{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,23]],"date-time":"2025-05-23T04:07:25Z","timestamp":1747973245509,"version":"3.41.0"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2000,12,1]],"date-time":"2000-12-01T00:00:00Z","timestamp":975628800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2000,12,1]],"date-time":"2000-12-01T00:00:00Z","timestamp":975628800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Mobile Networks and Applications"],"published-print":{"date-parts":[[2000,12]]},"DOI":"10.1023\/a:1019172931873","type":"journal-article","created":{"date-parts":[[2003,2,19]],"date-time":"2003-02-19T23:30:27Z","timestamp":1045697427000},"page":"243-258","source":"Crossref","is-referenced-by-count":17,"title":["The Satchel system architecture: Mobile access to documents and services"],"prefix":"10.1007","volume":"5","author":[{"given":"Mike","family":"Flynn","sequence":"first","affiliation":[]},{"given":"David","family":"Pendlebury","sequence":"additional","affiliation":[]},{"given":"Chris","family":"Jones","sequence":"additional","affiliation":[]},{"given":"Marge","family":"Eldridge","sequence":"additional","affiliation":[]},{"given":"Mik","family":"Lamming","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"329116_CR1","volume-title":"Proc. of the 7th ACM SIGOPS European Workshop","author":"A. Baggio","year":"1996","unstructured":"A. Baggio and I. Piumarta, Mobile host tracking and resource discovery, in: Proc. of the 7th ACM SIGOPS European Workshop, Connemara, Ireland (1996)."},{"key":"329116_CR2","doi-asserted-by":"crossref","unstructured":"T. Berners-Lee and D. Connolly, Hypertext Mark-up Language-2.0. RFC 1866 (November 1995).","DOI":"10.17487\/rfc1866"},{"key":"329116_CR3","doi-asserted-by":"crossref","unstructured":"T. Berners-Lee, R. Fielding and H. Frystyk, Hypertext Transfer Protocol-HTTP\/1.0. RFC 1945 (May 1996).","DOI":"10.17487\/rfc1945"},{"key":"329116_CR4","doi-asserted-by":"crossref","unstructured":"T. Berners-Lee, L. Masinter and M. McCahill, Uniform Resource Locators (URL), RFC 1738 (December 1994).","DOI":"10.17487\/rfc1738"},{"key":"329116_CR5","unstructured":"Bluetooth technology overview, 1998."},{"key":"329116_CR6","doi-asserted-by":"crossref","unstructured":"N. Borenstein and N. Freed, MIME (Multipurpose Internet Mail Extensions), Part 1: Mechanisms for specifying and describing the format of Internet message bodies, RFC 1521 (1993).","DOI":"10.17487\/rfc1521"},{"key":"329116_CR7","unstructured":"CGI: Common Gateway Interface. NCSA Software Development Group."},{"key":"329116_CR8","unstructured":"T. Dierks and C. Allen, The TLS Protocol, RFC 2246 (January 1999)."},{"key":"329116_CR9","unstructured":"C. Donnelly and R. Stallman, The Bison Manual: Using the YACC-compatible Parser Generator, Free Software Foundation; ISBN: 1882114450 (1995)."},{"key":"329116_CR10","volume-title":"Proc. of Middleware '98","author":"A. Fox","year":"1998","unstructured":"A. Fox, I. Goldberg, S.D. Gribble, D.C. Lee, A. Polito and E.A. Brewer, Experience with Top Gun Wingman: A proxy-based graphical Web browser for the 3Com PalmPilot, in: Proc. of Middleware '98, Lake District, England (September 1998)."},{"key":"329116_CR11","doi-asserted-by":"crossref","unstructured":"J. Franks, P. Hallam-Baker, J. Hostetler, P. Leach, A. Luotonen, E. Sink and L. Stewart, An extension to HTTP: Digest access authentication, RFC 2069 (January 1997).","DOI":"10.17487\/rfc2069"},{"key":"329116_CR12","unstructured":"A. Frier, P. Karlton and P. Kocher, The SSL 3.0 Protocol, Netscape Communications Corp. (November 1996)."},{"key":"329116_CR13","unstructured":"Handheld Device Markup Language specification, Unwired Planet, Inc., Redwood City, CA (1997)."},{"key":"329116_CR14","unstructured":"IrDA: Infra Red Data Association, Walnut Creek, California (1997)."},{"issue":"4","key":"329116_CR15","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1109\/4236.780965","volume":"3","author":"R. Khare","year":"1999","unstructured":"R. Khare, W* effect considered harmful, IEEE Internet Computing 3(4) (July\/August 1999) 89\u201392.","journal-title":"IEEE Internet Computing"},{"key":"329116_CR16","unstructured":"M. Lamming, M. Eldridge M. Flynn, C. Jones and D. Pendlebury, Satchel-providing access to any document, any time, anywhere, Transactions on Computer-Human Interaction, in press."},{"key":"329116_CR17","unstructured":"M.G. Lamming and M. Flynn, \u201cForget-me-Not\u201d: Intimate computing in support of human memory, in: FRIEND21 Symposium on Next Generation Human Interface, Tokyo, Japan (February 1994)."},{"key":"329116_CR18","unstructured":"J. McKeehan and N. Rhodes, Programming for the Newton, AP Professional, ISBN: 012484832X (1996)."},{"key":"329116_CR19","unstructured":"S. Putz, Design and implementation of the System 33 document service, Xerox Palo Alto Research Centre P93-00112 (1993)."},{"key":"329116_CR20","unstructured":"A. Ramanujapuram and P. Ram, Digital content and intellectual property rights, Dr. Dobb's Journal (December 1998)."},{"key":"329116_CR21","unstructured":"Research In Motion introduces wireless e-mail solution for Microsoft Exchange users, Press Release, Research In Motion Limited, Waterloo, ON, Canada (1999)."},{"key":"329116_CR22","doi-asserted-by":"crossref","unstructured":"A. Salomaa, Public-Key Cryptography (Springer, Berlin\/Heidelberg, ISBN: 3540613560, 1996).","DOI":"10.1007\/978-3-662-03269-5"},{"key":"329116_CR23","doi-asserted-by":"crossref","unstructured":"C. Tait, H. Lei, S. Acharya and H. Chang, Intelligent file hoarding for mobile computing, in: Proc. of the 1st ACM Conf. on Mobile Computing and Networking, Mobicom 95, Berkeley (1995) pp. 119-125.","DOI":"10.1145\/215530.215564"},{"key":"329116_CR24","unstructured":"D.B. Terry, K. Petersen, M.J. Spreitzer and M.M. Theimer, The case for non-transparent replication: Examples from Bayou, IEEE Data Engineering (December 1998) 12-20."},{"key":"329116_CR25","unstructured":"Universal Plug and Play initiative announcement, Press Release, Microsoft, Redmond, WA (1999)."},{"key":"329116_CR26","volume-title":"Jini architectural overview","author":"J. Waldo","year":"1999","unstructured":"J. Waldo, Jini architectural overview, Sun Microsystems, Palo Alto, CA (1999)."},{"issue":"6","key":"329116_CR27","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/98.475986","volume":"2","author":"R. Want","year":"1995","unstructured":"R. Want, W.N. Schilit, N.I. Adams, R. Gold, K. Petersen, D. Goldberg, J.R. Ellis and M. Weiser, An overview of the PARCTAB ubiquitous computing environment, IEEE Personal Communications 2(6) (December 1995) 28\u201343.","journal-title":"IEEE Personal Communications"},{"key":"329116_CR28","unstructured":"C. Weider and J. Reynolds, Executive introduction to directory services using the X.500 protocol, FYI 13, RFC 1308, ANS, ISI."},{"key":"329116_CR29","doi-asserted-by":"crossref","unstructured":"M. Weiser, The computer for the twenty-first century, Scientific American (September 1991) 94-100.","DOI":"10.1038\/scientificamerican0991-94"},{"key":"329116_CR30","unstructured":"Wireless Application Protocol architecture specification, Wireless Application Protocol Forum Ltd. (April 1998)."},{"key":"329116_CR31","unstructured":"WML: Wireless Markup Language, Wireless Application Protocol Forum Ltd. (April 1998)."}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1019172931873.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1019172931873\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1019172931873.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T09:14:12Z","timestamp":1747905252000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1019172931873"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000,12]]},"references-count":31,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2000,12]]}},"alternative-id":["329116"],"URL":"https:\/\/doi.org\/10.1023\/a:1019172931873","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"type":"print","value":"1383-469X"},{"type":"electronic","value":"1572-8153"}],"subject":[],"published":{"date-parts":[[2000,12]]}}}