施字五行属什么| tfboys什么意思| 胎儿生物物理评分8分什么意思| 新生儿什么时候上户口| 吃什么可以祛痘排毒| 为什么冬吃萝卜夏吃姜| 穷是什么意思| 涟漪什么意思| 秦皇岛是什么海| 人为什么要工作| 微波炉什么牌子好| 昂热为什么认识路鸣泽| 李子有什么营养| 小叶增生吃什么药| 守株待兔是什么意思| 喜面是什么意思| 7月中旬是什么时候| 业障什么意思| b票能开什么车| 身上长水泡是什么原因| 鱼皮是什么鱼的皮| 三高不能吃什么食物| 口腔溃疡吃什么药好使| 梦见自己和别人结婚是什么意思| 农历5月20日是什么星座| 文雅是什么意思| 肌肉拉伤是什么感觉| 什么是僵尸恒星| 人体缺钾会有什么症状| buffalo是什么牌子| 湿毒吃什么药最有效| 梦见墓碑是什么意思| fredperry是什么牌子| 健康是什么意思| 大黄泡水喝有什么功效| 农历8月15是什么节日| 瞳孔是什么| 8.11是什么星座| pn医学上是什么意思| 豺狼虎豹为什么豺第一| 扁桃体割了对身体有什么影响| 冒菜为什么叫冒菜| 黄瓜什么时候种| 头晕出汗是什么原因| 眼睛酸疼是什么原因| 懒羊羊的什么| 用什么泡脚减肥最快| 子午流注是什么意思| 乳腺3类是什么意思| 查血型挂什么科| 吃什么调理卵巢早衰| 男人好难做人好难是什么歌| 扁平疣用什么药膏| 白头发多是什么原因| 腿弯处的筋痛是什么原因| 优字五行属什么| 黑油是什么油| 兰州大学什么专业最好| 长期上夜班对身体有什么危害| 泌尿内科主要看什么病| aoerbo是什么牌子的手表| 发福是什么意思| 每天流鼻血是什么原因| 放低姿态是什么意思| 无偿献血有什么待遇| 阑尾疼吃什么药| ori是什么意思| 工作性质是什么| 白头发吃什么维生素能变黑| 康复治疗学什么| 籍贯填写什么| 牡丹花什么季节开| 胎儿头围偏大什么原因| 龙涎香是什么| 盐糖水有什么功效作用| 3月10日什么星座| 芳菲是什么意思| 屈光检查是什么| 十一月九号是什么星座| 做梦手机坏了什么预兆| 女人为什么要少吃鳝鱼| 萧墙是什么意思| 年轻人头晕是什么原因| 心花怒放是什么生肖| 特别容易饿是什么原因| 茉莉毛尖属于什么茶| 九一年属什么生肖| 为什么一分钟就出来了| 白细胞多是什么原因| model是什么牌子| 五行缺什么怎么查询| 验孕棒两条杠什么意思| 血糖仪什么牌子好| 相宜的意思是什么| 口腔疱疹用什么药| 什么地唱| 口淡无味是什么原因| 肩膀酸胀是什么原因| 甲状腺在人体什么位置| 珀莱雅属于什么档次| 口苦尿黄是什么原因| 吃什么对血栓好| 吃什么提高免疫力| 口腔溃疡缺乏什么维生素| 坐骨神经痛吃什么药好得快| 鹦鹉喜欢吃什么食物| 1993年五行属什么| 垮掉是什么意思| 什么是种草| 球蛋白偏高是什么原因| 阴血是什么| 经常感冒发烧是什么原因| 乳腺瘤不能吃什么| 女人做梦梦到蛇是什么意思| 身上很痒是什么原因| 普洱茶有什么功效与作用| 右脸麻木是什么原因| 淋巴滤泡增生吃什么药| 为什么会长智齿| 倒斗是什么意思| 什么叫手足口病| 精忠报国是什么生肖| 白色配什么颜色好看| 油腔滑调指什么生肖| 左脚麻是什么原因| 二氧化硅是什么东西| 漂发是什么意思| 树膏皮是什么皮| 10月10是什么星座| 毛周角化症用什么药膏| 为什么做噩梦| 椎体楔形变是什么意思| 玺是什么意思| 西太后手表什么档次| 黄芪煲汤和什么搭配| 夏天吃什么好| 亲家母是什么意思| 丹宁蓝是什么颜色| 巴基斯坦人说什么语言| 头疼是什么原因引起| 菠菜吃多了有什么害处| 益生菌治什么病| 烧心吃什么| 藩王是什么意思| 单纯性肥胖是什么意思| 物上代位性是什么意思| 百家姓第一个姓是什么| 什么是疣| 手抖是什么症状| 小三是什么意思| 早上喝一杯温开水有什么好处| 什么情况下会得甲亢| 马路上的菱形标志是什么意思| 狗头军师什么意思| 蜈蚣长什么样| 中医四诊是什么| 处女座女和什么星座最配| 排骨炖什么| 产后抑郁一般发生在产后什么时间| 霍山石斛有什么作用| 大腿内侧疼痛什么原因| 虾青素是什么| 打粉是什么意思| 孕妇吃什么对胎儿好| 南京有什么特产| 男性前列腺炎吃什么药| 小号避孕套是什么尺寸| 手指没有月牙是什么原因| 九锡是什么意思| 烂嘴是什么原因| 红色加黄色是什么颜色| tct是什么检查| 咕噜是什么意思| hp是什么牌子的电脑| 善莫大焉是什么意思| 女人性冷淡吃什么药效果好| 弯刀裤适合什么人穿| 有毒是什么意思| 幼儿急疹是什么原因引起的| 湿气太重了吃什么药| 春天都有什么花开| 马上风是什么意思| 保底工资是什么意思| 为什么三角形具有稳定性| 寄生虫吃什么药可以杀死| 胃热是什么原因| 吃什么水果变白| 床咚是什么意思啊| 扒皮鱼是什么鱼| 雪纳瑞什么颜色最贵| 胆囊病变是什么意思| 胃炎应该吃什么药| 柳絮吃了有什么好处| 鲤鱼打挺是什么意思| 怀孕会出现什么状况| 当归不能和什么一起吃| 晚上睡觉小腿抽筋是什么原因| 耳朵闷闷的堵住的感觉是什么原因| 男人时间短吃什么药| 心什么肉什么| 主张是什么意思| 女性白带多吃什么药| 尿酸吃什么药| 83年属什么| 稀饭配什么菜好吃| 胎盘长什么样子图片| 下套什么意思| 心肌缺血用什么药效果最好| 世界上最贵的东西是什么| 去疤痕挂什么科| 什么病不能吃鲤鱼| 六六大顺是什么生肖| 汗毛旺盛是什么原因| 南瓜和窝瓜有什么区别| 满目苍夷是什么意思| 低钾血症是什么病| 什么马| 锡是什么金属| 没腿毛的男人代表什么| 车加昆念什么| 白茶什么样的好| 荨麻疹吃什么食物好| 果丹皮是用什么做的| 感觉不到饿是什么原因| 内分泌代谢科是看什么病的| o型血与b型血生的孩子是什么血型| 吃什么容易长高| 过敏擦什么药膏好得快| 茶寿为什么是108岁| 大红袍属于什么档次| 眼角红肿用什么药| nadh是什么| 老生常谈是什么意思| 小粉是什么粉| 聘书是什么| 什么头什么向| 农历5月是什么星座| 3月27号是什么星座| 觉得什么| 评头论足什么意思| 血糖和血脂有什么区别| 耳机戴久了有什么危害| 什么和什么丽| 上钟什么意思| 喝什么可以减肥瘦肚子| 梦见大黑蛇是什么预兆| 蒲公英泡水喝有什么副作用| 破鞋是什么意思啊| 梦见洗鞋子是什么意思| 副团长是什么军衔| 硝苯地平是什么药| 丹毒是什么原因引起的| 乳酸杆菌是什么| 挑眉是什么意思| 梦见自己给别人钱是什么意思| 舌苔黄腻是什么原因| 阳历3月是什么星座| 近亲结婚生的孩子会得什么病| 12.29是什么星座| 保税区什么意思| 记性越来越差是什么原因| 枸杞子泡茶喝有什么好处| 什么时候泡脚效果最好| 二级医院是什么意思| 百度

Volume 23, Issue 3

Special Issue on WebAssembly




WebAssembly: Yes, but for What?

  Andy Wingo

WebAssembly: Yes, but for What? The keys to a successful Wasm deployment

WebAssembly (Wasm) has found a niche but not yet filled its habitable space. What is it that makes for a successful deployment? WebAssembly turns 10 this year, but in the words of William Gibson, we are now as ever in the unevenly distributed future. Here, we look at early Wasm wins and losses, identify winning patterns, and extract commonalities between these patterns. From those, we predict the future, suggesting new areas where Wasm will find purchase in the next two to three years.

Web Development




WebAssembly: How Low Can a Bytecode Go?

  Ben Titzer

New performance and capabilities

WebAssembly: How Low Can a Bytecode Go? Wasm is still growing with new features to address performance gaps as well as recurring pain points for both languages and embedders. Wasm has a wide set of use cases outside of the web, with applications from cloud/edge computing to embedded and cyber-physical systems, databases, application plug-in systems, and more. With a completely open and rigorous specification, it has unlocked a plethora of exciting new systems that use Wasm to bring programmability large and small. With many languages and many targets, Wasm could one day become the universal execution format for compiled applications.

Web Development




When Is WebAssembly Going to Get DOM Support?

  Daniel Ehrenberg

Or, how I learned to stop worrying and love glue code

When Is WebAssembly Going to Get DOM Support? What should be relevant for working software developers is not, "Can I write pure Wasm and have direct access to the DOM while avoiding touching any JavaScript ever?" Instead, the question should be, "Can I build my C#/Go/Python library/app into my website so it runs with good performance?" Nobody is going to want to write that bytecode directly, even if some utilities are added to make it easier to access the DOM. WebAssembly should ideally be an implementation detail that developers don't have to think about. While this isn't quite the case today, the thesis of Wasm is, and must be, that it's okay to have a build step.

Web Development




Concurrency in WebAssembly

  Conrad Watt

Experiments in the web and beyond

Concurrency in WebAssembly Mismatches between the interfaces promised to programmers by source languages and the capabilities of the underlying web platform are a constant trap in compiling to Wasm. Even simple examples such as a C program using the language's native file-system API present difficulties. Often such gaps can be papered over by the compilation toolchain somewhat automatically, without the developer needing to know all of the details so long as their code runs correctly end to end. This state of affairs is strained to its limits when compiling programs for the web that use multicore concurrency features. This article aims to describe how concurrent programs are compiled to Wasm today given the unique limitations that the Web operates under with respect to multi-core concurrency support and also to highlight some of the current discussions of standards that are taking place around further expanding Wasm's concurrency capabilities.

Web Development





Unleashing the Power of End-User Programmable AI

  Erik Meijer

Creating an AI-first program Synthesis framework

Unleashing the Power of End-User Programmable AI As a demonstration of what can be accomplished with contemporary LLMs, this paper outlines the high-level design of an AI-first, program-synthesis framework built around a new programming language, Universalis, designed for knowledge workers to read, optimized for our neural computer to execute, and ready to be analyzed and manipulated by an accompanying set of tools. We call the language Universalis in honor of Gottfried Wilhelm Leibniz. Leibniz's centuries-old program of a universal science for coordinating all human knowledge into a systematic whole comprises two parts: (1) a universal notation by use of which any item of information whatsoever can be recorded naturally and systematically, and (2) a means of manipulating the knowledge thus recorded in a computational fashion, to reveal its logical interrelations and consequences. Exactly what current day LLMs provide!

AI




Bridging the Moat:
Security Is Part of Every Critical User Journey


  Phil Vachon

Security Is Part of Every Critical User Journey How else would you make sure that product security decisions serve your customers?

Next time you're working on a new product or feature or the next time you're yawning your way through a product development meeting, raise your hand and propose that security outcomes and risks be defined at each step along critical user journeys. Whether you're building an integration between enterprise systems, a user-facing application, or a platform meant to save your customers complexity and money, putting security at the forefront of the product team's challenge will be transformative.

Bridging the Moat, Security




Kode Vicious
In Search of Quietude


Learning to say no to interruption

Kode Vicious | In Search of Quietude? KV is old enough to remember a time before ubiquitous cell phones, a world in which email was the predominant form of intra- and interoffice communication, and it was perfectly normal not to read your email for hours in order to concentrate on a task. Of course, back then we also worked in offices where co-workers would readily walk in unannounced to interrupt us. That too, was annoying but could easily be deterred through the clever use of headphones.

Business/Management, Development, Kode Vicious


 


Volume 23, Issue 2




AI: It's All About Inference Now

  Michael Gschwind

Model inference has become the critical driver for model performance.

AI: Its All About Inference Now As the scaling of pretraining is reaching a plateau of diminishing returns, model inference is quickly becoming an important driver for model performance. Today, test-time compute scaling offers a new, exciting avenue to increase model performance beyond what can be achieved with training, and test-time compute techniques cover a fertile area for many more breakthroughs in AI. Innovations using ensemble methods, iterative refinement, repeated sampling, retrieval augmentation, chain-of-thought reasoning, search, and agentic ensembles are already yielding improvements in model quality performance and offer additional opportunities for future growth.

AI




Develop, Deploy, Operate

  Titus Winters, Leah Rivers, and Salim Virji

A holistic model for understanding the costs and value of software development

Develop, Deploy, Operate By taking a holistic view of the commercial software-development process, we have identified tensions between various factors and where changes in one phase, or to infrastructure, affect other phases. We have distinguished four distinct forms of impact, warned against measuring against unknown counterfactuals, and suggested a consensus mechanism for estimating DDR (defect detection and resolution) costs. Our approach balances product outcomes and the strategic need for change with both the human and machine costs of producing valuable software. With this model, the process of commercial software development could become more comprehensible across roles and levels and therefore more easily improved within an organization.

Business/Management, Development




Generative AI at the Edge: Challenges and Opportunities

  Vijay Janapa Reddi

The next phase in AI deployment

Generative AI at the Edge: Challenges and Opportunities Generative AI at the edge is the next phase in AI's deployment. By tackling the technical hurdles and establishing new frameworks, we can ensure this transition is successful and beneficial. The coming years will likely see embodied, federated, and cooperative small models become commonplace, quietly working to enhance our lives in the background, much as embedded microcontrollers did in the previous tech generation. The difference is, these models won't just compute; they will communicate, create, and adapt.

AI




Research for Practice
The Point is Addressing


  Daniel Bittman with introduction by Peter Alvaro

A brief tour of efforts to reimagine programming in a world of changing memories

Even something as innocent as addressing comes from a rich design space filled with tradeoffs between important considerations such as scaling, transparency, overhead, and programmer control. These tradeoffs are just some of the examples of the many challenges facing programmers today, especially as we drive our applications to larger scales. The way we refer to and address data matters, with reasons ranging from speed to complexity to consistency, and can have unexpected effects down the line if we do not carefully consider how we talk about and refer to data at large.

Memory, Research for Practice




Drill Bits
Sandboxing: Foolproof Boundaries vs. Unbounded Foolishness


  Terence Kelly with Special Guest Borer Edison Fuh Drill Bits | Sandboxing: Foolproof Boundaries vs. Unbounded Foolishness

Sandboxing mitigates the risks of software so large and complex that it's likely to harbor security vulnerabilities. To safely harness useful yet ominously opaque libraries, a simple mechanism provides ironclad confinement—or does it?

Code, Development, Drill Bits, Security




Kode Vicious
Can't We Have Nice Things?


Careful crafting and the longevity of code

Kode Vicious | Cant We Have Nice Things? We build apparatus in order to show some effect we're trying to discover or measure. A good example is Faraday's motor experiment, which showed the interaction between electricity and magnetism. The apparatus has several components, but the main feature is that it makes visible an invisible force: electromagnetism. Faraday clearly had a hypothesis about the interaction between electricity and magnetism, and all science starts from a hypothesis. The next step was to show, through experiment, an effect that proved or disproved the hypothesis. This is how empiricists operate. They have a hunch, build an apparatus, run an experiment, refine the hunch, and then wash, rinse, and repeat.

Code, Development, Kode Vicious




The Soft Side of Software
Peer Mentoring


  Kate Matsudaira

My favorite growth hack for engineers and leaders The Soft Side of Software | Peer Mentoring

Stop waiting for a senior mentor to appear. Your peers are some of the most valuable mentors you'll ever find. Start leveraging those relationships, sharing insights, and bringing value to every conversation. Your career will thank you for it.

Business/Management, The Soft Side of Software


 


Volume 23, Issue 1




From Function Frustrations to Framework Flexibility

  Erik Meijer

Fixing tool calls with indirection

The principle of indirection can be applied to introduce a paradigm shift: replacing direct value manipulation with symbolic reasoning using named variables. This simple yet powerful trick directly resolves inconsistencies in tool usage and enables parameterization and abstraction of interactions. The transformation of function calls into reusable and interpretable frameworks elevates tool calling into a neuro-symbolic reasoning framework. This approach unlocks new possibilities for structured interaction and dynamic AI systems.

AI




Operations and Life
A Clean Approach to Process Optimization


  Thomas A. Limoncelli

What I learned from my dishwasher about automating processes

My soap-loading technique isn't revolutionary, but it does demonstrate a point about process design: You can eliminate delays in starting a process by front-loading tasks whenever possible. Front-loading changes when you do tasks but not their order. The process still involves a loop: load dishes, add soap, press start button, empty dishes repeat. You've only changed your mental model of where the loop starts.

Development, Management, Operations and Life




The Surprise of Multiple Dependency Graphs

  Josie Anugerah, Eve Martin-Jones

Dependency resolution is not deterministic.

It seems like it should be easy to avoid installing vulnerable open source software, but dependency graphs are surprisingly complex. At the time of writing, the latest version of the popular npm tool webpack has millions of potential dependency graphs depending on circumstances during its resolution. The exact graph chosen for a given package can depend on what other software is being built, what kind of system is building it, and even the state of the ecosystem on a given day. As a result, the developer and user of a package may end up with very different dependency graphs, which can lead to unexpected vulnerabilities.

Open source




Fifty Years of Open Source Software Supply Chain Security

  Russ Cox

For decades, software reuse was only a lofty goal. Now it's very real.

The xz attack seems to be the first major attack on the open source software supply chain. The event-stream attack was similar but not major, and Heartbleed and Log4j were vulnerabilities, not attacks. But the xz attack was discovered essentially by accident because it made sshd just a bit too slow at startup. Attacks, by their nature, try to remain hidden. What are the chances we would accidentally discover the very first major attack on the open source software supply chain in just a few weeks? Perhaps we were extremely lucky, or perhaps we have missed others.

Open source




String Matching at Scale

  Dennis Roellke

A call for interdisciplinary collaboration and better-directed resources

String matching can't be that difficult. But what are we matching on? What is the intrinsic identity of a software component? Does it change when developers copy and paste the source code instead of fetching it from a package manager? Is every package-manager request fetching the same artifact from the same upstream repository mirror? Can we trust that the source code published along with the artifact is indeed what's built into the release executable? Is the tool chain kosher?

Development




How to Evaluate AI that's Smarter than Us

  Chip Huyen

Exploring three strategies: functional correctness, AI-as-a-judge, and comparative evaluation

Evaluating AI models that surpass human expertise in the task at hand presents unique challenges. These challenges only grow as AI becomes more intelligent. However, the three effective strategies presented in this article exist to address these hurdles. The strategies are: Functional correctness: evaluating AI by how well it accomplishes its intended tasks; AI-as-a-judge: using AI instead of human experts to evaluate AI outputs; and Comparative evaluation: evaluating AI systems in relationship with each other instead of independently.

AI




Kode Vicious
Analyzing Krazy Kode


Accounting for the emotional state of the person who wrote that code

There actually are about six or seven emotions, or so I'm told. But the one state you should really try to avoid is confusion, which isn't actually an emotion but instead a state of mind. Code created by a confused mind shows itself in the randomness of naming, which is not handled by modern, fascist, programming languages like Go. Sure, you may have your names in the proper case and your spaces in the proper place, but you can still name a function PublicThingTwo() if you want to, and this is a sure sign of trouble.

Business/Management, Kode Vicious


 


Volume 22, Issue 6




The Soft Side of Software
My Career-limiting Communication


  Kate Matsudaira

Be thoughtful about your content. You've got a lot riding on it.

Whether in email, documents, or slides, use punchy visuals to make content easier to digest with your most important points clearly highlighted. Make sure that data, charts, and photos are unambiguously labeled, with any caveats noted. In general, steer away from pie charts, averages, and percentages. That's because, as popular as these devices might be, they often manage to tell only part of the story and miss opportunities to highlight the relative size of datasets, outliers, or trends over time.

Business/Management, The Soft Side of Software




Systems Correctness Practices at AWS

  Marc Brooker, Ankush Desai

Leveraging Formal and Semi-formal Methods

Building reliable and secure software requires a range of approaches to reason about systems correctness. Alongside industry-standard testing methods (such as unit and integration testing), AWS has adopted model checking, fuzzing, property-based testing, fault-injection testing, deterministic simulation, event-based simulation, and runtime validation of execution traces. Formal methods have been an important part of the development process—perhaps most importantly, formal specifications as test oracles that provide the correct answers for many of AWS's testing practices.

Concurrency




Intermediate Representations for the Datacenter Computer

  Achilles Benetopoulos

Lowering the Burden of Robust and Performant Distributed Systems

In-memory application data size is outstripping the capacity of individual machines, necessitating its partitioning over clusters of them; online services have high availability requirements, which can be met only by deploying systems as collections of multiple redundant components; high durability requirements can be satisfied only through data replication, sometimes across vast geographical distances.

Data, Distributed Computing




Simulation: An Underutilized Tool in Distributed Systems

  David R. Morrison

Not easy but not impossible, and worth it for the insights it can provide

Simulation has a huge role to play in the advent of AI systems: We need an efficient, fast, and cost-effective way to train AI agents to operate in our infrastructure, and simulation absolutely provides that capability.

AI, Distributed Computing




Operations and Life
Give Engineers Problems, Not Solutions


  Thomas A. Limoncelli

A simple strategy to improve solutions and boost morale

This technique is about providing the "why" instead of the "how." Instead of dictating specific solutions, present the problem and desired outcome, and let your team figure out how to solve it. This fosters creativity, shared ownership, and collaborative problem-solving. It also empowers the team to strive for the best solution.

Management, Operations and Life




Kode Vicious
The Drunken Plagiarists


Working with Co-pilots

The trick of an LLM is to use a little randomness and a lot of text to guess the next word in a sentence. Seems kind of trivial, really, and certainly not a measure of intelligence that anyone who understands the term might use. But it's a clever trick and does have some applications.

AI, Kode Vicious




Drill Bits
Retrofitting: Principles and Practice


  Terence Kelly with Special Guest Borer Ziheng (Aaron) Su

Retrofitting radically new functionality onto production software tests every skill of the programmers craft. A practical case study illuminates principles for bolting new tricks onto old dogs.

Code, Development, Drill Bits




The Price of Intelligence

  Mark Russinovich, Ahmed Salem, Santiago Zanella-Béguelin, Yonatan Zunger

Three risks inherent in LLMs

The vulnerability of LLMs to hallucination, prompt injection, and jailbreaks poses a significant but surmountable challenge to their widespread adoption and responsible use. We have argued that these problems are inherent, certainly in the present generation of models and likely in LLMs per se, and so our approach can never be based on eliminating them; rather, we should apply strategies of "defense in depth" to mitigate them, and when building and using these systems, do so on the assumption that they will sometimes fail in these directions.

AI


 



 




Older Issues

梦房子倒塌什么预兆 寄生树有什么功效作用 一什么千什么 什么东西可以去口臭呀 deep是什么意思
家里有蚂蚁是什么原因 梦见自己生病了是什么意思 红眼病是什么原因引起的 为什么延迟退休 食蚁兽是什么动物
江郎才尽是什么意思 急性腹泻拉水吃什么药 流产用什么药最快 做梦被杀了是什么征兆 b型血的人是什么性格
带环了月经推迟不来什么原因 为什么海螺里有大海的声音 rush是什么意思 便血挂什么科室 羊刃格是什么意思
便秘吃什么药没有依赖性hcv9jop3ns4r.cn 甲状腺素低吃什么能补hcv8jop0ns0r.cn 子是什么生肖hcv8jop6ns5r.cn 人事代理什么意思jinxinzhichuang.com 武则天是什么朝代的hcv8jop6ns2r.cn
3.22什么星座zhongyiyatai.com 石女什么样hcv9jop2ns1r.cn 脑部缺氧有什么症状bysq.com 荆芥是什么hcv8jop1ns8r.cn 镜子是用什么做的hcv8jop5ns4r.cn
黛力新主治什么病hcv9jop4ns6r.cn 皮肤瘙痒用什么药治疗hcv9jop7ns1r.cn 男马配什么属相最好hcv9jop3ns2r.cn 处女女和什么星座最配hcv9jop6ns4r.cn 生酮饮食是什么hcv8jop1ns8r.cn
青蛙是什么生肖hcv8jop6ns5r.cn 舌头烧灼感吃什么药hcv8jop6ns2r.cn 唾手可得是什么意思hcv9jop0ns2r.cn t是什么adwl56.com 大腿后侧疼痛什么原因onlinewuye.com
百度