{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,24]],"date-time":"2025-05-24T07:46:53Z","timestamp":1748072813409},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540403173"},{"type":"electronic","value":"9783540448921"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-44892-6_25","type":"book-chapter","created":{"date-parts":[[2007,8,16]],"date-time":"2007-08-16T06:51:40Z","timestamp":1187247100000},"page":"493-511","source":"Crossref","is-referenced-by-count":13,"title":["Middleware Service for Mobile Ad Hoc Data Sharing, Enhancing Data Availability"],"prefix":"10.1007","author":[{"given":"Malika","family":"Boulkenafed","sequence":"first","affiliation":[]},{"given":"Val\u00e9rie","family":"Issarny","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,6,24]]},"reference":[{"key":"25_CR1","doi-asserted-by":"crossref","unstructured":"Micah Adler and Christian Scheideler: Efficient communication strategies for adhoc wireless networks. In ACM Symposium on Parallel Algorithms and Architectures, pages 259\u2013268, 1998.","DOI":"10.1145\/277651.277692"},{"issue":"4","key":"25_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/49.839937","volume":"18","author":"G. Ateniese","year":"2000","unstructured":"G. Ateniese, M. Steiner, and G. Tsudik: New multiparty authentication services and key agreement protocols. IEEE Journal of Selected Areas in Communications, 18(4):pp. 1\u201313, 2000.","journal-title":"IEEE Journal of Selected Areas in Communications"},{"key":"25_CR3","unstructured":"C. Bettstetter and C. Renner: A comparison of service discovery protocols and implementation of the service location protocol. In Proceedings 6th EUNICE Open European Summer School: Innovative Internet Applications, 2000."},{"key":"25_CR4","unstructured":"Malika Boulkenafed, Anis Ben Arbia, David Mentr\u00e9, and Val\u00e9rie Issarny: AdHocFS: Sharing files in wlans, 2002. http:\/\/www-rocq.inria.fr\/solidor\/work\/AdHocFS.html ."},{"key":"25_CR5","unstructured":"Malika Boulkenafed and Val\u00e9rie Issarny: Coherency management in ad-hoc group communication. In Proc. of the joint VIVIAN-ROBOCOP workshop on Software Infrastructures for Component-Based Applications on Consumer Devices, Lausanne, Switzerland, September 16, 2002."},{"key":"25_CR6","doi-asserted-by":"crossref","unstructured":"M. Burmester and Y. Desmedt: A secure and efficient conference key distribution system. In LNCS Springer, editor, Proc. of Eurocrypt\u201994, pages pp. 275\u2013286, 1995.","DOI":"10.1007\/BFb0053443"},{"key":"25_CR7","unstructured":"W. Diffie, D. Steer, L. Strawczynski, and M. Weiner: A secure audio teleconference system. In LNCS Springer, editor, Proc. of Crypto\u201988, 1988."},{"key":"25_CR8","doi-asserted-by":"crossref","unstructured":"W. K. Edwards, E. D. Mynatt, K. Petersen, M. J. Spreitzer, D. B. Terry, and M. M. Theimer: Designing and implementing asynchronous applications with bayou. In Proc. of the Symp. on User Int. Software and Tech., Banff Alberta (Canada), Oct. 1997.","DOI":"10.1145\/263407.263530"},{"issue":"3","key":"25_CR9","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1023\/A:1019266628724","volume":"9","author":"T. Ekenstam","year":"2001","unstructured":"Todd Ekenstam, Charles Matheny, Peter L. Reiher, and Gerald J. Popek: The bengal database replication system. Journal of Distributed and Parallel Databases, 9(3):187\u2013210, 2001. http:\/\/www.citeseer.nj.nec.com\/449358.html .","journal-title":"Journal of Distributed and Parallel Databases"},{"key":"25_CR10","unstructured":"L. Feeney and M. Nilsson: Investigating the energy consumption of a wireless network interface in an ad hoc networking environment. In proc. of the IEEE Infocom, 5(8), 2001. http:\/\/www.sics.se\/ feeney ."},{"key":"25_CR11","doi-asserted-by":"crossref","unstructured":"J. D. Gibson: The Mobile Communication Handbook. CRC Press, 2nd edition, 1999.","DOI":"10.1201\/NOE0849321672"},{"key":"25_CR12","doi-asserted-by":"crossref","unstructured":"Richard G. Guy, Peter L. Reiher, David Ratner, Michial Gunter, Wilkie Ma, and Gerald J. Popek: Rumor: Mobile data access through optimistic peer-to-peer replication. In ER Workshops, pages 254\u2013265, 1998. http:\/\/www.citeseer.nj.nec.com\/guy98rumor.html .","DOI":"10.1007\/978-3-540-49121-7_22"},{"key":"25_CR13","doi-asserted-by":"crossref","unstructured":"T. Imielinski: Mobile Computing. Kluwer Academic Publishers, 1996.","DOI":"10.1007\/b102605"},{"key":"25_CR14","doi-asserted-by":"crossref","unstructured":"M. Just and S. Vaudenay: Authenticated multy-party key agreement. In Proc. of ASIACRYPT\u201996, 1996.","DOI":"10.1007\/BFb0034833"},{"key":"25_CR15","unstructured":"John Kubiatowicz, David Bindel, Yan Chen, Patrick Eaton, Dennis Geels, Ramakrishna Gummadi, Sean Rhea, Hakim Weatherspoon, Westly Weimer, Christopher Wells, and Ben Zhao: Oceanstore: An architecture for global-scale persistent storage. In Proceedings of ACM ASPLOS. ACM, November 2000. http:\/\/www.citeseer.nj.nec.com\/kubiatowicz00oceanstore.html ."},{"key":"25_CR16","volume-title":"Seer: Predictive File Hoarding for Disconnected Mobile Operation","author":"G. H. Kuenning","year":"1997","unstructured":"Geofrey H. Kuenning: Seer: Predictive File Hoarding for Disconnected Mobile Operation. PhD thesis, University of California, Los Angeles, May 1997."},{"key":"25_CR17","doi-asserted-by":"crossref","unstructured":"P. Kumar and M. Satyanarayanan: Supporting application-specific resolution in an optimistically replicated file system. In Proceedings of the 4th Workshop on Workstation Operating Systems, 1993.","DOI":"10.1109\/WWOS.1993.348170"},{"key":"25_CR18","unstructured":"Haiyun Luo, Paul Medvedev, Jerry Cheng, and Songwu Lu: A self-coordinating approach to distributed fair queueing in ad hoc wireless networks. In INFOCOM, pages 1370\u20131379, 2001. http:\/\/www.citeseer.nj.nec.com\/luo01selfcoordinating.html ."},{"key":"25_CR19","doi-asserted-by":"crossref","unstructured":"Sergio Marti, T. J. Giuli, Kevin Lai, and Mary Baker: Mitigating routing misbehavior in mobile ad hoc networks. In Mobile Computing and Networking, pages 255\u2013265, 2000. http:\/\/www.citeseer.nj.nec.com\/marti00mitigating.html .","DOI":"10.1145\/345910.345955"},{"key":"25_CR20","doi-asserted-by":"crossref","unstructured":"Cecilia Mascolo, L. Zanolin, and Wolfgang Emmerich: Xmiddle: an xml based approach for incremental code mobility and update. Journal of Automated Software Engineering, 9(2), 2002.","DOI":"10.1023\/A:1014582329991"},{"key":"25_CR21","unstructured":"Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone: Handbook of Applied Cryptography. CRC Press, 4th edition edition, 1996. http:\/\/www.cacr.math.uwaterloo.ca\/hac\/ ."},{"key":"25_CR22","unstructured":"Davide Mentre, Malika Boulkenafed, and Val\u00e9rie Issarny: AdHocFS: A serverless file system for mobile users. Research Report 4303, INRIA-Rocquencourt, 2001."},{"key":"25_CR23","doi-asserted-by":"crossref","unstructured":"K. Petersen, M. J. Spreitzer, D. B. Terry, M. M. Theimer, and A. J. Demers: Flexible update propagation for weakly consistent replication. In Proc. Symp. on Operating Systems Principles (SOSP-16), pages 288\u2013301, Saint Malo, Oct. 1997.","DOI":"10.1145\/268998.266711"},{"key":"25_CR24","volume-title":"Analysis and evaluation of channel access schemes and routing protocols for wireless networks","author":"A. Qayyum","year":"2000","unstructured":"Amir Qayyum: \u201cAnalysis and evaluation of channel access schemes and routing protocols for wireless networks\u201d. PhD thesis, University of Paris Sud, Orsay, France, November 2000."},{"key":"25_CR25","unstructured":"P. Reiher, J. Popek, M. Gunter, J. Salomone, and D. Ratner: Peer-to-peer reconciliation based replication for mobile computers. In European Conference on Object Oriented Programming\u2019 96 Second Workshop on Mobility and Replication, 1996. http:\/\/www.citeseer.nj.nec.com\/5097.html ."},{"issue":"4","key":"25_CR26","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1109\/12.54838","volume":"39","author":"M. Satyanarayanan","year":"1990","unstructured":"M. Satyanarayanan, James J. Kistler, Puneet Kumar, Maria E. Okasaki, Ellen H. Siegel, and David C. Steere: Coda: A highly available file system for a distributed workstation environment. Journal of IEEE Transactions on Computers, 39(4):447\u2013459, 1990. http:\/\/www.citeseer.nj.nec.com\/satyanarayanan90coda.html .","journal-title":"Journal of IEEE Transactions on Computers"},{"key":"25_CR27","unstructured":"H. Yu and A. Vahdat: Design and evaluation of a continuous consistency model for replicated services. In Proc. of the 4rd Symposium on Operating Systems Design and Implementation, 2000. http:\/\/www.citeseer.nj.nec.com\/yu00design.html ."}],"container-title":["Lecture Notes in Computer Science","Middleware 2003"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44892-6_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T00:24:27Z","timestamp":1556756667000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44892-6_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540403173","9783540448921"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/3-540-44892-6_25","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}