{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T11:10:46Z","timestamp":1648984246786},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2011,3,30]],"date-time":"2011-03-30T00:00:00Z","timestamp":1301443200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Inf Technol Manag"],"published-print":{"date-parts":[[2011,6]]},"DOI":"10.1007\/s10799-011-0095-4","type":"journal-article","created":{"date-parts":[[2011,3,29]],"date-time":"2011-03-29T08:00:54Z","timestamp":1301385654000},"page":"55-66","source":"Crossref","is-referenced-by-count":13,"title":["Heuristic algorithms for effective broker deployment"],"prefix":"10.1007","volume":"12","author":[{"given":"Yifeng","family":"Qian","sequence":"first","affiliation":[]},{"given":"Beihong","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Wenjing","family":"Fang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,3,30]]},"reference":[{"issue":"4","key":"95_CR1","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1080\/17517575.2010.509814","volume":"4","author":"K Kakousis","year":"2010","unstructured":"Kakousis K, Paspallis N, Papadopoulos G (2010) A survey of software adaptation in mobile and ubiquitous computing. Enterp Inf Syst 4(4):355\u2013389","journal-title":"Enterp Inf Syst"},{"key":"95_CR2","doi-asserted-by":"crossref","unstructured":"Kumar S, Kadow B, Lamkin M. Challenges with the introduction of radio-frequency identification systems into a manufacturer\u2019s supply chain-a pilot study. Enterp Inf Syst. First published on: 20 January 2011 (iFirst) doi: 10.1080\/17517575.2010.536262","DOI":"10.1080\/17517575.2010.536262"},{"issue":"1","key":"95_CR3","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1080\/17517570601092127","volume":"1","author":"C Zang","year":"2007","unstructured":"Zang C, Fan Y (2007) Complex event processing in enterprise information systems based on RFID. Enterp Inf Syst 1(1):3\u201323","journal-title":"Enterp Inf Syst"},{"issue":"3","key":"95_CR4","doi-asserted-by":"crossref","first-page":"327","DOI":"10.1080\/17517570701504633","volume":"1","author":"C Hsu","year":"2007","unstructured":"Hsu C, Wallace W (2007) An industrial network flow information integration model for supply chain management and intelligent transportation. Enterp Inf Syst 1(3):327\u2013351","journal-title":"Enterp Inf Syst"},{"issue":"1","key":"95_CR5","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1080\/00207543.2010.508944","volume":"49","author":"L Xu","year":"2011","unstructured":"Xu L (2011) Information architecture for supply chain quality management. Int J Prod Res 49(1):183\u2013198","journal-title":"Int J Prod Res"},{"issue":"2","key":"95_CR6","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1007\/s10796-008-9130-3","volume":"12","author":"L Wang","year":"2010","unstructured":"Wang L, Xu L, Liu R, Wang H (2010) An approach for moving object recognition based on BPR and CI. Inf Syst Front 12(2):141\u2013148","journal-title":"Inf Syst Front"},{"issue":"2","key":"95_CR7","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1007\/s10796-008-9131-2","volume":"12","author":"R Yuan","year":"2010","unstructured":"Yuan R, Li Z, Guan X, Xu L (2010) An SVM-based machine learning method for accurate internet traffic classification. Inf Syst Front 12(2):149\u2013156","journal-title":"Inf Syst Front"},{"key":"95_CR8","doi-asserted-by":"crossref","first-page":"326","DOI":"10.1002\/0470868023","volume-title":"RFID Handbook: fundamentals and applications in contactless smart cards and identification","author":"K Finkenzeller","year":"2003","unstructured":"Finkenzeller K (2003) RFID Handbook: fundamentals and applications in contactless smart cards and identification, 2nd edn. Wiley, Chichester, pp 326\u2013328","edition":"2"},{"key":"95_CR9","unstructured":"ThingMagic Astra Integrated Reader. http:\/\/www.thingmagic.com\/integrated-readers . Accessed 16 Jan 2010"},{"issue":"4","key":"95_CR10","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1016\/S1389-1286(01)00302-4","volume":"38","author":"IF Akyildiz","year":"2002","unstructured":"Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) Wireless sensor networks: a survey. Comput Netw 38(4):393\u2013422","journal-title":"Comput Netw"},{"issue":"2","key":"95_CR11","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1080\/17517570902749144","volume":"3","author":"S Li","year":"2009","unstructured":"Li S, Wang X, Zhang D (2009) An adaptive distributed localisation in wireless sensor network. Enterp Inf Syst 3(2):117\u2013132","journal-title":"Enterp Inf Syst"},{"issue":"3","key":"95_CR12","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1080\/17517570802132920","volume":"2","author":"S Li","year":"2008","unstructured":"Li S, Wang X, Zhang D (2008) Node localisation in wireless sensor network based on self-organising isometric embedding. Enterp Inf Syst 2(3):259\u2013273","journal-title":"Enterp Inf Syst"},{"key":"95_CR13","first-page":"111","volume-title":"Artificial intelligence: a modern approach","author":"SJ Russell","year":"2003","unstructured":"Russell SJ, Norvig P (2003) Artificial intelligence: a modern approach, 2nd edn. Prentice Hall, Upper Saddle River, pp 111\u2013114","edition":"2"},{"key":"95_CR14","doi-asserted-by":"crossref","DOI":"10.1002\/9780470317013","volume-title":"Spatial tessellations\u2014concepts and applications of voronoi diagrams","author":"Ai Okabe","year":"2000","unstructured":"Okabe Ai, Boots B, Sugihara K, Chiu SN (2000) Spatial tessellations\u2014concepts and applications of voronoi diagrams, 2nd edn. John Wiley, Chichester","edition":"2"},{"key":"95_CR15","doi-asserted-by":"crossref","unstructured":"Du D, Hwang F, Fortune S (1992) Voronoi diagrams and Delaunay triangulations. In: Euclidean geometry and computers","DOI":"10.1142\/9789814355858_0006"},{"key":"95_CR16","unstructured":"Hwang FK, Richards DS, Winter P (1992) The Steiner tree problem. In: Annals of discrete mathematics, vol 53. Elsevier, North-Holland"},{"key":"95_CR17","doi-asserted-by":"crossref","unstructured":"Hoareau D, Mahe\u2032o Y (2008) Middleware support for the deployment of ubiquitous software components. In: Personal and ubiquitous computing, vol 12, Issue 2","DOI":"10.1007\/s00779-006-0110-7"},{"key":"95_CR18","doi-asserted-by":"crossref","unstructured":"Biagioni E, Sasaki G (2003) Wireless sensor placement for reliable and efficient data collection. In: the 36th annual hawaii international conference on system sciences","DOI":"10.1109\/HICSS.2003.1174290"},{"key":"95_CR19","doi-asserted-by":"crossref","unstructured":"Zou Y, Chakrabarty K (2004) Sensor deployment and target localization in distributed sensor networks. In: ACM transactions on embedded computing systems, vol 3","DOI":"10.1145\/972627.972631"},{"key":"95_CR20","doi-asserted-by":"crossref","unstructured":"Heo N, Varshney PK (2005) Energy-efficient deployment of Intelligent Mobile sensor networks. In: IEEE transactions on systems, man and cybernetics, vol 35, Issue 1","DOI":"10.1109\/TSMCA.2004.838486"},{"key":"95_CR21","doi-asserted-by":"crossref","unstructured":"Clouqueur T, Phipatanasuphorn V, Ramanathan P, Saluja KK (2003) Sensor Deployment strategy for detection of targets traversing a region. In: Mobile networks and applications","DOI":"10.1145\/570743.570745"},{"key":"95_CR22","doi-asserted-by":"crossref","unstructured":"Dijkstra E (1959). A note on two problems in connexion with graphs. In: Numerische Mathematik 1, pp. 269\u2013271","DOI":"10.1007\/BF01386390"},{"key":"95_CR23","doi-asserted-by":"crossref","unstructured":"Kruskal JB (1956) On the shortest spanning subtree of a graph and the traveling salesman problem. In: Proceedings of the american mathematical society, vol 7, No. 1, pp 48\u201350","DOI":"10.1090\/S0002-9939-1956-0078686-7"},{"key":"95_CR24","unstructured":"Chew P: Voronoi Diagram\/Delaunay Trigangulation. http:\/\/www.cs.cornell.edu\/home \/chew\/Delaunay.html. Accessed 16 Jan 2010"},{"key":"95_CR25","unstructured":"Warme D, Winter P, Zachariasen M (2003) GeoSteiner: software for computing steiner trees. http:\/\/www.diku.dk\/hjemmesider\/ansatte\/martinz\/geosteiner\/ . Accessed 16 Jan 2010"}],"container-title":["Information Technology and Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10799-011-0095-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10799-011-0095-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10799-011-0095-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,9]],"date-time":"2019-06-09T14:00:08Z","timestamp":1560088808000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10799-011-0095-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,3,30]]},"references-count":25,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2011,6]]}},"alternative-id":["95"],"URL":"https:\/\/doi.org\/10.1007\/s10799-011-0095-4","relation":{},"ISSN":["1385-951X","1573-7667"],"issn-type":[{"value":"1385-951X","type":"print"},{"value":"1573-7667","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,3,30]]}}}