{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:32:41Z","timestamp":1725471161275},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540457640"},{"type":"electronic","value":"9783540457664"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11875604_21","type":"book-chapter","created":{"date-parts":[[2006,9,22]],"date-time":"2006-09-22T13:19:18Z","timestamp":1158931158000},"page":"178-187","source":"Crossref","is-referenced-by-count":4,"title":["Location-Aware Multi-agent Based Intelligent Services in Home Networks"],"prefix":"10.1007","author":[{"given":"Minsoo","family":"Lee","sequence":"first","affiliation":[]},{"given":"Yong","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Yoonsik","family":"Uhm","sequence":"additional","affiliation":[]},{"given":"Zion","family":"Hwang","sequence":"additional","affiliation":[]},{"given":"Gwanyeon","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Sehyun","family":"Park","sequence":"additional","affiliation":[]},{"given":"Ohyoung","family":"Song","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1007\/11552055_22","volume-title":"Communications and Multimedia Security","author":"M. Lee","year":"2005","unstructured":"Lee, M., Park, S.: A secure context management for QoS-Aware vertical handovers in 4g networks. In: Dittmann, J., Katzenbeisser, S., Uhl, A. (eds.) CMS 2005. LNCS, vol.\u00a03677, pp. 220\u2013229. Springer, Heidelberg (2005)"},{"key":"21_CR2","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1207\/S15327051HCI16234_11","volume":"16","author":"J.I. Hong","year":"2001","unstructured":"Hong, J.I., Landay, J.A.: An infrastructure approach to context-aware computing. Human-Computer Interaction\u00a016, 287\u2013303 (2001)","journal-title":"Human-Computer Interaction"},{"key":"21_CR3","doi-asserted-by":"crossref","unstructured":"Chen, H., Finin, T.: An ontology for a context aware pervasive computing environment. In: Eighteenth International Joint Conference On Artificial Intelligence (IJCAI) Workshop on Ontologies and Distributed Systems (2003)","DOI":"10.1017\/S0269888904000025"},{"key":"21_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2004.06.002","volume":"28","author":"H.K.P. Tao Gu","year":"2005","unstructured":"Tao Gu, H.K.P., Zhang, D.Q.: A service-oriented middleware for building context-aware services. Journal of Network and Computer Applications\u00a028, 1\u201318 (2005)","journal-title":"Journal of Network and Computer Applications"},{"key":"21_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1007\/11604938_10","volume-title":"Information Security Applications","author":"M. Lee","year":"2006","unstructured":"Lee, M., Park, S., Song, O.: Elastic security QoS provisioning for telematics applications. In: Song, J.-S., Kwon, T., Yung, M. (eds.) WISA 2005. LNCS, vol.\u00a03786, pp. 126\u2013137. Springer, Heidelberg (2006)"},{"key":"21_CR6","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1109\/JCN.2005.6387867","volume":"7","author":"M. Lee","year":"2005","unstructured":"Lee, M., Kim, G., Park, S.: Seamless and secure mobility management with location aware service (LAS) broker for future mobile interworking networks. Journal of Communications and Networks\u00a07, 207\u2013221 (2005)","journal-title":"Journal of Communications and Networks"},{"key":"21_CR7","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1109\/MC.2004.1266301","volume":"37","author":"M. Hazas","year":"2004","unstructured":"Hazas, M., Scott, J., Krumm, J.: Location-aware computing comes of age. IEEE Computer\u00a037, 95\u201397 (2004)","journal-title":"IEEE Computer"},{"key":"21_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/11428572_16","volume-title":"Pervasive Computing","author":"M. Laibowitz","year":"2005","unstructured":"Laibowitz, M., Paradiso, J.A.: Parasitic mobility for pervasive sensor networks. In: Gellersen, H.-W., Want, R., Schmidt, A. (eds.) PERVASIVE 2005. LNCS, vol.\u00a03468, pp. 255\u2013278. Springer, Heidelberg (2005)"},{"key":"21_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1007\/11422778_30","volume-title":"NETWORKING 2005. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems","author":"M. Lee","year":"2005","unstructured":"Lee, M., Kim, G., Park, S., Jun, S., Nah, J., Song, O.: Efficient 3G\/WLAN interworking techniques for seamless roaming services with location-aware authentication. In: Boutaba, R., Almeroth, K.C., Puigjaner, R., Shen, S., Black, J.P. (eds.) NETWORKING 2005. LNCS, vol.\u00a03462, pp. 370\u2013381. Springer, Heidelberg (2005)"},{"key":"21_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"394","DOI":"10.1007\/11496618_29","volume-title":"Information Security and Cryptology \u2013 ICISC 2004","author":"M. Lee","year":"2005","unstructured":"Lee, M., Kim, J., Park, S., Song, O., Jun, S.: A location-aware secure interworking architecture between 3GPP and WLAN systems. In: Park, C.-s., Chee, S. (eds.) ICISC 2004. LNCS, vol.\u00a03506, pp. 394\u2013406. Springer, Heidelberg (2005)"},{"key":"21_CR11","unstructured":"Kim, Y., Hwang, E., Uhm, Y., Park, S., Song, O.: A context aware multiagent system architecture for a smart home. In: IFIP International conference on Network Control and Engineering for QoS, Security and Mobility (NetCon 2005) (2005)"},{"key":"21_CR12","doi-asserted-by":"crossref","unstructured":"Biegel, G., Cahill, V.: A framework for developing mobile, context-aware applications. In: PerCom, pp. 361\u2013365 (2004)","DOI":"10.1109\/PERCOM.2004.1276875"},{"key":"21_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"843","DOI":"10.1007\/11581772_74","volume-title":"Advances in Multimedia Information Processing - PCM 2005","author":"J. Lee","year":"2005","unstructured":"Lee, J., et al.: Feature fusion-based multiple people tracking. In: Ho, Y.-S., Kim, H.J. (eds.) PCM 2005. LNCS, vol.\u00a03767, pp. 843\u2013853. Springer, Heidelberg (2005)"},{"key":"21_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/978-3-540-24686-2_17","volume-title":"Real-Time and Embedded Computing Systems and Applications","author":"M. Kurahashi","year":"2004","unstructured":"Kurahashi, M., et al.: System support for distributed augmented reality in ubiquitous computing environments. In: Chen, J., Hong, S. (eds.) RTCSA 2003. LNCS, vol.\u00a02968, pp. 279\u2013295. Springer, Heidelberg (2004)"},{"key":"21_CR15","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1023\/A:1007469218079","volume":"32","author":"S. Fine","year":"1998","unstructured":"Fine, S., Singer, Y., Tishby, N.: The hierarchical hidden markov model: Analysis and applications. Machine Learning\u00a032, 41\u201362 (1998)","journal-title":"Machine Learning"},{"key":"21_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1007\/978-3-540-24693-0_28","volume-title":"NETWORKING 2004. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications","author":"M. Lee","year":"2004","unstructured":"Lee, M., Kim, J., Park, S., Lee, J., Lee, S.: A secure web services for location based services in wireless networks. In: Mitrou, N.M., Kontovasilis, K., Rouskas, G.N., Iliadis, I., Merakos, L. (eds.) NETWORKING 2004. LNCS, vol.\u00a03042, pp. 332\u2013344. Springer, Heidelberg (2004)"},{"key":"21_CR17","unstructured":"de Ipi\u00f1a, D.L., Lo, S.L.: Locale: A location-aware lifecycle environment for ubiquitous computing. In: ICOIN, pp. 419\u2013426 (2001)"},{"key":"21_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1007\/978-3-540-30119-6_6","volume-title":"UbiComp 2004: Ubiquitous Computing","author":"J. Hightower","year":"2004","unstructured":"Hightower, J., Borriello, G.: Particle filters for location estimation in ubiquitous computing: A case study. In: Davies, N., Mynatt, E.D., Siio, I. (eds.) UbiComp 2004. LNCS, vol.\u00a03205, pp. 88\u2013106. Springer, Heidelberg (2004)"},{"key":"21_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/11551201_10","volume-title":"UbiComp 2005: Ubiquitous Computing","author":"J. Hightower","year":"2005","unstructured":"Hightower, J., et al.: Learning and recognizing the places we go. In: Beigl, M., Intille, S.S., Rekimoto, J., Tokuda, H. (eds.) UbiComp 2005. LNCS, vol.\u00a03660, pp. 159\u2013176. Springer, Heidelberg (2005)"},{"key":"21_CR20","doi-asserted-by":"publisher","first-page":"922","DOI":"10.1109\/49.709453","volume":"16","author":"T. Liu","year":"1998","unstructured":"Liu, T., et al.: Mobility modeling, location tracking and trajectory prediction in wireless atm networks. IEEE Selected Areas in Communications\u00a016, 922\u2013936 (1998)","journal-title":"IEEE Selected Areas in Communications"},{"key":"21_CR21","unstructured":"Chellappa-Doss, R., et al.: User mobility prediction in hybrid and ad hoc wireless networks. In: Australian Telecommunications, Networks and Applications Conference (ATNAC) (2003)"},{"key":"21_CR22","unstructured":"The RuleML Initiative, \n \n http:\/\/www.ruleml.org"},{"key":"21_CR23","unstructured":"JESS, the Rule Engine for Java Platform, \n \n http:\/\/herzberg.ca.sandia.gov\/jess\/"},{"key":"21_CR24","unstructured":"Jena2, A Semantic Web Framework, \n \n http:\/\/www.hpl.hp.com\/semweb\/jena2.htm"},{"key":"21_CR25","unstructured":"Multimodal Interaction Framework, \n \n http:\/\/www.w3.org\/tr\/mmi-framework"},{"key":"21_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-30119-6_1","volume-title":"UbiComp 2004: Ubiquitous Computing","author":"S. Consolvo","year":"2004","unstructured":"Consolvo, S., Roessler, P., Shelton, B.E.: The carenet display: Lessons learned from an in home evaluation of an ambient display. In: Davies, N., Mynatt, E.D., Siio, I. (eds.) UbiComp 2004. LNCS, vol.\u00a03205, pp. 1\u201317. Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","Foundations of Intelligent Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11875604_21.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:25:50Z","timestamp":1619508350000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11875604_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540457640","9783540457664"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/11875604_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}