{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T10:34:11Z","timestamp":1725705251360},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642351693"},{"type":"electronic","value":"9783642351709"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-35170-9_12","type":"book-chapter","created":{"date-parts":[[2012,11,9]],"date-time":"2012-11-09T21:37:05Z","timestamp":1352497025000},"page":"229-248","source":"Crossref","is-referenced-by-count":3,"title":["OverStar: An Open Approach to End-to-End Middleware Services in Systems of Systems"],"prefix":"10.1007","author":[{"given":"Paul","family":"Grace","sequence":"first","affiliation":[]},{"given":"Y\u00e9rom-David","family":"Bromberg","sequence":"additional","affiliation":[]},{"given":"Laurent","family":"R\u00e9veill\u00e8re","sequence":"additional","affiliation":[]},{"given":"Gordon","family":"Blair","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/978-3-642-16955-7_14","volume-title":"Middleware 2010","author":"T.F. Bissyand\u00e9","year":"2010","unstructured":"Bissyand\u00e9, T.F., R\u00e9veill\u00e8re, L., Bromberg, Y.-D., Lawall, J.L., Muller, G.: Bridging the Gap between Legacy Services and Web Services. In: Gupta, I., Mascolo, C. (eds.) Middleware 2010. LNCS, vol.\u00a06452, pp. 273\u2013292. Springer, Heidelberg (2010)"},{"key":"12_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1007\/978-3-642-25821-3_21","volume-title":"Middleware 2011","author":"G.S. Blair","year":"2011","unstructured":"Blair, G.S., Bennaceur, A., Georgantas, N., Grace, P., Issarny, V., Nundloll, V., Paolucci, M.: The Role of Ontologies in Emergent Middleware: Supporting Interoperability in Complex Distributed Systems. In: Kon, F., Kermarrec, A.-M. (eds.) Middleware 2011. LNCS, vol.\u00a07049, pp. 410\u2013430. Springer, Heidelberg (2011)"},{"key":"12_CR3","unstructured":"Booth, D., Haas, H., McCabe, F., Newcomer, E., Champion, M., Ferris, C., Orchard, D.: Web services architecture (February 2004)"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Bromberg, Y.-D., Grace, P., Reveillere, L.: Starlink: Runtime interoperability between heterogeneous middleware protocols. In: 31st International Conference on Distributed Computing Systems, ICDCS 2011, pp. 446\u2013455 (2011)","DOI":"10.1109\/ICDCS.2011.65"},{"key":"12_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1007\/11587552_9","volume-title":"Middleware 2005","author":"Y.-D. Bromberg","year":"2005","unstructured":"Bromberg, Y.-D., Issarny, V.: INDISS: Interoperable Discovery System for Networked Services. In: Alonso, G. (ed.) Middleware 2005. LNCS, vol.\u00a03790, pp. 164\u2013183. Springer, Heidelberg (2005)"},{"key":"12_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-642-10445-9_2","volume-title":"Middleware 2009","author":"Y.-D. Bromberg","year":"2009","unstructured":"Bromberg, Y.-D., R\u00e9veill\u00e8re, L., Lawall, J.L., Muller, G.: Automatic Generation of Network Protocol Gateways. In: Bacon, J.M., Cooper, B.F. (eds.) Middleware 2009. LNCS, vol.\u00a05896, pp. 21\u201341. Springer, Heidelberg (2009)"},{"key":"12_CR7","unstructured":"Flores, C., Blair, G., Grace, P.: An adaptive middleware to overcome service discovery heterogeneity in mobile ad hoc environments. In: IEEE Distributed Systems Online (2007)"},{"key":"12_CR8","doi-asserted-by":"publisher","first-page":"784","DOI":"10.1109\/90.650139","volume":"5","author":"S. Floyd","year":"1997","unstructured":"Floyd, S., Jacobson, V., Liu, C., McCanne, S., Zhang, L.: A reliable multicast framework for light-weight sessions and application level framing. IEEE\/ACM Trans. Netw.\u00a05, 784\u2013803 (1997)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"12_CR9","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1145\/1352592.1352606","volume-title":"Proceedings of the 3rd ACM SIGOPS\/EuroSys European Conference on Computer Systems, Eurosys 2008","author":"P. Grace","year":"2008","unstructured":"Grace, P., Hughes, D., Porter, B., Blair, G., Coulson, G., Taiani, F.: Experiences with open overlays: a middleware approach to network heterogeneity. In: Proceedings of the 3rd ACM SIGOPS\/EuroSys European Conference on Computer Systems, Eurosys 2008, pp. 123\u2013136. ACM, New York (2008)"},{"key":"12_CR10","unstructured":"Object\u00a0Management Group. The common object request broker: Architecture and specification version 2.0. Technical report (1995)"},{"issue":"1-2","key":"12_CR11","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/s11276-004-4744-y","volume":"11","author":"H. Yih-Chun","year":"2005","unstructured":"Yih-Chun, H., Perrig, A., Johnson, D.: Ariadne: a secure on-demand routing protocol for ad hoc networks. Wirel. Netw.\u00a011(1-2), 21\u201338 (2005)","journal-title":"Wirel. Netw."},{"key":"12_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/978-3-642-16561-0_24","volume-title":"Leveraging Applications of Formal Methods, Verification, and Validation","author":"F. Howar","year":"2010","unstructured":"Howar, F., Jonsson, B., Merten, M., Steffen, B., Cassel, S.: On Handling Data in Automata Learning - Considerations from the CONNECT Perspective In: Margaria, T., Steffen, B. (eds.) ISoLA 2010, Part II. LNCS, vol.\u00a06416, pp. 221\u2013235. Springer, Heidelberg (2010)"},{"key":"12_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/978-3-642-21455-4_7","volume-title":"Formal Methods for Eternal Networked Software Systems","author":"V. Issarny","year":"2011","unstructured":"Issarny, V., Bennaceur, A., Bromberg, Y.-D.: Middleware-Layer Connector Synthesis: Beyond State of the Art in Middleware Interoperability. In: Bernardo, M., Issarny, V. (eds.) SFM 2011. LNCS, vol.\u00a06659, pp. 217\u2013255. Springer, Heidelberg (2011)"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Li, B., Guo, J., Wang, M.: iOverlay: A Lightweight Middleware Infrastructure for Overlay Application Implementations, pp. 135\u2013154 (2004)","DOI":"10.1007\/978-3-540-30229-2_8"},{"issue":"3","key":"12_CR15","doi-asserted-by":"publisher","first-page":"546","DOI":"10.1016\/j.comcom.2005.11.017","volume":"30","author":"N. Limam","year":"2007","unstructured":"Limam, N., Ziembicki, J., Ahmed, R., Iraqi, Y., Li, D., Boutaba, R., Cuervo, F.: Osda: Open service discovery architecture for efficient cross-domain service provisioning. Computer Communications\u00a030(3), 546\u2013563 (2007)","journal-title":"Computer Communications"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Loo, B., Condie, T., Hellerstein, J., Maniatis, P., Roscoe, T., Stoica, I.: Implementing declarative overlays. In: Proceedings of the Twentieth ACM Symposium on Operating Systems Principles, SOSP 2005, New York, NY, USA, pp. 75\u201390 (2005)","DOI":"10.1145\/1095809.1095818"},{"key":"12_CR17","unstructured":"Magee, J., Kramer, J.: Concurrency - state models and Java programs, 2nd edn. Wiley (2006)"},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"Milner, R.: Operational and Algebraic Semantics of Concurrent Processes (1990)","DOI":"10.1016\/B978-0-444-88074-1.50024-X"},{"key":"12_CR19","unstructured":"Nakazawa, J., Tokuda, H., Edwards, W., Ramachandran, U.: A bridging framework for universal interoperability in pervasive systems. In: 26th IEEE International Conference on Distributed Computing Systems, ICDCS 2006 (2006)"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Raverdy, P., Issarny, V., Chibout, R., de La Chapelle, A.: A multi-protocol approach to service discovery and access in pervasive environments. In: 3rd Annual International Conference on Mobile and Ubiquitous Systems - Workshops, pp. 1\u20139 (July 2006)","DOI":"10.1109\/MOBIQW.2006.361780"},{"key":"12_CR21","unstructured":"Rodriguez, A., Killian, C., Bhat, S., Kostic, D., Vahdat, A.: Macedon: Methodology for automatically creating, evaluating, and designing overlay networks. In: In NSDI, pp. 267\u2013280 (2004)"},{"key":"12_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/3-540-45518-3_18","volume-title":"Middleware 2001","author":"A. Rowstron","year":"2001","unstructured":"Rowstron, A., Druschel, P.: Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems. In: Guerraoui, R. (ed.) Middleware 2001. LNCS, vol.\u00a02218, pp. 329\u2013350. Springer, Heidelberg (2001)"},{"key":"12_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/3-540-45546-9_3","volume-title":"Networked Group Communication","author":"A. Rowstron","year":"2001","unstructured":"Rowstron, A., Kermarrec, A.-M., Druschel, P.: SCRIBE: The Design of a Large-Scale Event Notification Infrastructure. In: Crowcroft, J., Hofmann, M. (eds.) NGC 2001. LNCS, vol.\u00a02233, pp. 30\u201343. Springer, Heidelberg (2001)"},{"issue":"1","key":"12_CR24","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/s00779-005-0038-3","volume":"10","author":"E. Souto","year":"2005","unstructured":"Souto, E., Guimar, G., Vasconcelos, G., Vieira, M., Rosa, N., Ferraz, C., Kelner, J.: Mires: a publish\/subscribe middleware for sensor networks. Personal Ubiquitous Comput.\u00a010(1), 37\u201344 (2005)","journal-title":"Personal Ubiquitous Comput."},{"key":"12_CR25","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1109\/TNET.2002.808407","volume":"11","author":"I. Stoica","year":"2003","unstructured":"Stoica, I., Morris, R., Liben-Nowell, D., Karger, D., Kaashoek, M., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE\/ACM Trans. Netw.\u00a011, 17\u201332 (2003)","journal-title":"IEEE\/ACM Trans. Netw."}],"container-title":["Lecture Notes in Computer Science","Middleware 2012"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35170-9_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,8]],"date-time":"2019-05-08T17:56:59Z","timestamp":1557338219000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-35170-9_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642351693","9783642351709"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35170-9_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}