{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:15:20Z","timestamp":1729660520443,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/perser.2005.1506401","type":"proceedings-article","created":{"date-parts":[[2005,9,12]],"date-time":"2005-09-12T11:19:24Z","timestamp":1126523964000},"page":"127-135","source":"Crossref","is-referenced-by-count":1,"title":["UbiTerm: a hand-held control-center for user's activity mohility"],"prefix":"10.1109","author":[{"given":"K.","family":"Leal","sequence":"first","affiliation":[]},{"given":"F.","family":"Ballesteros","sequence":"additional","affiliation":[]},{"given":"E.","family":"Soriano","sequence":"additional","affiliation":[]},{"given":"G.","family":"Guardiola","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/566726.566772"},{"key":"17","first-page":"2","article-title":"Plan 9 from bell labs","volume":"10","author":"pike","year":"1990","journal-title":"EUUG Newsletter"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/503376.503428"},{"journal-title":"Styx-on-a-Brick","year":"0","author":"locke","key":"15"},{"journal-title":"P U Manual","first-page":"9","year":"1995","key":"16"},{"key":"13","doi-asserted-by":"crossref","DOI":"10.1109\/MCSA.2003.1240776","article-title":"Selecting devices for aggregation","author":"kumar","year":"2003","journal-title":"IEEE Workshop on Mobile Computing Systems and Applications"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/338407.338514"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1023\/A:1020385804671"},{"key":"12","article-title":"A flexible, interoperable framework for active spaces","author":"kon","year":"2000","journal-title":"OOPSLA 2000 Workshop on Pervasive Computing"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/381677.381689"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/98.943998"},{"key":"22","first-page":"294","article-title":"SHAD: A human centered security architecture for panitionable, dynamic and heterogeneous distributed systems","author":"soriano","year":"2004","journal-title":"1st Middleware Doctoral Symposium"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35607-5_2"},{"key":"24","doi-asserted-by":"crossref","DOI":"10.1023\/A:1016547801710","article-title":"The roma personal metadata service","volume":"7","author":"swierk","year":"2002","journal-title":"Mobile Networks and Applications"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/12.729791"},{"key":"26","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45809-3_15","article-title":"The personal server: Changing the way we think about ubiquitous computing","author":"want","year":"2002","journal-title":"Proc Ubicomp 2002"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/98.475986"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican0991-94"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/BF03192352"},{"year":"0","key":"2"},{"key":"10","first-page":"287","article-title":"CUROCO: A distributed architecture for the dynamic generation, composition, and use of context in highly dynamic and heterogeneous environments","author":"guardiola","year":"2004","journal-title":"1st Middleware Doctoral Symposium"},{"journal-title":"Plan B User's Manual Second Edition","year":"0","key":"1"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39964-3_74"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2004.1284066"},{"key":"5","article-title":"The design and implementation of plan B 3rd edition. A dynamic distributed computing environment","volume":"2004","author":"ballesteros","year":"2004","journal-title":"GSYC Technical Report"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2005.49"},{"key":"9","article-title":"The ninja architecture for robust Intemetscale systems and services","author":"grabble","year":"2000","journal-title":"Computer Networks Special Issue on Pervasive Computing"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/945449.945450"}],"event":{"name":"ICPS '05. International Conference on Pervasive Services, 2005.","location":"Santorini, Greece"},"container-title":["ICPS '05. Proceedings. International Conference on Pervasive Services, 2005."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10064\/32279\/01506401.pdf?arnumber=1506401","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,20]],"date-time":"2019-03-20T17:55:30Z","timestamp":1553104530000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1506401\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/perser.2005.1506401","relation":{},"subject":[]}}