{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,31]],"date-time":"2024-05-31T02:59:12Z","timestamp":1717124352596},"reference-count":37,"publisher":"Elsevier BV","issue":"7","license":[{"start":{"date-parts":[[2012,7,1]],"date-time":"2012-07-01T00:00:00Z","timestamp":1341100800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Systems and Software"],"published-print":{"date-parts":[[2012,7]]},"DOI":"10.1016\/j.jss.2012.02.011","type":"journal-article","created":{"date-parts":[[2012,2,15]],"date-time":"2012-02-15T04:00:41Z","timestamp":1329278441000},"page":"1637-1649","source":"Crossref","is-referenced-by-count":10,"title":["Octopus: An Upperware based system for building personal pervasive environments"],"prefix":"10.1016","volume":"85","author":[{"given":"Francisco J.","family":"Ballesteros","sequence":"first","affiliation":[]},{"given":"Enrique","family":"Soriano","sequence":"additional","affiliation":[]},{"given":"Gorka","family":"Guardiola","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jss.2012.02.011_bib0005","unstructured":"Apple Shiny Droplets. http:\/\/www.apple.com\/downloads\/macosx\/productivity_tools\/shinydroplets.html."},{"key":"10.1016\/j.jss.2012.02.011_bib0010","series-title":"Proceedings of the IEEE PerCom 2005","first-page":"295","article-title":"Traditional systems can work well for pervasive applications A case study: Plan 9 from Bell Labs becomes ubiquitous.","author":"Ballesteros","year":"2005"},{"key":"10.1016\/j.jss.2012.02.011_bib0015","series-title":"Proceedings of the IEEE PerCom 2006","first-page":"126","article-title":"Plan B: an operating system for ubiquitous computing environments","author":"Ballesteros","year":"2006"},{"issue":"4","key":"10.1016\/j.jss.2012.02.011_bib0020","doi-asserted-by":"crossref","first-page":"472","DOI":"10.1016\/j.pmcj.2006.08.001","article-title":"The Plan B OS for ubiquitous computing. Voice, security, and terminals as case studies","volume":"2","author":"Ballesteros","year":"2006","journal-title":"Pervasive and Mobile Computing Journal"},{"key":"10.1016\/j.jss.2012.02.011_bib0025","series-title":"Proceedings of the 2nd International Workshop on Plan 9","article-title":"Op: Styx batching for high latency links.","author":"Ballesteros","year":"2007"},{"issue":"6","key":"10.1016\/j.jss.2012.02.011_bib0030","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/MPRV.2007.65","article-title":"Plan B: using files instead of middleware abstractions for pervasive computing environments","volume":"3","author":"Ballesteros","year":"2007","journal-title":"IEEE Pervasive Computing"},{"key":"10.1016\/j.jss.2012.02.011_bib0035","series-title":"Proceedings of the PerCom Workshops","article-title":"Upperware: bringing resources back to the system.","author":"Ballesteros","year":"2010"},{"key":"10.1016\/j.jss.2012.02.011_bib0040","series-title":"Proceedings of the 10th ACM Annual International Conference on Mobile Computing and Networking","article-title":"Mobidesk: mobile virtual desktop computing.","author":"Baratto","year":"2004"},{"issue":"1","key":"10.1016\/j.jss.2012.02.011_bib0045","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1109\/MPRV.2010.11","article-title":"Service composition issues in pervasive computing","volume":"9","author":"Bronsted","year":"2010","journal-title":"IEEE Pervasive Computing"},{"issue":"1","key":"10.1016\/j.jss.2012.02.011_bib0050","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1002\/bltj.2028","article-title":"The Inferno operating system","volume":"2","author":"Dorward","year":"1997","journal-title":"Bell Labs Technical Journal"},{"key":"10.1016\/j.jss.2012.02.011_bib0055","unstructured":"R.T. Fielding, 2000. Architectural styles and the design of network-based software architectures Doctoral dissertation, University of California, Irvine. ISBN:0-599-87118-0."},{"key":"10.1016\/j.jss.2012.02.011_bib0060","unstructured":"FUSE. Filesystem in userspace http:\/\/fuse.sourceforge.net."},{"key":"10.1016\/j.jss.2012.02.011_bib0065","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/MPRV.2002.1012334","article-title":"Project Aura: toward distraction-free pervasive computing","volume":"4","author":"Garlan","year":"2002","journal-title":"IEEE Pervasive Computing"},{"key":"10.1016\/j.jss.2012.02.011_bib0070","series-title":"The Google File System 19th ACM Symposium on Operating Systems Principles","author":"Ghemawat","year":"2003"},{"issue":"5","key":"10.1016\/j.jss.2012.02.011_bib0075","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1145\/121133.121138","article-title":"Semantic file systems","volume":"25","author":"Gifford","year":"1991","journal-title":"ACM SIGOPS Operating Systems Review"},{"issue":"4","key":"10.1016\/j.jss.2012.02.011_bib0080","article-title":"The Ninja architecture for robust Internet scale systems and services","volume":"35","author":"Gribble","year":"2000","journal-title":"Computer Networks. Special Issue on Pervasive Computing"},{"key":"10.1016\/j.jss.2012.02.011_bib0085","series-title":"Proceedings of FuDiCo","article-title":"Future directions: system support for pervasive applications","author":"Grimm","year":"2002"},{"key":"10.1016\/j.jss.2012.02.011_bib0090","series-title":"The Fifth Workshop on Embedded Networked Sensors (HotEmNets 2008)","article-title":"A filesystem interface for sensor networks","author":"Horey","year":"2008"},{"key":"10.1016\/j.jss.2012.02.011_bib0095","unstructured":"Introduction to X10 Home Automation Technology. O\u2019Reilly Media. http:\/\/www.oreillynet.com\/pub\/a\/network\/2005\/01\/10\/x10_hmhck.html."},{"key":"10.1016\/j.jss.2012.02.011_bib0100","first-page":"71","article-title":"The interactive project: experience with ubiquitous computing rooms","volume":"2","author":"Johanson","year":"2002","journal-title":"IEEE Pervasive Computing"},{"key":"10.1016\/j.jss.2012.02.011_bib0105","series-title":"Ottawa Linux Symposium 2010","article-title":"VirtFSA virtualization aware File System pass-through","author":"Jujjuri","year":"2010"},{"key":"10.1016\/j.jss.2012.02.011_bib0110","series-title":"Proceedings of the Summer 1984 USENIX Conference","article-title":"Processes as files","author":"Killian","year":"1984"},{"issue":"1","key":"10.1016\/j.jss.2012.02.011_bib0115","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/146941.146942","article-title":"Disconnected operation in the Coda File System","volume":"10","author":"Kistler","year":"1992","journal-title":"ACM Transactions on Computer Systems"},{"key":"10.1016\/j.jss.2012.02.011_bib0120","unstructured":"Oracle DataBase Secure Files and Large Objects Developers Guide. 11G rel 2. 2009."},{"key":"10.1016\/j.jss.2012.02.011_bib0125","series-title":"Proceedings of the 2nd International System Administration and Networking Conference SANE 2000","article-title":"The NFS version 4 protocol","author":"Pawlowski","year":"2000"},{"issue":"2","key":"10.1016\/j.jss.2012.02.011_bib0130","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1002\/bltj.2169","article-title":"The Styx Architecture for Distributed Systems","volume":"4","author":"Pike","year":"1999","journal-title":"Bell Labs Technical Journal"},{"key":"10.1016\/j.jss.2012.02.011_bib0135","series-title":"Proceedings of the Summer 1990 UKUUG Conference","first-page":"1","article-title":"Plan 9 from Bell Labs","author":"Pike","year":"1990"},{"key":"10.1016\/j.jss.2012.02.011_bib0145","unstructured":"Protocols for X\/Open PC Interworking: SMB, Version 2. Technical Standards. ISBN:1-87263-045-6. 1992."},{"key":"10.1016\/j.jss.2012.02.011_bib0150","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/MPRV.2002.1158281","article-title":"Gaia: a middleware infrastructure to enable active spaces","volume":"1","author":"Roman","year":"2002","journal-title":"IEEE Pervasive Computing"},{"issue":"4","key":"10.1016\/j.jss.2012.02.011_bib0155","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1109\/MPRV.2009.66","article-title":"A virtualization infrastructure that supports pervasive computing","volume":"8","author":"Rudolph","year":"2009","journal-title":"IEEE Pervasive Computing"},{"issue":"1","key":"10.1016\/j.jss.2012.02.011_bib0160","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1145\/1057977.1057980","article-title":"Optimistic replication","volume":"37","author":"Saito","year":"2005","journal-title":"ACM Computing Surveys"},{"issue":"4","key":"10.1016\/j.jss.2012.02.011_bib0165","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/MPRV.2009.82","article-title":"The case for VM-Based Cloudlets in mobile computing","volume":"8","author":"Satyanarayanan","year":"2009","journal-title":"IEEE Pervasive Computing"},{"issue":"1","key":"10.1016\/j.jss.2012.02.011_bib0170","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/MPRV.2002.993138","article-title":"A catalyst for mobile and ubiquitous computing","volume":"1","author":"Satyanarayanan","year":"2002","journal-title":"IEEE Pervasive Computing"},{"issue":"1","key":"10.1016\/j.jss.2012.02.011_bib0175","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1109\/4434.749137","article-title":"Globe: a wide-area distributed system","volume":"7","author":"van Steen","year":"1999","journal-title":"IEEE Concurrency"},{"issue":"3","key":"10.1016\/j.jss.2012.02.011_bib0180","first-page":"78","article-title":"The computer for the 21st century","volume":"272","author":"Weiser","year":"1995","journal-title":"Scientific American"},{"key":"10.1016\/j.jss.2012.02.011_bib0185","series-title":"Proceedings 2009 IEEE Symposium on Security and Privacy","article-title":"Native Client: a sandbox for portable, untrusted x86 native code","author":"Yee","year":"2009"},{"key":"10.1016\/j.jss.2012.02.011_bib0190","doi-asserted-by":"crossref","first-page":"648","DOI":"10.1007\/11833529_66","article-title":"Mobile agent enabled application mobility for pervasive computing. LNCS","volume":"4159","author":"Yu","year":"2006","journal-title":"Ubiquitous Intelligence and Computing"}],"container-title":["Journal of Systems and Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S016412121200043X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S016412121200043X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,11,26]],"date-time":"2018-11-26T05:50:35Z","timestamp":1543211435000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S016412121200043X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,7]]},"references-count":37,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2012,7]]}},"alternative-id":["S016412121200043X"],"URL":"https:\/\/doi.org\/10.1016\/j.jss.2012.02.011","relation":{},"ISSN":["0164-1212"],"issn-type":[{"value":"0164-1212","type":"print"}],"subject":[],"published":{"date-parts":[[2012,7]]}}}