{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:25:21Z","timestamp":1729664721064,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1109\/cts.2015.7210461","type":"proceedings-article","created":{"date-parts":[[2015,8,20]],"date-time":"2015-08-20T17:46:15Z","timestamp":1440092775000},"page":"426-433","source":"Crossref","is-referenced-by-count":1,"title":["A collaborative healthcare application based on opportunistic resource utilization networks with OVM primitives"],"prefix":"10.1109","author":[{"given":"Mai A.","family":"Alduailij","sequence":"first","affiliation":[]},{"given":"Leszek T.","family":"Lilien","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","first-page":"7","article-title":"A Comparison of Model View Controller and Model View Presenter","volume":"25","author":"qureshi","year":"2013","journal-title":"For Sci Int"},{"year":"0","journal-title":"PC Magazine","article-title":"Network control center definition","key":"ref10"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1007\/978-3-319-06704-9_9","article-title":"Ambient assisted living tools for a sustainable aging society","author":"bleda","year":"2014","journal-title":"Modeling and Optimization in Science and Technologies"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/TPDS.2012.146"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1145\/1839294.1839361"},{"year":"2004","author":"abbas","article-title":"Grid Computing: A Practical Guide to Technology and Applications","key":"ref14"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.4018\/978-1-59140-429-3"},{"year":"2007","article-title":"Self-Organizing Neighborhood Wireless Mesh Networks","key":"ref16"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1145\/643603.643618"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/35.925687"},{"year":"2003","author":"cerf","article-title":"Delay-Tolerant Network Architecture","key":"ref19"},{"year":"2014","article-title":"Android Emulator","key":"ref28"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/MCOM.2006.248176"},{"year":"2014","article-title":"TinyOs","key":"ref27"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1016\/j.compeleceng.2009.03.010"},{"key":"ref6","first-page":"150","article-title":"The MicroOppnet tool for collaborative computing experiments with class 2 opportunistic networks","author":"kamal","year":"2007","journal-title":"Collaborative Computing Networking Appl and Worksharing Conf"},{"year":"2014","author":"koster","article-title":"Data models for the Internet of Things","key":"ref29"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1145\/1080139.1080140"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/DEXA.2006.107"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"588","DOI":"10.1109\/PCCC.2007.358946","article-title":"Opportunistic networks for emergency applications and their standard implementation framework","author":"lilien","year":"2007","journal-title":"IEEE Intl Performance Computing and Communications Conf (IPCCC 2007)"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1016\/j.jnca.2013.05.003"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/MCOM.2005.1470824"},{"key":"ref1","first-page":"131","article-title":"Opportunistic networks: the concept and research challenges in privacy and security","author":"lilien","year":"2006","journal-title":"Intl Workshop on Research Challenges in Security and Privacy for Mobile and Wireless Networks (WSPWN 2006)"},{"year":"2012","author":"hersent","article-title":"The Internet of Things: Key Applications and Protocols","key":"ref20"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1145\/2490428.2490439"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/MC.2013.74"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1145\/1500412.1500490"},{"key":"ref23","first-page":"349","article-title":"New UMA paradigm: Class 2 opportunistic networks","author":"kamal","year":"2008","journal-title":"Unlicensed Mobile Access Technology Protocols Architectures Security Standards and Applications"},{"year":"2014","article-title":"Instant Contiki","key":"ref26"},{"year":"1996","journal-title":"ISO ISO\/IEC 10181-2","article-title":"Information technology - Open Systems Interconnection - Security frameworks for open systems: Authentication framework - Part 2","key":"ref25"}],"event":{"name":"2015 International Conference on Collaboration Technologies and Systems (CTS)","start":{"date-parts":[[2015,6,1]]},"location":"Atlanta, GA, USA","end":{"date-parts":[[2015,6,5]]}},"container-title":["2015 International Conference on Collaboration Technologies and Systems (CTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7169724\/7210375\/07210461.pdf?arnumber=7210461","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T14:01:30Z","timestamp":1498226490000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7210461\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/cts.2015.7210461","relation":{},"subject":[],"published":{"date-parts":[[2015,6]]}}}