{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T22:44:52Z","timestamp":1648939492948},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2010,8,17]],"date-time":"2010-08-17T00:00:00Z","timestamp":1282003200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2011,3]]},"DOI":"10.1007\/s00779-010-0328-2","type":"journal-article","created":{"date-parts":[[2010,8,16]],"date-time":"2010-08-16T06:08:32Z","timestamp":1281938912000},"page":"235-251","source":"Crossref","is-referenced-by-count":9,"title":["Mobility management in ubiquitous environments"],"prefix":"10.1007","volume":"15","author":[{"given":"Chiung-Ying","family":"Wang","sequence":"first","affiliation":[]},{"given":"Hsiao-Yun","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Ren-Hung","family":"Hwang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,8,17]]},"reference":[{"key":"328_CR1","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1038\/scientificamerican0991-94","volume":"265","author":"M Weiser","year":"1991","unstructured":"Weiser M (1991) The computer for the twenty-first century. Sci Am 265:94\u2013104 IEEE Pervasive Comput 2002:19\u201325","journal-title":"Sci Am"},{"key":"328_CR2","unstructured":"Lu JH, Wang CY, Hwang RH (2009) An open framework for distributed context management in ubiquitous environment. International symposium on UbiCom frontiers\u2014innovative research, systems and technologies (Ufirst) 88\u201393"},{"key":"328_CR3","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1007\/978-3-642-02830-4_6","volume":"5585","author":"CY Wang","year":"2009","unstructured":"Wang CY, Hwang RH (2009) Context-aware path planning in ubiquitous network. Ubiquitous Intell Comput 5585:54\u201367","journal-title":"Ubiquitous Intell Comput"},{"key":"328_CR4","first-page":"401","volume":"1661","author":"D Kettani","year":"1999","unstructured":"Kettani D, Moulin B (1999) A spatial model based on the notions of spatial conceptual map and of object\u2019s influence areas. Spat Inf Theory Cogn Comput Found Geogr Inf Sci 1661:401\u2013416","journal-title":"Spat Inf Theory Cogn Comput Found Geogr Inf Sci"},{"key":"328_CR5","volume-title":"Genetic algorithms in search, optimization, and machine learning","author":"DE Goldberg","year":"1989","unstructured":"Goldberg DE (1989) Genetic algorithms in search, optimization, and machine learning. Addison-Wesley, Massachusetts"},{"key":"328_CR6","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1016\/0377-2217(90)90057-I","volume":"48","author":"TL Saaty","year":"1990","unstructured":"Saaty TL (1990) How to make a decision: the analytic hierarchy process. Eur J Oper Res 48:9\u201326","journal-title":"Eur J Oper Res"},{"key":"328_CR7","unstructured":"Fahy P, Clarke S (2004) CASS\u2014middleware for mobile context-aware applications. Mobile systems, applications, and services (Mobisys) workshop on context awareness, pp 304\u2013308"},{"key":"328_CR8","unstructured":"Chen H, Finin T, Joshi A (2003) An intelligent broker for context-aware system. Ubiquitous computing (Ubicomp), pp 183\u2013184"},{"key":"328_CR9","doi-asserted-by":"crossref","unstructured":"Chin CY, Zhang D, Gurusamy M (2005) Orion P2P-based inter-space context discovery platform. Mobile and ubiquitous systems: networking and services (MobiQuitous), pp 490\u2013493","DOI":"10.1109\/MOBIQUITOUS.2005.45"},{"key":"328_CR10","first-page":"2859","volume":"5","author":"D Zhang","year":"2005","unstructured":"Zhang D, Chin CY, Gurusamy M (2005) Supporting context-aware mobile service adaptation with scalable context discovery platform. Vehicular Technol Conf 5:2859\u20132863","journal-title":"Vehicular Technol Conf"},{"key":"328_CR11","doi-asserted-by":"crossref","unstructured":"Moon S, Kim J, Park D (2007) USD protocol- ubiquitous service discovery protocol on infrastructure-based architecture for ubiquitous fashionable computer. Multimedia and ubiquitous engineering, pp 779\u2013784","DOI":"10.1109\/MUE.2007.213"},{"key":"328_CR12","first-page":"1221","volume":"1","author":"J Tu","year":"2003","unstructured":"Tu J, Yang S (2003) Genetic algorithm based path planning for a mobile robot. Robot Autom 1:1221\u20131226","journal-title":"Robot Autom"},{"key":"328_CR13","first-page":"48","volume":"6","author":"O Castilho","year":"2005","unstructured":"Castilho O, Trujilo L (2005) Multiple objective optimization genetic algorithms for path planning in autonomous mobile robots. Comput Syst Signals 6:48\u201363","journal-title":"Comput Syst Signals"},{"key":"328_CR14","doi-asserted-by":"crossref","unstructured":"Lei L, Wang H, Wu Q (2006) Improved genetic algorithms based path planning of mobile robot under dynamic unknown environment. Mechatronics and automation, pp 1728\u20131732","DOI":"10.1109\/ICMA.2006.257475"},{"key":"328_CR15","first-page":"637","volume":"2","author":"Q Li","year":"2006","unstructured":"Li Q, Zhang W, Yin Y, Zhang W, Liu G (2006) An improved genetic algorithm of optimum path planning for mobile robots. Intell Syst Des Appl 2:637\u2013642","journal-title":"Intell Syst Des Appl"},{"key":"328_CR16","doi-asserted-by":"crossref","unstructured":"Li Q, Liu G, Zhang W, Zhao C, Yin Y, Wang Z (2006) A specific genetic algorithm for optimum path planning in intelligent transportation system. ITS Telecommunications, pp 140\u2013143","DOI":"10.1109\/ITST.2006.288799"},{"key":"328_CR17","doi-asserted-by":"crossref","unstructured":"Arikan O, Chenney S, Forsyth DA (2001) Efficient multi-agent path planning. Eurographic workshop on computer animation and simulation, pp 151\u2013162","DOI":"10.1007\/978-3-7091-6240-8_14"},{"key":"328_CR18","doi-asserted-by":"crossref","unstructured":"Wan TR, Chen H, Earnshaw R (2003) Real-time path planning for navigation in unknown environment. Theory and practice of computer graphics, pp 138\u2013145","DOI":"10.1109\/TPCG.2003.1206941"},{"key":"328_CR19","doi-asserted-by":"crossref","unstructured":"Sigg S, Haseloff S, David K (2006) A novel approach to context prediction in ubicomp environments. Personal, indoor and mobile radio communications, pp 1\u20135","DOI":"10.1109\/PIMRC.2006.254051"},{"key":"328_CR20","doi-asserted-by":"crossref","unstructured":"Anagnostopoulos T, Anagnostopoulos C, Hadjiefthymiades S, Kalousis A, Kyriakakos M (2007) Path prediction through data mining. Pervasive services, pp 128\u2013135","DOI":"10.1109\/PERSER.2007.4283902"},{"key":"328_CR21","doi-asserted-by":"crossref","first-page":"537","DOI":"10.1109\/TMC.2005.74","volume":"4","author":"N Samaan","year":"2005","unstructured":"Samaan N, Karmouch A (2005) A mobility prediction architecture based on contextual knowledge and spatial conceptual maps. IEEE Trans Mob Comput 4:537\u2013551","journal-title":"IEEE Trans Mob Comput"},{"key":"328_CR22","first-page":"3439","volume":"6","author":"M Ylianttila","year":"2001","unstructured":"Ylianttila M, Pande M, Makela J, Mahonen P (2001) Optimization scheme for mobile users performing vertical handoffs between IEEE 802.11 and GPRS\/EDGE networks. Global Telecommun Conf 6:3439\u20133443","journal-title":"Global Telecommun Conf"},{"key":"328_CR23","unstructured":"Misra S, Banerjee A (2003) A novel load sensitive algorithm for AP selection in 4G networks. CODEC"},{"key":"328_CR24","doi-asserted-by":"crossref","unstructured":"Du L, Bai Y, Chen L (2007) Access point selection strategy for large-scale wireless local area networks. Wireless communications and networking conference (WCNC), pp 2161\u20132166","DOI":"10.1109\/WCNC.2007.404"},{"key":"328_CR25","doi-asserted-by":"crossref","unstructured":"Bejerano Y, Han S, Li L (2004) Fairness and load balancing in wireless LANs using association control. Mobile computing and networking (Mobicom), pp 315\u2013329","DOI":"10.1145\/1023720.1023751"},{"key":"328_CR26","unstructured":"Fukuda Y, Abe T, OIE Y (2004) Decentralized access point for wireless LANs. WTS"},{"key":"328_CR27","first-page":"867","volume":"2","author":"F Zhu","year":"2004","unstructured":"Zhu F, McNair J (2004) Optimizations for vertical handoff decision algorithms. Wirel Commun Netw Conf 2:867\u2013872","journal-title":"Wirel Commun Netw Conf"},{"key":"328_CR28","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1109\/MWC.2004.1308935","volume":"11","author":"J McNair","year":"2004","unstructured":"McNair J, Zhu F (2004) Vertical handoffs in fourth-generation multinetwork environments. Wirel Commun 11:8\u201315","journal-title":"Wirel Commun"},{"key":"328_CR29","doi-asserted-by":"crossref","unstructured":"Wang H, Katz R, Giese J (1999) Policy-enabled handoffs across heterogeneous wireless networks. Workshop on mobile computing systems and applications (WMCSA), pp 51\u201360","DOI":"10.1109\/MCSA.1999.749277"},{"key":"328_CR30","unstructured":"Ahmed T, Kyamakya K, Ludwig M (2006) A context-aware vertical handover decision algorithm for multimode mobile terminals and its performance. IEEE\/ACM EATIS, pp 19\u201328"},{"key":"328_CR31","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/MWC.2005.1452853","volume":"12","author":"Q Song","year":"2005","unstructured":"Song Q, Jamalipour A (2005) Network Selection in an integrated wireless LAN ans UMTS environment using mathematical modeling and computing techniques. IEEE Wirel Commun Mag 12:42\u201349","journal-title":"IEEE Wirel Commun Mag"},{"key":"328_CR32","doi-asserted-by":"crossref","first-page":"697","DOI":"10.1002\/wcm.330","volume":"5","author":"Q Song","year":"2005","unstructured":"Song Q, Jamalipour A (2005) An adaptive quality-of-service network selection mechanism for heterogeneous mobile networks. Wirel Commun Mob Comput 5:697\u2013708","journal-title":"Wirel Commun Mob Comput"},{"key":"328_CR33","first-page":"1056","volume":"2","author":"S Balasubramaniam","year":"2003","unstructured":"Balasubramaniam S, Indulska J (2003) Handovers between heterogeneous networks in pervasive systems. IEEE ICCT 2:1056\u20131059","journal-title":"IEEE ICCT"},{"key":"328_CR34","doi-asserted-by":"crossref","unstructured":"Dhar J, Kiran SR, Reddy KY (2007) Network selection in heterogeneous wireless environment: a ranking algorithm. WCNC, pp 41\u201344","DOI":"10.1109\/WCSN.2007.4475744"},{"key":"328_CR35","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/MNET.2007.314536","volume":"21","author":"F Bari","year":"2007","unstructured":"Bari F, Leung Victor CM (2007) Automated network selection in a heterogeneous wireless network environment. IEEE Netw 21:34\u201340","journal-title":"IEEE Netw"},{"key":"328_CR36","doi-asserted-by":"crossref","unstructured":"Jahanshahloo GR, Hosseinzadeh Lotfi F, Izadikhah M (2006) An algorithmic method to extend TOPSIS for decision-making problems with interval data. Applied mathematics and computation, pp 1375\u20131384","DOI":"10.1016\/j.amc.2005.08.048"},{"key":"328_CR37","unstructured":"Simple Service Discovery Protocol (SSDP), retrieved from ftp:\/\/ftp.pwg.org\/pub\/pwg\/ipp\/new_SSDP\/draft-cai-ssdp-v1-03.txt"},{"key":"328_CR38","unstructured":"SOAP version 1.2, retrieved from http:\/\/www.w3.org\/TR\/soap\/"},{"key":"328_CR39","unstructured":"General Event Notification Architecture (GENA), retrieved from http:\/\/tools.ietf.org\/html\/draft-cohen-gena-p-base-01"},{"key":"328_CR40","unstructured":"CyberLink UPnP Library, retrieved from http:\/\/www.cybergarage.org\/net\/upnp\/java\/index.html"},{"key":"328_CR41","doi-asserted-by":"crossref","first-page":"537","DOI":"10.1109\/TMC.2005.74","volume":"4","author":"N Samaan","year":"2005","unstructured":"Samaan N, Karmouch A (2005) A mobility prediction architecture based on contextual knowledge and spatial conceptual maps. IEEE Trans Mob Comput 4:537\u2013551","journal-title":"IEEE Trans Mob Comput"},{"key":"328_CR42","doi-asserted-by":"crossref","unstructured":"Inagaki J, Haseyama M, Kitajima H (1999) A genetic algorithm for determining multiple routes and its applications. IEEE International symposium (ISCAS), pp 137\u2013140","DOI":"10.1109\/ISCAS.1999.780114"},{"key":"328_CR43","unstructured":"Poon WT, Chan E (2000) Traffic management in wireless ATM network using a hierarchical neural-network based predication algorithm. Computers and their applications, New Orleans, pp 5\u20138"},{"key":"328_CR44","first-page":"45","volume":"10","author":"\u00d6 Yeniay","year":"2005","unstructured":"Yeniay \u00d6 (2005) Penalty function methods for constrained optimization with genetic algorithms. J Math Comput Appl 10:45\u201356","journal-title":"J Math Comput Appl"},{"key":"328_CR45","doi-asserted-by":"crossref","unstructured":"Wan TR, Chen H, Earnshaw R (2003) Real-time path planning for navigation in unknown environment. Theory and practice of computer graphics, pp 138\u2013145","DOI":"10.1109\/TPCG.2003.1206941"},{"key":"328_CR46","first-page":"658","volume":"20","author":"SH Fang","year":"2008","unstructured":"Fang SH, Lin TN, Lin PC (2008) Location fingerprinting in a decorrelated space. IEEE Trans Knowl Data Eng 20:658\u2013691","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"328_CR47","unstructured":"Goldberg DE, Deb K (1991) A comparative analysis of selection schemes used in genetic algorithms. Foundation of genetic algorithms, pp 69\u201393"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-010-0328-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00779-010-0328-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-010-0328-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T23:31:07Z","timestamp":1559431867000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00779-010-0328-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,8,17]]},"references-count":47,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2011,3]]}},"alternative-id":["328"],"URL":"https:\/\/doi.org\/10.1007\/s00779-010-0328-2","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"value":"1617-4909","type":"print"},{"value":"1617-4917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,8,17]]}}}