, Pradeep Srivastava","doi":"10.1109/COMPSAC.2017.163","DOIUrl":"https://doi.org/10.1109/COMPSAC.2017.163","url":null,"abstract":"The growing popularity of mobile devices and Internet of Things (IoT) has inspired the advent of the Cloudlet concept—a \"small data center\" close to users at the edge. It is believed that the Quality of Experience (QoE) of end users would greatly improve if they can access required resources within a one-hop distance from Cloudlet servers. Over the years, many researchers have proposed using virtual machines (VMs) as such service-provisioning servers. However, seeing the potentiality of containers—a lightweight virtualization tool, this paper adopts LXC containers as Cloudlet platforms. To facilitate container migration between Cloudlets, CRIU (Checkpoint/Restore in Userspace) has been chosen as the migration tool. Since the migration process goes through the Wide Area Network (WAN), which may experience congestion or network failures, this paper adopts the MPTCP (Multipath TCP) protocol to address the challenge. The multiple subflows established within a MPTCP connection can improve the resilience of the migration process and reduce migration time. We have conducted a number of experiments to validate the proposed approach. The experimental results show that LXC containers are suitable candidates for the problem and MPTCP protocol is effective in enhancing the migration process.","PeriodicalId":6556,"journal":{"name":"2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)","volume":"73 1","pages":"31-36"},"PeriodicalIF":0.0,"publicationDate":"2017-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85801681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Theoretical, Weak and Strong Accuracy Graphs of Spectrum-Based Fault Localization Formulas 基于谱的故障定位公式的理论、弱精度图和强精度图
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC) Pub Date : 2017-07-04 DOI: 10.1109/COMPSAC.2017.239
C. M. Tang, W. Chan, Yuen-Tak Yu
{"title":"Theoretical, Weak and Strong Accuracy Graphs of Spectrum-Based Fault Localization Formulas","authors":"C. M. Tang, W. Chan, Yuen-Tak Yu","doi":"10.1109/COMPSAC.2017.239","DOIUrl":"https://doi.org/10.1109/COMPSAC.2017.239","url":null,"abstract":"Driven by the need to know which spectrum-based fault localization techniques are more effective in locating faults, many studies have sought to compare the accuracy of different formulas used in these techniques, resulting in findings of both theoretical and empirical accuracy relations of these formulas. Theoretical accuracy relations are independent of the specific programs and other settings involved, but limited by underlying assumptions and manual work in proofs. An accuracy graph can be constructed to holistically represent the proved relations. On the other hand, empirical studies are free of specific theoretical assumptions and can be highly automatable and scalable. A recent study has developed a systematic methodology based on statistical tests to reveal consistent and statistically sound empirical accuracy relations. That work has demonstrated the merits of empirical accuracy graphs in revealing relations that can be hard to prove. In this paper, we propose to use a stronger criterion for comparing formulas, describe an exploratory experiment to construct accuracy graphs based on the criterion, and report interesting relations found from the resulting accuracy graphs.","PeriodicalId":6556,"journal":{"name":"2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)","volume":"102 1","pages":"78-83"},"PeriodicalIF":0.0,"publicationDate":"2017-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79725280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Opportunities and Challenges in Designing Participant-Centric Smoking Cessation System 设计以参与者为中心的戒烟制度的机遇与挑战
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC) Pub Date : 2017-07-04 DOI: 10.1109/COMPSAC.2017.184
Moushumi Sharmin, Theodore Weber, Hillol Sarker, Nazir Saleheen, Santosh Kumar, Shameem Ahmed, M. al’Absi
{"title":"Opportunities and Challenges in Designing Participant-Centric Smoking Cessation System","authors":"Moushumi Sharmin, Theodore Weber, Hillol Sarker, Nazir Saleheen, Santosh Kumar, Shameem Ahmed, M. al’Absi","doi":"10.1109/COMPSAC.2017.184","DOIUrl":"https://doi.org/10.1109/COMPSAC.2017.184","url":null,"abstract":"Smoking is one of the most challenging behavioral health problems. In the past, failed quit attempts have been attributed to factors including stress, presence of smoking cues, and negative affect – most of which were self-reported and prone to recall-bias. The first step in designing effective smoking cessation systems is to objectively identify factors that contribute to lapse. In our research, we collected physiological data utilizing wearable sensors from a four day pre-quit, post-quit study (N=55). We also collected self-report measures (n=3120), which offer rich contextual information about users' social, emotional, geographical, and physiological conditions. Analysis of collected data informed the design of MyQuitPal, a participant-centric cessation support system, which aims to assist individuals to better understand their smoking behavior. The design of MyQuitPal is also grounded on theories of long term health-behavior change. We believe our research advances understanding of complexities and opportunities surrounding the design of smoking cessation systems.","PeriodicalId":6556,"journal":{"name":"2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)","volume":"22 1","pages":"835-844"},"PeriodicalIF":0.0,"publicationDate":"2017-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83692295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Who Should Be Selected to Perform a Task in Crowdsourced Testing? 在众包测试中应该选择谁来执行任务?
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC) Pub Date : 2017-07-04 DOI: 10.1109/COMPSAC.2017.265
Qiang Cui, Junjie Wang, Guowei Yang, Miao Xie, Qing Wang, Mingshu Li
{"title":"Who Should Be Selected to Perform a Task in Crowdsourced Testing?","authors":"Qiang Cui, Junjie Wang, Guowei Yang, Miao Xie, Qing Wang, Mingshu Li","doi":"10.1109/COMPSAC.2017.265","DOIUrl":"https://doi.org/10.1109/COMPSAC.2017.265","url":null,"abstract":"Crowdsourced testing is an emerging trend in software testing, which relies on crowd workers to accomplish test tasks. Due to the cost constraint, a test task usually involves a limited number of crowd workers. Furthermore, more workers does not necessarily result in detecting more bugs. Different workers, who may have different testing experience and expertise, may make much differences in the test outcomes. For example, some inappropriate workers may miss true bug, introduce false bugs or report duplicated bugs, which decreases the test quality. In current practice, a test task is usually dispatched in a random manner, and the quality of testing cannot be guaranteed. Therefore, it is important to select an appropriate subset of workers to perform a test task to ensure high bug detection rate. This paper introduces ExReDiv, a novel hybrid approach to select a set of workers for a test task. It consists of three key strategies: the experience strategy selects experienced workers, the relevance strategy selects workers with expertise relevant to the given test task, the diversity strategy selects diverse workers to avoid detecting duplicated bugs. We evaluate ExReDiv based on 42 test tasks from one of the largest crowdsourced testing platforms in China, and the experimental results show its effectiveness.","PeriodicalId":6556,"journal":{"name":"2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)","volume":"10 1","pages":"75-84"},"PeriodicalIF":0.0,"publicationDate":"2017-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75394348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信