{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:41:58Z","timestamp":1750308118685,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2003,5,5]],"date-time":"2003-05-05T00:00:00Z","timestamp":1052092800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2003,5,5]]},"DOI":"10.1145\/1066116.1066124","type":"proceedings-article","created":{"date-parts":[[2005,8,3]],"date-time":"2005-08-03T08:31:47Z","timestamp":1123057907000},"page":"259-272","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["iMASH"],"prefix":"10.1145","author":[{"given":"R.","family":"Bagrodia","sequence":"first","affiliation":[{"name":"UCLA Computer Science, Los Angeles, CA"}]},{"given":"S.","family":"Bhattacharyya","sequence":"additional","affiliation":[{"name":"UCLA Computer Science, Los Angeles, CA"}]},{"given":"F.","family":"Cheng","sequence":"additional","affiliation":[{"name":"UCLA Computer Science, Los Angeles, CA"}]},{"given":"S.","family":"Gerding","sequence":"additional","affiliation":[{"name":"UCLA Computer Science, Los Angeles, CA"}]},{"given":"G.","family":"Glazer","sequence":"additional","affiliation":[{"name":"UCLA Computer Science, Los Angeles, CA"}]},{"given":"R.","family":"Guy","sequence":"additional","affiliation":[{"name":"UCLA Computer Science, Los Angeles, CA"}]},{"given":"Z.","family":"Ji","sequence":"additional","affiliation":[{"name":"UCLA Computer Science, Los Angeles, CA"}]},{"given":"J.","family":"Lin","sequence":"additional","affiliation":[{"name":"UCLA Computer Science, Los Angeles, CA"}]},{"given":"T.","family":"Phan","sequence":"additional","affiliation":[{"name":"UCLA Computer Science, Los Angeles, CA"}]},{"given":"E.","family":"Skow","sequence":"additional","affiliation":[{"name":"UCLA Computer Science, Los Angeles, CA"}]},{"given":"M.","family":"Varshney","sequence":"additional","affiliation":[{"name":"UCLA Computer Science, Los Angeles, CA"}]},{"given":"G.","family":"Zorpas","sequence":"additional","affiliation":[{"name":"UCLA Computer Science, Los Angeles, CA"}]}],"member":"320","published-online":{"date-parts":[[2003,5,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/381677.381695"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/237090.237177"},{"key":"e_1_3_2_1_3_1","volume-title":"Migration for pervasive applications. Submitted for publication","author":"Grimm Robert","year":"2002","unstructured":"{GDLB02} Robert Grimm , Janet Davis , Eric Lemar , and Brian Bershad . Migration for pervasive applications. Submitted for publication , 2002 . {GDLB02} Robert Grimm, Janet Davis, Eric Lemar, and Brian Bershad. Migration for pervasive applications. Submitted for publication, 2002."},{"key":"e_1_3_2_1_4_1","volume-title":"Health Mgt. Tech.","author":"Hellerstein David","year":"2000","unstructured":"{Hel00} David Hellerstein . HIPAA and health information privacy rules: Almost there . Health Mgt. Tech. , April 2000 . {Hel00} David Hellerstein. HIPAA and health information privacy rules: Almost there. Health Mgt. Tech., April 2000."},{"key":"e_1_3_2_1_5_1","unstructured":"{IET} IETF. RTP: Real time protocol RFC3267. ftp:\/\/ftp.rfc-editor.org\/in-notes\/rfc3267.txt.  {IET} IETF. RTP: Real time protocol RFC3267. ftp:\/\/ftp.rfc-editor.org\/in-notes\/rfc3267.txt."},{"key":"e_1_3_2_1_6_1","unstructured":"{JM} Matthias Jugel and Marcus Meissner. JTA java telnet\/SSH application. http:\/\/www.javassh.org.  {JM} Matthias Jugel and Marcus Meissner. JTA java telnet\/SSH application. http:\/\/www.javassh.org."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/645558.660131"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/570645.570675"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2002.1037721"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/367701.367728"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/268998.266708"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/381472.381563"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/850928.851871"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDSO.2001.5"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345938"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2002.997210"},{"key":"e_1_3_2_1_17_1","unstructured":"{Suna} Sun Microsystems. javax.media interface controller. http:\/\/java.sun.com\/products\/java-media\/jmf\/2.1.1\/apidocs\/javax\/media\/Controller.html.  {Suna} Sun Microsystems. javax.media interface controller. http:\/\/java.sun.com\/products\/java-media\/jmf\/2.1.1\/apidocs\/javax\/media\/Controller.html."},{"key":"e_1_3_2_1_18_1","unstructured":"{Sunb} Sun Microsystems. JMF: Java media framework. http:\/\/java.sun.com\/products\/java-media\/jmf\/.  {Sunb} Sun Microsystems. JMF: Java media framework. http:\/\/java.sun.com\/products\/java-media\/jmf\/."},{"key":"e_1_3_2_1_19_1","volume-title":"Annual Symposium on Computer Applications in Medical Care: Toward Cost-Effective Clinical Computing","author":"van Mulligen Erik","year":"1995","unstructured":"{vMCT95} Erik van Mulligen , Ronald Cornet , and Teun Timmers . Problems with integrating legacy systems . In Annual Symposium on Computer Applications in Medical Care: Toward Cost-Effective Clinical Computing , 1995 . {vMCT95} Erik van Mulligen, Ronald Cornet, and Teun Timmers. Problems with integrating legacy systems. In Annual Symposium on Computer Applications in Medical Care: Toward Cost-Effective Clinical Computing, 1995."},{"key":"e_1_3_2_1_20_1","unstructured":"{WAP} WAP Forum. Wireless transport layer security specification. www1.wapforum.org\/tech\/ documents\/WAP-261-WTLS-20010406-a.pdf.  {WAP} WAP Forum. Wireless transport layer security specification. www1.wapforum.org\/tech\/ documents\/WAP-261-WTLS-20010406-a.pdf."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/570645.570657"}],"event":{"name":"MobiSys03: The First International Conference on Mobile Systems, Applications, and Services","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"San Francisco California","acronym":"MobiSys03"},"container-title":["Proceedings of the 1st international conference on Mobile systems, applications and services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1066116.1066124","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1066116.1066124","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:08:17Z","timestamp":1750262897000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1066116.1066124"}},"subtitle":["interactive mobile application session handoff"],"short-title":[],"issued":{"date-parts":[[2003,5,5]]},"references-count":21,"alternative-id":["10.1145\/1066116.1066124","10.1145\/1066116"],"URL":"https:\/\/doi.org\/10.1145\/1066116.1066124","relation":{},"subject":[],"published":{"date-parts":[[2003,5,5]]},"assertion":[{"value":"2003-05-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}