{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T02:40:08Z","timestamp":1729651208586,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,1]]},"DOI":"10.1109\/ccnc.2018.8319240","type":"proceedings-article","created":{"date-parts":[[2018,3,19]],"date-time":"2018-03-19T22:10:21Z","timestamp":1521497421000},"page":"1-5","source":"Crossref","is-referenced-by-count":2,"title":["Tacit computing and its application for open IoT era"],"prefix":"10.1109","author":[{"given":"Misao","family":"Kataoka","sequence":"first","affiliation":[]},{"given":"Naoto","family":"Hosikawa","sequence":"additional","affiliation":[]},{"given":"Hirofumi","family":"Noguchi","sequence":"additional","affiliation":[]},{"given":"Tatsuya","family":"Demizu","sequence":"additional","affiliation":[]},{"given":"Yoji","family":"Yamato","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"24","article-title":"Tacit Computing","volume":"54","author":"sasaki","year":"2017","journal-title":"Business Communication"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2016.7845394"},{"journal-title":"NTT R&D Forum 2017 website","year":"0","key":"ref12"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1109\/MC.2006.55","article-title":"Distributed embedded smart cameras for surveillance applications","volume":"39","author":"michael","year":"2006","journal-title":"Computer"},{"journal-title":"white paper Cisco Internet Business Solutions Group (IBSG)","year":"2011","author":"evans","key":"ref4"},{"key":"ref3","first-page":"102252i","article-title":"Analyzing machine noise for real time maintenance","author":"yamato","year":"2016","journal-title":"Eighth International Conference on Graphic and Image Processing"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"414","DOI":"10.1109\/SURV.2013.042313.00197","article-title":"Context aware computing for the internet of things: A survey","volume":"16","author":"charith","year":"2014","journal-title":"IEEE Communications Surveys & Tutorials"},{"journal-title":"IDC Digital Universe Study Big Data Bigger Digital Shadows and Biggest Growth in the Far East","year":"2012","key":"ref5"},{"year":"0","key":"ref8"},{"journal-title":"Amazon Kinesis","year":"0","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1002\/tee.22427"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.2197\/ipsjjip.25.317"},{"key":"ref9","first-page":"13","article-title":"Fog Computing and Its Role in the Internet of Things Characterization of Fog Computing","author":"bonomi","year":"2012","journal-title":"the rst edition of the MCC workshop on Mobile cloud computing"}],"event":{"name":"2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC)","start":{"date-parts":[[2018,1,12]]},"location":"Las Vegas, NV","end":{"date-parts":[[2018,1,15]]}},"container-title":["2018 15th IEEE Annual Consumer Communications &amp; Networking Conference (CCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8314843\/8319155\/08319240.pdf?arnumber=8319240","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,13]],"date-time":"2019-10-13T04:11:42Z","timestamp":1570939902000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8319240\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/ccnc.2018.8319240","relation":{},"subject":[],"published":{"date-parts":[[2018,1]]}}}