{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T15:50:39Z","timestamp":1732031439111},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2002,11,16]]},"DOI":"10.1145\/587078.587114","type":"proceedings-article","created":{"date-parts":[[2004,4,19]],"date-time":"2004-04-19T13:18:43Z","timestamp":1082380723000},"page":"256-265","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":40,"title":["Using speakeasy for ad hoc peer-to-peer collaboration"],"prefix":"10.1145","author":[{"given":"W. Keith","family":"Edwards","sequence":"first","affiliation":[{"name":"Palo Alto Research Center, Palo Alto, CA"}]},{"given":"Mark W.","family":"Newman","sequence":"additional","affiliation":[{"name":"Palo Alto Research Center, Palo Alto, CA"}]},{"given":"Jana Z.","family":"Sedivy","sequence":"additional","affiliation":[{"name":"Palo Alto Research Center, Palo Alto, CA"}]},{"given":"Trevor F.","family":"Smith","sequence":"additional","affiliation":[{"name":"Palo Alto Research Center, Palo Alto, CA"}]},{"given":"Dirk","family":"Balfanz","sequence":"additional","affiliation":[{"name":"Palo Alto Research Center, Palo Alto, CA"}]},{"given":"D. K.","family":"Smetters","sequence":"additional","affiliation":[{"name":"Palo Alto Research Center, Palo Alto, CA"}]},{"given":"H. Chi","family":"Wong","sequence":"additional","affiliation":[{"name":"Palo Alto Research Center, Palo Alto, CA"}]},{"given":"Shahram","family":"Izadi","sequence":"additional","affiliation":[{"name":"Palo Alto Research Center, Palo Alto, CA"}]}],"member":"320","published-online":{"date-parts":[[2002,11,16]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of Network and Distributed System Security Symposium (NDSS)","author":"Balfanz D.","year":"2002","unstructured":"Balfanz , D. , Smetters , D.K. , Stewart , P. and Wong , H.C ., Talking To Strangers: Authentication in Ad-Hoc Wireless Networks . Proceedings of Network and Distributed System Security Symposium (NDSS) , ( San Diego, CA, USA , 2002 ).]] Balfanz, D., Smetters, D.K., Stewart, P. and Wong, H.C., Talking To Strangers: Authentication in Ad-Hoc Wireless Networks. Proceedings of Network and Distributed System Security Symposium (NDSS), (San Diego, CA, USA, 2002).]]"},{"key":"e_1_3_2_1_2_1","volume-title":"Technology and Privacy: The New Landscape","author":"Bellotti V.","year":"1997","unstructured":"Bellotti , V. Design for Privacy in Multimedia Computing and Communications Environments . in Rotenberg, M. ed. Technology and Privacy: The New Landscape , MIT Press , Cambridge, MA , 1997 , 62--98.]] Bellotti, V. Design for Privacy in Multimedia Computing and Communications Environments. in Rotenberg, M. ed. Technology and Privacy: The New Landscape, MIT Press, Cambridge, MA, 1997, 62--98.]]"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1207\/S15327051HCI16234_05"},{"key":"e_1_3_2_1_4_1","volume-title":"Peer-to-peer potential Network World","author":"Breidenbach S.","year":"2001","unstructured":"Breidenbach , S. Peer-to-peer potential Network World , 2001 .]] Breidenbach, S. Peer-to-peer potential Network World, 2001.]]"},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of ICAD 94, International Conference on Auditory Display","author":"Cohen J.","year":"1994","unstructured":"Cohen , J. , Out to lunch: Further adventures monitoring background activity . Proceedings of ICAD 94, International Conference on Auditory Display , ( Santa Fe, NM, USA , 1994 ), Santa Fe Institute, 15--20.]] Cohen, J., Out to lunch: Further adventures monitoring background activity. Proceedings of ICAD 94, International Conference on Auditory Display, (Santa Fe, NM, USA, 1994), Santa Fe Institute, 15--20.]]"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/143457.143468"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/570645.570680"},{"key":"e_1_3_2_1_8_1","volume-title":"http:\/\/www.Gnutella.com","author":"Gnutella","year":"2002","unstructured":"Gnutella . http:\/\/www.Gnutella.com , 2002 .]] Gnutella. http:\/\/www.Gnutella.com, 2002.]]"},{"key":"e_1_3_2_1_9_1","volume-title":"Simple Service Discovery Protocol\/1.0: Operating Without an Arbiter. Internet Engineering Task Force Internet Draft","author":"Goland Y.Y.","year":"1999","unstructured":"Goland , Y.Y. , Cai , T. , Leach , P. , Gu , Y. and Albright , S . Simple Service Discovery Protocol\/1.0: Operating Without an Arbiter. Internet Engineering Task Force Internet Draft . 1999 .]] Goland, Y.Y., Cai, T., Leach, P., Gu, Y. and Albright, S. Simple Service Discovery Protocol\/1.0: Operating Without an Arbiter. Internet Engineering Task Force Internet Draft. 1999.]]"},{"key":"e_1_3_2_1_10_1","volume-title":"Inc.","author":"Gong L.","year":"2001","unstructured":"Gong , L. Project JXTA : A Technology Overview. Sun Microsystems , Inc. April 25, 2001 .]] Gong, L. Project JXTA: A Technology Overview. Sun Microsystems, Inc. April 25, 2001.]]"},{"key":"e_1_3_2_1_11_1","volume-title":"http:\/\/www.Groove.com","author":"Groove Networks Inc.","year":"2002","unstructured":"Groove Networks Inc. http:\/\/www.Groove.com , 2002 .]] Groove Networks Inc. http:\/\/www.Groove.com, 2002.]]"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/358916.358981"},{"key":"e_1_3_2_1_13_1","volume-title":"http:\/\/www.Napster.com","author":"Napster","year":"2002","unstructured":"Napster . http:\/\/www.Napster.com , 2002 .]] Napster. http:\/\/www.Napster.com, 2002.]]"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/571985.572009"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/778712.778736"},{"key":"e_1_3_2_1_16_1","volume-title":"Bluetooth: Connecting Palm Powered(r) Handhelds","author":"Palm I.","year":"2001","unstructured":"Palm , I. Bluetooth: Connecting Palm Powered(r) Handhelds . October 22, 2001 .]] Palm, I. Bluetooth: Connecting Palm Powered(r) Handhelds. October 22, 2001.]]"},{"key":"e_1_3_2_1_17_1","volume-title":"Palm Bluetooth Card","author":"Palm Inc.","year":"2002","unstructured":"Palm Inc. Palm Bluetooth Card , 2002 .]] Palm Inc. Palm Bluetooth Card, 2002.]]"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/226159.226162"},{"key":"e_1_3_2_1_19_1","volume-title":"Wall Street firms embrace WorldStreet's p-to-p offerings InfoWorld","author":"Scannell E.","year":"2001","unstructured":"Scannell , E. Wall Street firms embrace WorldStreet's p-to-p offerings InfoWorld , 2001 .]] Scannell, E. Wall Street firms embrace WorldStreet's p-to-p offerings InfoWorld, 2001.]]"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/844102.844117"},{"key":"e_1_3_2_1_21_1","volume-title":"Jini Discovery and Join Specification","author":"Sun Microsystems","year":"1999","unstructured":"Sun Microsystems . Jini Discovery and Join Specification . January , 1999 .]] Sun Microsystems. Jini Discovery and Join Specification. January, 1999.]]"},{"key":"e_1_3_2_1_22_1","volume-title":"Network File System Protocol Specification (RFC 1049)","author":"Sun Microsystems","year":"1989","unstructured":"Sun Microsystems . Network File System Protocol Specification (RFC 1049) . 1989 .]] Sun Microsystems. Network File System Protocol Specification (RFC 1049). 1989.]]"},{"key":"e_1_3_2_1_23_1","volume-title":"UDDI Technical Whitepaper","author":"Universal Description Discovery and Integration Consortium","year":"2000","unstructured":"Universal Description Discovery and Integration Consortium . UDDI Technical Whitepaper . September 6, 2000 .]] Universal Description Discovery and Integration Consortium. UDDI Technical Whitepaper. September 6, 2000.]]"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/306549.306582"},{"key":"e_1_3_2_1_25_1","volume-title":"A Distributed Object Model for the Java System. USENIX Computing Sys., 9","author":"Wollrath A.","year":"1996","unstructured":"Wollrath , A. , Riggs , R. and Waldo , J . A Distributed Object Model for the Java System. USENIX Computing Sys., 9 . 1996 .]] Wollrath, A., Riggs, R. and Waldo, J. A Distributed Object Model for the Java System. USENIX Computing Sys., 9. 1996.]]"},{"key":"e_1_3_2_1_26_1","volume-title":"http:\/\/wwWorldStreet.com","author":"WorldStreet","year":"2002","unstructured":"WorldStreet . http:\/\/wwWorldStreet.com , 2002 .]] WorldStreet. http:\/\/wwWorldStreet.com, 2002.]]"}],"event":{"name":"CSCW02: Computer Supported Cooperative Work","sponsor":["ACM Association for Computing Machinery","SIGCHI ACM Special Interest Group on Computer-Human Interaction","SIGGROUP ACM Special Interest Group on Supporting Group Work"],"location":"New Orleans Louisiana USA","acronym":"CSCW02"},"container-title":["Proceedings of the 2002 ACM conference on Computer supported cooperative work"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/587078.587114","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,8]],"date-time":"2023-01-08T12:38:35Z","timestamp":1673181515000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/587078.587114"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,11,16]]},"references-count":26,"alternative-id":["10.1145\/587078.587114","10.1145\/587078"],"URL":"https:\/\/doi.org\/10.1145\/587078.587114","relation":{},"subject":[],"published":{"date-parts":[[2002,11,16]]},"assertion":[{"value":"2002-11-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}