{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T05:56:39Z","timestamp":1775282199221,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642009747","type":"print"},{"value":"9783642009754","type":"electronic"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-00975-4_10","type":"book-chapter","created":{"date-parts":[[2009,3,30]],"date-time":"2009-03-30T08:19:52Z","timestamp":1238401192000},"page":"99-108","source":"Crossref","is-referenced-by-count":62,"title":["Access Point Localization Using Local Signal Strength Gradient"],"prefix":"10.1007","author":[{"given":"Dongsu","family":"Han","sequence":"first","affiliation":[]},{"given":"David G.","family":"Andersen","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Kaminsky","sequence":"additional","affiliation":[]},{"given":"Konstantina","family":"Papagiannaki","sequence":"additional","affiliation":[]},{"given":"Srinivasan","family":"Seshan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/11748625_5","volume-title":"Pervasive Computing","author":"M. Kim","year":"2006","unstructured":"Kim, M., Fielding, J.J., Kotz, D.: Risks of using AP locations discovered through war driving. In: Fishkin, K.P., Schiele, B., Nixon, P., Quigley, A. (eds.) PERVASIVE 2006. LNCS, vol.\u00a03968, pp. 67\u201382. Springer, Heidelberg (2006)"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Cheng, Y., Chawathe, Y., LaMarca, A., Krumm, J.: Accuracy characterization for metropolitan-scale Wi-Fi localization. In: Proc. ACM MobiSys., Seattle, WA (June 2005)","DOI":"10.1145\/1067170.1067195"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Subramanian, A., Deshpande, P., Gaojgao, J., Das, S.: Drive-by localization of roadside WiFi networks. In: Proc. IEEE INFOCOM, Phoenix, AZ (April 2008)","DOI":"10.1109\/INFOCOM.2008.122"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Savvides, A., Han, C.C., Strivastava, M.B.: Dynamic fine-grained localization in ad-hoc networks of sensors. In: Proc. ACM Mobicom, Rome, Italy (July 2001)","DOI":"10.1145\/381677.381693"},{"key":"10_CR5","volume-title":"Wireless Communications \u2014 Principles and Practice","author":"T. Rappaport","year":"1996","unstructured":"Rappaport, T.: Wireless Communications \u2014 Principles and Practice. Prentice-Hall, Englewood Cliffs (1996)"},{"key":"10_CR6","unstructured":"WhitePages.com - White Pages Phone Directory, \n                    \n                      http:\/\/www.whitepages.com"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Bahl, P., Padmanabhan, V.: RADAR: An In-Building RF-based User Location and Tracking System. In: Proc. IEEE INFOCOM, Tel-Aviv, Israel (March 2000)","DOI":"10.1109\/INFCOM.2000.832252"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Harter, A., Hopper, A., Steggles, P., Ward, A., Webster, P.: The anatomy of a context-aware application. In: Proc. ACM\/IEEE MOBICOM, Seattle, WA (August 1999)","DOI":"10.1145\/313451.313476"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Priyantha, N., Chakraborty, A., Balakrishnan, H.: The Cricket location-support system. In: Proc. ACM Mobicom, Boston, MA (August 2000)","DOI":"10.1145\/345910.345917"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Fox, D., Hightower, J., Liao, L., Schulz, D., Borriello, G.: Bayesian filtering for location estimation. IEEE Pervasive Computing\u00a002(3) (2003)","DOI":"10.1109\/MPRV.2003.1228524"}],"container-title":["Lecture Notes in Computer Science","Passive and Active Network Measurement"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-00975-4_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,7]],"date-time":"2019-03-07T03:31:35Z","timestamp":1551929495000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-00975-4_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642009747","9783642009754"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-00975-4_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009]]}}}