{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:32:26Z","timestamp":1725471146805},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540386193"},{"type":"electronic","value":"9783540386223"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11839569_37","type":"book-chapter","created":{"date-parts":[[2006,10,3]],"date-time":"2006-10-03T09:21:24Z","timestamp":1159867284000},"page":"386-397","source":"Crossref","is-referenced-by-count":10,"title":["Ubisafe Computing: Vision and Challenges (I)"],"prefix":"10.1007","author":[{"given":"Jianhua","family":"Ma","sequence":"first","affiliation":[]},{"given":"Qiangfu","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Vipin","family":"Chaudhary","sequence":"additional","affiliation":[]},{"given":"Jingde","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Laurence T.","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Runhe","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Qun","family":"Jin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"37_CR1","doi-asserted-by":"crossref","unstructured":"Weiser, M.: The Computer for the Twenty-First Century. Scientific American, 94\u2013104 (September 1991)","DOI":"10.1038\/scientificamerican0991-94"},{"key":"37_CR2","doi-asserted-by":"crossref","unstructured":"Satyanarayanan, M.: Pervasive Computing: Vision and Challenges. IEEE Personal Communication, 10\u201317 (August 2001)","DOI":"10.1109\/98.943998"},{"key":"37_CR3","unstructured":"The European Union Report on AmI: Scenarios for Ambient Intelligence in 2010 (2001), \n                    \n                      ftp:\/\/ftp.cordis.lu\/pub\/ist\/docs\/istagscenarios2010.pdf"},{"key":"37_CR4","doi-asserted-by":"crossref","unstructured":"Shchilit, B.N., Adams, N., Want, R.: Context Aware Computing Applications. In: Proc. of Workshop on Mobile Computing, Systems and Applications, CA (December 1994)","DOI":"10.1109\/WMCSA.1994.16"},{"issue":"3","key":"37_CR5","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/MPRV.2002.1037720","volume":"1","author":"S. Yau","year":"2002","unstructured":"Yau, S., Karim, F., Wang, Y., Wang, B., Gupta, S.K.S.: Reconfigurable Context-Sensitive Middleware for Pervasive Computing. IEEE Pervasive Computing\u00a01(3), 33\u201340 (2002)","journal-title":"IEEE Pervasive Computing"},{"issue":"8","key":"37_CR6","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/2.940013","volume":"34","author":"M. Addlesee","year":"2001","unstructured":"Addlesee, M., Curwen, R.W., Hodges, S., Newman, J., Steggles, P., Ward, A., Hopper, A.: Implementing a Sentient Computing System. IEEE Computer\u00a034(8), 50\u201356 (2001)","journal-title":"IEEE Computer"},{"issue":"5","key":"37_CR7","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1145\/332833.332837","volume":"43","author":"D.L. Tennenhouse","year":"2000","unstructured":"Tennenhouse, D.L.: Proactive Computing. Communications of ACM\u00a043(5), 43\u201350 (2000)","journal-title":"Communications of ACM"},{"issue":"1","key":"37_CR8","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/MC.2003.1160055","volume":"36","author":"J.O. Kephart","year":"2003","unstructured":"Kephart, J.O., Chess, D.M.: The Vision of Autonomic Computing. IEEE Computer\u00a036(1), 41\u201350 (2003)","journal-title":"IEEE Computer"},{"issue":"5","key":"37_CR9","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1145\/332833.332842","volume":"43","author":"H. Abelson","year":"2000","unstructured":"Abelson, H., Allen, D., Coore, D., Hanson, C., Rauch, E., Sussman, G.H., Weiss, R.: Amorphous Computing. Communications of the ACM\u00a043(5), 74\u201382 (2000)","journal-title":"Communications of the ACM"},{"key":"37_CR10","unstructured":"Mamei, M., Zambonelli, F.: Spray Computers: Frontiers of Self-organization for Pervasive Computing. In: 3rd Italian Workshop From Objects to Agents (September 2003)"},{"key":"37_CR11","first-page":"2","volume-title":"Proceedings of CODES + ISSS","author":"C. M\u00fcller-Schloer","year":"2004","unstructured":"M\u00fcller-Schloer, C.: Organic Computing \u2013 On the Feasibility of Controlled Emergence. In: Proceedings of CODES + ISSS, pp. 2\u20135. ACM Press, New York (2004)"},{"key":"37_CR12","doi-asserted-by":"publisher","first-page":"631","DOI":"10.1109\/ARES.2006.91","volume-title":"Proceedings of 1st International Conference on Availability, Reliability and Security","author":"J. Cheng","year":"2006","unstructured":"Cheng, J.: Persistent Computing Systems as Continuously Available, Reliable, and Secure Systems. In: Proceedings of 1st International Conference on Availability, Reliability and Security, pp. 631\u2013638. IEEE Computer Society Press, Los Alamitos (2006)"},{"issue":"19","key":"37_CR13","first-page":"146","volume":"1","author":"J. Ma","year":"2005","unstructured":"Ma, J.: Smart u-Things \u2013 Challenging Real World Complexity. IPSJ Symposium Series\u00a0(19), 146\u2013150 (2005)","journal-title":"IPSJ Symposium Series"},{"key":"37_CR14","unstructured":"Mundie, C., de Vries, P., Haynes, P., Corwine, M.: Trustworthy Computing (2002), \n                    \n                      http:\/\/www.microsoft.com\/mscorp\/twc\/twc_whitepaper.mspx"}],"container-title":["Lecture Notes in Computer Science","Autonomic and Trusted Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11839569_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T13:17:07Z","timestamp":1558271827000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11839569_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540386193","9783540386223"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/11839569_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}