{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T14:31:33Z","timestamp":1774189893890,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,10,20]],"date-time":"2010-10-20T00:00:00Z","timestamp":1287532800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,10,20]]},"DOI":"10.1145\/1868447.1868465","type":"proceedings-article","created":{"date-parts":[[2010,10,26]],"date-time":"2010-10-26T12:36:11Z","timestamp":1288096571000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":51,"title":["The home needs an operating system (and an app store)"],"prefix":"10.1145","author":[{"given":"Colin","family":"Dixon","sequence":"first","affiliation":[{"name":"University of Washington"}]},{"given":"Ratul","family":"Mahajan","sequence":"additional","affiliation":[{"name":"Microsoft Research"}]},{"given":"Sharad","family":"Agarwal","sequence":"additional","affiliation":[{"name":"Microsoft Research"}]},{"given":"A. J.","family":"Brush","sequence":"additional","affiliation":[{"name":"Microsoft Research"}]},{"given":"Bongshin","family":"Lee","sequence":"additional","affiliation":[{"name":"Microsoft Research"}]},{"given":"Stefan","family":"Saroiu","sequence":"additional","affiliation":[{"name":"Microsoft Research"}]},{"given":"Victor","family":"Bahl","sequence":"additional","affiliation":[{"name":"Microsoft Research"}]}],"member":"320","published-online":{"date-parts":[[2010,10,20]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Home security systems home security products home alarm systems - ADT. http:\/\/www.adt.com\/.  Home security systems home security products home alarm systems - ADT. http:\/\/www.adt.com\/."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357143"},{"key":"e_1_3_2_1_3_1","volume-title":"Morgan Kaufmann","author":"Beyer H.","year":"1998","unstructured":"H. Beyer and K. Holtzblatt . Contextual Design: Defining Customer-Centered Systems . Morgan Kaufmann , 1998 . H. Beyer and K. Holtzblatt. Contextual Design: Defining Customer-Centered Systems. Morgan Kaufmann, 1998."},{"key":"e_1_3_2_1_4_1","unstructured":"Open source - Apple developer. http:\/\/developer.apple.com\/opensource\/.  Open source - Apple developer. http:\/\/developer.apple.com\/opensource\/."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2002.1160083"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/647986.743885"},{"key":"e_1_3_2_1_7_1","volume-title":"HotNets","author":"Calvert K. L.","year":"2007","unstructured":"K. L. Calvert , W. Keith , E. Rebecca , and E. Grinter . Moving toward the middle: The case against the end-to-end argument in home networking . In HotNets , 2007 . K. L. Calvert, W. Keith, E. Rebecca, and E. Grinter. Moving toward the middle: The case against the end-to-end argument in home networking. In HotNets, 2007."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455818"},{"key":"e_1_3_2_1_9_1","unstructured":"Control4 home automation and control. http:\/\/www.control4.com.  Control4 home automation and control. http:\/\/www.control4.com."},{"key":"e_1_3_2_1_10_1","unstructured":"DLNA. http:\/\/www.dlna.org\/home.  DLNA. http:\/\/www.dlna.org\/home."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/587078.587114"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/238721.238775"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1096536.1096541"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1534903.1534905"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1384609.1384625"},{"key":"e_1_3_2_1_16_1","volume-title":"Capability Based Computer Systems","author":"Levy H. M.","year":"1984","unstructured":"H. M. Levy . Capability Based Computer Systems . Digital Press , 1984 . H. M. Levy. Capability Based Computer Systems. Digital Press, 1984."},{"key":"e_1_3_2_1_17_1","volume-title":"ABI Research","author":"Lucero S.","year":"2009","unstructured":"S. Lucero and S. Schatt . Home automation and security . ABI Research , 2009 . S. Lucero and S. Schatt. Home automation and security. ABI Research, 2009."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753421"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/800216.806593"},{"key":"e_1_3_2_1_20_1","unstructured":"Schlage LiNK. http:\/\/link.schlage.com\/.  Schlage LiNK. http:\/\/link.schlage.com\/."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314299.1314302"},{"key":"e_1_3_2_1_22_1","volume-title":"NSDI","author":"Zeldovich N.","year":"2008","unstructured":"N. Zeldovich , S. Boyd-Wickizer , and D. Mazieres . Securing distributed systems with information flow control . In NSDI , 2008 . N. Zeldovich, S. Boyd-Wickizer, and D. Mazieres. Securing distributed systems with information flow control. In NSDI, 2008."},{"key":"e_1_3_2_1_23_1","unstructured":"Z-Wave.com - ZwaveStart. http:\/\/www.z-wave.com.  Z-Wave.com - ZwaveStart. http:\/\/www.z-wave.com."}],"event":{"name":"Hotnets-X: 10th ACM Workshop on Hot Topics in Networks","location":"Monterey California","acronym":"Hotnets-X","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1868447.1868465","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1868447.1868465","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:08:54Z","timestamp":1750248534000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1868447.1868465"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10,20]]},"references-count":23,"alternative-id":["10.1145\/1868447.1868465","10.1145\/1868447"],"URL":"https:\/\/doi.org\/10.1145\/1868447.1868465","relation":{},"subject":[],"published":{"date-parts":[[2010,10,20]]},"assertion":[{"value":"2010-10-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}