{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:01:39Z","timestamp":1725494499372},"publisher-location":"Berlin, Heidelberg","reference-count":43,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540002895"},{"type":"electronic","value":"9783540362579"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-36257-6_9","type":"book-chapter","created":{"date-parts":[[2007,11,13]],"date-time":"2007-11-13T11:40:53Z","timestamp":1194954053000},"page":"90-105","source":"Crossref","is-referenced-by-count":1,"title":["Smart Environments: Middleware Building Blocks for Pervasive Network Computing (A Position Paper)"],"prefix":"10.1007","author":[{"given":"Jon","family":"Weissman","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zhi-Li","family":"Zhang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2002,11,27]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"W. Adjie-Winoto, E. Schwartz, H. Balakrishnan, and J. Lilley. \u201cThe Design and Implementation of an Intentional Naming System.\u201d In Proceedings of the Seventeenth Symposium on Operating Systems Principles, pp.186\u2013201, Kiawah Island Resort, South Carolina, Dec. 1999.","DOI":"10.1145\/319151.319164"},{"key":"9_CR2","unstructured":"G. Abowd, C. Atkeson, I. Essa, and K. Ramachandran. \u201cBuidling a Large-Scale Ubiquitous Computing Interface.\u201d 1998. A Proposal Submitted to the National Science Foundation Major Research Instrumentation Program, http:\/\/www.cc.gatech.edu\/fce\/pubs\/BaLSUCI.pdf."},{"key":"9_CR3","unstructured":"G. Abowd. \u201cUbiquitous Computing: Research Themes and Open Issues from an Appications Perspective.\u201d Technical Report GIT-GVU 96-24, GVU Center, Georgia Institute of Technology, Oct. 1996. Available from http:\/\/www.cc.gatech.edu\/fce\/publications.html ."},{"key":"9_CR4","unstructured":"K. Arnold, B. O\u2019sullivan, R.W. Scheifler, J. Waldo, and A. Wollrath. The Jini Specification. Addison-Wesley, 1999."},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"G. Banavar, J. Beck, E. Gluzberg, J. Munson, J. Sussman, and D. Zukowski. \u201cChallenges: An Application Model for Pervasive Computing.\u201d In Proceedings of the Sixth Annual ACM\/IEEE International Conference on Mobile Computing and Networking (Mobicom 2000).","DOI":"10.1145\/345910.345957"},{"key":"9_CR6","unstructured":"E. Belani et al. \u201cThe CRISISWide Area Security Architecture.\u201d In Proceedings of USENIX Security Symposium, 1998."},{"key":"9_CR7","unstructured":"Bluetooth SIG. Specification of the Bluetooth System. Dec 1999, http:\/\/www.bluetooth.com ."},{"key":"9_CR8","unstructured":"M. Brand and I. Essa. \u201cCausal Analysis for Visual Gesture Understanding.\u201d In Proceedings of AAAI Fall Symposium on Computational Models for Integrating Languages and Vision, 1995."},{"key":"9_CR9","unstructured":"T. Bray, J. Paoli, C.M. Sperberg-McQueen. Extensible Markup Language (XML). W3C Proposed Recommendation, Dec. 1997. http:\/\/www.w3.org\/TR\/PR-xml-971208 ."},{"key":"9_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1007\/3-540-48749-2_4","volume-title":"Secure Internet Programming: Security Issues for Distributed and Mobile Objects","author":"L. Cardelle","year":"1999","unstructured":"L. Cardelle. \u201cAbstractions for Mobile Computations.\u201d In J. Vtek and C.D. Jensen, editors, Secure Internet Programming: Security Issues for Distributed and Mobile Objects. Vol. 1603 of Lecture Notes in Computer Science, pp.51\u201394, Springer-Verlag, 1999."},{"key":"9_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/BFb0053547","volume-title":"Foundations of Software Science and Computational Structures","author":"L. Cardelli","year":"1998","unstructured":"L. Cardelli and A. D. Gordon. \u201cMobile Ambients.\u201d In M. Nivat, editor, Foundations of Software Science and Computational Structures. Vol. 1378 of Lecture Notes in Computer Science, pp.140\u2013155, Springer-Verlag, 1998."},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"L.M. Correia, R. Prasad. \u201cAn Overview of Wireless Broadband Communications.\u201d IEEE Communications Magazine, pp.28\u201333, Jan. 1997.","DOI":"10.1109\/35.568195"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"S.E. Czerwinski, B.Y. Zhao, T.D. Hodes, A.D. Joseph, and R. H. Katz. \u201cAn Architecture for a Secure Service Discovery Service.\u201d In Proceedings of the Fifth ACM\/IEEE Internation Conference on Mobile Computing and Networking, pp.24\u201335, Seattle, Washington, Aug. 1999.","DOI":"10.1145\/313451.313462"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"A. Dearle. \u201cTowards Ubiquitous Environments for Mobile Users.\u201d IEEE Internet Computing, pp.22\u201332, Jan.-Feb. 1998.","DOI":"10.1109\/4236.656063"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"A. Dey, G. Abowd, and A. Wood. \u201cCyberdesk: A Framework for Providing Self-Integrating Context-Aware Services.\u201d In Proceedings of the 1998 Intelligent User Interfaces Conference (IUI'98), pp.47\u201354, 1998.","DOI":"10.1145\/268389.268398"},{"key":"9_CR16","unstructured":"IEEE 802.11. \u201cWireless Access Method and Physical Layer Specification.\u201d New York, Sep. 1994."},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"I. Essa, S. Basu, T. Darrell, and A. Pentland. \u201cModeling, Tracking and Interactive Animation of Faces and Heads Using Input from Video.\u201d In Proceedings of Computer Animation Conference 1996, pp.68\u201379. Jun. 1996.","DOI":"10.1109\/CA.1996.540489"},{"issue":"7","key":"9_CR18","doi-asserted-by":"publisher","first-page":"757","DOI":"10.1109\/34.598232","volume":"19","author":"I. Essa","year":"1997","unstructured":"I. Essa and A. Pentland. \u201cCoding, Analysis, Interpretation, and Recognition of Facial Expressions.\u201d IEEE Transactions on Pattern Analysis and Machine Intelligence, 19(7):757\u2013763, 1997.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"9_CR19","unstructured":"E. Freeman, S. Hupfer, and K. Arnold. JavaSpaces Principles, Patterns, and Practice. Addison-Wesley, 1999."},{"key":"9_CR20","unstructured":"D. Garlan. \u201cArchitecture for Pervasive Computing.\u201d In Proceedings of the Workshop on Architectures for Ubiquitous Computing. Limerick, Ireland, June, 2000."},{"key":"9_CR21","unstructured":"J. Gosling, B. Joy, and G. Steele. The Java Language Specification. Addison-Wesley, 1996."},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"R. Grimm, T. Anderson, B. Bershad, and D. Wetherall. \u201cA System Architecture for Pervasive Computing.\u201d In Proceedings of the 9th ACMSIGOPS European Workshop, pp.177\u2013182, Kolding, Denmark, Sep. 2000.","DOI":"10.1145\/566726.566763"},{"key":"9_CR23","unstructured":"R. Grimmet al. \u201cSystem Directions for Pervasive Computing.\u201d In Proceedings of Hot Topics in Operating Systems (HotOS-VIII), Elmau, Germany, May 2001."},{"key":"9_CR24","unstructured":"O. Gruber and R. Konuru. \u201cAn Application Model and Environment for Personal Information Appliances.\u201d"},{"key":"9_CR25","doi-asserted-by":"crossref","unstructured":"W. Honcharenko, J.P. Kruys, D. Y. lee, and N.J. Shah. \u201cBroadband Wireless Access.\u201d IEEE Communicatios Magazine, pp.20\u201326, Jan. 1997.","DOI":"10.1109\/35.568192"},{"key":"9_CR26","doi-asserted-by":"crossref","unstructured":"M. Esler, J. Hightower, T. Anderson, and G. Boriello. \u201cNext Century Challenges: Data-Centric Networking for Invisible Computing.\u201d In Proceedings of the Fifth ACM\/IEEE Internation Conference on Mobile Computing and Networking, pp.256\u2013262, Seattle, Washington, Aug. 1999.","DOI":"10.1145\/313451.313553"},{"key":"9_CR27","unstructured":"J. Mankoff and G. D. Abowd. \u201cDomisilica: Providing Ubiquitous Access to the Home.\u201d Technical Report GIT-GVU-97-17, GVU Center, Georgia Institute of Technology, Sep. 1997. Available from http:\/\/www.cc.gatech.edu\/fce\/publications.html ."},{"key":"9_CR28","unstructured":"J. Mankoff and G. D. Abowd. \u201cBringing People and Places Together.\u201d In Proceedings of the 1998 Spring AAAI Symposium on Intelligent Environments, 1998."},{"key":"9_CR29","unstructured":"R. Mettala. Bluetooth Protocol Architecture, Version 1.0. Bluetooth Special Interest Group, Aug. 199. http:\/\/www.bluetooth.com\/v2\/document ."},{"key":"9_CR30","doi-asserted-by":"crossref","unstructured":"B.C. Neuman. \u201cProxy-Based Authorization and Accounting for Distributed Systems.\u201d Proceedings of the 13th International Conference on Distributed Computing Systems, May 1993.","DOI":"10.1109\/ICDCS.1993.287698"},{"issue":"4","key":"9_CR31","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1038\/scientificamerican0496-68","volume":"274","author":"A. Pentland","year":"1996","unstructured":"A. Pentland. \u201cSmart Room.\u201d Scientific American, 274(4):68\u201376, April 1996.","journal-title":"Scientific American"},{"key":"9_CR32","doi-asserted-by":"crossref","unstructured":"C. Perkins, et al. \u201cIP Mobility Support.\u201d IETF RFC 2002, Oct. 1996.","DOI":"10.17487\/rfc2002"},{"key":"9_CR33","doi-asserted-by":"crossref","unstructured":"T. Richardson, Q. Stafford-Fraser, K. Wood, and A. Hopper. \u201cVirtual Network Computing.\u201d IEEE Internet Computing, pp.33\u201338, Jan.-Feb., 1998.","DOI":"10.1109\/4236.656066"},{"key":"9_CR34","unstructured":"R. L. Rivest and B. Lampson, \u201cSDSI-A Simple Distributed Security Infrastructure.\u201d http:\/\/www.theory.lcs.mit.edu\/cis\/sdsi.html , 1996."},{"key":"9_CR35","doi-asserted-by":"crossref","unstructured":"A. Smailagic and D.P. Siewioerk. \u201cUser-Centered Interdisciplinary Design of Wearable Computers.\u201d ACM Mobile Computing and Communications Review, 3(3), 1999.","DOI":"10.1145\/329124.329154"},{"key":"9_CR36","unstructured":"J. G. Steiner, et. al, \u201cKerberos: an authentication service for open network systems.\u201d In Proceedings of USENIX, 1988."},{"key":"9_CR37","doi-asserted-by":"crossref","unstructured":"A. Tripathi, T. Ahmed, and N. Karnik. \u201cExperiences and Future Challenges inMobile Agent Programming.\u201d Submitted to Microsystems, Oct. 2000.","DOI":"10.1016\/S0141-9331(01)00105-3"},{"key":"9_CR38","doi-asserted-by":"crossref","unstructured":"A. Vahdat, T. Anderson, M. Dahlin, E. Belani, D. Culler, P. Eastham, and C. Yoshikawa. \u201cWebOs: Operating System Services for Wide Area Applications.\u201d In Proceedings of the Seventh IEEE International Symposium on High Performance Distributed Computing, pp.52\u201363, Chicago, Illinois, July 1998.","DOI":"10.1109\/HPDC.1998.709956"},{"key":"9_CR39","doi-asserted-by":"crossref","unstructured":"S. Verdu. \u201cWireless Bandwidth in the Making.\u201d IEEE Communications Magazine, pp.53\u201358, Jul. 2000.","DOI":"10.1109\/35.852032"},{"key":"9_CR40","unstructured":"Z. Wang and D. Garlan. \u201cTask-Driven Computing.\u201d Technical Report CMU-CS-00-154, Carnegie Mellow University, School of Computer Science, May 2000."},{"key":"9_CR41","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1038\/scientificamerican0991-94","volume":"265","author":"M. Weiser","year":"1991","unstructured":"M. Weiser. \u201cThe Computer for the 21st Century.\u201d Scientific American, 265, 3 (September 1991), pp.94\u2013104.","journal-title":"Scientific American"},{"key":"9_CR42","doi-asserted-by":"crossref","unstructured":"A. Wood, A. Dey, and G. Abowd. \u201cCyberdesk: Automated Integration of Desktop and Network Services.\u201d In Proceedings of the 1997 Conference on Human Factors in Computing Systems (CHI'97), pp.552\u2013553, 1997.","DOI":"10.1145\/258549.259031"},{"issue":"3","key":"9_CR43","doi-asserted-by":"publisher","first-page":"454","DOI":"10.1147\/sj.373.0454","volume":"37","author":"P. Wyckoff","year":"1998","unstructured":"P. Wyckoff, S.W. McLaughry, T.J. Lehman, and D.A. Ford. \u201cT Spaces.\u201d IBM System Journal, 37(3):454\u2013474, 1998.","journal-title":"IBM System Journal"}],"container-title":["Lecture Notes in Computer Science","Developing an Infrastructure for Mobile and Wireless Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36257-6_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,14]],"date-time":"2023-05-14T14:00:49Z","timestamp":1684072849000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36257-6_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540002895","9783540362579"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/3-540-36257-6_9","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}