{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:56:44Z","timestamp":1725562604121},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540219989"},{"type":"electronic","value":"9783540247746"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24774-6_4","type":"book-chapter","created":{"date-parts":[[2010,8,8]],"date-time":"2010-08-08T20:26:22Z","timestamp":1281299182000},"page":"23-39","source":"Crossref","is-referenced-by-count":7,"title":["Software Architectural Support for Disconnected Operation in Highly Distributed Environments"],"prefix":"10.1007","author":[{"given":"Marija","family":"Mikic-Rakic","sequence":"first","affiliation":[]},{"given":"Nenad","family":"Medvidovic","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","unstructured":"Alander, J.T.: Empirical comparison of stochastic algorithms. In: Second Nordic Workshop on Genetic Algorithms and their Applications, Vaasa, Finland (August 1996)"},{"key":"4_CR2","unstructured":"Bastarrica, M.C., et al.: A Binary Integer Programming Model for Optimal Object Distribution. In: Second International Conference on Principles of Distributed Systems, Amiens, France (December 1998)"},{"key":"4_CR3","unstructured":"Capra, L., Emmerich, W., Mascolo, C.: Middleware for Mobile Computing. UCL Research Note RN\/30\/01"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Carzaniga, A., et al.: A Characterization Framework for Software Deployment Technologies. Technical Report, Dept. of Computer Science, University of Colorado (1998)","DOI":"10.21236\/ADA452086"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Carzaniga, A., Wolf, A.L.: Forwarding in a Content-Based Network. In: SIGCOMM 2003. Karlsruhe, Germany (August 2003)","DOI":"10.1145\/863955.863975"},{"key":"4_CR6","volume-title":"Introduction to Algorithms","author":"T.H. Cormen","year":"1990","unstructured":"Cormen, T.H., Leiserson, C.L., Rivest, R.L.: Introduction to Algorithms. MIT Press, Cambridge (1990)"},{"key":"4_CR7","unstructured":"Crescenzi, P., et al.: A Compendium of NP Optimization Problems, \n                    \n                      http:\/\/www.nada.kth.se\/~iggo\/problemlist\/"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"DeRemer, F., Kron, H.: Programming-in-the-Large Versus Programming-in-the-Small. IEEE Transactions on Software Engineering (June 1976)","DOI":"10.1109\/TSE.1976.233534"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Fuggetta, A., Picco, G.P., Vigna, G.: Understanding Code Mobility. IEEE Trans. on Software Engineering (May 1998)","DOI":"10.1109\/32.685258"},{"key":"4_CR10","unstructured":"Garlan, D., et al.: Using Gauges for Architecture-Based Monitoring and Adaptation. In: Working Conf. on Complex and Dynamic Systems Arch., Brisbane, Australia (December 2001)"},{"key":"4_CR11","unstructured":"Hyperdictionary, \n                    \n                      http:\/\/hyperdictionary.com\/dictionary\/"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Joseph, D., et al.: Rover: a toolkit for mobile information access. In: 15th ACM Symposium on Operating Systems Principles, Colorado (December 1995)","DOI":"10.1145\/224056.224069"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Kistler, J.J., Satyanarayanan, M.: Disconnected Operation in the Coda File System. ACM Transactions on Computer Systems\u00a010(1) (February 1992)","DOI":"10.1145\/146941.146942"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Kuenning, G.H., Popek, G.J.: Automated Hoarding for Mobile Computers. In: Proceedings of the 16th ACM Symposium on Operating Systems Principles, St. Malo, France (October 1997)","DOI":"10.1145\/268998.266706"},{"key":"4_CR15","volume-title":"Advances in Computers","author":"E.A. Lee","year":"2002","unstructured":"Lee, E.A.: Embedded Software. In: Zelkowitz, M. (ed.) Advances in Computers, vol.\u00a056, Academic Press, London (2002)"},{"key":"4_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-24848-4_1","volume-title":"Component Deployment","author":"M. Mikic-Rakic","year":"2004","unstructured":"Mikic-Rakic, M., et al.: A Tailorable Environment for Assessing the Quality of Deployment Architectures in Highly Distributed Settings. In: Emmerich, W., Wolf, A.L. (eds.) CD 2004. LNCS, vol.\u00a03083, pp. 1\u201317. Springer, Heidelberg (2004)"},{"key":"4_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44892-6_9","volume-title":"Middleware 2003","author":"M. Mikic-Rakic","year":"2003","unstructured":"Mikic-Rakic, M., Medvidovic, N.: Adaptable Architectural Middleware for Programming- in-the-Small-and-Many. In: Endler, M., Schmidt, D.C. (eds.) Middleware 2003. LNCS, vol.\u00a02672, Springer, Heidelberg (2003)"},{"key":"4_CR18","unstructured":"Mikic-Rakic, M., Medvidovic, N.: Toward a Framework for Classifying Disconnected Operation Techniques. In: ICSE Workshop on Architecting Dependable Systems, Portland, Oregon (May 2003)"},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"Oreizy, P., Medvidovic, N., Taylor, R.N.: Architecture-Based run-time Software Evolution. In: 20th Int. Conference on Software Engineering (ICSE 1998), Kyoto, Japan (April 1998)","DOI":"10.1109\/ICSE.1998.671114"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"Perry, D.E., Wolf, A.L.: Foundations for the Study of Software Architectures. Software Engineering Notes (October 1992)","DOI":"10.1145\/141874.141884"},{"key":"4_CR21","volume-title":"Artificial Intelligence: A Modern Approach","author":"S. Russell","year":"1995","unstructured":"Russell, S., Norvig, P.: Artificial Intelligence: A Modern Approach. Prentice Hall, Englewood Cliffs (1995)"},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"Saran, H., Vazirani, V.: Finding k-cuts Within Twice the Optimal. In: 32nd Annual IEEE Symposium on Foundations of Computer Science, pp. 743\u2013751 (1991)","DOI":"10.1109\/SFCS.1991.185443"},{"key":"4_CR23","volume-title":"Software Architecture: Perspectives on an Emerging Discipline","author":"M. Shaw","year":"1996","unstructured":"Shaw, M., Garlan, D.: Software Architecture: Perspectives on an Emerging Discipline. Prentice-Hall, Englewood Cliffs (1996)"},{"key":"4_CR24","doi-asserted-by":"crossref","unstructured":"Weinsberg, Y., Ben-Shaul, I.: A Programming Model and System Support for Disconnected- Aware Applications on Resource-Constrained Devices. In: Int. Conf. on Software Engr., Orlando, Florida (May 2002)","DOI":"10.1145\/581384.581386"},{"key":"4_CR25","unstructured":"Zhang, Y., et al.: The Stationarity of Internet Path Properties: Routing, Loss, and Throughput. Technical Report, AT&T Center for Internet Research at ICSI (May 2000)"}],"container-title":["Lecture Notes in Computer Science","Component-Based Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24774-6_4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T03:09:25Z","timestamp":1620011365000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24774-6_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540219989","9783540247746"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24774-6_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}