{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:57:38Z","timestamp":1725551858054},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540308188"},{"type":"electronic","value":"9783540315995"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11596448_160","type":"book-chapter","created":{"date-parts":[[2006,6,17]],"date-time":"2006-06-17T09:12:37Z","timestamp":1150535557000},"page":"1074-1081","source":"Crossref","is-referenced-by-count":0,"title":["An Knowledge Model for Self-regenerative Service Activations Adaptation Across Standards"],"prefix":"10.1007","author":[{"given":"Mengjie","family":"Yu","sequence":"first","affiliation":[]},{"given":"David Llewellyn","family":"Jones","sequence":"additional","affiliation":[]},{"given":"A.","family":"Taleb-Bendiab","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"160_CR1","doi-asserted-by":"crossref","unstructured":"Kephart, J., Chess, D.: The Vision of Autonomic Computing. IEEE Computer Magazine (2003)","DOI":"10.1109\/MC.2003.1160055"},{"key":"160_CR2","unstructured":"Badger, L.: Self-Regenerative System (SRS) Program Abstract. In: DARPA (2004)"},{"key":"160_CR3","unstructured":"Zhang, L.-J., Chung, J.-Y.: Researcher, IBM T.J. Watson Research Centre.: Developing Grid Computing Application: Part1, Introduction of a Grid architecture and toolkit for building Grid solutions (2003)"},{"key":"160_CR4","unstructured":"Wassenberg, Wade, Software Engineer, and Motorola ISD.: Protocol Independent Programming Using Openwings Connector Services (2003)"},{"key":"160_CR5","unstructured":"van den Heuvel, W.-J.: Matching and Adaptation: Core Techniques for MDA-(ADM)-driven Integration of new Business Applications with Wrapped Legacy Systems"},{"key":"160_CR6","doi-asserted-by":"crossref","unstructured":"Furmento, N., Hau, J., Lee, W., Newhouse, S., Darlington, J.: Implementations of a Service-Oriented Architecture on top of Jini, JXTA and OGSA. In: Proceedings of UK e-Science All Hands Meeting (2003)","DOI":"10.1007\/978-3-540-28642-4_11"},{"key":"160_CR7","doi-asserted-by":"crossref","unstructured":"Yu, M., Taleb-Bendiab, A., Reilly, D.: A Polyarchical Middleware for Self-Regenerative Invocation of Multi-Standard Ubiquitous Services. In: Proceedings of the IEEE International Conference on Web Services (2004)","DOI":"10.1109\/ICWS.2004.1314765"},{"key":"160_CR8","unstructured":"Yu, M., Taleb-Bendiab, A.: Generic Programming for Self-Regenerative Invocation cross-Standards. In: Proceedings of 5th Annual PostGraduate Symposium on The Convergence of Telecommunications, Networking & Broadcasting (2004)"},{"key":"160_CR9","doi-asserted-by":"crossref","unstructured":"Llewellyn-Jones, D., Merabti, M., Shi, Q., Askwith, B.: A Security Framework for Executables in a Ubiquitous Computing Environment. In: Proceedings of Globecom (2004)","DOI":"10.1109\/GLOCOM.2004.1378392"},{"key":"160_CR10","unstructured":"Noy, N.F., McGuinne, D.L.: Ontology Development 101: A Guide to Creating Your First Ontology (2001)"},{"key":"160_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"897","DOI":"10.1007\/978-3-540-39718-2_57","volume-title":"The Semantic Web - ISWC 2003","author":"A. Maier","year":"2003","unstructured":"Maier, A., Schnurr, H.-P., Sure, Y.: Ontology-based Information Integration in the Automotive Industry. In: Fensel, D., Sycara, K., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol.\u00a02870, pp. 897\u2013912. Springer, Heidelberg (2003)"},{"key":"160_CR12","unstructured":"Ankolekar, A., Burstein, M., Hobbs, J.R., Lassila, O., Martin, D., DrewMcDermott, McIlraith, S.A., Narayanan, M.P.S., Payne, T., Sycara, K.: DAML-S: Web Service Description for the Semantic Web"}],"container-title":["Lecture Notes in Computer Science","Computational Intelligence and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11596448_160.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T02:55:51Z","timestamp":1619492151000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11596448_160"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540308188","9783540315995"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/11596448_160","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}