{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:28:55Z","timestamp":1750307335983,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,6,18]],"date-time":"2011-06-18T00:00:00Z","timestamp":1308355200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,6,18]]},"DOI":"10.1145\/1998642.1998647","type":"proceedings-article","created":{"date-parts":[[2011,6,28]],"date-time":"2011-06-28T17:34:50Z","timestamp":1309282490000},"page":"13-22","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Context-aware device self-configuration using self-organizing maps"],"prefix":"10.1145","author":[{"given":"Leonid","family":"Batyuk","sequence":"first","affiliation":[{"name":"DAI-Labor, Technische Universit\u00e4t Berlin, Berlin, Germany"}]},{"given":"Christian","family":"Scheel","sequence":"additional","affiliation":[{"name":"DAI-Labor, Technische Universit\u00e4t Berlin, Berlin, Germany"}]},{"given":"Seyit Ahmet","family":"Camtepe","sequence":"additional","affiliation":[{"name":"DAI-Labor, Technische Universit\u00e4t Berlin, Berlin, Germany"}]},{"given":"Sahin","family":"Albayrak","sequence":"additional","affiliation":[{"name":"DAI-Labor, Technische Universit\u00e4t Berlin, Berlin, Germany"}]}],"member":"320","published-online":{"date-parts":[[2011,6,18]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48157-5_29"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2005.32"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1809049.1809061"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERSER.2006.1652225"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/11915072_38"},{"key":"e_1_3_2_1_6_1","first-page":"149","article-title":"Is context-aware computing taking control away from the user? three levels of interactivity examined. UbiComp 2003","volume":"2864","author":"Barkhuus L.","year":"2003","unstructured":"L. Barkhuus and A. Dey . Is context-aware computing taking control away from the user? three levels of interactivity examined. UbiComp 2003 : Ubiquitous Computing , 2864 : 149 -- 156 , October 2003 . L. Barkhuus and A. Dey. Is context-aware computing taking control away from the user? three levels of interactivity examined. UbiComp 2003: Ubiquitous Computing, 2864:149--156, October 2003.","journal-title":"Ubiquitous Computing"},{"key":"e_1_3_2_1_7_1","volume-title":"Mobile Wireless Middleware, Operating Systems","author":"Batyuk L.","year":"2009","unstructured":"L. Batyuk , A.-D. Schmidt , H.-G. Schmidt , A. Camtepe , and S. Albayrak . Developing and benchmarking native Linux applications on Android . In Mobile Wireless Middleware, Operating Systems , and Applications , 2009 . L. Batyuk, A.-D. Schmidt, H.-G. Schmidt, A. Camtepe, and S. Albayrak. Developing and benchmarking native Linux applications on Android. In Mobile Wireless Middleware, Operating Systems, and Applications, 2009."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2006.871720"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/977406.978672"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2003.1237173"},{"key":"e_1_3_2_1_11_1","volume-title":"LIBSVM: a library for support vector machines","author":"Chang C.-C.","year":"2001","unstructured":"C.-C. Chang and C.-J. Lin . LIBSVM: a library for support vector machines , 2001 . C.-C. Chang and C.-J. Lin. LIBSVM: a library for support vector machines, 2001."},{"key":"e_1_3_2_1_12_1","first-page":"249","volume-title":"ACSAC '02: Proceedings of the 18th Annual Computer Security Applications Conference","author":"Covington M. J.","unstructured":"M. J. Covington , P. Fogla , Z. Zhan , and M. Ahamad . A context-aware security architecture for emerging applications . In ACSAC '02: Proceedings of the 18th Annual Computer Security Applications Conference , page 249 . IEEE Computer Society, 2002. M. J. Covington, P. Fogla, Z. Zhan, and M. Ahamad. A context-aware security architecture for emerging applications. In ACSAC '02: Proceedings of the 18th Annual Computer Security Applications Conference, page 249. IEEE Computer Society, 2002."},{"key":"e_1_3_2_1_13_1","first-page":"114","volume-title":"Proceedings of the 1st International Workshop on Managing Interactions in Smart Environments (MANSE '99)","author":"Dey A. K.","year":"1999","unstructured":"A. K. Dey , D. Salber , and G. D. Abowd . A context-based infrastructure for smart environments . In Proceedings of the 1st International Workshop on Managing Interactions in Smart Environments (MANSE '99) , pages 114 -- 128 , Dublin, Ireland , December 1999 . A. K. Dey, D. Salber, and G. D. Abowd. A context-based infrastructure for smart environments. In Proceedings of the 1st International Workshop on Managing Interactions in Smart Environments (MANSE '99), pages 114--128, Dublin, Ireland, December 1999."},{"key":"e_1_3_2_1_14_1","volume-title":"UCI machine learning repository","author":"Frank A.","year":"2010","unstructured":"A. Frank and A. Asuncion . UCI machine learning repository , 2010 . A. Frank and A. Asuncion. UCI machine learning repository, 2010."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2005.12.004"},{"key":"e_1_3_2_1_16_1","volume-title":"WSOM 03 (Intelligent systems and innovational computing)","author":"Himberg J.","year":"2003","unstructured":"J. Himberg , J. A. Flanagan , and J. Mantyjarvi . Towards context awareness using symbol clustering maps . In WSOM 03 (Intelligent systems and innovational computing) , 2003 . J. Himberg, J. A. Flanagan, and J. Mantyjarvi. Towards context awareness using symbol clustering maps. In WSOM 03 (Intelligent systems and innovational computing), 2003."},{"key":"e_1_3_2_1_17_1","volume-title":"Workshop on Pervasive Security, Privacy, and Trust (PSPT'04)","author":"Hu J.","year":"2004","unstructured":"J. Hu and A. C. Weaver . Dynamic, context-aware access control for distributed healthcare applications . In Workshop on Pervasive Security, Privacy, and Trust (PSPT'04) , Boston, MA , January 2004 . J. Hu and A. C. Weaver. Dynamic, context-aware access control for distributed healthcare applications. In Workshop on Pervasive Security, Privacy, and Trust (PSPT'04), Boston, MA, January 2004."},{"key":"e_1_3_2_1_18_1","unstructured":"T.\n      Kohonen\n    . \n      Self-Organizing\n      Maps volume \n  30\n   of \n  Springer Series in Information Sciences\n  . \n  Springer-Verlag Third\n   edition 2001\n  . ISBN 3-540-67921-9 ISSN 0720-678X.   T. Kohonen. Self-Organizing Maps volume 30 of Springer Series in Information Sciences. Springer-Verlag Third edition 2001. ISBN 3-540-67921-9 ISSN 0720-678X."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1002\/9780470238004"},{"key":"e_1_3_2_1_20_1","first-page":"189","volume-title":"Self-Organizing Maps for Processing of Data with Missing Values and Outliers","author":"Latif B. A.","year":"2010","unstructured":"B. A. Latif and G. Mercier . Self-Organizing Maps for Processing of Data with Missing Values and Outliers , chapter 12, pages 189 -- 210 . InTech , 2010 . B. A. Latif and G. Mercier. Self-Organizing Maps for Processing of Data with Missing Values and Outliers, chapter 12, pages 189--210. InTech, 2010."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.4204\/EPTCS.2.3"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1533057.1533092"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/643550.643558"},{"key":"e_1_3_2_1_24_1","volume-title":"D. Ferreira, P. Diniz, and P. Chainho. Context inference for mobile applications in the UPCASE Project. In Mobile Wireless Middleware, Operating Systems","author":"Santos A.","year":"2009","unstructured":"A. Santos , L. Tarrataca , J. ao Cardoso , D. Ferreira, P. Diniz, and P. Chainho. Context inference for mobile applications in the UPCASE Project. In Mobile Wireless Middleware, Operating Systems , and Applications , 2009 . A. Santos, L. Tarrataca, J. ao Cardoso, D. Ferreira, P. Diniz, and P. Chainho. Context inference for mobile applications in the UPCASE Project. In Mobile Wireless Middleware, Operating Systems, and Applications, 2009."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.1458275"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1007\/978-3-642-01802-2_13","volume-title":"MobileWireless Middleware, Operating Systems, and Applications","author":"Schmohl R.","year":"2009","unstructured":"R. Schmohl and U. Baumgarten . The Contextual Map - a context model for detecting affinity between contexts . In MobileWireless Middleware, Operating Systems, and Applications , pages 171 -- 184 , 2009 . R. Schmohl and U. Baumgarten. The Contextual Map - a context model for detecting affinity between contexts. In MobileWireless Middleware, Operating Systems, and Applications, pages 171--184, 2009."},{"key":"e_1_3_2_1_27_1","first-page":"275","volume-title":"European Symposium on Intelligent Technologies, Hybrid Systems and their implementation on Smart Adaptive Systems (eunite 2003","author":"Sommer D.","year":"2003","unstructured":"D. Sommer , T. Grimm , and M. Golz . Processing missing values with self-organized maps . In European Symposium on Intelligent Technologies, Hybrid Systems and their implementation on Smart Adaptive Systems (eunite 2003 ), pages 275 -- 279 , July 2003 . D. Sommer, T. Grimm, and M. Golz. Processing missing values with self-organized maps. In European Symposium on Intelligent Technologies, Hybrid Systems and their implementation on Smart Adaptive Systems (eunite 2003), pages 275--279, July 2003."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/128756.128759"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.18637\/jss.v021.i05"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/977405.978631"},{"key":"e_1_3_2_1_31_1","volume-title":"CNDS '04: Proceedings of the Communication Networks and Distributed Systems Modeling and Simulation Conference. Society for Modeling and Simulation International","author":"Zhang G.","year":"2004","unstructured":"G. Zhang and M. Parashar . Context-aware dynamic access control for pervasive applications . In CNDS '04: Proceedings of the Communication Networks and Distributed Systems Modeling and Simulation Conference. Society for Modeling and Simulation International , January 2004 . G. Zhang and M. Parashar. Context-aware dynamic access control for pervasive applications. In CNDS '04: Proceedings of the Communication Networks and Distributed Systems Modeling and Simulation Conference. Society for Modeling and Simulation International, January 2004."}],"event":{"name":"ICAC '11: 8th International Conference on Autonomic Computing","sponsor":["IEEE","University of Arizona University of Arizona","SIGARCH ACM Special Interest Group on Computer Architecture"],"location":"Karlsruhe Germany","acronym":"ICAC '11"},"container-title":["Proceedings of the 2011 workshop on Organic computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1998642.1998647","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1998642.1998647","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:06:14Z","timestamp":1750244774000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1998642.1998647"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6,18]]},"references-count":31,"alternative-id":["10.1145\/1998642.1998647","10.1145\/1998642"],"URL":"https:\/\/doi.org\/10.1145\/1998642.1998647","relation":{},"subject":[],"published":{"date-parts":[[2011,6,18]]},"assertion":[{"value":"2011-06-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}