Biometric recognition is more and more important due to security applications all over the world. Mobile phone becomes popular in recent years. Therefore voice recognition for recognizing a speaker’s identity also plays a potential role. This paper presents a speaker recognition that combines a non-linear feature, named spectral dimension (SD), with Mel Frequency Cepstral Coefficients (MFCC). In order to improve the performance of the proposed scheme, the Mel-scale method is adopted for allocating sub-bands and the pattern matching is trained by Gaussian mixture model. Some problems related to spectral dimension are discussed and the comparison with other simple spectral features is made. We observe that our proposed methods can improve the performance in different components. For instance, speaker verification combining MFCC with our proposed SD features gives a good performance of EER=2.3140% by 32_Multi-GMM. The relative improvement is about 22% better than the method that is based only on MFCC with EER=2.9631%.
{"title":"Speaker Recognition Using Spectral Dimension Features","authors":"Wen-Shiung Chen, Jr-Feng Huang","doi":"10.1109/ICCGI.2009.27","DOIUrl":"https://doi.org/10.1109/ICCGI.2009.27","url":null,"abstract":"Biometric recognition is more and more important due to security applications all over the world. Mobile phone becomes popular in recent years. Therefore voice recognition for recognizing a speaker’s identity also plays a potential role. This paper presents a speaker recognition that combines a non-linear feature, named spectral dimension (SD), with Mel Frequency Cepstral Coefficients (MFCC). In order to improve the performance of the proposed scheme, the Mel-scale method is adopted for allocating sub-bands and the pattern matching is trained by Gaussian mixture model. Some problems related to spectral dimension are discussed and the comparison with other simple spectral features is made. We observe that our proposed methods can improve the performance in different components. For instance, speaker verification combining MFCC with our proposed SD features gives a good performance of EER=2.3140% by 32_Multi-GMM. The relative improvement is about 22% better than the method that is based only on MFCC with EER=2.9631%.","PeriodicalId":201271,"journal":{"name":"2009 Fourth International Multi-Conference on Computing in the Global Information Technology","volume":"23 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130743485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Usability and user interfaces play a huge and important role in today’s mobile application. Besides a good design, acceptable performance, scalability, and robustness, a mobile application needs to be easy to use and, to some extent, customizable. To create a system able to custom the mobile application’s user interface and mirror it immediately to final users is the purpose of this article. Ulmo is such system, which is composed by a web site that enables user to comfortably executes change in mobile application user interface, a mobile application compliant (providing API that facilitates mobile application Ulmo compliance development) and the communication module to mirror web adjustments in mobile phone, which was made using SMS technology. Its availability and low cost are also considered and its high penetration in emergent markets. Some aspects as security, data compression, and reliability are taken in account.
{"title":"Ulmo: A System to Enable Mobile Applications Personalization by Binary SMS","authors":"Mauro Teófilo, Alexandre Martini, P. Cruz","doi":"10.1109/ICCGI.2009.40","DOIUrl":"https://doi.org/10.1109/ICCGI.2009.40","url":null,"abstract":"Usability and user interfaces play a huge and important role in today’s mobile application. Besides a good design, acceptable performance, scalability, and robustness, a mobile application needs to be easy to use and, to some extent, customizable. To create a system able to custom the mobile application’s user interface and mirror it immediately to final users is the purpose of this article. Ulmo is such system, which is composed by a web site that enables user to comfortably executes change in mobile application user interface, a mobile application compliant (providing API that facilitates mobile application Ulmo compliance development) and the communication module to mirror web adjustments in mobile phone, which was made using SMS technology. Its availability and low cost are also considered and its high penetration in emergent markets. Some aspects as security, data compression, and reliability are taken in account.","PeriodicalId":201271,"journal":{"name":"2009 Fourth International Multi-Conference on Computing in the Global Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131083984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper we present BLOBOT, a tool for detecting botnets. BLOBOT detects botnets by detecting their command and control network. In contrast to common approaches that operate, often off-line, on aggregate network traffic, BLOBOT operates on a single user’s traffic so increasing the ability of detecting botnets in real-time. Blobot features a tradeoff between usability, security and efficiency. Preliminary experimental results prove that BLOBOT is an effective tool against botnets.
{"title":"BLOBOT: BLOcking BOTs at the Doorstep","authors":"G. Dini, Isidoro S. La Porta","doi":"10.1109/ICCGI.2009.34","DOIUrl":"https://doi.org/10.1109/ICCGI.2009.34","url":null,"abstract":"In this paper we present BLOBOT, a tool for detecting botnets. BLOBOT detects botnets by detecting their command and control network. In contrast to common approaches that operate, often off-line, on aggregate network traffic, BLOBOT operates on a single user’s traffic so increasing the ability of detecting botnets in real-time. Blobot features a tradeoff between usability, security and efficiency. Preliminary experimental results prove that BLOBOT is an effective tool against botnets.","PeriodicalId":201271,"journal":{"name":"2009 Fourth International Multi-Conference on Computing in the Global Information Technology","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125689742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Martín, R. Gil, E. S. Cristóbal, G. Díaz, M. Castro, J. Peire, M. Milev, N. Mileva
This paper addresses the issue of the creation of context-aware applications inside the Mobile-Learning approach. It tries to clarify aspects like the most suitable environments of application; how new features of mobile devices, such as GPS (Global Positioning System) receivers, motion sensors, etc., must be taken into account. It also addresses why most of the m-Learning applications do not make use of the existing services and knowledge of the Learning Management Systems, which are in fact the real pillars of the e-learning methodology. Finally, the architectural design of a context-aware framework created by the authors is described. The main contribution of this framework is to provide contextual information from different sources, including different kind of geographical sensors (allowing roaming among them) and external services. As result of the work, the middleware has been developed and it is being used in the development of several m-learning projects.
{"title":"Middleware for the Development of Context-Aware Applications inside m-Learning: Connecting e-Learning to the Mobile World","authors":"S. Martín, R. Gil, E. S. Cristóbal, G. Díaz, M. Castro, J. Peire, M. Milev, N. Mileva","doi":"10.1109/ICCGI.2009.39","DOIUrl":"https://doi.org/10.1109/ICCGI.2009.39","url":null,"abstract":"This paper addresses the issue of the creation of context-aware applications inside the Mobile-Learning approach. It tries to clarify aspects like the most suitable environments of application; how new features of mobile devices, such as GPS (Global Positioning System) receivers, motion sensors, etc., must be taken into account. It also addresses why most of the m-Learning applications do not make use of the existing services and knowledge of the Learning Management Systems, which are in fact the real pillars of the e-learning methodology. Finally, the architectural design of a context-aware framework created by the authors is described. The main contribution of this framework is to provide contextual information from different sources, including different kind of geographical sensors (allowing roaming among them) and external services. As result of the work, the middleware has been developed and it is being used in the development of several m-learning projects.","PeriodicalId":201271,"journal":{"name":"2009 Fourth International Multi-Conference on Computing in the Global Information Technology","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132889725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
One of the most used intelligent technique for classification is a neural network. In real classification applications the patterns of different classes often overlap. In this situation the most appropriate classifier is the one whose outputs represent the class conditional probabilities. These probabilities are calculated in traditional statistics in two steps: first the underlying prior probabilities are estimated and then the Bayes rule is applied. One of the most popular methods for density estimation is Gaussian Mixture. It is also possible to calculate directly the class conditional probabilities using a Multilayer Perceptron Artificial Neural Network. Although it is not known yet which method is better in the general case, we demonstrate in this paper that Multilayer Perceptron is superior to Gaussian Mixture Model when the underlying prior probability densities are discontinuous along the support’s border.
{"title":"Multilayer Perceptron versus Gaussian Mixture for Class Probability Estimation with Discontinuous Underlying Prior Densities","authors":"I. Lemeni","doi":"10.1109/ICCGI.2009.43","DOIUrl":"https://doi.org/10.1109/ICCGI.2009.43","url":null,"abstract":"One of the most used intelligent technique for classification is a neural network. In real classification applications the patterns of different classes often overlap. In this situation the most appropriate classifier is the one whose outputs represent the class conditional probabilities. These probabilities are calculated in traditional statistics in two steps: first the underlying prior probabilities are estimated and then the Bayes rule is applied. One of the most popular methods for density estimation is Gaussian Mixture. It is also possible to calculate directly the class conditional probabilities using a Multilayer Perceptron Artificial Neural Network. Although it is not known yet which method is better in the general case, we demonstrate in this paper that Multilayer Perceptron is superior to Gaussian Mixture Model when the underlying prior probability densities are discontinuous along the support’s border.","PeriodicalId":201271,"journal":{"name":"2009 Fourth International Multi-Conference on Computing in the Global Information Technology","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127647682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Theories of action study what an actor do, in a given situation, in order to achieve consequence or objectives. Argyris and Schön made a distinction between espoused theories - those that an individual claims to follow - and theories-in-use - those that can be inferred from action -. In the software engineering field, software processes and practices constitute the espoused theory, since it is what engineers claim to follow. But what engineers - and especially apprentices - do may reveal a different theory-in-use. The capstone project provides students, working in groups, with the possibility to reflect on her/his action and that may help making explicit theories-in-use. The course of action theory considers the observable aspect of the actor’s activity, i.e., what is presentable, accountable and commentable. The course-of-action observatory collects data on the courses-of-action. This observatory connects continuous observations and recordings of the agents’ behavior, the provoked verbalizations of these agents in activity and the agents' comments in self confrontation with recordings of their behavior. A case study, based on the activity of a team of 6 young software engineer apprentices is used to illustrate the building and the data collecting of the course-of-action observatory and the self-reconstruction of apprentices’ activity. As primary results of this work, we may think that self-observing and self-analyzing software engineer’s activity help to reveal her/his theory-in-use – what governs engineers’ behavior and tends to be tacit structures –and it may help them to learn more suitable theories-in-use, thus contributing to improve productivity and performance. In the special case of apprenticeship learning, it may form a part of an appropriate education intended to develop a reflective attitude.
{"title":"Revealing Software Engineering Theory-in-Use through the Observation of Software Engineering Apprentices' Course-of-Action","authors":"V. Ribaud, P. Saliou","doi":"10.1109/ICCGI.2009.37","DOIUrl":"https://doi.org/10.1109/ICCGI.2009.37","url":null,"abstract":"Theories of action study what an actor do, in a given situation, in order to achieve consequence or objectives. Argyris and Schön made a distinction between espoused theories - those that an individual claims to follow - and theories-in-use - those that can be inferred from action -. In the software engineering field, software processes and practices constitute the espoused theory, since it is what engineers claim to follow. But what engineers - and especially apprentices - do may reveal a different theory-in-use. The capstone project provides students, working in groups, with the possibility to reflect on her/his action and that may help making explicit theories-in-use. The course of action theory considers the observable aspect of the actor’s activity, i.e., what is presentable, accountable and commentable. The course-of-action observatory collects data on the courses-of-action. This observatory connects continuous observations and recordings of the agents’ behavior, the provoked verbalizations of these agents in activity and the agents' comments in self confrontation with recordings of their behavior. A case study, based on the activity of a team of 6 young software engineer apprentices is used to illustrate the building and the data collecting of the course-of-action observatory and the self-reconstruction of apprentices’ activity. As primary results of this work, we may think that self-observing and self-analyzing software engineer’s activity help to reveal her/his theory-in-use – what governs engineers’ behavior and tends to be tacit structures –and it may help them to learn more suitable theories-in-use, thus contributing to improve productivity and performance. In the special case of apprenticeship learning, it may form a part of an appropriate education intended to develop a reflective attitude.","PeriodicalId":201271,"journal":{"name":"2009 Fourth International Multi-Conference on Computing in the Global Information Technology","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127144505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Rindzevičius, P. Tervydis, A. Zvironiene, Z. Navickas
Feedback data packet flow rate control is one of solutions which have been extensively studied. Monitoring the buffer status is the most used method to increase performance of a queueing system. This mathematical approach is most useful for analysis a multivariable transmission network node. In this research we focus on major problem that need to achieve defined level quality of service. Data packet retransmission and buffer overflow impact for queueing system performance is investigated. In this paper proposed adaptive feedback data flow rate control methods can be used to achieve stability and satisfactory service quality of a queueing system. We also demonstrate how with our proposed data packet rate-control scheme the buffer overflow does not occur. Processes in feedback control queueing system are analyzed by means of Markov chains.
{"title":"Feedback Impact Analysis of Queueing System with Stable States","authors":"R. Rindzevičius, P. Tervydis, A. Zvironiene, Z. Navickas","doi":"10.1109/ICCGI.2009.17","DOIUrl":"https://doi.org/10.1109/ICCGI.2009.17","url":null,"abstract":"Feedback data packet flow rate control is one of solutions which have been extensively studied. Monitoring the buffer status is the most used method to increase performance of a queueing system. This mathematical approach is most useful for analysis a multivariable transmission network node. In this research we focus on major problem that need to achieve defined level quality of service. Data packet retransmission and buffer overflow impact for queueing system performance is investigated. In this paper proposed adaptive feedback data flow rate control methods can be used to achieve stability and satisfactory service quality of a queueing system. We also demonstrate how with our proposed data packet rate-control scheme the buffer overflow does not occur. Processes in feedback control queueing system are analyzed by means of Markov chains.","PeriodicalId":201271,"journal":{"name":"2009 Fourth International Multi-Conference on Computing in the Global Information Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126937571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper demonstrates the ability to build small world network models with linked documents in form of web pages and generated via software engineering processes. It shows that searchable paths are achievable between two entities in the models by using the algorithms of searching the related web pages. Visualization of the models is presented and the results confirm that the small world network models can be decomposed into sub-models which are in turn small world models. The findings enable the construction of the small world network models to be governed easily by a documentation process and the paths within the models to be established by searching the related web pages.
{"title":"Small World Models in Linked Documents: Decomposition and Visualisation","authors":"Zhengxu Zhao","doi":"10.1109/ICCGI.2009.29","DOIUrl":"https://doi.org/10.1109/ICCGI.2009.29","url":null,"abstract":"This paper demonstrates the ability to build small world network models with linked documents in form of web pages and generated via software engineering processes. It shows that searchable paths are achievable between two entities in the models by using the algorithms of searching the related web pages. Visualization of the models is presented and the results confirm that the small world network models can be decomposed into sub-models which are in turn small world models. The findings enable the construction of the small world network models to be governed easily by a documentation process and the paths within the models to be established by searching the related web pages.","PeriodicalId":201271,"journal":{"name":"2009 Fourth International Multi-Conference on Computing in the Global Information Technology","volume":"1987 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130669727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The e-learning experience suffers from several known drawbacks; some resulting from the media in use, but some resulting from the unwise use of technology. The field that methodically deals with ways to utilize technologies and harness them for the users, in our case – the learners, is Human-Computer Interaction (HCI). The two major methods utilized are usability and user experiences. Web 2.0 has been creative with an approach that integrates these two methods – Usability 2.0 – distinguished from Usability 1.0 that is more oriented to usability. This work tries to understand how and in what way HCI methods can be used in order to enrich the e-learning experience. The research question investigated here is will the design of an e-learning environment in the framework of Web 2.0 (i.e., user content publishing and collaboration between users), via use of methodology and tools of Usability 2.0 (that integrates usability and user experiences) – enrich the e-learning experience itself. This work though only investigates the difference between the influences that Usability 2.0 has on the e-learning experience in comparison to Usability 1.0. The investigation was carried out on a student population from technological colleges in northern Israel. Quantitative tools were mainly used in this research while utilizing also qualitative tools. Quantitative outcomes confirmed that interface design using Usability 2.0 methods can enrich the e-learning experience. As was hypothesized, such an advanced interface enables an innovative flow experience and better perceived feeling of control of the learning process. In parallel, qualitative outcomes point to hardships encountered by the learners in their work with e-learning systems that were not designed using Usability 2.0.
{"title":"Enriching the E-learning Experience in the Framework of Web 2.0 Using Usability 2.0","authors":"David Gallula, Ariel J. Frank","doi":"10.1109/ICCGI.2009.41","DOIUrl":"https://doi.org/10.1109/ICCGI.2009.41","url":null,"abstract":"The e-learning experience suffers from several known drawbacks; some resulting from the media in use, but some resulting from the unwise use of technology. The field that methodically deals with ways to utilize technologies and harness them for the users, in our case – the learners, is Human-Computer Interaction (HCI). The two major methods utilized are usability and user experiences. Web 2.0 has been creative with an approach that integrates these two methods – Usability 2.0 – distinguished from Usability 1.0 that is more oriented to usability. This work tries to understand how and in what way HCI methods can be used in order to enrich the e-learning experience. The research question investigated here is will the design of an e-learning environment in the framework of Web 2.0 (i.e., user content publishing and collaboration between users), via use of methodology and tools of Usability 2.0 (that integrates usability and user experiences) – enrich the e-learning experience itself. This work though only investigates the difference between the influences that Usability 2.0 has on the e-learning experience in comparison to Usability 1.0. The investigation was carried out on a student population from technological colleges in northern Israel. Quantitative tools were mainly used in this research while utilizing also qualitative tools. Quantitative outcomes confirmed that interface design using Usability 2.0 methods can enrich the e-learning experience. As was hypothesized, such an advanced interface enables an innovative flow experience and better perceived feeling of control of the learning process. In parallel, qualitative outcomes point to hardships encountered by the learners in their work with e-learning systems that were not designed using Usability 2.0.","PeriodicalId":201271,"journal":{"name":"2009 Fourth International Multi-Conference on Computing in the Global Information Technology","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130866569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Based on the previously proposed framework, the Web-base Job Assignment’s Decision Support System (WJADSS) was implemented and launched. The result of system evaluation pinned point that the degree of job satisfaction evaluated by both job supervisors and employees was increased. However, the given system did not completely support the multi-level job assignment process which is normally found in the project workflow. Therefore, a framework for building a web-based decision support system for supporting “multi-level job assignment process” and “collaborative workflow” within a project team is identified. The new system, called the “Web-based Multi-level Job Assignment’s DSS (WMJADSS), is now being implemented. The existing models are adjusted to support both single-level and multi-level job assignment. Moreover, to increase efficiency and effectiveness of work performed along the project workflow, the data stored in the repositories will be used for producing descriptive and procedural knowledge for project’s stakeholders.
{"title":"A Framework for Building a Decision Support System for Multi-level Job Assignment","authors":"Patravadee Vongsumedh","doi":"10.1109/ICCGI.2009.19","DOIUrl":"https://doi.org/10.1109/ICCGI.2009.19","url":null,"abstract":"Based on the previously proposed framework, the Web-base Job Assignment’s Decision Support System (WJADSS) was implemented and launched. The result of system evaluation pinned point that the degree of job satisfaction evaluated by both job supervisors and employees was increased. However, the given system did not completely support the multi-level job assignment process which is normally found in the project workflow. Therefore, a framework for building a web-based decision support system for supporting “multi-level job assignment process” and “collaborative workflow” within a project team is identified. The new system, called the “Web-based Multi-level Job Assignment’s DSS (WMJADSS), is now being implemented. The existing models are adjusted to support both single-level and multi-level job assignment. Moreover, to increase efficiency and effectiveness of work performed along the project workflow, the data stored in the repositories will be used for producing descriptive and procedural knowledge for project’s stakeholders.","PeriodicalId":201271,"journal":{"name":"2009 Fourth International Multi-Conference on Computing in the Global Information Technology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129043195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}