• Gibb R, Madhavapeddy A and Crowcroft J. Where on Earth is the Spatial Name System?. Proceedings of the 22nd ACM Workshop on Hot Topics in Networks. (79-86).

    https://doi.org/10.1145/3626111.3628210

  • Tusa F, Griffin D and Rio M. (2023). DNS++: Dynamic Name Resolution with Homomorphic Encryption Based Privacy 2023 32nd International Conference on Computer Communications and Networks (ICCCN). 10.1109/ICCCN58024.2023.10230137. 979-8-3503-3618-4. (1-7).

    https://ieeexplore.ieee.org/document/10230137/

  • Zhang Z, Yu T, Ma X, Guan Y, Moll P and Zhang L. Sovereign: Self-Contained Smart Home With Data-Centric Network and Security. IEEE Internet of Things Journal. 10.1109/JIOT.2022.3144980. 9:15. (13808-13822).

    https://ieeexplore.ieee.org/document/9687833/

  • Kim J, Kim H and Rexford J. Analyzing Traffic by Domain Name in the Data Plane. Proceedings of the ACM SIGCOMM Symposium on SDN Research (SOSR). (1-12).

    https://doi.org/10.1145/3482898.3483357

  • Saputra Y, Hua J, Wendt N, Julien C and Roman G. Warble. Proceedings of the 6th International Conference on Mobile Software Engineering and Systems. (128-139).

    /doi/10.5555/3340730.3340755

  • Saputra Y, Hua J, Wendt N, Julien C and Roman G. (2019). WARBLE: Programming Abstractions for Personalizing Interactions in the Internet of Things 2019 IEEE/ACM 6th International Conference on Mobile Software Engineering and Systems (MOBILESoft). 10.1109/MOBILESoft.2019.00026. 978-1-7281-3395-9. (128-139).

    https://ieeexplore.ieee.org/document/8816980/

  • Widener P, Ulmer C, Levy S, Kordenbrock T and Templet G. (2019). Mediating Data Center Storage Diversity in HPC Applications with FAODEL. High Performance Computing. 10.1007/978-3-030-34356-9_22. (275-287).

    http://link.springer.com/10.1007/978-3-030-34356-9_22

  • Wang L, Zhang Z, Dong M, Wang L, Cao Z and Yang Y. Securing Named Data Networking: Attribute-Based Encryption and Beyond. IEEE Communications Magazine. 10.1109/MCOM.2018.1701123. 56:11. (76-81).

    https://ieeexplore.ieee.org/document/8539025/

  • Daud M, Khan Q and Saleem Y. (2017). A study of key technologies for IoT and associated security challenges 2017 International Symposium on Wireless Systems and Networks (ISWSN). 10.1109/ISWSN.2017.8250042. 978-1-5386-1556-0. (1-6).

    http://ieeexplore.ieee.org/document/8250042/

  • Pramod M and Shivashankar . (2017). Routing in EEDR routing protocol for wireless sensor networks 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT). 10.1109/RTEICT.2017.8256838. 978-1-5090-3704-9. (1453-1457).

    http://ieeexplore.ieee.org/document/8256838/

  • Basu P. (2016). K-anycasting strategies in networks: To grow or to prune? MILCOM 2016 - 2016 IEEE Military Communications Conference (MILCOM). 10.1109/MILCOM.2016.7795394. 978-1-5090-3781-0. (606-611).

    http://ieeexplore.ieee.org/document/7795394/

  • Chen J, Arumaithurai M, Fu X and Ramakrishnan K. CNS. Proceedings of the 3rd ACM Conference on Information-Centric Networking. (122-131).

    https://doi.org/10.1145/2984356.2984368

  • Anand A, Balachandran A, Akella A, Sekar V and Seshan S. (2016). Enhancing video accessibility and availability using information-bound references. IEEE/ACM Transactions on Networking. 24:2. (1223-1236). Online publication date: 1-Apr-2016.

    https://doi.org/10.1109/TNET.2015.2413352

  • (2015). A survey of identifier-locator split addressing architectures. Computer Science Review. 17:C. (25-42). Online publication date: 1-Aug-2015.

    https://doi.org/10.1016/j.cosrev.2015.04.002

  • Donovan S and Feamster N. Intentional Network Monitoring. Proceedings of the 13th ACM Workshop on Hot Topics in Networks. (1-7).

    https://doi.org/10.1145/2670518.2673872

  • Surobhi N and Jamalipour A. (2014). A MANET-based semantic traffic management framework for ubiquitous public safety networks. Wireless Communications & Mobile Computing. 14:12. (1127-1142). Online publication date: 25-Aug-2014.

    https://doi.org/10.1002/wcm.2259

  • Nordström E, Rohner C and Gunningberg P. (2014). Haggle: Opportunistic mobile content sharing using search. Computer Communications. 10.1016/j.comcom.2014.03.017. 48. (121-132). Online publication date: 1-Jul-2014.

    https://linkinghub.elsevier.com/retrieve/pii/S0140366414001030

  • Zhygmanovskyi A and Yoshida N. (2014). Cloud Service Provisioning Based on Peer-to-Peer Network for Flexible Service Sharing and Discovery. Journal of Computer and Communications. 10.4236/jcc.2014.210003. 02:10. (17-31).

    http://www.scirp.org/journal/doi.aspx?DOI=10.4236/jcc.2014.210003

  • NGUYEN H, TAN Y and SHINODA Y. (2014). D-AVTree: DHT-Based Search System to Support Scalable Multi-Attribute Queries. IEICE Transactions on Communications. 10.1587/transcom.E97.B.1898. E97.B:9. (1898-1909).

    http://jlc.jst.go.jp/DN/JST.JSTAGE/transcom/E97.B.1898?lang=en&from=CrossRef&type=abstract

  • Margara A and Cugola G. (2014). High-Performance Publish-Subscribe Matching Using Parallel Hardware. IEEE Transactions on Parallel and Distributed Systems. 25:1. (126-135). Online publication date: 1-Jan-2014.

    https://doi.org/10.1109/TPDS.2013.39

  • Anand A, Balachandran A, Akella A, Sekar V and Seshan S. Enhancing video accessibility and availability using information-bound references. Proceedings of the ninth ACM conference on Emerging networking experiments and technologies. (345-356).

    https://doi.org/10.1145/2535372.2535393

  • Wang Y, Dai H, Zhang T, Meng W, Fan J and Liu B. (2013). GPU-accelerated name lookup with component encoding. Computer Networks: The International Journal of Computer and Telecommunications Networking. 57:16. (3165-3177). Online publication date: 1-Nov-2013.

    https://doi.org/10.1016/j.comnet.2013.07.006

  • Yaxiong Zhao , Jie Wu , Cong Liu and Mingming Lu . (2013). A hierarchical naming system for scalable content distribution in large networks 2013 IEEE Wireless Communications and Networking Conference (WCNC). 10.1109/WCNC.2013.6555348. 978-1-4673-5939-9. (4771-4776).

    http://ieeexplore.ieee.org/document/6555348/

  • Raychoudhury V, Cao J, Kumar M and Zhang D. (2013). Middleware for pervasive computing. Pervasive and Mobile Computing. 9:2. (177-200). Online publication date: 1-Apr-2013.

    https://doi.org/10.1016/j.pmcj.2012.08.006

  • Thompson M and Midkiff S. (2013). Service description and dissemination for service discovery in pervasive computing environments. International Journal of Ad Hoc and Ubiquitous Computing. 12:4. (193-204). Online publication date: 1-Mar-2013.

    https://doi.org/10.1504/IJAHUC.2013.052862

  • Kumar P, Chauhan N, Awasthi L and Chand N. Enhancing Data Availability in MANETs with Cooperative Caching. Contemporary Challenges and Solutions for Mobile and Multimedia Technologies. 10.4018/978-1-4666-2163-3.ch017. (271-285).

    http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-2163-3.ch017

  • Chen L, Wang S, Sun Z, Yan C and Rao H. (2013). The Design and Implementation of a DTN Naming System. Advances in Computational Science, Engineering and Information Technology. 10.1007/978-3-319-00951-3_22. (221-229).

    https://link.springer.com/10.1007/978-3-319-00951-3_22

  • Petz A, Lindgren A, Hui P and Julien C. MADServer. Proceedings of the seventh ACM international workshop on Challenged networks. (17-22).

    https://doi.org/10.1145/2348616.2348621

  • Zhu F, Zhu W, Mutka M and Ni L. Service Discovery Architecture and Protocol Design for Pervasive Computing. Advanced Design Approaches to Emerging Software Systems. 10.4018/978-1-60960-735-7.ch005. (83-101).

    http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60960-735-7.ch005

  • Fu Youming , Chen Jun , Hu Ruimin and Wang Zhongyuan . (2011). An improved range query algorithm on over-DHT based P2P network 2011 International Conference on Computer Science and Network Technology (ICCSNT). 10.1109/ICCSNT.2011.6182395. 978-1-4577-1587-7. (2117-2121).

    http://ieeexplore.ieee.org/document/6182395/

  • Banavar G, Cohen N and Soroker D. (2011). Pervasive Application Development. Pervasive Communications Handbook. 10.1201/b11271-23. (1-18). Online publication date: 14-Nov-2011.

    http://www.crcnetbase.com/doi/10.1201/b11271-23

  • Chauhan N, Chand N, Kumar P and Awasthi L. (2011). Enhancing Data Availability in MANETs with Cooperative Caching. International Journal of Mobile Computing and Multimedia Communications. 3:4. (53-66). Online publication date: 1-Oct-2011.

    https://doi.org/10.4018/jmcmc.2011100104

  • Fu Y, Hu R, Chen J, Wang Z and Tian G. An improved lookup algorithm on over-DHT paradigm based P2P network. Proceedings of the 2011 international conference on Web information systems and mining - Volume Part I. (200-207).

    /doi/10.5555/2045561.2045591

  • Fernandez S, Gualda D, Garcia J, Garcia J, Urena J and Gutierrez R. (2011). Indoor location system based on ZigBee devices and Metric Description Graphs 2011 IEEE 7th International Symposium on Intelligent Signal Processing - (WISP 2011). 10.1109/WISP.2011.6051706. 978-1-4577-1403-0. (1-5).

    http://ieeexplore.ieee.org/document/6051706/

  • Margara A and Cugola G. High performance content-based matching using GPUs. Proceedings of the 5th ACM international conference on Distributed event-based system. (183-194).

    https://doi.org/10.1145/2002259.2002285

  • Koponen T, Shenker S, Balakrishnan H, Feamster N, Ganichev I, Ghodsi A, Godfrey P, McKeown N, Parulkar G, Raghavan B, Rexford J, Arianfar S and Kuptsov D. (2011). Architecting for innovation. ACM SIGCOMM Computer Communication Review. 41:3. (24-36). Online publication date: 5-Jul-2011.

    https://doi.org/10.1145/2002250.2002256

  • Zhu F and Kulkarni A. (2011). DynamicSD: Discover Dynamic and Uncertain Services in Pervasive Computing Environments 2011 20th International Conference on Computer Communications and Networks - ICCCN 2011. 10.1109/ICCCN.2011.6005929. 978-1-4577-0637-0. (1-8).

    http://ieeexplore.ieee.org/document/6005929/

  • Zhu J and Zhang Y. (2011). Towards Accountable Mobility Model: A Language Approach on User Behavior Modeling in Office WLAN 2011 20th International Conference on Computer Communications and Networks - ICCCN 2011. 10.1109/ICCCN.2011.6005738. 978-1-4577-0637-0. (1-6).

    http://ieeexplore.ieee.org/document/6005738/

  • Hasan C, Adibuzzaman M, Kawsar F, Haque M and Ahamed S. PryGuard. Proceedings of the 24th international conference on Industrial engineering and other applications of applied intelligent systems conference on Modern approaches in applied intelligence - Volume Part I. (135-145).

    /doi/10.5555/2025756.2025774

  • Ucan E and Roscoe T. Dexferizer. Proceedings of the Nineteenth International Workshop on Quality of Service. (1-9).

    /doi/10.5555/1996039.1996077

  • Cao J, Siebert J and Raychoudhury V. (2011). Service Management in Pervasive Computing Environments. Pervasive Computing and Networking. 10.1002/9781119970422.ch5. (51-70). Online publication date: 3-Jun-2011.

    https://onlinelibrary.wiley.com/doi/10.1002/9781119970422.ch5

  • Ucan E and Roscoe T. (2011). Dexferizer: A service for data transfer optimization 2011 IEEE 19th International Workshop on Quality of Service (IWQoS). 10.1109/IWQOS.2011.5931343. 978-1-4577-0104-7. (1-9).

    http://ieeexplore.ieee.org/document/5931343/

  • Kim C, Caesar M and Rexford J. (2011). SEATTLE. ACM Transactions on Computer Systems. 29:1. (1-35). Online publication date: 1-Feb-2011.

    https://doi.org/10.1145/1925109.1925110

  • Zhu F and Zhu W. Secure and Private Service Discovery in Pervasive Computing Environments. Applied Cryptography for Cyber Security and Defense. 10.4018/978-1-61520-783-1.ch010. (229-243).

    http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61520-783-1.ch010

  • Agarwal A and Gupta A. Self-Configuration and Administration of Wireless Grids. Cloud, Grid and High Performance Computing. 10.4018/978-1-60960-603-9.ch016. (255-268).

    http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60960-603-9.ch016

  • Zhu F and Zhu W. Secure and Private Service Discovery in Pervasive Computing Environments. Security and Privacy Assurance in Advancing Technologies. 10.4018/978-1-60960-200-0.ch018. (295-309).

    http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60960-200-0.ch018

  • Ahmed R and Boutaba R. A Survey of Distributed Search Techniques in Large Scale Distributed Systems. IEEE Communications Surveys & Tutorials. 10.1109/SURV.2011.040410.00097. 13:2. (150-167).

    http://ieeexplore.ieee.org/document/5473882/

  • Yamamura S, Nagata A, Tsuru M and Tamura H. (2011). Virtual segment: Store–carry–forward relay-based support for wide-area non-real-time data exchange. Simulation Modelling Practice and Theory. 10.1016/j.simpat.2010.06.015. 19:1. (30-46). Online publication date: 1-Jan-2011.

    https://linkinghub.elsevier.com/retrieve/pii/S1569190X1000136X

  • Fu Y, Hu R, Chen J, Wang Z and Tian G. (2011). An Improved Lookup Algorithm on Over-DHT Paradigm Based P2P Network. Web Information Systems and Mining. 10.1007/978-3-642-23971-7_27. (200-207).

    http://link.springer.com/10.1007/978-3-642-23971-7_27

  • García K, Mendoza S, Decouchant D, Rodríguez J and Mateos Papis A. (2011). Resource Discovery for Supporting Ubiquitous Collaborative Work. Digital Information and Communication Technology and Its Applications. 10.1007/978-3-642-22027-2_51. (614-628).

    http://link.springer.com/10.1007/978-3-642-22027-2_51

  • Hasan C, Adibuzzaman M, Kawsar F, Haque M and Ahamed S. (2011). PryGuard: A Secure Distributed Authentication Protocol for Pervasive Computing Environment. Modern Approaches in Applied Intelligence. 10.1007/978-3-642-21822-4_15. (135-145).

    http://link.springer.com/10.1007/978-3-642-21822-4_15

  • Elwahsh H, Hashem M and Amin M. (2011). Secure Service Discovery Protocols for Ad Hoc Networks. Advances in Computer Science and Information Technology. 10.1007/978-3-642-17857-3_15. (147-157).

    http://link.springer.com/10.1007/978-3-642-17857-3_15

  • Shao D, Gopinath D, Khurshid S and Perry D. Optimizing Incremental Scope-Bounded Checking with Data-Flow Analysis. Proceedings of the 2010 IEEE 21st International Symposium on Software Reliability Engineering. (408-417).

    https://doi.org/10.1109/ISSRE.2010.27

  • Anand A, Akella A, Sekar V and Seshan S. A case for information-bound referencing. Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks. (1-6).

    https://doi.org/10.1145/1868447.1868451

  • Sousa J, Tzeremes V and El Masri A. (2010). Space-aware TeC: End-user development of safety and control systems for smart spaces 2010 IEEE International Conference on Systems, Man and Cybernetics - SMC. 10.1109/ICSMC.2010.5641950. 978-1-4244-6586-6. (2914-2921).

    http://ieeexplore.ieee.org/document/5641950/

  • Zhu F, Mutka M, Bivalkar A, Demir A, Lu Y and Chidambarm C. (2010). Toward secure and private service discovery anywhere anytime. Frontiers of Computer Science in China. 4:3. (311-323). Online publication date: 1-Sep-2010.

    https://doi.org/10.1007/s11704-010-0389-4

  • Liang C and Xu K. (2010). A new structure of distributed mobile society 2010 IEEE 2nd Symposium on Web Society (SWS). 10.1109/SWS.2010.5607396. 978-1-4244-6356-5.

    http://ieeexplore.ieee.org/document/5607396/

  • Zhu F and Zhu W. (2010). Secure and Private Service Discovery in Pervasive Computing Environments. International Journal of Advanced Pervasive and Ubiquitous Computing. 2:3. (46-59). Online publication date: 1-Jul-2010.

    https://doi.org/10.4018/japuc.2010070104

  • Cugola G and Migliavacca M. MultiCaR. Proceedings of the The IEEE symposium on Computers and Communications. (570-576).

    https://doi.org/10.1109/ISCC.2010.5546718

  • Uzuncaova E, Khurshid S and Batory D. (2010). Incremental Test Generation for Software Product Lines. IEEE Transactions on Software Engineering. 36:3. (309-322). Online publication date: 1-May-2010.

    https://doi.org/10.1109/TSE.2010.30

  • Anwar F, Raza M, Yoo S and Kim K. (2010). ENUM Based Service Discovery Architecture for 6LoWPAN Networking Conference (WCNC). 10.1109/WCNC.2010.5506568. 978-1-4244-6396-1. (1-6).

    http://ieeexplore.ieee.org/document/5506568/

  • Chuah M, Roy S and Stoev I. Secure descriptive message dissemination in DTNs. Proceedings of the Second International Workshop on Mobile Opportunistic Networking. (79-85).

    https://doi.org/10.1145/1755743.1755758

  • Uzuncaova E, Uzuncaova E, Khurshid S, Khurshid S, Batory D and Batory D. Incremental Test Generation for Software Product Lines. IEEE Transactions on Software Engineering. 10.1109/TSE.2010.29.

    http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5416727

  • Martins J and Duarte S. (2010). Routing algorithms for content-based publish/subscribe systems. IEEE Communications Surveys & Tutorials. 12:1. (39-58). Online publication date: 1-Jan-2010.

    https://doi.org/10.1109/SURV.2010.020110.00065

  • Babar S, Mahalle P, Stango A, Prasad N and Prasad R. (2010). Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT). Recent Trends in Network Security and Applications. 10.1007/978-3-642-14478-3_42. (420-429).

    http://link.springer.com/10.1007/978-3-642-14478-3_42

  • Schiele G, Handte M and Becker C. (2010). Pervasive Computing Middleware. Handbook of Ambient Intelligence and Smart Environments. 10.1007/978-0-387-93808-0_8. (201-227).

    https://link.springer.com/10.1007/978-0-387-93808-0_8

  • Ahmed R and Boutaba R. (2010). Distributed Search and Pattern Matching. Handbook of Peer-to-Peer Networking. 10.1007/978-0-387-09751-0_16. (427-461).

    https://link.springer.com/10.1007/978-0-387-09751-0_16

  • Nguyen H, Nguyen T and Pham T. (2009). SMAV: A solution for multiple-attribute search on DHT-based P2P network 2009 International Conference on Advanced Technologies for Communications (ATC). 10.1109/ATC.2009.5349557. 978-1-4244-5139-5. (187-190).

    http://ieeexplore.ieee.org/document/5349557/

  • Mendoza S, Gomez V, Navarrete M, Decouchant D, Garcia K, Olague G and Rodriguez J. Area-Based Collaborative Ubiquitous Work within Organizational Environments. Proceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology - Volume 01. (140-144).

    https://doi.org/10.1109/WI-IAT.2009.28

  • Gómez V, Mendoza S, Decouchant D and Rodríguez J. Nomadic user interaction/cooperation within autonomous areas. Proceedings of the 15th international conference on Groupware: design, implementation, and use. (32-40).

    /doi/10.5555/1813962.1813966

  • Ruiz D, Urena J, Gude I, Villadangos J, Garcia J, Perez C and Garcia E. (2009). New iterative algorithm for hyperbolic positioning used in an Ultrasonic Local Positioning System 2009 IEEE 14th International Conference on Emerging Technologies & Factory Automation. ETFA 2009. 10.1109/ETFA.2009.5347237. 978-1-4244-2727-7. (1-4).

    http://ieeexplore.ieee.org/document/5347237/

  • Ruiz J, de Andres D and Gil P. (2009). Design and deployment of a generic ECC-based fault tolerance mechanism for embedded HW cores 2009 IEEE 14th International Conference on Emerging Technologies & Factory Automation. ETFA 2009. 10.1109/ETFA.2009.5347151. 978-1-4244-2727-7. (1-8).

    http://ieeexplore.ieee.org/document/5347151/

  • Kopena J, Regli W and Loo B. Message models and aggregation in knowledge based middleware for rich sensor systems. Proceedings of the Sixth International Workshop on Data Management for Sensor Networks. (1-6).

    https://doi.org/10.1145/1594187.1594203

  • Xu W, Xin Y, Lu G and Chen Q. A new service description, matching and selection mechanism for pervasive computing. Proceedings of the 6th international conference on Fuzzy systems and knowledge discovery - Volume 4. (509-514).

    /doi/10.5555/1800875.1800985

  • Zhu F and Zhu W. (2009). Secure and Private Service Discovery in Pervasive Computing Environments. International Journal of Information Security and Privacy. 10.4018/jisp.2009100706. 3:3. (107-122). Online publication date: 1-Jul-2009.

    https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jisp.2009100706

  • Moreno-Vozmediano R. (2009). A hybrid mechanism for resource/service discovery in ad-hoc grids. Future Generation Computer Systems. 25:7. (717-727). Online publication date: 1-Jul-2009.

    https://doi.org/10.1016/j.future.2008.02.002

  • Tjiong M and Lukkien J. On the False-Positive and False-Negative Behavior of a Soft-State Signaling Protocol. Proceedings of the 2009 International Conference on Advanced Information Networking and Applications. (971-979).

    https://doi.org/10.1109/AINA.2009.130

  • Goodell G, Roussopoulos M and Bradner S. (2009). A directory service for perspective access networks. IEEE/ACM Transactions on Networking. 17:2. (501-514). Online publication date: 1-Apr-2009.

    https://doi.org/10.1109/TNET.2009.2016389

  • Zhou D and Gao J. (2009). Opportunistic Processing and Query of Motion Trajectories in Wireless Sensor Networks 2009 Proceedings IEEE INFOCOM. 10.1109/INFCOM.2009.5062033. 978-1-4244-3512-8. (1197-1205).

    http://ieeexplore.ieee.org/document/5062033/

  • Ahamed S and Sharmin M. (2008). A trust-based secure service discovery (TSSD) model for pervasive computing. Computer Communications. 31:18. (4281-4293). Online publication date: 1-Dec-2008.

    https://doi.org/10.1016/j.comcom.2008.07.014

  • Pierson J and Satoh I. (2008). A visual framework for deploying and managing context‐aware services. International Journal of Pervasive Computing and Communications. 10.1108/17427370810932169. 4:4. (411-427). Online publication date: 21-Nov-2008.

    http://www.emeraldinsight.com/doi/10.1108/17427370810932169

  • Uzuncaova E, Garcia D, Khurshid S and Batory D. Testing Software Product Lines Using Incremental Test Generation. Proceedings of the 2008 19th International Symposium on Software Reliability Engineering. (249-258).

    https://doi.org/10.1109/ISSRE.2008.56

  • Basu P, Krishnan R and Brown D. (2008). Persistent delivery with deferred binding to descriptively named destinations MILCOM 2008 - 2008 IEEE Military Communications Conference (MILCOM). 10.1109/MILCOM.2008.4753335. 978-1-4244-2676-8. (1-8).

    http://ieeexplore.ieee.org/document/4753335/

  • Zhu Y, An L and Liu S. A Resource Discovery Method of Grid Based on Resource Classification. Proceedings of the 2008 First International Conference on Intelligent Networks and Intelligent Systems. (716-719).

    https://doi.org/10.1109/ICINIS.2008.67

  • Kim C, Caesar M and Rexford J. (2008). Floodless in seattle. ACM SIGCOMM Computer Communication Review. 38:4. (3-14). Online publication date: 1-Oct-2008.

    https://doi.org/10.1145/1402946.1402961

  • Gu X, Shi H and Ye J. (2008). A Hierarchical Service Discovery Framework for Ubiquitous Computing 2008 Third International Conference on Pervasive Computing and Applications (ICPCA). 10.1109/ICPCA.2008.4783599. 978-1-4244-2020-9. (307-312).

    http://ieeexplore.ieee.org/document/4783599/

  • Crowcroft J, Yoneki E, Hui P and Henderson T. (2008). Promoting tolerance for delay tolerant network research. ACM SIGCOMM Computer Communication Review. 38:5. (63-68). Online publication date: 30-Sep-2008.

    https://doi.org/10.1145/1452335.1452345

  • Lee G, Lee S, Choi K and Shin D. Design of CALM-Based Service Discovery System. Proceedings of the 2008 Fourth International Conference on Networked Computing and Advanced Information Management - Volume 01. (280-285).

    https://doi.org/10.1109/NCM.2008.235

  • Kim C, Caesar M and Rexford J. Floodless in seattle. Proceedings of the ACM SIGCOMM 2008 conference on Data communication. (3-14).

    https://doi.org/10.1145/1402958.1402961

  • Jurmu M, Boring S and Riekki J. ScreenSpot. Proceedings of the 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services. (1-9).

    https://doi.org/10.4108/ICST.MOBIQUITOUS2008.3576

  • Lin J, Shing E, Chan W and Bagrodia R. TMACS. Proceedings of the 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services. (1-12).

    https://doi.org/10.4108/ICST.MOBIQUITOUS2008.3512

  • Alvi A and Greaves D. Checkable Domain Management with Ontology and Rules. Proceedings of the 2008 Third International Conference on Internet and Web Applications and Services. (142-149).

    https://doi.org/10.1109/ICIW.2008.65

  • Fall K and Farrell S. (2008). DTN. IEEE Journal on Selected Areas in Communications. 26:5. (828-836). Online publication date: 1-Jun-2008.

    https://doi.org/10.1109/JSAC.2008.080609

  • Malik M, Pervaiz A, Uzuncaova E and Khurshid S. Deryaft. Proceedings of the 30th international conference on Software engineering. (859-862).

    https://doi.org/10.1145/1368088.1368223

  • Haque M and Ahamed S. (2008). An Impregnable Lightweight Device Discovery (ILDD) Model for the Pervasive Computing Environment of Enterprise Applications. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews. 38:3. (334-346). Online publication date: 1-May-2008.

    https://doi.org/10.1109/TSMCC.2008.919182

  • Parno B, Perrig A and Andersen D. SNAPP. Proceedings of the 2008 ACM symposium on Information, computer and communications security. (168-178).

    https://doi.org/10.1145/1368310.1368336

  • Paluska J, Pham H, Saif U, Chau G, Terman C and Ward S. Structured Decomposition of Adaptive Applications. Proceedings of the 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications. (1-10).

    https://doi.org/10.1109/PERCOM.2008.55

  • Frank K, Suraci V and Mitic J. Personalizable Service Discovery in Pervasive Systems. Proceedings of the Fourth International Conference on Networking and Services. (182-187).

    https://doi.org/10.1109/ICNS.2008.21

  • Poutievski L, Calvert K and Griffioen J. Routing and forwarding with flexible addressing. Journal of Communications and Networks. 10.1109/JCN.2007.6182873. 9:4. (383-393).

    https://ieeexplore.ieee.org/document/6182873/

  • De Pellegrini F, Miorandi D, Linner D, Bacsardi L and Moiso C. (2007). BIONETS architecture: from networks to SerWorks 2007 2nd Bio-Inspired Models of Network, Information and Computing Systems (BIONETICS). 10.1109/BIMNICS.2007.4610122. . (255-262).

    http://ieeexplore.ieee.org/document/4610122/

  • Elkarablieh B, Garcia I, Suen Y and Khurshid S. Assertion-based repair of complex data structures. Proceedings of the 22nd IEEE/ACM International Conference on Automated Software Engineering. (64-73).

    https://doi.org/10.1145/1321631.1321643

  • Liu F, Goering P and Heijenk G. Modeling service discovery in ad-hoc networks. Proceedings of the 4th ACM workshop on Performance evaluation of wireless ad hoc, sensor,and ubiquitous networks. (9-16).

    https://doi.org/10.1145/1298197.1298200

  • Elkarablieh B, Khurshid S, Vu D and McKinley K. (2007). Starc. ACM SIGPLAN Notices. 42:10. (387-404). Online publication date: 21-Oct-2007.

    https://doi.org/10.1145/1297105.1297056

  • Elkarablieh B, Khurshid S, Vu D and McKinley K. Starc. Proceedings of the 22nd annual ACM SIGPLAN conference on Object-oriented programming systems, languages and applications. (387-404).

    https://doi.org/10.1145/1297027.1297056

  • Krishnan R, Basu P, Mikkelson J, Small C, Ramanathan R, Brown D, Burgess J, Caro A, Condell M, Goffee N, Hain R, Hansen R, Jones C, Kawadia V, Mankins D, Schwartz B, Strayer W, Ward J, Wiggins D and Polit S. (2007). The SPINDLE Disruption-Tolerant Networking System MILCOM 2007 - IEEE Military Communications Conference. 10.1109/MILCOM.2007.4454942. 978-1-4244-1512-0. (1-7).

    http://ieeexplore.ieee.org/document/4454942/

  • Su J, Scott J, Hui P, Crowcroft J, De Lara E, Diot C, Goel A, Lim M and Upton E. Haggle. Proceedings of the 9th international conference on Ubiquitous computing. (391-408).

    /doi/10.5555/1771592.1771615

  • Mao Y, Ives Z, Loo B and Smith J. The case for a unified extensible data-centric mobility infrastructure. Proceedings of 2nd ACM/IEEE international workshop on Mobility in the evolving internet architecture. (1-6).

    https://doi.org/10.1145/1366919.1366934

  • Banks L, Ye S, Huang Y and Wu S. Davis social links. Proceedings of the 2007 workshop on Large scale attack defense. (121-128).

    https://doi.org/10.1145/1352664.1352671

  • Jin B, Zhang L and Zang Z. A Unified Service Discovery Framework. Proceedings of the Sixth International Conference on Grid and Cooperative Computing. (203-209).

    https://doi.org/10.1109/GCC.2007.30

  • Elkarablieh B, Zayour Y and Khurshid S. Efficiently generating structurally complex inputs with thousands of objects. Proceedings of the 21st European conference on Object-Oriented Programming. (248-272).

    /doi/10.5555/2394758.2394777

  • Asif K, Ahamed S and Talukder N. Avoiding Privacy Violation for Resource Sharing in Ad hoc Networks of Pervasive Computing Environment. Proceedings of the 31st Annual International Computer Software and Applications Conference - Volume 02. (269-274).

    https://doi.org/10.1109/COMPSAC.2007.84

  • Haque M, Ahamed S, Li H and Asif K. An Authentication based Lightweight Device Discovery (ALDD) Model for Pervasive Computing Environment. Proceedings of the 31st Annual International Computer Software and Applications Conference - Volume 01. (57-64).

    https://doi.org/10.1109/COMPSAC.2007.60

  • Lee C, Yi J and Lee W. Bridging OSGi islands through SLP protocol. Proceedings of the 4th international conference on Ubiquitous Intelligence and Computing. (787-797).

    /doi/10.5555/2391319.2391402

  • Jin B, Cong L, Zhang L, Zhang Y and Wen Y. Towards an RFID-oriented service discovery system. Proceedings of the 4th international conference on Ubiquitous Intelligence and Computing. (235-245).

    /doi/10.5555/2391319.2391346

  • Podorozhny R, Khurshid S, Perry D and Zhang X. Verification of multi-agent negotiations using the alloy analyzer. Proceedings of the 6th international conference on Integrated formal methods. (501-517).

    /doi/10.5555/1770498.1770524

  • Soldatos J, Stamatis K, Azodolmolky S, Pandis I and Polymenakos L. (2007). Semantic web technologies for ubiquitous computing resource management in smart spaces. International Journal of Web Engineering and Technology. 3:4. (353-373). Online publication date: 1-Jul-2007.

    https://doi.org/10.1504/IJWET.2007.014438

  • Kalasapur S, Kumar M and Shirazi B. (2007). Dynamic Service Composition in Pervasive Computing. IEEE Transactions on Parallel and Distributed Systems. 18:7. (907-918). Online publication date: 1-Jul-2007.

    https://doi.org/10.1109/TPDS.2007.1039

  • Satoh I. (2007). Visual Components for Pervasive Computing Management IEEE International Conference on Pervasive Services. 10.1109/PERSER.2007.4283885. 1-4244-1326-5. (19-28).

    http://ieeexplore.ieee.org/document/4283885/

  • Zaraket F, Aziz A and Khurshid S. Sequential Circuits for Relational Analysis. Proceedings of the 29th international conference on Software Engineering. (13-22).

    https://doi.org/10.1109/ICSE.2007.75

  • Bottaro A and Hall R. Dynamic contextual service ranking. Proceedings of the 6th international conference on Software composition. (129-143).

    /doi/10.5555/1785051.1785065

  • Malik M, Pervaiz A and Khurshid S. Generating representation invariants of structurally complex data. Proceedings of the 13th international conference on Tools and algorithms for the construction and analysis of systems. (34-49).

    /doi/10.5555/1763507.1763514

  • Cook D and Das S. (2007). How smart are our environments? An updated look at the state of the art. Pervasive and Mobile Computing. 3:2. (53-73). Online publication date: 1-Mar-2007.

    https://doi.org/10.1016/j.pmcj.2006.12.001

  • Limam N, Ziembicki J, Ahmed R, Iraqi Y, Li D, Boutaba R and Cuervo F. (2007). OSDA. Computer Communications. 30:3. (546-563). Online publication date: 1-Feb-2007.

    https://doi.org/10.1016/j.comcom.2005.11.017

  • Shami K, Magoni D and Lorenz P. (2007). A Scalable Middleware for Creating and Managing Autonomous Overlays 2007 2nd International Conference on Communication Systems Software and Middleware. 10.1109/COMSWA.2007.382561. 1-4244-0613-7. (1-8).

    http://ieeexplore.ieee.org/document/4267985/

  • Su J, Scott J, Hui P, Crowcroft J, de Lara E, Diot C, Goel A, Lim M and Upton E. (2007). Haggle: Seamless Networking for Mobile Applications. UbiComp 2007: Ubiquitous Computing. 10.1007/978-3-540-74853-3_23. (391-408).

    http://link.springer.com/10.1007/978-3-540-74853-3_23

  • Elkarablieh B, Zayour Y and Khurshid S. Efficiently Generating Structurally Complex Inputs with Thousands of Objects. ECOOP 2007 – Object-Oriented Programming. 10.1007/978-3-540-73589-2_13. (248-272).

    http://link.springer.com/10.1007/978-3-540-73589-2_13

  • Lee C, Yi J and Lee W. Bridging OSGi Islands Through SLP Protocol. Ubiquitous Intelligence and Computing. 10.1007/978-3-540-73549-6_77. (787-797).

    http://link.springer.com/10.1007/978-3-540-73549-6_77

  • Jin B, Cong L, Zhang L, Zhang Y and Wen Y. Towards an RFID-Oriented Service Discovery System. Ubiquitous Intelligence and Computing. 10.1007/978-3-540-73549-6_24. (235-245).

    http://link.springer.com/10.1007/978-3-540-73549-6_24

  • Malik M, Pervaiz A and Khurshid S. Generating Representation Invariants of Structurally Complex Data. Tools and Algorithms for the Construction and Analysis of Systems. 10.1007/978-3-540-71209-1_5. (34-49).

    http://link.springer.com/10.1007/978-3-540-71209-1_5

  • Ravi N and Iftode L. Outdoor Distributed Computing with Split Smart Messages. Reliable Systems on Unreliable Networked Platforms. 10.1007/978-3-540-71156-8_9. (161-183).

    http://link.springer.com/10.1007/978-3-540-71156-8_9

  • Campo C, García-Rubio C, López A and Almenárez F. (2006). PDP. Computer Networks: The International Journal of Computer and Telecommunications Networking. 50:17. (3264-3283). Online publication date: 5-Dec-2006.

    https://doi.org/10.1016/j.comnet.2005.12.007

  • Jelger C and Tschudin C. Dynamic names and private address maps. Proceedings of the 2006 ACM CoNEXT conference. (1-9).

    https://doi.org/10.1145/1368436.1368442

  • Shami K, Magoni D and Lorenz P. Autonomous, scalable, and resilient overlay infrastructure. Journal of Communications and Networks. 10.1109/JCN.2006.6182786. 8:4. (378-390).

    http://ieeexplore.ieee.org/document/6182786/

  • Khurshid S, Malik M and Uzuncaova E. An Automated Approach for Writing Alloy Specifications Using Instances. Proceedings of the Second International Symposium on Leveraging Applications of Formal Methods, Verification and Validation. (449-457).

    https://doi.org/10.1109/ISoLA.2006.44

  • Wu K, Yang H and Li F. (2006). WSN08-3: Pessimism Is Mostly the Best for the Expanding Ring Search in Wireless Networks IEEE Globecom 2006. 10.1109/GLOCOM.2006.508. 1-4244-0357-X. (1-5).

    http://ieeexplore.ieee.org/document/4151138/

  • Wu T and Kuo G. (2006). NETp1-16: An Analytical Model for Service Discovery Architectures in Next-Generation Networks IEEE Globecom 2006. 10.1109/GLOCOM.2006.242. 1-4244-0357-X. (1-5).

    http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=4150872

  • Ballesteros F, Soriano E, Guardiola G and Leal K. (2006). The Plan B OS for ubiquitous computing. Voice control, security, and terminals as case studies. Pervasive and Mobile Computing. 10.1016/j.pmcj.2006.08.001. 2:4. (472-488). Online publication date: 1-Nov-2006.

    https://linkinghub.elsevier.com/retrieve/pii/S1574119206000435

  • Halkes G, Baggio A and Langendoen K. A simulation study of integrated service discovery. Proceedings of the First European conference on Smart Sensing and Context. (39-53).

    https://doi.org/10.1007/11907503_4

  • Kargl F, Dannhäuser G, Schlott S and Nagler-Ihlein J. Semantic information retrieval in the COMPASS location system. Proceedings of the Third international conference on Ubiquitous Computing Systems. (129-143).

    https://doi.org/10.1007/11890348_11

  • Neely S, Dobson S and Nixon P. (2006). Adaptive middleware for autonomic systemsIntergiciel Adaptatif pour les Systèmes Auto-Organisants. annals of telecommunications - annales des télécommunications. 10.1007/BF03219883. 61:9-10. (1099-1118). Online publication date: 1-Oct-2006.

    http://link.springer.com/10.1007/BF03219883

  • Kim J, Nam B, Keleher P, Marsh M, Bhattacharjee B and Sussman A. Resource Discovery Techniques in Distributed Desktop Grid Environments. Proceedings of the 7th IEEE/ACM International Conference on Grid Computing. (9-16).

    https://doi.org/10.1109/ICGRID.2006.310992

  • Sharmin M, Ahamed S, Ahmed S and Li H. SSRD+. Proceedings of the 30th Annual International Computer Software and Applications Conference - Volume 02. (67-70).

    https://doi.org/10.1109/COMPSAC.2006.164

  • Wu T and Kuo G. (2006). An Analytical Model for Centralized Service Discovery Architecture in Wireless Networks IEEE Vehicular Technology Conference. 10.1109/VTCF.2006.593. 1-4244-0062-7. (1-5).

    http://ieeexplore.ieee.org/document/4109858/

  • Wu R, Zhu G, Lu X and Ning G. (2006). A Predictive Call Admission Control Algorithm for Wireless/Mobile Networks IEEE Vehicular Technology Conference. 10.1109/VTCF.2006.506. 1-4244-0062-7. (1-5).

    http://ieeexplore.ieee.org/document/4109771/

  • Guo C, Wu H, Tan K, Zhang Q, Song J, Zhou J, Huitema C and Zhu W. (2006). End-system-based mobility support in IPv6. IEEE Journal on Selected Areas in Communications. 23:11. (2104-2117). Online publication date: 1-Sep-2006.

    https://doi.org/10.1109/JSAC.2005.856841

  • Zhang X and Li J. (2006). A CORBA Trader-based Dynamic Binding Infrastructure in Pervasive Computing 2006 First International Symposium on Pervasive Computing and Applications. 10.1109/SPCA.2006.297461. 1-4244-0325-1. (12-16).

    http://ieeexplore.ieee.org/document/4079032/

  • Mavromoustakis C and Karatza H. (2006). Performance evaluation of an on demand tunable resource allocation apparatus using constrained active network. Simulation Modelling Practice and Theory. 10.1016/j.simpat.2005.10.006. 14:6. (768-786). Online publication date: 1-Aug-2006.

    https://linkinghub.elsevier.com/retrieve/pii/S1569190X05001322

  • Mavromoustakis C and Karatza H. (2006). On the efficiency and performance evaluation of the bandwidth clustering scheme for adaptive and reliable resource allocation. Journal of Systems and Software. 79:8. (1064-1078). Online publication date: 1-Aug-2006.

    https://doi.org/10.1016/j.jss.2005.09.021

  • Bonivento A, Carloni L and Sangiovanni-Vincentelli A. (2006). Platform based design for wireless sensor networks. Mobile Networks and Applications. 11:4. (469-485). Online publication date: 1-Aug-2006.

    https://doi.org/10.1007/s11036-006-7194-1

  • Filipe P and Mamede N. A task repository for ambient intelligence. Proceedings of the 11th international conference on Applications of Natural Language to Information Systems. (70-81).

    https://doi.org/10.1007/11765448_7

  • Moreno-Vozmediano R. Resource discovery in ad-hoc grids. Proceedings of the 6th international conference on Computational Science - Volume Part IV. (1031-1038).

    https://doi.org/10.1007/11758549_137

  • Shami K, Magoni D, Lipinski P and Lorenz P. Scalable Distributed k-Resilient Name to Address Binding System for Overlays. Proceedings of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies.

    https://doi.org/10.1109/ICNICONSMCL.2006.192

  • NGUYEN H, OKA T, MORIKAWA H and AOYAMA T. SENS. Proceedings of the 20th International Conference on Advanced Information Networking and Applications - Volume 01. (895-900).

    https://doi.org/10.1109/AINA.2006.303

  • Saif U. Opportunistic File-Associations for Mobile Operating Systems. Proceedings of the Seventh IEEE Workshop on Mobile Computing Systems & Applications. (82-86).

    https://doi.org/10.1109/WMCSA.2006.18

  • Mavromoustakis C and Karatza H. Swarm-based Active Tunable Routing for Overhead Reduction in Multiservice Networks. Proceedings of the 39th annual Symposium on Simulation. (294-303).

    https://doi.org/10.1109/ANSS.2006.44

  • Zhu F, Mutka M and Ni L. (2006). A Private, Secure, and User-Centric Information Exposure Model for Service Discovery Protocols. IEEE Transactions on Mobile Computing. 5:4. (418-429). Online publication date: 1-Apr-2006.

    https://doi.org/10.1109/TMC.2006.1599409

  • Edwards W. (2006). Discovery Systems in Ubiquitous Computing. IEEE Pervasive Computing. 5:2. (70-77). Online publication date: 1-Apr-2006.

    https://doi.org/10.1109/MPRV.2006.28

  • Fang Q, Gao J and Guibas L. (2006). Landmark-Based Information Storage and Retrieval in Sensor Networks Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications. 10.1109/INFOCOM.2006.115. 1-4244-0221-2. (1-12).

    http://ieeexplore.ieee.org/document/4146768/

  • Sharmin M, Ahmed S and Ahamed S. An Adaptive Lightweight Trust Reliant Secure Resource Discovery for Pervasive Computing Environments. Proceedings of the Fourth Annual IEEE International Conference on Pervasive Computing and Communications. (258-263).

    https://doi.org/10.1109/PERCOM.2006.6

  • Ballesteros F, Soriano E, Leal K and Guardiola G. Plan B. Proceedings of the Fourth Annual IEEE International Conference on Pervasive Computing and Communications. (126-135).

    https://doi.org/10.1109/PERCOM.2006.43

  • Chakraborty D, Joshi A and Yesha Y. (2006). Integrating service discovery with routing and session management for ad-hoc networks. Ad Hoc Networks. 4:2. (204-224). Online publication date: 1-Mar-2006.

    https://doi.org/10.1016/j.adhoc.2004.03.016

  • Chakraborty D, Joshi A, Yesha Y and Finin T. (2006). Toward Distributed Service Discovery in Pervasive Computing Environments. IEEE Transactions on Mobile Computing. 5:2. (97-112). Online publication date: 1-Feb-2006.

    https://doi.org/10.1109/TMC.2006.26

  • Service Discovery. Ad Hoc Networking Towards Seamless Communications. 10.1007/978-1-4020-5066-4_6. (143-172).

    http://link.springer.com/10.1007/978-1-4020-5066-4_6

  • Tilak S, Chiu K, Abu-Ghazaleh N and Fountain T. Dynamic resource discovery for sensor networks. Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing. (785-796).

    https://doi.org/10.1007/11596042_81

  • Saffiotti A and Broxvall M. PEIS ecologies. Proceedings of the 2005 joint conference on Smart objects and ambient intelligence: innovative context-aware services: usages and technologies. (277-281).

    https://doi.org/10.1145/1107548.1107615

  • Stevenson G, Nixon P and Dobson S. Towards a reliable, wide-area infrastructure for context-based self-management of communications. Proceedings of the Second international IFIP conference on Autonomic Communication. (115-128).

    https://doi.org/10.1007/11687818_9

  • Zhu F, Mutka M and Ni L. (2005). Service Discovery in Pervasive Computing Environments. IEEE Pervasive Computing. 4:4. (81-90). Online publication date: 1-Oct-2005.

    https://doi.org/10.1109/MPRV.2005.87

  • Ravi N and Iftode L. Outdoor distributed computing with split smart messages. Proceedings of the 12th Monterey conference on Reliable systems on unreliable networked platforms. (161-183).

    /doi/10.5555/1765571.1765580

  • Phatak D. Spread-Identity mechanisms for DOS resilience and Security.. Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks. (23-34).

    https://doi.org/10.1109/SECURECOMM.2005.54

  • Lenders V, May M and Plattner B. (2005). Service discovery in mobile ad hoc networks. Pervasive and Mobile Computing. 1:3. (343-370). Online publication date: 1-Sep-2005.

    https://doi.org/10.1016/j.pmcj.2005.06.001

  • Khurshid S, García I and Suen Y. Repairing structurally complex data. Proceedings of the 12th international conference on Model Checking Software. (123-138).

    https://doi.org/10.1007/11537328_12

  • Gu T, Pung H and Yao J. (2005). Towards a flexible service discovery. Journal of Network and Computer Applications. 28:3. (233-248). Online publication date: 1-Aug-2005.

    https://doi.org/10.1016/j.jnca.2004.06.001

  • Dhanakoti N, Gopalan S, Sridhar V and Subramani S. A Distributed Service Discovery and Selection Framework in Pervasive Service Environments. Proceedings of the Advanced Industrial Conference on Telecommunications/Service Assurance with Partial and Intermittent Resources Conference/E-Learning on Telecommunications Workshop. (452-457).

    https://doi.org/10.1109/AICT.2005.4

  • Hosain M, Newton M and Rahman M. Dynamic adaptation of multi-key index for distributed database system. Proceedings of the 9th WSEAS International Conference on Computers. (1-6).

    /doi/10.5555/1369599.1369621

  • Robinson R and Indulska J. A Context-Sensitive Service Discovery Protocol for Mobile Computing Environments. Proceedings of the International Conference on Mobile Business. (565-572).

    https://doi.org/10.1109/ICMB.2005.1

  • Cohen N, Castro P and Misra A. Descriptive naming of context data providers. Proceedings of the 5th international conference on Modeling and Using Context. (112-125).

    https://doi.org/10.1007/11508373_9

  • Delicato F, Pires P, Pirmez L and Carmo L. (2005). A Service Approach for Architecting Application Independent Wireless Sensor Networks. Cluster Computing. 8:2-3. (211-221). Online publication date: 1-Jul-2005.

    https://doi.org/10.1007/s10586-005-6186-4

  • Marinov D, Khurshid S, Bugrara S, Zhang L and Rinard M. Optimizations for compiling declarative models into boolean formulas. Proceedings of the 8th international conference on Theory and Applications of Satisfiability Testing. (187-202).

    https://doi.org/10.1007/11499107_14

  • Ni Y, Kremer U, Stere A and Iftode L. Programming ad-hoc networks of mobile and resource-constrained devices. Proceedings of the 2005 ACM SIGPLAN conference on Programming language design and implementation. (249-260).

    https://doi.org/10.1145/1065010.1065040

  • Ni Y, Kremer U, Stere A and Iftode L. (2005). Programming ad-hoc networks of mobile and resource-constrained devices. ACM SIGPLAN Notices. 40:6. (249-260). Online publication date: 12-Jun-2005.

    https://doi.org/10.1145/1064978.1065040

  • Thompson M and Midkiff S. Service Description for Pervasive Service Discovery. Proceedings of the First International Workshop on Services and Infrastructure for the Ubiquitous and Mobile Internet (SIUMI) (ICDCSW'05) - Volume 03. (273-279).

    https://doi.org/10.1109/ICDCSW.2005.124

  • Dinda P and Lu D. (2005). Fast Compositional Queries in a Relational Grid Information Service. Journal of Grid Computing. 10.1007/s10723-005-9004-6. 3:1-2. (131-150). Online publication date: 1-Jun-2005.

    http://link.springer.com/10.1007/s10723-005-9004-6

  • Zhu F, Mutka M and Ni L. (2005). Facilitating secure ad hoc service discovery in public environments. Journal of Systems and Software. 76:1. (45-54). Online publication date: 1-Apr-2005.

    https://doi.org/10.1016/j.jss.2004.07.014

  • Ravi N, Stern P, Desai N and Iftode L. Accessing Ubiquitous Services Using Smart Phones. Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications. (383-393).

    https://doi.org/10.1109/PERCOM.2005.6

  • Zhu F, Zhu W, Mutka M and Ni L. Expose or Not? A Progressive Exposure Approach for Service Discovery in Pervasive Computing Environments. Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications. (225-234).

    https://doi.org/10.1109/PERCOM.2005.20

  • Minami M, Morikawa H and Aoyama T. (2004). Design and evaluation of an interface‐based naming system for supporting service synthesis in a ubiquitous computing environment. Electronics and Communications in Japan (Part I: Communications). 10.1002/ecja.10177. 88:3. (63-75). Online publication date: 1-Mar-2005.

    https://onlinelibrary.wiley.com/doi/10.1002/ecja.10177

  • Saif U, Paluska J and Chauhan V. (2005). Practical experience with adaptive service access. ACM SIGMOBILE Mobile Computing and Communications Review. 9:1. (27-40). Online publication date: 1-Jan-2005.

    https://doi.org/10.1145/1055959.1055964

  • Grace P, Blair G and Samuel S. (2005). A reflective framework for discovery and interaction in heterogeneous mobile environments. ACM SIGMOBILE Mobile Computing and Communications Review. 9:1. (2-14). Online publication date: 1-Jan-2005.

    https://doi.org/10.1145/1055959.1055962

  • Sethom K and Afifi H. A new service discovery architecture for sensor networks Symposium, 2005 Wireless Telecommunications. 10.1109/WTS.2005.1524786. 0-7803-8856-9. (190-196).

    http://ieeexplore.ieee.org/document/1524786/

  • Daqing Zhang , Chung-Yau Chin and Gurusamy M. Supporting Context-Aware Mobile Service Adaptation with Scalable Context Discovery Platform 2005 IEEE 61st Vehicular Technology Conference. 10.1109/VETECS.2005.1543869. 0-7803-8887-9. (2859-2863).

    http://ieeexplore.ieee.org/document/1543869/

  • Bonivento A and Sangiovanni-Vincentelli A. Platform based design for wireless sensor networks 2nd International Workshop Networking with Ultra Wide Band and Workshop on Ultra Wide Band for Sensor Networks, 2005. Networking with UWB 2005.. 10.1109/NETUWB.2005.1469994. 0-7803-9126-8. (9-19).

    http://ieeexplore.ieee.org/document/1469994/

  • Varshavsky A, Reid B and de Lara E. A cross-layer approach to service discovery and selection in MANETs IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.. 10.1109/MAHSS.2005.1542832. 0-7803-9465-8. (459-466).

    http://ieeexplore.ieee.org/document/1542832/

  • Okura A, Ihara T and Miura A. BAM: branch aggregation multicast for wireless sensor networks IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.. 10.1109/MAHSS.2005.1542820. 0-7803-9465-8. (354-363).

    http://ieeexplore.ieee.org/document/1542820/

  • Lenders V, May M and Plattner B. Towards a new communication paradigm for mobile ad hoc networks IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.. 10.1109/MAHSS.2005.1542776. 0-7803-9465-8. (67-73).

    http://ieeexplore.ieee.org/document/1542776/

  • Subramani S, Dhanakoti N, Gopalan S and Sridhar V. (2005). A Distributed Service Discovery Architecture for Pervasive Environments Joint International Conference on Autonomic and Autonomous Systems and International Conference on Networking and Services - (icas-isns'05). 10.1109/ICAS-ICNS.2005.2. 0-7695-2450-8. (25-25).

    http://ieeexplore.ieee.org/document/1559877/

  • Magoni D and Lorenz P. (2005). Application layer addressing, routing and naming framework for overlays GLOBECOM '05. IEEE Global Telecommunications Conference, 2005.. 10.1109/GLOCOM.2005.1577774. 0-7803-9414-3. (6 pp.).

    http://ieeexplore.ieee.org/document/1577774/

  • Ballesteros F, Castro E, Muzquiz G, Algara K and Quiros P. A New Network Abstraction for Mobile and Ubiquitous Computing Environments in the Plan B Operating System. Proceedings of the Sixth IEEE Workshop on Mobile Computing Systems and Applications. (112-121).

    https://doi.org/10.1109/MCSA.2004.3

  • Ni Y, Kremer U and Iftode L. A programming language for ad-hoc networks of mobile devices. Proceedings of the 7th workshop on Workshop on languages, compilers, and run-time support for scalable systems. (1-12).

    https://doi.org/10.1145/1066650.1066662

  • Browne J, Yalamanchi M, Kane K and Sankaralingam K. General parallel computations on desktop grid and P2P systems. Proceedings of the 7th workshop on Workshop on languages, compilers, and run-time support for scalable systems. (1-8).

    https://doi.org/10.1145/1066650.1066654

  • Robinson J, Wakeman I and Owen T. Scooby. Proceedings of the 2nd workshop on Middleware for pervasive and ad-hoc computing. (161-166).

    https://doi.org/10.1145/1028509.1028520

  • Khurshid S and Marinov D. (2004). TestEra. Automated Software Engineering. 11:4. (403-434). Online publication date: 1-Oct-2004.

    https://doi.org/10.1023/B:AUSE.0000038938.10589.b9

  • Schiele G, Becker C and Rothermel K. Energy-efficient cluster-based service discovery for Ubiquitous Computing. Proceedings of the 11th workshop on ACM SIGOPS European workshop. (14-es).

    https://doi.org/10.1145/1133572.1133604

  • Abdelzaher T, Stankovic J, Son S, Blum B, He T, Wood A and Lu C. (2004). Communication Architecture and Programming Abstractions for Real-Time Embedded Sensor Networks. Handbook of Sensor Networks. 10.1201/9780203489635.ch17. Online publication date: 28-Jul-2004.

    http://www.crcnetbase.com/doi/10.1201/9780203489635.ch17

  • Ganesan D, Cerpa A, Ye W, Yu Y, Zhao J and Estrin D. (2004). Networking issues in wireless sensor networks. Journal of Parallel and Distributed Computing. 64:7. (799-814). Online publication date: 1-Jul-2004.

    https://doi.org/10.1016/j.jpdc.2004.03.016

  • Hinckley K, Ramos G, Guimbretiere F, Baudisch P and Smith M. Stitching. Proceedings of the working conference on Advanced visual interfaces. (23-31).

    https://doi.org/10.1145/989863.989866

  • Edwards W, Newman M, Sedivy J and Smith T. (2004). Supporting serendipitous integration in mobile computing environments. International Journal of Human-Computer Studies. 10.1016/j.ijhcs.2003.12.003. 60:5-6. (666-700). Online publication date: 1-May-2004.

    http://linkinghub.elsevier.com/retrieve/pii/S107158190300209X

  • Kalapriya K, Nandy S, Srinivasan D, Uma Maheshwari R and Satish V. A framework for resource discovery in pervasive computing for mobile aware task execution. Proceedings of the 1st conference on Computing frontiers. (70-77).

    https://doi.org/10.1145/977091.977103

  • Yamauchi Y, Saito H and Tobe Y. A Message Proliferation System Using Short-Range Wireless Devices. Proceedings of the 24th International Conference on Distributed Computing Systems Workshops - W7: EC (ICDCSW'04) - Volume 7. (418-421).

    /doi/10.5555/977399.977880

  • Morikawa H and Aoyama T. (2004). Realizing the Ubiquitous Network. Telecommunications Systems. 25:3-4. (449-468). Online publication date: 1-Mar-2004.

    https://doi.org/10.1023/B:TELS.0000014794.57259.ec

  • Minami M, Morikawa H and Aoyama T. The Design of Naming-Based Service Composition System for Ubiquitous Computing Applications. Proceedings of the 2004 Symposium on Applications and the Internet-Workshops (SAINT 2004 Workshops).

    /doi/10.5555/968884.969512

  • Govindan R. Data-centric routing and storage in sensor networks. Wireless sensor networks. (185-205).

    /doi/10.5555/1013825.1013835

  • Ford B. (2004). Unmanaged Internet Protocol. ACM SIGCOMM Computer Communication Review. 34:1. (93-98). Online publication date: 1-Jan-2004.

    https://doi.org/10.1145/972374.972391

  • Minami M, Morikawa H and Aoyama T. (2004). The design of naming-based service composition system for ubiquitous computing applications 2004 International Symposium on Applications and the Internet Workshops. 2004 Workshops.. 10.1109/SAINTW.2004.1268652. 0-7695-2050-2. (304-312).

    http://ieeexplore.ieee.org/document/1268652/

  • Feng Zhu , Mutka M and Ni L. (2004). PrudentExposure: a private and user-centric service discovery protocol Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the. 10.1109/PERCOM.2004.1276870. 0-7695-2090-1. (329-338).

    http://ieeexplore.ieee.org/document/1276870/

  • Poutievski L, Calvert K and Griffioen J. Speccast IEEE INFOCOM 2004. 10.1109/INFCOM.2004.1354649. 0-7803-8355-9. (2263-2274).

    http://ieeexplore.ieee.org/document/1354649/

  • Yamauchi Y, Saito H and Tobe Y. (2004). A message proliferation system using short-range wireless devices 24th International Conference on Distributed Computing Systems Workshops, 2004. Proceedings.. 10.1109/ICDCSW.2004.1284064. 0-7695-2087-1. (418-421).

    http://ieeexplore.ieee.org/document/1284064/

  • Borcea C, Intanagonwiwat C, Kang P, Kremer U and Iftode L. (2004). Spatial programming using smart messages: design and implementation 24th International Conference on Distributed Computing Systems, 2004. Proceedings.. 10.1109/ICDCS.2004.1281637. 0-7695-2086-3. (690-699).

    http://ieeexplore.ieee.org/document/1281637/

  • Abdelzaher T, Blum B, Cao Q, Chen Y, Evans D, George J, George S, Gu L, He T, Krishnamurthy S, Luo L, Son S, Stankovic J, Stoleru R and Wood A. (2004). EnviroTrack: towards an environmental computing paradigm for distributed sensor networks 24th International Conference on Distributed Computing Systems, 2004. Proceedings.. 10.1109/ICDCS.2004.1281625. 0-7695-2086-3. (582-589).

    http://ieeexplore.ieee.org/document/1281625/

  • Garces-Erice L, Felber P, Biersack E, Urvoy-Keller G and Ross K. (2004). Data indexing in peer-to-peer DHT networks 24th International Conference on Distributed Computing Systems, 2004. Proceedings.. 10.1109/ICDCS.2004.1281584. 0-7695-2086-3. (200-208).

    http://ieeexplore.ieee.org/document/1281584/

  • Datta A, Quarteroni S and Aberer K. (2004). Autonomous Gossiping: A Self-Organizing Epidemic Algorithm for Selective Information Dissemination in Wireless Mobile Ad-Hoc Networks. Semantics of a Networked World. Semantics for Grid Databases. 10.1007/978-3-540-30145-5_8. (126-143).

    http://link.springer.com/10.1007/978-3-540-30145-5_8

  • Klintskog E, Mesaros V, El Banna Z, Brand P and Haridi S. (2004). A Peer-to-Peer Approach to Enhance Middleware Connectivity. Principles of Distributed Systems. 10.1007/978-3-540-27860-3_9. (71-82).

    http://link.springer.com/10.1007/978-3-540-27860-3_9

  • Touch J and Pingali V. (2004). DataRouter: A Network-Layer Service for Application-Layer Forwarding. Active Networks. 10.1007/978-3-540-24715-9_11. (115-126).

    http://link.springer.com/10.1007/978-3-540-24715-9_11

  • Minami M, Morikawa H and Aoyama T. (2004). An Interface-Based Naming System for Ubiquitous Internet Applications. Real-Time and Embedded Computing Systems and Applications. 10.1007/978-3-540-24686-2_19. (312-327).

    http://link.springer.com/10.1007/978-3-540-24686-2_19

  • He C, Du Z and Li S. (2004). GMA+ – A GMA-Based Monitoring and Management Infrastructure for Grid. Grid and Cooperative Computing. 10.1007/978-3-540-24680-0_2. (10-17).

    http://link.springer.com/10.1007/978-3-540-24680-0_2

  • Ni Y, Kremer U and Iftode L. (2004). Spatial Views: Space-Aware Programming for Networks of Embedded Systems. Languages and Compilers for Parallel Computing. 10.1007/978-3-540-24644-2_17. (258-272).

    http://link.springer.com/10.1007/978-3-540-24644-2_17

  • Khurshid S, Marinov D, Shlyakhter I and Jackson D. (2004). A Case for Efficient Solution Enumeration. Theory and Applications of Satisfiability Testing. 10.1007/978-3-540-24605-3_21. (272-286).

    http://link.springer.com/10.1007/978-3-540-24605-3_21

  • Govindan R. Data-Centric Routing and Storage in Sensor Networks. Wireless Sensor Networks. 10.1007/978-1-4020-7884-2_9. (185-205).

    http://link.springer.com/10.1007/978-1-4020-7884-2_9

  • Fu Y, Chase J, Chun B, Schwab S and Vahdat A. (2003). SHARP. ACM SIGOPS Operating Systems Review. 37:5. (133-148). Online publication date: 1-Dec-2003.

    https://doi.org/10.1145/1165389.945459

  • Lee K, LaMarca A and Chambers C. (2003). HydroJ. ACM SIGPLAN Notices. 38:11. (205-223). Online publication date: 26-Nov-2003.

    https://doi.org/10.1145/949343.949324

  • Dinda P and Lu D. Nondeterministic Queries in a Relational Grid Information Service. Proceedings of the 2003 ACM/IEEE conference on Supercomputing.

    https://doi.org/10.1145/1048935.1050163

  • Lee K, LaMarca A and Chambers C. HydroJ. Proceedings of the 18th annual ACM SIGPLAN conference on Object-oriented programing, systems, languages, and applications. (205-223).

    https://doi.org/10.1145/949305.949324

  • Fu Y, Chase J, Chun B, Schwab S and Vahdat A. SHARP. Proceedings of the nineteenth ACM symposium on Operating systems principles. (133-148).

    https://doi.org/10.1145/945445.945459

  • Sollins K. (2003). Designing for scale and differentiation. ACM SIGCOMM Computer Communication Review. 33:4. (267-276). Online publication date: 1-Oct-2003.

    https://doi.org/10.1145/972426.944764

  • Crowcroft J, Hand S, Mortier R, Roscoe T and Warfield A. (2003). Plutarch. ACM SIGCOMM Computer Communication Review. 33:4. (258-266). Online publication date: 1-Oct-2003.

    https://doi.org/10.1145/972426.944763

  • Hellerstein J. (2003). Toward network data independence. ACM SIGMOD Record. 32:3. (34-40). Online publication date: 1-Sep-2003.

    https://doi.org/10.1145/945721.945730

  • Sollins K. Designing for scale and differentiation. Proceedings of the ACM SIGCOMM workshop on Future directions in network architecture. (267-276).

    https://doi.org/10.1145/944759.944764

  • Crowcroft J, Hand S, Mortier R, Roscoe T and Warfield A. Plutarch. Proceedings of the ACM SIGCOMM workshop on Future directions in network architecture. (258-266).

    https://doi.org/10.1145/944759.944763

  • Carzaniga A and Wolf A. Forwarding in a content-based network. Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications. (163-174).

    https://doi.org/10.1145/863955.863975

  • Fall K. A delay-tolerant network architecture for challenged internets. Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications. (27-34).

    https://doi.org/10.1145/863955.863960

  • Stanley-Marbell P, Marculescu D, Marculescu R and Khosla P. (2003). Modeling, Analysis, and Self-Management of Electronic Textiles. IEEE Transactions on Computers. 52:8. (996-1010). Online publication date: 1-Aug-2003.

    https://doi.org/10.1109/TC.2003.1223635

  • Delicato F, Pires P, Pirmez L and da Costa Carmo L. A flexible middleware system for wireless sensor networks. Proceedings of the ACM/IFIP/USENIX 2003 International Conference on Middleware. (474-492).

    /doi/10.5555/1515915.1515947

  • Saif U and Mazzola Paluska J. Service-Oriented Network Sockets. Proceedings of the 1st international conference on Mobile systems, applications and services. (159-172).

    https://doi.org/10.1145/1066116.1189043

  • Blum B, Nagaraddi P, Wood A, Abdelzaher T, Son S and Stankovic J. An entity maintenance and connection service for sensor networks. Proceedings of the 1st international conference on Mobile systems, applications and services. (201-214).

    https://doi.org/10.1145/1066116.1066122

  • Zhu F, Mutka M and Ni L. Splendor. Proceedings of the First IEEE International Conference on Pervasive Computing and Communications.

    /doi/10.5555/826025.826397

  • Ponnekanti S, Johanson B, Kiciman E and Fox A. Portability, Extensibility and Robustness in iROS. Proceedings of the First IEEE International Conference on Pervasive Computing and Communications.

    /doi/10.5555/826025.826373

  • Borcea C, Intanagonwiwat C, Saxena A and Iftode L. Self-Routing in Pervasive Computing Environments Using Smart Messages. Proceedings of the First IEEE International Conference on Pervasive Computing and Communications.

    /doi/10.5555/826025.826356

  • Chen G and Kotz D. Context-Sensitive Resource Discovery. Proceedings of the First IEEE International Conference on Pervasive Computing and Communications.

    /doi/10.5555/826025.826329

  • Shenker S, Ratnasamy S, Karp B, Govindan R and Estrin D. (2003). Data-centric storage in sensornets. ACM SIGCOMM Computer Communication Review. 33:1. (137-142). Online publication date: 1-Jan-2003.

    https://doi.org/10.1145/774763.774785

  • Greenstein B, Estrin D, Govindan R, Ratnasamy S and Shenker S. DIFS: a distributed index for features in sensor networks SNPA 2003 - 1st International Workshop on Sensor Network Protocols and Applications. 10.1109/SNPA.2003.1203367. 0-7803-7879-2. (163-173).

    http://ieeexplore.ieee.org/document/1203367/

  • Guanling Chen and Kotz D. Context-sensitive resource discovery First IEEE International Conference on Pervasive Computing and Communications (PerCom 2003). 10.1109/PERCOM.2003.1192747. 0-7695-1893-1. (243-252).

    http://ieeexplore.ieee.org/document/1192747/

  • Feng Zhu , Mutka M and Ni L. Splendor: A secure, private, and location-aware service discovery protocol supporting mobile services First IEEE International Conference on Pervasive Computing and Communications (PerCom 2003). 10.1109/PERCOM.2003.1192746. 0-7695-1893-1. (235-242).

    http://ieeexplore.ieee.org/document/1192746/

  • Borcea C, Intanagonwiwat C, Saxena A and Iftode L. Self-routing in pervasive computing environments using smart messages First IEEE International Conference on Pervasive Computing and Communications (PerCom 2003). 10.1109/PERCOM.2003.1192730. 0-7695-1893-1. (87-96).

    http://ieeexplore.ieee.org/document/1192730/

  • Ponnekanti S, Johanson B, Kiciman E and Fox A. Portability, extensibility and robustness in iROS First IEEE International Conference on Pervasive Computing and Communications (PerCom 2003). 10.1109/PERCOM.2003.1192722. 0-7695-1893-1. (11-19).

    http://ieeexplore.ieee.org/document/1192722/

  • Harumoto K and Shimojo S. A P2P platform architecture for context-sensitive applications its implementation using Web services 2003 IEEE Pacific Rim Conference on Communications Computers and Signal Processing (PACRIM 2003). 10.1109/PACRIM.2003.1235748. 0-7803-7978-0. (185-188).

    http://ieeexplore.ieee.org/document/1235748/

  • Berger , McFaddin , Chandra Narayanaswami and Mandayam Raghunath . (2003). Web services on mobile devices-implementation and experience Proceedings DARPA Information Survivability Conference and Exposition MCSA-03. 10.1109/MCSA.2003.1240771. 0-7695-1995-4. (100-109).

    http://ieeexplore.ieee.org/document/1240771/

  • Kang , Philipose and Borriello . (2003). River: an infrastructure for context dependent, reactive communication primitives Proceedings DARPA Information Survivability Conference and Exposition MCSA-03. 10.1109/MCSA.2003.1240769. 0-7695-1995-4. (77-86).

    http://ieeexplore.ieee.org/document/1240769/

  • Noguchi H, Mori T and Sato T. Network middleware for utilization of sensors in room 2003 IEEE/RSJ International Conference on Intelligent Robots and Systems. 10.1109/IROS.2003.1248910. 0-7803-7860-1. (1832-1838).

    http://ieeexplore.ieee.org/document/1248910/

  • Mitra A, Maheswaran M and Rueda J. Wide-area content-based routing mechanism International Parallel and Distributed Processing Symposium (IPDPS 2003). 10.1109/IPDPS.2003.1213447. 0-7695-1926-1. (8).

    http://ieeexplore.ieee.org/document/1213447/

  • Magoni D. A scalable and unifying architecture for deploying advanced protocols in the Internet 10th International Conference on Telecommunication. ICT'2003. Conference Proceedings. 10.1109/ICTEL.2003.1191575. 0-7803-7661-7. (1001-1007).

    http://ieeexplore.ieee.org/document/1191575/

  • Robinson R and Indulska J. Superstring: a scalable service discovery protocol for the wide-area pervasive environment The 11th IEEE International Conference on Networks, 2003. ICON2003.. 10.1109/ICON.2003.1266272. 0-7803-7788-5. (699-704).

    http://ieeexplore.ieee.org/document/1266272/

  • Gu T, Qian H, Yao J and Pung H. An architecture for flexible service discovery in OCTOPUS . 12th International Conference on Computer Communications and Networks. 10.1109/ICCCN.2003.1284184. 0-7803-7945-4. (291-296).

    http://ieeexplore.ieee.org/document/1284184/

  • Iftode L, Borcea C, Kochut A, Intanagonwiwat C and Kremer U. Programming computers embedded in the physical world The Ninth IEEE Workshop on Future Trends of Distributed Computing Systems, 2003. FTDCS 2003.. 10.1109/FTDCS.2003.1204311. 0-7695-1910-5. (78-85).

    http://ieeexplore.ieee.org/document/1204311/

  • Klein M, Konig-Ries B and Obreiter P. Service rings - a semantic overlay for service discovery in ad hoc networks 14th International Workshop on Database and Expert Systems Applications. 10.1109/DEXA.2003.1232020. 0-7695-1993-8. (180-185).

    http://ieeexplore.ieee.org/document/1232020/

  • Aoki M, Saito M, Aida H and Tokuda H. ANARCH: a name resolution scheme for mobile ad hoc networks 17th International Conference on Advanced Information Networking and Applications. AINA 2003. 10.1109/AINA.2003.1192989. 0-7695-1906-7. (723-730).

    http://ieeexplore.ieee.org/document/1192989/

  • Wen-Hsien Tseng and Hsing Mei . Inter-cluster service lookup based on Jini 17th International Conference on Advanced Information Networking and Applications. AINA 2003. 10.1109/AINA.2003.1192848. 0-7695-1906-7. (84-89).

    http://ieeexplore.ieee.org/document/1192848/

  • Shrira L and Tian H. (2003). MX: Mobile Object Exchange for Collaborative Applications. ECOOP 2003 – Object-Oriented Programming. 10.1007/978-3-540-45070-2_7. (126-150).

    http://link.springer.com/10.1007/978-3-540-45070-2_7

  • Delicato F, Pires P, Pirmez L and da Costa Carmo L. (2003). A Flexible Middleware System for Wireless Sensor Networks. Middleware 2003. 10.1007/3-540-44892-6_24. (474-492).

    http://link.springer.com/10.1007/3-540-44892-6_24

  • Zambonelli F and Van Dyke Parunak H. (2003). Signs of a Revolution in Computer Science and Software Engineering. Engineering Societies in the Agents World III. 10.1007/3-540-39173-8_2. (13-28).

    http://link.springer.com/10.1007/3-540-39173-8_2

  • Gajos K, Weisman L and Shrobe H. (2003). Design Principles for Resource Management Systems for Intelligent Spaces. Self-Adaptive Software: Applications. 10.1007/3-540-36554-0_15. (198-215).

    http://link.springer.com/10.1007/3-540-36554-0_15

  • Ghose A, Grossklags J and Chuang J. (2003). Resilient Data-Centric Storage in Wireless Ad-Hoc Sensor Networks. Mobile Data Management. 10.1007/3-540-36389-0_4. (45-62).

    http://link.springer.com/10.1007/3-540-36389-0_4

  • Madden S, Franklin M, Hellerstein J and Hong W. (2002). TAG. ACM SIGOPS Operating Systems Review. 36:SI. (131-146). Online publication date: 31-Dec-2003.

    https://doi.org/10.1145/844128.844142

  • Madden S, Franklin M, Hellerstein J and Hong W. TAG. Proceedings of the 5th symposium on Operating systems design and implementation (Copyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading). (131-146).

    /doi/10.5555/1060289.1060303

  • Bustamante F, Widener P and Schwan K. Scalable directory services using proactivity. Proceedings of the 2002 ACM/IEEE conference on Supercomputing. (1-12).

    /doi/10.5555/762761.762786

  • Hoschek W. The Web Service Discovery Architecture. Proceedings of the 2002 ACM/IEEE conference on Supercomputing. (1-15).

    /doi/10.5555/762761.762780

  • Stoica I, Adkins D, Zhuang S, Shenker S and Surana S. (2002). Internet indirection infrastructure. ACM SIGCOMM Computer Communication Review. 32:4. (73-86). Online publication date: 1-Oct-2002.

    https://doi.org/10.1145/964725.633033

  • Ratnasamy S, Karp B, Yin L, Yu F, Estrin D, Govindan R and Shenker S. GHT. Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications. (78-87).

    https://doi.org/10.1145/570738.570750

  • Zambonelli F and Van Dyke Parunak H. Signs of a revolution in computer science and software engineering. Proceedings of the 3rd international conference on Engineering societies in the agents world III. (13-28).

    /doi/10.5555/1756301.1756304

  • Stoica I, Adkins D, Zhuang S, Shenker S and Surana S. Internet indirection infrastructure. Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications. (73-86).

    https://doi.org/10.1145/633025.633033

  • Boyapati C, Khurshid S and Marinov D. Korat. Proceedings of the 2002 ACM SIGSOFT international symposium on Software testing and analysis. (123-133).

    https://doi.org/10.1145/566172.566191

  • Boyapati C, Khurshid S and Marinov D. (2002). Korat. ACM SIGSOFT Software Engineering Notes. 27:4. (123-133). Online publication date: 1-Jul-2002.

    https://doi.org/10.1145/566171.566191

  • Basu P, Wang Ke and Little T. A novel approach for execution of distributed tasks on mobile ad hoc networks 2002 IEEE Wireless Communications and Networking Conference Record. WCNC 2002. 10.1109/WCNC.2002.993332. 0-7803-7376-6. (579-585).

    http://ieeexplore.ieee.org/document/993332/

  • Basu P and Little T. Networked parking spaces: architecture and applications 2002 IEEE 56th Vehicular Technology Conference. 10.1109/VETECF.2002.1040785. 0-7803-7467-3. (1153-1157).

    http://ieeexplore.ieee.org/document/1040785/

  • Bustamante F, Widener P and Schwan K. (2002). Scalable Directory Services Using Proactivity ACM/IEEE SC 2002 Conference. 10.1109/SC.2002.10037. 0-7695-1524-X. (65-65).

    http://ieeexplore.ieee.org/document/1592901/

  • Hoschek W. (2002). The Web Service Discovery Architecture ACM/IEEE SC 2002 Conference. 10.1109/SC.2002.10033. 0-7695-1524-X. (38-38).

    http://ieeexplore.ieee.org/document/1592874/

  • Kindberg T and Fox A. (2002). System Software for Ubiquitous Computing. IEEE Pervasive Computing. 1:1. (70-81). Online publication date: 1-Jan-2002.

    https://doi.org/10.1109/MPRV.2002.993146

  • Estrin D, Culler D, Pister K and Sukhatme G. (2002). Connecting the Physical World with Pervasive Networks. IEEE Pervasive Computing. 1:1. (59-69). Online publication date: 1-Jan-2002.

    https://doi.org/10.1109/MPRV.2002.993145

  • Guanling Chen and Kotz D. Context aggregation and dissemination in ubiquitous computing systems Fourth IEEE Workshop on Mobile Computing Systems and Applications. 10.1109/MCSA.2002.1017490. 0-7695-1647-5. (105-114).

    http://ieeexplore.ieee.org/document/1017490/

  • Madden S, Szewczyk R, Franklin M and Culler D. Supporting aggregate queries over ad-hoc wireless sensor networks Fourth IEEE Workshop on Mobile Computing Systems and Applications. 10.1109/MCSA.2002.1017485. 0-7695-1647-5. (49-58).

    http://ieeexplore.ieee.org/document/1017485/

  • Type S, Wakeman I and Watt S. Smarter service location 5th IEEE International Workshop on Networked Appliances. 10.1109/IWNA.2002.1241346. 0-7803-7686-2. (115-121).

    http://ieeexplore.ieee.org/document/1241346/

  • Hu Y, Rodney D and Druschel P. Design and scalability of NLS, a scalable naming and location service IEEE Information Communications Conference (INFOCOM 2002). 10.1109/INFCOM.2002.1019372. 0-7803-7476-2. (1218-1227).

    http://ieeexplore.ieee.org/document/1019372/

  • Hung-Chang Hsiao and Chung-Ta King . Neuron-a wide-area service discovery infrastructure International Conference on Parallel Processing. 10.1109/ICPP.2002.1040902. 0-7695-1677-7. (455-462).

    http://ieeexplore.ieee.org/document/1040902/

  • Flinn J, SoYoung Park and Satyanarayanan M. Balancing performance, energy, and quality in pervasive computing 22nd International Conference on Distributed Computing Systems. 10.1109/ICDCS.2002.1022259. 0-7695-1585-1. (217-226).

    http://ieeexplore.ieee.org/document/1022259/

  • Wang Ke , Basu P and Little T. A task graph based application framework for mobile ad hoc networks IEEE International Conference on Communications. 10.1109/ICC.2002.997439. 0-7803-7400-2. (3279-3283).

    http://ieeexplore.ieee.org/document/997439/

  • Gajos K. (2002). Rascal — A Resource Manager for Multi Agent Systems in Smart Spaces. From Theory to Practice in Multi-Agent Systems. 10.1007/3-540-45941-3_12. (111-120).

    http://link.springer.com/10.1007/3-540-45941-3_12

  • Balazinska M, Balakrishnan H and Karger D. (2002). INS/Twine: A Scalable Peer-to-Peer Architecture for Intentional Resource Discovery. Pervasive Computing. 10.1007/3-540-45866-2_16. (195-210).

    http://link.springer.com/10.1007/3-540-45866-2_16

  • Kohno M and Rekimoto J. (2002). New Generation of IP-Phone Enabled Mobile Devices. Human Computer Interaction with Mobile Devices. 10.1007/3-540-45756-9_31. (319-323).

    http://link.springer.com/10.1007/3-540-45756-9_31

  • Stoica I, Adkins D, Ratnasamy S, Shenker S, Surana S and Zhuang S. (2002). Internet Indirection Infrastructure. Peer-to-Peer Systems. 10.1007/3-540-45748-8_18. (191-202).

    http://link.springer.com/10.1007/3-540-45748-8_18

  • Weissman J and Zhang Z. (2002). Smart Environments: Middleware Building Blocks for Pervasive Network Computing (A Position Paper). Developing an Infrastructure for Mobile and Wireless Systems. 10.1007/3-540-36257-6_9. (90-105).

    http://link.springer.com/10.1007/3-540-36257-6_9

  • Wang Z and Seitz J. (2002). An Agent Based Service Discovery Architecture for Mobile Environments. EurAsia-ICT 2002: Information and Communication Technology. 10.1007/3-540-36087-5_41. (350-357).

    http://link.springer.com/10.1007/3-540-36087-5_41

  • Samulowitz M, Michahelles F and Linnhoff-Popien C. Capeus: An Architecture for Context-aware Selection and Execution of Services. New Developments in Distributed Applications and Interoperable Systems. 10.1007/0-306-47005-5_3. (23-39).

    http://link.springer.com/10.1007/0-306-47005-5_3

  • Rowstron A and Druschel P. (2001). Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility. ACM SIGOPS Operating Systems Review. 35:5. (188-201). Online publication date: 1-Dec-2001.

    https://doi.org/10.1145/502059.502053

  • Heidemann J, Silva F, Intanagonwiwat C, Govindan R, Estrin D and Ganesan D. (2001). Building efficient wireless sensor networks with low-level naming. ACM SIGOPS Operating Systems Review. 35:5. (146-159). Online publication date: 1-Dec-2001.

    https://doi.org/10.1145/502059.502049

  • Marinov D and Khurshid S. TestEra. Proceedings of the 16th IEEE international conference on Automated software engineering.

    /doi/10.5555/872023.872551

  • Rowstron A and Druschel P. Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility. Proceedings of the eighteenth ACM symposium on Operating systems principles. (188-201).

    https://doi.org/10.1145/502034.502053

  • Heidemann J, Silva F, Intanagonwiwat C, Govindan R, Estrin D and Ganesan D. Building efficient wireless sensor networks with low-level naming. Proceedings of the eighteenth ACM symposium on Operating systems principles. (146-159).

    https://doi.org/10.1145/502034.502049

  • Khurshid S and Marinov D. (2001). Checking Java Implementation of a Naming Architecture Using Testera. Electronic Notes in Theoretical Computer Science. 10.1016/S1571-0661(04)00260-9. 55:3. (322-342). Online publication date: 1-Oct-2001.

    http://linkinghub.elsevier.com/retrieve/pii/S1571066104002609

  • Gajos K. Rascal - A Resource Manager for Multi Agent Systems in Smart Spaces. Revised Papers from the Second International Workshop of Central and Eastern Europe on Multi-Agent Systems: From Theory to Practice in Multi-Agent Systems. (111-120).

    /doi/10.5555/646697.703781

  • Priyantha N, Miu A, Balakrishnan H and Teller S. The cricket compass for context-aware mobile applications. Proceedings of the 7th annual international conference on Mobile computing and networking. (1-14).

    https://doi.org/10.1145/381677.381679

  • Samulowitz M, Michahelles F and Linnhoff-Popien C. Adaptive interaction for enabling pervasive services. Proceedings of the 2nd ACM international workshop on Data engineering for wireless and mobile access. (20-26).

    https://doi.org/10.1145/376868.376886

  • Gajos K, Weisman L and Shrobe H. Design principles for resource management systems for intelligent spaces. Proceedings of the 2nd international conference on Self-adaptive software: applications. (198-215).

    /doi/10.5555/1754788.1754803

  • Random, Ephemeral Transaction Identifiers in Dynamic Sensor Networks. Proceedings of the The 21st International Conference on Distributed Computing Systems.

    /doi/10.5555/876878.879321

  • Hsiao P, Hwang A, Kung H and Vlah D. Wireless open service networks IEEE Globecom '00 Workshop. 2000 IEEE Service Portability and Virtual Customer Environments. 10.1109/SPVCE.2000.934162. 0-7803-7133-X. (62-68).

    http://ieeexplore.ieee.org/document/934162/

  • Harashima N, Okoshi T, Nakazawa J, Tobe Y and Tokuda H. AMRB: toward location and migration transparency of services Eighth International Conference on Parallel and Distributed Systems. ICPADS 2001. 10.1109/ICPADS.2001.934834. 0-7695-1153-8. (305-312).

    http://ieeexplore.ieee.org/document/934834/

  • Elson J and Estrin D. Random, Ephemeral Transaction Identifiers in dynamic sensor networks 21st International Conference on Distributed Computing Systems. 10.1109/ICDSC.2001.918976. 0-7695-1077-9. (459-468).

    http://ieeexplore.ieee.org/document/918976/

  • Flinn J, Narayanan D and Satyanarayanan M. Self-tuned remote execution for pervasive computing 8th Workshop on Hot Topic in Operating Systems. 10.1109/HOTOS.2001.990062. 0-7695-1040-X. (61-66).

    http://ieeexplore.ieee.org/document/990062/

  • Marinov D and Khurshid S. TestEra: a novel framework for automated testing of Java programs 16th Annual International Conference on Automated Software Engineering (ASE 2001). 10.1109/ASE.2001.989787. 0-7695-1426-X. (22-31).

    http://ieeexplore.ieee.org/document/989787/

  • Rowstron A and Druschel P. (2001). Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems. Middleware 2001. 10.1007/3-540-45518-3_18. (329-350).

    http://link.springer.com/10.1007/3-540-45518-3_18

  • Khurshid S. (2001). Testing an Intentional Naming Scheme Using Genetic Algorithms. Tools and Algorithms for the Construction and Analysis of Systems. 10.1007/3-540-45319-9_25. (358-372).

    http://link.springer.com/10.1007/3-540-45319-9_25

  • Subramanian L and Katz R. An architecture for building self-configurable systems. Proceedings of the 1st ACM international symposium on Mobile ad hoc networking & computing. (63-73).

    /doi/10.5555/514151.514162

  • Jackson D. Automating first-order relational logic. Proceedings of the 8th ACM SIGSOFT international symposium on Foundations of software engineering: twenty-first century applications. (130-139).

    https://doi.org/10.1145/355045.355063

  • Jackson D. (2000). Automating first-order relational logic. ACM SIGSOFT Software Engineering Notes. 25:6. (130-139). Online publication date: 1-Nov-2000.

    https://doi.org/10.1145/357474.355063

  • Grimm R, Anderson T, Bershad B and Wetherall D. A system architecture for pervasive computing. Proceedings of the 9th workshop on ACM SIGOPS European workshop: beyond the PC: new challenges for the operating system. (177-182).

    https://doi.org/10.1145/566726.566763

  • Snoeren A and Balakrishnan H. An end-to-end approach to host mobility. Proceedings of the 6th annual international conference on Mobile computing and networking. (155-166).

    https://doi.org/10.1145/345910.345938

  • Intanagonwiwat C, Govindan R and Estrin D. Directed diffusion. Proceedings of the 6th annual international conference on Mobile computing and networking. (56-67).

    https://doi.org/10.1145/345910.345920

  • Priyantha N, Chakraborty A and Balakrishnan H. The Cricket location-support system. Proceedings of the 6th annual international conference on Mobile computing and networking. (32-43).

    https://doi.org/10.1145/345910.345917

  • Tennenhouse D. (2000). Proactive computing. Communications of the ACM. 43:5. (43-50). Online publication date: 1-May-2000.

    https://doi.org/10.1145/332833.332837

  • Kumar S, Alaettinglu C and Estrin D. Scalable object-tracking through unattended techniques (SCOUT) ICNP 2000. 8th IEEE Conference on Network Protocols. 10.1109/ICNP.2000.896309. 0-7695-0921-5. (253-262).

    http://ieeexplore.ieee.org/document/896309/

  • Weibin Zhao , Schulzrinne H and Guttman E. mSLP-mesh-enhanced service location protocol Ninth International Conference on Computer Communications and Networks. 10.1109/ICCCN.2000.885536. 0-7803-6494-5. (504-509).

    http://ieeexplore.ieee.org/document/885536/

  • Khurshid S and Jackson D. (2000). Exploring the design of an intentional naming scheme with an automatic constraint analyzer Proceedings of ASE 2000 15th IEEE International Automated Software Engineering Conference. 10.1109/ASE.2000.873646. 0-7695-0710-7. (13-22).

    http://ieeexplore.ieee.org/document/873646/

  • Jackson D. (2000). Enforcing Design Constraints with Object Logic. Static Analysis. 10.1007/978-3-540-45099-3_1. (1-21).

    http://link.springer.com/10.1007/978-3-540-45099-3_1

  • Agarwal A, Norman D and Gupta A. Wireless Grids: Approaches, Architectures and Technical Challenges. SSRN Electronic Journal. 10.2139/ssrn.489782.

    http://www.ssrn.com/abstract=489782

  • Burgin M. (2022). Operations with Nested Named Sets as a Tool for Artificial Intelligence. Big Data and Cognitive Computing. 10.3390/bdcc6020037. 6:2. (37).

    https://www.mdpi.com/2504-2289/6/2/37

  • Alsudais A, Hashemi M, Huang Z, Balasubramanian B, Puzhavakath Narayanan S, Keller E and Joshi K. (2019). FOCUS: Scalable Search Over Highly Dynamic Geo-distributed State 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS). 10.1109/ICDCS.2019.00210. 978-1-7281-2519-0. (2134-2144).

    https://ieeexplore.ieee.org/document/8884845/

  • Oluwatimi O and Bertino E. A Multi-Enterprise Containerization Approach with an Interoperable Position-Based System. Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy. (256-266).

    https://doi.org/10.1145/3176258.3176311

  • Chan K, Ko B, Mastorakis S, Afanasyev A and Zhang L. Fuzzy Interest Forwarding. Proceedings of the 13th Asian Internet Engineering Conference. (31-37).

    https://doi.org/10.1145/3154970.3154975

  • Mortazavi S, Salehe M, Gomes C, Phillips C and de Lara E. Cloudpath. Proceedings of the Second ACM/IEEE Symposium on Edge Computing. (1-13).

    https://doi.org/10.1145/3132211.3134464

  • Huang Z, Balasubramanian B, Alsudais A and Joshi K. An edge-facilitated message broker for scalable device discovery. Proceedings of the Second ACM/IEEE Symposium on Edge Computing. (1-2).

    https://doi.org/10.1145/3132211.3132456

  • KAWAHARA R and SAITO H. (2017). Name Resolution Based on Set of Attribute-Value Pairs of Real-World Information. IEICE Transactions on Communications. 10.1587/transcom.2016EBP3005. E100.B:1. (110-121).

    https://www.jstage.jst.go.jp/article/transcom/E100.B/1/E100.B_2016EBP3005/_article

  • Wang L, Pan Y, Dong M, Yu Y and Wang K. (2017). Economic Levers for Mitigating Interest Flooding Attack in Named Data Networking. Mathematical Problems in Engineering. 10.1155/2017/4541975. 2017. (1-12).

    https://www.hindawi.com/journals/mpe/2017/4541975/

  • Dobson S, Viroli M, Fernandez-Marquez J, Zambonelli F, Stevenson G, Di Marzo Serugendo G, Montagna S, Pianini D, Ye J, Castelli G and Rosi A. (2016). Spatial awareness in pervasive ecosystems. The Knowledge Engineering Review. 10.1017/S0269888916000199. 31:04. (343-366). Online publication date: 1-Sep-2016.

    http://www.journals.cambridge.org/abstract_S0269888916000199

  • (2016). Naming and Discovery in Mobile Systems. The Handbook of Mobile Middleware. 10.1201/9781420013153-23. (417-438).

    https://www.taylorfrancis.com/books/9781420013153/chapters/10.1201/9781420013153-23

  • Afanasyev A, Yi C, Wang L, Zhang B and Zhang L. (2015). SNAMP: Secure namespace mapping to scale NDN forwarding IEEE INFOCOM 2015 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). 10.1109/INFCOMW.2015.7179398. 978-1-4673-7131-5. (281-286).

    http://ieeexplore.ieee.org/document/7179398/

  • Gao C, Ma J and Zhang S. (2015). A collaborative self-governing privacy-preserving wireless sensor network architecture based on location optimization for dynamic service discovery in MANET environment. International Journal of Distributed Sensor Networks. 2015. (7-7). Online publication date: 1-Jan-2015.

    https://doi.org/10.1155/2015/456146

  • Donovan S and Feamster N. Intentional Network Monitoring. Proceedings of the 13th ACM Workshop on Hot Topics in Networks. (1-7).

    https://doi.org/10.1145/2670518.2673872

  • Surobhi N and Jamalipour A. (2014). A MANET-based semantic traffic management framework for ubiquitous public safety networks. Wireless Communications & Mobile Computing. 14:12. (1127-1142). Online publication date: 25-Aug-2014.

    https://doi.org/10.1002/wcm.2259

  • Gulzar W, Sundhu M and Butt A. (2014). A New Tier Based Approach for Clustered Content Centric Networks Implementing Cloud Computing. Journal of Advances in Computer Networks. 10.7763/JACN.2014.V2.116. 2:3. (222-228).

    http://www.jacn.net/index.php?m=content&c=index&a=show&catid=34&id=143

  • Choi K, Lee H and Chang S. (2013). Mobile Application and Service Discovery Protocol for Device-to-Device Communication. The Journal of Korea Information and Communications Society. 10.7840/kics.2013.38A.10.908. 38A:10. (908-917). Online publication date: 31-Oct-2013.

    http://koreascience.or.kr/journal/view.jsp?kj=GCSHCI&py=2013&vnc=v38An10&sp=908

  • Zhygmanovskyi A and Yoshida N. (2013). Peer-to-Peer Network for Flexible Service Sharing and Discovery. Multiagent System Technologies. 10.1007/978-3-642-40776-5_15. (152-165).

    http://link.springer.com/10.1007/978-3-642-40776-5_15

  • Silva F, Heidemann J, Govindan R and Estrin D. (2012). Directed Diffusion. Distributed Sensor Networks, Second Edition. 10.1201/b12988-9. (161-184). Online publication date: 24-Sep-2012.

    http://www.crcnetbase.com/doi/abs/10.1201/b12988-9

  • Gautam N. (2012). Quality of Service Metrics with Applications to Sensor Networks. Distributed Sensor Networks, Second Edition. 10.1201/b12988-12. (223-240). Online publication date: 24-Sep-2012.

    http://www.crcnetbase.com/doi/abs/10.1201/b12988-12

  • Yu C, Jing S and Li X. An Architecture of Cyber Physical System Based on Service. Proceedings of the 2012 International Conference on Computer Science and Service System. (1409-1412).

    https://doi.org/10.1109/CSSS.2012.355

  • Young-Gwan K and Jae-Hong Y. (2012). Position coodinate-based energy efficient routing protocol for Wireless Sensor Networks 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD). 10.1109/FSKD.2012.6233941. 978-1-4673-0024-7. (2193-2197).

    http://ieeexplore.ieee.org/document/6233941/

  • Nguyen H, Tan Y and Shinoda Y. Building Distributed Attribute-Value Trees on DHT-based Networks. Proceedings of the 2012 IEEE 26th International Conference on Advanced Information Networking and Applications. (795-802).

    https://doi.org/10.1109/AINA.2012.98

  • Sharma S, Kapoor S, Srinivasan B and Narula M. (2012). HiCHO: Attributes Based Classification of Ubiquitous Devices. Mobile and Ubiquitous Systems: Computing, Networking, and Services. 10.1007/978-3-642-30973-1_10. (113-125).

    http://link.springer.com/10.1007/978-3-642-30973-1_10

  • Chauhan N, Chand N, Kumar P and Awasthi L. (2011). Enhancing Data Availability in MANETs with Cooperative Caching. International Journal of Mobile Computing and Multimedia Communications. 3:4. (53-66). Online publication date: 1-Oct-2011.

    https://doi.org/10.4018/jmcmc.2011100104

  • Nocedal A, Arrien J and Burgin M. (2011). A mathematical model for managing XML data. International Journal of Metadata, Semantics and Ontologies. 6:1. (56-73). Online publication date: 1-Sep-2011.

    https://doi.org/10.1504/IJMSO.2011.042490

  • Ruiz D, Urena J, Garcia J, Hernandez A, Garcia E and Aparicio J. (2010). Simultaneous mobile robot positioning and LPS self-calibration in a smart space 2010 IEEE International Symposium on Industrial Electronics (ISIE 2010). 10.1109/ISIE.2010.5637117. 978-1-4244-6390-9. (2865-2870).

    http://ieeexplore.ieee.org/document/5637117/

  • HOU J, LIU Y and GONG Z. (2010). Key Techniques of Identifier-Based Routing. Journal of Software. 10.3724/SP.J.1001.2010.03797. 21:6. (1326-1340). Online publication date: 29-Jun-2010.

    http://pub.chinasciencejournal.com/article/getArticleRedirect.action?doiCode=10.3724/SP.J.1001.2010.03797

  • Ahmed R and Boutaba R. (2010). Distributed Search and Pattern Matching. Handbook of Peer-to-Peer Networking. 10.1007/978-0-387-09751-0_16. (427-461).

    https://link.springer.com/10.1007/978-0-387-09751-0_16

  • Jacobson V, Smetters D, Briggs N, Plass M, Stewart P, Thornton J and Braynard R. VoCCN. Proceedings of the 2009 workshop on Re-architecting the internet. (1-6).

    https://doi.org/10.1145/1658978.1658980

  • Jacobson V, Smetters D, Thornton J, Plass M, Briggs N and Braynard R. Networking named content. Proceedings of the 5th international conference on Emerging networking experiments and technologies. (1-12).

    https://doi.org/10.1145/1658939.1658941

  • Xu W, Xin Y, Lu G and Chen Q. A New Service Description, Matching and Selection Mechanism for Pervasive Computing. Proceedings of the 2009 Sixth International Conference on Fuzzy Systems and Knowledge Discovery - Volume 04. (509-514).

    https://doi.org/10.1109/FSKD.2009.267

  • Cugola G, Margara A and Migliavacca M. (2009). Context-aware publish-subscribe: Model, implementation, and evaluation 2009 IEEE Symposium on Computers and Communications (ISCC). 10.1109/ISCC.2009.5202277. 978-1-4244-4672-8. (875-881).

    http://ieeexplore.ieee.org/document/5202277/

  • Moreno-Vozmediano R. (2009). A hybrid mechanism for resource/service discovery in ad-hoc grids. Future Generation Computer Systems. 25:7. (717-727). Online publication date: 1-Jul-2009.

    https://doi.org/10.1016/j.future.2008.02.002

  • CAO R, WU J and XU M. (2009). Research on Internet Naming. Journal of Software. 10.3724/SP.J.1001.2009.00363. 20:2. (363-374). Online publication date: 7-Apr-2009.

    http://pub.chinasciencejournal.com/article/getArticleRedirect.action?doiCode=10.3724/SP.J.1001.2009.00363

  • Goodell G, Roussopoulos M and Bradner S. (2009). A directory service for perspective access networks. IEEE/ACM Transactions on Networking. 17:2. (501-514). Online publication date: 1-Apr-2009.

    https://doi.org/10.1109/TNET.2009.2016389

  • Tavangarian D and Lucke U. Pervasive University – A Technical PerspectiveDie Pervasive University aus technischer Perspektive. it - Information Technology. 10.1524/itit.2009.0517. 51:1.

    http://www.degruyter.com/view/j/itit.2009.51.issue-1/itit.2009.0517/itit.2009.0517.xml

  • Liu L, Hong X, Wu J and Lin J. (2009). Optical grid synergy with peer-to-peer. IET Communications. 10.1049/iet-com:20080250. 3:3. (487).

    http://digital-library.theiet.org/content/journals/10.1049/iet-com_20080250

  • Johanson B, Fox A and Winograd T. (2009). The Stanford Interactive Workspaces Project. Designing User Friendly Augmented Work Environments. 10.1007/978-1-84800-098-8_2. (31-61).

    https://link.springer.com/10.1007/978-1-84800-098-8_2

  • Mazzola Paluska J, Pham H, Saif U, Chau G, Terman C and Ward S. (2008). Structured decomposition of adaptive applications. Pervasive and Mobile Computing. 4:6. (791-806). Online publication date: 1-Dec-2008.

    https://doi.org/10.1016/j.pmcj.2008.04.006

  • Louati W and Zeghlache D. A P2P-Based Middleware for Wide-Area Service Discovery. Proceedings of the 2008 Eighth International Workshop on Applications and Services in Wireless Networks. (57-65).

    https://doi.org/10.1109/ASWN.2008.11

  • Ruiz F, Urena J, Villadangos J, Gude I, Garcia J, Hernandez A and Jimenez A. (2008). Optimal test-point positions for calibrating an ultrasonic LPS system Factory Automation (ETFA 2008). 10.1109/ETFA.2008.4638416. 978-1-4244-1505-2. (338-344).

    http://ieeexplore.ieee.org/document/4638416/

  • Cotroneo D, Flora C, Graziano A and Russo S. (2008). Securing services in nomadic computing environments. Information and Software Technology. 50:9-10. (924-947). Online publication date: 1-Aug-2008.

    https://doi.org/10.1016/j.infsof.2007.08.002

  • Chen G, Li M and Kotz D. (2008). Data-centric middleware for context-aware pervasive computing. Pervasive and Mobile Computing. 4:2. (216-253). Online publication date: 1-Apr-2008.

    https://doi.org/10.1016/j.pmcj.2007.10.001

  • Ahamed S, Sharmin M and Ahmed S. A Risk-aware Trust Based Secure Resource Discovery (RTSRD) Model for Pervasive Computing. Proceedings of the 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications. (590-595).

    https://doi.org/10.1109/PERCOM.2008.113

  • Yanming Chen , Zhen Yang and Shunyan Huang . (2007). Strategy of energy efficient protocol in wireless sensor networks based on nonuniform-ring-zone model 2007 International Symposium on Intelligent Signal Processing and Communication Systems. 10.1109/ISPACS.2007.4445989. 978-1-4244-1446-8. (722-725).

    http://ieeexplore.ieee.org/document/4445989/

  • Ahmed R, Limam N, Xiao J, Iraqi Y and Boutaba R. (2007). Resource and service discovery in large-scale multi-domain networks. IEEE Communications Surveys & Tutorials. 9:4. (2-30). Online publication date: 1-Oct-2007.

    https://doi.org/10.1109/COMST.2007.4444748

  • Grigoras D and Yiqing Zhao . (2007). Simple self-management of Mobile Ad Hoc Networks 2007 9th IFIP International Conference on Mobile Wireless Communications Networks - (MWCN). 10.1109/ICMWCN.2007.4668205. 978-1-4244-1719-3. (181-185).

    http://ieeexplore.ieee.org/document/4668205/

  • Lee S, Shin S, Hwang H and Kim C. A Study on the Circular Sensing Model with a Low Power Profile in Wireless Sensor Networks. Proceedings of the 5th ACIS International Conference on Software Engineering Research, Management & Applications. (616-624).

    https://doi.org/10.1109/SERA.2007.32

  • Kalasapur S, Kumar M and Shirazi B. (2007). Dynamic Service Composition in Pervasive Computing. IEEE Transactions on Parallel and Distributed Systems. 18:7. (907-918). Online publication date: 1-Jul-2007.

    https://doi.org/10.1109/TPDS.2007.1039

  • Cook D and Das S. (2007). How smart are our environments? An updated look at the state of the art. Pervasive and Mobile Computing. 3:2. (53-73). Online publication date: 1-Mar-2007.

    https://doi.org/10.1016/j.pmcj.2006.12.001

  • Wang S, Wu J and Hsu C. (2006). Design of a resource advertisement and discovery protocol for large and dense manets. Journal of the Chinese Institute of Engineers. 10.1080/02533839.2006.9671218. 29:7. (1161-1171). Online publication date: 1-Oct-2006.

    http://www.tandfonline.com/doi/abs/10.1080/02533839.2006.9671218

  • Edwards W. (2006). Discovery Systems in Ubiquitous Computing. IEEE Pervasive Computing. 5:2. (70-77). Online publication date: 1-Apr-2006.

    https://doi.org/10.1109/MPRV.2006.28

  • Farkas K, Wellnitz O, Dick M, Gu X, Busse M, Effelsberg W, Rebahi Y, Sisalem D, Grigoras D, Stefanidis K and Serpanos D. (2006). Real-time service provisioning for mobile and wireless networks. Computer Communications. 29:5. (540-550). Online publication date: 1-Mar-2006.

    https://doi.org/10.1016/j.comcom.2005.06.005

  • Broxvall M, Gritti M, Saffiotti A, Beom-Su Seo and Young-Jo Cho . PEIS Ecology: integrating robots into smart environments 2006 IEEE International Conference on Robotics and Automation, 2006. ICRA 2006.. 10.1109/ROBOT.2006.1641186. 0-7803-9505-0. (212-218).

    http://ieeexplore.ieee.org/document/1641186/

  • Kumar M and Das S. Pervasive Computing: Enabling Technologies and Challenges. Handbook of Nature-Inspired and Innovative Computing. 10.1007/0-387-27705-6_19. (613-631).

    http://link.springer.com/10.1007/0-387-27705-6_19

  • Zhu F, Mutka M and Ni L. (2005). Service Discovery in Pervasive Computing Environments. IEEE Pervasive Computing. 4:4. (81-90). Online publication date: 1-Oct-2005.

    https://doi.org/10.1109/MPRV.2005.87

  • Ahmed R, Boutaba R, Cuervo F, Iraqi Y, Li T, Limam N, Xiao J and Ziembicki J. (2005). Service naming in large-scale and multi-domain networks. IEEE Communications Surveys & Tutorials. 7:3. (38-54). Online publication date: 1-Jul-2005.

    https://doi.org/10.1109/COMST.2005.1610549

  • Delicato F, Pires P, Pirmez L and Carmo L. (2005). A Service Approach for Architecting Application Independent Wireless Sensor Networks. Cluster Computing. 8:2-3. (211-221). Online publication date: 1-Jul-2005.

    https://doi.org/10.1007/s10586-005-6186-4

  • Gong Y. A C/S and P2P Hybrid Resource Discovery Framework in Grid Environments. Proceedings of the 2005 International Conference on Parallel Processing. (261-268).

    https://doi.org/10.1109/ICPP.2005.5

  • Niemegeers I and Groot S. (2005). FEDNETS. Wireless Personal Communications: An International Journal. 33:3-4. (305-318). Online publication date: 1-Jun-2005.

    https://doi.org/10.1007/s11277-005-0574-1

  • Yura J, Nakazawa J and Tokuda H. Galaxy DS. Proceedings of the 19th International Conference on Advanced Information Networking and Applications - Volume 1. (699-704).

    https://doi.org/10.1109/AINA.2005.190

  • Louati W, Genet M and Zeghlache D. UPnP Extension for Wide-area Service Discovery using the INS/Twine Framework 2005 IEEE 16th International Symposium on Personal, Indoor and Mobile Radio Communications. 10.1109/PIMRC.2005.1651791. 978-3-8007-29. (2004-2008).

    http://ieeexplore.ieee.org/document/1651791/

  • Capra L, Zachariadis S and Mascolo C. Q-CAD: QoS and context aware discovery framework for mobile systems ICPS '05. International Conference on Pervasive Services, 2005.. 10.1109/PERSER.2005.1506566. 0-7803-9032-6. (453-456).

    http://ieeexplore.ieee.org/document/1506566/

  • Wu J, Shun-Te Wang and Chun-Yen Hsu . A simple resource advertisement and discovery protocol for large and dense MANETs ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005.. 10.1109/ITRE.2005.1503056. 0-7803-8932-8. (18-22).

    http://ieeexplore.ieee.org/document/1503056/

  • Bauer D, Hurley P, Pletka R and Waldvogel M. Bringing Efficient Advanced Queries to Distributed Hash Tables. Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks. (6-14).

    https://doi.org/10.1109/LCN.2004.32

  • Cotroneo D, Graziano A and Russo S. Security requirements in service oriented architectures for ubiquitous computing. Proceedings of the 2nd workshop on Middleware for pervasive and ad-hoc computing. (172-177).

    https://doi.org/10.1145/1028509.1028522

  • Raman S, Clarke D, Burnside M, Devadas S and Rivest R. (2004). Access‐controlled resource discovery in pervasive networks. Concurrency and Computation: Practice and Experience. 10.1002/cpe.806. 16:11. (1099-1120). Online publication date: 1-Sep-2004.

    https://onlinelibrary.wiley.com/doi/10.1002/cpe.806

  • Johanson B and Fox A. (2004). Extending tuplespaces for coordination in interactive workspaces. Journal of Systems and Software. 69:3. (243-266). Online publication date: 15-Jan-2004.

    https://doi.org/10.1016/S0164-1212(03)00054-2

  • Nakazawa J, Yura J and Tokuda H. Galaxy: a service shaping approach for addressing the hidden service problem Second IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems, 2004.. 10.1109/WSTFES.2004.1300411. 0-7695-2123-1. (35-39).

    http://ieeexplore.ieee.org/document/1300411/

  • Pasman W. Organizing ad hoc agents for human-agent service matching The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004.. 10.1109/MOBIQ.2004.1331734. 0-7695-2208-4. (278-287).

    http://ieeexplore.ieee.org/document/1331734/

  • Wilkinson D, Chow C and Yu Cai . Enhanced secure dynamic DNS update with indirect route from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004.. 10.1109/IAW.2004.1437836. 0-7803-8572-1. (335-341).

    http://ieeexplore.ieee.org/document/1437836/

  • Rowanhill J, Varner P and Knight J. (2004). Efficient hierarchic management for reconfiguration of networked information systems International Conference on Dependable Systems and Networks, 2004. 10.1109/DSN.2004.1311921. 0-7695-2052-9. (517-526).

    http://ieeexplore.ieee.org/document/1311921/

  • Bukhari U and Abbas F. (2004). A comparative study of naming, resolution & discovery schemes for networked environments Proceedings. Second Annual Conference on Communication Networks and Services Research, 2004.. 10.1109/DNSR.2004.1344737. 0-7695-2096-0. (265-272).

    http://ieeexplore.ieee.org/document/1344737/

  • Zambonelli F and Van Dyke Parunak H. (2003). Towards a paradigm change in computer science and software engineering: a synthesis. The Knowledge Engineering Review. 18:4. (329-342). Online publication date: 1-Dec-2003.

    https://doi.org/10.1017/S0269888904000104

  • Lee C, Helal A, Desai N, Verma V and Arslan B. (2003). Konark. IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans. 33:6. (682-696). Online publication date: 1-Nov-2003.

    https://doi.org/10.1109/TSMCA.2003.819493

  • Dimitoglou G, Moore P and Rotenstreich S. Middleware for large distributed systems and organizations. Proceedings of the 1st international symposium on Information and communication technologies. (536-542).

    /doi/10.5555/963600.963708

  • Niemegeers I and Heemstra De Groot S. (2003). Research Issues in Ad-Hoc Distributed Personal Networking. Wireless Personal Communications: An International Journal. 26:2-3. (149-167). Online publication date: 27-Aug-2003.

    https://doi.org/10.1023/A:1025522402484

  • Stanley-Marbell P, Marculescu D, Marculescu R and Khosla P. (2003). Modeling, Analysis, and Self-Management of Electronic Textiles. IEEE Transactions on Computers. 52:8. (996-1010). Online publication date: 1-Aug-2003.

    https://doi.org/10.1109/TC.2003.1223635

  • Ponnekanti S, Johanson B, Kiciman E and Fox A. Portability, Extensibility and Robustness in iROS. Proceedings of the First IEEE International Conference on Pervasive Computing and Communications.

    /doi/10.5555/826025.826373

  • Raman S, Clarke D, Burnside M, Devadas S and Rivest R. Access-controlled resource discovery for pervasive networks. Proceedings of the 2003 ACM symposium on Applied computing. (338-345).

    https://doi.org/10.1145/952532.952600

  • Intanagonwiwat C, Govindan R, Estrin D, Heidemann J and Silva F. (2003). Directed diffusion for wireless sensor networking. IEEE/ACM Transactions on Networking. 11:1. (2-16). Online publication date: 1-Feb-2003.

    https://doi.org/10.1109/TNET.2002.808417

  • Denny M, Franklin M, Castro P and Purakayastha A. Mobiscope. Proceedings of the 4th International Conference on Mobile Data Management. (307-324).

    /doi/10.5555/648060.747129

  • Babu R and Govindaraj P. Access-controlled resource discovery for pervasive networks 23rd International Conference on Distributed Computing Systems Workshops, 2003.. 10.1109/ICDCSW.2003.1203646. 0-7695-1921-0. (776-781).

    http://ieeexplore.ieee.org/document/1203646/

  • Abdelzaher T, Stankovic J, Son S, Blum B, He T, Wood A and Lu C. A communication architecture and programming abstractions for real-time embedded sensor networks 23rd International Conference on Distributed Computing Systems Workshops, 2003.. 10.1109/ICDCSW.2003.1203558. 0-7695-1921-0. (220-225).

    http://ieeexplore.ieee.org/document/1203558/

  • Hassan W. (2003). Fractal naming and mobility model and wireless ad-hoc networks ConTEL 2003 - 7th International Conference on Telecommunications. 10.1109/CONTEL.2003.176902. 953-184-052-0. (137-144).

    http://ieeexplore.ieee.org/document/1214636/

  • Denny M, Franklin M, Castro P and Purakayastha A. (2003). Mobiscope: A Scalable Spatial Discovery Service for Mobile Network Resources. Mobile Data Management. 10.1007/3-540-36389-0_21. (307-324).

    http://link.springer.com/10.1007/3-540-36389-0_21

  • Schurgers C, Kulkarni G and Srivastava M. (2002). Distributed On-Demand Address Assignment in Wireless Sensor Networks. IEEE Transactions on Parallel and Distributed Systems. 13:10. (1056-1065). Online publication date: 1-Oct-2002.

    https://doi.org/10.1109/TPDS.2002.1041881

  • Balazinska M, Balakrishnan H and Karger D. INS/Twine. Proceedings of the First International Conference on Pervasive Computing. (195-210).

    /doi/10.5555/646867.759748

  • Slijepcevic S, Megerian S and Potkonjak M. (2002). Location errors in wireless embedded sensor networks. ACM SIGMOBILE Mobile Computing and Communications Review. 6:3. (67-78). Online publication date: 1-Jun-2002.

    https://doi.org/10.1145/581291.581301

  • Johanson B, Fox A and Winograd T. (2002). The Interactive Workspaces Project. IEEE Pervasive Computing. 1:2. (67-74). Online publication date: 1-Apr-2002.

    https://doi.org/10.1109/MPRV.2002.1012339

  • Burnside M, Clarke D, Mills T, Maywah A, Devadas S and Rivest R. Proxy-based security protocols in networked mobile devices. Proceedings of the 2002 ACM symposium on Applied computing. (265-272).

    https://doi.org/10.1145/508791.508845

  • Georgiev V and Getov V. Assignment schemes for replicated services in Jini. Proceedings of the 10th Euromicro conference on Parallel, distributed and network-based processing. (129-136).

    /doi/10.5555/1895489.1895508

  • Kindberg T and Fox A. (2002). System Software for Ubiquitous Computing. IEEE Pervasive Computing. 1:1. (70-81). Online publication date: 1-Jan-2002.

    https://doi.org/10.1109/MPRV.2002.993146

  • Want R, Borriello G, Pering T and Farkas K. (2002). Disappearing Hardware. IEEE Pervasive Computing. 1:1. (36-47). Online publication date: 1-Jan-2002.

    https://doi.org/10.1109/MPRV.2002.993143

  • Kulkarni G, Schurgers C and Srivastava M. Dynamic link labels for energy efficient MAC headers in wireless sensor networks IEEE SENSORS 2002. 10.1109/ICSENS.2002.1037348. 0-7803-7454-1. (1520-1525).

    http://ieeexplore.ieee.org/document/1037348/

  • Georgiev V and Getov V. Assignment schemes for replicated services in Jini 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing. 10.1109/EMPDP.2002.994249. 0-7695-1444-8. (129-136).

    http://ieeexplore.ieee.org/document/994249/

  • Meguerdichian S, Slijepcevic S, Karayan V and Potkonjak M. Localized algorithms in wireless ad-hoc networks. Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing. (106-116).

    https://doi.org/10.1145/501431.501432

  • Meguerdichian S, Koushanfar F, Qu G and Potkonjak M. Exposure in wireless Ad-Hoc sensor networks. Proceedings of the 7th annual international conference on Mobile computing and networking. (139-150).

    https://doi.org/10.1145/381677.381691

  • Castro P, Greenstein B, Muntz R, Bisdikian C, Kermani P and Papadopouli M. Locating application data across service discovery domains. Proceedings of the 7th annual international conference on Mobile computing and networking. (28-42).

    https://doi.org/10.1145/381677.381681

  • Cranor C, Green M, Kalmanek C, Shur D, Sibal S, Van der Merwe J and Sreenan C. (2001). Enhanced Streaming Services in a Content Distribution Network. IEEE Internet Computing. 5:4. (66-75). Online publication date: 1-Jul-2001.

    https://doi.org/10.1109/4236.939452

  • Castro P and Muntz R. An adaptive approach to indexing pervasive data. Proceedings of the 2nd ACM international workshop on Data engineering for wireless and mobile access. (14-19).

    https://doi.org/10.1145/376868.376884

  • Maheswaran M. Data dissemination approaches for performance discovery in grid computing systems IEEE International Symposium on Parallel and Distributed Processing. 10.1109/IPDPS.2001.925046. 0-7695-0990-8. (910-923).

    http://ieeexplore.ieee.org/document/925046/

  • Grimm R, Davis J, Hendrickson B, Lemar E, MacBeth A, Swanson S, Anderson T, Bershad B, Borriello G, Gribble S and Wetherall D. Systems directions for pervasive computing 8th Workshop on Hot Topic in Operating Systems. 10.1109/HOTOS.2001.990075. 0-7695-1040-X. (147-151).

    http://ieeexplore.ieee.org/document/990075/

  • Krauter K and Maheswaran M. (2000). Architecture for a Grid Operating System. Grid Computing — GRID 2000. 10.1007/3-540-44444-0_7. (65-76).

    http://link.springer.com/10.1007/3-540-44444-0_7

  • Maheswaran M and Krauter K. (2000). A Parameter-Based Approach to Resource Discovery in Grid Computing Systems. Grid Computing — GRID 2000. 10.1007/3-540-44444-0_17. (181-190).

    http://link.springer.com/10.1007/3-540-44444-0_17

  • Agarwal A, Gupta A and Norman D. Self-configuration and Self-Administration of Wirelss Grids. SSRN Electronic Journal. 10.2139/ssrn.490622.

    http://www.ssrn.com/abstract=490622

  • Kaushik S and Poonia R. Evolutionary Study of Service Location Protocol. SSRN Electronic Journal. 10.2139/ssrn.3166505.

    https://www.ssrn.com/abstract=3166505