{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T05:47:11Z","timestamp":1744177631535},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2014,10,4]],"date-time":"2014-10-04T00:00:00Z","timestamp":1412380800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Telecommun Syst"],"published-print":{"date-parts":[[2015,3]]},"DOI":"10.1007\/s11235-014-9869-4","type":"journal-article","created":{"date-parts":[[2014,10,3]],"date-time":"2014-10-03T15:54:12Z","timestamp":1412351652000},"page":"233-241","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["RFID-based mobility for seamless personal communication system in cloud computing"],"prefix":"10.1007","volume":"58","author":[{"given":"Yi-Wei","family":"Ma","sequence":"first","affiliation":[]},{"given":"Wei-Ting","family":"Cho","sequence":"additional","affiliation":[]},{"given":"Jiann-Liang","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yueh-Min","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Rongbo","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,4]]},"reference":[{"issue":"2\u20133","key":"9869_CR1","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1007\/s11235-009-9240-3","volume":"45","author":"A Ahmed","year":"2010","unstructured":"Ahmed, A., & Zhang, N. (2010). Towards the realisation of context-risk-aware access control in pervasive computing. Telecommunication Systems, 45(2\u20133), 127\u2013137.","journal-title":"Telecommunication Systems"},{"key":"9869_CR2","doi-asserted-by":"crossref","unstructured":"Bessler, S., Nisanyan, A., Peterbauer, K., Pailer, R., & Stadler, J. (2000). A service platform for internet-telecom services using sip. In IFIP conference on Intelligence in Networks.","DOI":"10.1007\/978-0-387-35522-1_4"},{"key":"9869_CR3","unstructured":"Boukhatem, N., & Tran, P. (2008). Ip-based RFID architecture and location management. In Software, Telecommunications and Computer Networks."},{"key":"9869_CR4","unstructured":"Chung, H., & Wu, Q. (2012). Managing heterogeneous wireless sensor networks with the session initiation protocol (sip). In International Conference on Advanced Communication Technology (pp. 1042\u20131045)."},{"issue":"3\u20134","key":"9869_CR5","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1007\/s11235-010-9341-z","volume":"48","author":"K Gierlowski","year":"2011","unstructured":"Gierlowski, K., Kostuch, A., Wozniak, J., & Nowicki, K. (2011). Testbed analysis of video and voip transmission performance in ieee 802.11 b\/g\/n networks. Telecommunication Systems, 48(3\u20134), 247\u2013260.","journal-title":"Telecommunication Systems"},{"key":"9869_CR6","volume-title":"RFID toys: 11 cool projects for home, office and entertainment","author":"A Graafstra","year":"2006","unstructured":"Graafstra, A. (2006). RFID toys: 11 cool projects for home, office and entertainment. Chichester: Wiley."},{"key":"9869_CR7","doi-asserted-by":"crossref","unstructured":"Guinard, D., Trifa, V., Mattern, F., & Wilde, E. (2011). From the internet of things to the web of things: Resource-oriented architecture and best practices. Telecommunication Systems pp. 97\u2013129.","DOI":"10.1007\/978-3-642-19157-2_5"},{"key":"9869_CR8","doi-asserted-by":"crossref","unstructured":"Handley, M., ACIRI, H., Schulzrinne, C., Schooler, E., Tech, C., & Rosenberg, J. (1999). Sip: Session initiation protocol.","DOI":"10.17487\/rfc2543"},{"key":"9869_CR9","doi-asserted-by":"crossref","unstructured":"Houngue, P., Damiani, E., & Glitho, R. (2011). Overcoming nat traversal issue for sip-based communication in p2p networks. In Wireless and Mobile Networking Conference (pp. 1\u20138).","DOI":"10.1109\/WMNC.2011.6097262"},{"key":"9869_CR10","doi-asserted-by":"crossref","unstructured":"Howie, D., Harjula, E., Ala-Kurikka, J., & Ylianttila, M. (2005). Harnessing sip for autonomous mobile peer-to-peer networking. In Global Telecommunications Conference.","DOI":"10.1109\/GLOCOM.2005.1577764"},{"key":"9869_CR11","doi-asserted-by":"crossref","unstructured":"Hu, J., Deng, J., & Wu, J. (2011). A green private cloud architecture with global collaboration. Telecommunication Systems pp. 1\u201311.","DOI":"10.1007\/s11235-011-9639-5"},{"key":"9869_CR12","doi-asserted-by":"crossref","unstructured":"Jia, X., Feng, Q., Fan, T., & Lei, Q. (2012). Rfid technology and its applications in internet of things (iot). In International Conference on Consumer Electronics, Communications and Networks (pp. 1282\u20131285).","DOI":"10.1109\/CECNet.2012.6201508"},{"issue":"5","key":"9869_CR13","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/MITP.2010.128","volume":"12","author":"K Khan","year":"2010","unstructured":"Khan, K., & Malluhi, Q. (2010). Establishing trust in cloud computing. IT Professional, 12(5), 20\u201327.","journal-title":"IT Professional"},{"key":"9869_CR14","unstructured":"Li, W. (2003). A service oriented sip infrastructure for adaptive and context-aware wireless services. In IEEE International Multitopic Conference."},{"issue":"3","key":"9869_CR15","doi-asserted-by":"crossref","first-page":"1308","DOI":"10.1109\/TCE.2009.5277993","volume":"55","author":"J Liao","year":"2009","unstructured":"Liao, J., Qi, Q., Li, T., Cao, Y., & Zhu, X. (2009). A demand-driven parsing method for sip offload in home network. IEEE Transactions on Consumer Electronics, 55(3), 1308\u20131314.","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"9869_CR16","doi-asserted-by":"crossref","unstructured":"Liu, Y., & Qiu, Y. (2012). An indoor localization of uhf rfid using a hybrid approach. In International Conference on Consumer Electronics, Communications and Networks (pp. 1653\u20131656).","DOI":"10.1109\/CECNet.2012.6201426"},{"key":"9869_CR17","doi-asserted-by":"crossref","unstructured":"Okugawa, T., Masutani, H., & Yoda, I. (2005). A home network service environment for wide-area communications. In Asia-Pacific Conference on Communications.","DOI":"10.1109\/APCC.2005.1554009"},{"key":"9869_CR18","doi-asserted-by":"crossref","unstructured":"Rosenberg, J., dynamicsoft, Schulzrinne, H., C. U., Camarillo, G., Ericsson, Johnston, A., WorldCom, Peterson, J., Neustar, Sparks, R., dynamicsoft, Handley, M., ICIRE, Schooler, and AT&T. Sip: Session initiation protocol 2002.","DOI":"10.17487\/rfc3261"},{"key":"9869_CR19","doi-asserted-by":"crossref","unstructured":"Ye, Y., Jain, N., Xia, L., Joshi, S., Yen, I., Bastani, F., Cureton, K., & Bowler, M. (2010). A framework for qos and power management in a service cloud environment with mobile devices. In IEEE International Symposium on Service Oriented System Engineering (pp. 236\u2013243).","DOI":"10.1109\/SOSE.2010.53"},{"issue":"2","key":"9869_CR20","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1016\/j.future.2009.08.005","volume":"26","author":"D Zhang","year":"2010","unstructured":"Zhang, D., Guo, M., Zhou, J., Kang, D., & Cao, J. (2010). Context reasoning using extended evidence theory in pervasive computing environments. Future Generation Computer Systems, 26(2), 207\u2013216.","journal-title":"Future Generation Computer Systems"},{"issue":"2","key":"9869_CR21","first-page":"547","volume":"6","author":"D Zhang","year":"2012","unstructured":"Zhang, D., Wan, J., Liu, Q., Guan, X., & Liang, X. (2012). A taxonomy of agent technologies for ubiquitous computing environments. KSII Transactions on Internet and Information Systems, 6(2), 547\u2013565.","journal-title":"KSII Transactions on Internet and Information Systems"},{"issue":"4","key":"9869_CR22","doi-asserted-by":"crossref","first-page":"558","DOI":"10.1109\/TPDS.2010.118","volume":"22","author":"D Zhang","year":"2011","unstructured":"Zhang, D., Zhou, J., Guo, M., Cao, J., & Li, T. (2011). Tasa: Tag-free activity sensing using rfid tag arrays. IEEE Transactions on Parallel and Distributed Systems, 22(4), 558\u2013570.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"9869_CR23","doi-asserted-by":"crossref","unstructured":"Zhang, S., Zhang, S., Chen, X., & Wu, S. (2010). Analysis and research of cloud computing system instance. In the Second International Conference on Future Networks (pp. 88\u201392).","DOI":"10.1109\/ICFN.2010.60"},{"key":"9869_CR24","doi-asserted-by":"crossref","unstructured":"Zhou, L. (2011). Green service over internet of things: A theoretical analysis paradigm. Telecommunication Systems (pp. 1\u201312).","DOI":"10.1007\/s11235-011-9638-6"}],"container-title":["Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-014-9869-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11235-014-9869-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-014-9869-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,15]],"date-time":"2019-08-15T20:15:15Z","timestamp":1565900115000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11235-014-9869-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10,4]]},"references-count":24,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,3]]}},"alternative-id":["9869"],"URL":"https:\/\/doi.org\/10.1007\/s11235-014-9869-4","relation":{},"ISSN":["1018-4864","1572-9451"],"issn-type":[{"value":"1018-4864","type":"print"},{"value":"1572-9451","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,10,4]]}}}