{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T19:34:45Z","timestamp":1773084885294,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540895237","type":"print"},{"value":"9783540895244","type":"electronic"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-89524-4_41","type":"book-chapter","created":{"date-parts":[[2008,11,19]],"date-time":"2008-11-19T06:10:09Z","timestamp":1227075009000},"page":"406-414","source":"Crossref","is-referenced-by-count":7,"title":["A Fault-Tolerant Event Boundary Detection Algorithm in Sensor Networks"],"prefix":"10.1007","author":[{"given":"Ci-Rong","family":"Li","sequence":"first","affiliation":[]},{"given":"Chiu-Kuo","family":"Liang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"41_CR1","unstructured":"10 emerging technologies that will change the world. Technology Review \u00a0106(1), 33\u201349 (February 2003)"},{"key":"41_CR2","volume-title":"Outliers in Statistical Data","author":"V. Barnet","year":"1994","unstructured":"Barnet, V., Lewis, T.: Outliers in Statistical Data. John Wiley and Sons. Inc., Chichester (1994)"},{"key":"41_CR3","unstructured":"Chen, D., Cheng, X., Ding, M.: Localized Event Detection in Sensor Networks (manuscript, 2004)"},{"key":"41_CR4","unstructured":"Ding, M., Chen, D., Xing, K., Cheng, X.: Localized Fault-Tolerant Event Boundary Detection in Sensor Networks. In: IEEE INFOCOM 2005 (2005)"},{"key":"41_CR5","doi-asserted-by":"crossref","unstructured":"Hill, J., Szewczyk, R., Woo, A., Hollar, S., Heidemann, J.: System architecture directions for networked sensors. In: Proc. 9th International Conference on Architectural Suuport for Programming Languages and Operating Systems (November 2000)","DOI":"10.1145\/378993.379006"},{"key":"41_CR6","unstructured":"Li, C.R., Liang, C.K.: A Localized Fault Detection Algorithm in Sensor Networks. In: IASTED International Conference on Wireless Sensor Networks WSN 2006, Canada (July 2006)"},{"key":"41_CR7","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1109\/79.985674","volume":"19","author":"D. Li","year":"2002","unstructured":"Li, D., Wong, K.D., Hu, Y.H., Sayeed, A.M.: Detection, Classification and Tracking of Targets. IEEE Signal Processing Magazine\u00a019, 17\u201329 (2002)","journal-title":"IEEE Signal Processing Magazine"},{"key":"41_CR8","doi-asserted-by":"crossref","unstructured":"Madden, S., Franklin, M.J., Hellerstein, J.M., Hong, W.: TAG: a tiny aggregation service for ad-hoc sensor networks. In: OSDI (December 2002)","DOI":"10.1145\/1060289.1060303"},{"key":"41_CR9","doi-asserted-by":"crossref","unstructured":"Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. In: ACM MOBICOM 2000, Boston, MA, August 2000, pp. 255\u2013265 (2000)","DOI":"10.1145\/345910.345955"},{"key":"41_CR10","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1007\/BF01840396","volume":"5","author":"C. Monma","year":"1990","unstructured":"Monma, C., Paterson, M., Suri, S., Yao, F.: Computing Euclidean maximum spanning trees. Algorithmica\u00a05, 407\u2013419 (1990)","journal-title":"Algorithmica"},{"issue":"4","key":"41_CR11","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1145\/959060.959074","volume":"32","author":"T. Palpanas","year":"2003","unstructured":"Palpanas, T., Papadopoulos, D., Kalogeraki, V., Gunopulos, D.: Distributed Deviation Detection in Sensor Networks. SIGMOD Record\u00a032(4), 77\u201382 (2003)","journal-title":"SIGMOD Record"},{"key":"41_CR12","doi-asserted-by":"crossref","unstructured":"Staddon, J., Balfanz, D., Durfee, G.: Efficient Tracing of Failed Nodes in Sensor Networks. In: ACM WSNA 2002, Atlanta, GA, pp. 122\u2013130 (September 2002)","DOI":"10.1145\/570738.570756"},{"key":"41_CR13","doi-asserted-by":"crossref","unstructured":"Tanachaiwiwat, S., Dave, P., Bhindwale, R., Helmy, A.: Secure Locations: Routing on Trust and Isolating Compromised Sensors in Location-Aware Sensor Networks. In: ACM SenSys 2003, Los Angeles, California, pp. 324\u2013325 (2003)","DOI":"10.1145\/958491.958542"},{"key":"41_CR14","volume-title":"Introduction to Graph Theory","author":"D.B. West","year":"1996","unstructured":"West, D.B.: Introduction to Graph Theory. Prentice-Hall, Englewood Cliffs (1996)"}],"container-title":["Lecture Notes in Computer Science","Information Networking. Towards Ubiquitous Networking and Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-89524-4_41","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,2]],"date-time":"2025-02-02T21:11:40Z","timestamp":1738530700000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-89524-4_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540895237","9783540895244"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-89524-4_41","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008]]}}}