{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T11:43:44Z","timestamp":1725795824620},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319077819"},{"type":"electronic","value":"9783319077826"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07782-6_19","type":"book-chapter","created":{"date-parts":[[2014,6,18]],"date-time":"2014-06-18T21:26:14Z","timestamp":1403126774000},"page":"205-214","source":"Crossref","is-referenced-by-count":2,"title":["Accuracy Evaluation for Sensed Data"],"prefix":"10.1007","author":[{"given":"Yan","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Hongzhi","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","unstructured":"Abadi, D.J., Madden, S., Lindner, W.: Reed: Robust, efficient filtering and event detection in sensor networks. In: VLDB (2005)"},{"issue":"1","key":"19_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TKDE.2007.250581","volume":"19","author":"A.K. Elmagarmid","year":"2007","unstructured":"Elmagarmid, A.K., Ipeirotis, P.G., Verykios, V.S.: Duplicate record detection: A survey. IEEE Trans. Knowl. Data Eng.\u00a019(1), 1\u201316 (2007)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"19_CR3","unstructured":"Florescu, D., Koller, D., Levy, A.Y.: Using probabilistic information in data integration. In: VLDB, pp. 216\u2013225 (1997)"},{"issue":"12","key":"19_CR4","first-page":"2018","volume":"5","author":"L. Getoor","year":"2012","unstructured":"Getoor, L., Machanavajjhala, A.: Entity resolution: Theory, practice & open challenges. PVLDB\u00a05(12), 2018\u20132019 (2012)","journal-title":"PVLDB"},{"key":"19_CR5","unstructured":"Kozlov, M.K., Tarasov, S.P., Khachiyan, L.G.: Polynomial solvability of convex quadratic programming. Doklady Akademii Nauk SSSR 248"},{"key":"19_CR6","volume-title":"Theory of Point Estimation","author":"E.L. Lehmann","year":"1998","unstructured":"Lehmann, E.L., Casella, G.: Theory of Point Estimation, 2nd edn. Springer, New York (1998)","edition":"2"},{"issue":"3","key":"19_CR7","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1109\/TPDS.2011.193","volume":"23","author":"J. Li","year":"2012","unstructured":"Li, J., Cheng, S. (\u03b5, \u03b4)-approximate aggregation algorithms in dynamic sensor networks. IEEE Transactions on Parallel and Distributed Systems\u00a023(3), 385\u2013396 (2012)","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"19_CR8","unstructured":"Li, J., Cheng, S., Gao, H., Cai, Z.: Approximate physical world reconstruction algorithms in sensor networks. IEEE Transactions on Parallel and Distributed Systems"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Li, M., Liu, Y., Chen, L.: Non-threshold based event detection for 3d environment monitoring in sensor networks. In: ICDCS, p. 9 (2007)","DOI":"10.1109\/ICDCS.2007.123"},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Liu, K., Li, M., Liu, Y., Li, X.Y., Li, M., Ma, H.: Exploring the hidden connectivity in urban vehicular networks. In: ICNP, pp. 243\u2013252 (2010)","DOI":"10.1109\/ICNP.2010.5762773"},{"key":"19_CR11","volume-title":"Numerical Optimization","author":"J. Nocedal","year":"2006","unstructured":"Nocedal, J., Wright, S.J.: Numerical Optimization, 2nd edn. Springer, Berlin (2006)","edition":"2"},{"key":"19_CR12","unstructured":"Kumar, S.: Sensit, D.: Ensor information technology for the warfighter. In: Proceedings of the 4th International Conference on Information Fusion, pp. 3\u20139 (2001)"},{"issue":"6","key":"19_CR13","first-page":"550","volume":"5","author":"B. Zhao","year":"2012","unstructured":"Zhao, B., Rubinstein, B.I.P., Gemmell, J., Han, J.: A bayesian approach to discovering truth from conflicting sources for data integration. PVLDB\u00a05(6), 550\u2013561 (2012)","journal-title":"PVLDB"}],"container-title":["Lecture Notes in Computer Science","Wireless Algorithms, Systems, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07782-6_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T03:19:20Z","timestamp":1558927160000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-07782-6_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319077819","9783319077826"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07782-6_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}