callback( { "result":{ "query":":facetid:toc:\"db/conf/mobiquitous/mobiquitous2008.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"199.36" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"64", "@dc":"64", "@oc":"64", "@id":"43415742", "text":":facetid:toc:db/conf/mobiquitous/mobiquitous2008.bht" } }, "hits":{ "@total":"64", "@computed":"64", "@sent":"64", "@first":"0", "hit":[{ "@score":"1", "@id":"5398830", "info":{"authors":{"author":[{"@pid":"82/5367","text":"Jorge Agüero"},{"@pid":"36/257","text":"Miguel Rebollo"},{"@pid":"13/4400","text":"Carlos Carrascosa"},{"@pid":"80/1703","text":"Vicente Julián"}]},"title":"Towards on embedded agent model for Android mobiles.","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/AgueroRCJ08","doi":"10.4108/ICST.MOBIQUITOUS2008.4195","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.4195","url":"https://dblp.org/rec/conf/mobiquitous/AgueroRCJ08"}, "url":"URL#5398830" }, { "@score":"1", "@id":"5398831", "info":{"authors":{"author":[{"@pid":"a/MAnand","text":"Manish Anand"},{"@pid":"14/85","text":"Jason Flinn"}]},"title":"PAN-on-Demand: leveraging multiple radios to build self-organizing, energy-efficient pans.","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/AnandF08","doi":"10.4108/ICST.MOBIQUITOUS2008.3614","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.3614","url":"https://dblp.org/rec/conf/mobiquitous/AnandF08"}, "url":"URL#5398831" }, { "@score":"1", "@id":"5398832", "info":{"authors":{"author":[{"@pid":"a/WGAref","text":"Walid G. Aref"},{"@pid":"o/MouradOuzzani","text":"Mourad Ouzzani"}]},"title":"Data management challenges for computational transportation.","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/ArefO08","doi":"10.4108/ICST.MOBIQUITOUS2008.4014","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.4014","url":"https://dblp.org/rec/conf/mobiquitous/ArefO08"}, "url":"URL#5398832" }, { "@score":"1", "@id":"5398833", "info":{"authors":{"author":[{"@pid":"71/5713","text":"Ibrahim Armac"},{"@pid":"09/3592","text":"Daniel Rose"}]},"title":"Privacy-friendly user modelling for smart environments.","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/ArmacR08","doi":"10.4108/ICST.MOBIQUITOUS2008.3929","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.3929","url":"https://dblp.org/rec/conf/mobiquitous/ArmacR08"}, "url":"URL#5398833" }, { "@score":"1", "@id":"5398834", "info":{"authors":{"author":[{"@pid":"04/5442","text":"Dietmar Bauer"},{"@pid":"21/7173","text":"Markus Ray"},{"@pid":"52/3100","text":"Norbert Brändle"},{"@pid":"09/7172","text":"Helmut Schrom-Feiertag"}]},"title":"On extracting commuter information from GPS motion data.","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/BauerRBS08","doi":"10.4108/ICST.MOBIQUITOUS2008.3881","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.3881","url":"https://dblp.org/rec/conf/mobiquitous/BauerRBS08"}, "url":"URL#5398834" }, { "@score":"1", "@id":"5398835", "info":{"authors":{"author":[{"@pid":"b/AntonioBrogi","text":"Antonio Brogi"},{"@pid":"08/3566","text":"Sara Corfini"},{"@pid":"19/1320","text":"Thaizel Fuentes"}]},"title":"Tailoring service discovery to embedded P2P systems.","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/BrogiCF08","doi":"10.4108/ICST.MOBIQUITOUS2008.3904","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.3904","url":"https://dblp.org/rec/conf/mobiquitous/BrogiCF08"}, "url":"URL#5398835" }, { "@score":"1", "@id":"5398836", "info":{"authors":{"author":[{"@pid":"175/3324","text":"Hao Chen"},{"@pid":"79/2669","text":"James P. Black"}]},"title":"A quantitative approach to non-intrusive computing.","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/ChenB08","doi":"10.4108/ICST.MOBIQUITOUS2008.3473","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.3473","url":"https://dblp.org/rec/conf/mobiquitous/ChenB08"}, "url":"URL#5398836" }, { "@score":"1", "@id":"5398837", "info":{"authors":{"author":[{"@pid":"86/3244","text":"Yuqun Chen"},{"@pid":"82/7787","text":"Michael Sinclair"}]},"title":"Tangible security for mobile devices.","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/ChenS08","doi":"10.4108/ICST.MOBIQUITOUS2008.3936","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.3936","url":"https://dblp.org/rec/conf/mobiquitous/ChenS08"}, "url":"URL#5398837" }, { "@score":"1", "@id":"5398838", "info":{"authors":{"author":[{"@pid":"04/7786","text":"Nicolaj Bjerregaard Christensen"},{"@pid":"w/StefanWagner4","text":"Stefan Wagner 0004"}]},"title":"Using near field communication technology to achieve near-zero-configuration of sensors.","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/ChristensenW08","doi":"10.4108/ICST.MOBIQUITOUS2008.4196","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.4196","url":"https://dblp.org/rec/conf/mobiquitous/ChristensenW08"}, "url":"URL#5398838" }, { "@score":"1", "@id":"5398839", "info":{"authors":{"author":[{"@pid":"05/6376","text":"Edmund Coersmeier"},{"@pid":"09/7786","text":"Marc Hoffmann"},{"@pid":"53/4169","text":"André Kaufmann"},{"@pid":"56/7785","text":"Robert Budde"},{"@pid":"62/7785","text":"Wolfgang Endemann"},{"@pid":"46/7786","text":"Rüdiger Kays"}]},"title":"Scalable and efficient car communication topology.","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/CoersmeierHKBEK08","doi":"10.4108/ICST.MOBIQUITOUS2008.3876","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.3876","url":"https://dblp.org/rec/conf/mobiquitous/CoersmeierHKBEK08"}, "url":"URL#5398839" }, { "@score":"1", "@id":"5398840", "info":{"authors":{"author":[{"@pid":"48/2999","text":"Luca Costabello"},{"@pid":"04/4938","text":"Oscar Rodriguez Rocha"},{"@pid":"25/2371","text":"Laurent-Walter Goix"}]},"title":"Sharing mobile user experiences with context-based mashups.","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/CostabelloRG08","doi":"10.4108/ICST.MOBIQUITOUS2008.3978","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.3978","url":"https://dblp.org/rec/conf/mobiquitous/CostabelloRG08"}, "url":"URL#5398840" }, { "@score":"1", "@id":"5398841", "info":{"authors":{"author":[{"@pid":"23/7787","text":"Caitlin Doyle Cottrill"},{"@pid":"83/7787","text":"Piyushimita Thakuriah"}]},"title":"GPS use by households: early indicators of privacy preferences regarding ubiquitous mobility information access.","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/CottrillT08","doi":"10.4108/ICST.MOBIQUITOUS2008.3826","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.3826","url":"https://dblp.org/rec/conf/mobiquitous/CottrillT08"}, "url":"URL#5398841" }, { "@score":"1", "@id":"5398842", "info":{"authors":{"author":[{"@pid":"d/BrunoDefude","text":"Bruno Defude"},{"@pid":"d/ThierryDelot","text":"Thierry Delot"},{"@pid":"60/6762","text":"Sergio Ilarri"},{"@pid":"80/264","text":"José-Luis Zechinelli-Martini"},{"@pid":"50/2572","text":"Nicolas Cenerario"}]},"title":"Data aggregation in VANETs: the VESPA approach.","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/DefudeDIZC08","doi":"10.4108/ICST.MOBIQUITOUS2008.3897","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.3897","url":"https://dblp.org/rec/conf/mobiquitous/DefudeDIZC08"}, "url":"URL#5398842" }, { "@score":"1", "@id":"5398843", "info":{"authors":{"author":[{"@pid":"62/0","text":"Alisa Devlic"},{"@pid":"68/7785","text":"Alan Graf"},{"@pid":"60/53","text":"Paolo Barone"}]},"title":"Evaluation of context distribution methods via Bluetooth and WLAN: insights gained while examining battery power consumption.","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/DevlicGB08","doi":"10.4108/ICST.MOBIQUITOUS2008.3613","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.3613","url":"https://dblp.org/rec/conf/mobiquitous/DevlicGB08"}, "url":"URL#5398843" }, { "@score":"1", "@id":"5398844", "info":{"authors":{"author":[{"@pid":"72/6497","text":"Francisco Durán 0001"},{"@pid":"89/2049","text":"Francisco Gutiérrez"},{"@pid":"21/2344","text":"Pablo López"},{"@pid":"p/ErnestoPimentel","text":"Ernesto Pimentel 0001"}]},"title":"A formalization of the SMEPP model in Maude.","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/DuranGLP08","doi":"10.4108/ICST.MOBIQUITOUS2008.3916","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.3916","url":"https://dblp.org/rec/conf/mobiquitous/DuranGLP08"}, "url":"URL#5398844" }, { "@score":"1", "@id":"5398845", "info":{"authors":{"author":[{"@pid":"94/236","text":"Kevin Feeney"},{"@pid":"80/6593-1","text":"David Lewis 0001"},{"@pid":"59/3562","text":"Kris McGlinn"},{"@pid":"16/508","text":"Declan O'Sullivan"},{"@pid":"59/7787","text":"Anne Holohan"}]},"title":"Avoiding "big brother" anxiety with progressive self-management of ubiquitous computing services.","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/FeeneyLMOH08","doi":"10.4108/ICST.MOBIQUITOUS2008.3625","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.3625","url":"https://dblp.org/rec/conf/mobiquitous/FeeneyLMOH08"}, "url":"URL#5398845" }, { "@score":"1", "@id":"5398846", "info":{"authors":{"author":[{"@pid":"69/3696","text":"Luigi Gallo"},{"@pid":"77/7787","text":"Aniello Minutolo"}]},"title":"A natural pointing technique for semi-immersive virtual environments.","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/GalloM08","doi":"10.4108/ICST.MOBIQUITOUS2008.3863","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.3863","url":"https://dblp.org/rec/conf/mobiquitous/GalloM08"}, "url":"URL#5398846" }, { "@score":"1", "@id":"5398847", "info":{"authors":{"author":{"@pid":"88/2603","text":"Glenn Geers"}},"title":"Some research questions for computational transportation science.","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/Geers08","doi":"10.4108/ICST.MOBIQUITOUS2008.3830","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.3830","url":"https://dblp.org/rec/conf/mobiquitous/Geers08"}, "url":"URL#5398847" }, { "@score":"1", "@id":"5398848", "info":{"authors":{"author":[{"@pid":"79/6078","text":"Betsy George"},{"@pid":"s/ShashiShekhar","text":"Shashi Shekhar"}]},"title":"SP-TAG: a routing algorithm in non-stationary transportation networks.","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/GeorgeS08","doi":"10.4108/ICST.MOBIQUITOUS2008.3887","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.3887","url":"https://dblp.org/rec/conf/mobiquitous/GeorgeS08"}, "url":"URL#5398848" }, { "@score":"1", "@id":"5398849", "info":{"authors":{"author":[{"@pid":"22/4128","text":"Laurent Gomez"},{"@pid":"41/5894","text":"Annett Laube"},{"@pid":"76/1060","text":"Vincent Ribière"},{"@pid":"66/2753","text":"Alessandro Sorniotti"},{"@pid":"10/7786","text":"Christophe Trefois"},{"@pid":"01/7787","text":"Marco Valente"},{"@pid":"92/5111","text":"Patrick Wetterwald"}]},"title":"Encryption-based access control for building management.","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/GomezLRSTVW08","doi":"10.4108/ICST.MOBIQUITOUS2008.4019","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.4019","url":"https://dblp.org/rec/conf/mobiquitous/GomezLRSTVW08"}, "url":"URL#5398849" }, { "@score":"1", "@id":"5398850", "info":{"authors":{"author":[{"@pid":"87/3082","text":"Gustavo Ramírez-González 0001"},{"@pid":"42/5533","text":"Mario Muñoz Organero"},{"@pid":"k/CarlosDelgadoKloos","text":"Carlos Delgado Kloos"},{"@pid":"69/7785","text":"Ángela Chantre Astaiza"}]},"title":"Exploring NFC interactive panel.","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/GonzalezOKA08","doi":"10.4108/ICST.MOBIQUITOUS2008.3948","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.3948","url":"https://dblp.org/rec/conf/mobiquitous/GonzalezOKA08"}, "url":"URL#5398850" }, { "@score":"1", "@id":"5398851", "info":{"authors":{"author":[{"@pid":"52/7787","text":"René Hansen"},{"@pid":"j/ChristianSJensen","text":"Christian S. Jensen"},{"@pid":"25/5521","text":"Bent Thomsen"},{"@pid":"71/5017","text":"Rico Wind"}]},"title":"Seamless indoor/outdoor positioning with streamspin.","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/HansenJTW08","doi":"10.4108/ICST.MOBIQUITOUS2008.4080","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.4080","url":"https://dblp.org/rec/conf/mobiquitous/HansenJTW08"}, "url":"URL#5398851" }, { "@score":"1", "@id":"5398852", "info":{"authors":{"author":[{"@pid":"99/1227","text":"James G. Haran"},{"@pid":"72/7166","text":"Abolfazl (Kouros) Mohammadian"},{"@pid":"47/6454","text":"Peter C. Nelson"}]},"title":"Intelligent traveler assistant (ITA) simulation platform design.","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/HaranMN08","doi":"10.4108/ICST.MOBIQUITOUS2008.3987","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.3987","url":"https://dblp.org/rec/conf/mobiquitous/HaranMN08"}, "url":"URL#5398852" }, { "@score":"1", "@id":"5398853", "info":{"authors":{"author":[{"@pid":"j/ChristianSJensen","text":"Christian S. Jensen"},{"@pid":"89/5778","text":"Dalia Tiesyte"}]},"title":"TransDB: GPS data management with applications in collective transport.","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/JensenT08","doi":"10.4108/ICST.MOBIQUITOUS2008.3890","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.3890","url":"https://dblp.org/rec/conf/mobiquitous/JensenT08"}, "url":"URL#5398853" }, { "@score":"1", "@id":"5398854", "info":{"authors":{"author":[{"@pid":"19/3966","text":"Glenn Judd"},{"@pid":"31/3878-12","text":"Xiaohui Wang 0012"},{"@pid":"06/4696","text":"Mei-Hsuan Lu"},{"@pid":"s/PeterSteenkiste","text":"Peter Steenkiste"}]},"title":"Using physical layer emulation to optimize and evaluate mobile and wireless systems.","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/JuddWLS08","doi":"10.4108/ICST.MOBIQUITOUS2008.3666","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.3666","url":"https://dblp.org/rec/conf/mobiquitous/JuddWLS08"}, "url":"URL#5398854" }, { "@score":"1", "@id":"5398855", "info":{"authors":{"author":[{"@pid":"28/2962","text":"Marko Jurmu"},{"@pid":"50/6403","text":"Sebastian Boring"},{"@pid":"49/3557","text":"Jukka Riekki"}]},"title":"ScreenSpot resource discovery for smart spaces and mobilevue media sharing application.","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/JurmuBR08","doi":"10.4108/ICST.MOBIQUITOUS2008.4095","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.4095","url":"https://dblp.org/rec/conf/mobiquitous/JurmuBR08"}, "url":"URL#5398855" }, { "@score":"1", "@id":"5398856", "info":{"authors":{"author":[{"@pid":"28/2962","text":"Marko Jurmu"},{"@pid":"50/6403","text":"Sebastian Boring"},{"@pid":"49/3557","text":"Jukka Riekki"}]},"title":"ScreenSpot: multidimensional resource discovery for distributed applications in smart spaces.","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/JurmuBR08a","doi":"10.4108/ICST.MOBIQUITOUS2008.3576","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.3576","url":"https://dblp.org/rec/conf/mobiquitous/JurmuBR08a"}, "url":"URL#5398856" }, { "@score":"1", "@id":"5398857", "info":{"authors":{"author":[{"@pid":"98/1826","text":"Fahim Kawsar"},{"@pid":"77/6979","text":"Tatsuo Nakajima"}]},"title":"End user tool for deploying smart object systems.","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/KawsarN08","doi":"10.4108/ICST.MOBIQUITOUS2008.4084","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.4084","url":"https://dblp.org/rec/conf/mobiquitous/KawsarN08"}, "url":"URL#5398857" }, { "@score":"1", "@id":"5398858", "info":{"authors":{"author":[{"@pid":"98/1826","text":"Fahim Kawsar"},{"@pid":"77/6979","text":"Tatsuo Nakajima"},{"@pid":"89/3593","text":"Kaori Fujinami"}]},"title":"A document centric approach for supporting incremental deployment of pervasive applications.","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/KawsarNF08","doi":"10.4108/ICST.MOBIQUITOUS2008.3584","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.3584","url":"https://dblp.org/rec/conf/mobiquitous/KawsarNF08"}, "url":"URL#5398858" }, { "@score":"1", "@id":"5398859", "info":{"authors":{"author":[{"@pid":"60/6179","text":"Sherif M. Khattab"},{"@pid":"m/DanielMosse","text":"Daniel Mossé"},{"@pid":"m/RamiGMelhem","text":"Rami G. Melhem"}]},"title":"Modeling of the channel-hopping anti-jamming defense in multi-radio wireless networks.","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/KhattabMM08","doi":"10.4108/ICST.MOBIQUITOUS2008.3604","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.3604","url":"https://dblp.org/rec/conf/mobiquitous/KhattabMM08"}, "url":"URL#5398859" }, { "@score":"1", "@id":"5398860", "info":{"authors":{"author":[{"@pid":"33/724","text":"Stephan Kopf"},{"@pid":"21/1921","text":"Thomas King"},{"@pid":"44/2046","text":"Philipp Bostan"},{"@pid":"86/3736","text":"Hendrik Lemelson"},{"@pid":"04/3285","text":"Sina Deibert"},{"@pid":"e/WEffelsberg","text":"Wolfgang Effelsberg"}]},"title":"Fundamental services for context-sensitive mobile applications.","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/KopfKBLDE08","doi":"10.4108/ICST.MOBIQUITOUS2008.3866","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.3866","url":"https://dblp.org/rec/conf/mobiquitous/KopfKBLDE08"}, "url":"URL#5398860" }, { "@score":"1", "@id":"5398861", "info":{"authors":{"author":[{"@pid":"40/3090","text":"Stefan Kraxberger"},{"@pid":"44/1656","text":"Udo Payer"},{"@pid":"21/5558","text":"Stefan Tillich"}]},"title":"General security concept for embedded P2P systems.","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/KraxbergerPT08","doi":"10.4108/ICST.MOBIQUITOUS2008.3892","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.3892","url":"https://dblp.org/rec/conf/mobiquitous/KraxbergerPT08"}, "url":"URL#5398861" }, { "@score":"1", "@id":"5398862", "info":{"authors":{"author":[{"@pid":"27/180","text":"Ralph Lange"},{"@pid":"20/6521","text":"Frank Dürr"},{"@pid":"r/KurtRothermel","text":"Kurt Rothermel"}]},"title":"Online trajectory data reduction using connection-preserving dead reckoning.","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/LangeDR08","doi":"10.4108/ICST.MOBIQUITOUS2008.3460","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.3460","url":"https://dblp.org/rec/conf/mobiquitous/LangeDR08"}, "url":"URL#5398862" }, { "@score":"1", "@id":"5398863", "info":{"authors":{"author":[{"@pid":"64/5295","text":"Yun-kyung Lee"},{"@pid":"11/5783","text":"Deok-Gyu Lee"},{"@pid":"67/2956","text":"Jong Wook Han"},{"@pid":"25/216","text":"Jeong-Nyeo Kim"}]},"title":"The home device authentication system construction for pervasive home network.","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/LeeLHK08","doi":"10.4108/ICST.MOBIQUITOUS2008.3858","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.3858","url":"https://dblp.org/rec/conf/mobiquitous/LeeLHK08"}, "url":"URL#5398863" }, { "@score":"1", "@id":"5398864", "info":{"authors":{"author":[{"@pid":"86/3736","text":"Hendrik Lemelson"},{"@pid":"21/1921","text":"Thomas King"},{"@pid":"e/WEffelsberg","text":"Wolfgang Effelsberg"}]},"title":"A study on user acceptance of error visualization techniques.","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/LemelsonKE08","doi":"10.4108/ICST.MOBIQUITOUS2008.3889","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.3889","url":"https://dblp.org/rec/conf/mobiquitous/LemelsonKE08"}, "url":"URL#5398864" }, { "@score":"1", "@id":"5398865", "info":{"authors":{"author":[{"@pid":"15/4504","text":"Jinsong Lin"},{"@pid":"08/7785","text":"Eusden Shing"},{"@pid":"65/7787","text":"Wing-Kai Chan"},{"@pid":"b/RBagrodia","text":"Rajive L. Bagrodia"}]},"title":"TMACS: type-based distributed middleware for mobile ad-hoc networks.","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/LinSCB08","doi":"10.4108/ICST.MOBIQUITOUS2008.3512","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.3512","url":"https://dblp.org/rec/conf/mobiquitous/LinSCB08"}, "url":"URL#5398865" }, { "@score":"1", "@id":"5398866", "info":{"authors":{"author":[{"@pid":"14/4886","text":"Tancred Lindholm"},{"@pid":"12/3970","text":"Jaakko Kangasharju"}]},"title":"How to edit gigabyte XML files on a mobile phone with XAS, RefTrees, and RAXS.","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/LindholmK08","doi":"10.4108/ICST.MOBIQUITOUS2008.3556","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.3556","url":"https://dblp.org/rec/conf/mobiquitous/LindholmK08"}, "url":"URL#5398866" }, { "@score":"1", "@id":"5398867", "info":{"authors":{"author":[{"@pid":"15/7785","text":"Julian Masuhr"},{"@pid":"94/5030","text":"Florian Klompmaker"},{"@pid":"11/4944","text":"Christian Reimann"},{"@pid":"36/4040","text":"Karsten Nebe"}]},"title":"Designing context-aware in-car information systems.","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/MasuhrKRN08","doi":"10.4108/ICST.MOBIQUITOUS2008.3637","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.3637","url":"https://dblp.org/rec/conf/mobiquitous/MasuhrKRN08"}, "url":"URL#5398867" }, { "@score":"1", "@id":"5398868", "info":{"authors":{"author":[{"@pid":"59/3562","text":"Kris McGlinn"},{"@pid":"21/2974","text":"Eleanor O'Neill"},{"@pid":"80/6593-1","text":"David Lewis 0001"}]},"title":"SimCon: a tool for modeling context sources for rapid evaluation of pervasive applications using virtual reality.","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/McGlinnOL08","doi":"10.4108/ICST.MOBIQUITOUS2008.4183","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.4183","url":"https://dblp.org/rec/conf/mobiquitous/McGlinnOL08"}, "url":"URL#5398868" }, { "@score":"1", "@id":"5398869", "info":{"authors":{"author":[{"@pid":"66/3908","text":"Muhammad Mostafa Monowar"},{"@pid":"84/4566","text":"Md. Obaidur Rahman"},{"@pid":"47/1713","text":"Al-Sakib Khan Pathan"},{"@pid":"73/1778","text":"Choong Seon Hong"}]},"title":"Congestion control protocol for wireless sensor networks handling prioritized heterogeneous traffic.","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/MonowarRPH08","doi":"10.4108/ICST.MOBIQUITOUS2008.3829","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.3829","url":"https://dblp.org/rec/conf/mobiquitous/MonowarRPH08"}, "url":"URL#5398869" }, { "@score":"1", "@id":"5398870", "info":{"authors":{"author":[{"@pid":"85/6629","text":"Jong Sik Moon"},{"@pid":"p/JongHyukPark","text":"Jong Hyuk Park"},{"@pid":"20/2771","text":"Im-Yeong Lee"}]},"title":"A study on authentication/authorization/accounting and roaming mechanism in pervasive environment.","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/MoonPL08","doi":"10.4108/ICST.MOBIQUITOUS2008.4161","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.4161","url":"https://dblp.org/rec/conf/mobiquitous/MoonPL08"}, "url":"URL#5398870" }, { "@score":"1", "@id":"5398871", "info":{"authors":{"author":[{"@pid":"66/4782","text":"Kyriacos C. Mouskos"},{"@pid":"76/32","text":"M. Ümit Uyar"},{"@pid":"92/5851","text":"Akira Kawaguchi"},{"@pid":"91/1693","text":"Neville Parker"}]},"title":"A real-time integrated transport/communication/database architecture to support traffic simulation.","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/MouskosUKP08","doi":"10.4108/ICST.MOBIQUITOUS2008.3955","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.3955","url":"https://dblp.org/rec/conf/mobiquitous/MouskosUKP08"}, "url":"URL#5398871" }, { "@score":"1", "@id":"5398872", "info":{"authors":{"author":[{"@pid":"58/1194","text":"Beom-Jin Park"},{"@pid":"79/771","text":"Bu-Geun Paik"},{"@pid":"51/1521","text":"Seong-Rak Cho"},{"@pid":"54/6380","text":"Dongkon Lee"},{"@pid":"13/7785","text":"Heejin Kang"},{"@pid":"94/4472","text":"Jin Choi"}]},"title":"Application of ubiquitous technology to ship environment.","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/ParkPCLKC08","doi":"10.4108/ICST.MOBIQUITOUS2008.3972","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.3972","url":"https://dblp.org/rec/conf/mobiquitous/ParkPCLKC08"}, "url":"URL#5398872" }, { "@score":"1", "@id":"5398873", "info":{"authors":{"author":[{"@pid":"69/6158","text":"Nearchos Paspallis"},{"@pid":"92/2856","text":"Konstantinos Kakousis"},{"@pid":"p/GeorgeAngelosPapadopoulos","text":"George A. Papadopoulos"}]},"title":"A multi-dimensional model enabling autonomic reasoning for context-aware pervasive applications.","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/PaspallisKP08","doi":"10.4108/ICST.MOBIQUITOUS2008.3848","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.3848","url":"https://dblp.org/rec/conf/mobiquitous/PaspallisKP08"}, "url":"URL#5398873" }, { "@score":"1", "@id":"5398874", "info":{"authors":{"author":[{"@pid":"96/1837","text":"Stacy Patterson"},{"@pid":"39/2286","text":"Bassam Bamieh"},{"@pid":"a/AmrElAbbadi","text":"Amr El Abbadi"},{"@pid":"26/6575","text":"Mihailo R. Jovanovic"}]},"title":"On the feasibility of large-scale automated highways.","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/PattersonBAJ08","doi":"10.4108/ICST.MOBIQUITOUS2008.3940","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.3940","url":"https://dblp.org/rec/conf/mobiquitous/PattersonBAJ08"}, "url":"URL#5398874" }, { "@score":"1", "@id":"5398875", "info":{"authors":{"author":[{"@pid":"53/3464","text":"Sarah Pennington"},{"@pid":"81/7616","text":"Adrian Waller"},{"@pid":"87/614","text":"Timothy Baugé"}]},"title":"RECOUP: efficient reconfiguration for wireless sensor networks.","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/PenningtonWB08","doi":"10.4108/ICST.MOBIQUITOUS2008.4049","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.4049","url":"https://dblp.org/rec/conf/mobiquitous/PenningtonWB08"}, "url":"URL#5398875" }, { "@score":"1", "@id":"5398876", "info":{"authors":{"author":[{"@pid":"44/1850","text":"Heiko Pfeffer"},{"@pid":"28/2309","text":"Steffen Krüssel"},{"@pid":"s/StephanSteglich","text":"Stephan Steglich"}]},"title":"Community multimedia cards: CoMu cards.","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/PfefferKS08","doi":"10.4108/ICST.MOBIQUITOUS2008.4192","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.4192","url":"https://dblp.org/rec/conf/mobiquitous/PfefferKS08"}, "url":"URL#5398876" }, { "@score":"1", "@id":"5398877", "info":{"authors":{"author":[{"@pid":"87/1696","text":"Fabio Pinelli"},{"@pid":"40/1533","text":"Anna Monreale"},{"@pid":"t/RobertoTrasarti","text":"Roberto Trasarti"},{"@pid":"g/FoscaGiannotti","text":"Fosca Giannotti"}]},"title":"Location prediction within the mobility data analysis environment DAEDALUS.","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/PinelliMTG08","doi":"10.4108/ICST.MOBIQUITOUS2008.3894","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.3894","url":"https://dblp.org/rec/conf/mobiquitous/PinelliMTG08"}, "url":"URL#5398877" }, { "@score":"1", "@id":"5398878", "info":{"authors":{"author":[{"@pid":"25/7786","text":"Gemma Power"},{"@pid":"87/913-1","text":"Christopher Foley 0001"},{"@pid":"56/2351","text":"Sasitharan Balasubramaniam"},{"@pid":"55/2436","text":"Dmitri Botvich"}]},"title":"An adaptive middleware applied to the ad-hoc nature of cardiac health care.","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/PowerFBB08","doi":"10.4108/ICST.MOBIQUITOUS2008.3882","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.3882","url":"https://dblp.org/rec/conf/mobiquitous/PowerFBB08"}, "url":"URL#5398878" }, { "@score":"1", "@id":"5398879", "info":{"authors":{"author":[{"@pid":"90/7508","text":"Upendra Rathnayake"},{"@pid":"83/6438","text":"Maximilian Ott"}]},"title":"Predicting network availability using user context.","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/RathnayakeO08","doi":"10.4108/ICST.MOBIQUITOUS2008.3563","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.3563","url":"https://dblp.org/rec/conf/mobiquitous/RathnayakeO08"}, "url":"URL#5398879" }, { "@score":"1", "@id":"5398880", "info":{"authors":{"author":[{"@pid":"53/3712","text":"Oriana Riva"},{"@pid":"74/799","text":"Josiane Nzouonta"},{"@pid":"69/87","text":"Cristian Borcea"}]},"title":"Context-aware fault tolerance in migratory services.","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/RivaNB08","doi":"10.4108/ICST.MOBIQUITOUS2008.3564","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.3564","url":"https://dblp.org/rec/conf/mobiquitous/RivaNB08"}, "url":"URL#5398880" }, { "@score":"1", "@id":"5398881", "info":{"authors":{"author":{"@pid":"r/MarcelCatalinRosu","text":"Marcel-Catalin Rosu"}},"title":"Accessing speech documents on smartphones.","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/Rosu08","doi":"10.4108/ICST.MOBIQUITOUS2008.3635","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.3635","url":"https://dblp.org/rec/conf/mobiquitous/Rosu08"}, "url":"URL#5398881" }, { "@score":"1", "@id":"5398882", "info":{"authors":{"author":[{"@pid":"51/7752","text":"Saguna"},{"@pid":"63/5509","text":"Prem Prakash Jayaraman"},{"@pid":"z/ArkadyBZaslavsky","text":"Arkady B. Zaslavsky"}]},"title":"Determining user presence using context in a decentralized unified messaging system (IPAD-UMS).","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/SagunaJZ08","doi":"10.4108/ICST.MOBIQUITOUS2008.3991","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.3991","url":"https://dblp.org/rec/conf/mobiquitous/SagunaJZ08"}, "url":"URL#5398882" }, { "@score":"1", "@id":"5398883", "info":{"authors":{"author":[{"@pid":"19/491","text":"Ahmet Sahan"},{"@pid":"14/6973","text":"Tatyana M. Yakhno"}]},"title":"A multi-agent traffic controller with distributed fuzzy intelligence.","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/SahanY08","doi":"10.4108/ICST.MOBIQUITOUS2008.3903","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.3903","url":"https://dblp.org/rec/conf/mobiquitous/SahanY08"}, "url":"URL#5398883" }, { "@score":"1", "@id":"5398884", "info":{"authors":{"author":[{"@pid":"14/2562","text":"Danny Soroker"},{"@pid":"77/3245","text":"Y. S. Paik"},{"@pid":"25/393","text":"Y. S. Moon"},{"@pid":"43/2291","text":"Scott McFaddin"},{"@pid":"91/3542","text":"Chandrasekhar Narayanaswami 0001"},{"@pid":"08/385","text":"H. K. Jang"},{"@pid":"20/4240","text":"Daniel M. Coffman"},{"@pid":"18/3101","text":"M. C. Lee"},{"@pid":"50/2786","text":"J. K. Lee"},{"@pid":"04/2634","text":"J. W. Park"}]},"title":"User-driven visual mashups in interactive public spaces.","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/SorokerPMMNJCLLP08","doi":"10.4108/ICST.MOBIQUITOUS2008.3461","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.3461","url":"https://dblp.org/rec/conf/mobiquitous/SorokerPMMNJCLLP08"}, "url":"URL#5398884" }, { "@score":"1", "@id":"5398885", "info":{"authors":{"author":[{"@pid":"11/5284","text":"Han Chiang Tan"},{"@pid":"80/5903","text":"Jun Wen Wong"},{"@pid":"z/JianyingZhou","text":"Jianying Zhou 0001"}]},"title":"Implementation and performance analysis for key divergent and evolution protocols in wireless sensor network.","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/TanWZ08","doi":"10.4108/ICST.MOBIQUITOUS2008.3856","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.3856","url":"https://dblp.org/rec/conf/mobiquitous/TanWZ08"}, "url":"URL#5398885" }, { "@score":"1", "@id":"5398886", "info":{"authors":{"author":[{"@pid":"30/7785","text":"Claudio Vairo"},{"@pid":"40/4691","text":"Michele Albano"},{"@pid":"74/5008","text":"Stefano Chessa"}]},"title":"A secure middleware for wireless sensor networks.","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/VairoAC08","doi":"10.4108/ICST.MOBIQUITOUS2008.3888","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.3888","url":"https://dblp.org/rec/conf/mobiquitous/VairoAC08"}, "url":"URL#5398886" }, { "@score":"1", "@id":"5398887", "info":{"authors":{"author":[{"@pid":"32/1022","text":"Gennaro Della Vecchia"},{"@pid":"69/3473","text":"Massimo Esposito"}]},"title":"An RFID-based application for handling the workflow of radioactive patients in a nuclear medicine department.","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/VecchiaE08","doi":"10.4108/ICST.MOBIQUITOUS2008.3852","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.3852","url":"https://dblp.org/rec/conf/mobiquitous/VecchiaE08"}, "url":"URL#5398887" }, { "@score":"1", "@id":"5398888", "info":{"authors":{"author":[{"@pid":"14/63","text":"Long H. Vu"},{"@pid":"45/3224","text":"Klara Nahrstedt"},{"@pid":"95/1816","text":"Matthias Hollick"}]},"title":"Exploiting Schelling behavior for improving data accessibility in mobile peer-to-peer networks.","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/VuNH08","doi":"10.4108/ICST.MOBIQUITOUS2008.4193","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.4193","url":"https://dblp.org/rec/conf/mobiquitous/VuNH08"}, "url":"URL#5398888" }, { "@score":"1", "@id":"5398889", "info":{"authors":{"author":[{"@pid":"41/7166","text":"Chad A. Williams"},{"@pid":"72/7166","text":"Abolfazl (Kouros) Mohammadian"},{"@pid":"47/6454","text":"Peter C. Nelson"},{"@pid":"27/7787","text":"Sean T. Doherty"}]},"title":"Mining sequential association rules for traveler context prediction.","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/WilliamsMND08","doi":"10.4108/ICST.MOBIQUITOUS2008.3867","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.3867","url":"https://dblp.org/rec/conf/mobiquitous/WilliamsMND08"}, "url":"URL#5398889" }, { "@score":"1", "@id":"5398890", "info":{"authors":{"author":[{"@pid":"15/1266","text":"Tetsuo Yamabe"},{"@pid":"27/1588","text":"Kiyotaka Takahashi"},{"@pid":"77/6979","text":"Tatsuo Nakajima"}]},"title":"Demonstration of a mobility-enhanced pedestrian navigation on mobile devices.","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/YamabeTN08","doi":"10.4108/ICST.MOBIQUITOUS2008.4194","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.4194","url":"https://dblp.org/rec/conf/mobiquitous/YamabeTN08"}, "url":"URL#5398890" }, { "@score":"1", "@id":"5398891", "info":{"authors":{"author":[{"@pid":"15/1266","text":"Tetsuo Yamabe"},{"@pid":"27/1588","text":"Kiyotaka Takahashi"},{"@pid":"77/6979","text":"Tatsuo Nakajima"}]},"title":"Towards mobility oriented interaction design: experiments in pedestrian navigation on mobile devices.","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/YamabeTN08a","doi":"10.4108/ICST.MOBIQUITOUS2008.3495","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.3495","url":"https://dblp.org/rec/conf/mobiquitous/YamabeTN08a"}, "url":"URL#5398891" }, { "@score":"1", "@id":"5398892", "info":{"authors":{"author":[{"@pid":"03/9964-1","text":"Shiqi Zhang 0001"},{"@pid":"00/4572","text":"Chun Yuan"},{"@pid":"04/3348","text":"Yan Zhang"}]},"title":"Handwritten character recognition using orientation quantization based on 3D accelerometer.","venue":"MobiQuitous","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/mobiquitous/ZhangYZ08","doi":"10.4108/ICST.MOBIQUITOUS2008.3898","ee":"https://doi.org/10.4108/ICST.MOBIQUITOUS2008.3898","url":"https://dblp.org/rec/conf/mobiquitous/ZhangYZ08"}, "url":"URL#5398892" }, { "@score":"1", "@id":"5430689", "info":{"authors":{"author":{"@pid":"c/VCahill","text":"Vinny Cahill"}},"title":"5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services, MobiQuitous 2008, July 21-25, 2008, Dublin, Ireland","venue":"MobiQuitous","publisher":"ICST / ACM","year":"2008","type":"Editorship","key":"conf/mobiquitous/2008","ee":"http://eudl.eu/proceedings/MOBIQUITOUS/2008","url":"https://dblp.org/rec/conf/mobiquitous/2008"}, "url":"URL#5430689" } ] } } } )