{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:51:59Z","timestamp":1725889919190},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540706199"},{"type":"electronic","value":"9783540706212"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-70621-2_10","type":"book-chapter","created":{"date-parts":[[2008,7,17]],"date-time":"2008-07-17T09:46:52Z","timestamp":1216288012000},"page":"113-126","source":"Crossref","is-referenced-by-count":0,"title":["Bridging between Middleware Systems: Optimisations Using Downloadable Code"],"prefix":"10.1007","author":[{"given":"Jan","family":"Newmarch","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","unstructured":"Allard, J., Chinta, V., Gundala, S., Richard, III.G.G.: Jini meets upnp. In: Proceedings of the Applications and the Internet (SAINT) (2003)"},{"key":"10_CR2","volume-title":"The Jini Specification","author":"K. Arnold","year":"2001","unstructured":"Arnold, K.: The Jini Specification. Addison-Wesley, Reading (2001)"},{"key":"10_CR3","unstructured":"Bellwood, T.: Uddi version 2.04 api specification. (2002) (Retrieved, July 7, 2006), http:\/\/uddi.org\/pubs\/ProgrammersAPI-V2.04-Published-20020719.htm"},{"key":"10_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1007\/978-3-540-47942-0_5","volume-title":"Information and Communication Security","author":"L. Brown","year":"1999","unstructured":"Brown, L., Sablin, D.: Extending erlang for safe mobile code execution. In: Varadharajan, V., Mu, Y. (eds.) ICICS 1999. LNCS, vol.\u00a01726, pp. 39\u201353. Springer, Heidelberg (1999)"},{"key":"10_CR5","unstructured":"Casati, M.: Javascript soap client. (2006) (Retrieved, July 7, 2006), http:\/\/www.codeproject.com\/Ajax\/JavaScriptSOAPClient.asp"},{"key":"10_CR6","unstructured":"Dabrowski, C., Mills, K.: Analyzing properties and behavior of service discovery protocols using an In: Proc. Working Conference on Complex and Dynamic Systems Architecture (2001)"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Edwards, W.K., Newman, M.W., Smith, T.F., Sedivy, J., Izadi, S.: An extensible set-top box platform for home media applications. IEEE Transactions on Consumer Electronics\u00a04(51) (2005)","DOI":"10.1109\/TCE.2005.1561841"},{"key":"10_CR8","unstructured":"Garrett, J.J.: Ajax: a new approach to web applications. (2005) (Retrieved, July 7, 2006), http:\/\/www.adaptivepath.com\/publications\/essays\/archives\/000385.php"},{"key":"10_CR9","unstructured":"JSON, Json in javascript. (2006) (Retrieved, July 7, 2006), http:\/\/www.json.org\/js.html"},{"key":"10_CR10","unstructured":"Kirby, G.: Dynamic compilation in java. (2005) (Retrieved, July 7, 2006), http:\/\/www-ppg.dcs.st-and.ac.uk\/Java\/DynamicCompilation"},{"key":"10_CR11","unstructured":"Levy, J.Y., Ousterhout, J.K., Welch, B.B.: The safe-tcl security model. Technical report, Sun Microsystems. (1997) (Retrieved, July 7, 2006), http:\/\/research.sun.com\/technical-reports\/1997\/abstract-60.html"},{"key":"10_CR12","unstructured":"Nakazawa, J., Edwards, W., Tokuda, H., and Ramachandran, U.: A bridging framework for universal interoperability in pervasive systems. In: ICDCS (2006) (Retrieved, July 7, 2006), www-static.cc.gatech.edu\/~keith\/pubs\/icdcs06-bridging.pdf"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Newmarch, J.: A Programmers Guide to Jini. APress (2001)","DOI":"10.1007\/978-1-4302-0860-0"},{"key":"10_CR14","unstructured":"Newmarch, J.: Upnp services and jini clients. In: ISNG, Las Vegas (2005)"},{"key":"10_CR15","unstructured":"Newmarch, J.: Foundations of Jini 2 Programming. APress (2006)"},{"key":"10_CR16","unstructured":"UPnP Consortium, Upnp home page. (2006) (Retrieved, July 7, 2006), http:\/\/www.upnp.org"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Vinoski, S.: Rpc under fire. IEEE Internet Computing (2005)","DOI":"10.1109\/MIC.2005.108"},{"key":"10_CR18","unstructured":"Waldo, J.: The end of protocols. (2000) (Retrieved July 7, 2006), http:\/\/java.sun.com\/developer\/technicalArticles\/jini\/protocols.html"},{"key":"10_CR19","unstructured":"Waldo, J.: An architecture for service oriented architectures. (2005) (Retrieved July 7, 2006), http:\/\/www.jini.org\/events\/0505NYSIG\/WaldoNYCJUG.pdf"},{"key":"10_CR20","unstructured":"Consortium, W.W.W.: Web services home page. (2002) (Retrieved July 7, 2006), http:\/\/www.w3.org\/2002\/ws"}],"container-title":["Communications in Computer and Information Science","Software and Data Technologies"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-70621-2_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T04:24:34Z","timestamp":1620015874000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-70621-2_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540706199","9783540706212"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-70621-2_10","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[]}}