{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T17:03:39Z","timestamp":1763226219920,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":55,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,9,13]],"date-time":"2014-09-13T00:00:00Z","timestamp":1410566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003406","name":"Tekes","doi-asserted-by":"publisher","award":["2932\/31\/2009"],"award-info":[{"award-number":["2932\/31\/2009"]}],"id":[{"id":"10.13039\/501100003406","id-type":"DOI","asserted-by":"publisher"}]},{"name":"EU","award":["PCIG11-GA-2012-322138"],"award-info":[{"award-number":["PCIG11-GA-2012-322138"]}]},{"DOI":"10.13039\/501100002341","name":"Suomen Akatemia","doi-asserted-by":"publisher","award":["137736"],"award-info":[{"award-number":["137736"]}],"id":[{"id":"10.13039\/501100002341","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,9,13]]},"DOI":"10.1145\/2632048.2632086","type":"proceedings-article","created":{"date-parts":[[2014,9,17]],"date-time":"2014-09-17T14:22:41Z","timestamp":1410963761000},"page":"75-86","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":28,"title":["Identity crisis of ubicomp?"],"prefix":"10.1145","author":[{"given":"Yong","family":"Liu","sequence":"first","affiliation":[{"name":"University of Oulu, Oulu, Finland"}]},{"given":"Jorge","family":"Goncalves","sequence":"additional","affiliation":[{"name":"University of Oulu, Oulu, Finland"}]},{"given":"Denzil","family":"Ferreira","sequence":"additional","affiliation":[{"name":"University of Oulu, Oulu, Finland"}]},{"given":"Simo","family":"Hosio","sequence":"additional","affiliation":[{"name":"University of Oulu, Oulu, Finland"}]},{"given":"Vassilis","family":"Kostakos","sequence":"additional","affiliation":[{"name":"University of Oulu, Oulu, Finland"}]}],"member":"320","published-online":{"date-parts":[[2014,9,13]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370222"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11192-011-0374-1"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11192-011-0374-1"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1864431.1864452"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02019278"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"crossref","unstructured":"Borgatti S. P. and Everett M. G. Models of core\/periphery structures. Social networks 21 4 (2000) 375--395.  Borgatti S. P. and Everett M. G. Models of core\/periphery structures. Social networks 21 4 (2000) 375--395.","DOI":"10.1016\/S0378-8733(99)00019-2"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"crossref","unstructured":"Callon M. Courtial J.-P. Turner W. A. and Bauin S. From translations to problematic networks: An introduction to co-word analysis. Social science information 22 2 (1983) 191--235.  Callon M. Courtial J.-P. Turner W. A. and Bauin S. From translations to problematic networks: An introduction to co-word analysis. Social science information 22 2 (1983) 191--235.","DOI":"10.1177\/053901883022002003"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02019280"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02016546"},{"key":"e_1_3_2_2_10_1","first-page":"34","article-title":"A Probabilistic Room Location Service for Wireless Networked Environments. In Ubicomp 2001","volume":"18","author":"Castro P.","year":"2001","journal-title":"Ubiquitous Computing. Springer Berlin Heidelberg"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11192-009-0033-y"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493432.2493498"},{"key":"e_1_3_2_2_13_1","first-page":"73","article-title":"-. Enabling Context-Awareness from Network-Level Location Tracking","volume":"67","author":"Couderc P.","year":"1999","journal-title":"Handheld and Ubiquitous Computing. Springer Berlin Heidelberg"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-4571(1998)49:13%3C1206::AID-ASI7%3E3.3.CO;2-6"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-4571(1998)49:13%3C1206::AID-ASI7%3E3.3.CO;2-6"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s007790170019"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2030112.2030135"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2030112.2030192"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0306-4573(00)00051-0"},{"key":"e_1_3_2_2_20_1","unstructured":"DUB For the Future: I give up on CHI\/UIST. http:\/\/dubfuture.blogspot.fi\/2009\/11\/i-give-up-on-chiuist.html retrieved 24\/02\/2014.  DUB For the Future: I give up on CHI\/UIST. http:\/\/dubfuture.blogspot.fi\/2009\/11\/i-give-up-on-chiuist.html retrieved 24\/02\/2014."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493432.2493465"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493432.2493481"},{"volume-title":"Chapman & Hall\/CRC","year":"2007","author":"Greenacre M. J.","key":"e_1_3_2_2_23_1"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1864349.1864370"},{"key":"e_1_3_2_2_25_1","first-page":"71","volume":"63","author":"Guan Z.","year":"2000","journal-title":"In Handheld and Ubiquitous Computing. Springer Berlin Heidelberg"},{"key":"e_1_3_2_2_26_1","unstructured":"He Q. Knowledge Discovery Through Co-Word Analysis. Library trends 48 1 (1999) 133--159.  He Q. Knowledge Discovery Through Co-Word Analysis. Library trends 48 1 (1999) 133--159."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493432.2493501"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11192-013-1076-7"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11192-013-1076-7"},{"key":"e_1_3_2_2_30_1","first-page":"66","volume":"52","author":"Jos\u00e9 R.","year":"1999","journal-title":"In Handheld and Ubiquitous Computing. Springer Berlin Heidelberg"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2030112.2030115"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370444"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79576-6_5"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02019183"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1620545.1620579"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31205-2_11"},{"key":"e_1_3_2_2_37_1","first-page":"388","volume":"386","author":"Lim H.","year":"1999","journal-title":"Ad-hoc Network Routing for Centralized Information Sharing Systems. In Handheld and Ubiquitous Computing. Springer Berlin Heidelberg"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1864349.1864362"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11192-011-0586-4"},{"key":"e_1_3_2_2_40_1","first-page":"367","article-title":"Recognizing named entities in tweets","volume":"359","author":"Liu X.","year":"2011","journal-title":"Human Language Technologies. Association for Computational Linguistics"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2556969"},{"key":"e_1_3_2_2_42_1","first-page":"385","article-title":"Anonymous and Confidential Communications from an IP Addressless Computer","volume":"383","author":"Molina-Jim\u00e9nez C.","year":"1999","journal-title":"Handheld and Ubiquitous Computing. Springer Berlin Heidelberg"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11135-011-9565-3"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12654-3_6"},{"key":"e_1_3_2_2_45_1","first-page":"314","article-title":"The Design of a Context-Aware Home Media Space for Balancing Privacy and Awareness. In UbiComp 2003","volume":"297","author":"Neustaedter C.","year":"2003","journal-title":"Ubiquitous Computing. Springer Berlin Heidelberg"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1002\/csr.221"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"crossref","unstructured":"Porter M. F. and Street C. E. An algorithm for suffix stripping. Program: electronic library and information systems (1980).  Porter M. F. and Street C. E. An algorithm for suffix stripping. Program: electronic library and information systems (1980).","DOI":"10.1108\/eb046814"},{"key":"e_1_3_2_2_48_1","first-page":"48","article-title":"Low Cost Indoor Positioning System. In Ubicomp 2001","volume":"42","author":"Randell C.","year":"2001","journal-title":"Ubiquitous Computing. Springer Berlin Heidelberg"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2494091.2494096"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.19173\/irrodl.v11i1.763"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"crossref","unstructured":"Rombach M. P. Porter M. A. Fowler J. H. and Mucha P. J. Core-periphery structure in networks. arXiv preprint arXiv:1202.2684 (2012).  Rombach M. P. Porter M. A. Fowler J. H. and Mucha P. J. Core-periphery structure in networks. arXiv preprint arXiv:1202.2684 (2012).","DOI":"10.2139\/ssrn.2002684"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1108\/00012531211281788"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"crossref","unstructured":"Ward  Jr J. H. Hierarchical grouping to optimize an objective function. Journal of the American statistical association 58 301 (1963) 236--244.  Ward Jr J. H. Hierarchical grouping to optimize an objective function. Journal of the American statistical association 58 301 (1963) 236--244.","DOI":"10.1080\/01621459.1963.10500845"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2030112.2030128"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370241"}],"event":{"name":"UbiComp '14: The 2014 ACM Conference on Ubiquitous Computing","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGCHI ACM Special Interest Group on Computer-Human Interaction","SIGSPATIAL ACM Special Interest Group on Spatial Information"],"location":"Seattle Washington","acronym":"UbiComp '14"},"container-title":["Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2632048.2632086","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2632048.2632086","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:19:14Z","timestamp":1750231154000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2632048.2632086"}},"subtitle":["mapping 15 years of the field's development and paradigm change"],"short-title":[],"issued":{"date-parts":[[2014,9,13]]},"references-count":55,"alternative-id":["10.1145\/2632048.2632086","10.1145\/2632048"],"URL":"https:\/\/doi.org\/10.1145\/2632048.2632086","relation":{},"subject":[],"published":{"date-parts":[[2014,9,13]]},"assertion":[{"value":"2014-09-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}