{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T05:49:37Z","timestamp":1726033777616},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030242084"},{"type":"electronic","value":"9783030242091"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24209-1_15","type":"book-chapter","created":{"date-parts":[[2019,6,25]],"date-time":"2019-06-25T13:49:13Z","timestamp":1561470553000},"page":"180-187","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Generating Real Context Data to Test User Dependent Systems - Application to Multi-agent Systems"],"prefix":"10.1007","author":[{"given":"Pedro","family":"Oliveira","sequence":"first","affiliation":[]},{"given":"Paulo","family":"Novais","sequence":"additional","affiliation":[]},{"given":"Paulo","family":"Matos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,26]]},"reference":[{"key":"15_CR1","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1007\/978-3-642-14478-3_42","volume-title":"Recent Trends in Network Security and Applications","author":"S Babar","year":"2010","unstructured":"Babar, S., Mahalle, P., Stango, A., Prasad, N., Prasad, R.: Proposed security model and threat taxonomy for the internet of things (IoT). In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds.) CNSA 2010. CCIS, vol. 89, pp. 420\u2013429. Springer, Heidelberg (2010). \n                      https:\/\/doi.org\/10.1007\/978-3-642-14478-3_42"},{"key":"15_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1007\/978-3-319-99927-2_5","volume-title":"Testing Software and Systems","author":"M C\u00e1rdenas","year":"2018","unstructured":"C\u00e1rdenas, M., Sanz, J.G., Pav\u00f3n, J.: Testing ambient assisted living solutions with simulations. In: Medina-Bulo, I., Merayo, M.G., Hierons, R. (eds.) ICTSS 2018. LNCS, vol. 11146, pp. 56\u201361. Springer, Cham (2018). \n                      https:\/\/doi.org\/10.1007\/978-3-319-99927-2_5"},{"issue":"4","key":"15_CR3","first-page":"450","volume":"35","author":"Yogendra P. Chaubey","year":"1993","unstructured":"Chaubey, Y.P.: Resampling-Based Multiple Testing: Examples and Methods for P-Value Adjustment (1993)","journal-title":"Technometrics"},{"issue":"3","key":"15_CR4","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1016\/j.enbuild.2008.09.008","volume":"41","author":"P Hoes","year":"2009","unstructured":"Hoes, P., Hensen, J., Loomans, M., De Vries, B., Bourgeois, D.: User behavior in whole building simulation. Energy Buildings 41(3), 295\u2013302 (2009)","journal-title":"Energy Buildings"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Khan, R., Khan, S.U., Zaheer, R., Khan, S.: Future internet: the internet of things architecture, possible applications and key challenges. In: 2012 10th International Conference on Frontiers of Information Technology (FIT), pp. 257\u2013260. IEEE (2012)","DOI":"10.1109\/FIT.2012.53"},{"key":"15_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-71887-3","volume-title":"Information Criteria and Statistical Modeling","author":"S Konishi","year":"2008","unstructured":"Konishi, S., Kitagawa, G.: Information Criteria and Statistical Modeling. Springer, New York (2008). \n                      https:\/\/doi.org\/10.1007\/978-0-387-71887-3"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Schilit, B., Adams, N., Want, R.: Context-aware computing applications. In: First Workshop on Mobile Computing Systems and Applications, WMCSA 1994, pp. 85\u201390. IEEE (1994)","DOI":"10.1109\/WMCSA.1994.16"},{"issue":"5","key":"15_CR8","doi-asserted-by":"publisher","first-page":"558","DOI":"10.1016\/j.pmcj.2009.06.003","volume":"5","author":"KIK Wang","year":"2009","unstructured":"Wang, K.I.K., Abdulla, W.H., Salcic, Z.: Ambient intelligence platform using multi-agent system and mobile ubiquitous hardware. Pervasive Mob. Comput. 5(5), 558\u2013573 (2009)","journal-title":"Pervasive Mob. Comput."},{"key":"15_CR9","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1016\/j.enbuild.2015.08.032","volume":"107","author":"D Yan","year":"2015","unstructured":"Yan, D., et al.: Occupant behavior modeling for building performance simulation: current state and future challenges. Energy Buildings 107, 264\u2013278 (2015)","journal-title":"Energy Buildings"},{"key":"15_CR10","unstructured":"Zimmerman, G.: Modeling and simulation of individual user behavior for building performance predictions. In: Proceedings of the 2007 Summer Computer Simulation Conference, pp. 913\u2013920. Society for Computer Simulation International (2007)"}],"container-title":["Lecture Notes in Computer Science","Advances in Practical Applications of Survivable Agents and Multi-Agent Systems: The PAAMS Collection"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24209-1_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,25]],"date-time":"2019-06-25T13:52:05Z","timestamp":1561470725000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24209-1_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030242084","9783030242091"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24209-1_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"26 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PAAMS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Practical Applications of Agents and Multi-Agent Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"\u00c1vila","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 June 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 June 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"paams2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.paams.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}