ACM Transactions on Design Automation of Electronic Systems (TODAES)最新文献

筛选
英文 中文
Increasing the Fault Coverage of a Truncated Test Set 增加截断测试集的故障覆盖率
I. Pomeranz
{"title":"Increasing the Fault Coverage of a Truncated Test Set","authors":"I. Pomeranz","doi":"10.1145/3508459","DOIUrl":"https://doi.org/10.1145/3508459","url":null,"abstract":"Defect-aware, cell-aware, and gate-exhaustive faults are described by input patterns of subcircuits or cells that are expected to activate defects. Even with single-cycle faults, an ( n ) -input subcircuit can have up to ( 2^n ) faults with unique fault detection conditions, resulting in a large test set. Such a test set may have to be truncated to fit in the tester memory or satisfy constraints on test application time. In this case, a loss of fault coverage is inevitable. This article considers the test set denoted by ( T_1 ) obtained after truncating a larger test set denoted by ( T_0 ) . Suppose that the truncation reduces the set of detected faults from the set denoted by ( D_0 ) to the set denoted by ( D_1 ) . The procedure described in this article modifies the tests in ( T_1 ) to gain the detection of faults from ( D_0 ) ( setminus ) ( D_1 ) , even at the cost of losing the detection of faults from ( D_1 ) . The goal is to reduce the fault coverage loss by computing a test set denoted by ( T_2 ) that detects a set of faults denoted by ( D_2 ) such that ( |T_2| = |T_1| ) and ( |D_2| gt |D_1| ) . Experimental results for benchmark circuits demonstrate the ability of the procedure to increase the coverage of gate-exhaustive faults over several iterations.","PeriodicalId":6933,"journal":{"name":"ACM Transactions on Design Automation of Electronic Systems (TODAES)","volume":"80 1","pages":"1 - 16"},"PeriodicalIF":0.0,"publicationDate":"2022-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85586799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Layout Hotspot Detection via Neural Architecture Search 基于神经结构搜索的高效布局热点检测
Yiyang Jiang, Fan Yang, Bei Yu, Dian Zhou, Xuan Zeng
{"title":"Efficient Layout Hotspot Detection via Neural Architecture Search","authors":"Yiyang Jiang, Fan Yang, Bei Yu, Dian Zhou, Xuan Zeng","doi":"10.1145/3517130","DOIUrl":"https://doi.org/10.1145/3517130","url":null,"abstract":"Layout hotspot detection is of great importance in the physical verification flow. Deep neural network models have been applied to hotspot detection and achieved great success. Despite their success, high-performance neural networks are still quite difficult to design. In this article, we propose a bayesian optimization-based neural architecture search scheme to automatically do this time-consuming and fiddly job. Experimental results on ICCAD 2012 and ICCAD 2019 Contest benchmarks show that the architectures designed by our proposed scheme achieve higher performance on hotspot detection task compared with state-of-the-art manually designed neural networks.","PeriodicalId":6933,"journal":{"name":"ACM Transactions on Design Automation of Electronic Systems (TODAES)","volume":"47 1","pages":"1 - 16"},"PeriodicalIF":0.0,"publicationDate":"2022-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80665484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Toward a Human-Readable State Machine Extraction 面向人类可读状态机提取
M. Brunner, Alexander Hepp, Johanna Baehr, G. Sigl
{"title":"Toward a Human-Readable State Machine Extraction","authors":"M. Brunner, Alexander Hepp, Johanna Baehr, G. Sigl","doi":"10.1145/3513086","DOIUrl":"https://doi.org/10.1145/3513086","url":null,"abstract":"The target of sequential reverse engineering is to extract the state machine of a design. Sequential reverse engineering of a gate-level netlist consists of the identification of so-called state flip-flops (sFFs), as well as the extraction of the state machine. The second step can be solved with an exact approach if the correct sFFs and the correct reset state are provided. For the first step, several more or less heuristic approaches exist. This work investigates sequential reverse engineering with the objective of a human-readable state machine extraction. A human-readable state machine reflects the original state machine and is not overloaded by additional design information. For this purpose, the work derives a systematic categorization of sFF sets, based on properties of single sFFs and their sets. These properties are determined by analyzing the degrees of freedom in describing state machines as the well-known Moore and Mealy machines. Based on the systematic categorization, this work presents an sFF set definition for a human-readable state machine, categorizes existing sFF identification strategies, and develops four post-processing methods. The results show that post-processing predominantly improves the outcome of several existing sFF identification algorithms.","PeriodicalId":6933,"journal":{"name":"ACM Transactions on Design Automation of Electronic Systems (TODAES)","volume":"116 1","pages":"1 - 31"},"PeriodicalIF":0.0,"publicationDate":"2022-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89572593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Breaking the Design and Security Trade-off of Look-up-table–based Obfuscation 打破基于查找表的混淆的设计和安全权衡
Gaurav Kolhe, T. Sheaves, S. D, H. Mahmoodi, S. Rafatirad, Avesta Sasan, H. Homayoun
{"title":"Breaking the Design and Security Trade-off of Look-up-table–based Obfuscation","authors":"Gaurav Kolhe, T. Sheaves, S. D, H. Mahmoodi, S. Rafatirad, Avesta Sasan, H. Homayoun","doi":"10.1145/3510421","DOIUrl":"https://doi.org/10.1145/3510421","url":null,"abstract":"Logic locking and Integrated Circuit (IC) camouflaging are the most prevalent protection schemes that can thwart most hardware security threats. However, the state-of-the-art attacks, including Boolean Satisfiability (SAT) and approximation-based attacks, question the efficacy of the existing defense schemes. Recent obfuscation schemes have employed reconfigurable logic to secure designs against various hardware security threats. However, they have focused on specific design elements such as SAT hardness. Despite meeting the focused criterion such as security, obfuscation incurs additional overheads, which are not evaluated in the present works. This work provides an extensive analysis of Look-up-table (LUT)–based obfuscation by exploring several factors such as LUT technology, size, number of LUTs, and replacement strategy as they have a substantial influence on Power-Performance-Area (PPA) and Security (PPA/S) of the design. We show that using large LUT makes LUT-based obfuscation resilient to hardware security threats. However, it also results in enormous design overheads beyond practical limits. To make the reconfigurable logic obfuscation efficient in terms of design overheads, this work proposes a novel LUT architecture where the security provided by the proposed primitive is superior to that of the traditional LUT-based obfuscation. Moreover, we leverage the security-driven design flow, which uses off-the-shelf industrial EDA tools to mitigate the design overheads further while being non-disruptive to the current industrial physical design flow. We empirically evaluate the security of the LUTs against state-of-the-art obfuscation techniques in terms of design overheads and SAT-attack resiliency. Our findings show that the proposed primitive significantly reduces both area and power by a factor of 8 ( times ) and 2 ( times ) , respectively, without compromising security.","PeriodicalId":6933,"journal":{"name":"ACM Transactions on Design Automation of Electronic Systems (TODAES)","volume":"61 1","pages":"1 - 29"},"PeriodicalIF":0.0,"publicationDate":"2022-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74482900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Learning from the Past: Efficient High-level Synthesis Design Space Exploration for FPGAs 从过去学习:fpga高效的高级综合设计空间探索
Z. Wang, B. C. Schafer
{"title":"Learning from the Past: Efficient High-level Synthesis Design Space Exploration for FPGAs","authors":"Z. Wang, B. C. Schafer","doi":"10.1145/3495531","DOIUrl":"https://doi.org/10.1145/3495531","url":null,"abstract":"The quest to democratize the use of Field-Programmable Gate Arrays (FPGAs) has given High-Level Synthesis (HLS) the final push to be widely accepted with FPGA vendors strongly supporting this VLSI design methodology to expand the FPGA user base. HLS takes as input an untimed behavioral description and generates efficient RTL (Verilog or VHDL). One major advantage of HLS is that it allows us to generate a variety of different micro-architectures from the same behavioral description by simply specifying different combination of synthesis options. In particular, commercial HLS tools make extensive use of synthesize directives in the form pragmas. This strength is also a weakness as it forces HLS users to fully understand how these synthesis options work and how they interact to efficiently set them to get a hardware implementation with the desired characteristics. Luckily, this process can be automated. Unfortunately, the search space grows supra-linearly with the number of synthesis options. To address this, this work proposes an automatic synthesis option tuner dedicated for FPGAs. We have explored a larger number of behavioral descriptions targeting ASICs and FPGAs and found out that due to the internal structure of the FPGA a large number of synthesis options combinations never lead to a Pareto-optimal design and, hence, the search space can be drastically reduced. Moreover, we make use of large database of DSE results that we have generated since we started working in this field to further accelerate the exploration process. For this, we use a technique based on perceptual hashing that allows our proposed explorer to recognize similar program structures in the new description to be explored and match them with structures in our database. This allows us to directly retrieve the pragma settings that lead to Pareto-optimal configurations. Experimental results show that the search space can be accelerated substantially while leading to finding most of the Pareto-optimal designs.","PeriodicalId":6933,"journal":{"name":"ACM Transactions on Design Automation of Electronic Systems (TODAES)","volume":"30 1","pages":"1 - 23"},"PeriodicalIF":0.0,"publicationDate":"2022-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81815017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Survey on Security of Digital Microfluidic Biochips: Technology, Attack, and Defense 数字微流控生物芯片的安全性研究:技术、攻击与防御
Wenzhong Guo, Sihuang Lian, Chen Dong, Zhenyi Chen, Xing Huang
{"title":"A Survey on Security of Digital Microfluidic Biochips: Technology, Attack, and Defense","authors":"Wenzhong Guo, Sihuang Lian, Chen Dong, Zhenyi Chen, Xing Huang","doi":"10.1145/3494697","DOIUrl":"https://doi.org/10.1145/3494697","url":null,"abstract":"As an emerging lab-on-a-chip technology platform, digital microfluidic biochips (DMFBs) have been widely used for executing various laboratory procedures in biochemistry and biomedicine such as gene sequencing and near-patient diagnosis, with the advantages of low reagent consumption, high precision, and miniaturization and integration. With the ongoing rapid deployment of DMFBs, however, these devices are now facing serious and complicated security challenges that not only damage their functional integrity but also affect their system reliability. In this article, we present a systematic review of DMFB security, focusing on both the state-of-the-art attack and defense techniques. First, the overall security situation, the working principle, and the corresponding fabrication technology of DMFBs are introduced. Afterwards, existing attack approaches are divided into several categories and discussed in detail, including denial of service, intellectual property piracy, bioassay tampering, layout modification, actuation sequence tampering, concentration altering, parameter modification, reading forgery, and information leakage. To prevent biochips from being damaged by these attack behaviors, a number of defense measures have been proposed in recent years. Accordingly, we further classify these techniques into three categories according to their respective defense purposes, including confidentiality protection, integrity protection, and availability protection. These measures, to varying degrees, can provide effective protection for DMFBs. Finally, key trends and directions for future research that are related to the security of DMFBs are discussed from several aspects, e.g., manufacturing materials, biochip structure, and usage environment, thus providing new ideas for future biochip protection.","PeriodicalId":6933,"journal":{"name":"ACM Transactions on Design Automation of Electronic Systems (TODAES)","volume":"38 1","pages":"1 - 33"},"PeriodicalIF":0.0,"publicationDate":"2022-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80952900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Introduction to the Special Issue on Approximate Systems 近似系统专刊导论
Armin Alaghi, Eva Darulova, A. Gerstlauer, Phillip Stanley-Marbell
{"title":"Introduction to the Special Issue on Approximate Systems","authors":"Armin Alaghi, Eva Darulova, A. Gerstlauer, Phillip Stanley-Marbell","doi":"10.1145/3488726","DOIUrl":"https://doi.org/10.1145/3488726","url":null,"abstract":"Resource efficiency is becoming an increasingly important challenge for many important applications that at the same time have nondeterministic specifications or are robust to noise in their execution. While trading correctness for efficiency has been part of computing since the early days, it has seen renewed interest in the past decade under the name Approximate Computing. A variety of techniques have been developed for applying and controlling approximations and the errors they introduce at different levels of the compute stack, from circuit to architectures and applications. However, most of these techniques have been applied in isolation at one level of the stack, making simplified assumptions about the other levels. This special issue on Approximate Systems focuses on concepts and methods for applying approximate computing principles end-toend across the compute stack. The idea for this special issue originated at a workshop on “Theory and Practice for ErrorEfficient Computing Systems” held in 2017 as well as a recent followup Dagstuhl seminar on Approximate Systems held in 2021. In response to our call for papers released in early 2021, we received 21 submissions, of which 16 were selected for an accelerated review and revision process. This special issue collects the final 7 accepted articles covering a wide range of topics at all levels of the computing stack ranging from applicationand algorithm-level approximations and adaptive application frameworks to approximation-aware hardware synthesis and custom hardware and memory system design all the way to approximations in optical interconnect. The articles presented in this special issue are aimed at providing a broad systems perspective beyond a single isolated domain to stimulate discussion and development of novel cross-layer approaches for end-to-end approximate system design. The first article, “Towards Fine-grained Online Adaptive Approximation Control for Dense SLAM on Embedded GPUs,” exploits the fact that simultaneous localization and mapping (SLAM) algorithms often have an internal probe to measure how good they are estimating the location and the map of the surroundings. This internal probe is subsequently used in a feedback loop to adaptively tune the approximation knobs and save energy without compromising the accuracy of SLAM. Next, “ParTBC: Faster Estimation of Top-k Betweenness Centrality Vertices on GPU” shows how to use controlled approximation to identify the k most important vertices in a graph faster and with small inaccuracy, leveraging both algorithm insights and executions targeting GPUs. “An Adaptive Application Framework with Customizable Quality Metrics” proposes a novel graph representation to allow users to define higher-level customized notions of quality that are used at runtime to select a configuration with maximal quality while respecting a resource budget.","PeriodicalId":6933,"journal":{"name":"ACM Transactions on Design Automation of Electronic Systems (TODAES)","volume":"3 1","pages":"1 - 2"},"PeriodicalIF":0.0,"publicationDate":"2022-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76745627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sherlock: A Multi-Objective Design Space Exploration Framework Sherlock:一个多目标设计空间探索框架
Q. Gautier, Alric Althoff, C. Crutchfield, R. Kastner
{"title":"Sherlock: A Multi-Objective Design Space Exploration Framework","authors":"Q. Gautier, Alric Althoff, C. Crutchfield, R. Kastner","doi":"10.1145/3511472","DOIUrl":"https://doi.org/10.1145/3511472","url":null,"abstract":"Design space exploration (DSE) provides intelligent methods to tune the large number of optimization parameters present in modern FPGA high-level synthesis tools. High-level synthesis parameter tuning is a time-consuming process due to lengthy hardware compilation times—synthesizing an FPGA design can take tens of hours. DSE helps find an optimal solution faster than brute-force methods without relying on designer intuition to achieve high-quality results. Sherlock is a DSE framework that can handle multiple conflicting optimization objectives and aggressively focuses on finding Pareto-optimal solutions. Sherlock integrates a model selection process to choose the regression model that helps reach the optimal solution faster. Sherlock designs a strategy based around the multi-armed bandit problem, opting to balance exploration and exploitation based on the learned and expected results. Sherlock can decrease the importance of models that do not provide correct estimates, reaching the optimal design faster. Sherlock is capable of tailoring its choice of regression models to the problem at hand, leading to a model that best reflects the application design space. We have tested the framework on a large dataset of FPGA design problems and found that Sherlock converges toward the set of optimal designs faster than similar frameworks.","PeriodicalId":6933,"journal":{"name":"ACM Transactions on Design Automation of Electronic Systems (TODAES)","volume":"33 1","pages":"1 - 20"},"PeriodicalIF":0.0,"publicationDate":"2022-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78623699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Hierarchical Scheduling of an SDF/L Graph onto Multiple Processors SDF/L图在多处理器上的分层调度
M. Oldja, Jangryul Kim, Dowhan Jeong, S. Ha
{"title":"Hierarchical Scheduling of an SDF/L Graph onto Multiple Processors","authors":"M. Oldja, Jangryul Kim, Dowhan Jeong, S. Ha","doi":"10.1145/3489469","DOIUrl":"https://doi.org/10.1145/3489469","url":null,"abstract":"Although dataflow models are known to thrive at exploiting task-level parallelism of an application, it is difficult to exploit the parallelism of data, represented well with loop structures, since these structures are not explicitly specified in existing dataflow models. SDF/L model overcomes this shortcoming by specifying the loop structures explicitly in a hierarchical fashion. We introduce a scheduling technique of an application represented by the SDF/L model onto heterogeneous processors. In the proposed method, we explore the mapping of tasks using an evolutionary meta-heuristic and schedule hierarchically in a bottom-up fashion, creating parallel loop schedules at lower levels first and then re-using them when constructing the schedule at a higher level. The efficiency of the proposed scheduling methodology is verified with benchmark examples and randomly generated SDF/L graphs.","PeriodicalId":6933,"journal":{"name":"ACM Transactions on Design Automation of Electronic Systems (TODAES)","volume":"108 1","pages":"1 - 23"},"PeriodicalIF":0.0,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79061329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic Mapping of the Best-Suited DNN Pruning Schemes for Real-Time Mobile Acceleration 实时移动加速中最适合DNN修剪方案的自动映射
Yifan Gong, Geng Yuan, Zheng Zhan, Wei Niu, Zhengang Li, Pu Zhao, Yuxuan Cai, Sijia Liu, Bin Ren, Xue Lin, Xulong Tang, Yanzhi Wang
{"title":"Automatic Mapping of the Best-Suited DNN Pruning Schemes for Real-Time Mobile Acceleration","authors":"Yifan Gong, Geng Yuan, Zheng Zhan, Wei Niu, Zhengang Li, Pu Zhao, Yuxuan Cai, Sijia Liu, Bin Ren, Xue Lin, Xulong Tang, Yanzhi Wang","doi":"10.1145/3495532","DOIUrl":"https://doi.org/10.1145/3495532","url":null,"abstract":"Weight pruning is an effective model compression technique to tackle the challenges of achieving real-time deep neural network (DNN) inference on mobile devices. However, prior pruning schemes have limited application scenarios due to accuracy degradation, difficulty in leveraging hardware acceleration, and/or restriction on certain types of DNN layers. In this article, we propose a general, fine-grained structured pruning scheme and corresponding compiler optimizations that are applicable to any type of DNN layer while achieving high accuracy and hardware inference performance. With the flexibility of applying different pruning schemes to different layers enabled by our compiler optimizations, we further probe into the new problem of determining the best-suited pruning scheme considering the different acceleration and accuracy performance of various pruning schemes. Two pruning scheme mapping methods—one -search based and the other is rule based—are proposed to automatically derive the best-suited pruning regularity and block size for each layer of any given DNN. Experimental results demonstrate that our pruning scheme mapping methods, together with the general fine-grained structured pruning scheme, outperform the state-of-the-art DNN optimization framework with up to 2.48 ( times ) and 1.73 ( times ) DNN inference acceleration on CIFAR-10 and ImageNet datasets without accuracy loss.","PeriodicalId":6933,"journal":{"name":"ACM Transactions on Design Automation of Electronic Systems (TODAES)","volume":"5 1","pages":"1 - 26"},"PeriodicalIF":0.0,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88614592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信