Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.245932
HyangDuck Cho, JaeKyun Park, Keumsang Lim, Jong-Woo Kim, Wooshick Kim
The wired wireless integration network (WWIN) can be sorted out two approach ways of fixed mobile convergence (FMC) and fixed mobile integration (FMI). FMC means the convergence of the existing wired network and wireless network. The FMC infrastructure consists of wired and wireless network infra. Therefore a mobile device needs the function of connection method on the FMC infrastructure. Handover is one of methods for channel connect and connection control. Authors develop the mobile controlled handover algorithm, which can keep channel continuity in the wired wireless mixture network environment that consists of WLAN, CDMA and wired network. Mobile controlled handover algorithm accesses data by using transport layer and TCP/IP through each network in the wired wireless mixture network environment. User can move freely by using PDA in the wired wireless mixture network environment. Mobile controlled handover maintains the channel and the seamless transmission from PDA to server to provide real time service continuity. The channel of mobile controlled handover and the result of data transmission are presented by using data recorded on server. It is expected that the result of this thesis will contribute for a study on FMC network by using the wired wireless mixture network
{"title":"The mobile controlled handover method for fixed mobile convergence between WLAN, CDMA and LAN","authors":"HyangDuck Cho, JaeKyun Park, Keumsang Lim, Jong-Woo Kim, Wooshick Kim","doi":"10.1109/ICACT.2005.245932","DOIUrl":"https://doi.org/10.1109/ICACT.2005.245932","url":null,"abstract":"The wired wireless integration network (WWIN) can be sorted out two approach ways of fixed mobile convergence (FMC) and fixed mobile integration (FMI). FMC means the convergence of the existing wired network and wireless network. The FMC infrastructure consists of wired and wireless network infra. Therefore a mobile device needs the function of connection method on the FMC infrastructure. Handover is one of methods for channel connect and connection control. Authors develop the mobile controlled handover algorithm, which can keep channel continuity in the wired wireless mixture network environment that consists of WLAN, CDMA and wired network. Mobile controlled handover algorithm accesses data by using transport layer and TCP/IP through each network in the wired wireless mixture network environment. User can move freely by using PDA in the wired wireless mixture network environment. Mobile controlled handover maintains the channel and the seamless transmission from PDA to server to provide real time service continuity. The channel of mobile controlled handover and the result of data transmission are presented by using data recorded on server. It is expected that the result of this thesis will contribute for a study on FMC network by using the wired wireless mixture network","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123684002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.245868
Hyunhwa Seo, B. Ryu, J. Won, Choong-Ho Cho, Hyong-Woo Lee
Currently, IEEE 802.16a wireless MAN supports the contention based OFDMA-CDMA ranging subsystem for ranging operation (initial ranging, periodic ranging, bandwidth request). This system is basically similar to slotted ALOHA (K. Leonard and S.S. Lam, April 1975), but the frame size (code-slot/frame) allocated for random access or ranging request is relatively big and can be altered by the dynamic adjustment of downlink and uplink subframe size on the MAC frame of OFDMA-PHY system. In this paper, the design performance analytical model for correct interpretation of ranging subsystem is presented. Until now, the Internet traffic study have achieved wire net, but there is still a need for Internet traffic study that correctly reflects the radio environment. In this paper, the performance analysis result of this paper can perform the reference mark for random access protocol in OFDMA-CDMA ranging system. Traffic modeling can also be used to prepare the network resources in radio networks
目前,IEEE 802.16a无线城域网支持基于争用的OFDMA-CDMA测距子系统进行测距操作(初始测距、周期测距、带宽请求)。该系统基本类似于有槽ALOHA (K. Leonard and S.S. Lam, April 1975),但分配给随机访问或测距请求的帧大小(码槽/帧)比较大,可以通过OFDMA-PHY系统MAC帧上的下行和上行子帧大小的动态调整来改变。本文提出了测距子系统正确判读的设计性能分析模型。到目前为止,互联网流量研究已经实现了有线网络,但仍然需要正确反映无线电环境的互联网流量研究。本文的性能分析结果可以为OFDMA-CDMA测距系统中的随机接入协议提供参考。通信量建模还可以用于无线网络中网络资源的准备
{"title":"Design of performance analysis model for efficient random access protocol in CDMA based OFDMA-PHY system","authors":"Hyunhwa Seo, B. Ryu, J. Won, Choong-Ho Cho, Hyong-Woo Lee","doi":"10.1109/ICACT.2005.245868","DOIUrl":"https://doi.org/10.1109/ICACT.2005.245868","url":null,"abstract":"Currently, IEEE 802.16a wireless MAN supports the contention based OFDMA-CDMA ranging subsystem for ranging operation (initial ranging, periodic ranging, bandwidth request). This system is basically similar to slotted ALOHA (K. Leonard and S.S. Lam, April 1975), but the frame size (code-slot/frame) allocated for random access or ranging request is relatively big and can be altered by the dynamic adjustment of downlink and uplink subframe size on the MAC frame of OFDMA-PHY system. In this paper, the design performance analytical model for correct interpretation of ranging subsystem is presented. Until now, the Internet traffic study have achieved wire net, but there is still a need for Internet traffic study that correctly reflects the radio environment. In this paper, the performance analysis result of this paper can perform the reference mark for random access protocol in OFDMA-CDMA ranging system. Traffic modeling can also be used to prepare the network resources in radio networks","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"152 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122661504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.246198
J. Pedersen, T. Riaz, O. Madsen
Generalized double ring (N2R) network structures possess a number of good properties, but being not planar they are hard to physically embed in communication networks. However, if some of the lines, the interconnection lines, are implemented by wireless technologies, the remaining structure consists of two planar rings, which are easily embedded by fiber or other wired solutions. It is shown that for large N2R structures, the interconnection lines carry notably lower loads than the other lines if shortest-path routing is used, and the effects of two other routing schemes are explored, leading to lower load on interconnection lines at the price of larger efficient average distance and diameter
{"title":"Traffic load on interconnection lines of generalized double ring network structures","authors":"J. Pedersen, T. Riaz, O. Madsen","doi":"10.1109/ICACT.2005.246198","DOIUrl":"https://doi.org/10.1109/ICACT.2005.246198","url":null,"abstract":"Generalized double ring (N2R) network structures possess a number of good properties, but being not planar they are hard to physically embed in communication networks. However, if some of the lines, the interconnection lines, are implemented by wireless technologies, the remaining structure consists of two planar rings, which are easily embedded by fiber or other wired solutions. It is shown that for large N2R structures, the interconnection lines carry notably lower loads than the other lines if shortest-path routing is used, and the effects of two other routing schemes are explored, leading to lower load on interconnection lines at the price of larger efficient average distance and diameter","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125675701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.246071
Park Joo-Sang, Kim Young-il, Lee Yong-Joon
RFID technology has been expected to replace barcode or other identification schemes. But it is not used widely yet. RFID technology is easy to use and has merits of AIDC - Automatic Identification and Data Capture, but also serious problems of security. Main target of RFID is supply chain management, which may contain important information of customers and companies. Security threat, however, becomes the obstacle against spread of RFID technology. In this paper, security problems of RFID technology are explained first. The method for RFID security and necessary tag memory structure is explained
{"title":"Security considerations for RFID technology adoption","authors":"Park Joo-Sang, Kim Young-il, Lee Yong-Joon","doi":"10.1109/ICACT.2005.246071","DOIUrl":"https://doi.org/10.1109/ICACT.2005.246071","url":null,"abstract":"RFID technology has been expected to replace barcode or other identification schemes. But it is not used widely yet. RFID technology is easy to use and has merits of AIDC - Automatic Identification and Data Capture, but also serious problems of security. Main target of RFID is supply chain management, which may contain important information of customers and companies. Security threat, however, becomes the obstacle against spread of RFID technology. In this paper, security problems of RFID technology are explained first. The method for RFID security and necessary tag memory structure is explained","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125947636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.245968
Jeong-Ju Yoo, Jae-Dong Park, Tae-Yeon Kim, H. Yun, Byoung-whi Kim
The wavelength division multiplexing -passive optical network (WDM-PON) is an advanced optical access network that efficiently transports user traffic from a central office to end stations in the near future. In this paper, we make a description of the development of a platform. This paper mainly introduces the optical modules with its specifications and FTTH link OAM functions
{"title":"WDM-PON platform development","authors":"Jeong-Ju Yoo, Jae-Dong Park, Tae-Yeon Kim, H. Yun, Byoung-whi Kim","doi":"10.1109/ICACT.2005.245968","DOIUrl":"https://doi.org/10.1109/ICACT.2005.245968","url":null,"abstract":"The wavelength division multiplexing -passive optical network (WDM-PON) is an advanced optical access network that efficiently transports user traffic from a central office to end stations in the near future. In this paper, we make a description of the development of a platform. This paper mainly introduces the optical modules with its specifications and FTTH link OAM functions","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130133456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.246063
H. Shekhar, M.A.A. Kumar, K. Ramanatha
Multicast routing protocols proposed for mobile ad hoc networks have certain limitations. Most of these protocols try to discover the route on-demand by flooding route request messages, which results in increased end-to-end latency and also consumes considerable amount of network bandwidth. These limitations make protocols not suitable for real-time multimedia communication. In this paper, we have presented an efficient mobile agents aided multicast routing (MAMR) protocol which overcomes these limitations. The protocol is a hybrid protocol where intelligent mobile agents can been integrated with existing on-demand multicast routing protocols such as multicast ad hoc on-demand distance vector (MAODV) routing protocol, on-demand multicast routing protocol (ODMRP) routing protocol and others. Here, the mobile agents move around the network and collect the routing information. This routing information assists on-demand multicast routing protocols in discovering the route in a definite path instead of flooding the route request messages, thereby achieving better end-to-end latency and reduced control traffic in the network. We have used MAODV protocol as an underlying protocol with mobile agents. The proposed MAMR protocol and MAODV have been compared through extensive simulations with end-to-end latency, packet delivery ratio and control overhead as performance parameters
{"title":"Mobile agents aided multicast routing in mobile ad hoc networks","authors":"H. Shekhar, M.A.A. Kumar, K. Ramanatha","doi":"10.1109/ICACT.2005.246063","DOIUrl":"https://doi.org/10.1109/ICACT.2005.246063","url":null,"abstract":"Multicast routing protocols proposed for mobile ad hoc networks have certain limitations. Most of these protocols try to discover the route on-demand by flooding route request messages, which results in increased end-to-end latency and also consumes considerable amount of network bandwidth. These limitations make protocols not suitable for real-time multimedia communication. In this paper, we have presented an efficient mobile agents aided multicast routing (MAMR) protocol which overcomes these limitations. The protocol is a hybrid protocol where intelligent mobile agents can been integrated with existing on-demand multicast routing protocols such as multicast ad hoc on-demand distance vector (MAODV) routing protocol, on-demand multicast routing protocol (ODMRP) routing protocol and others. Here, the mobile agents move around the network and collect the routing information. This routing information assists on-demand multicast routing protocols in discovering the route in a definite path instead of flooding the route request messages, thereby achieving better end-to-end latency and reduced control traffic in the network. We have used MAODV protocol as an underlying protocol with mobile agents. The proposed MAMR protocol and MAODV have been compared through extensive simulations with end-to-end latency, packet delivery ratio and control overhead as performance parameters","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"89 23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129780403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.245957
Yong-Geun Hong, Jungsoo Park, Hyoungjun Kim
This paper specifies a mechanism for CDMA/WLAN heterogeneous network interworking based on IPv6. A node with two different link-layer interfaces can select one interface for communicating to another node. When the node moves around networks, it is possible to switch another interface because the node is no more available to use the first selected interface. During this switching of interface, service session must be preserved and duration time of switching must be short not to be recognized by users. And the selection of proper interface must be taken into consideration with many aspects and the point of time of switching must be determined carefully for seamless service
{"title":"IPv6 based CDMA/WLAN heterogeneous network interworking","authors":"Yong-Geun Hong, Jungsoo Park, Hyoungjun Kim","doi":"10.1109/ICACT.2005.245957","DOIUrl":"https://doi.org/10.1109/ICACT.2005.245957","url":null,"abstract":"This paper specifies a mechanism for CDMA/WLAN heterogeneous network interworking based on IPv6. A node with two different link-layer interfaces can select one interface for communicating to another node. When the node moves around networks, it is possible to switch another interface because the node is no more available to use the first selected interface. During this switching of interface, service session must be preserved and duration time of switching must be short not to be recognized by users. And the selection of proper interface must be taken into consideration with many aspects and the point of time of switching must be determined carefully for seamless service","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128068711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.246078
Youngil Kim, Joo-Sang Park, Taesu Cheong
`Ubiquitous Computing' was appeared first time by Mark Weiser in 1988. Recently, as basic technologies for realization are offered and technical necessity is appeared, various researches are progressed about this. Various forms of technologies are needed to satisfy ubiquitous computing environment, such as home networking, telematics, industry automation and so on. Particularly, in the industry automation field that utilizes RFID technology, there have been many researches on the automation of supply chain management, control of goods in stock, physical distribution management, warehouse management, etc. We report about current research contents about RFID middleware framework which is necessary for RFID application development in ubiquitous environments. Then we analyze this and propose to RFID middleware framework's development direction that is used in ubiquitous computing environment hereafter
{"title":"Study of RFID middleware framework for ubiquitous computing environment","authors":"Youngil Kim, Joo-Sang Park, Taesu Cheong","doi":"10.1109/ICACT.2005.246078","DOIUrl":"https://doi.org/10.1109/ICACT.2005.246078","url":null,"abstract":"`Ubiquitous Computing' was appeared first time by Mark Weiser in 1988. Recently, as basic technologies for realization are offered and technical necessity is appeared, various researches are progressed about this. Various forms of technologies are needed to satisfy ubiquitous computing environment, such as home networking, telematics, industry automation and so on. Particularly, in the industry automation field that utilizes RFID technology, there have been many researches on the automation of supply chain management, control of goods in stock, physical distribution management, warehouse management, etc. We report about current research contents about RFID middleware framework which is necessary for RFID application development in ubiquitous environments. Then we analyze this and propose to RFID middleware framework's development direction that is used in ubiquitous computing environment hereafter","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131481111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.246010
Ju-Han Kim, Kiyoung Moon
In this paper, we design key management protocols and services with unified single interface, which extend the scheme and services of XKMS, for various kinds of security information such as, private key, secret key, biometric information, security tokens for Web service, and the like. The model we propose modifies and extends the protocols and services such as key registration, reissue, revocation, recovery, location service and validation for only public key pair to provide a way to manage other security information including public key pair. We also describe the processes and structures of the model comparing to legacy them of XKMS model
{"title":"Design of unified key management model using XKMS","authors":"Ju-Han Kim, Kiyoung Moon","doi":"10.1109/ICACT.2005.246010","DOIUrl":"https://doi.org/10.1109/ICACT.2005.246010","url":null,"abstract":"In this paper, we design key management protocols and services with unified single interface, which extend the scheme and services of XKMS, for various kinds of security information such as, private key, secret key, biometric information, security tokens for Web service, and the like. The model we propose modifies and extends the protocols and services such as key registration, reissue, revocation, recovery, location service and validation for only public key pair to provide a way to manage other security information including public key pair. We also describe the processes and structures of the model comparing to legacy them of XKMS model","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128827611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.245954
Seungwon Shin, Kiyoung Kim, Jongsoo Jang
There are a lot of studies that have measured TCP traffic, but none of them provide the investigation results of TCP SYN packet. In this paper, we show and explain common behavior of TCP SYN packets in traces from a research center using various statistical analysis methods. We selected three parameters to find the behavior of TCP SYN traffic - number of received SYN packets in every 10 ms, SYN PPS (packet per second), and SYN/TCP (ratio between SYN packets and total TCP packets every in 10ms). Our analysis mechanisms are divided into two groups. We started our examination with general statistical tool to provide the knowledge of data distribution. In the second place, we applied change point detection algorithm to our traces to discover the change of state. We summarized our findings in two main categories, qualitative and quantitative. In qualitative findings, we exhibit the characteristics of arising TCP connection and the amount of SYN packet existing in real network and also expose which parameter can explain the characteristics of SYN traffic well. Quantitative findings provide lots of numerical examples to support qualitative findings
{"title":"Analysis of TCP SYN traffic: an empirical study","authors":"Seungwon Shin, Kiyoung Kim, Jongsoo Jang","doi":"10.1109/ICACT.2005.245954","DOIUrl":"https://doi.org/10.1109/ICACT.2005.245954","url":null,"abstract":"There are a lot of studies that have measured TCP traffic, but none of them provide the investigation results of TCP SYN packet. In this paper, we show and explain common behavior of TCP SYN packets in traces from a research center using various statistical analysis methods. We selected three parameters to find the behavior of TCP SYN traffic - number of received SYN packets in every 10 ms, SYN PPS (packet per second), and SYN/TCP (ratio between SYN packets and total TCP packets every in 10ms). Our analysis mechanisms are divided into two groups. We started our examination with general statistical tool to provide the knowledge of data distribution. In the second place, we applied change point detection algorithm to our traces to discover the change of state. We summarized our findings in two main categories, qualitative and quantitative. In qualitative findings, we exhibit the characteristics of arising TCP connection and the amount of SYN packet existing in real network and also expose which parameter can explain the characteristics of SYN traffic well. Quantitative findings provide lots of numerical examples to support qualitative findings","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121967569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}