{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T09:44:29Z","timestamp":1725529469691},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642008863"},{"type":"electronic","value":"9783642008870"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-00887-0_15","type":"book-chapter","created":{"date-parts":[[2009,3,19]],"date-time":"2009-03-19T09:49:36Z","timestamp":1237456176000},"page":"186-200","source":"Crossref","is-referenced-by-count":10,"title":["Efficient RFID Data Imputation by Analyzing the Correlations of Monitored Objects"],"prefix":"10.1007","author":[{"given":"Yu","family":"Gu","sequence":"first","affiliation":[]},{"given":"Ge","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Yueguo","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Beng Chin","family":"Ooi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"15_CR1","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/MPRV.2006.2","volume":"5","author":"R. Want","year":"2006","unstructured":"Want, R.: An introduction to RFID technology. IEEE Pervasive Computing\u00a05(1), 25\u201333 (2006)","journal-title":"IEEE Pervasive Computing"},{"issue":"7","key":"15_CR2","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/1035594.1035619","volume":"2","author":"R. Want","year":"2004","unstructured":"Want, R.: The Magic of RFID. ACM Queue\u00a02(7), 40\u201348 (2004)","journal-title":"ACM Queue"},{"key":"15_CR3","first-page":"393","volume":"15","author":"Z. Asif","year":"2005","unstructured":"Asif, Z., Mandviwalla, M.: Integrating the supply chain with RFID: A Technical and Business Analysis. Communications of the Assiciation for Information Systems\u00a015, 393\u2013427 (2005)","journal-title":"Communications of the Assiciation for Information Systems"},{"issue":"4","key":"15_CR4","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/MPRV.2004.7","volume":"3","author":"M. Philipose","year":"2004","unstructured":"Philipose, M., Fishkin, K.P., Perkowitz, M., Patterson, D.J., Fox, D., Kautz, H., Hahnel, D.: Inferring activities from interactions with objects. IEEE Pervasive Computing\u00a03(4), 10\u201317 (2004)","journal-title":"IEEE Pervasive Computing"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Jeffery, S.R., Alonso, G., Franklin, M.J.: A pipelined framework for online cleaning of sensor data streams. In: Proceedings of ICDE, pp. 140\u2013142 (2006)","DOI":"10.1109\/ICDE.2006.8"},{"key":"15_CR6","unstructured":"Jeffery, S.R., Garofalakis, M., Franklin, M.J.: Adaptive cleaning for RFID data streams. In: Proceedings of VLDB, pp. 163\u2013174 (2006)"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Gonzalez, H., Han, J., Shen, X.: Cost-conscious cleaning of massive RFID data sets. In: Proceedings of ICDE, pp. 1628\u20131272 (2007)","DOI":"10.1109\/ICDE.2007.368990"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Khoussainova, N., Balazinska, M., Suciu, D.: Towards correcting input data errors probabilistically using integrity constraints. In: Proceedings of MobiDE, pp. 43\u201350 (2006)","DOI":"10.1145\/1140104.1140114"},{"key":"15_CR9","unstructured":"Rao, j., Doraiswamy, S., Thakkar, H., Colby, L.S.: A deferred cleansing method for RFID data analytics. In: Proceedings of VLDB, pp. 175\u2013186 (2006)"},{"issue":"2","key":"15_CR10","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1109\/TNET.2006.872544","volume":"14","author":"M.C. Vuran","year":"2006","unstructured":"Vuran, M.C., Akyildiz, I.F.: Spatial correlation-based collaborative medium access control in wireless sensor networks. IEEE\/ACM Transactions on Networking (TON)\u00a014(2), 316\u2013329 (2006)","journal-title":"IEEE\/ACM Transactions on Networking (TON)"},{"key":"15_CR11","unstructured":"Wang, F.S., Liu, P.Y.: Temporal management of RFID data. In: Proceedings of VLDB, pp. 1128\u20131139 (2005)"},{"key":"15_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"588","DOI":"10.1007\/11687238_36","volume-title":"Advances in Database Technology - EDBT 2006","author":"F.S. Wang","year":"2006","unstructured":"Wang, F.S., Liu, S., Liu, P.Y.: Bridge physical and virtual worlds: complex event processing for RFID data streams. In: Ioannidis, Y., Scholl, M.H., Schmidt, J.W., Matthes, F., Hatzopoulos, M., B\u00f6hm, K., Kemper, A., Grust, T., B\u00f6hm, C. (eds.) EDBT 2006. LNCS, vol.\u00a03896, pp. 588\u2013607. Springer, Heidelberg (2006)"}],"container-title":["Lecture Notes in Computer Science","Database Systems for Advanced Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-00887-0_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,7]],"date-time":"2019-03-07T00:32:07Z","timestamp":1551918727000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-00887-0_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642008863","9783642008870"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-00887-0_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}