{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,11]],"date-time":"2026-05-11T11:22:08Z","timestamp":1778498528426,"version":"3.51.4"},"reference-count":73,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2012,1,18]],"date-time":"2012-01-18T00:00:00Z","timestamp":1326844800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Knowl Inf Syst"],"published-print":{"date-parts":[[2013,1]]},"DOI":"10.1007\/s10115-011-0474-5","type":"journal-article","created":{"date-parts":[[2012,1,17]],"date-time":"2012-01-17T06:16:59Z","timestamp":1326781019000},"page":"23-54","source":"Crossref","is-referenced-by-count":199,"title":["In-network outlier detection in wireless sensor networks"],"prefix":"10.1007","volume":"34","author":[{"given":"Joel W.","family":"Branch","sequence":"first","affiliation":[]},{"given":"Chris","family":"Giannella","sequence":"additional","affiliation":[]},{"given":"Boleslaw","family":"Szymanski","sequence":"additional","affiliation":[]},{"given":"Ran","family":"Wolff","sequence":"additional","affiliation":[]},{"given":"Hillol","family":"Kargupta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,1,18]]},"reference":[{"key":"474_CR1","doi-asserted-by":"crossref","unstructured":"Adam N, Janeja V, Atluri V (2004) Neighborhood-based detection of anomalies in high dimensional spatio-temporal sensor datasets. In: Proceedings of ACM symposium on applied computing (SAC04), pp 576\u2013583","DOI":"10.1145\/967900.968020"},{"key":"474_CR2","unstructured":"Agrawal R, Mannila H, Srikant R, Toivonen H, Verkamo A (1996) Fast discovery of association rules. In: Advances in knowledge discovery and data mining, pp 307\u2013328"},{"key":"474_CR3","doi-asserted-by":"crossref","unstructured":"Ajdler T, Kozintsev I, Lienhart R, Vetterli M (2004) Acoustic source localization in distributed sensor networks. In: Proceedings of the asilomar conference on signals, systems and computers, pp 1328\u20131332","DOI":"10.1109\/ACSSC.2004.1399368"},{"issue":"8","key":"474_CR4","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1109\/MCOM.2002.1024422","volume":"40","author":"IF Akyildiz","year":"2002","unstructured":"Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) A survey on sensor networks. IEEE Commun Mag 40(8): 102\u2013114","journal-title":"IEEE Commun Mag"},{"key":"474_CR5","first-page":"393","volume":"38","author":"IF Akyildiz","year":"2002","unstructured":"Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) Wireless sensor networks: a aurvey. IEEE Trans Syst Man Cybern Part B 38: 393\u2013422","journal-title":"IEEE Trans Syst Man Cybern Part B"},{"key":"474_CR6","doi-asserted-by":"crossref","unstructured":"Angiulli F, Pizzuti C (2002) Fast outlier detection in high dimensional spaces. In: Proceedings of the European conference on the principales and practice of data mining and knowledge discovery (PKDD02)","DOI":"10.1007\/3-540-45681-3_2"},{"issue":"3","key":"474_CR7","doi-asserted-by":"crossref","first-page":"615","DOI":"10.1007\/s10115-010-0328-6","volume":"28","author":"D Apiletti","year":"2010","unstructured":"Apiletti D, Baralis E, Cerquitelli T (2010) Energy-saving models for wireless sensor networks. Knowl Inf Syst 28(3): 615\u2013644","journal-title":"Knowl Inf Syst"},{"key":"474_CR8","volume-title":"Outliers in statistical data","author":"V Barnett","year":"1994","unstructured":"Barnett V, Lewis T (1994) Outliers in statistical data. Wiley, New York"},{"key":"474_CR9","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1007\/s10115-006-0026-6","volume":"11","author":"S Basu","year":"2007","unstructured":"Basu S, Meckesheimer M (2007) Automatic outlier detection for time series: an application to sensor data. Knowl Inf Syst 11: 137\u2013154","journal-title":"Knowl Inf Syst"},{"issue":"3","key":"474_CR10","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1016\/j.jcss.2006.10.007","volume":"73","author":"M Bawa","year":"2007","unstructured":"Bawa M, Gionis A, Garcia-Molina H, Motwani R (2007) The price of validity in dynamic networks. J Comput Syst Sci 73(3): 245\u2013264","journal-title":"J Comput Syst Sci"},{"key":"474_CR11","doi-asserted-by":"crossref","unstructured":"Bay S, Schwabacher M (2003) Mining distance-based outliers in near linear time with randomization and a simple pruning rule. In: Proceedings of the 9th ACM SIGKDD international conference on knowledge discovery and data mining","DOI":"10.1145\/956750.956758"},{"issue":"5","key":"474_CR12","doi-asserted-by":"crossref","first-page":"1770","DOI":"10.1109\/TSP.2007.909342","volume":"56","author":"A Beck","year":"2008","unstructured":"Beck A, Stoica P, Li J (2008) Exact and approximate solutions of source localization problems. IEEE Trans Signal Process 56(5): 1770\u20131778","journal-title":"IEEE Trans Signal Process"},{"key":"474_CR13","doi-asserted-by":"crossref","unstructured":"Bhaduri K, Kargupta H (2008) A scalable local algorithm for distributed multivariate regression. In: Proceedings of the SIAM conference on data mining (SDM))","DOI":"10.1137\/1.9781611972788.14"},{"issue":"2","key":"474_CR14","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1002\/sam.10006","volume":"1","author":"K Bhaduri","year":"2008","unstructured":"Bhaduri K, Wolff R, Giannella C, Kargupta H (2008) Distributed decision tree induction in peer-to-peer systems. Stat Anal Data Mining 1(2): 85\u2013103","journal-title":"Stat Anal Data Mining"},{"key":"474_CR15","doi-asserted-by":"crossref","unstructured":"Boyd S, Ghosh A, Prabhakar B, Shah D (2005) Gossip algorithms: design, analysis, and applications. In: Proceedings of IEEE international conference on computer communication (Infocom05), vol 3, pp 1653\u20131664","DOI":"10.1109\/INFCOM.2005.1498447"},{"key":"474_CR16","doi-asserted-by":"crossref","unstructured":"Branch J, Chen G, Szymanski B (2005) ESCORT: energy-efficient sensor network communal routing topology using signal quality metrics. In: Proceedings of the international conference on networking (ICN05), pp 438\u2013448","DOI":"10.1007\/978-3-540-31956-6_52"},{"key":"474_CR17","unstructured":"Branch J, Szymanski B, Wolff R, Giannella C, Kargupta H (2006) In-network outlier detection in wireless sensor networks. In: Proceedings of the international conference on distributed computing systems (ICDCS)"},{"key":"474_CR18","doi-asserted-by":"crossref","unstructured":"Breunig M, Kriegel H-P, Ng R, Sander J (2000) LOF: identifying density-based local outliers. In: Proceedings of ACM SIGMOD international conference on the management of data (SIGMOD00), pp 93\u2013104","DOI":"10.1145\/335191.335388"},{"issue":"3","key":"474_CR19","doi-asserted-by":"crossref","first-page":"272","DOI":"10.1109\/TMC.2004.16","volume":"3","author":"A Cerpa","year":"2004","unstructured":"Cerpa A, Estrin D (2004) ASCENT: adaptive self-configuring sensor networks topologies. IEEE Trans Mobile Comput 3(3): 272\u2013285","journal-title":"IEEE Trans Mobile Comput"},{"key":"474_CR20","unstructured":"Chen G, Branch J, Pflug M, Zhu L, Szymanksi B (2004) SENSE: a wireless sensor network simulator. In: Szymanksi B, Yener B (eds) Advances in pervasive computing and networking. Springer, Berlin, pp 249\u2013267"},{"issue":"5","key":"474_CR21","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1093\/comjnl\/bxp051","volume":"53","author":"L Chen","year":"2010","unstructured":"Chen L, Wang Z, Szymanski B, Branch J, Verma D, Damarla R, Ibbotson J (2010) Dynamic service execution in sensor networks. Comput J 53(5): 513\u2013527","journal-title":"Comput J"},{"issue":"3","key":"474_CR22","doi-asserted-by":"crossref","first-page":"579","DOI":"10.1007\/s10115-011-0380-x","volume":"28","author":"S Chong","year":"2011","unstructured":"Chong S, Gaber M, Krishnaswamy S, Loke L (2011) Energy conservation in wireless sensor networks: a rule-based approach. Knowl Inf Syst 28(3): 579\u2013614","journal-title":"Knowl Inf Syst"},{"key":"474_CR23","unstructured":"Clemente J, Defago X, Satou K (2003) Asynchronous peer-to-peer communication for failure resilient distributed genetic algorithms. In: Proceedings of the IASTED international conference on parallel and distributed computing and systems (PDCS03), pp 769\u2013773"},{"key":"474_CR24","unstructured":"Crossbow Technology: MPR, MIB user\u2019s manual. http:\/\/www.xbow.com"},{"issue":"4","key":"474_CR25","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1109\/TKDE.2007.190714","volume":"20","author":"K Das","year":"2008","unstructured":"Das K, Bhaduri K, Liu K, Kargupta H (2008) Distributed identification of top-l inner product elements and its application in a peer-to-peer network. IEEE Trans Knowl Data Eng 20(4): 475\u2013488","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"474_CR26","doi-asserted-by":"crossref","unstructured":"Datta S, Kargupta H (2007) Uniform data sampling from a peer-to-peer network. In: Proceedings of the international conference on distributed computing systems (ICDCS), p 50","DOI":"10.1109\/ICDCS.2007.6238553"},{"key":"474_CR27","doi-asserted-by":"crossref","unstructured":"Datta S, Giannella C, Kargupta H (2006) K-means clustering over a large, dynamic network. In: Proceedings of the SIAM international conference on data mining (SDM06), pp 153\u2013164","DOI":"10.1137\/1.9781611972764.14"},{"key":"474_CR28","doi-asserted-by":"crossref","unstructured":"Estrin D, Govindan R, Heidemann J, Kumar S (1999) Next century challenges: scalable coordination in sensor networks. In: Proceedings of the ACM international conference on mobile computing and networking (MobiCom99), pp 263\u2013270","DOI":"10.1145\/313451.313556"},{"key":"474_CR29","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/s10115-008-0145-3","volume":"19","author":"H Fan","year":"2009","unstructured":"Fan H, Zaiane O, Foss A, Wu J (2009) Resolution-based outlier factor: detecting the top-n most outlying data points in engineering data. Knowl Inf Syst 19: 31\u201351","journal-title":"Knowl Inf Syst"},{"issue":"2","key":"474_CR30","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1109\/18.825799","volume":"46","author":"P Gupta","year":"2000","unstructured":"Gupta P, Kumar P (2000) The capacity of wireless networks. IEEE Trans Inf Theory 46(2): 388\u2013404","journal-title":"IEEE Trans Inf Theory"},{"key":"474_CR31","doi-asserted-by":"crossref","unstructured":"Hautamaki V, Cherednichenko S, Karkkainen I, Kinnunen T, Franti P (2005) Improving K-means by outlier removal. In: Kalviainen H, Parkkinen J, Kaarna A (eds) Image analysis, lecture notes in computer science, vol 3540. Springer, Berlin\/Heidelberg, pp 978\u2013987","DOI":"10.1007\/11499145_99"},{"key":"474_CR32","doi-asserted-by":"crossref","unstructured":"Hawkins S, He H, Williams G, Baxter R (2002) Outlier detection using replicator neural networks. In: Kambayashi Y, Winiwarter W, Arikawa M (eds) Data warehousing and knowledge discovery, lecture notes in computer science, vol 2454. Springer, Berlin\/Heidelberg, pp 113\u2013123","DOI":"10.1007\/3-540-46145-0_17"},{"key":"474_CR33","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1023\/B:AIRE.0000045502.10941.a9","volume":"22","author":"V Hodge","year":"2004","unstructured":"Hodge V, Austin J (2004) A survey of outlier detection methodologies. Artif Intell Rev 22: 85\u2013126","journal-title":"Artif Intell Rev"},{"key":"474_CR34","volume-title":"Protocols and architectures for wireless sensor networks","author":"K Holger","year":"2007","unstructured":"Holger K, Willig A (2007) Protocols and architectures for wireless sensor networks. Wiley, New York"},{"key":"474_CR35","unstructured":"Intel Berkeley Research Lab: Wireless sensor data. http:\/\/db.lcs.mit.edu\/labdata\/labdata.html"},{"key":"474_CR36","doi-asserted-by":"crossref","unstructured":"Janakiram D, Reddy VA, Kumar AVUP (2006) Outlier detection in wireless sensor networks using Bayesian belief networks. In: Proceedings of IEEE conference on communication system software and middleware (Comsware06), pp 1\u20136","DOI":"10.1109\/COMSWA.2006.1665221"},{"key":"474_CR37","unstructured":"John GH (1995) Robust decision trees: removing outliers from databases. In: First international conference on knowledge discovery and data mining. AAAI Press, pp 174\u2013179"},{"key":"474_CR38","unstructured":"Kargupta H, Sivakumar K (2004) Existential pleasures of distributed data mining. In: Kargupta H, Joshi A, Sivakumar K, Yesha Y (eds) Data mining: next generation challenges and future directions. MIT\/AAAI Press"},{"key":"474_CR39","unstructured":"Kargupta H, Hamzaoglu I, Stafford B (1997) Scalable, distributed data mining using an agent-based architecture. In: Proceedings of knowledge discovery and data mining, pp 211\u2013214"},{"key":"474_CR40","unstructured":"Kargupta H, Park P, Hershberger D, Johnson E (1999) Collective data mining: a new perspective toward distributed data mining. In: Kargupta H, Chan P (eds) Advances in distributed and parallel knowledge discovery. MIT\/AAAI Press"},{"key":"474_CR41","unstructured":"Kempe D, Dobra A, Gehrke J (2003) Computing aggregate information using Gossip. In: Proceedings of the IEEE symposium on foundations of computer science (FoCS03), pp 482\u2013491"},{"key":"474_CR42","unstructured":"Knorr E, Ng R (1998) Algorithms for mining distance-based outliers in large datasets. In: Proceedings of the international conference on very large data bases (VLDB98)"},{"key":"474_CR43","unstructured":"Kowalczyk W, Jelasity M, Eiben A (2003) Towards data mining in large and fully distributed peer-to-peer overlay networks. In: Proceedings of Belgian-Dutch conference on artificial intelligence (BNAIC03), pp 203\u2013210"},{"issue":"4","key":"474_CR44","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1007\/s10723-007-9069-5","volume":"5","author":"D Krivitski","year":"2007","unstructured":"Krivitski D, Schuster A, Wolff R (2007) A local facility location algorithm for large-scale distributed systems. J Grid Comput 5(4): 361\u2013378","journal-title":"J Grid Comput"},{"key":"474_CR45","doi-asserted-by":"crossref","unstructured":"Kurita T, Takahashi T, Ikeda Y (2002) A neural network classifier for occluded images. In: International conference on pattern recognition, vol 3, pp 30045\u201330049","DOI":"10.1109\/ICPR.2002.1047791"},{"key":"474_CR46","doi-asserted-by":"crossref","unstructured":"Luo P, Xiong H, L\u00fc K, Shi Z (2007) Distributed classification in peer-to-peer networks. In: Proceedings of SIGKDD\u201907, pp 968\u2013976","DOI":"10.1145\/1281192.1281296"},{"key":"474_CR47","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1007\/s00144-010-0003-4","volume":"23","author":"W Mebane","year":"2010","unstructured":"Mebane W (2010) Fraud in the 2009 presidential election in Iran?. Chance 23: 6\u201315","journal-title":"Chance"},{"issue":"3","key":"474_CR48","doi-asserted-by":"crossref","first-page":"512","DOI":"10.1109\/TNET.2007.893226","volume":"15","author":"M Mehyar","year":"2007","unstructured":"Mehyar M, Spanos D, Pongsajapan J, Low S, Murray R (2007) Asynchronous distributed averaging on communication networks. IEEE Trans Netw 15(3): 512\u2013529","journal-title":"IEEE Trans Netw"},{"issue":"1","key":"474_CR49","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1016\/j.jpdc.2007.07.011","volume":"68","author":"S Mukherjee","year":"2008","unstructured":"Mukherjee S, Kargupta H (2008) Distributed probabilistic inferencing in sensor networks using variational approximation. J Parallel Distrib Comput 68(1): 78\u201392","journal-title":"J Parallel Distrib Comput"},{"key":"474_CR50","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1007\/s10618-005-0014-6","volume":"12","author":"M Otey","year":"2006","unstructured":"Otey M, Ghoting A, Parthasarathy S (2006) Fast distributed outlier detection in mixed-attribute data sets. Data Mining Knowl Discov 12: 203\u2013228","journal-title":"Data Mining Knowl Discov"},{"key":"474_CR51","doi-asserted-by":"crossref","unstructured":"Palpanas T, Papadopoulos D, Kalogeraki V, Gunopulos D (2003) Distributed deviation detection in sensor networks. In: ACM SIGMOD Record, pp 77\u201382","DOI":"10.1145\/959060.959074"},{"key":"474_CR52","doi-asserted-by":"crossref","unstructured":"Perkins C, Royer E (1999) Ad-hoc on demand distance vector routing. In: Proceedings of the 2nd IEEE workshop on mobile computing systems and applications, pp 90\u2013100","DOI":"10.1109\/MCSA.1999.749281"},{"key":"474_CR53","doi-asserted-by":"crossref","unstructured":"Radivojac P, Korad U, Sivalingam KM, Obradovic Z (2003) Learning from class-imbalanced data in wireless sensor networks. In: Proceedings of the IEEE 58th vehicular technology conference, vol 5, pp 3030\u20133034","DOI":"10.1109\/VETECF.2003.1286180"},{"key":"474_CR54","doi-asserted-by":"crossref","unstructured":"Rajasegarar S, Leckie C, Palaniswami M, Bezdek J (2006) Distributed anomaly detection in wireless sensor networks. In: Proceedings of the IEEE Singapore international conference on communication systems, pp 1\u20135","DOI":"10.1109\/ICCS.2006.301508"},{"key":"474_CR55","doi-asserted-by":"crossref","unstructured":"Ramaswamy S, Rastogi R, Shim K (2000) Efficient algorithms for mining outliers from large datasets. In: Proceedings of the ACM SIGMOD conference on the management of data (SIGMOD00)","DOI":"10.1145\/342009.335437"},{"key":"474_CR56","doi-asserted-by":"crossref","unstructured":"Schurgers C, Tsiatsis V, Srivastava M (2002) STEM: topology management for energy-efficient sensor networks. In: Proceedings of the IEEE aerospace conference, vol 3, pp 1099\u20131108","DOI":"10.1109\/AERO.2002.1035239"},{"key":"474_CR57","doi-asserted-by":"crossref","unstructured":"Sharfman I, Schuster A, Keren D (2007) A geometric approach to monitoring threshold functions over distributed data streams. ACM Trans Database Syst 32(4)","DOI":"10.1145\/1292609.1292613"},{"key":"474_CR58","doi-asserted-by":"crossref","unstructured":"Sheng B, Li Q, Mao W, Jin W (2007) Outlier detection in sensor networks. In: Proceedings of the 8th ACM international symposium on mobile and ad hoc networking and computing (MobiHoc), pp 219\u2013228","DOI":"10.1145\/1288107.1288137"},{"issue":"1","key":"474_CR59","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1109\/TSP.2004.838930","volume":"53","author":"X Sheng","year":"2005","unstructured":"Sheng X, Hu Y-H (2005) Maximum likelihood multiple-source localization using acoustic energy measurements with wireless sensor networks. IEEE Trans Signal Process 53(1): 44\u201353","journal-title":"IEEE Trans Signal Process"},{"key":"474_CR60","doi-asserted-by":"crossref","unstructured":"Shin K, Abraham A, Han (2006) Improving kNN text categorization by removing outliers from training set. In: Gelbukh A (ed) Computational linguistics and intelligent text processing, lecture notes in computer science, vol 3878. Springer, Berlin\/Heidelberg, pp 563\u2013566","DOI":"10.1007\/11671299_58"},{"key":"474_CR61","doi-asserted-by":"crossref","unstructured":"Simon G, Maroti M, Ledeczi A, Balogh G, Kusy B, Nadas A, Pap G, Sallai J, Frampton K (2004) Sensor network-based countersniper system. In: Proceedings of the international conference on embedded networked sensor systems (SenSys04), pp 1\u201312","DOI":"10.1145\/1031495.1031497"},{"key":"474_CR62","doi-asserted-by":"crossref","unstructured":"Su L, Han W, Yang S, Zou P, Jia Y (2007) Continuous adaptive outlier detection on distributed data streams. In: Lecture notes in computer science 4782\u2014proceedings of the high performance computation conference (HPCC), pp 74\u201385","DOI":"10.1007\/978-3-540-75444-2_13"},{"key":"474_CR63","unstructured":"Subramaniam S, Palpanas T, Papadopoulos D, Kalogeraki V, Gunopulos D (2006) Online outlier detection in sensor data using non-parametric models. In: Proceedings of ACM conference on very large databases (VLDB06), pp 187\u2013198"},{"issue":"3","key":"474_CR64","doi-asserted-by":"crossref","first-page":"583","DOI":"10.1080\/00401706.1972.10488948","volume":"14","author":"G Tietjen","year":"1972","unstructured":"Tietjen G, Moore R (1972) Some grubbs-type statistics for the detection of outliers. Technometrics 14(3): 583\u2013597","journal-title":"Technometrics"},{"key":"474_CR65","doi-asserted-by":"crossref","unstructured":"Wang Z, Bulut E, Szymanski BK (2010) Distributed energy-efficient target tracking with binary sensor networks. ACM Transactions on Sensor Networks (TOSN) 6(4)","DOI":"10.1145\/1777406.1777411"},{"key":"474_CR66","doi-asserted-by":"crossref","unstructured":"Wasilewski K, Branch J, Lisee M, Szymanski BK (2007) Self-healing routing: a study in efficiency and resiliency of data delivery in wireless sensor networks. In: Proceedings of the conference on unattended ground, sea, and air sensor technologies and applications, SPIE symposium on defense and security","DOI":"10.1117\/12.723515"},{"issue":"6","key":"474_CR67","doi-asserted-by":"crossref","first-page":"2426","DOI":"10.1109\/TSMCB.2004.836888","volume":"34","author":"R Wolff","year":"2004","unstructured":"Wolff R, Schuster A (2004) Association rule mining in peer-to-peer systems. IEEE Trans Syst Man Cybern Part B 34(6): 2426\u20132438","journal-title":"IEEE Trans Syst Man Cybern Part B"},{"key":"474_CR68","doi-asserted-by":"crossref","unstructured":"Wolff R, Bhaduri K, Kargupta H (2006) Local L2 thresholding-based data mining in peer-to-peer systems. In: Proceedings of the SIAM international conference on data mining (SDM06), pp 430\u2013441","DOI":"10.1137\/1.9781611972764.38"},{"issue":"4","key":"474_CR69","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1109\/TKDE.2008.169","volume":"21","author":"R Wolff","year":"2009","unstructured":"Wolff R, Bhaduri K, Kargupta H (2009) A generic local algorithm for mining data streams in large distributed systems. IEEE Trans on Knowl Data Eng 21(4): 465\u2013487","journal-title":"IEEE Trans on Knowl Data Eng"},{"key":"474_CR70","doi-asserted-by":"crossref","unstructured":"Xu Y, Heidemann J, Estrin D (2001) Geography-informed energy conservation for ad hoc routing. In: Proceedings of the ACM international conference on mobile computing and networking (MobiCom01), pp 70\u201384","DOI":"10.1145\/381677.381685"},{"key":"474_CR71","unstructured":"Zhuang Y, Chen L (2006) In-network outlier cleaning for data collection in sensor networks. In: Proceedings of the 1st international VLDB workshop on clean databases (CleanDB06)"},{"key":"474_CR72","doi-asserted-by":"crossref","unstructured":"Zhuang Y, Chen L, Wang X, Lian J (2007) A weighted average-based approach for cleaning sensor data. In: Proceedings of the 27th international conference on distributed computing systems (ICDCS)","DOI":"10.1109\/ICDCS.2007.83"},{"key":"474_CR73","doi-asserted-by":"crossref","unstructured":"Zuniga M, Krishnamachari B (2004) Analyzing the transitional region in low power wireless links. In: Proceedings of the IEEE conference on sensor and ad hoc communications and networks (SECON04), pp 517\u2013526","DOI":"10.1109\/SAHCN.2004.1381954"}],"container-title":["Knowledge and Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-011-0474-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10115-011-0474-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-011-0474-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,22]],"date-time":"2019-06-22T11:50:16Z","timestamp":1561204216000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10115-011-0474-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,1,18]]},"references-count":73,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,1]]}},"alternative-id":["474"],"URL":"https:\/\/doi.org\/10.1007\/s10115-011-0474-5","relation":{},"ISSN":["0219-1377","0219-3116"],"issn-type":[{"value":"0219-1377","type":"print"},{"value":"0219-3116","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,1,18]]}}}