This paper considers a formal object-oriented model for distributed computing. Object orientation appears as a leading framework for concurrent and distributed systems. However, the synchronization of the RPC communication model is unsatisfactory in many distributed systems. Asynchronous message passing gives better control and efficiency in this setting, but lacks the structure and discipline of traditional object-oriented methods. The integration of the message concept in the object-oriented paradigm is unsettled, especially with respect to inheritance and redefinition. We propose an approach combining asynchronous method calls and conditional processor release points, which reduces the cost of waiting for replies in the distributed environment while avoiding low-level synchronization constructs such as explicit signaling. Even the lack of replies to method calls in unstable environments need not lead to deadlock in the invoking objects. This property seems attractive in asynchronous, open, or unreliable environments. Furthermore, the approach allows active and passive behavior (client and server) to be combined in concurrent objects in a very natural way. In this paper, we consider the integration of these constructs with a mechanism for multiple inheritance within a small object-oriented language. The language constructs are formally described by an operational semantics defined in rewriting logic.
{"title":"Inheritance in the Presence of Asynchronous Method Calls","authors":"E. Johnsen, Olaf Owe","doi":"10.1109/HICSS.2005.323","DOIUrl":"https://doi.org/10.1109/HICSS.2005.323","url":null,"abstract":"This paper considers a formal object-oriented model for distributed computing. Object orientation appears as a leading framework for concurrent and distributed systems. However, the synchronization of the RPC communication model is unsatisfactory in many distributed systems. Asynchronous message passing gives better control and efficiency in this setting, but lacks the structure and discipline of traditional object-oriented methods. The integration of the message concept in the object-oriented paradigm is unsettled, especially with respect to inheritance and redefinition. We propose an approach combining asynchronous method calls and conditional processor release points, which reduces the cost of waiting for replies in the distributed environment while avoiding low-level synchronization constructs such as explicit signaling. Even the lack of replies to method calls in unstable environments need not lead to deadlock in the invoking objects. This property seems attractive in asynchronous, open, or unreliable environments. Furthermore, the approach allows active and passive behavior (client and server) to be combined in concurrent objects in a very natural way. In this paper, we consider the integration of these constructs with a mechanism for multiple inheritance within a small object-oriented language. The language constructs are formally described by an operational semantics defined in rewriting logic.","PeriodicalId":355838,"journal":{"name":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128968409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper describes a usage-based pricing scheme for distributing digital content over peer-to-peer networks that rewards peer users who actively participate in the distribution process. We present a dynamic distribution model that is used to compare centralized, client-server distribuition with peer-to-peer network distribution. The conventional problem of free-riding in peer-to-peer networks is eliminated or vastly reduced. The participation incentive creates effective peer-to-peer network communities and leads to faster content distribution than in equivalent client-server settings while retaining the same profit level.
{"title":"A Pricing Mechanism for Digital Content Distribution Over Peer-to-Peer Networks","authors":"K. Lang, R. Vragov","doi":"10.1109/HICSS.2005.39","DOIUrl":"https://doi.org/10.1109/HICSS.2005.39","url":null,"abstract":"This paper describes a usage-based pricing scheme for distributing digital content over peer-to-peer networks that rewards peer users who actively participate in the distribution process. We present a dynamic distribution model that is used to compare centralized, client-server distribuition with peer-to-peer network distribution. The conventional problem of free-riding in peer-to-peer networks is eliminated or vastly reduced. The participation incentive creates effective peer-to-peer network communities and leads to faster content distribution than in equivalent client-server settings while retaining the same profit level.","PeriodicalId":355838,"journal":{"name":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130609767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Strategic planning (or road-mapping) of software releases addresses the assignment of requirements to releases on a strategic level. Effort, finance and risk constraints are considered to determine strategic release plans. The goal is to find an optimal balance between competing stakeholder priorities and bottleneck resources. However, strategic planning has to be supplemented by more fine-grained operational planning as typically performed in project management. The paper describes mechanisms by which to reduce the complexity of strategic and operational planning to a series of data and formulae that objectively represent input from all stakeholders and can easily reported, analyzed and manipulated. The capability provides improved planning and re-planning in a dynamic business environment, including the ability to validate strategic plans against operational limitations and revise as necessary. For performing strategic planning, we present the research prototype ReleasePlanner™. Real-world experience in performing strategic planning using ReleasePlanner is reported from a case study at Trema Laboratories Inc.
{"title":"Strategic Release Planning and Evaluation of Operational Feasibility","authors":"G. Ruhe, J. Momoh","doi":"10.1109/HICSS.2005.561","DOIUrl":"https://doi.org/10.1109/HICSS.2005.561","url":null,"abstract":"Strategic planning (or road-mapping) of software releases addresses the assignment of requirements to releases on a strategic level. Effort, finance and risk constraints are considered to determine strategic release plans. The goal is to find an optimal balance between competing stakeholder priorities and bottleneck resources. However, strategic planning has to be supplemented by more fine-grained operational planning as typically performed in project management. The paper describes mechanisms by which to reduce the complexity of strategic and operational planning to a series of data and formulae that objectively represent input from all stakeholders and can easily reported, analyzed and manipulated. The capability provides improved planning and re-planning in a dynamic business environment, including the ability to validate strategic plans against operational limitations and revise as necessary. For performing strategic planning, we present the research prototype ReleasePlanner™. Real-world experience in performing strategic planning using ReleasePlanner is reported from a case study at Trema Laboratories Inc.","PeriodicalId":355838,"journal":{"name":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127639145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Group Support Systems (GSS) are increasingly present in different organizational configurations. One way to stimulate sustained use of a GSS is to consciously design recurring processes that support mission critical tasks. Based on this notion the first two phases of a crisis response process in one of the main harbors in the world were modeled and redefined in terms of thinkLets. This delivered a process design that was supported by a GSS. The aim of the project was to design and execute the situational awareness phase in a distributed fashion and to do it faster and more effective than the current same-time same-place process.
{"title":"Crisis-Response in the Port of Rotterdam: Can We do Without a Facilitator in Distributed Settings?","authors":"J. Appelman, J. V. Driel","doi":"10.1109/HICSS.2005.177","DOIUrl":"https://doi.org/10.1109/HICSS.2005.177","url":null,"abstract":"Group Support Systems (GSS) are increasingly present in different organizational configurations. One way to stimulate sustained use of a GSS is to consciously design recurring processes that support mission critical tasks. Based on this notion the first two phases of a crisis response process in one of the main harbors in the world were modeled and redefined in terms of thinkLets. This delivered a process design that was supported by a GSS. The aim of the project was to design and execute the situational awareness phase in a distributed fashion and to do it faster and more effective than the current same-time same-place process.","PeriodicalId":355838,"journal":{"name":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131692566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
There has been limited research on how non-conventional system development methodologies such as, Agile modeling methods could improve the successful development and implementation of telehealth services. The goal of this research was to increase the understanding of the impact of using the Extreme Programming process, an Agile modeling approach, to the development effort of a biosecurity telehealth project. Overall, the research indicates that Extreme Programming is an effective methodology to develop health care applications. The rapid prototyping enabled IT developers and health care users to clarify system requirements, communicate openly, and quickly build rapport. Further, the research found that that where the technology was new or foreign, the Extreme Programming process was flexible enough to support several iterations of technology and produce prototypes in a timely manner.
{"title":"Experiences with Extreme Programming in Telehealth: Developing and Implementing a Biosecurity Health Care Application","authors":"Ann L. Fruhling, K. Tyser, G. Vreede","doi":"10.1109/HICSS.2005.257","DOIUrl":"https://doi.org/10.1109/HICSS.2005.257","url":null,"abstract":"There has been limited research on how non-conventional system development methodologies such as, Agile modeling methods could improve the successful development and implementation of telehealth services. The goal of this research was to increase the understanding of the impact of using the Extreme Programming process, an Agile modeling approach, to the development effort of a biosecurity telehealth project. Overall, the research indicates that Extreme Programming is an effective methodology to develop health care applications. The rapid prototyping enabled IT developers and health care users to clarify system requirements, communicate openly, and quickly build rapport. Further, the research found that that where the technology was new or foreign, the Extreme Programming process was flexible enough to support several iterations of technology and produce prototypes in a timely manner.","PeriodicalId":355838,"journal":{"name":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131697895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Building a good cooperation in the P2P resource sharing is a fundamental and challenging research topic because of peer anonymity, peer independence, high dynamics of peer behaviors and network conditions, and the absence of an effective security mechanism. In this paper, we propose PET, a personalized trust model, to help the construction of a good cooperation, especially in the context of economic-based solutions for the P2P resource sharing. The trust model consists of two parts: reputation evaluation and risk evaluation. Reputation is the accumulative assessment of the long-term behavior, while the risk evaluation is the opinion of the short-term behavior. The risk part is employed to deal with the dramatic spoiling of peers, which makes PET differ from other trust models that based on the reputation only. This paper contributes to first modeling the risk as the opinion of short-term trustworthiness and combining with traditional reputation evaluation to derive the trustworthiness in this field.
{"title":"PET: A PErsonalized Trust Model with Reputation and Risk Evaluation for P2P Resource Sharing","authors":"Zhengqiang Liang, Weisong Shi","doi":"10.1109/HICSS.2005.493","DOIUrl":"https://doi.org/10.1109/HICSS.2005.493","url":null,"abstract":"Building a good cooperation in the P2P resource sharing is a fundamental and challenging research topic because of peer anonymity, peer independence, high dynamics of peer behaviors and network conditions, and the absence of an effective security mechanism. In this paper, we propose PET, a personalized trust model, to help the construction of a good cooperation, especially in the context of economic-based solutions for the P2P resource sharing. The trust model consists of two parts: reputation evaluation and risk evaluation. Reputation is the accumulative assessment of the long-term behavior, while the risk evaluation is the opinion of the short-term behavior. The risk part is employed to deal with the dramatic spoiling of peers, which makes PET differ from other trust models that based on the reputation only. This paper contributes to first modeling the risk as the opinion of short-term trustworthiness and combining with traditional reputation evaluation to derive the trustworthiness in this field.","PeriodicalId":355838,"journal":{"name":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences","volume":"26 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128827756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Deception detection (DD) is infused with uncertainty due to vagueness and imprecision. To address the above issue, we developed a Model of Uncertainty in Deception Detection (MUDD) and selected the Neuro-Fuzzy classifier to predict deception. A Neuro-fuzzy model integrates the fuzzy set and logic for handling uncertainty with artificial neural network for learning DD models from the data. The performance of the models was empirically tested with deception data collected from synchronous computer-mediated communication. The results show that the performance of the Neuro-fuzzy model is comparable to that of the best model from the traditional machine learning paradigm. Moreover, they have better interpretability, stability, and reliability. We can draw significant theoretical, mathematical, and practical implications to the deception research from this study.
{"title":"Modeling and Handling Uncertainty in Deception Detection","authors":"Lina Zhou, A. Zenebe","doi":"10.1109/HICSS.2005.438","DOIUrl":"https://doi.org/10.1109/HICSS.2005.438","url":null,"abstract":"Deception detection (DD) is infused with uncertainty due to vagueness and imprecision. To address the above issue, we developed a Model of Uncertainty in Deception Detection (MUDD) and selected the Neuro-Fuzzy classifier to predict deception. A Neuro-fuzzy model integrates the fuzzy set and logic for handling uncertainty with artificial neural network for learning DD models from the data. The performance of the models was empirically tested with deception data collected from synchronous computer-mediated communication. The results show that the performance of the Neuro-fuzzy model is comparable to that of the best model from the traditional machine learning paradigm. Moreover, they have better interpretability, stability, and reliability. We can draw significant theoretical, mathematical, and practical implications to the deception research from this study.","PeriodicalId":355838,"journal":{"name":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128833966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The first session focuses on trust ant its relationship on customers. This session has three papers leading off with a paper by Serino, Furner, and Smatt entitled “making it personal: how personalization affect trust over time.” The objective of the paper is to examine trust as it applies to developing stable relationships in electronic environments. The second paper by Kim and Tadisina, “factors impacting customers’ initial trust in ebusiness: an empirical study,” investigates trust in start-up companies. The results suggest that website quality has a significant impact on customers’ initial trust. The third paper by Kim and Kim is another empirical paper “a study of online transaction selfefficacy, consumer trust, and uncertainty reduction in electronic commerce transaction.” This paper is one of the initial papers that have investigated self-efficacy on a consumers purchasing behavior. The second session consists of four papers that deal with models and business frameworks. The first paper by Khalifa and Shen, “effects of electronic customer relationship management on customer satisfaction: a temporal model,” explores the relationship among pre-purchase, at-purchase, and post-purchase eCRM and customer satisfaction. The second paper by Brohman, Piccoli, Watson and Parasuraman, NCSS process completeness: construct development and preliminary validation,” describes the results of exploratory field research on networkedbased computerized information systems in regards to customer sales transactions. Boehm and Gensler, “evaluating the impact of the online sales channels on customer profitability,” objective is to identify the sources of profitability differences between online and offline customers for the development of effective multi-channel management strategies. The last paper by Schubert and Hampe, “business model for mobile communities,” address and develops a research framework to study mobile communities and business.
{"title":"E-Commerce Customer Relationship Management HICSS-38","authors":"J. Fjermestad, N. Romano","doi":"10.1109/HICSS.2005.214","DOIUrl":"https://doi.org/10.1109/HICSS.2005.214","url":null,"abstract":"The first session focuses on trust ant its relationship on customers. This session has three papers leading off with a paper by Serino, Furner, and Smatt entitled “making it personal: how personalization affect trust over time.” The objective of the paper is to examine trust as it applies to developing stable relationships in electronic environments. The second paper by Kim and Tadisina, “factors impacting customers’ initial trust in ebusiness: an empirical study,” investigates trust in start-up companies. The results suggest that website quality has a significant impact on customers’ initial trust. The third paper by Kim and Kim is another empirical paper “a study of online transaction selfefficacy, consumer trust, and uncertainty reduction in electronic commerce transaction.” This paper is one of the initial papers that have investigated self-efficacy on a consumers purchasing behavior. The second session consists of four papers that deal with models and business frameworks. The first paper by Khalifa and Shen, “effects of electronic customer relationship management on customer satisfaction: a temporal model,” explores the relationship among pre-purchase, at-purchase, and post-purchase eCRM and customer satisfaction. The second paper by Brohman, Piccoli, Watson and Parasuraman, NCSS process completeness: construct development and preliminary validation,” describes the results of exploratory field research on networkedbased computerized information systems in regards to customer sales transactions. Boehm and Gensler, “evaluating the impact of the online sales channels on customer profitability,” objective is to identify the sources of profitability differences between online and offline customers for the development of effective multi-channel management strategies. The last paper by Schubert and Hampe, “business model for mobile communities,” address and develops a research framework to study mobile communities and business.","PeriodicalId":355838,"journal":{"name":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125490654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Our research seeks to understand how to extend established organization theory and emerging knowledge-flow theory to inform the design of organizations with discontinuous participation. Because knowledge flows enable workflows, and work determines performance, theory suggests the organization of knowledge-particularly tacit knowledge-is critical for competitive advantage. However, tacit knowledge does not flow well through the enterprise, and it attenuates particularly quickly in organizations that experience discontinuous participation. In this paper we build upon an ethnographic study and computational organization theory (COT) to model and analyze discontinuous participation in the domain of facility development. We find organizational design characteristics such as task interdependency affect flows of tacit knowledge and hence work performance in the enterprise. Computational and analytical results suggest how we can extend organization theory to address the dynamics of knowledge flows when designing organizations with discontinuous participation.
{"title":"Developing a Knowledge-Based Organizational Performance Model for Discontinuous Participatory Enterprises","authors":"R. Ibrahim, M. Nissen","doi":"10.1109/HICSS.2005.195","DOIUrl":"https://doi.org/10.1109/HICSS.2005.195","url":null,"abstract":"Our research seeks to understand how to extend established organization theory and emerging knowledge-flow theory to inform the design of organizations with discontinuous participation. Because knowledge flows enable workflows, and work determines performance, theory suggests the organization of knowledge-particularly tacit knowledge-is critical for competitive advantage. However, tacit knowledge does not flow well through the enterprise, and it attenuates particularly quickly in organizations that experience discontinuous participation. In this paper we build upon an ethnographic study and computational organization theory (COT) to model and analyze discontinuous participation in the domain of facility development. We find organizational design characteristics such as task interdependency affect flows of tacit knowledge and hence work performance in the enterprise. Computational and analytical results suggest how we can extend organization theory to address the dynamics of knowledge flows when designing organizations with discontinuous participation.","PeriodicalId":355838,"journal":{"name":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125540586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents the refinement of a semiotic information quality framework based on the analysis of practitioner and academic focus group feedback. The initial information quality framework was developed to address the question of what criteria should be used to define and assess quality. Semiotic theory, the philosophical theory of signs, provided a theoretical foundation for defining the framework structure (i.e. quality categories and their criteria) and for integrating objective, product-based and subjective, service-based quality perspectives, thus addressing problems observed in other proposed quality schemes with respect to scope and inconsistency. Following on from the initial theoretical work, empirical methods were used to refine the framework, especially the subjective components related to consumer quality perceptions. Specifically, focus group feedback served to (1) further clarify the scope and boundaries of the research and (2) to identify inter-dependencies, ambiguities, and gaps in the initial set of quality criteria.
{"title":"Empirical Refinement of a Semiotic Information Quality Framework","authors":"Rosanne J. Price, G. Shanks","doi":"10.1109/HICSS.2005.233","DOIUrl":"https://doi.org/10.1109/HICSS.2005.233","url":null,"abstract":"This paper presents the refinement of a semiotic information quality framework based on the analysis of practitioner and academic focus group feedback. The initial information quality framework was developed to address the question of what criteria should be used to define and assess quality. Semiotic theory, the philosophical theory of signs, provided a theoretical foundation for defining the framework structure (i.e. quality categories and their criteria) and for integrating objective, product-based and subjective, service-based quality perspectives, thus addressing problems observed in other proposed quality schemes with respect to scope and inconsistency. Following on from the initial theoretical work, empirical methods were used to refine the framework, especially the subjective components related to consumer quality perceptions. Specifically, focus group feedback served to (1) further clarify the scope and boundaries of the research and (2) to identify inter-dependencies, ambiguities, and gaps in the initial set of quality criteria.","PeriodicalId":355838,"journal":{"name":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126671548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}