{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T05:23:42Z","timestamp":1750397022660,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,3]]},"DOI":"10.1109\/percom.2016.7456512","type":"proceedings-article","created":{"date-parts":[[2016,4,21]],"date-time":"2016-04-21T16:20:04Z","timestamp":1461255604000},"page":"1-10","source":"Crossref","is-referenced-by-count":18,"title":["Chitchat: Navigating tradeoffs in device-to-device context sharing"],"prefix":"10.1109","author":[{"given":"Sungmin","family":"Cho","sequence":"first","affiliation":[]},{"given":"Christine","family":"Julien","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2013.6664481"},{"key":"ref11","article-title":"Towards a better understanding of context and context-awareness","author":"dey","year":"2000","journal-title":"Workshop on The What Who Where When and How of Context-Awareness in CHI'00"},{"key":"ref12","article-title":"Succinct data structures for retrieval and approximate membership","author":"dietzfelbinger","year":"2008","journal-title":"Proc of ICALP"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2009.5350367"},{"key":"ref14","first-page":"475","article-title":"Grapevine: Efficient situational awareness in pervasive computing environments","author":"fok","year":"2012","journal-title":"Proceedings of IEEE PERCOM Workshops"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2004.06.002"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.101"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s10606-007-9038-3"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21464-6_4"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/I-SPAN.2012.7"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"ref27","article-title":"Trust-based, privacy-preserving context aggregation and sharing in mobile ubiquitous computing","author":"xing","year":"2013","journal-title":"Proc of Mobiquitous"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2011.5766925"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87744-8_22"},{"key":"ref5","article-title":"An analysis of power consumption in a smartphone","author":"carroll","year":"2010","journal-title":"Proc of the USENIX Annual Technical Conf"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2004.1276865"},{"key":"ref7","article-title":"The Bloomier filter: an efficient data structure for static support lookup tables","author":"chazelle","year":"2004","journal-title":"Proc of SODA"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican0501-34"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1504\/IJAHUC.2007.014070"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MobileSoft.2015.18"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.SIMUTOOLS2009.5674"},{"key":"ref22","article-title":"Ontology development 101","author":"noy","year":"2008","journal-title":"Technical Report"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ISCIT.2009.5341003"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68642-2_23"},{"key":"ref23","first-page":"1","article-title":"Context representation and reasoning in pervasive computing: a review","volume":"4","author":"perttunen","year":"2009","journal-title":"Int'l J of Multimedia and Ubiquitous Comp"},{"journal-title":"Trepn Profiler","year":"0","key":"ref26"},{"key":"ref25","article-title":"Disseminate: A demonstration of device-to-device media dissemination","author":"srinivasan","year":"2015","journal-title":"Proc of PerCom (Demonstrations)"}],"event":{"name":"2016 IEEE International Conference on Pervasive Computing and Communications (PerCom)","start":{"date-parts":[[2016,3,14]]},"location":"Sydney, Australia","end":{"date-parts":[[2016,3,19]]}},"container-title":["2016 IEEE International Conference on Pervasive Computing and Communications (PerCom)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7452833\/7456493\/7456512.pdf?arnumber=7456512","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,29]],"date-time":"2016-09-29T11:53:47Z","timestamp":1475150027000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7456512\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/percom.2016.7456512","relation":{},"subject":[],"published":{"date-parts":[[2016,3]]}}}