{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:37:18Z","timestamp":1750307838462,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,6,16]],"date-time":"2009-06-16T00:00:00Z","timestamp":1245110400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,6,16]]},"DOI":"10.1145\/1621890.1621916","type":"proceedings-article","created":{"date-parts":[[2009,10,20]],"date-time":"2009-10-20T12:43:40Z","timestamp":1256042620000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Service characteristics for service selection"],"prefix":"10.1145","author":[{"given":"Arto","family":"H\u00e4m\u00e4l\u00e4inen","sequence":"first","affiliation":[{"name":"Lappeenranta University of Technology, Finland"}]},{"given":"Pekka","family":"J\u00e4ppinen","sequence":"additional","affiliation":[{"name":"Lappeenranta University of Technology, Finland"}]},{"given":"Jari","family":"Porras","sequence":"additional","affiliation":[{"name":"Lappeenranta University of Technology, Finland"}]}],"member":"320","published-online":{"date-parts":[[2009,6,16]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1145\/329124.329126"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1109\/MPRV.2005.87"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1109\/SCW.2006.4"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1007\/s11036-005-1555-z"},{"doi-asserted-by":"crossref","unstructured":"G. Lee P. Faratin S. Bauer J. Wroclawski \"A User-Guided Cognitive Agent for Network Service Selection in Pervasive Computing Environments\" PerCom'04 2004.   G. Lee P. Faratin S. Bauer J. Wroclawski \"A User-Guided Cognitive Agent for Network Service Selection in Pervasive Computing Environments\" PerCom'04 2004.","key":"e_1_3_2_1_5_1","DOI":"10.1109\/PERCOM.2004.1276860"},{"key":"e_1_3_2_1_6_1","volume-title":"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference","author":"Varshavsky A.","year":"2005","unstructured":"A. Varshavsky , B. Reid , E. de Lara , \" A Cross-Layer Approach to Service Discovery and Selection in MANETs\" , IEEE International Conference on Mobile Adhoc and Sensor Systems Conference , 2005 . A. Varshavsky, B. Reid, E. de Lara, \"A Cross-Layer Approach to Service Discovery and Selection in MANETs\", IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005."},{"key":"e_1_3_2_1_7_1","volume-title":"Int. Workshop on Requirements and Solutions for Pervasive Software Infrastructures (co-located with Pervasive 2006","author":"McNamara L.","year":"2006","unstructured":"L. McNamara , C. Mascolo , L. Capra , \" Trust and Mobility Aware Service Provision for Pervasive Computing\" , In Int. Workshop on Requirements and Solutions for Pervasive Software Infrastructures (co-located with Pervasive 2006 ), Dublin, Ireland , May 2006 . L. McNamara, C. Mascolo, L. Capra, \"Trust and Mobility Aware Service Provision for Pervasive Computing\", In Int. Workshop on Requirements and Solutions for Pervasive Software Infrastructures (co-located with Pervasive 2006), Dublin, Ireland, May 2006."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1109\/MOBIQ.2007.4451000"},{"key":"e_1_3_2_1_9_1","volume-title":"2003 International Symposium on Performance Evaluation of Computer and Telecommunication Systems","author":"Lee C.","year":"2003","unstructured":"C. Lee , S. Helal , \" A Multi-tier Ubiquitous Service Discovery Protocol for Mobile Clients\" , 2003 International Symposium on Performance Evaluation of Computer and Telecommunication Systems , 2003 . C. Lee, S. Helal, \"A Multi-tier Ubiquitous Service Discovery Protocol for Mobile Clients\", 2003 International Symposium on Performance Evaluation of Computer and Telecommunication Systems, 2003."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1109\/WIMOB.2005.1512944"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1007\/s00779-004-0270-2"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1145\/502585.502638"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1023\/B:WINE.0000044024.54833.cb"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1145\/1462689.1462693"},{"key":"e_1_3_2_1_15_1","volume-title":"version 20-oct-2001","author":"Protocol Forum Wireless Application","year":"2001","unstructured":"Wireless Application Protocol Forum , WAG UA Prof , version 20-oct-2001 , 2001 . Wireless Application Protocol Forum, WAG UAProf, version 20-oct-2001, 2001."},{"unstructured":"L. Passani WURFL referred: 14.5.2009 available at: http:\/\/wurfl.sourceforge.net\/  L. Passani WURFL referred: 14.5.2009 available at: http:\/\/wurfl.sourceforge.net\/","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","first-page":"951","article-title":"ME - Mobile Electronic Personality","author":"J\u00e4ppinen P.","year":"2004","unstructured":"P. J\u00e4ppinen , \" ME - Mobile Electronic Personality \", PhD Thesis , 2004 , I SBN: 951 - 764 -902-9. P. J\u00e4ppinen, \"ME - Mobile Electronic Personality\", PhD Thesis, 2004, ISBN:951-764-902-9.","journal-title":"PhD Thesis"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the CHI 2000 Workshop on \"The What, Who, Where, When, Why and How of Context-Awareness\"","author":"Dey A. K.","year":"2000","unstructured":"A. K. Dey , G. D. Abowd , \"Towards a better understanding of Context and Context-Awareness \", Proceedings of the CHI 2000 Workshop on \"The What, Who, Where, When, Why and How of Context-Awareness\" , 2000 . A. K. Dey, G. D. Abowd, \"Towards a better understanding of Context and Context-Awareness\", Proceedings of the CHI 2000 Workshop on \"The What, Who, Where, When, Why and How of Context-Awareness\", 2000."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.5555\/962757.963275"}],"event":{"sponsor":["SIGAPP ACM Special Interest Group on Applied Computing","ACM Association for Computing Machinery","Create-Net","SIGSOFT ACM Special Interest Group on Software Engineering"],"acronym":"COMSWARE '09","name":"COMSWARE '09: Fourth International Conference on Communication System Software and Middleware","location":"Dublin Ireland"},"container-title":["Proceedings of the Fourth International ICST Conference on COMmunication System softWAre and middlewaRE"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1621890.1621916","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1621890.1621916","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:58:03Z","timestamp":1750255083000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1621890.1621916"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6,16]]},"references-count":19,"alternative-id":["10.1145\/1621890.1621916","10.1145\/1621890"],"URL":"https:\/\/doi.org\/10.1145\/1621890.1621916","relation":{},"subject":[],"published":{"date-parts":[[2009,6,16]]},"assertion":[{"value":"2009-06-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}