iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1109/WTS.2009.5068943
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T20:12:37Z","timestamp":1729627957775,"version":"3.28.0"},"reference-count":47,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,5]]},"DOI":"10.1109\/wts.2009.5068943","type":"proceedings-article","created":{"date-parts":[[2009,6,10]],"date-time":"2009-06-10T14:23:18Z","timestamp":1244643798000},"page":"1-7","source":"Crossref","is-referenced-by-count":2,"title":["Value analysis of technology evolution: Case mobile peer-to-peer communications"],"prefix":"10.1109","author":[{"given":"M.","family":"Heikkinen","sequence":"first","affiliation":[]},{"given":"S.","family":"Luukkainen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"P2P SIP: implementations","year":"0","author":"bryan","key":"ref39"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ccnc08.2007.260"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICMB.2008.15"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2006.12.004"},{"journal-title":"P2P Systems and Applications","year":"2005","author":"steinmetz","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79238-3_2"},{"journal-title":"Internet Communications Using SIP Delivering VoIP and Multimedia Services with Session Initiation Protocol","year":"2006","author":"sinnreich","key":"ref37"},{"journal-title":"IETF RFC 3261","article-title":"SIP: session initiation protocol","year":"2002","author":"rosenberg","key":"ref36"},{"journal-title":"Work in Progress","article-title":"XEP-0166: Jingle","year":"2008","key":"ref35"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1504\/IJIDS.2008.020034"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.2307\/2393549"},{"year":"2008","key":"ref40","article-title":"TS 23.228: IP Multimedia Subsystem (IMS); Stage 2"},{"journal-title":"The Innovator's Dilemma When New Technologies Cause Great Firms to Fail","year":"1997","author":"christensen","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.2307\/2393511"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.2307\/2392832"},{"key":"ref14","first-page":"62","article-title":"Strategy and the Internet","volume":"79","author":"porter","year":"2001","journal-title":"Harvard Business Review"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1111\/j.1937-5956.1992.tb00002.x"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.respol.2003.07.001"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.17705\/1CAIS.01601","article-title":"Clarifying business models: origins, present, and future of the concept","volume":"16","author":"osterwalder","year":"2005","journal-title":"Communications of The Association for Information Systems"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ejis.3000513"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1002\/smj.187"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/0048-7333(93)00764-K"},{"journal-title":"Information Rules A Strategic Guide to the Network Economy","year":"1999","author":"shapiro","key":"ref4"},{"journal-title":"Competitive Advantage Creating and Sustaining Superior Performance","year":"1985","author":"porter","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.WICON2008.4812"},{"journal-title":"The Art of Case Study Research","year":"1995","author":"stake","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-0266(199805)19:5<413::AID-SMJ946>3.0.CO;2-C"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1002\/smj.4250140304"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1002\/smj.4250131009"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.2307\/1251480"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00975-4_17"},{"key":"ref9","first-page":"41","article-title":"Patterns of industrial innovation","volume":"80","author":"abernathy","year":"1978","journal-title":"Technology Review"},{"key":"ref1","first-page":"369","article-title":"ISP platforms under a heavy peer-to peer workload","author":"hablinger","year":"2005","journal-title":"P2P Systems and Applications"},{"key":"ref46","first-page":"93","article-title":"The success factors of mobile advertising value chain","volume":"4","author":"leppaniemi","year":"2004","journal-title":"E-Business Review"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1093\/icc\/11.3.529"},{"year":"0","key":"ref45"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1050.0400"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1108\/00251740010379100"},{"journal-title":"Merriam-Webster Online Dictionary available in www-format","year":"0","key":"ref21"},{"year":"0","key":"ref42"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1108\/14691930010371627"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2007.382664"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.45.12.1613"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.10.008"},{"key":"ref26","first-page":"424","article-title":"Network externalities, competition, and compatibility","volume":"75","author":"katz","year":"1985","journal-title":"The American Economic Review"},{"journal-title":"Technical Report CUCS-039–04","article-title":"An analysis of the Skype peer-to-peer Internet telephony protocol","year":"2004","author":"baset","key":"ref43"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.2307\/1882692"}],"event":{"name":"2009 Wireless Telecommunications Symposium","start":{"date-parts":[[2009,4,22]]},"location":"Prague","end":{"date-parts":[[2009,4,24]]}},"container-title":["2009 Wireless Telecommunications Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4977245\/5068929\/05068943.pdf?arnumber=5068943","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T17:01:27Z","timestamp":1558371687000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5068943\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,5]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/wts.2009.5068943","relation":{},"subject":[],"published":{"date-parts":[[2009,5]]}}}