{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T23:21:37Z","timestamp":1743117697287,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":41,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642041662"},{"type":"electronic","value":"9783642041679"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04167-9_6","type":"book-chapter","created":{"date-parts":[[2009,8,19]],"date-time":"2009-08-19T06:45:02Z","timestamp":1250664302000},"page":"102-118","source":"Crossref","is-referenced-by-count":2,"title":["Formal Modular Modelling of Context-Awareness"],"prefix":"10.1007","author":[{"given":"Mats","family":"Neovius","sequence":"first","affiliation":[]},{"given":"Kaisa","family":"Sere","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Weiser, M.: The Computer for the Twenty-First Century. Scientific American (1991)","key":"6_CR1","DOI":"10.1038\/scientificamerican0991-94"},{"doi-asserted-by":"crossref","unstructured":"Neovius, M., Yan, L.: A Design Framework for Wireless Sensor Networks. In: Proceedings of the IFIP 19th World Computer Congress (2006)","key":"6_CR2","DOI":"10.1007\/978-0-387-34738-7_9"},{"key":"6_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1007\/978-3-540-24721-0_2","volume-title":"Fundamental Approaches to Software Engineering","author":"G.-C. Roman","year":"2004","unstructured":"Roman, G.-C., Julien, C., Payton, J.: A formal treatment of context-awareness. In: Wermelinger, M., Margaria-Steffen, T. (eds.) FASE 2004. LNCS, vol.\u00a02984, pp. 12\u201336. Springer, Heidelberg (2004)"},{"key":"6_CR4","volume-title":"Software Architecture, Perspectives on an Emerging Discipline","author":"M. Shaw","year":"1996","unstructured":"Shaw, M., Garlan, D.: Software Architecture, Perspectives on an Emerging Discipline. Prentice-Hall Inc., Englewood Cliffs (1996)"},{"doi-asserted-by":"crossref","unstructured":"Ranganathan, A., Al-Muhtadi, J., Campbell, R.H.: Reasoning about Uncertain Contexts in Pervasive Computing Environments. IEEE Pervasive Computing\u00a03(2) (2004)","key":"6_CR5","DOI":"10.1109\/MPRV.2004.1316821"},{"doi-asserted-by":"crossref","unstructured":"Dey, A.K., Abowd, G.D., Salber, D.: A conceptual framework and a toolkit for supporting the rapid prototyping of context-aware applications. Human-Computer Interaction\u00a016(2) (2001)","key":"6_CR6","DOI":"10.1207\/S15327051HCI16234_02"},{"doi-asserted-by":"crossref","unstructured":"Aviziens, A.: Fault-Tolerant Systems. IEEE Transactions on Computers\u00a0C-25(12) (1976)","key":"6_CR7","DOI":"10.1109\/TC.1976.1674598"},{"doi-asserted-by":"crossref","unstructured":"Randell, B., Lee, P., Treleaven, P.C.: Reliability Issues in Computing System Design. ACM Computer Survey\u00a010(2) (1978)","key":"6_CR8","DOI":"10.1145\/356725.356729"},{"doi-asserted-by":"crossref","unstructured":"Avizienis, A., Laprie, J.-C., Randell, B.: Dependability and its Threats: A Taxonomy. In: Proceedings of the IFIP 18th World Computer Congress (2004)","key":"6_CR9","DOI":"10.1007\/978-1-4020-8157-6_13"},{"key":"6_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0014556","volume-title":"Theoretical Aspects of Computer Software","author":"K. Sere","year":"1997","unstructured":"Sere, K., Wald\u00e9n, M.A.: Data Refinement and Remote Procedures. In: Ito, T., Abadi, M. (eds.) TACS 1997. LNCS, vol.\u00a01281. Springer, Heidelberg (1997)"},{"doi-asserted-by":"crossref","unstructured":"Sere, K., Wald\u00e9n, M.A.: Data Refinement of Remote Procedures. Formal Aspects of Computing\u00a012(4) (2000)","key":"6_CR11","DOI":"10.1007\/PL00003935"},{"doi-asserted-by":"crossref","unstructured":"Back, R.J.R., Kurki-Suonio, R.: Decentralization of Process Nets with Centralized Control. In: Proceedings of the 2nd ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (1983)","key":"6_CR12","DOI":"10.1145\/800221.806716"},{"doi-asserted-by":"crossref","unstructured":"Neovius, M., Sere, K., Yan, L., Satpathy, M.: A Formal Model of Context-Awareness and Context-Dependency. In: Proceedings of the 4th IEEE International Conference on Software Engineering and Formal Methods (2006)","key":"6_CR13","DOI":"10.1109\/SEFM.2006.2"},{"key":"6_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/978-3-540-75292-9_11","volume-title":"Theoretical Aspects of Computing \u2013 ICTAC 2007","author":"F. Degerlund","year":"2007","unstructured":"Degerlund, F., Sere, K.: A Framework for Incorporating Trust into Formal Systems Development. In: Jones, C.B., Liu, Z., Woodcock, J. (eds.) ICTAC 2007. LNCS, vol.\u00a04711, pp. 154\u2013168. Springer, Heidelberg (2007)"},{"unstructured":"Yan, L., Sere, K.: A Formalism for Context-Aware Mobile Computing. In: Proceedings of the Third international Symposium on Parallel and Distributed Computing\/Third international Workshop on Algorithms, Models and Tools For Parallel Computing on Heterogeneous Networks (2004)","key":"6_CR15"},{"key":"6_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24634-3_6","volume-title":"Coordination Models and Languages","author":"P. Braione","year":"2004","unstructured":"Braione, P., Picco, G.P.: On Calculi for Context-Aware Coordination. In: De Nicola, R., Ferrari, G.-L., Meredith, G. (eds.) COORDINATION 2004. LNCS, vol.\u00a02949. Springer, Heidelberg (2004)"},{"doi-asserted-by":"crossref","unstructured":"Zimmer, P.: A Calculus for Context-Awareness. BRICS Report Series RS-05-27, Denmark (2005) ISSN 0909-0878","key":"6_CR17","DOI":"10.7146\/brics.v12i27.21894"},{"unstructured":"Petre, L., Qvist, M., Sere, K.: Distributed Object-Based Control Systems. Technical Report 241, TUCS (Feburary 1999)","key":"6_CR18"},{"doi-asserted-by":"crossref","unstructured":"R\u00f6nkk\u00f6, M., Ravn, A.P., Sere, K.: Hybrid Action Systems. Theoretical Computer Science\u00a0290(1) (2003)","key":"6_CR19","DOI":"10.1016\/S0304-3975(02)00547-9"},{"doi-asserted-by":"crossref","unstructured":"Hayes, I.J., Jackson, M.A., Jones, C.B.: Determining the specification of a control system from that of its environment. In: Proceedings of the International Symposium of Formal Methods (2003)","key":"6_CR20","DOI":"10.1007\/978-3-540-45236-2_10"},{"doi-asserted-by":"crossref","unstructured":"Want, R., Hopper, A., Falcao, V., Gibbons, J.: The Active Badge Location System. ACM Transactions on Information Systems\u00a010 (1992)","key":"6_CR21","DOI":"10.1145\/128756.128759"},{"doi-asserted-by":"crossref","unstructured":"Pascoe, J.: Adding Generic Contextual Capabilities to Wearable Computers. In: Proceedings of the Second International Symposium on Wearable Computers (1998)","key":"6_CR22","DOI":"10.1109\/ISWC.1998.729534"},{"doi-asserted-by":"crossref","unstructured":"Schilit, B., Adams, N., Want, R.: Context-Aware Computing Applications. In: Proceedings of the IEEE Workshop on Mobile Computing Systems and Applications (1994)","key":"6_CR23","DOI":"10.1109\/WMCSA.1994.16"},{"unstructured":"Chen, G., Kotz, D.: A Survey of Context-Aware Mobile Computing Research. Technical Report TR2000-381, Dept. of Computer Science, Dartmouth College (2000)","key":"6_CR24"},{"key":"6_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/978-3-540-39646-8_11","volume-title":"Mobile Agents for Telecommunication Applications","author":"K. Yang","year":"2003","unstructured":"Yang, K., Galis, A.: Policy-Driven Mobile Agents for Context-Aware Service in Next Generation Networks. In: Horlait, E., Magedanz, T., Glitho, R.H. (eds.) MATA 2003. LNCS, vol.\u00a02881, pp. 111\u2013120. Springer, Heidelberg (2003)"},{"unstructured":"Merriam Webster Online dictionary, Merriam-Webster Inc., Springfield, MA 01102","key":"6_CR26"},{"unstructured":"Oxfords Advanced learner\u2019s dictionary (2000) CD-ROM","key":"6_CR27"},{"unstructured":"Dey, A.K., Abowd, G.D.: Towards a better understanding of context and context-awareness. In: Proceedings of the CHI 2000 Workshop on the What, Who, Where, When, and How of Context-Awareness (2000)","key":"6_CR28"},{"key":"6_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/3-540-48157-5_10","volume-title":"Handheld and Ubiquitous Computing","author":"A. Schmidt","year":"1999","unstructured":"Schmidt, A., Aidoo, K.A., Takaluoma, A., Tuomela, U., Van Laerhoven, K., Van de Velde, W.: Advanced interaction in context. In: Gellersen, H.-W. (ed.) HUC 1999. LNCS, vol.\u00a01707, p. 89. Springer, Heidelberg (1999)"},{"doi-asserted-by":"crossref","unstructured":"Coutaz, J., Crowley, J.L., Dobson, S., Garlan, D.: Context is key. Communications of the ACM special issue: The disappearing computer\u00a048(3) (2005)","key":"6_CR30","DOI":"10.1145\/1047671.1047703"},{"key":"6_CR31","series-title":"Lecture Notes in Computer Science","volume-title":"Abstract Software Specifications","author":"H. Zemanek","year":"1980","unstructured":"Zemanek, H.: Abstract Architecture, General concepts for systems design. In: Bjorner, D. (ed.) Abstract Software Specifications. LNCS, vol.\u00a086. Springer, Heidelberg (1980)"},{"key":"6_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-15199-0_5","volume-title":"Formal Methods and Software Development","author":"P. Naur","year":"1985","unstructured":"Naur, P.: Intuition in software development. In: Ehrig, H., Floyd, C., Nivat, M., Thatcher, J. (eds.) TAPSOFT 1985 and CSE 1985. LNCS, vol.\u00a0186. Springer, Heidelberg (1985)"},{"issue":"1","key":"6_CR33","first-page":"17","volume":"12","author":"R.J.R. Back","year":"1991","unstructured":"Back, R.J.R., Sere, K.: Stepwise Refinement of Action Systems. Structured Programming\u00a012(1), 17\u201330 (1991)","journal-title":"Structured Programming"},{"key":"6_CR34","series-title":"Graduate Texts in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-1674-2","volume-title":"Refinement Calculus: A Systematic Introduction","author":"R.J.R. Back","year":"1998","unstructured":"Back, R.J.R., von Wright, J.: Refinement Calculus: A Systematic Introduction. Graduate Texts in Computer Science. Springer, Heidelberg (1998)"},{"key":"6_CR35","series-title":"Lecture Notes in Computer Science","volume-title":"CONCUR \u201994: Concurrency Theory","author":"R.J.R. Back","year":"1994","unstructured":"Back, R.J.R., von Wright, J.: Trace Refinement of Action Systems. In: Jonsson, B., Parrow, J. (eds.) CONCUR 1994. LNCS, vol.\u00a0836. Springer, Heidelberg (1994)"},{"unstructured":"Back, R.J.R., von Wright, J.: Compositional Action System Refinement. TUCS technical report no. 464 (June 2002)","key":"6_CR36"},{"unstructured":"Back, R.J.R.: Correctness Preserving Program Refinements: Proof Theory and Applications. Mathematical Center Tracts, vol. 131, Mathematical Centre, Amsterdam, The Netherlands (1980)","key":"6_CR37"},{"unstructured":"Sere, K.: Stepwise derivation of parallel algorithms, PhD dissertation, \u00c5bo Akademi (1990)","key":"6_CR38"},{"key":"6_CR39","volume-title":"A Discipline of Programming","author":"E.W. Dijkstra","year":"1976","unstructured":"Dijkstra, E.W.: A Discipline of Programming. Prentice Hall, Englewood Cliffs (1976)"},{"doi-asserted-by":"crossref","unstructured":"Dijkstra, E.W.: Guarded commands, nondeterminacy and formal derivation of programs. Communications of the ACM\u00a018(8) (1975)","key":"6_CR40","DOI":"10.1145\/360933.360975"},{"doi-asserted-by":"crossref","unstructured":"Sekerinski, E., Sere, K.: A Theory of Prioritizing Composition. The Computer Journal\u00a039(8) (1996)","key":"6_CR41","DOI":"10.1093\/comjnl\/39.8.701"}],"container-title":["Lecture Notes in Computer Science","Formal Methods for Components and Objects"],"original-title":[],"link":[{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04167-9_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T22:30:21Z","timestamp":1558477821000},"score":1,"resource":{"primary":{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/link.springer.com\/10.1007\/978-3-642-04167-9_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642041662","9783642041679"],"references-count":41,"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1007\/978-3-642-04167-9_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}