{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T21:12:59Z","timestamp":1725570779576},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642173578"},{"type":"electronic","value":"9783642173585"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-45005-1_48","type":"book-chapter","created":{"date-parts":[[2013,11,27]],"date-time":"2013-11-27T04:53:14Z","timestamp":1385527994000},"page":"575-583","source":"Crossref","is-referenced-by-count":0,"title":["Automatic Composition of Form-Based Services in a Context-Aware Personal Information Space"],"prefix":"10.1007","author":[{"given":"Rania","family":"Kh\u00e9fifi","sequence":"first","affiliation":[]},{"given":"Pascal","family":"Poizat","sequence":"additional","affiliation":[]},{"given":"Fatiha","family":"Sa\u00efs","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"48_CR1","unstructured":"Anand, P., Vladimir, K., Lalana, K., Anupam, J.: Enforcing policies in pervasive environments. In: Proc. of MobiQuitous (2004)"},{"issue":"4","key":"48_CR2","first-page":"793","volume":"30","author":"P. Bartalos","year":"2012","unstructured":"Bartalos, P., Bielikov\u00e1, M.: Automatic Dynamic Web Service Composition: A Survey and Problem Formalization. Computing and Informatics\u00a030(4), 793\u2013827 (2012)","journal-title":"Computing and Informatics"},{"issue":"1-2","key":"48_CR3","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1016\/S0004-3702(96)00047-1","volume":"90","author":"A. Blum","year":"1997","unstructured":"Blum, A., Furst, M.L.: Fast Planning Through Planning Graph Analysis. Artificial Intelligence\u00a090(1-2), 281\u2013300 (1997)","journal-title":"Artificial Intelligence"},{"key":"48_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/3-540-70657-7_6","volume-title":"Agent-Oriented Software Engineering II","author":"N. Dulay","year":"2002","unstructured":"Dulay, N., Damianou, N., Lupu, E.C., Sloman, M.: A policy language for the management of distributed agents. In: Wooldridge, M.J., Wei\u00df, G., Ciancarini, P. (eds.) AOSE 2001. LNCS, vol.\u00a02222, pp. 84\u2013100. Springer, Heidelberg (2002)"},{"key":"48_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/11734666_15","volume-title":"Security in Pervasive Computing","author":"D. Hutter","year":"2006","unstructured":"Hutter, D., Volkamer, M.: Information Flow Control to Secure Dynamic Web Service Composition. In: Clark, J.A., Paige, R.F., Polack, F.A.C., Brooke, P.J. (eds.) SPC 2006. LNCS, vol.\u00a03934, pp. 196\u2013210. Springer, Heidelberg (2006)"},{"key":"48_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/978-3-642-32597-7_9","volume-title":"Database and Expert Systems Applications","author":"R. Kh\u00e9fifi","year":"2012","unstructured":"Kh\u00e9fifi, R., Poizat, P., Sa\u00efs, F.: Modeling and Querying Context-Aware Personal Information Spaces. In: Liddle, S.W., Schewe, K.-D., Tjoa, A.M., Zhou, X. (eds.) DEXA 2012, Part II. LNCS, vol.\u00a07447, pp. 103\u2013110. Springer, Heidelberg (2012)"},{"key":"48_CR7","unstructured":"Kiepusewski, B.: Expressiveness and suitability of languages for control flow modelling in workflows. Queensland University of Technology, Brisbane (2003)"},{"key":"48_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/978-3-642-01918-0_3","volume-title":"Formal Methods for Web Services","author":"A. Marconi","year":"2009","unstructured":"Marconi, A., Pistore, M.: Synthesis and Composition of Web Services. In: Bernardo, M., Padovani, L., Zavattaro, G. (eds.) SFM 2009. LNCS, vol.\u00a05569, pp. 89\u2013157. Springer, Heidelberg (2009)"},{"key":"48_CR9","unstructured":"Most\u00e9faoui, S.K., Hirsbrunner, B.: Towards a Context-Based Service Composition Framework. In: Proc. of ICWS (2003)"},{"issue":"3\/4","key":"48_CR10","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1504\/IJWGS.2005.008390","volume":"1","author":"M. Mrissa","year":"2005","unstructured":"Mrissa, M., Benslimane, D., Maamar, Z., Ghedira, C.: Towards a semantic- and context-based approach for composing web services. IJWGS\u00a01(3\/4), 268\u2013286 (2005)","journal-title":"IJWGS"},{"key":"48_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-642-16561-0_11","volume-title":"Leveraging Applications of Formal Methods, Verification, and Validation","author":"P. Poizat","year":"2010","unstructured":"Poizat, P., Yan, Y.: Adaptive Composition of Conversational Services through Graph Planning Encoding. In: Margaria, T., Steffen, B. (eds.) ISoLA 2010, Part II. LNCS, vol.\u00a06416, pp. 35\u201350. Springer, Heidelberg (2010)"},{"key":"48_CR12","unstructured":"Russell, S.J., Norvig, P., Canny, J.F., Malik, J.M., Edwards, D.D.: Artificial Intelligence: A Modern Approach. Prentice hall, Englewood Cliffs (1995)"},{"key":"48_CR13","unstructured":"Sheshagiri, M., Sadeh, N., Gandon, F.: Using Semantic Web Services for Context-Aware Mobile Applications. In: Proc. of MobiSys (2004)"},{"key":"48_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1007\/978-3-642-17358-5_11","volume-title":"Service-Oriented Computing","author":"Y. Yan","year":"2010","unstructured":"Yan, Y., Poizat, P., Zhao, L.: Repair vs. Recomposition for Broken Service Compositions. In: Maglio, P.P., Weske, M., Yang, J., Fantinato, M. (eds.) ICSOC 2010. LNCS, vol.\u00a06470, pp. 152\u2013166. Springer, Heidelberg (2010)"}],"container-title":["Lecture Notes in Computer Science","Service-Oriented Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-45005-1_48","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,8]],"date-time":"2019-01-08T20:08:29Z","timestamp":1546978109000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-45005-1_48"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642173578","9783642173585"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-45005-1_48","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}