{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T15:39:19Z","timestamp":1743089959866,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319271606"},{"type":"electronic","value":"9783319271613"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-27161-3_33","type":"book-chapter","created":{"date-parts":[[2015,11,17]],"date-time":"2015-11-17T23:38:40Z","timestamp":1447803520000},"page":"370-381","source":"Crossref","is-referenced-by-count":1,"title":["Streaming Computing Technology for Android Applications: Design Model and Case Study"],"prefix":"10.1007","author":[{"given":"Binji","family":"Mo","sequence":"first","affiliation":[]},{"given":"Yang","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Guojun","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,29]]},"reference":[{"key":"33_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11833529_1","volume-title":"Ubiquitous Intelligence and Computing","author":"Y Zhang","year":"2006","unstructured":"Zhang, Y., Zhou, Y.: Transparent computing: a new paradigm for pervasive computing. In: Ma, J., Jin, H., Yang, L.T., Tsai, J.J.-P. (eds.) UIC 2006. LNCS, vol. 4159, pp. 1\u201311. Springer, Heidelberg (2006)"},{"key":"33_CR2","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Zhou, Y.: 4VP\u00a0+: a novel meta OS approach for streaming programs in ubiquitous computing. In: Proceedings of the IEEE 21st International Conference on Advanced Information Networking and Applications (AINA 2007), Niagara Falls, Canada, pp. 394\u2013403 (2007)","DOI":"10.1109\/AINA.2007.6"},{"key":"33_CR3","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/TST.2013.6449403","volume":"18","author":"Z Yaoxue","year":"2013","unstructured":"Yaoxue, Z., Zhou, Y.: Transparent computing: spatio-temporal extension on von neumann architecture for cloud services. Tsinghua Sci. Technol. 18, 10\u201321 (2013)","journal-title":"Tsinghua Sci. Technol."},{"issue":"5","key":"33_CR4","first-page":"985","volume":"39","author":"Y Zhang","year":"2011","unstructured":"Zhang, Y., Zhou, Y.: A cloud computing operating system TransOS: based on the design and implementation of transparent computing. Acta Electronica Sin. 39(5), 985\u2013990 (2011)","journal-title":"Acta Electronica Sin."},{"key":"33_CR5","doi-asserted-by":"crossref","unstructured":"Andersson, K., Dan Johansson, J.: Mobile e-services using HTML5. In: Local Computer Networks Workshops, pp. 814\u2013819 (2012)","DOI":"10.1109\/LCNW.2012.6424068"},{"issue":"03","key":"33_CR6","first-page":"1","volume":"30","author":"S Sun","year":"2013","unstructured":"Sun, S., Abbasi, A., Zhuge, J.: HTML 5 security research. Comput. Appl. Softw. 30(03), 1\u20136 (2013)","journal-title":"Comput. Appl. Softw."},{"issue":"08","key":"33_CR7","first-page":"54","volume":"21","author":"H Liu","year":"2011","unstructured":"Liu, H., Yang, G.: Research on HTML5-the next generation standard of Web development. Comput. Technol. Dev. 21(08), 54\u201358 (2011)","journal-title":"Comput. Technol. Dev."},{"issue":"04","key":"33_CR8","first-page":"194","volume":"32","author":"T Zuo","year":"2005","unstructured":"Zuo, T., Zhu, Z., Hang, J.: The analysis of Java dynamic class loading. Comput. Sci. 32(04), 194\u2013196 (2005)","journal-title":"Comput. Sci."},{"key":"33_CR9","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.entcs.2004.02.089","volume":"116","author":"L Mariani","year":"2005","unstructured":"Mariani, L., Pezz\u00e8, M.: A technique for verifying component-based software. Electron. Notes Theoret. Comput. Sci. 116, 17\u201330 (2005)","journal-title":"Electron. Notes Theoret. Comput. Sci."},{"key":"33_CR10","doi-asserted-by":"publisher","first-page":"1570","DOI":"10.1109\/TCST.2012.2209178","volume":"21","author":"D C\u00f4t\u00e9","year":"2013","unstructured":"C\u00f4t\u00e9, D., StDenis, R.: Component-based method for the modeling and control of modular production systems. IEEE Trans. Control Syst. Technol. 21, 1570\u20131585 (2013)","journal-title":"IEEE Trans. Control Syst. Technol."},{"issue":"31","key":"33_CR11","first-page":"86","volume":"39","author":"Y Li","year":"2003","unstructured":"Li, Y., Yan, M.: The current situation and future of the software component technology. Comput. Eng. Appl. 39(31), 86\u201393 (2003)","journal-title":"Comput. Eng. Appl."},{"issue":"06","key":"33_CR12","doi-asserted-by":"publisher","first-page":"1340","DOI":"10.3724\/SP.J.1001.2008.01340","volume":"19","author":"X Sun","year":"2008","unstructured":"Sun, X., Zhuang, L., Liu, W.: An autonomous component customizable running support framework. J. Softw. 19(06), 1340\u20131349 (2008)","journal-title":"J. Softw."},{"key":"33_CR13","first-page":"22","volume":"3","author":"M Yan","year":"2013","unstructured":"Yan, M., Peng, X.: Permissions detection system based on Android security mechanism. Comput. Eng. Des. 3, 22 (2013). Shanxi, Taiyuan University of Technology","journal-title":"Comput. Eng. Des."},{"issue":"7","key":"33_CR14","first-page":"1385","volume":"51","author":"Y Zhang","year":"2014","unstructured":"Zhang, Y., Wang, K., Yang, H., Fang, Z., Wang, Z., Cao, C.: Android safety review. J. Comput. Res. Dev. 51(7), 1385\u20131396 (2014)","journal-title":"J. Comput. Res. Dev."}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-27161-3_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T11:57:52Z","timestamp":1559303872000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-27161-3_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319271606","9783319271613"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-27161-3_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}