{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T12:49:30Z","timestamp":1743079770734,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030150341"},{"type":"electronic","value":"9783030150358"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-15035-8_97","type":"book-chapter","created":{"date-parts":[[2019,3,14]],"date-time":"2019-03-14T08:30:46Z","timestamp":1552552246000},"page":"985-995","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Situation Detection on the Edge"],"prefix":"10.1007","author":[{"given":"Nikos","family":"Papageorgiou","sequence":"first","affiliation":[]},{"given":"Dimitris","family":"Apostolou","sequence":"additional","affiliation":[]},{"given":"Yiannis","family":"Verginadis","sequence":"additional","affiliation":[]},{"given":"Andreas","family":"Tsagkaropoulos","sequence":"additional","affiliation":[]},{"given":"Gregoris","family":"Mentzas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,15]]},"reference":[{"issue":"2","key":"97_CR1","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/s00778-003-0108-y","volume":"13","author":"A Adi","year":"2004","unstructured":"Adi, A., Etzion, O.: Amit - the situation manager. VLDB J. 13(2), 177\u2013203 (2004)","journal-title":"VLDB J."},{"key":"97_CR2","unstructured":"Amazon (2018). \n                    https:\/\/aws.amazon.com\/autoscaling"},{"issue":"3","key":"97_CR3","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1017\/S0269888904000025","volume":"18","author":"H Chen","year":"2004","unstructured":"Chen, H., Finin, T., Joshi, A.: An ontology for context-aware pervasive computing environments. Knowl. Eng. Rev. 18(3), 197\u2013207 (2004)","journal-title":"Knowl. Eng. Rev."},{"key":"97_CR4","unstructured":"Cohen, N.H., Lei, H., Castro, P., Davis II., J.S., Purakayastha, A.: Composing pervasive data using iQL. In: Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications, WMCSA 2002, pp. 94\u2013104 (2002)"},{"key":"97_CR5","doi-asserted-by":"crossref","unstructured":"Haghighi, P.D., Krishnaswamy, S., Zaslavsky, A., Gaber, M.M.: Reasoning about context in uncertain pervasive computing environments. In: Proceedings of the 3rd European Conference on Smart Sensing and Context, EuroSSC 2008, pp. 112\u2013125. Springer, Heidelberg (2008)","DOI":"10.1007\/978-3-540-88793-5_9"},{"key":"97_CR6","doi-asserted-by":"crossref","DOI":"10.1201\/b11371","volume-title":"Designing for Situation Awareness: An Approach to User-Centered Design","author":"M Endsley","year":"2016","unstructured":"Endsley, M.: Designing for Situation Awareness: An Approach to User-Centered Design, 2nd edn. CRC Press, Boca Raton (2016)","edition":"2"},{"key":"97_CR7","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.cose.2014.06.008","volume":"46","author":"U Franke","year":"2014","unstructured":"Franke, U., Brynielsson, J.: Cyber situational awareness - a systematic review of the literature. Comput. Secur. 46, 18\u201331 (2014)","journal-title":"Comput. Secur."},{"key":"97_CR8","unstructured":"Google Cloud (2018). \n                    https:\/\/cloud.google.com\/compute\/docs\/autoscaler\/"},{"key":"97_CR9","doi-asserted-by":"crossref","unstructured":"Gray, P.D., Salber, D.: Modelling and using sensed context information in the design of interactive applications. In: Proceedings of the 8th IFIP International Conference on Engineering for Human-Computer Interaction, EHCI 2001, pp. 317\u2013336. Springer, London (2001)","DOI":"10.1007\/3-540-45348-2_26"},{"issue":"6","key":"97_CR10","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1016\/j.datak.2010.01.004","volume":"69","author":"T Gu","year":"2010","unstructured":"Gu, T., Chen, S., Tao, X., Lu, J.: A non supervised approach to activity recognition and segmentation based on object-use fingerprints. Data Knowl. Eng. 69(6), 533\u2013544 (2010)","journal-title":"Data Knowl. Eng."},{"key":"97_CR11","unstructured":"Kubernetes (2018). \n                    https:\/\/kubernetes.io\/docs\/tasks\/run-application\/horizontal-pod-autoscale-walkthrough\/"},{"issue":"4","key":"97_CR12","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1145\/643550.643554","volume":"6","author":"H Lei","year":"2002","unstructured":"Lei, H., Sow, D.M., John, S., Davis, I., Banavar, G., Ebling, M.R.: The design and applications of a context service. SIGMOBILE Mob. Comput. Commun. Rev. 6(4), 45\u201355 (2002)","journal-title":"SIGMOBILE Mob. Comput. Commun. Rev."},{"issue":"2","key":"97_CR13","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/s41066-015-0005-y","volume":"1","author":"V Loia","year":"2016","unstructured":"Loia, V., D\u2019Aniello, G., Gaeta, A., Orciuoli, F.: Enforcing situation awareness with granular computing: a systematic overview and new perspectives. Granular Comput. 1(2), 127\u2013143 (2016)","journal-title":"Granular Comput."},{"issue":"2","key":"97_CR14","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1016\/j.pmcj.2009.03.004","volume":"6","author":"SW Loke","year":"2010","unstructured":"Loke, S.W.: Incremental awareness and compositionality: a design philosophy for context-aware pervasive systems. Pervasive Mob. Comput. 6(2), 239\u2013253 (2010)","journal-title":"Pervasive Mob. Comput."},{"key":"97_CR15","unstructured":"OpenStack (2018). \n                    https:\/\/docs.openstack.org\/senlin\/latest\/scenarios\/autoscaling_heat.html"},{"issue":"2","key":"97_CR16","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MPRV.2004.1316821","volume":"03","author":"A Ranganathan","year":"2004","unstructured":"Ranganathan, A., Al-Muhtadi, J., Campbell, R.H.: Reasoning about uncertain contexts in pervasive computing environments. IEEE Pervasive Comput. 03(2), 62\u201370 (2004)","journal-title":"IEEE Pervasive Comput."},{"key":"97_CR17","unstructured":"Yau, S.S., Liu, J.: Hierarchical situation modeling and reasoning for pervasive computing. In: The Fourth IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems, SEUS 2006\/WCCIA 2006, pp. 6-pp, April 2006"},{"issue":"1","key":"97_CR18","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.pmcj.2011.01.004","volume":"8","author":"J Ye","year":"2012","unstructured":"Ye, J., Dobson, S., McKeever, S.: Situation identification techniques in pervasive computing: a review. Pervasive Mob. Comput. 8(1), 36\u201366 (2012)","journal-title":"Pervasive Mob. Comput."}],"container-title":["Advances in Intelligent Systems and Computing","Web, Artificial Intelligence and Network Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-15035-8_97","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,18]],"date-time":"2019-05-18T02:58:42Z","timestamp":1558148322000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-15035-8_97"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030150341","9783030150358"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-15035-8_97","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"15 March 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WAINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Workshops of  the International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Matsue","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 March 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 March 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"33","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"waina2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2019\/workshops.php","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}