{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T16:11:59Z","timestamp":1725552719263},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540308072"},{"type":"electronic","value":"9783540322955"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11596356_101","type":"book-chapter","created":{"date-parts":[[2005,11,22]],"date-time":"2005-11-22T06:49:24Z","timestamp":1132642164000},"page":"1016-1025","source":"Crossref","is-referenced-by-count":4,"title":["Designing a Context-Aware System to Detect Dangerous Situations in School Routes for Kids Outdoor Safety Care"],"prefix":"10.1007","author":[{"given":"Katsuhiro","family":"Takata","sequence":"first","affiliation":[]},{"given":"Yusuke","family":"Shina","sequence":"additional","affiliation":[]},{"given":"Hiraku","family":"Komuro","sequence":"additional","affiliation":[]},{"given":"Masataka","family":"Tanaka","sequence":"additional","affiliation":[]},{"given":"Masanobu","family":"Ide","sequence":"additional","affiliation":[]},{"given":"Jianhua","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"101_CR1","doi-asserted-by":"crossref","unstructured":"Bauer, M., Becker, C., Rothemel, K.: Location Models from the Perspective of ContextAware Applications and Mobile Ad Hoc Networks. Personal and Ubiquitous Computing, 6(5) (December 2002)","DOI":"10.1007\/s007790200036"},{"key":"101_CR2","unstructured":"Abowd, G.D.: Ubiquitous computing: Research themes and open issues from an applications perspective. Technical Report GIT-GVU 96-24, GVU Center, Georgia Institute of Technology (October 1996)"},{"key":"101_CR3","doi-asserted-by":"crossref","unstructured":"Harrington, A., Cahill, V.: Route Profiling \u2013 Putting Context To Work. In: Proceedings of the 19th ACM symposium on Applied Computing, Nicosia, Cyprus (2004)","DOI":"10.1145\/967900.968214"},{"key":"101_CR4","doi-asserted-by":"crossref","unstructured":"Ma, J., Yang, L.T., Apduhan, B.O., Huang, R., Barolli, L., Takizawa, M.: Towards a Smart World and Ubiquitous Intelligence: A Walkthrough from Smart Things to Smart Hyperspaces and UbicKids. International Journal of Pervasive Comp. and Comm.\u00a01(1) (March 2005)","DOI":"10.1108\/17427370580000113"},{"key":"101_CR5","doi-asserted-by":"crossref","unstructured":"Erickson, T.: Some Problems with the Notion of Context-aware Computing. In: Communications of the ACM, vol. 45 (February 2002)","DOI":"10.1145\/503124.503154"},{"key":"101_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/978-3-540-24646-6_16","volume-title":"Pervasive Computing","author":"D. Henrici","year":"2004","unstructured":"Henrici, D., Muller, P.: Tackling Security and Privacy Issues in Radio Frequency Identification Devices. In: Ferscha, A., Mattern, F. (eds.) PERVASIVE 2004. LNCS, vol.\u00a03001, pp. 219\u2013224. Springer, Heidelberg (2004)"},{"key":"101_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1007\/3-540-49257-7_19","volume-title":"Database Theory - ICDT\u201999","author":"C. Beeri","year":"1998","unstructured":"Beeri, C., Milo, T.: Schemas for Integration and Translation of Structured and Semi-Structured Data. In: Beeri, C., Bruneman, P. (eds.) ICDT 1999. LNCS, vol.\u00a01540, pp. 296\u2013313. Springer, Heidelberg (1998)"},{"key":"101_CR8","doi-asserted-by":"crossref","unstructured":"Dunkey, B., Soparkar, N.: Data Organization and Access for Efficient Data Mining. In: Proceeding of the 15th International Conference on Data Engineering, Vienna, Austria (March 1999)","DOI":"10.1109\/ICDE.1999.754968"},{"key":"101_CR9","doi-asserted-by":"crossref","unstructured":"Kashyap, V., Sheth, A.P.: Semantic and Schematic Similarities between Database Objects: A Context-based Approach. VLDB Journal (5) (1996)","DOI":"10.1007\/s007780050029"},{"key":"101_CR10","doi-asserted-by":"crossref","unstructured":"Chen, L., Mitchell, C.J.: Comments on the S\/KEY User Authentication Scheme. Operating Systems Review (1996)","DOI":"10.1145\/240799.240801"},{"key":"101_CR11","unstructured":"Rubin, A.D.: Independent One-Time Passwords. In: Proceedings of the 5th Security Symposium, San Jose, California (July 1996)"},{"key":"101_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/3-540-46146-9_36","volume-title":"Database and Expert Systems Applications","author":"F. Perich","year":"2002","unstructured":"Perich, F., Avancha, S., Chakraborty, D., Joshi, A., Yesha, Y.: Profile Driven Data Management for Pervasive Environments. In: Hameurlain, A., Cicchetti, R., Traunm\u00fcller, R. (eds.) DEXA 2002. LNCS, vol.\u00a02453, p. 361. Springer, Heidelberg (2002)"},{"key":"101_CR13","unstructured":"Silveira, R., Filho, S., de Souza, C.R.B., Redmiles, D.F.: The Design of a Configurable, Extensible and Dynamic Notification Service. In: Proceedings of the 2nd International Workshop on Distributed Event-based Systems, San Diego, California (June 2003)"},{"key":"101_CR14","doi-asserted-by":"crossref","unstructured":"Huang, Y., Garcia Molina, H.: Publish\/Subscribe in a Mobile Environment. In: Proceedings of the 2nd ACM International Workshop on Data Engineering for Wireless and Mobile Access, Santa Barbara, California (May 2001)","DOI":"10.1145\/376868.376889"},{"key":"101_CR15","unstructured":"Van de Merckt, T.: Decision Trees in Numerical Attribute Spaces. In: Proceedings of the 13th International Joint Conference on Artificial Intelligence, Chambery, France (1993)"},{"key":"101_CR16","doi-asserted-by":"crossref","unstructured":"Takata, K., Shina, Y., Ma, J., Apduhan, B.O.: Designing a Space-oriented System for Ubiquitous Outdoor Kid\u2019s Safety Care. In: Proceedings of the 19th International Conference on Advanced Information Network and Applications, Taipei (March 2005)","DOI":"10.1109\/AINA.2005.157"}],"container-title":["Lecture Notes in Computer Science","Embedded and Ubiquitous Computing \u2013 EUC 2005"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11596356_101.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:03:09Z","timestamp":1605643389000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11596356_101"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540308072","9783540322955"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/11596356_101","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}