{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:10:09Z","timestamp":1725567009609},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642163548"},{"type":"electronic","value":"9783642163555"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16355-5_31","type":"book-chapter","created":{"date-parts":[[2010,10,4]],"date-time":"2010-10-04T16:00:06Z","timestamp":1286208006000},"page":"382-396","source":"Crossref","is-referenced-by-count":0,"title":["A Self-Adaptive Hardware\/Software System Architecture for Ubiquitous Computing Applications"],"prefix":"10.1007","author":[{"given":"Chun-Hsian","family":"Huang","sequence":"first","affiliation":[]},{"given":"Jih-Sheng","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Pao-Ann","family":"Hsiung","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"31_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/3-540-44498-X_2","volume-title":"Mobile Data Management","author":"C. Efstratiou","year":"2000","unstructured":"Efstratiou, C., Cheverst, K., Davices, N., Friday, A.: An Architecture for the Effective Support of Adaptive Context-Aware Applications. In: Tan, K.-L., Franklin, M.J., Lui, J.C.-S. (eds.) MDM 2001. LNCS, vol.\u00a01987, pp. 15\u201326. Springer, Heidelberg (2000)"},{"key":"31_CR2","series-title":"Lecture Notes in Computer Science","first-page":"21","volume-title":"Evolvable Systems: From Biology to Hardware","author":"M. Danek","year":"2008","unstructured":"Danek, M., Philippe, J.-M., Honzik, P., Gamrat, C., Bartosinski, R.: Self-Adaptive Networked Entities for Building Pervasive Computing Architectures. In: Hornby, G.S., Sekanina, L., Haddow, P.C. (eds.) ICES 2008. LNCS, vol.\u00a05216, pp. 21\u201324. Springer, Heidelberg (2008)"},{"key":"31_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/978-3-540-25978-7_8","volume-title":"Information Networking. Networking Technologies for Broadband and Mobile Networks","author":"S.-J. Ghim","year":"2004","unstructured":"Ghim, S.-J., Yoon, Y.-I., Choe, J.-W.: A Reflective Approach to Dynamic Adaptation in Ubiquitous Computing Environment. In: Kahng, H.-K., Goto, S. (eds.) ICOIN 2004. LNCS, vol.\u00a03090, pp. 75\u201382. Springer, Heidelberg (2004)"},{"key":"31_CR4","doi-asserted-by":"crossref","unstructured":"Huang, C.-H., Hsiung, P.-A.: Software-Controlled Dynamically Swappable Hardware Design in Partially Reconfigurable Systems. EURASIP J. Embedded System Article ID 231940 (2008) doi:10.1155\/2008\/231940","DOI":"10.1155\/2008\/231940"},{"issue":"1","key":"31_CR5","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1109\/LES.2009.2028039","volume":"1","author":"C.-H. Huang","year":"2009","unstructured":"Huang, C.-H., Hsiung, P.-A.: Hardware Resource Virtualization for Dynamically Partially Reconfigurable Systems. IEEE Embedded Systems Letters\u00a01(1), 19\u201323 (2009), doi:10.1109\/LES.2009.2028039","journal-title":"IEEE Embedded Systems Letters"},{"key":"31_CR6","doi-asserted-by":"crossref","unstructured":"Kalte, H., Porrmann, M.: Context Saving and Restoring for Multitasking in Reconfigurable Systems. In: 15th IEEE International Conference on Field Programmable Logic and Applications (FPL), pp. 223\u2013228. IEEE CS Press, Los Alamitos (August 2005)","DOI":"10.1109\/FPL.2005.1515726"},{"key":"31_CR7","doi-asserted-by":"crossref","unstructured":"Lagger, A., Upegui, A., Sanchez, E., Gonzalez, I.: Self-Reconfigurable Pervasive Platform for Cryptographic Application. In: 16th IEEE International Conference on Field Programmable Logic and Applications (FPL), pp. 777\u2013780. IEEE CS Press, Los Alamitos (August 2006)","DOI":"10.1109\/FPL.2006.311312"},{"issue":"1","key":"31_CR8","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/98.824577","volume":"7","author":"B. Noble","year":"2000","unstructured":"Noble, B.: System Support for Mobile, Adaptive Applications. IEEE Personal Communications\u00a07(1), 44\u201349 (2000)","journal-title":"IEEE Personal Communications"},{"key":"31_CR9","unstructured":"PetaLogix. PetaLinux, \n                    \n                      http:\/\/www.petalogix.com"},{"key":"31_CR10","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1109\/UIC-ATC.2009.35","volume-title":"2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing (UIC-ATC)","author":"J.-Z. Sun","year":"2009","unstructured":"Sun, J.-Z.: Adaptive Determination of Data Granularity for QoS-Constraint Data Gathering in Wireless Sensor Networks. In: 2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing (UIC-ATC), pp. 401\u2013405. IEEE Computer Society, Los Alamitos (June 2009)"},{"key":"31_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-45234-8_10","volume-title":"Field Programmable Logic and Application","author":"T. Wollinger","year":"2003","unstructured":"Wollinger, T., Paar, C.: How Secure are FPGAs in Cryptographic Applications. In: Peter Cheung, Y.K., Constantinides, G.A. (eds.) FPL 2003. LNCS, vol.\u00a02778, pp. 1\u20133. Springer, Heidelberg (2003)"},{"key":"31_CR12","unstructured":"Xilinx: Early Access Partial Reconfiguration User Guide - UG208 (2006)"},{"key":"31_CR13","unstructured":"Xilinx: ML310 User Guide (2007)"}],"container-title":["Lecture Notes in Computer Science","Ubiquitous Intelligence and Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16355-5_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,21]],"date-time":"2019-03-21T14:02:05Z","timestamp":1553176925000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16355-5_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642163548","9783642163555"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16355-5_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}