{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,8,23]],"date-time":"2023-08-23T05:11:06Z","timestamp":1692767466061},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2007,7,7]],"date-time":"2007-07-07T00:00:00Z","timestamp":1183766400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2008,10]]},"DOI":"10.1007\/s11276-007-0044-7","type":"journal-article","created":{"date-parts":[[2007,7,16]],"date-time":"2007-07-16T22:42:33Z","timestamp":1184625753000},"page":"699-713","source":"Crossref","is-referenced-by-count":8,"title":["Modelling user preferences and configuring services in B3G devices"],"prefix":"10.1007","volume":"14","author":[{"given":"Konstantinos P.","family":"Demestichas","sequence":"first","affiliation":[]},{"given":"Artemis A.","family":"Koutsorodi","sequence":"additional","affiliation":[]},{"given":"Evgenia F.","family":"Adamopoulou","sequence":"additional","affiliation":[]},{"given":"Michael E.","family":"Theologou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2007,7,7]]},"reference":[{"issue":"6","key":"44_CR1","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1109\/2.846322","volume":"33","author":"U. Varshney","year":"2000","unstructured":"Varshney, U. (2000). Recent advances in wireless networking. IEEE Computer, 33(6),100\u2013103.","journal-title":"IEEE Computer"},{"issue":"1","key":"44_CR2","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1109\/MWC.2003.1182111","volume":"10","author":"E. Gustafsson","year":"2003","unstructured":"Gustafsson, E., & Jonsson, A. (2003). Always best connected. IEEE Wireless Communications, 10(1), 49\u201355.","journal-title":"IEEE Wireless Communications"},{"issue":"5","key":"44_CR3","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1109\/98.960335","volume":"8","author":"M. Frodigh","year":"2001","unstructured":"Frodigh, M., Parkvall, S., Roobol, C., Johansson, P., & Larsson, P. (2001). Future-generation wireless networks. IEEE Personal Communications, 8(5), 10\u201317.","journal-title":"IEEE Personal Communications"},{"issue":"4","key":"44_CR4","first-page":"69","volume":"33","author":"P. Demestichas","year":"2003","unstructured":"Demestichas, P., Stavroulaki, V., Papadopoulou, L., Vasilakos, A., & Theologou, M. (2003). Service configuration and traffic distribution in composite radio environments. IEEE Transactions on Systems, Man and Cybernetics Journal, 33(4), 69\u201381.","journal-title":"IEEE Transactions on Systems, Man and Cybernetics Journal"},{"key":"44_CR5","unstructured":"Chantrain, D., Handekyn K., & Vanderstraeten, H. (2000). The soft terminal: Extending service intelligence from the network to the terminal. Alcatel Telecommunications Review, 2nd Quarter."},{"key":"44_CR6","unstructured":"Busropan, B., van Loon, J., Vervuurt, F., & van Eijk, R. (2003). Access network selection in heterogeneous networks and the role of the operator. Presented at 9th WWRF Meeting in Zurich, Switzerland."},{"key":"44_CR7","unstructured":"IST Project E2R2, official web site, http:\/\/e2r2.motlabs.com"},{"key":"44_CR8","doi-asserted-by":"crossref","unstructured":"Weiser, M. (1991). The computer for the 21st century. Scientific American, 265(3), 94\u2013104, September 1991; reprinted in: IEEE Pervasive Computing, Jan.\u2013Mar. 2002, pp. 19\u201325.","DOI":"10.1038\/scientificamerican0991-94"},{"key":"44_CR9","doi-asserted-by":"crossref","unstructured":"Pascoe, J., Ryan, N., & Morse, D. (1999). Issues in developing context-aware computing. In H.-W. Gellersen (Ed.), Handheld and ubiquitous computing, no. 1707 in Lecture Notes in Computer Science (pp. 208\u2013221). Springer-Verlag.","DOI":"10.1007\/3-540-48157-5_20"},{"key":"44_CR10","unstructured":"Homayounvala, E., Ghorashi, S. A., & Aghvami, A. H. (2004). A Bayesian approach to modelling user preferences for reconfiguration. Presented at E2R Workshop on Reconfigurable Mobile Systems and Networks Beyond 3G, Barcelona, Spain."},{"key":"44_CR11","unstructured":"Dillinger, M., Madani, K., & Alonistioti, N. (2003). Software defined radio: Architectures, systems and functions. John Wiley & Sons."},{"key":"44_CR12","unstructured":"IST Project SCOUT, official web site, http:\/\/www.ist-scout.org."},{"key":"44_CR13","doi-asserted-by":"crossref","unstructured":"Adamopoulou, E., Demestichas, K., Koutsorodi, A., & Theologou, M. (2005). Intelligent access selection in heterogeneous networks \u2013 simulation results (pp. 279\u2013283). In Proceedings of 2nd International Symposium on Wireless Communication Systems 2005 (ISWCS 2005), Sienna, Italy.","DOI":"10.1109\/ISWCS.2005.1547704"},{"key":"44_CR14","unstructured":"Koutsorodi, A., Adamopoulou, E., Demestichas, K., & Theologou, M. (2006). User profiling and preference modeling in 4G terminals (pp. 1\u20136). In Proceedings of 17th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Helsinki, Finland."},{"key":"44_CR15","unstructured":"M. Liebsch, A. Singh, H. Chaskar, D. Funato, & E. Shim (Eds.) (2005). The candidate access router discovery protocol. IETF RFC 4066."},{"key":"44_CR16","unstructured":"Perkins, C. (2002). IP Mobility Support for IPv4. IETF RFC 3220."},{"key":"44_CR17","doi-asserted-by":"crossref","unstructured":"Johnson, D. B. (2004). Mobility Support in IPv6. IETF RFC 3775.","DOI":"10.17487\/rfc3775"},{"key":"44_CR18","doi-asserted-by":"crossref","unstructured":"Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., & Schooler, E. (2002). SIP: Session Initiation Protocol. IETF RFC 3261.","DOI":"10.17487\/rfc3261"},{"key":"44_CR19","doi-asserted-by":"crossref","unstructured":"Ahlund, C., & Zaslavsky, A. (2003). Multihoming with Mobile IP. In Proceedings of 6th IEEE International Conference on High Speed Networks and Multimedia Communications. Springer-Verlag.","DOI":"10.1007\/978-3-540-45076-4_24"},{"issue":"8","key":"44_CR20","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1109\/MC.2002.1023793","volume":"35","author":"P. Demestichas","year":"2002","unstructured":"Demestichas, P., Papadopoulou, L., Stavroulaki, V., Theologou, M., Vivier, G., Martinez, G., & Galliano, F. (2002). Wireless beyond 3G: Managing services and network resources. IEEE Computer Magazine, 35(8), 80\u201382.","journal-title":"IEEE Computer Magazine"},{"key":"44_CR21","unstructured":"Pearl, J. (1988). Probabilistic reasoning in intelligent systems: Networks of plausible inference. Morgan Kauffman."},{"key":"44_CR22","doi-asserted-by":"crossref","unstructured":"Terziyan, V. (2005). A Bayesian Metanetwork. International Journal on Artificial Intelligence Tools, World Scientific, 14(3), 371\u2013384.","DOI":"10.1142\/S0218213005002156"},{"key":"44_CR23","unstructured":"Pham, D. T., & Karaboga, D. (2000). Intelligent optimisation techniques: Genetic algorithms, simulated annealing and neural networks. Springer."},{"key":"44_CR24","unstructured":"Papadimitriou, C., & Steiglitz, K. (1982). Combinatorial optimization: Algorithms and complexity. Prentice Hall."},{"key":"44_CR25","doi-asserted-by":"crossref","unstructured":"Chickering, D. M. (1996). Learning Bayesian networks is NP-complete. In D. Fischer & H.-J. Lenz (Eds.), Learning from data: Lecture notes in statistics (pp. 121\u2013130). Springer-Verlag.","DOI":"10.1007\/978-1-4612-2404-4_12"},{"key":"44_CR26","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1109\/69.494161","volume":"8","author":"W. Buntine","year":"1996","unstructured":"Buntine, W. (1996). A guide to the literature on learning probabilistic networks from data. IEEE Transactions on Knowledge and Data Engineering, 8, 195\u2013210.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"44_CR27","doi-asserted-by":"crossref","first-page":"415","DOI":"10.1162\/neco.1992.4.3.415","volume":"4","author":"D. MacKay","year":"1992","unstructured":"MacKay, D. (1992). Bayesian interpolation. Neural Computation, 4, 415\u2013447.","journal-title":"Neural Computation"},{"key":"44_CR28","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1016\/0893-6080(90)90049-Q","volume":"3","author":"D. Specht","year":"1990","unstructured":"Specht, D. (1990). Probabilistic neural networks. Neural Networks 3, 109\u2013118.","journal-title":"Neural Networks"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-007-0044-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11276-007-0044-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-007-0044-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T09:01:56Z","timestamp":1559379716000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11276-007-0044-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,7,7]]},"references-count":28,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2008,10]]}},"alternative-id":["44"],"URL":"https:\/\/doi.org\/10.1007\/s11276-007-0044-7","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,7,7]]}}}