{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T16:51:23Z","timestamp":1725987083365},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319981765"},{"type":"electronic","value":"9783319981772"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31095-9_20","type":"book-chapter","created":{"date-parts":[[2012,7,14]],"date-time":"2012-07-14T06:08:19Z","timestamp":1342246099000},"page":"301-317","source":"Crossref","is-referenced-by-count":11,"title":["SCIMS: A Social Context Information Management System for Socially-Aware Applications"],"prefix":"10.1007","author":[{"given":"Muhammad Ashad","family":"Kabir","sequence":"first","affiliation":[]},{"given":"Jun","family":"Han","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Alan","family":"Colman","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","doi-asserted-by":"crossref","unstructured":"Kabir, M.A., Han, J., Colman, A.: Modeling and Coordinating Social Interactions in Pervasive Environments. In: Proc. of the ICECCS, pp. 243\u2013252 (2011)","DOI":"10.1109\/ICECCS.2011.31"},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"Biamino, G.: Modeling social contexts for pervasive computing environments. In: PerCom CoMoRea Workshop, pp. 415\u2013420 (2011)","DOI":"10.1109\/PERCOMW.2011.5766925"},{"key":"20_CR3","unstructured":"Li, J., Dabek, F.: F2F: Reliable storage in open networks. In: P2P Workshop (2006)"},{"key":"20_CR4","unstructured":"Friend of a Friend (FOAF), \n \n http:\/\/xmlns.com\/foaf\/spec\/"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Lu, Y., Tsaparas, P., Ntoulas, A., Polanyi, L.: Exploiting social context for review quality prediction. In: Proc. of the 19th Intl. Conf. on WWW, pp. 691\u2013700 (2010)","DOI":"10.1145\/1772690.1772761"},{"key":"20_CR6","unstructured":"RELATIONSHIP, \n \n http:\/\/vocab.org\/relationship"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Dey, A.K., Abowd, G.D., Salber, D.: A conceptual framework and a toolkit for supporting the rapid prototyping of context-aware applications. Hum.-Comput. Interact. 16(2) (2001)","DOI":"10.1207\/S15327051HCI16234_02"},{"key":"20_CR8","unstructured":"Mislove, A., Gummadi, K.P., Druschel, P.: Exploiting social networks for internet search. In: Proc. 5th Workshop on Hot Topics in Networks, pp. 79\u201384 (2006)"},{"key":"20_CR9","unstructured":"Toninelli, A., Khushraj, D., Lassila, O., Montanari, R.: Towards socially aware mobile phones. In: 1st Social Data on the Web Wrokshop. CEUR, Germany (2008)"},{"key":"20_CR10","unstructured":"Bo, X., Gronowski, K., Radia, N., Svensson, M., Ton, A.: PocketSocial: Your distributed social context now in your pocket. In: PerCom Workshops (2011)"},{"key":"20_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1007\/978-3-642-16955-7_11","volume-title":"Middleware 2010","author":"N. Kourtellis","year":"2010","unstructured":"Kourtellis, N., Finnis, J., Anderson, P., Blackburn, J., Borcea, C., Iamnitchi, A.: Prometheus: User-Controlled P2P Social Data Management for Socially-Aware Applications. In: Gupta, I., Mascolo, C. (eds.) Middleware 2010. LNCS, vol.\u00a06452, pp. 212\u2013231. Springer, Heidelberg (2010)"},{"issue":"1","key":"20_CR12","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/s11036-008-0114-9","volume":"14","author":"A. Gupta","year":"2009","unstructured":"Gupta, A., Kalra, A., Boston, D., Borcea, C.: MobiSoC: a middleware for mobile social computing applications. Mobile Netw. and Appl.\u00a014(1), 35\u201352 (2009)","journal-title":"Mobile Netw. and Appl."},{"key":"20_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/978-3-642-20754-9_22","volume-title":"Advances in Grid and Pervasive Computing","author":"A. Toninelli","year":"2011","unstructured":"Toninelli, A., Pathak, A., Issarny, V.: Yarta: A Middleware for Managing Mobile Social Ecosystems. In: Riekki, J., Ylianttila, M., Guo, M. (eds.) GPC 2011. LNCS, vol.\u00a06646, pp. 209\u2013220. Springer, Heidelberg (2011)"},{"key":"20_CR14","doi-asserted-by":"crossref","unstructured":"Devlic, A., et al.: Context inference of users\u2019 social relationships and distributed policy management. In: PerCom Workshops, pp. 1\u20138 (2009)","DOI":"10.1109\/PERCOM.2009.4912890"},{"key":"20_CR15","unstructured":"Graph API \u2013 Facebook developers, \n \n http:\/\/developers.facebook.com\/"},{"key":"20_CR16","unstructured":"LinkedIn APIs, \n \n https:\/\/developer.linkedin.com\/apis"},{"key":"20_CR17","doi-asserted-by":"crossref","unstructured":"Finin, T., et al.: ROWLBAC: representing role based access control in OWL. In: Proc. of the 13th SACMAT, pp. 73\u201382 (2008)","DOI":"10.1145\/1377836.1377849"},{"key":"20_CR18","doi-asserted-by":"crossref","unstructured":"Fong, P.W.L., Siahaan, I.: Relationship-based access control policies and their policy languages. In: Proc. of the 16th SACMAT, pp. 51\u201360. ACM (2011)","DOI":"10.1145\/1998441.1998450"},{"key":"20_CR19","doi-asserted-by":"crossref","unstructured":"Carminati, B., Ferrari, E., Heatherly, R., Kantarcioglu, M., Thuraisingham, B.: A semantic web based framework for social network access control. In: Proc. of the 14th SACMAT, pp. 177\u2013186 (2009)","DOI":"10.1145\/1542207.1542237"},{"key":"20_CR20","doi-asserted-by":"crossref","unstructured":"Jagtap, P., Joshi, A., Finin, T., Zavala, L.: Preserving Privacy in Context-Aware Systems. In: Proc. of 5th Intl. Conf. on Semantic Computing, pp. 149\u2013153 (2011)","DOI":"10.1109\/ICSC.2011.87"},{"key":"20_CR21","doi-asserted-by":"crossref","unstructured":"Toninelli, A., Montanari, R., Lassila, O., Khushraj, D.: What\u2019s on Users\u2019 Minds? Toward a Usable Smart Phone Security Model. Pervasive Computing 8(2) (2009)","DOI":"10.1109\/MPRV.2009.39"},{"key":"20_CR22","doi-asserted-by":"crossref","unstructured":"Khalil, A., Connelly, K.: Context-aware telephony: privacy preferences and sharing patterns. In: Proc. of the 20th CSCW Conf., pp. 469\u2013478 (2006)","DOI":"10.1145\/1180875.1180947"},{"key":"20_CR23","doi-asserted-by":"crossref","unstructured":"Beach, A., et al.: Fusing mobile, sensor, and social data to fully enable context-aware computing. In: Proc. of the Workshop on Mob. Comput. Sys. & Appl. (2010)","DOI":"10.1145\/1734583.1734599"},{"issue":"2","key":"20_CR24","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1016\/j.pmcj.2009.06.002","volume":"6","author":"C. Bettini","year":"2010","unstructured":"Bettini, C., et al.: A survey of context modelling and reasoning techniques. Pervasive Mob. Comput.\u00a06(2), 161\u2013180 (2010)","journal-title":"Pervasive Mob. Comput."},{"issue":"3","key":"20_CR25","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1016\/j.pmcj.2011.02.001","volume":"7","author":"D. Riboni","year":"2011","unstructured":"Riboni, D., Bettini, C.: OWL 2 modeling and reasoning with complex human activities. Pervasive Mob. Comput.\u00a07(3), 379\u2013395 (2011)","journal-title":"Pervasive Mob. Comput."},{"key":"20_CR26","unstructured":"Baader, F.: The description logic handbook: theory, implementation, and applications. Cambridge Univ. Press (2003)"},{"key":"20_CR27","doi-asserted-by":"crossref","unstructured":"Xiang, R., Neville, J., Rogati, M.: Modeling relationship strength in online social networks. In: Proc. of the Intl. Conf. on World Wide Web, pp. 981\u2013990 (2010)","DOI":"10.1145\/1772690.1772790"},{"key":"20_CR28","doi-asserted-by":"crossref","unstructured":"Wishart, R., Henricksen, K., Indulska, J.: Context Privacy and Obfuscation Supported by Dynamic Context Source Discovery and Processing in a Context Management System. In: Porc. of the UIC, pp. 929\u2013940 (2007)","DOI":"10.1007\/978-3-540-73549-6_91"},{"key":"20_CR29","unstructured":"Sirin, E., Parsia, B.: Sparql-dl: Sparql query for owl-dl. In: OWLED (2007)"},{"key":"20_CR30","unstructured":"OWL 2 Web Ontology Language, \n \n http:\/\/www.w3.org\/TR\/owl2-overview\/"}],"container-title":["Notes on Numerical Fluid Mechanics and Multidisciplinary Design","Active Flow and Combustion Control 2018"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31095-9_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,3]],"date-time":"2019-05-03T21:57:50Z","timestamp":1556920670000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31095-9_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783319981765","9783319981772"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31095-9_20","relation":{},"ISSN":["1612-2909","1860-0824"],"issn-type":[{"type":"print","value":"1612-2909"},{"type":"electronic","value":"1860-0824"}],"subject":[],"published":{"date-parts":[[2012]]}}}