{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,14]],"date-time":"2024-12-14T05:20:10Z","timestamp":1734153610854,"version":"3.30.2"},"reference-count":14,"publisher":"Elsevier BV","issue":"1-6","license":[{"start":{"date-parts":[[2000,6,1]],"date-time":"2000-06-01T00:00:00Z","timestamp":959817600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2000,6]]},"DOI":"10.1016\/s1389-1286(00)00079-7","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T09:56:52Z","timestamp":1027591012000},"page":"619-631","source":"Crossref","is-referenced-by-count":1,"title":["Running the Web backwards: appliance data services"],"prefix":"10.1016","volume":"33","author":[{"given":"Andrew C","family":"Huang","sequence":"first","affiliation":[]},{"given":"Benjamin C","family":"Ling","sequence":"additional","affiliation":[]},{"given":"John J","family":"Barton","sequence":"additional","affiliation":[]},{"given":"Armando","family":"Fox","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S1389-1286(00)00079-7_BIB1","unstructured":"K. Arnold, B. O'Sullivan, R.W. Scheifler, J. Waldo and A. Wollrath, The Jini Specification, Addison-Wesley, Reading, MA, 1999."},{"key":"10.1016\/S1389-1286(00)00079-7_BIB2","unstructured":"ChaiServer system described on http:\/\/www.chai.hp.com."},{"key":"10.1016\/S1389-1286(00)00079-7_BIB3","doi-asserted-by":"crossref","unstructured":"A. Fox, S.D. Gribble, Y. Chawathe and E.A. Brewer, Adapting to network and client variation using active proxies: lessons and perspectives, IEEE Personal Communications (invited submission), Aug. 1998, Special Issue on Adapting to Network and Client Variability.","DOI":"10.1109\/98.709365"},{"key":"10.1016\/S1389-1286(00)00079-7_BIB4","doi-asserted-by":"crossref","unstructured":"A. Fox, S.D. Gribble, Y. Chawathe, E.A. Brewer and P. Gauthier, Cluster-based scalable network services, in: Proc. of the 16th ACM Symposium on Operating Systems Principles (SOSP-16), St. Malo, October 1997.","DOI":"10.1145\/268998.266662"},{"key":"10.1016\/S1389-1286(00)00079-7_BIB5","doi-asserted-by":"crossref","unstructured":"A. Fox, I. Goldberg, S.D. Gribble, A. Polito and D.C. Lee, Experience with Top Gun Wingman: a proxy-based graphical web browser for the Palm Pilot PDA, in: IFIP International Conference on Distributed Systems Platforms and Open Distributed Processing (Middleware \u201998), Lake District, UK, September 15\u201318, 1998.","DOI":"10.1007\/978-1-4471-1283-9_25"},{"key":"10.1016\/S1389-1286(00)00079-7_BIB6","unstructured":"S.D. Gribble, M. Welsh, E.A. Brewer and D.E. Culler, The NINJA project pages, January 1999, http:\/\/ninja.cs.berkeley.edu."},{"key":"10.1016\/S1389-1286(00)00079-7_BIB7","unstructured":"R.H. Katz and E.A. Brewer et al., The bay area research wireless access network (barwan), in: Proc. Spring COMPCON Conference 1996."},{"key":"10.1016\/S1389-1286(00)00079-7_BIB8","unstructured":"Metricom Corp., Ricochet Wireless Modem, 1995, http:\/\/www.ricochet.net."},{"key":"10.1016\/S1389-1286(00)00079-7_BIB9","unstructured":"ProxiNet, Inc., ProxiWeb Thin Client Web Browser, 1997, http:\/\/www.proxinet.com."},{"key":"10.1016\/S1389-1286(00)00079-7_BIB10","unstructured":"See product information for the Kodak DC265 camera on http:\/\/www.kodak.com."},{"key":"10.1016\/S1389-1286(00)00079-7_BIB11","unstructured":"WAP Forum, Wireless application protocol (WAP) forum, http:\/\/www.wapforum.org."},{"key":"10.1016\/S1389-1286(00)00079-7_BIB12","unstructured":"The JetSend communication protocol is described on http:\/\/www.jetsend.hp.com."},{"key":"10.1016\/S1389-1286(00)00079-7_BIB13","unstructured":"http:\/\/www.irda.org\/."},{"key":"10.1016\/S1389-1286(00)00079-7_BIB14","unstructured":"For example, see the Intellisync software at http:\/\/www.pumatech.com\/intellisync.html."}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128600000797?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128600000797?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T10:22:46Z","timestamp":1564654966000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128600000797"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000,6]]},"references-count":14,"journal-issue":{"issue":"1-6","published-print":{"date-parts":[[2000,6]]}},"alternative-id":["S1389128600000797"],"URL":"https:\/\/doi.org\/10.1016\/s1389-1286(00)00079-7","relation":{},"ISSN":["1389-1286"],"issn-type":[{"type":"print","value":"1389-1286"}],"subject":[],"published":{"date-parts":[[2000,6]]}}}