ACM Transactions on Cyber-Physical Systems最新文献

筛选
英文 中文
Self-aware Power Management for Maintaining Event Detection Probability of Supercapacitor-powered Cyber-physical Systems 保持超级电容器供电网络物理系统事件检测概率的自感知功率管理
IF 2.3
ACM Transactions on Cyber-Physical Systems Pub Date : 2020-07-06 DOI: 10.1145/3375407
Ruizhi Chai, Ying Zhang, Geng Sun, Hongsheng Li
{"title":"Self-aware Power Management for Maintaining Event Detection Probability of Supercapacitor-powered Cyber-physical Systems","authors":"Ruizhi Chai, Ying Zhang, Geng Sun, Hongsheng Li","doi":"10.1145/3375407","DOIUrl":"https://doi.org/10.1145/3375407","url":null,"abstract":"In this article, the self-aware power management framework is investigated for maintaining event detection probability of supercapacitor-powered cyber-physical systems, with a radar network system as an example. Maintaining the event detection probability of the radar network is decomposed as a problem of controlling the quality of service of each network node. Then a power management method based on model predictive control and particle swarm optimization is proposed for tracking the reference quality of service of each node while satisfying the operation constraints. The effectiveness of the proposed method is demonstrated through three simulation studies that cover both single node and network scenarios. In addition, to support the proposed power management method, an online state of charge prediction method is developed for the supercapacitor. The online prediction method adopts a supercapacitor model that describes both the ohmic leakage and charge redistribution phenomena and uses online model updating to more accurately capture the supercapacitor behavior and estimate the stored energy.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2020-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1145/3375407","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48650667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Self-aware Cyber-Physical Systems 自我意识网络物理系统
IF 2.3
ACM Transactions on Cyber-Physical Systems Pub Date : 2020-06-18 DOI: 10.1145/3375716
K. Bellman, C. Landauer, N. Dutt, L. Esterle, A. Herkersdorf, A. Jantsch, N. Taherinejad, P. R. Lewis, M. Platzner, K. Tammemäe
{"title":"Self-aware Cyber-Physical Systems","authors":"K. Bellman, C. Landauer, N. Dutt, L. Esterle, A. Herkersdorf, A. Jantsch, N. Taherinejad, P. R. Lewis, M. Platzner, K. Tammemäe","doi":"10.1145/3375716","DOIUrl":"https://doi.org/10.1145/3375716","url":null,"abstract":"In this article, we make the case for the new class of Self-aware Cyber-physical Systems. By bringing together the two established fields of cyber-physical systems and self-aware computing, we aim at creating systems with strongly increased yet managed autonomy, which is a main requirement for many emerging and future applications and technologies. Self-aware cyber-physical systems are situated in a physical environment and constrained in their resources, and they understand their own state and environment and, based on that understanding, are able to make decisions autonomously at runtime in a self-explanatory way. In an attempt to lay out a research agenda, we bring up and elaborate on five key challenges for future self-aware cyber-physical systems: (i) How can we build resource-sensitive yet self-aware systems? (ii) How to acknowledge situatedness and subjectivity? (iii) What are effective infrastructures for implementing self-awareness processes? (iv) How can we verify self-aware cyber-physical systems and, in particular, which guarantees can we give? (v) What novel development processes will be required to engineer self-aware cyber-physical systems? We review each of these challenges in some detail and emphasize that addressing all of them requires the system to make a comprehensive assessment of the situation and a continual introspection of its own state to sensibly balance diverse requirements, constraints, short-term and long-term objectives. Throughout, we draw on three examples of cyber-physical systems that may benefit from self-awareness: a multi-processor system-on-chip, a Mars rover, and an implanted insulin pump. These three very different systems nevertheless have similar characteristics: limited resources, complex unforeseeable environmental dynamics, high expectations on their reliability, and substantial levels of risk associated with malfunctioning. Using these examples, we discuss the potential role of self-awareness in both highly complex and rather more simple systems, and as a main conclusion we highlight the need for research on above listed topics.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2020-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1145/3375716","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49548519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Efficient Holistic Control 有效的整体控制
IF 2.3
ACM Transactions on Cyber-Physical Systems Pub Date : 2020-06-18 DOI: 10.1145/3371500
Yehan Ma, Chenyang Lu, Yebin Wang
{"title":"Efficient Holistic Control","authors":"Yehan Ma, Chenyang Lu, Yebin Wang","doi":"10.1145/3371500","DOIUrl":"https://doi.org/10.1145/3371500","url":null,"abstract":"Industrial automation is embracing wireless sensor-actuator networks (WSANs). Despite the success of WSANs for monitoring applications, feedback control poses significant challenges due to data loss and stringent energy constraints in WSANs. Holistic control adopts a cyber-physical system approach to overcome the challenges by orchestrating network reconfiguration and process control at run time. Fundamentally, it leverages self-awareness across control and wireless boundaries to enhance the resiliency of wireless control systems. In this article, we explore efficient holistic control designs to maintain control performance while reducing the communication cost. The contributions of this work are five-fold: (1) We introduce a holistic control architecture that integrates Low-power Wireless Bus (LWB) and two control strategies, rate adaptation and self-triggered control; (2) We present heuristics-based and optimal rate selection algorithms for rate adaptation; (3) We design novel network adaptation mechanisms to support rate adaptation and self-triggered control in a multi-hop WSAN; (4) We build WCPS-RT, a real-time network-in-the-loop simulator that integrates MATLAB/Simulink and a physical WSAN testbed to evaluate wireless control systems; (5) We empirically explore the tradeoff between communication cost and control performance in holistic control approaches. Our studies show that rate adaptation and self-triggered control offer advantages in control performance and energy efficiency, respectively, in normal operating conditions. The advantage in energy efficiency of self-triggered control, however, may diminish under harsh physical and wireless conditions due to the cost of recovering from data loss and physical disturbances.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2020-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1145/3371500","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43597504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Pattern-based Interactive Configuration Derivation for Cyber-physical System Product Lines 基于模式的信息物理系统产品线交互配置派生
IF 2.3
ACM Transactions on Cyber-Physical Systems Pub Date : 2020-06-18 DOI: 10.1145/3389397
Hong Lu, T. Yue, Shaukat Ali
{"title":"Pattern-based Interactive Configuration Derivation for Cyber-physical System Product Lines","authors":"Hong Lu, T. Yue, Shaukat Ali","doi":"10.1145/3389397","DOIUrl":"https://doi.org/10.1145/3389397","url":null,"abstract":"Deriving a Cyber-Physical System (CPS) product from a product line requires configuring hundreds to thousands of configurable parameters of components and devices from multiple domains, e.g., computing, control, and communication. A fully automated configuration process for a CPS product line is seldom possible in practice, and a dynamic and interactive process is expected. Therefore, some configurable parameters are to be configured manually, and the rest can be configured either automatically or manually, depending on pre-defined constraints, the order of configuration steps, and previous configuration data in such a dynamic and interactive configuration process. In this article, we propose a pattern-based, interactive configuration derivation methodology (named as Pi-CD) to maximize opportunities of automatically deriving correct configurations of CPSs by benefiting from pre-defined constraints and configuration data of previous configuration steps. Pi-CD requires architectures of CPS product lines modeled with Unified Modeling Language extended with four types of variabilities, along with constraints specified in Object Constraint Language (OCL). Pi-CD is equipped with 324 configuration derivation patterns that we defined by systematically analyzing the OCL constructs and semantics. We evaluated Pi-CD by configuring 20 CPS products of varying complexity from two real-world CPS product lines. Results show that Pi-CD can achieve up to 72% automation degree with a negligible time cost. Moreover, its time performance remains stable with the increase in the number of configuration parameters as well as constraints.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2020-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1145/3389397","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49057076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
I Think Therefore You Are 我思故我在
IF 2.3
ACM Transactions on Cyber-Physical Systems Pub Date : 2020-06-18 DOI: 10.1145/3375403
Lukas Esterle, John N. A. Brown
{"title":"I Think Therefore You Are","authors":"Lukas Esterle, John N. A. Brown","doi":"10.1145/3375403","DOIUrl":"https://doi.org/10.1145/3375403","url":null,"abstract":"Cyber-physical systems operate in our real world, constantly interacting with the environment and collaborating with other systems. The increasing number of devices will make it infeasible to control each one individually. It will also be infeasible to prepare each of them for every imaginable rapidly unfolding situation. Therefore, we must increase the autonomy of future Cyber-physical Systems. Making these systems self-aware allows them to reason about their own capabilities and their immediate environment. In this article, we extend the idea of the self-awareness of individual systems toward networked self-awareness. This gives systems the ability to reason about how they are being affected by the actions and interactions of others within their perceived environment, as well as in the extended environment that is beyond their direct perception. We propose that different levels of networked self-awareness can develop over time in systems as they do in humans. Furthermore, we propose that this could have the same benefits for networks of systems that it has had for communities of humans, increasing performance and adaptability.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2020-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1145/3375403","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48287201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
MC-Safe MC安全
IF 2.3
ACM Transactions on Cyber-Physical Systems Pub Date : 2020-06-18 DOI: 10.1145/3394961
Yunhao Bai, Kuangyu Zheng, Zejiang Wang, Xiaorui Wang, Junmin Wang
{"title":"MC-Safe","authors":"Yunhao Bai, Kuangyu Zheng, Zejiang Wang, Xiaorui Wang, Junmin Wang","doi":"10.1145/3394961","DOIUrl":"https://doi.org/10.1145/3394961","url":null,"abstract":"In a Vehicular Cyber Physical System (VCPS), ensuring the real-time delivery of safety messages is an important research problem for Vehicle to Vehicle (V2V) communication. Unfortunately, existing work relies only on one or two pre-selected control channels for safety message communication, which can result in poor packet delivery and potential accident when the vehicle density is high. If all the available channels can be dynamically utilized when the control channel is having severe contention, then safety messages can have a much better chance to meet their real-time deadlines. In this article, we propose MC-Safe, a multi-channel V2V communication framework that monitors all the available channels and dynamically selects the best one for safety message transmission. During normal driving, MC-Safe monitors periodic beacons sent by other vehicles and estimates the communication delay on all the channels. Upon the detection of a potential accident, MC-Safe leverages a novel channel negotiation scheme that allows all the involved vehicles to work collaboratively, in a distributed manner, for identifying a communication channel that meets the delay requirement. MC-safe also features a novel coordinator selection algorithm that minimizes the delay of channel negotiation. Once a channel is selected, all the involved vehicles switch to the same selected channel for real-time communication with the least amount of interference. Our evaluation results both in simulation and on a hardware testbed with scaled cars show that MC-Safe outperforms existing single-channel solutions and other well-designed multi-channel baselines by having a 23.4% lower packet delay on average compared with other well-designed channel selection baselines.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2020-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1145/3394961","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47495010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Gordian 棘手的
IF 2.3
ACM Transactions on Cyber-Physical Systems Pub Date : 2020-06-18 DOI: 10.1145/3386568
Matthew Weber, Baihong Jin, Gil Lederman, Yasser Shoukry, Edward A. Lee, S. Seshia, A. Sangiovanni-Vincentelli
{"title":"Gordian","authors":"Matthew Weber, Baihong Jin, Gil Lederman, Yasser Shoukry, Edward A. Lee, S. Seshia, A. Sangiovanni-Vincentelli","doi":"10.1145/3386568","DOIUrl":"https://doi.org/10.1145/3386568","url":null,"abstract":"Accurate localization from Cyber-Physical Systems (CPS) is a critical enabling technology for context-aware applications and control. As localization plays an increasingly safety-critical role, location systems must be able to identify and eliminate faulty measurements to prevent dangerously inaccurate localization. In this article, we consider the range-based localization problem and propose a method to detect coordinated adversarial corruption on anchor positions and distance measurements. Our algorithm, Gordian, rapidly finds attacks by identifying geometric inconsistencies at the graph level without requiring assumptions about hardware, ranging mechanisms, or cryptographic protocols. We give necessary conditions for which attack detection is guaranteed to be successful in the noiseless case, and we use that intuition to extend Gordian to the noisy case where fewer guarantees are possible. In simulations generated from real-world sensor noise, we empirically show that Gordian’s trilateration counterexample generation procedure enables rapid attack detection even for combinatorially difficult problems.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2020-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89094125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Runtime Adaptation in Wireless Sensor Nodes Using Structured Learning 基于结构化学习的无线传感器节点运行时自适应
IF 2.3
ACM Transactions on Cyber-Physical Systems Pub Date : 2020-06-15 DOI: 10.1145/3372153
A. Sapio, S. Bhattacharyya, M. Wolf
{"title":"Runtime Adaptation in Wireless Sensor Nodes Using Structured Learning","authors":"A. Sapio, S. Bhattacharyya, M. Wolf","doi":"10.1145/3372153","DOIUrl":"https://doi.org/10.1145/3372153","url":null,"abstract":"Markov Decision Processes (MDPs) provide important capabilities for facilitating the dynamic adaptation and self-optimization of cyber physical systems at runtime. In recent years, this has primarily taken the form of Reinforcement Learning (RL) techniques that eliminate some MDP components for the purpose of reducing computational requirements. In this work, we show that recent advancements in Compact MDP Models (CMMs) provide sufficient cause to question this trend when designing wireless sensor network nodes. In this work, a novel CMM-based approach to designing self-aware wireless sensor nodes is presented and compared to Q-Learning, a popular RL technique. We show that a certain class of CPS nodes is not well served by RL methods and contrast RL versus CMM methods in this context. Through both simulation and a prototype implementation, we demonstrate that CMM methods can provide significantly better runtime adaptation performance relative to Q-Learning, with comparable resource requirements.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2020-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1145/3372153","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48069251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
CANOA: CAN Origin Authentication Through Power Side-Channel Monitoring CANOA:通过电源侧通道监控进行CAN起源认证
IF 2.3
ACM Transactions on Cyber-Physical Systems Pub Date : 2020-06-12 DOI: 10.1145/3571288
Shailja Thakur, Carlos Moreno, S. Fischmeister
{"title":"CANOA: CAN Origin Authentication Through Power Side-Channel Monitoring","authors":"Shailja Thakur, Carlos Moreno, S. Fischmeister","doi":"10.1145/3571288","DOIUrl":"https://doi.org/10.1145/3571288","url":null,"abstract":"The lack of any sender authentication mechanism in place makes Controller Area Network (CAN) vulnerable to security threats. For instance, an attacker can impersonate an Electronic Control Unit (ECU) on the bus and send spoofed messages unobtrusively with the identifier of the impersonated ECU. To address this problem, we propose a novel source authentication technique that uses power consumption measurements of the ECU to authenticate the source of a message. A transmission of an ECU affects the power consumption and a characteristic pattern will appear. Our technique exploits the power consumption of each ECU during the transmission of a message to determine whether the message actually originated from the purported sender. We evaluate our approach in both a lab setup and a real vehicle. We also evaluate our approach against factors that can impact the power consumption measurement of the ECU. The results of the evaluation show that the proposed technique is applicable in a broad range of operating conditions with reasonable computational power requirements and attaining good accuracy.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2020-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49519523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
HUCDO: A Hybrid User-centric Data Outsourcing Scheme 以用户为中心的混合数据外包方案
IF 2.3
ACM Transactions on Cyber-Physical Systems Pub Date : 2020-05-25 DOI: 10.1145/3379464
Ke Huang, Xiaosong Zhang, Xiaofeng Wang, Y. Mu, F. Rezaeibagha, Guangquan Xu, Hao Wang, Xi Zheng, Guomin Yang, Qi Xia, Xiaojiang Du
{"title":"HUCDO: A Hybrid User-centric Data Outsourcing Scheme","authors":"Ke Huang, Xiaosong Zhang, Xiaofeng Wang, Y. Mu, F. Rezaeibagha, Guangquan Xu, Hao Wang, Xi Zheng, Guomin Yang, Qi Xia, Xiaojiang Du","doi":"10.1145/3379464","DOIUrl":"https://doi.org/10.1145/3379464","url":null,"abstract":"Outsourcing helps relocate data from the cyber-physical system (CPS) for efficient storage at low cost. Current server-based outsourcing mainly focuses on the benefits of servers. This cannot attract users well, as their security, efficiency, and economy are not guaranteed. To solve with this issue, a hybrid outsourcing model that exploits both cloud server and edge devices to store data is needed. Meanwhile, the requirements of security and efficiency are different under specific scenarios. There is a lack of a comprehensive solution that considers all of the above issues. In this work, we overcome the above issues by proposing the first hybrid user-centric data outsourcing (HUCDO) scheme. It allows users to outsource data securely, efficiently, and economically via different CPSs. Brielly, our contributions consist of theories, implementations, and evaluations. Our theories include the first homomorphic collision-resistant chameleon hash (HCCH) and homomorphic designated-receiver signcryption (HDRS). As implementations, we instantiate how to use our proposals to outsource small- or large-scale data through distinct CPS, respectively. Additionally, a blockchain with proof-of-discrete-logarithm (B-PoDL) is instantiated to help improve our performance. Last, as demonstrated by our evaluations, our proposals are secure, efficient, and economic for users to implement while outsourcing their data via CPSs.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2020-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1145/3379464","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"64026470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信