{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,10]],"date-time":"2024-06-10T17:10:03Z","timestamp":1718039403766},"reference-count":68,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2015,8,20]],"date-time":"2015-08-20T00:00:00Z","timestamp":1440028800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Real-Time Syst"],"published-print":{"date-parts":[[2015,11]]},"DOI":"10.1007\/s11241-015-9238-8","type":"journal-article","created":{"date-parts":[[2015,8,19]],"date-time":"2015-08-19T11:37:52Z","timestamp":1439984272000},"page":"724-762","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Reliable social sensing with physical constraints: analytic bounds and performance evaluation"],"prefix":"10.1007","volume":"51","author":[{"given":"Dong","family":"Wang","sequence":"first","affiliation":[]},{"given":"Tarek","family":"Abdelzaher","sequence":"additional","affiliation":[]},{"given":"Lance","family":"Kaplan","sequence":"additional","affiliation":[]},{"given":"Raghu","family":"Ganti","sequence":"additional","affiliation":[]},{"given":"Shaohan","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Hengchang","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,20]]},"reference":[{"issue":"2","key":"9238_CR1","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/MPRV.2007.38","volume":"6","author":"T Abdelzaher","year":"2007","unstructured":"Abdelzaher T et al (2007) Mobiscopes for human spaces. IEEE Pervasive Comput 6(2):20\u201329","journal-title":"IEEE Pervasive Comput"},{"key":"9238_CR2","doi-asserted-by":"crossref","unstructured":"Ali A, Khelil A, Szczytowski P, Suri N (2011) An adaptive and composite spatio-temporal data compression approach for wireless sensor networks. In: Proceedings of the 14th ACM international conference on modeling, analysis and simulation of wireless and mobile systems, MSWiM\u201911, ACM, New York, pp 67\u201376","DOI":"10.1145\/2068897.2068912"},{"issue":"1","key":"9238_CR3","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/0304-3975(94)00202-T","volume":"138","author":"R Alur","year":"1995","unstructured":"Alur R, Courcoubetis C, Halbwachs N, Henzinger TA, Ho P-H, Nicollin X, Olivero A, Sifakis J, Yovine S (1995) The algorithmic analysis of hybrid systems. Theor Comput Sci 138(1):3\u201334","journal-title":"Theor Comput Sci"},{"key":"9238_CR4","unstructured":"Burke J et al (2006) Participatory sensing. In: Workshop on world-sensor-web (WSW): mobile device centric sensor networks and applications, pp 117\u2013134"},{"key":"9238_CR5","volume-title":"Statistical inference","author":"G Casella","year":"2002","unstructured":"Casella G, Berger R (2002) Statistical inference. Duxbury Press, Pacific Grove"},{"issue":"3","key":"9238_CR6","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1007\/s10994-012-5296-5","volume":"88","author":"M Chang","year":"2012","unstructured":"Chang M, Ratinov L, Roth D (2012) Structured learning with constrained conditional models. Mach Learn 88(3):399\u2013431 6","journal-title":"Mach Learn"},{"key":"9238_CR7","doi-asserted-by":"crossref","unstructured":"Cook B, Podelski A, Rybalchenko A (2005) Abstraction refinement for termination. In: Static analysis, Springer, pp 87\u2013101","DOI":"10.1007\/11547662_8"},{"key":"9238_CR8","doi-asserted-by":"crossref","unstructured":"Cook B, Podelski A, Rybalchenko A (2006) Termination proofs for systems code. In: ACM SIGPLAN notices, ACM, vol 41. pp 415\u2013426","DOI":"10.1145\/1133981.1134029"},{"key":"9238_CR9","volume-title":"Mathematical methods of statistics","author":"H Cramer","year":"1946","unstructured":"Cramer H (1946) Mathematical methods of statistics. Princeton University Press, Princeton"},{"key":"9238_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1007\/978-3-642-40276-0_7","volume-title":"Mobile web information systems","author":"JM Valmaseda de","year":"2013","unstructured":"de Valmaseda JM, Ionescu G, Deriaz M (2013) Trustpos model: trusting in mobile users location. In: Daniel F, Papadopoulos G, Thiran P (eds) Mobile web information systems, vol 8093., Lecture Notes in Computer ScienceSpringer, Berlin, pp 79\u201389"},{"issue":"1","key":"9238_CR11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1111\/j.2517-6161.1977.tb01600.x","volume":"39","author":"AP Dempster","year":"1977","unstructured":"Dempster AP, Laird NM, Rubin DB (1977) Maximum likelihood from incomplete data via the em algorithm. J R Stat Soc Ser B 39(1):1\u201338","journal-title":"J R Stat Soc Ser B"},{"key":"9238_CR12","doi-asserted-by":"crossref","unstructured":"Eisenman SB et al (2007) The bikenet mobile sensing system for cyclist experience mapping. In: SenSys\u201907","DOI":"10.1145\/1322263.1322273"},{"key":"9238_CR13","doi-asserted-by":"crossref","unstructured":"Ganti RK, Pham N, Ahmadi H, Nangia S, Abdelzaher TF (2010) Greengps: a participatory sensing fuel-efficient maps application. In: MobiSys \u201910: proceedings of the 8th international conference on mobile systems, applications, and services, ACM, New York, pp 151\u2013164","DOI":"10.1145\/1814433.1814450"},{"key":"9238_CR14","doi-asserted-by":"crossref","unstructured":"Guitton A, Skordylis A, Trigoni N (2007) Utilizing correlations to compress time-series in traffic monitoring sensor networks. In: Wireless communications and networking conference, 2007. WCNC 2007. IEEE, pp 2479\u20132483","DOI":"10.1109\/WCNC.2007.462"},{"issue":"2","key":"9238_CR15","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1109\/TMI.2008.927338","volume":"28","author":"L He","year":"2009","unstructured":"He L, Greenshields Ian R (2009) A nonlocal maximum likelihood estimation method for Rician noise reduction in MR images. Med Imaging IEEE Trans 28(2):165\u2013172","journal-title":"Med Imaging IEEE Trans"},{"key":"9238_CR16","doi-asserted-by":"crossref","unstructured":"He W, Liu X, Ren M (2011) Location cheating: a security challenge to location-based social network services. In: Distributed computing systems (ICDCS), 2011 31st international conference on, pp 740\u2013749","DOI":"10.1109\/ICDCS.2011.42"},{"key":"9238_CR17","unstructured":"Hoel PG et al (1954) Introduction to mathematical statistics, 2edn. John Wiley & Sons, Inc, New York"},{"key":"9238_CR18","unstructured":"Hogg RV, Craig AT (1995) Introduction to mathematical statistics. Prentice Hall, New York"},{"key":"9238_CR19","unstructured":"Hogg RV, McKean J, Craig AT (2005) Introduction to mathematical statistics. Prentice Hall, Inc"},{"key":"9238_CR20","unstructured":"Hu S, Liu H, Su L, Wang H, Abdelzaher T (2013) SmartRoad: a mobile phone based crowd-sourced road sensing system. Technical report, University of Illinois at Urbana-Champaign, 08. https:\/\/www.ideals.illinois.edu\/handle\/2142\/45699"},{"key":"9238_CR21","doi-asserted-by":"crossref","unstructured":"Huang J-H, Amjad S, Mishra S (2005) CenWits: a sensor-based loosely coupled search and rescue system using witnesses. In: SenSys\u201905, pp 180\u2013191","DOI":"10.1145\/1098918.1098938"},{"key":"9238_CR22","doi-asserted-by":"crossref","unstructured":"Hull B et al (2006) CarTel: a distributed mobile sensor computing system. In: SenSys\u201906, pp 125\u2013138","DOI":"10.1145\/1182807.1182821"},{"key":"9238_CR23","unstructured":"Hunter T, Das T, Zaharia M, Abbeel P, Bayen AM (2012) Large scale estimation in cyberphysical systems using streaming data: a case study with smartphone traces. arXiv preprint. arXiv:1212.3393"},{"key":"9238_CR24","doi-asserted-by":"crossref","unstructured":"Kay M, Choe EK, Shepherd J, Greenstein B, Watson N, Consolvo S, Kientz JA (2012) Lullaby: a capture & access system for understanding the sleep environment. In: Proceedings of the 2012 ACM conference on ubiquitous computing, ACM, pp 226\u2013234","DOI":"10.1145\/2370216.2370253"},{"issue":"5","key":"9238_CR25","doi-asserted-by":"crossref","first-page":"604","DOI":"10.1145\/324133.324140","volume":"46","author":"JM Kleinberg","year":"1999","unstructured":"Kleinberg JM (1999) Authoritative sources in a hyperlinked environment. J ACM 46(5):604\u2013632","journal-title":"J ACM"},{"key":"9238_CR26","doi-asserted-by":"crossref","unstructured":"Koukoumidis E, Peh L-S, Martonosi M (2011) Demo: Signalguru: leveraging mobile phones for collaborative traffic signal schedule advisory. In: Proceedings of the 9th international conference on mobile systems, applications, and services, MobiSys \u201911, ACM, New York, pp 353\u2013354,","DOI":"10.1145\/1999995.2000031"},{"key":"9238_CR27","doi-asserted-by":"crossref","unstructured":"Lane ND, Miluzzo E, Eisenman SB, Musolesi M, Campbell AT (2008) Urban sensing systems: opportunistic or participatory","DOI":"10.1145\/1411759.1411763"},{"key":"9238_CR28","doi-asserted-by":"crossref","unstructured":"Lin T-H, Tarng W (1991) Scheduling periodic and aperiodic tasks in hard real-time computing systems. In: ACM SIGMETRICS performance evaluation review, vol 19. ACM, pp31\u201338","DOI":"10.1145\/107971.107976"},{"issue":"1","key":"9238_CR29","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1145\/321738.321743","volume":"20","author":"CL Liu","year":"1973","unstructured":"Liu CL, Layland JW (1973) Scheduling algorithms for multiprogramming in a hard-real-time environment. J ACM 20(1):46\u201361","journal-title":"J ACM"},{"key":"9238_CR30","doi-asserted-by":"crossref","unstructured":"Lu J, Sookoor T, Srinivasan V, Gao G, Holben B, Stankovic J, Field E, Whitehouse K (2010) The smart thermostat: using occupancy sensors to save energy in homes. In: Proceedings of the 8th ACM conference on embedded networked sensor systems, ACM, pp 211\u2013224","DOI":"10.1145\/1869983.1870005"},{"issue":"10","key":"9238_CR31","doi-asserted-by":"crossref","first-page":"635","DOI":"10.1109\/32.637146","volume":"23","author":"AK Mok","year":"1997","unstructured":"Mok AK, Chen D (1997) A multiframe model for real-time tasks. Softw Eng IEEE Trans 23(10):635\u2013645","journal-title":"Softw Eng IEEE Trans"},{"issue":"9","key":"9238_CR32","doi-asserted-by":"crossref","first-page":"820","DOI":"10.1016\/j.specom.2008.05.009","volume":"51","author":"E Monte-Moreno","year":"2009","unstructured":"Monte-Moreno E, Chetouani M, Faundez-Zanuy M, Sole-Casals J (2009) Maximum likelihood linear programming data fusion for speaker recognition. Speech Commun 51(9):820\u2013830","journal-title":"Speech Commun"},{"key":"9238_CR33","doi-asserted-by":"crossref","unstructured":"Mun M, Reddy S, Shilton K, Yau N, Burke J, Estrin D, Hansen M, Howard E, West R, Boda P (2009) Peir, the personal environmental impact report, as a platform for participatory sensing systems research. In: Proceedings of the 7th international conference on mobile systems, applications, and services, MobiSys \u201909, ACM, New York, pp 55\u201368","DOI":"10.1145\/1555816.1555823"},{"key":"9238_CR34","unstructured":"Munir S, Stankovic JA, Liang C-JM, Lin S (2013) Cyber physical system challenges for human-in-the-loop control. In: Presented as part of the 8th international workshop on feedback computing. USENIX"},{"key":"9238_CR35","doi-asserted-by":"crossref","unstructured":"Nath S (2012) Ace: exploiting correlation for energy-efficient and continuous context sensing. In: Proceedings of the tenth international conference on mobile systems, applications, and services (MobiSys\u201912)","DOI":"10.1145\/2307636.2307640"},{"issue":"10","key":"9238_CR36","doi-asserted-by":"crossref","first-page":"1102","DOI":"10.1109\/12.729793","volume":"47","author":"M Pandya","year":"1998","unstructured":"Pandya M, Malek M (1998) Minimum achievable utilization for fault-tolerant processing of periodic tasks. Comput IEEE Trans 47(10):1102\u20131112","journal-title":"Comput IEEE Trans"},{"issue":"1","key":"9238_CR37","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1016\/0164-1212(95)00105-0","volume":"33","author":"D-W Park","year":"1996","unstructured":"Park D-W, Natarajan S, Kanevsky A (1996) Fixed-priority scheduling of real-time systems using utilization bounds. J Syst Softw 33(1):57\u201363","journal-title":"J Syst Softw"},{"key":"9238_CR38","unstructured":"Pasternack J, Roth D (2010) Knowing what to believe (when you already know something). In: International conference on computational linguistics (COLING)"},{"key":"9238_CR39","doi-asserted-by":"crossref","unstructured":"Pham N, Ganti RK, Uddin YS, Nath S, Abdelzaher T (2010) Privacy-preserving reconstruction of multidimensional data maps in vehicular participatory sensing","DOI":"10.1007\/978-3-642-11917-0_8"},{"key":"9238_CR40","doi-asserted-by":"crossref","unstructured":"Proietti T, Alessandra L (2012) Maximum likelihood estimation of time series models: the Kalman filter and beyond. MPRA paper, University Library of Munich, Munich","DOI":"10.4337\/9780857931023.00022"},{"key":"9238_CR41","doi-asserted-by":"crossref","unstructured":"Qi G-J, Aggarwal CC, Han J, Huang T (2013) Mining collective intelligence in diverse groups. In: Proceedings of the 22nd international conference on world wide web, International World Wide Web Conferences Steering Committee, pp 1041\u20131052","DOI":"10.1145\/2488388.2488479"},{"key":"9238_CR42","doi-asserted-by":"crossref","unstructured":"Rachuri KK, Mascolo C, Musolesi M, Rentfrow PJ (2011) Sociablesense: exploring the trade-offs of adaptive sampling and computation offloading for social sensing. In: Proceedings of the 17th annual international conference on mobile computing and networking, MobiCom \u201911, ACM, New York, pp 73\u201384","DOI":"10.1145\/2030613.2030623"},{"key":"9238_CR43","doi-asserted-by":"crossref","unstructured":"Rajkumar RR, Lee I, Sha L, Stankovic J (2010) Cyber-physical systems: the next computing revolution. In: Proceedings of the 47th design automation conference, ACM, pp 731\u2013736","DOI":"10.1145\/1837274.1837461"},{"issue":"2","key":"9238_CR44","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1145\/2000367.2000374","volume":"8","author":"N Saeedloei","year":"2011","unstructured":"Saeedloei N, Gupta G (2011) A logic-based modeling and verification of CPS. ACM SIGBED Rev 8(2):31\u201334","journal-title":"ACM SIGBED Rev"},{"key":"9238_CR45","doi-asserted-by":"crossref","unstructured":"Scaglione A, Servetto SD (2002) On the interdependence of routing and data compression in multi-hop sensor networks. In: Proceedings of the 8th annual international conference on mobile computing and networking, MobiCom \u201902, ACM, New York, pp 140\u2013147","DOI":"10.1145\/570645.570663"},{"issue":"1","key":"9238_CR46","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/MC.2013.31","volume":"46","author":"G Schirner","year":"2013","unstructured":"Schirner G, Erdogmus D, Chowdhury K, Padir T (2013) The future of human-in-the-loop cyber-physical systems. Computer 46(1):36\u201345","journal-title":"Computer"},{"issue":"2\u20133","key":"9238_CR47","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1023\/B:TIME.0000045315.61234.1e","volume":"28","author":"L Sha","year":"2004","unstructured":"Sha L, Abdelzaher T, \u00c5rz\u00e9n K-E, Cervin A, Baker T, Burns A, Buttazzo G, Caccamo M, Lehoczky J, Mok AK (2004) Real time scheduling theory: a historical perspective. Real-time Syst 28(2\u20133):101\u2013155","journal-title":"Real-time Syst"},{"key":"9238_CR48","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/978-0-387-88735-7_1","volume-title":"Machine learning in cyber trust","author":"L Sha","year":"2009","unstructured":"Sha L, Gopalakrishnan S, Liu X, Wang Q (2009) Cyber-physical systems: a new frontier. In: Tsai JJP, Yu PS (eds) Machine learning in cyber trust. Springer, Berlin, pp 3\u201313"},{"issue":"1","key":"9238_CR49","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/BF02341920","volume":"1","author":"B Sprunt","year":"1989","unstructured":"Sprunt B, Sha L, Lehoczky J (1989) Aperiodic task scheduling for hard-real-time systems. Real-Time Syst 1(1):27\u201360","journal-title":"Real-Time Syst"},{"issue":"1","key":"9238_CR50","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1109\/12.368008","volume":"44","author":"JK Strosnider","year":"1995","unstructured":"Strosnider JK, Lehoczky JP, Sha L (1995) The deferrable server algorithm for enhanced aperiodic responsiveness in hard real-time environments. Comput IEEE Trans 44(1):73\u201391","journal-title":"Comput IEEE Trans"},{"key":"9238_CR51","doi-asserted-by":"crossref","unstructured":"Tang LA, Gu Q, Yu X, Han J, La Porta TF, Leung A, Abdelzaher TF, Kaplan LM (2012) Intrumine: mining intruders in untrustworthy data of cyber-physical systems. In: SDM, SIAM, pp 600\u2013611","DOI":"10.1137\/1.9781611972825.52"},{"key":"9238_CR52","doi-asserted-by":"crossref","unstructured":"Uddin MYS, Wang H, Saremi F, Qi G-J, Abdelzaher T, Huang T (2011) Photonet: a similarity-aware picture delivery service for situation awareness. In: Proceedings of the 2011 IEEE 32nd real-time systems symposium, RTSS \u201911, IEEE Computer Society, Washington, DC, pp 317\u2013326","DOI":"10.1109\/RTSS.2011.36"},{"key":"9238_CR53","doi-asserted-by":"crossref","unstructured":"Wang D, Abdelzaher T, Kaplan L, Aggarwal CC (2013) Recursive fact-finding: a streaming approach to truth estimation in crowdsourcing applications. In: The 33rd international conference on distributed computing systems (ICDCS\u201913)","DOI":"10.1109\/ICDCS.2013.54"},{"key":"9238_CR54","doi-asserted-by":"crossref","unstructured":"Wang D, Abdelzaher T, Kaplan L (2015) Social sensing: building reliable systems on unreliable data. Morgan Kaufmann","DOI":"10.1016\/B978-0-12-800867-6.00005-4"},{"key":"9238_CR55","doi-asserted-by":"crossref","unstructured":"Wang D, Abdelzaher T, Kaplan L, Ganti R, Hu S, Liu H (2013) Exploitation of physical constraints for reliable social sensing. In: The IEEE 34th real-time systems symposium (RTSS\u201913)","DOI":"10.1109\/RTSS.2013.29"},{"key":"9238_CR56","doi-asserted-by":"crossref","unstructured":"Wang D, Amin T, Li S, Abdelzaher T, Kaplan L, Gu S, Pan C, Liu H, Aggrawal C, Ganti R, Wang X, Mohapatra P, Szymanski B, Le H (2014) Humans as sensors: an estimation theoretic perspective. In: The 13th ACM\/IEEE international conference on information processing in sensor networks (IPSN 14)","DOI":"10.1109\/IPSN.2014.6846739"},{"key":"9238_CR57","doi-asserted-by":"crossref","unstructured":"Wang D, Huang C (2015) Confidence-aware truth estimation in social sensing applications. In: The 12th annual IEEE international conference on sensing, communication, and networking","DOI":"10.1109\/SAHCN.2015.7338333"},{"key":"9238_CR58","doi-asserted-by":"crossref","unstructured":"Wang D, Kaplan L, Abdelzaher T, Aggarwal CC (2012) On scalability and robustness limitations of real and asymptotic confidence bounds in social sensing. In: The 9th annual IEEE communications society conference on sensor, mesh and ad hoc communications and networks (SECON 12)","DOI":"10.1109\/SECON.2012.6275819"},{"key":"9238_CR59","doi-asserted-by":"crossref","unstructured":"Wang D, Kaplan L, Le H, Abdelzaher T (2012) On truth discovery in social sensing: a maximum likelihood estimation approach. In: The 11th ACM\/IEEE conference on information processing in sensor networks (IPSN 12)","DOI":"10.1109\/IPSN.2012.6920960"},{"issue":"6","key":"9238_CR60","doi-asserted-by":"crossref","first-page":"1026","DOI":"10.1109\/JSAC.2013.130605","volume":"31","author":"D Wang","year":"2013","unstructured":"Wang D, Kaplan LM, Abdelzaher TF, Aggarwal CC (2013) On credibility estimation tradeoffs in assured social sensing. IEEE J Sel Areas Commun 31(6):1026\u20131037","journal-title":"IEEE J Sel Areas Commun"},{"issue":"2","key":"9238_CR61","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1145\/2530289","volume":"10","author":"D Wang","year":"2014","unstructured":"Wang D, Kaplan L, Abdelzaher TF (2014) Maximum likelihood analysis of conflicting observations in social sensing. ACM Transactions on Sensor Networks (TOSN) 10(2):30","journal-title":"ACM Transactions on Sensor Networks (TOSN)"},{"key":"9238_CR62","doi-asserted-by":"crossref","unstructured":"Wang S, Wang D, Su L, Kaplan L, Abdelzaher TF (2014) Towards cyber-physical systems in social spaces: the data reliability challenge. In: Real-time systems symposium (RTSS), 2014 IEEE, IEEE, pp 74\u201385","DOI":"10.1109\/RTSS.2014.19"},{"key":"9238_CR63","doi-asserted-by":"crossref","DOI":"10.1093\/acprof:oso\/9780195388855.001.0001","volume-title":"Brain-computer interfaces: principles and practice","author":"J Wolpaw","year":"2012","unstructured":"Wolpaw J, Wolpaw EW (2012) Brain-computer interfaces: principles and practice. Oxford University Press, Oxford"},{"issue":"1","key":"9238_CR64","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1214\/aos\/1176346060","volume":"11","author":"CFJ Wu","year":"1983","unstructured":"Wu CFJ (1983) On the convergence properties of the EM algorithm. Ann Stat 11(1):95\u2013103","journal-title":"Ann Stat"},{"key":"9238_CR65","unstructured":"Xu Y, chien Lee W (2006) Exploring spatial correlation for link quality estimation in wireless sensor networks. In: Proceedings IEEE PerCom, pp 200\u2013211"},{"key":"9238_CR66","doi-asserted-by":"crossref","first-page":"796","DOI":"10.1109\/TKDE.2007.190745","volume":"20","author":"X Yin","year":"2008","unstructured":"Yin X, Han J, Yu PS (2008) Truth discovery with multiple conflicting information providers on the web. IEEE Trans Knowl Data Eng 20:796\u2013808","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"6","key":"9238_CR67","doi-asserted-by":"crossref","first-page":"550","DOI":"10.14778\/2168651.2168656","volume":"5","author":"B Zhao","year":"2012","unstructured":"Zhao B, Rubinstein BIP, Gemmell J, Han J (2012) A bayesian approach to discovering truth from conflicting sources for data integration. Proc VLDB Endow 5(6):550\u2013561","journal-title":"Proc VLDB Endow"},{"key":"9238_CR68","doi-asserted-by":"crossref","unstructured":"Zhou P, Zheng Y, Li M (2012) How long to wait? Predicting bus arrival time with mobile phone based participatory sensing. In: Proceedings of the 10th international conference on mobile systems, applications, and services, MobiSys \u201912, ACM, New York, pp 379\u2013392","DOI":"10.1145\/2307636.2307671"}],"container-title":["Real-Time Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11241-015-9238-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11241-015-9238-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11241-015-9238-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,10]],"date-time":"2024-06-10T16:35:12Z","timestamp":1718037312000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11241-015-9238-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,20]]},"references-count":68,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2015,11]]}},"alternative-id":["9238"],"URL":"https:\/\/doi.org\/10.1007\/s11241-015-9238-8","relation":{},"ISSN":["0922-6443","1573-1383"],"issn-type":[{"value":"0922-6443","type":"print"},{"value":"1573-1383","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,8,20]]}}}