{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:32:38Z","timestamp":1774539158068,"version":"3.50.1"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2015,6,12]],"date-time":"2015-06-12T00:00:00Z","timestamp":1434067200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"NGFR 973","award":["2012CB316200"],"award-info":[{"award-number":["2012CB316200"]}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"crossref","award":["61472099"],"award-info":[{"award-number":["61472099"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comb Optim"],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1007\/s10878-015-9920-8","type":"journal-article","created":{"date-parts":[[2015,6,11]],"date-time":"2015-06-11T15:22:08Z","timestamp":1434036128000},"page":"1068-1088","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Efficient accuracy evaluation for multi-modal sensed data"],"prefix":"10.1007","volume":"32","author":[{"given":"Yan","family":"Zhang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7521-2871","authenticated-orcid":false,"given":"Hongzhi","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Hong","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Jianzhong","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,6,12]]},"reference":[{"key":"9920_CR1","doi-asserted-by":"crossref","unstructured":"Balakrishnan R, Kambhampati S (2011) Sourcerank: relevance and trust assessment for deep web sources based on inter-source agreement. In: WWW, pp 227\u2013236","DOI":"10.1145\/1963405.1963440"},{"key":"9920_CR2","volume-title":"Nonlinear programming","author":"Dimitri P Bertsekas","year":"1999","unstructured":"Bertsekas Dimitri P (1999) Nonlinear programming, 2nd edn. Athena Scientific, Cambridge","edition":"2"},{"key":"9920_CR3","first-page":"136","volume-title":"Improved approximation algorithms for the capacitated multicast routing problem","author":"Z Cai","year":"2005","unstructured":"Cai Z, Lin G, Xue G (2005) Improved approximation algorithms for the capacitated multicast routing problem. Computing and combinatorics. Springer, Berlin, pp 136\u2013145"},{"key":"9920_CR4","doi-asserted-by":"crossref","unstructured":"Cai Z, Chen Z-Z, Lin G (2008) A 3.4713-approximation algorithm for the capacitated multicast tree routing problem. Theoret Comput Sci 410(52):5415\u20135424","DOI":"10.1016\/j.tcs.2009.05.013"},{"key":"9920_CR5","doi-asserted-by":"crossref","unstructured":"Cai Z, Ji S, He J, Bourgeois AG (2012) Optimal distributed data collection for asynchronous cognitive radio networks. In: IEEE 32nd international conference on distributed computing systems (ICDCS), pp 245\u2013254. IEEE","DOI":"10.1109\/ICDCS.2012.29"},{"key":"9920_CR6","first-page":"1699","volume":"20","author":"L Chen","year":"2007","unstructured":"Chen L, Liu Y, Li M (2007) Non-threshold based event detection for 3d environment monitoring in sensor networks. IEEE Trans Knowl Data Eng 20:1699\u20131711","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"3","key":"9920_CR7","doi-asserted-by":"crossref","first-page":"499","DOI":"10.1007\/s10878-012-9451-5","volume":"26","author":"G Chen","year":"2013","unstructured":"Chen G, Cui S (2013) Relay node placement in two-tiered wireless sensor networks with base stations. J Comb Optim 26(3):499\u2013508","journal-title":"J Comb Optim"},{"issue":"3","key":"9920_CR8","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1007\/s11276-006-0724-8","volume":"14","author":"X Cheng","year":"2008","unstructured":"Cheng X, Du D, Wang L, Xu B (2008) Relay sensor placement in wireless sensor networks. Wirel Netw 14(3):347\u2013355","journal-title":"Wirel Netw"},{"key":"9920_CR9","doi-asserted-by":"crossref","unstructured":"Cheng S, Li J (2009) Sampling based (epsilon, delta)-approximate aggregation algorithm in sensor networks. In: The 29th IEEE international conference on distributed computing systems (ICDCS), IEEE, pp 273\u2013280","DOI":"10.1109\/ICDCS.2009.8"},{"key":"9920_CR10","doi-asserted-by":"crossref","unstructured":"Cheng S, Li J, Cai Z (2013) $$o(\\epsilon )$$ o ( \u03f5 ) -approximation to physical world by sensor networks. In: INFOCOM","DOI":"10.1109\/INFCOM.2013.6567121"},{"key":"9920_CR11","unstructured":"Cheng S, Li J, Ren Q, Yu L (2010) Bernoulli sampling based $$(\\varepsilon, \\delta )$$ ( \u03b5 , \u03b4 ) -approximate aggregation in large-scale sensor networks. In: Proceedings of the 29th conference on Information communications, IEEE Press, pp 1181\u20131189"},{"key":"9920_CR12","doi-asserted-by":"crossref","unstructured":"Cheng S, Li J, Yu L (2012) Location aware peak value queries in sensor networks. In: INFOCOM, IEEE, pp 486\u2013494","DOI":"10.1109\/INFCOM.2012.6195789"},{"key":"9920_CR13","first-page":"2685","volume":"2004","author":"X Cheng","year":"2004","unstructured":"Cheng X, Thaeler A, Xue G, Chen D (2004) Tps: a time-based positioning scheme for outdoor wireless sensor networks. IEEE INFOCOM 2004:2685\u20132696","journal-title":"IEEE INFOCOM"},{"key":"9920_CR14","first-page":"902","volume":"2005","author":"M Ding","year":"2005","unstructured":"Ding M, Chen D, Xing K, Cheng X (2005) Localized fault-tolerant event boundary detection in sensor networks. IEEE INFOCOM 2005:902\u2013913","journal-title":"IEEE INFOCOM"},{"key":"9920_CR15","doi-asserted-by":"crossref","unstructured":"Dong XL, Srivastava D (2011) Large-scale copy detection. In: SIGMOD conference, pp 1205\u20131208","DOI":"10.1145\/1989323.1989454"},{"key":"9920_CR16","doi-asserted-by":"crossref","unstructured":"Dong XL, Srivastava D (2012) Detecting clones, copying and reuse on the web. In: ICDE, pp 1211\u20131213","DOI":"10.1109\/ICDE.2012.146"},{"issue":"1","key":"9920_CR17","doi-asserted-by":"crossref","first-page":"550","DOI":"10.14778\/1687627.1687690","volume":"2","author":"XL Dong","year":"2009","unstructured":"Dong XL, Berti-Equille L, Srivastava D (2009a) Integrating conflicting data: the role of source dependence. Proc VLDB Endow 2(1):550\u2013561","journal-title":"Proc VLDB Endow"},{"issue":"1","key":"9920_CR18","doi-asserted-by":"crossref","first-page":"562","DOI":"10.14778\/1687627.1687691","volume":"2","author":"XL Dong","year":"2009","unstructured":"Dong XL, Berti-Equille L, Srivastava D (2009b) Truth discovery and copying detection in a dynamic world. Proc VLDB Endow 2(1):562\u2013573","journal-title":"Proc VLDB Endow"},{"issue":"2","key":"9920_CR19","doi-asserted-by":"crossref","first-page":"1617","DOI":"10.14778\/1920841.1921054","volume":"3","author":"X Dong","year":"2010","unstructured":"Dong X, Berti-Equille L, Hu Y, Srivastava D (2010) Solomon: seeking the truth via copying detection. Proc VLDB Endow 3(2):1617\u20131620","journal-title":"Proc VLDB Endow"},{"issue":"1","key":"9920_CR20","doi-asserted-by":"crossref","first-page":"1358","DOI":"10.14778\/1920841.1921008","volume":"3","author":"X Dong","year":"2010","unstructured":"Dong X, Berti-Equille L, Hu Y, Srivastava D (2010) Global detection of complex copying relationships between sources. Proc VLDB Endow 3(1):1358\u20131369","journal-title":"Proc VLDB Endow"},{"issue":"2","key":"9920_CR21","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1007\/s10878-010-9358-y","volume":"23","author":"H Du","year":"2012","unstructured":"Du H, Wu W, Shan S, Kim D, Lee W (2012) Constructing weakly connected dominating set for secure clustering in distributed sensor network. J Comb Optim 23(2):301\u2013307","journal-title":"J Comb Optim"},{"issue":"1","key":"9920_CR22","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TKDE.2007.250581","volume":"19","author":"AK Elmagarmid","year":"2007","unstructured":"Elmagarmid AK, Ipeirotis PG, Verykios VS (2007) Duplicate record detection: a survey. IEEE Trans Knowl Data Eng 19(1):1\u201316","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"9920_CR23","unstructured":"Florescu D, Koller D, Levy AY (1997) Using probabilistic information in data integration. In: VLDB, pp 216\u2013225"},{"key":"9920_CR24","doi-asserted-by":"crossref","unstructured":"Galland A, Abiteboul S, Marian A, Senellart P (2010) Corroborating information from disagreeing views. In: WSDM, pp 131\u2013140","DOI":"10.1145\/1718487.1718504"},{"issue":"12","key":"9920_CR25","doi-asserted-by":"crossref","first-page":"2018","DOI":"10.14778\/2367502.2367564","volume":"5","author":"L Getoor","year":"2012","unstructured":"Getoor L, Machanavajjhala A (2012) Entity resolution: Theory, practice & open challenges. Proc VLDB Endow 5(12):2018\u20132019","journal-title":"Proc VLDB Endow"},{"issue":"1","key":"9920_CR26","first-page":"1","volume":"2798","author":"A Jindal","year":"2010","unstructured":"Jindal A, Liu M (2010) Networked computing in wireless sensor networks for structural health monitoring. Network Comput Wirel Sensor Netw Struct Health Monit 2798(1):1\u201314","journal-title":"Network Comput Wirel Sensor Netw Struct Health Monit"},{"key":"9920_CR27","doi-asserted-by":"crossref","unstructured":"Kasneci G, Van Gael J, Stern DH, Graepel T (2011) Cobayes: Bayesian knowledge corroboration with assessors of unknown areas of expertise. In: WSDM, pp 465\u2013474","DOI":"10.1145\/1935826.1935896"},{"key":"9920_CR28","doi-asserted-by":"crossref","unstructured":"Kozlov MK, Tarasov SP, Khachiyan LG (1980) Polynomial solvability of convex quadratic programming. In: Doklady Akademii Nauk SSSR, p 248","DOI":"10.1016\/0041-5553(80)90098-1"},{"key":"9920_CR29","unstructured":"Kumar S, Shepherd D (2001) SensIT: sensor information technology for the warfighter. In: Proceedings of the 4th international conference on information fusion, p 3C9"},{"key":"9920_CR30","volume-title":"Theory of point estimation","author":"EL Lehmann","year":"1998","unstructured":"Lehmann EL, George Casella (1998) Theory of point estimation, 2nd edn. Springer, New York","edition":"2"},{"key":"9920_CR31","doi-asserted-by":"crossref","unstructured":"Li M, Liu Y, Chen L (2007) Non-threshold based event detection for 3d environment monitoring in sensor networks. In: ICDCS, p 9","DOI":"10.1109\/ICDCS.2007.123"},{"key":"9920_CR32","doi-asserted-by":"crossref","unstructured":"Li X, Meng W, Yu CT (2011) T-verifier: verifying truthfulness of fact statements. In: ICDE, pp 63\u201374","DOI":"10.1109\/ICDE.2011.5767859"},{"issue":"4","key":"9920_CR33","doi-asserted-by":"crossref","first-page":"485","DOI":"10.1007\/s10878-011-9403-5","volume":"24","author":"M Li","year":"2012","unstructured":"Li M, Liu Q, Wang J, Zhao Y (2012) Dispatching design for storage-centric wireless sensor networks. J Comb Optim 24(4):485\u2013507","journal-title":"J Comb Optim"},{"issue":"2","key":"9920_CR34","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1007\/s10878-012-9504-9","volume":"27","author":"D Li","year":"2014","unstructured":"Li D, Zhu Q, Du H, Li J (2014a) An improved distributed data aggregation scheduling in wireless sensor networks. J Comb Optim 27(2):221\u2013240","journal-title":"J Comb Optim"},{"key":"9920_CR35","doi-asserted-by":"crossref","unstructured":"Li J, Cheng S, Gao H, Cai Z (2014b) Approximate physical world reconstruction algorithms in sensor networks. In: IEEE transactions on parallel and distributed systems","DOI":"10.1109\/TPDS.2013.2297121"},{"key":"9920_CR36","doi-asserted-by":"crossref","unstructured":"Li J, Cheng S, Gao H, Cai Z (2014c) Approximate physical world reconstruction algorithms in sensor networks. In: IEEE transactions on parallel and distributed systems","DOI":"10.1109\/TPDS.2013.2297121"},{"key":"9920_CR37","doi-asserted-by":"crossref","unstructured":"Liu K, Li M, Liu Y, Li X-Y, Li M, Ma H (2010) Exploring the hidden connectivity in urban vehicular networks. In: ICNP, pp 243\u2013252","DOI":"10.1109\/ICNP.2010.5762773"},{"key":"9920_CR38","volume-title":"Machine learning: a probabilistic perspective","author":"KP Murphy","year":"2012","unstructured":"Murphy KP (2012) Machine learning: a probabilistic perspective. MIT Press, London"},{"key":"9920_CR39","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781316135228","volume-title":"Flexible pattern matching in strings\u2013practical on-line search algorithms for texts and biological sequences","author":"G Navarro","year":"2002","unstructured":"Navarro G, Raffinot M (2002) Flexible pattern matching in strings\u2013practical on-line search algorithms for texts and biological sequences. Cambridge University Press, Cambridge"},{"key":"9920_CR40","volume-title":"Numerical optimization","author":"J Nocedal","year":"2006","unstructured":"Nocedal J, Wright SJ (2006) Numerical optimization, 2nd edn. Springer, Berlin","edition":"2"},{"key":"9920_CR41","unstructured":"Pasternack J, Roth D (2011) Making better informed trust decisions with generalized fact-finding. In: IJCAI, pp 2324\u20132329"},{"key":"9920_CR42","unstructured":"Peterson D, Gao S, Malhotra A, Sperberg-McQueen CM, Henry S (2010) Xml schema 1.1. http:\/\/www.w3.org\/XML\/Schema"},{"key":"9920_CR43","doi-asserted-by":"crossref","unstructured":"Ren Z, Zhou G, Pyles AJ, Keally M, Mao W, Wang H (2011) Bodyt2: throughput and time delay performance assurance for heterogeneous bsns. In: INFOCOM, pp 2750\u20132758","DOI":"10.1109\/INFCOM.2011.5935107"},{"key":"9920_CR44","unstructured":"Wang D, Kaplan L, Abdelzaher T, Aggarwal C (2011) On quantifying the accuracy of maximum likelihood estimation of participant reliability in social sensing. In: DMSN"},{"key":"9920_CR45","doi-asserted-by":"crossref","unstructured":"Zeinalipour-Yazti D, Vagena Z, Gunopulos D, Kalogeraki V, Tsotras V, Vlachos M, Koudas N, Srivastava D (2005) The threshold join algorithm for top-k queries in distributed sensor networks. In: Proceedings of the 2nd international workshop on Data management for sensor networks. ACM, pp 61\u201366","DOI":"10.1145\/1080885.1080896"},{"key":"9920_CR46","doi-asserted-by":"crossref","unstructured":"Zhang Y, Wang H (2014) Accuracy evaluation for sensed data. In: WASA, pp 205\u2013214","DOI":"10.1007\/978-3-319-07782-6_19"},{"issue":"6","key":"9920_CR47","doi-asserted-by":"crossref","first-page":"550","DOI":"10.14778\/2168651.2168656","volume":"5","author":"B Zhao","year":"2012","unstructured":"Zhao B, Rubinstein BIP, Gemmell J, Han J (2012) A Bayesian approach to discovering truth from conflicting sources for data integration. Proc VLDB Endow 5(6):550\u2013561","journal-title":"Proc VLDB Endow"},{"key":"9920_CR48","doi-asserted-by":"crossref","unstructured":"Zhou Y, Chen X, Lyu MR, Liu J (2010) Sentomist: unveiling transient sensor network bugs via symptom mining. In: IEEE 30th international conference on distributed computing systems (ICDCS), IEEE, pp 784\u2013794","DOI":"10.1109\/ICDCS.2010.75"}],"container-title":["Journal of Combinatorial Optimization"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10878-015-9920-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10878-015-9920-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10878-015-9920-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10878-015-9920-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,28]],"date-time":"2025-05-28T15:06:47Z","timestamp":1748444807000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10878-015-9920-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6,12]]},"references-count":48,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2016,11]]}},"alternative-id":["9920"],"URL":"https:\/\/doi.org\/10.1007\/s10878-015-9920-8","relation":{},"ISSN":["1382-6905","1573-2886"],"issn-type":[{"value":"1382-6905","type":"print"},{"value":"1573-2886","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,6,12]]}}}