{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T22:35:59Z","timestamp":1726007759922},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030062330"},{"type":"electronic","value":"9783030062347"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-06234-7_37","type":"book-chapter","created":{"date-parts":[[2019,1,25]],"date-time":"2019-01-25T06:28:08Z","timestamp":1548397688000},"page":"397-408","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Augmenting Internet of Things (IoT) Architectures with Semantic Capabilities"],"prefix":"10.1007","author":[{"given":"Alan","family":"Hevner","sequence":"first","affiliation":[]},{"given":"Richard","family":"Linger","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,26]]},"reference":[{"issue":"3","key":"37_CR1","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1287\/isre.2015.0595","volume":"26","author":"R Agarwal","year":"2015","unstructured":"Agarwal, R., & Tiwana, A. (2015). Editorial\u2014Evolvable systems: Through the looking glass of IS. Information Systems Research, 26(3), 473\u2013479.","journal-title":"Information Systems Research"},{"key":"37_CR2","unstructured":"ARM. (2013). Introduction to the architectural reference model for the internet of things."},{"key":"37_CR3","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: A survey. Computer Networks, 54, 2787\u20132805.","journal-title":"Computer Networks"},{"key":"37_CR4","unstructured":"Cisco. (2014). The internet of things reference model. Cisco White Paper."},{"key":"37_CR5","doi-asserted-by":"crossref","unstructured":"Da Silva, W., Tomas, G., Alvaro, A., Dias, K., & Garcia, V. (2013). Smart cities software architectures: A survey. In Proceedings of the 28th Annual ACM Symposium on Applied Computing.","DOI":"10.1145\/2480362.2480688"},{"issue":"6","key":"37_CR6","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/MC.2011.132","volume":"44","author":"F Gil-Castineira","year":"2011","unstructured":"Gil-Castineira, F., Costa-Montenegro, E., Gonzalez-Castano, F., Lopez-Bravo, C., Ojala, T., & Bose, R. (2011). Experiences inside the ubiquitous oulu smart city. IEEE Computer, 44(6), 48\u201355.","journal-title":"IEEE Computer"},{"key":"37_CR7","unstructured":"Hevner, A., & Linger, R. (2012). Dynamic systems security testing using function extraction. In Sixth International Workshop on Advances and Innovations in Software Testing, Memphis."},{"key":"37_CR8","unstructured":"Hevner, A., Linger, R., Pleszkoch, M., Prowell, S., & Walton, G. (2009). Flow-Service-Quality (FSQ) engineering: A discipline for developing systems of systems. In R. Chiang, K. Siau, & B. Hardgrave (Eds.), Chapter 2 in systems analysis and design: Techniques, methodologies, approaches, and architectures."},{"key":"37_CR9","doi-asserted-by":"crossref","unstructured":"Hevner, A., Linger, R., Sobel, A., & Walton, G. (2002). The flow-service-quality framework: Unified engineering for large-scale, adaptive systems. In Proceedings of the 35th Annual Hawaii International Conference on System Science (HICSS35).","DOI":"10.1109\/HICSS.2002.994480"},{"key":"37_CR10","unstructured":"Linger, R. (2018). Computing the behavior of aerospace software for validation of security and functionality. In Proceedings AIAA 2018 Space Conference. Orlando, FL."},{"key":"37_CR11","doi-asserted-by":"crossref","unstructured":"Linger, R. C., Pleszkoch, M. G., Burns, L., Hevner, A. R., & Walton, G. H. (2007). Next-generation software engineering: Function extraction for computation of software behavior. In Proceedings of the 40th Annual Hawaii International Conference on System Sciences.","DOI":"10.1109\/HICSS.2007.403"},{"issue":"2","key":"37_CR12","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1080\/12460125.2018.1529973","volume":"27","author":"Richard C. Linger","year":"2018","unstructured":"Linger, R., & Hevner, A. (2018). Flow semantics for intellectual control in IoT systems. Journal of Decision Systems, 27(2), 63\u201372.","journal-title":"Journal of Decision Systems"},{"key":"37_CR13","volume-title":"Structured programming: Theory and practice","author":"R Linger","year":"1979","unstructured":"Linger, R., Mills, H., & Witt, B. (1979). Structured programming: Theory and practice. Reading, MA: Addison-Wesley."},{"key":"37_CR14","unstructured":"Linger, R., Pleszkoch, M., Walton, G., & Hevner, A. (2002). Flow-Service-Quality (FSQ) engineering: Foundations for network system analysis and development."},{"key":"37_CR15","unstructured":"Mullarkey, M., & Hevner, A. (2018). An elaborated action design research process model. European Journal of Information Systems."},{"key":"37_CR16","doi-asserted-by":"crossref","unstructured":"Pleszkoch, M., Linger, R., Prowell, S., Sayre, K., & Burns, L. (2012). Automated behavior computation for software analysis and validation. In Proceedings of Hawaii International Conference on System Sciences.","DOI":"10.1109\/HICSS.2012.128"},{"issue":"6","key":"37_CR17","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1109\/MCOM.2013.6525602","volume":"51","author":"Panagiotis Vlacheas","year":"2013","unstructured":"Vlacheas, P., Giaffreda, R., Stavroulaki, V., Kelaidonis, D., Foteinos, V., Poulios, G., \u2026 Moessner, K. (2013). Enabling smart cities though a cognitive management framework for the internet of thing. IEEE Communications Magazine, 51(6), 102\u2013111.","journal-title":"IEEE Communications Magazine"},{"key":"37_CR18","unstructured":"Walton, G., Longstaff, T., & Linger, R. (2009). Computational evaluation of software security attributes. In Proceedings of the 42nd Hawaii International Conference on System Sciences."},{"key":"37_CR19","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1016\/j.clsr.2013.05.010","volume":"29","author":"R Weber","year":"2013","unstructured":"Weber, R. (2013). Internet of things\u2013Governance Quo Vadis? Computer Law & Security Review, 29, 341\u2013347.","journal-title":"Computer Law & Security Review"}],"container-title":["The Art of Structuring"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-06234-7_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,25]],"date-time":"2019-01-25T06:41:31Z","timestamp":1548398491000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-06234-7_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030062330","9783030062347"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-06234-7_37","relation":{},"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"26 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}