{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:37:01Z","timestamp":1725489421006},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540411796"},{"type":"electronic","value":"9783540400578"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/3-540-40057-5_7","type":"book-chapter","created":{"date-parts":[[2007,8,16]],"date-time":"2007-08-16T04:12:32Z","timestamp":1187237552000},"page":"87-101","source":"Crossref","is-referenced-by-count":3,"title":["A Reflective Active Network Node"],"prefix":"10.1007","author":[{"given":"Alex","family":"Villaz\u00f3n","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,6,1]]},"reference":[{"key":"7_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/3-540-48749-2_3","volume-title":"Secure Internet Programming","author":"M. Ancona","year":"1999","unstructured":"M. Ancona, W. Cazzola, and E. Fernandez. Reflective authorization systems: Possibilities, benefits and drawbacks. In J. Vitek and C. D. Jensen, editors, Secure Internet Programming, volume 1603 of LNCS, pages 35\u201350. Springer Verlag, 1999. 87"},{"key":"7_CR2","unstructured":"J. Baumann. Control Algorithms for Mobile Agents. PhD thesis, University of Stuttgart, 1999. 96"},{"key":"7_CR3","unstructured":"S. Chiba. Javassist \u2014 A Reflection-based Programming Wizard for Java. In Reflective Programming in C++ and Java, OOPSLA'98, Vancouver, Canada, 1998. 92"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"S. Chiba. Load-time structural reflection in Java. In ECOOP 2000, Sophia Antipolis and Cannes, France, 2000. 92","DOI":"10.1007\/3-540-45102-1_16"},{"key":"7_CR5","unstructured":"G. Cohen and J. Chase. Automatic Program Transformation with JOIE. In USENIX Annual Technical Symposium, 1998. 92"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"G. Czajkowski and T. von Eicken. JRes: A Resource Accounting Interface for Java. In Proceedings of OOPSLA '98, Vancouver, Canada, oct 1998. 96","DOI":"10.1145\/286936.286944"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"J. de Oliveira. Reflection for statically typed languages. In European Conference on Object Oriented Programming ECOOP, 1998. 92","DOI":"10.1007\/BFb0054103"},{"key":"7_CR8","unstructured":"M. Golm. Design and Implementation of a Meta Architecture for Java. Master\u2019s thesis, University of Erlangen-N\u00fcrnberg, Germany, jan 1997. 92"},{"key":"7_CR9","unstructured":"R. Guerraoui et al. The GARF System: Overview, Design and Implementation. IEEE Concurrency, nov 1997. 87"},{"key":"7_CR10","unstructured":"G. Hj\u00e1lmt\u00fdsson. The Pronto Platform \u2014 a flexible toolkit for programming networks using a commodity operating system. In The Third IEEE Conference on Open Architectures and Network Programming, OPENARCH 2000, Tel-Aviv Israel, mar 2000. 97"},{"key":"7_CR11","series-title":"Lect Notes Comput Sci","volume-title":"Control on Demand","author":"G. Hj\u00e1lmt\u00fdsson","year":"1999","unstructured":"G. Hj\u00e1lmt\u00fdsson and S. Bhattacharjee. Control on Demand. In S. Covaci, editor, Active Networks, Proceedings of the First International Working Conference, IWAN'99, Berlin, volume 1653 of LNCS, June 1999. 97"},{"key":"7_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1007\/3-540-48749-2_21","volume-title":"Secure Internet Programming","author":"J. Hulaas","year":"1999","unstructured":"J. Hulaas, A. Villaz\u00f3n, and J. Harms. Using interfaces to specify access rights. In J. Vitek and C. D. Jensen, editors, Secure Internet Programming, volume 1603 of LNCS, pages 453\u2013468. Springer Verlag, 1999. 97"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"G. Kiczales, J. des Rivieres, and D. G. Bobrow. The Art of the Metaobject Protocol. The MIT Press, 1991. 88","DOI":"10.7551\/mitpress\/1405.001.0001"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"G. Kiczales et al. Aspect-Oriented Programming. In European Conference on Object-Oriented Programming ECOOP'97, Finland, jun 1997. 97","DOI":"10.1007\/BFb0053381"},{"issue":"2","key":"7_CR15","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1145\/584027.584033","volume":"3","author":"K. H. Kramer","year":"1999","unstructured":"K. H. Kramer, N. Minar, and P. Maes. Tutorial: Mobile Software Agents for Dynamic Routing. Mobile Computing and Communications Review, 3(2):12\u201316, 1999. 88","journal-title":"Mobile Computing and Communications Review"},{"key":"7_CR16","unstructured":"A. Lee and J. Zachary. Using meta programming to add persistence to CLOS. In Internation Conference on Computer Languages, Los Alamitos, California, 1994. 87"},{"key":"7_CR17","unstructured":"L.-W. Lehman, G. S., and D. Tennenhouse. Active reliable multicast. In IEEE INFOCOM '98, San Francisco, march 1998. 88"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"P. Maes. Concepts and experiments in computation reflection. In ACM Conference on Object-Oriented Programming Systems, Languages, and Applications (OOPSLA'87), Orlando, Florida, oct 1987. 87","DOI":"10.1145\/38765.38821"},{"key":"7_CR19","unstructured":"S. Matsuoka, H. Ogawa, K. Shimura, Y. Kimura, K. Hotta, and H. Takagi. Open-JIT A Reflective Java JIT Compiler. In Proceedings of OOPSLA '98 Workshop on Reflective Programming in C++ and Java, nov 1998. 92"},{"key":"7_CR20","unstructured":"J. Meseguer and C. Talcott. MAUDE: A Wide-Spectrum Fprmal Language for Secure Active Networks. 97"},{"key":"7_CR21","unstructured":"A. Olivia, L. E. Buzato, and C. Islene. The reflective architecture of guaran\u00e1. http:\/\/www.dcc.unicamp.br\/ oliva . 92"},{"key":"7_CR22","unstructured":"T. P\u00e9rennou. A Metaobject Architecture for Fault Tolerant Distributed Systems. PhD thesis, LAAS-CNRS, Toulouse, France, 1997. 87"},{"key":"7_CR23","doi-asserted-by":"crossref","unstructured":"T. Riechmann and F. Hauck. Meta-objects for access control: Extending capabilitybased security. In New Security Paradigms Workshop, Langale Cumbria UK, 1997. 87","DOI":"10.1145\/283699.283735"},{"key":"7_CR24","series-title":"Lect Notes Comput Sci","volume-title":"Non-Functional Policies","author":"B. Robben","year":"1999","unstructured":"B. Robben, B. Vanhaute, W. Joosen, and P. Verbaeten. Non-Functional Policies. In P. Cointe, editor, Meta-Level Architectures and Reflection, Second International Conference, Reflection'99, volume 1616 of LNCS, Saint-Malo, France, jul 1999. 98"},{"key":"7_CR25","unstructured":"R. Stroud and Z. Wu. Using Metaobject Protocols to Satisfy Non-Functional Requirements. In C. Zimmermann, editor, Advances in Object-Oriented Metalevel Architectures and Reflection. CRC Press, 1996. 87"},{"key":"7_CR26","unstructured":"M. Tatsubori. An Extension Mechanism for the Java Language. Master\u2019s thesis, Graduate School of Engineering, University of Tsukuba, Ibaraki, Japan, feb 1999. 92"},{"key":"7_CR27","doi-asserted-by":"crossref","unstructured":"D. L. Tennenhouse et al. A survey of active network research. IEEE Communications Magazine, pages 80\u201386, Jan. 1997. 89","DOI":"10.1109\/35.568214"},{"key":"7_CR28","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1007\/3-540-62852-5_12","volume-title":"Mobile Object Systems: Towards the Programmable Internet (MOS'96)","author":"C. F. Tschudin","year":"1997","unstructured":"C. F. Tschudin. The messenger environment M0 \u2014 A condensed description. In J. Vitek and C. Tschudin, editors, Mobile Object Systems: Towards the Programmable Internet (MOS'96), volume 1222 of LNCS, pages 149\u2013156. Springer-Verlag, Berlin, Germany, 1997. 96"},{"key":"7_CR29","doi-asserted-by":"crossref","unstructured":"C. F. Tschudin. Open resource allocation for mobile code. In First International Workshop on Mobile Agents, MA'97 Berlin, Apr. 1997. 96","DOI":"10.1007\/3-540-62803-7_34"},{"key":"7_CR30","unstructured":"I. Welch and R. Stroud. Dalang \u2014 A Reflective Java Extension. In OOPSLA'98 Workshop on Reflective Programming in C++ and Java, Vancouver, Canada, oct 1998. 92"},{"key":"7_CR31","series-title":"Lect Notes Comput Sci","volume-title":"From Dalang to Kava \u2014 The Evolution of a Reflective Java Extension","author":"I. Welch","year":"1999","unstructured":"I. Welch and R. J. Stroud. From Dalang to Kava \u2014 The Evolution of a Reflective Java Extension. In P. Cointe, editor, Meta-Level Architectures and Reflection, Second International Conference, Reflection'99, volume 1616 of LNCS, Saint-Malo, France, jul 1999. 92"},{"key":"7_CR32","series-title":"Lect Notes Comput Sci","volume-title":"Active organisation for routing","author":"S. Willmott","year":"1999","unstructured":"S. Willmott and B. Faltings. Active organisation for routing. In S. Covaci, editor, Active Networks, Proceedings of the First International Working Conference, IWAN'99, Berlin, volume LNCS 1653, June 1999. 88"},{"key":"7_CR33","unstructured":"L. Zhang, S. Berson, Herzog, and S. Jamin. Resource ReSerVation Protocol RSVP, 1997. Internet RFC 2205. 89"}],"container-title":["Lecture Notes in Computer Science","Active Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-40057-5_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T00:14:36Z","timestamp":1556756076000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-40057-5_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540411796","9783540400578"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/3-540-40057-5_7","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2000]]}}}