{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:58:25Z","timestamp":1750309105983,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2004,10,1]],"date-time":"2004-10-01T00:00:00Z","timestamp":1096588800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,10]]},"DOI":"10.1145\/1024733.1024739","type":"proceedings-article","created":{"date-parts":[[2004,10,7]],"date-time":"2004-10-07T17:39:48Z","timestamp":1097170788000},"page":"41-50","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Smart edge server"],"prefix":"10.1145","author":[{"given":"G.","family":"Manjunath","sequence":"first","affiliation":[{"name":"Hewlett Packard Labs, Palo Alto, CA"}]},{"given":"T.","family":"Simunic","sequence":"additional","affiliation":[{"name":"Hewlett Packard Labs, Palo Alto, CA"}]},{"given":"V.","family":"Krishnan","sequence":"additional","affiliation":[{"name":"Hewlett Packard Labs, Palo Alto, CA"}]},{"given":"J.","family":"Tourrilhes","sequence":"additional","affiliation":[{"name":"Hewlett Packard Labs, Palo Alto, CA"}]},{"given":"D.","family":"Das","sequence":"additional","affiliation":[{"name":"Hewlett Packard Labs, Palo Alto, CA"}]},{"given":"V.","family":"Srinivasmurthy","sequence":"additional","affiliation":[{"name":"Hewlett Packard Labs, Palo Alto, CA"}]},{"given":"A.","family":"McReynolds","sequence":"additional","affiliation":[{"name":"Hewlett Packard Labs, Palo Alto, CA"}]}],"member":"320","published-online":{"date-parts":[[2004,10]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Business Week Special Issue on Wi-Fi http:\/\/www.businessweek.com\/magazine\/toc\/03_17\/B38300317wifi.htm  Business Week Special Issue on Wi-Fi http:\/\/www.businessweek.com\/magazine\/toc\/03_17\/B38300317wifi.htm"},{"key":"e_1_3_2_1_2_1","unstructured":"Wireless ISPs http:\/\/www.bbwexchange.com\/wisps\/florida-wisps.asp  Wireless ISPs http:\/\/www.bbwexchange.com\/wisps\/florida-wisps.asp"},{"key":"e_1_3_2_1_3_1","unstructured":"Internet Content Adaptation Protocol http:\/\/www.ietf.org\/rfc\/rfc3507.txt  Internet Content Adaptation Protocol http:\/\/www.ietf.org\/rfc\/rfc3507.txt"},{"key":"e_1_3_2_1_4_1","unstructured":"A Python ICAP Framework http:\/\/icap-server.sourceforge.net  A Python ICAP Framework http:\/\/icap-server.sourceforge.net"},{"key":"e_1_3_2_1_5_1","volume-title":"IEEE Computer Society","author":"Das Devaraj","year":"2004","unstructured":"Devaraj Das . IPSec-based Delegation Protocol and its Application, Future Trends in Distributed Computing Systems , IEEE Computer Society , May 26-28, 2004 . Suzhou, China. Devaraj Das. IPSec-based Delegation Protocol and its Application, Future Trends in Distributed Computing Systems, IEEE Computer Society, May 26-28, 2004. Suzhou, China."},{"key":"e_1_3_2_1_6_1","first-page":"2002","volume-title":"Devaraj Das: Authentication and Authorization of Mobile Clients in Public Data Networks. Infrastructure Security International Conference, InfraSec 2002","author":"Reddy Prakash","year":"2002","unstructured":"Prakash Reddy , Venky Krishnan , Kan Zhang , Devaraj Das: Authentication and Authorization of Mobile Clients in Public Data Networks. Infrastructure Security International Conference, InfraSec 2002 , Bristol, UK , October 1-3, 2002 , LNCS 2437 and HPL- 2002 - 2213 Prakash Reddy, Venky Krishnan, Kan Zhang, Devaraj Das: Authentication and Authorization of Mobile Clients in Public Data Networks. Infrastructure Security International Conference, InfraSec 2002, Bristol, UK, October 1-3, 2002, LNCS 2437 and HPL-2002-213"},{"key":"e_1_3_2_1_8_1","volume-title":"PATMOS","author":"Rosing T.","year":"2003","unstructured":"T. Rosing , A. Acquaviva , V. Deolalikar , S. Roy : \" Server-driven Power Management \", PATMOS 2003 . T. Rosing, A. Acquaviva, V. Deolalikar, S. Roy: \" Server-driven Power Management\", PATMOS 2003."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28641-7_7"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/43.931003"},{"key":"e_1_3_2_1_11_1","volume-title":"Proc. of PIMRC","author":"Tourrilhes Jean","year":"2002","unstructured":"Jean Tourrilhes & Casey Carter . P-Handoff : A framework for fine grained ad-hoc vertical handoff . Proc. of PIMRC 2002 . Jean Tourrilhes & Casey Carter. P-Handoff : A framework for fine grained ad-hoc vertical handoff. Proc. of PIMRC 2002."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066116.1066119"},{"key":"e_1_3_2_1_16_1","volume-title":"IETF Draft","author":"D. Forsberg","year":"2004","unstructured":"D. Forsberg et al , \" Protocol for Carrying Authentication for Network Access (PANA) \", IETF Draft , Feb 9, 2004 D. Forsberg et al, \"Protocol for Carrying Authentication for Network Access (PANA)\", IETF Draft, Feb 9, 2004"},{"key":"e_1_3_2_1_17_1","unstructured":"Multi Photo Video standard www.osta.org\/mpv  Multi Photo Video standard www.osta.org\/mpv"},{"key":"e_1_3_2_1_18_1","unstructured":"\"How much information 2003\" UC Berkeley report http:\/\/www.sims.berkeley.edu\/research\/projects\/how-much-info-2003\/ 2003.  \"How much information 2003\" UC Berkeley report http:\/\/www.sims.berkeley.edu\/research\/projects\/how-much-info-2003\/ 2003."},{"key":"e_1_3_2_1_19_1","unstructured":"K. Wong H. Wei A. Dutta K. Young \"Performance of IP Micro-Mobility Management Schemes using Host Based Routing \" WPMC 2001.  K. Wong H. Wei A. Dutta K. Young \"Performance of IP Micro-Mobility Management Schemes using Host Based Routing \" WPMC 2001."},{"key":"e_1_3_2_1_20_1","unstructured":"Z. Jiang K. Leung B. Kim P. Henry \"Proxy Servers Based Seamless Mobility Management \" WCNC 2002.  Z. Jiang K. Leung B. Kim P. Henry \"Proxy Servers Based Seamless Mobility Management \" WCNC 2002."},{"key":"e_1_3_2_1_21_1","volume-title":"A framework for handling mobility at the application level,\" Proc. of PIMRC","author":"Tourrilhes J.","year":"2004","unstructured":"J. Tourrilhes . \"L7-mobility : A framework for handling mobility at the application level,\" Proc. of PIMRC , 2004 . J. Tourrilhes. \"L7-mobility : A framework for handling mobility at the application level,\" Proc. of PIMRC, 2004."},{"key":"e_1_3_2_1_22_1","volume-title":"Indian Institute of Science","author":"Das D.","year":"2003","unstructured":"D. Das , \" Design and Implementation of an Authentication and Authorization Framework for a Nomadic Service Delivery System\", MS Thesis , Indian Institute of Science , March 2003 . D. Das, \"Design and Implementation of an Authentication and Authorization Framework for a Nomadic Service Delivery System\", MS Thesis, Indian Institute of Science, March 2003."},{"key":"e_1_3_2_1_24_1","volume-title":"IETF","author":"Atkinson R.","year":"1995","unstructured":"R. Atkinson . \"Security Architecture for the Internet Protocol\", RFC 2401 , IETF , August 1995 . R. Atkinson. \"Security Architecture for the Internet Protocol\", RFC 2401, IETF, August 1995."}],"event":{"name":"WMASH04: The Second ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots ( co-located with Mobicom 2004 Conference )","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","ACM Association for Computing Machinery"],"location":"Philadelphia PA USA","acronym":"WMASH04"},"container-title":["Proceedings of the 2nd ACM international workshop on Wireless mobile applications and services on WLAN hotspots"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1024733.1024739","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1024733.1024739","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:48:45Z","timestamp":1750286925000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1024733.1024739"}},"subtitle":["beyond a wireless access point"],"short-title":[],"issued":{"date-parts":[[2004,10]]},"references-count":19,"alternative-id":["10.1145\/1024733.1024739","10.1145\/1024733"],"URL":"https:\/\/doi.org\/10.1145\/1024733.1024739","relation":{},"subject":[],"published":{"date-parts":[[2004,10]]},"assertion":[{"value":"2004-10-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}