{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T16:41:45Z","timestamp":1775839305254,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642309724","type":"print"},{"value":"9783642309731","type":"electronic"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-30973-1_10","type":"book-chapter","created":{"date-parts":[[2012,5,23]],"date-time":"2012-05-23T15:32:31Z","timestamp":1337787151000},"page":"113-125","source":"Crossref","is-referenced-by-count":5,"title":["HiCHO: Attributes Based Classification of Ubiquitous Devices"],"prefix":"10.1007","author":[{"given":"Shachi","family":"Sharma","sequence":"first","affiliation":[]},{"given":"Shalini","family":"Kapoor","sequence":"additional","affiliation":[]},{"given":"Bharat R.","family":"Srinivasan","sequence":"additional","affiliation":[]},{"given":"Mayank S.","family":"Narula","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Adjie, W.: The design and implementation of an intentional naming system. In: 17th ACM Symposium on Operating Systems Principles, pp. 186\u2013201 (1999)","DOI":"10.1145\/319344.319164"},{"key":"10_CR2","unstructured":"Blueetooth website, \n                    \n                      http:\/\/www.bluetooth.com\/"},{"key":"10_CR3","unstructured":"CCITT. The Directory Overview of Concepts, Models and Services, X.500 series recommendations (1988)"},{"key":"10_CR4","unstructured":"Efficient XML Interchange, \n                    \n                      http:\/\/www.w3.org\/TR\/exi"},{"issue":"4","key":"10_CR5","doi-asserted-by":"publisher","first-page":"815","DOI":"10.1111\/j.1467-9868.2004.02059.x","volume":"66","author":"J.H. Friedman","year":"2004","unstructured":"Friedman, J.H.: Clustering objects on subsets of attributes. Journal of Royal Statistical Society\u00a066(4), 815\u2013849 (2004)","journal-title":"Journal of Royal Statistical Society"},{"key":"10_CR6","first-page":"547","volume":"37","author":"P. Jaccard","year":"1901","unstructured":"Jaccard, P.: \u00c9tude comparative de la distribution florale dans une portion des Alpes et des Jura. Bulletin de la Soci\u00e9t\u00e9 Vaudoise des Sciences Naturelles\u00a037, 547\u2013579 (1901)","journal-title":"Bulletin de la Soci\u00e9t\u00e9 Vaudoise des Sciences Naturelles"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Kangasharju, J., Lindholm, T., Tarkoma, S.: Xml messaging for mobile devices: From requirements to implementation. Computer Networks: The International Journal of Computer and Telecommunications Networking\u00a051(16) (2007)","DOI":"10.1016\/j.comnet.2007.06.008"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Kangasharju, J.: Efficient Implementation of XML Security for Mobile Devices. In: IEEE International Conference on Web Services, pp. 134\u2013141 (2007)","DOI":"10.1109\/ICWS.2007.81"},{"issue":"7","key":"10_CR9","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1109\/MCOM.2004.1316539","volume":"72","author":"L.E. Menten","year":"2004","unstructured":"Menten, L.E., Murray, H.: Experiences in the application of xml for device management. IEEE Communications Magazine\u00a072(7), 92\u2013100 (2004)","journal-title":"IEEE Communications Magazine"},{"issue":"10","key":"10_CR10","first-page":"2110","volume":"7","author":"F. Shao","year":"2010","unstructured":"Shao, F., et al.: A new real-time clustering algorithm. Journal of Information and Computational Science\u00a07(10), 2110\u20132121 (2010)","journal-title":"Journal of Information and Computational Science"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Li, T., Ma, S., Ogihara, M.: Entropy-based criterion in categorical clustering. In: Proceedings of the 12th International Conference on Machine Learning (2004)","DOI":"10.1145\/1015330.1015404"},{"key":"10_CR12","unstructured":"UpnP, \n                    \n                      http:\/\/www.upnp.org\/"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Wang, S., et al.: Entropy based clustering of data streams with mixed numeric and categorical values. In: IEEE\/ACIS International Conference on Computer and Information Science, pp. 140\u2013145 (2008)","DOI":"10.1109\/ICIS.2008.57"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Weiser, M.: The Computer for the Twenty-First Century. Scientific American, 94\u2013104 (1991)","DOI":"10.1038\/scientificamerican0991-94"},{"key":"10_CR15","unstructured":"Zigbee website, \n                    \n                      http:\/\/www.zigbee.org\/"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Mobile and Ubiquitous Systems: Computing, Networking, and Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-30973-1_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T19:26:40Z","timestamp":1556825200000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-30973-1_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642309724","9783642309731"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-30973-1_10","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"value":"1867-8211","type":"print"},{"value":"1867-822X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}