{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:45:39Z","timestamp":1725468339946},"publisher-location":"Berlin\/Heidelberg","reference-count":18,"publisher":"Springer-Verlag","isbn-type":[{"type":"print","value":"3540314067"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-32062-8_17","type":"book-chapter","created":{"date-parts":[[2006,8,9]],"date-time":"2006-08-09T17:54:18Z","timestamp":1155146058000},"page":"319-337","source":"Crossref","is-referenced-by-count":1,"title":["Self-Organized Scheduling in Hospitals by Connecting Agents and Mobile Devices"],"prefix":"10.1007","author":[{"given":"Torsten","family":"Eymann","sequence":"first","affiliation":[]},{"given":"G\u00fcnter","family":"M\u00fcller","sequence":"additional","affiliation":[]},{"given":"Moritz","family":"Strasser","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","series-title":"Technical Reports","volume-title":"Leben in einer smarten Umgebung: Ubiquitous-Computing-Szenarien und Auswirkungen","author":"V. Coroama","year":"2003","unstructured":"Coroama, V.; H\u00e4hner, J.; Handy, M.; Rudolph-Kuhn, P.; Magerkurth, C.; M\u00fcller, J.; Strasser, M.; Zimmer, T.: Leben in einer smarten Umgebung: Ubiquitous-Computing-Szenarien und Auswirkungen. Technical Reports 431. ETH Z\u00fcrich, Institute for Pervasive Computing, Z\u00fcrich, 2003."},{"key":"17_CR2","volume-title":"A behavioral theory of the firm","author":"R. M. Cyert","year":"1963","unstructured":"Cyert, R. M.; March, J. G.: A behavioral theory of the firm. Blackwell Business, Cambridge, Mass., 1963."},{"key":"17_CR3","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-55622-7","volume-title":"Digitale Gesch\u00e4ftsagenten \u2014 Softwareagenten im Einsatz","author":"T. Eymann","year":"2003","unstructured":"Eymann, T.: Digitale Gesch\u00e4ftsagenten \u2014 Softwareagenten im Einsatz. Springer Xpert.press, Heidelberg, 2003."},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Eymann, T.; Morito, H.: Privacy Issues of Combining Ubiquitous Computing and Software Agent Technology in a Life-Critical Environment. Paper presented at IEEE International Conference on Systems, Man and Cybernetics. Hague, Netherlands, 2004.","DOI":"10.1109\/ICSMC.2004.1401090"},{"issue":"5","key":"17_CR5","doi-asserted-by":"crossref","first-page":"491","DOI":"10.1007\/BF03250911","volume":"45","author":"T. Eymann","year":"2003","unstructured":"Eymann, T.; Sackmann, S.; M\u00fcller, G.: Hayeks Katallaxie: Ein zukunftsweisendes Konzept f\u00fcr die Wirtschaftsinformatik? In: Wirtschaftsinformatik 45(2003)5, pp. 491\u2013496.","journal-title":"Wirtschaftsinformatik"},{"key":"17_CR6","volume-title":"Gesundheits\u00f6konomie","author":"G. G\u00e4fgen","year":"1990","unstructured":"G\u00e4fgen, G.: Gesundheits\u00f6konomie. Nomos, Baden-Baden, 1990."},{"key":"17_CR7","volume-title":"Computers and intractability: a guide to the theory of NP-completeness","author":"M. R. Garey","year":"1979","unstructured":"Garey, M. R.; Johnson, D. S.: Computers and intractability: a guide to the theory of NP-completeness. Freeman, San Francisco, 1979."},{"key":"17_CR8","unstructured":"Hohl, A.; Nopper, N.; Eymann, T.: Automatisierte und Interaktive Kontextverarbeitung zur Unterst\u00fctzung der Patientenlogistik. Paper presented at Workshop on Mobile Computing in Medicine. Stuttgart, 2004."},{"issue":"6","key":"17_CR9","first-page":"581","volume":"37","author":"K. Kurbel","year":"1995","unstructured":"Kurbel, K.; Rohmann, T.: Ein Vergleich von Verfahren zur Maschienenbelegungsplanung: Simulated Annealing, Genetische Algorithmen und mathematische Optimierung. In: Wirtschaftsinformatik 37(1995)6, pp. 581\u2013593.","journal-title":"Wirtschaftsinformatik"},{"key":"17_CR10","unstructured":"M\u00fcller, G.; Eymann, T.; Nopper, N.; Seuken, S.: EMIKA System: Architecture and Prototypic Realization. IEEE International Conference on Systems, Man and Cybernetics edn. Hague, Netherlands, 2004."},{"key":"17_CR11","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1007\/978-3-642-56684-4","volume-title":"Sicherheitskonzepte f\u00fcr das Internet","author":"G. M\u00fcller","year":"2001","unstructured":"M\u00fcller, G.; Gerd tom Markotten, D.; Jendricke, U.: Benutzbare Sicherheit \u2014 Der Identit\u00e4tsmanager als universelles Sicherheitswerkzeug. In: M\u00fcller, G.; Reichenbach, M. (Eds.): Sicherheitskonzepte f\u00fcr das Internet. Springer Xpert.press, Heidelberg, 2001, pp. 135\u2013146."},{"key":"17_CR12","volume-title":"Living in a Smart Environment","author":"G. M\u00fcller","year":"2003","unstructured":"M\u00fcller, G.; Kreutzer, M.; Strasser, M.; Eymann, T.; Hohl, A.; Nopper, N.; Sackmann, S.; Coroama, V.: Geduldige Technologie f\u00fcr ungeduldige Patienten: F\u00fchrt Ubiquitous Computing zu mehr Selbstbestimmung? In: Living in a Smart Environment. Springer, Heidelberg, 2003."},{"key":"17_CR13","volume-title":"Der Computer im 21. Jahrhundert \u2014 Perspektiven, Technologien, Wirkungen","author":"G. M\u00fcller","year":"2005","unstructured":"M\u00fcller, G.; Accorsi, R.; H\u00f6hn, S.; K\u00e4hmer, M.; Strasser, M.: Sicherheit im Ubiquitous Computing: Schutz durch Gebote? In: Mattern, F. (Ed.): Der Computer im 21. Jahrhundert \u2014 Perspektiven, Technologien, Wirkungen. Springer, Heidelberg, 2005."},{"key":"17_CR14","first-page":"151","volume-title":"Mobile Computing in Medicine","author":"S. Sackmann","year":"2002","unstructured":"Sackmann, S.; Eymann, T.; M\u00fcller, G.: EMIKA \u2014 Real-Time Controlled Mobile Information Systems in Health Care Applications. In: Bludau, H. B., Koop, A. (Ed.): Mobile Computing in Medicine. K\u00f6llen, Bonn, 2002, pp. 151\u2013158."},{"key":"17_CR15","volume-title":"Krankenhausmanagment. Schriften zur Unternehmensf\u00fchrung","author":"A. W. Scheer","year":"1996","unstructured":"Scheer, A. W.; Chen, R.; Zimmerman, V.: Proze\u00dfmanagment im Krankenhaus. In: Adam, D. (Ed.): Krankenhausmanagment. Schriften zur Unternehmensf\u00fchrung. SzU, Wiesbaden, 1996."},{"key":"17_CR16","volume-title":"Patientensteuerung","author":"J. Schl\u00fcchtermann","year":"1990","unstructured":"Schl\u00fcchtermann, J.: Patientensteuerung, 26th edn. Eul, Bergisch Gladbach, K\u00f6ln, 1990.","edition":"26th edn."},{"key":"17_CR17","first-page":"45","volume-title":"Coordination and Agent Technology in Value Networks","author":"M. Strasser","year":"2004","unstructured":"Strasser, M.; Eymann, T.: Self-organization of schedules using time-related monetary substitutes. In: Bichler, M. et al. (Ed.): Coordination and Agent Technology in Value Networks. Conference Proceedings Multi-Konferenz Wirtschaftsinformatik, Essen, 2004. GITO-Verlag, Berlin, 2004, pp. 45\u201358."},{"key":"17_CR18","unstructured":"Zugenmaier, A.: Anonymity for Users of Mobile Devices through Location Adressing. Rhombos-Verlag, 2003."}],"container-title":["International Handbooks on Information Systems","Multiagent Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-32062-8_17.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T00:46:40Z","timestamp":1619570800000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-32062-8_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["3540314067"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/3-540-32062-8_17","relation":{},"subject":[]}}