{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T09:47:38Z","timestamp":1725443258009},"reference-count":42,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1109\/mcsa.2003.1240768","type":"proceedings-article","created":{"date-parts":[[2004,3,2]],"date-time":"2004-03-02T02:26:50Z","timestamp":1078194410000},"page":"66-76","source":"Crossref","is-referenced-by-count":0,"title":["Application management techniques for the Bifrost system"],"prefix":"10.1109","author":[{"family":"Avneesh Bhatnagar","sequence":"first","affiliation":[]},{"family":"Speight","sequence":"additional","affiliation":[]},{"family":"Crawl","sequence":"additional","affiliation":[]},{"family":"Dunn","sequence":"additional","affiliation":[]},{"family":"Bennett","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Computer Networks","year":"1996","author":"tanenbaum","key":"ref39"},{"key":"ref38","article-title":"An Overview of the NOMADS Mobile Agent System","author":"suri","year":"2000","journal-title":"Proceedings of the European Conference on Object-Oriented Programming"},{"year":"0","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/268998.266708"},{"key":"ref31","doi-asserted-by":"crossref","DOI":"10.1145\/263105.263140","article-title":"Trace-based Mobile Network Emulation","author":"noble","year":"1997","journal-title":"Proceedings of ACM SIGCOMM"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1142\/S0218194001000438"},{"year":"0","key":"ref37"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/32.950315"},{"key":"ref35","article-title":"Efficient User Level Thread Migration and Checkpointing on Windows NT Clusters","author":"abdel-shafi","year":"1999","journal-title":"Proceedings of the 3rd Usenix Windows NT Sym-posium"},{"journal-title":"Programming Applications for Microsoft Windows","year":"1999","author":"richter","key":"ref34"},{"key":"ref10","first-page":"698","article-title":"The Paradoxical Success of Fuzzy Logic","author":"elkan","year":"1993","journal-title":"Proceedings of the Eleventh National Conference on Artificial Intel-ligence"},{"journal-title":"Learning DCOM","year":"1999","author":"thai","key":"ref40"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/HOTOS.2001.990062"},{"key":"ref12","article-title":"Agent TCL","author":"gray","year":"1995","journal-title":"Alpha Release 1 1"},{"key":"ref13","article-title":"PARO: Conserving Transmission Power in Wireless Ad-hoc Networks","author":"gomez","year":"2001","journal-title":"Proceedings of the IEEE 9th International Conference on Network Protocols (ICNP'01)"},{"journal-title":"Automatic distributed partitioning of component-based applications","year":"1998","author":"hunt","key":"ref14"},{"key":"ref15","article-title":"Detours: Binary Interception of Win32 Functions","author":"hunt","year":"1999","journal-title":"Proceedings of the 3rd USENIX Windows NT Symposium"},{"journal-title":"The tcpdump manual page","year":"0","author":"jackobson","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/236387.236420"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-0114(96)00392-2"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/268998.266706"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SAINT.2002.994460"},{"year":"0","key":"ref28"},{"key":"ref3","article-title":"Measuring Web Performance in the Wide-Area","author":"barford","year":"1999","journal-title":"IMA &#x201C;HOT TOPICS&#x201D; Workshop Scaling Phenomena in Communications Networks"},{"journal-title":"Search Profiling Windows NT services (Q117681)","year":"0","key":"ref27"},{"journal-title":"Adaptive Component Management in the Bifrost System","year":"2002","author":"bhatnagar","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.1999.773061"},{"journal-title":"Ping Documentation","year":"0","author":"muus","key":"ref29"},{"journal-title":"Neural Networks and Fuzzy Systems","year":"1992","author":"cosco","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/4236.935183"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/FTDCS.2001.969628"},{"article-title":"What is Reflective Middleware?","year":"0","author":"coulson","key":"ref9"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1007\/3-540-62852-5_10","article-title":"Sumatra: A Language for Resource-Aware Mobile Programs","author":"acharya","year":"1997","journal-title":"Mobile Object Systems Lecture Notes in Computer Science"},{"key":"ref20","article-title":"Puppeteer: Component-based Adaptation for Mobile Computing","author":"de lara","year":"2001","journal-title":"Proceedings of the 3rd USENIX Symposium on Internet Technologies and Systems"},{"year":"0","key":"ref22"},{"key":"ref21","doi-asserted-by":"crossref","DOI":"10.1145\/248157.248177","article-title":"Adaptive Resource Management Algorithms for Indoor Mobile Computing Environments","author":"lu","year":"1996","journal-title":"Proceedings of the SIGCOMM"},{"article-title":"Under the hood: Architecture of Aglets","year":"1997","author":"venners","key":"ref42"},{"year":"0","key":"ref24"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/35.925682"},{"year":"0","key":"ref23"},{"year":"0","key":"ref26"},{"year":"0","key":"ref25"}],"event":{"name":"Proceedings DARPA Information Survivability Conference and Exposition MCSA-03","start":{"date-parts":[[2003,10,10]]},"location":"Monterey, CA, USA","end":{"date-parts":[[2003,10,10]]}},"container-title":["Proceedings DARPA Information Survivability Conference and Exposition MCSA-03"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8785\/27816\/01240768.pdf?arnumber=1240768","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T04:05:30Z","timestamp":1497585930000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1240768\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/mcsa.2003.1240768","relation":{},"subject":[],"published":{"date-parts":[[2003]]}}}