{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T01:14:13Z","timestamp":1742951653155,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540256304"},{"type":"electronic","value":"9783540320067"}],"license":[{"start":{"date-parts":[[2005,1,1]],"date-time":"2005-01-01T00:00:00Z","timestamp":1104537600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11417019_11","type":"book-chapter","created":{"date-parts":[[2010,7,11]],"date-time":"2010-07-11T21:56:39Z","timestamp":1278885399000},"page":"157-172","source":"Crossref","is-referenced-by-count":4,"title":["Global Computing in a Dynamic Network of Tuple Spaces"],"prefix":"10.1007","author":[{"given":"Rocco","family":"De Nicola","sequence":"first","affiliation":[]},{"given":"Daniele","family":"Gorla","sequence":"additional","affiliation":[]},{"given":"Rosario","family":"Pugliese","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/3-540-63141-0_5","volume-title":"CONCUR\u201997: Concurrency Theory","author":"M. Abadi","year":"1997","unstructured":"Abadi, M., Gordon, A.D.: Reasoning about cryptographic protocols in the Spi calculus. In: Mazurkiewicz, A., Winkowski, J. (eds.) CONCUR 1997. LNCS, vol.\u00a01243, pp. 59\u201373. Springer, Heidelberg (1997)"},{"key":"11_CR2","volume-title":"Distributed Computing","author":"H. Attiya","year":"1998","unstructured":"Attiya, H., Welch, J.: Distributed Computing. McGraw-Hill, New York (1998)"},{"key":"11_CR3","first-page":"110","volume-title":"Proc. of the 7th WETICE","author":"L. Bettini","year":"1998","unstructured":"Bettini, L., De Nicola, R., Ferrari, G., Pugliese, R.: Interactive Mobile Agents in X-Klaim. In: Proc. of the 7th WETICE, pp. 110\u2013115. IEEE, Los Alamitos (1998)"},{"key":"11_CR4","first-page":"373","volume-title":"Proc. of the 2000 ACM Symposium on Applied Computing","author":"L. Bettini","year":"2002","unstructured":"Bettini, L., Loreti, M., Pugliese, R.: An Infrastructure Language for Open Nets. In: Proc. of the 2000 ACM Symposium on Applied Computing, pp. 373\u2013377. ACM Press, New York (2002)"},{"key":"11_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/BFb0057663","volume-title":"Mobile Agents","author":"G. Cabri","year":"1998","unstructured":"Cabri, G., Leonardi, L., Zambonelli, F.: Reactive Tuple Spaces for Mobile Agent Coordination. In: Rothermel, K., Hohl, F. (eds.) MA 1998. LNCS, vol.\u00a01477, pp. 237\u2013248. Springer, Heidelberg (1998)"},{"key":"11_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/3-540-48749-2_4","volume-title":"Secure Internet Programming","author":"L. Cardelli","year":"1999","unstructured":"Cardelli, L.: Abstractions for mobile computation. In: Vitek, J. (ed.) Secure Internet Programming. LNCS, vol.\u00a01603, pp. 51\u201394. Springer, Heidelberg (1999)"},{"issue":"1","key":"11_CR7","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/S0304-3975(99)00231-5","volume":"240","author":"L. Cardelli","year":"2000","unstructured":"Cardelli, L., Gordon, A.D.: Mobile ambients. Theoretical Computer Science\u00a0240(1), 177\u2013213 (2000)","journal-title":"Theoretical Computer Science"},{"key":"11_CR8","unstructured":"Castellani, S., Ciancarini, P., Rossi, D.: The ShaPE of ShaDE: a coordination system. Tech. Rep. UBLCS 96-5, Dip. di Scienze dell\u2019Informazione, Univ. di Bologna, Italy (1996)"},{"issue":"2","key":"11_CR9","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1145\/226643.226647","volume":"43","author":"T. Chandra","year":"1996","unstructured":"Chandra, T., Toueg, S.: Unreliable Failure Detectors for Reliable Distributed Systems. Journal of the ACM\u00a043(2), 225\u2013267 (1996)","journal-title":"Journal of the ACM"},{"issue":"1","key":"11_CR10","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1006\/inco.1993.1043","volume":"105","author":"S. Chaudhuri","year":"1993","unstructured":"Chaudhuri, S.: More Choices Allow More Faults: Set Consensus Problems in Totally Asynchronous Systems. Information and Computation\u00a0105(1), 132\u2013158 (1993)","journal-title":"Information and Computation"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Davies, N., Wade, S., Friday, A., Blair, G.: L2imbo: a tuple space based platform for adaptive mobile applications. In: Int. Conference on Open Distributed Processing\/Distributed Platforms, ICODP\/ICDP 1997 (1997)","DOI":"10.1007\/978-0-387-35188-9_22"},{"issue":"5","key":"11_CR12","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1109\/32.685256","volume":"24","author":"R. Nicola De","year":"1998","unstructured":"De Nicola, R., Ferrari, G., Pugliese, R.: Klaim: a Kernel Language for Agents Interaction and Mobility. IEEE Transactions on Software Engineering\u00a024(5), 315\u2013330 (1998)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"11_CR13","unstructured":"De Nicola, R., Gorla, D., Pugliese, R.: Basic observables for a calculus for global computing. Technical Report 07\/2004, Dip. di Informatica, Univ. di Roma \u201cLa Sapienza\u201d., Available at, http:\/\/www.dsi.uniroma1.it\/~gorla\/papers\/bo4k-full.pdf"},{"key":"11_CR14","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/0304-3975(84)90113-0","volume":"34","author":"R. Nicola De","year":"1984","unstructured":"De Nicola, R., Hennessy, M.: Testing equivalence for processes. Theoretical Computer Science\u00a034, 83\u2013133 (1984)","journal-title":"Theoretical Computer Science"},{"key":"11_CR15","first-page":"278","volume-title":"Proc. of ISADS 2001","author":"D. Deugo","year":"2001","unstructured":"Deugo, D.: Choosing a Mobile Agent Messaging Model. In: Proc. of ISADS 2001, pp. 278\u2013286. IEEE, Los Alamitos (2001)"},{"key":"11_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1007\/3-540-61604-7_67","volume-title":"CONCUR \u201996: Concurrency Theory","author":"C. Fournet","year":"1996","unstructured":"Fournet, C., Gonthier, G., L\u00e9vy, J.-J., Maranget, L., R\u00e9my, D.: A calculus of mobile agents. In: Sassone, V., Montanari, U. (eds.) CONCUR 1996. LNCS, vol.\u00a01119, pp. 406\u2013421. Springer, Heidelberg (1996)"},{"key":"11_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1007\/978-3-540-45187-7_26","volume-title":"CONCUR 2003 - Concurrency Theory","author":"R. Fuzzati","year":"2003","unstructured":"Fuzzati, R., Merro, M., Nestmann, U.: Modelling Consensus in a Process Calculus. In: Amadio, R.M., Lugiez, D. (eds.) CONCUR 2003. LNCS, vol.\u00a02761, pp. 399\u2013414. Springer, Heidelberg (2003)"},{"issue":"1","key":"11_CR18","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1145\/2363.2433","volume":"7","author":"D. Gelernter","year":"1985","unstructured":"Gelernter, D.: Generative communication in linda. ACM Transactions on Programming Languages and Systems\u00a07(1), 80\u2013112 (1985)","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"11_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/3-540-45061-0_11","volume-title":"Automata, Languages and Programming","author":"D. Gorla","year":"2003","unstructured":"Gorla, D., Pugliese, R.: Resource Access and Mobility Control with Dynamic Privileges Acquisition. In: Baeten, J.C.M., Lenstra, J.K., Parrow, J., Woeginger, G.J. (eds.) ICALP 2003. LNCS, vol.\u00a02719, pp. 119\u2013132. Springer, Heidelberg (2003)"},{"key":"11_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1007\/978-3-540-39881-3_10","volume-title":"Security in Pervasive Computing","author":"D. Gorla","year":"2004","unstructured":"Gorla, D., Pugliese, R.: Enforcing Security Policies via Types. In: Hutter, D., M\u00fcller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol.\u00a02802, pp. 88\u2013103. Springer, Heidelberg (2004)"},{"key":"11_CR21","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1006\/inco.2001.3089","volume":"173","author":"M. Hennessy","year":"2002","unstructured":"Hennessy, M., Riely, J.: Resource Access Control in Systems of Mobile Agents. Information and Computation\u00a0173, 82\u2013120 (2002)","journal-title":"Information and Computation"},{"key":"11_CR22","series-title":"Series F","volume-title":"Logic and Algebra of Specification","author":"R. Milner","year":"1993","unstructured":"Milner, R.: The polyadic \u03c0-calculus: A tutorial. In: Logic and Algebra of Specification. NATO ASI. Series F, vol.\u00a094. Springer, Heidelberg (1993)"},{"issue":"5","key":"11_CR23","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1108\/10662249810241266","volume":"8","author":"A. Omicini","year":"1998","unstructured":"Omicini, A., Zambonelli, F.: Coordination of Mobile Information Agents in Tucson. Journal of Internet Research\u00a08(5), 400\u2013413 (1998)","journal-title":"Journal of Internet Research"},{"key":"11_CR24","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1007\/BF01211473","volume":"4","author":"F. Orava","year":"1992","unstructured":"Orava, F., Parrow, J.: An algebraic verification of a mobile network. Formal Aspects of Computing\u00a04, 497\u2013543 (1992)","journal-title":"Formal Aspects of Computing"},{"key":"11_CR25","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1016\/B978-044482830-9\/50026-6","volume-title":"Handbook of Process Algebra","author":"J. Parrow","year":"2001","unstructured":"Parrow, J.: An introduction to the pi-calculus. In: Handbook of Process Algebra, pp. 479\u2013543. Elsevier Science, Amsterdam (2001)"},{"key":"11_CR26","doi-asserted-by":"crossref","first-page":"368","DOI":"10.1145\/302405.302659","volume-title":"Proc. of the 21 st Int. Conference on Software Engineering (ICSE 1999)","author":"G.P. Picco","year":"1999","unstructured":"Picco, G.P., Murphy, A.L., Roman, G.-C.: Lime: Linda Meets Mobility. In: Proc. of the 21 st Int. Conference on Software Engineering (ICSE 1999), pp. 368\u2013377. IEEE, Los Alamitos (1999)"},{"key":"11_CR27","first-page":"116","volume-title":"Proc. of POPL 2001","author":"A. Unyapoth","year":"2001","unstructured":"Unyapoth, A., Sewell, P.: Nomadic Pict: Correct Communication Infrastructures for Mobile Computation. In: Proc. of POPL 2001, pp. 116\u2013127. ACM Press, New York (2001)"},{"key":"11_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1007\/3-540-58179-0_73","volume-title":"Computer Aided Verification","author":"B. Victor","year":"1994","unstructured":"Victor, B., Moller, F.: The Mobility Workbench \u2014 a tool for the \u03c0-calculus. In: Dill, D.L. (ed.) CAV 1994. LNCS, vol.\u00a0818, pp. 428\u2013440. Springer, Heidelberg (1994)"}],"container-title":["Lecture Notes in Computer Science","Coordination Models and Languages"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11417019_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,31]],"date-time":"2021-10-31T05:26:08Z","timestamp":1635657968000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11417019_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540256304","9783540320067"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/11417019_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}