Pub Date : 1999-01-05DOI: 10.1109/HICSS.1999.772983
A. Krings, Thomas Feyer
Addresses solutions to the problem of reaching agreement in the presence of faults. Whereas the need for agreement has surfaced mainly in fault-tolerant real-time applications, agreement can be a useful mechanism in network security to mask intrusions. However, due to the communication overhead involved and the fact that the system is expected to operate without problems most of the time, early stopping algorithms are of special interest. We introduce a non-authenticated early stopping algorithm that is optimal in terms of rounds and the number of processors in the system. The basic idea of the algorithm as closely related to the work of P. Berman et al. (1992). However, our algorithm is easier to implement because of its algorithmic definition. It is directly derived from the algorithm by L. Lamport et al. (1982) and is based on two simple functions only. We are convinced that the construction of the early stopping algorithm presented in this paper increases understanding and clarifies the underlying problems of early stopping.
{"title":"The Byzantine agreement problem: optimal early stopping","authors":"A. Krings, Thomas Feyer","doi":"10.1109/HICSS.1999.772983","DOIUrl":"https://doi.org/10.1109/HICSS.1999.772983","url":null,"abstract":"Addresses solutions to the problem of reaching agreement in the presence of faults. Whereas the need for agreement has surfaced mainly in fault-tolerant real-time applications, agreement can be a useful mechanism in network security to mask intrusions. However, due to the communication overhead involved and the fact that the system is expected to operate without problems most of the time, early stopping algorithms are of special interest. We introduce a non-authenticated early stopping algorithm that is optimal in terms of rounds and the number of processors in the system. The basic idea of the algorithm as closely related to the work of P. Berman et al. (1992). However, our algorithm is easier to implement because of its algorithmic definition. It is directly derived from the algorithm by L. Lamport et al. (1982) and is based on two simple functions only. We are convinced that the construction of the early stopping algorithm presented in this paper increases understanding and clarifies the underlying problems of early stopping.","PeriodicalId":116821,"journal":{"name":"Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers","volume":"975 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123080237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1999-01-05DOI: 10.1109/HICSS.1999.773085
W. Maniatty, B. Szymanski, T. Caraco
We describe a series of stepwise refinements of a biological model resulting in a high-performance simulation system for individual-based models of the co-evolutionary dynamics associated with spatially explicit epidemic processes. Our model includes two competing host species, a macroparasite capable of serving as a vector, and the vector-borne microparasite. Genetic algorithms are used to simulate genetic change; we are particularly interested in the evolution of pathogen virulence. The simulation system employs cellular automata to track individual organisms distributed over a two-dimensional lattice. Our models are able to identify each individual's parentage, and to account for both biotic and abiotic spatial heterogeneity. Using the developed system we conducted a series of experiments to demonstrate how individual-based modeling and explicit representation of space, although computationally expensive, can produce qualitatively new biological results.
{"title":"High-performance computing tools for modeling evolution in epidemics","authors":"W. Maniatty, B. Szymanski, T. Caraco","doi":"10.1109/HICSS.1999.773085","DOIUrl":"https://doi.org/10.1109/HICSS.1999.773085","url":null,"abstract":"We describe a series of stepwise refinements of a biological model resulting in a high-performance simulation system for individual-based models of the co-evolutionary dynamics associated with spatially explicit epidemic processes. Our model includes two competing host species, a macroparasite capable of serving as a vector, and the vector-borne microparasite. Genetic algorithms are used to simulate genetic change; we are particularly interested in the evolution of pathogen virulence. The simulation system employs cellular automata to track individual organisms distributed over a two-dimensional lattice. Our models are able to identify each individual's parentage, and to account for both biotic and abiotic spatial heterogeneity. Using the developed system we conducted a series of experiments to demonstrate how individual-based modeling and explicit representation of space, although computationally expensive, can produce qualitatively new biological results.","PeriodicalId":116821,"journal":{"name":"Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116659261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1999-01-05DOI: 10.1109/HICSS.1999.772906
C. Danis, L. Jones, Richard Thompson, Stephen E. Levy
The Internet is an important resource for both business-to-business and business-to-consumer commerce. Its advantages over private networks are often overshadowed by concerns about using public networks for commercial transactions. We present a case study that describes adoption of an Internet-based auto finance system by a financial institution and multiple auto dealerships. We discuss four issues that we needed to solve in order for the system to be accepted. These are: the implications of the open nature of the Internet on existing business-to-consumer relationships; security of enterprise data and systems; ensuring connectivity across enterprises; and the management of information assets generated by large volumes of electronic transactions.
{"title":"Issues and concerns in Internet based financial applications: an example from an auto finance system","authors":"C. Danis, L. Jones, Richard Thompson, Stephen E. Levy","doi":"10.1109/HICSS.1999.772906","DOIUrl":"https://doi.org/10.1109/HICSS.1999.772906","url":null,"abstract":"The Internet is an important resource for both business-to-business and business-to-consumer commerce. Its advantages over private networks are often overshadowed by concerns about using public networks for commercial transactions. We present a case study that describes adoption of an Internet-based auto finance system by a financial institution and multiple auto dealerships. We discuss four issues that we needed to solve in order for the system to be accepted. These are: the implications of the open nature of the Internet on existing business-to-consumer relationships; security of enterprise data and systems; ensuring connectivity across enterprises; and the management of information assets generated by large volumes of electronic transactions.","PeriodicalId":116821,"journal":{"name":"Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117269221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1999-01-05DOI: 10.1109/HICSS.1999.772769
H. Enns, S. Huff
Internet service providers (ISPs) in developing countries experience great difficulties in the implementation of technologies that provide access to the Internet. These difficulties are due to technical challenges, such as poor telecommunication infrastructure, lack of technological readiness, inadequate technical skills and training, financial barriers, and the like. Oftentimes they require assistance from non-government organizations to successfully implement these types of projects. This paper begins with an overview of the factors that lead to successful implementation of information technology projects in developing countries. A framework is then presented which categorizes these factors into environmental, technical, interorganizational, and intraorganizational components. The paper then reports the efforts of one company in implementing a series of telecommunications projects to allow access to the Internet for Mongolian companies, governmental organizations and others. The paper concludes by applying the framework developed earlier to illustrate how successful implementation in the developing country context can be explained.
{"title":"Implementation of information technology in developing countries: experiences of a Mongolian Internet service provider","authors":"H. Enns, S. Huff","doi":"10.1109/HICSS.1999.772769","DOIUrl":"https://doi.org/10.1109/HICSS.1999.772769","url":null,"abstract":"Internet service providers (ISPs) in developing countries experience great difficulties in the implementation of technologies that provide access to the Internet. These difficulties are due to technical challenges, such as poor telecommunication infrastructure, lack of technological readiness, inadequate technical skills and training, financial barriers, and the like. Oftentimes they require assistance from non-government organizations to successfully implement these types of projects. This paper begins with an overview of the factors that lead to successful implementation of information technology projects in developing countries. A framework is then presented which categorizes these factors into environmental, technical, interorganizational, and intraorganizational components. The paper then reports the efforts of one company in implementing a series of telecommunications projects to allow access to the Internet for Mongolian companies, governmental organizations and others. The paper concludes by applying the framework developed earlier to illustrate how successful implementation in the developing country context can be explained.","PeriodicalId":116821,"journal":{"name":"Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127148193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1999-01-05DOI: 10.1109/HICSS.1999.772781
Petter Gottschalk
The need for improved implementation of information technology (IT) strategy has been emphasised in both empirical and prescriptive research studies. In this study, the main research question is: "what content characteristics of formal IT strategy predict the extent of plan implementation?" Ten content characteristics of formal information technology strategy were identified from the research literature as potential implementation predictors. These, were descriptions of: i) resources needed for the implementation; ii) user involvement during the implementation; iii) analyses of the organisation; iv) anticipated changes in the external environment; v) solutions to potential resistance during the implementation; vi) information technology to be implemented; vii) projects' relevance to the business plan; viii) responsibility for the implementation; ix) management support for the implementation; and x) implementation issues clearly. The literature reviewed provides evidence that research and theory in the field of IT strategy implementation have moved beyond the early stages making a sample survey appropriate to meet concerns about generalisation of results. The survey was conducted in Norway in 1997.
{"title":"Implementation predictors of formal information technology strategy","authors":"Petter Gottschalk","doi":"10.1109/HICSS.1999.772781","DOIUrl":"https://doi.org/10.1109/HICSS.1999.772781","url":null,"abstract":"The need for improved implementation of information technology (IT) strategy has been emphasised in both empirical and prescriptive research studies. In this study, the main research question is: \"what content characteristics of formal IT strategy predict the extent of plan implementation?\" Ten content characteristics of formal information technology strategy were identified from the research literature as potential implementation predictors. These, were descriptions of: i) resources needed for the implementation; ii) user involvement during the implementation; iii) analyses of the organisation; iv) anticipated changes in the external environment; v) solutions to potential resistance during the implementation; vi) information technology to be implemented; vii) projects' relevance to the business plan; viii) responsibility for the implementation; ix) management support for the implementation; and x) implementation issues clearly. The literature reviewed provides evidence that research and theory in the field of IT strategy implementation have moved beyond the early stages making a sample survey appropriate to meet concerns about generalisation of results. The survey was conducted in Norway in 1997.","PeriodicalId":116821,"journal":{"name":"Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125835048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1999-01-05DOI: 10.1109/HICSS.1999.772777
J. Senn, D. Gefen
Information technology (IT) may be viewed as a strategic asset or as a utility. The view a company holds not only influences the return it expects to receive from IT investments, but also its decisions regarding outsourcing. This paper reports research conducted to examine the association between these issues from the viewpoints of experienced executives, managers and consultants in comparison with those of veteran IT professionals. The findings show that results expected from outsourcing are changing. Moreover, understanding the areas where managers and IT professionals agree and where they differ provides valuable insights into strategies for gaining adequate returns on IT spending.
{"title":"The relation between outsourcing and the return from corporate IT spending: perceptions from practitioners","authors":"J. Senn, D. Gefen","doi":"10.1109/HICSS.1999.772777","DOIUrl":"https://doi.org/10.1109/HICSS.1999.772777","url":null,"abstract":"Information technology (IT) may be viewed as a strategic asset or as a utility. The view a company holds not only influences the return it expects to receive from IT investments, but also its decisions regarding outsourcing. This paper reports research conducted to examine the association between these issues from the viewpoints of experienced executives, managers and consultants in comparison with those of veteran IT professionals. The findings show that results expected from outsourcing are changing. Moreover, understanding the areas where managers and IT professionals agree and where they differ provides valuable insights into strategies for gaining adequate returns on IT spending.","PeriodicalId":116821,"journal":{"name":"Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126069626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1999-01-05DOI: 10.1109/HICSS.1999.772678
A. Light, Y. Rogers
The development of the World Wide Web has allowed publishers to move away from traditional newspaper models of news presentation to introduce more flexible products that offer both an information source and more scope for interaction with and between users. The opportunity to involve users more in the creation of news content has been exploited in various ways, for instance as discussion forums or as visitor responses to particular questions. This paper reports on an experiment investigating one from of this new kind of interaction, drawing on data from an e-mail questionnaire sent to visitors to The Guardian newspaper's Election 97 Web site, who observed or participated in a series of themed discussion forums in the run-up to the 1997 British general election. We present an evaluation of the visitors' behaviour in the forums, their motivation and their perceptions of the discussion space. We discuss the findings in relation to the underlying model of the Web site, pointing out how, despite the flexibility offered by this new mode of interaction, the traditional publisher-contributor relationship remains preferable to both users and developers.
{"title":"Conversation as publishing: the role of news forums on the Web","authors":"A. Light, Y. Rogers","doi":"10.1109/HICSS.1999.772678","DOIUrl":"https://doi.org/10.1109/HICSS.1999.772678","url":null,"abstract":"The development of the World Wide Web has allowed publishers to move away from traditional newspaper models of news presentation to introduce more flexible products that offer both an information source and more scope for interaction with and between users. The opportunity to involve users more in the creation of news content has been exploited in various ways, for instance as discussion forums or as visitor responses to particular questions. This paper reports on an experiment investigating one from of this new kind of interaction, drawing on data from an e-mail questionnaire sent to visitors to The Guardian newspaper's Election 97 Web site, who observed or participated in a series of themed discussion forums in the run-up to the 1997 British general election. We present an evaluation of the visitors' behaviour in the forums, their motivation and their perceptions of the discussion space. We discuss the findings in relation to the underlying model of the Web site, pointing out how, despite the flexibility offered by this new mode of interaction, the traditional publisher-contributor relationship remains preferable to both users and developers.","PeriodicalId":116821,"journal":{"name":"Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123484270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1999-01-05DOI: 10.1109/HICSS.1999.772959
M. Nissen
Process redesign is an expensive, time consuming and labor-intensive activity. Analysis of the redesign process indicates the "first generation" computer-based tools are inadequate for redesign today. Knowledge-based systems and intelligent agents have the ability to address the key, intellectual activities required for effective process redesign. An intelligent redesign agent called KOPeR is developed and employed, in an "industrial strength" reengineering engagement, to redesign processes from the procurement domain. This paper describes the KOPeR design and implementation and highlights its use as a redesign agent in the field. The field results reveal insights into the use, utility and potential of this agent technology, and the paper closes with a number of promising future directions for related research.
{"title":"An intelligent agent for Web-based process redesign","authors":"M. Nissen","doi":"10.1109/HICSS.1999.772959","DOIUrl":"https://doi.org/10.1109/HICSS.1999.772959","url":null,"abstract":"Process redesign is an expensive, time consuming and labor-intensive activity. Analysis of the redesign process indicates the \"first generation\" computer-based tools are inadequate for redesign today. Knowledge-based systems and intelligent agents have the ability to address the key, intellectual activities required for effective process redesign. An intelligent redesign agent called KOPeR is developed and employed, in an \"industrial strength\" reengineering engagement, to redesign processes from the procurement domain. This paper describes the KOPeR design and implementation and highlights its use as a redesign agent in the field. The field results reveal insights into the use, utility and potential of this agent technology, and the paper closes with a number of promising future directions for related research.","PeriodicalId":116821,"journal":{"name":"Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125335442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1999-01-05DOI: 10.1109/HICSS.1999.772636
S. Kimbrough, Yao-Hua Tan
EDI (electronic data interchange) messages are notoriously lean and difficult to interpret without additional information. While sympathising with the many criticisms that have been made of the design of EDI protocols, we argue that there is something basically correct in the noted leanness of EDI messages. We present a framework that describes how interpretation of EDI messages works, and indeed must work. Central elements of this framework are what we call wrapping and unfolding of messages. We demonstrate hour to exploit these concepts an formalizations for electronic commerce. In particular, we show how Kimbough's event semantics for speech acts (1997) and Tan's theory of directed obligation (1998) can be fit naturally and fruitfully into this framework, and to each other. Much work remains to be done, but the progress in formalization in evidence should be generalizable.
{"title":"On lean messaging with wrapping and unfolding for E-commerce","authors":"S. Kimbrough, Yao-Hua Tan","doi":"10.1109/HICSS.1999.772636","DOIUrl":"https://doi.org/10.1109/HICSS.1999.772636","url":null,"abstract":"EDI (electronic data interchange) messages are notoriously lean and difficult to interpret without additional information. While sympathising with the many criticisms that have been made of the design of EDI protocols, we argue that there is something basically correct in the noted leanness of EDI messages. We present a framework that describes how interpretation of EDI messages works, and indeed must work. Central elements of this framework are what we call wrapping and unfolding of messages. We demonstrate hour to exploit these concepts an formalizations for electronic commerce. In particular, we show how Kimbough's event semantics for speech acts (1997) and Tan's theory of directed obligation (1998) can be fit naturally and fruitfully into this framework, and to each other. Much work remains to be done, but the progress in formalization in evidence should be generalizable.","PeriodicalId":116821,"journal":{"name":"Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122362041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1999-01-05DOI: 10.1109/HICSS.1999.772938
H. C. Mak, R. B. Johnston
For many large retail companies with many suppliers, the utopian vision of total paperless trading offered by traditional electronic data interchange (EDI), with its attendant efficiencies, has not been realized. Many small but operationally important suppliers lack enthusiasm for traditional EDI because it is expensive, complicated and they stand to gain little from it. This non-compliance prevents the large organization from realizing some of the most significant tactical benefits of EDI such as advanced supply chain reforms. This paper presents a case study of a large retail organization which is approaching this problem by integrating Internet-based EDI with its existing traditional EDI systems using an intelligent gateway. The case study is used to generate propositions about the future significance of Internet EDI.
{"title":"Leveraging traditional EDI investment using the Internet: a case study","authors":"H. C. Mak, R. B. Johnston","doi":"10.1109/HICSS.1999.772938","DOIUrl":"https://doi.org/10.1109/HICSS.1999.772938","url":null,"abstract":"For many large retail companies with many suppliers, the utopian vision of total paperless trading offered by traditional electronic data interchange (EDI), with its attendant efficiencies, has not been realized. Many small but operationally important suppliers lack enthusiasm for traditional EDI because it is expensive, complicated and they stand to gain little from it. This non-compliance prevents the large organization from realizing some of the most significant tactical benefits of EDI such as advanced supply chain reforms. This paper presents a case study of a large retail organization which is approaching this problem by integrating Internet-based EDI with its existing traditional EDI systems using an intelligent gateway. The case study is used to generate propositions about the future significance of Internet EDI.","PeriodicalId":116821,"journal":{"name":"Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122579023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}