{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T09:56:25Z","timestamp":1729677385606,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/cnsm.2013.6727832","type":"proceedings-article","created":{"date-parts":[[2014,1,31]],"date-time":"2014-01-31T23:39:14Z","timestamp":1391211554000},"page":"175-179","source":"Crossref","is-referenced-by-count":1,"title":["Assessment and event based analysis of dynamic wireless networks"],"prefix":"10.1109","author":[{"given":"Denis","family":"Carvin","sequence":"first","affiliation":[]},{"given":"Guillaume","family":"Kremer","sequence":"additional","affiliation":[]},{"given":"Philippe","family":"Owezarski","sequence":"additional","affiliation":[]},{"given":"Pascal","family":"Berthou","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"3"},{"key":"2","article-title":"Substitution networks based on software defined networking","volume":"111","year":"2013","journal-title":"Ad Hoc Networks Ser Lecture Notes of the Institute for Computer Sciences Social Informatics and Telecommunications Engineering"},{"journal-title":"White Paper","article-title":"Cisco visual networking index global mobile data traffic forecast update, 2012-2017","year":"2013","key":"1"},{"key":"10","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/j.jpdc.2006.08.010","article-title":"Distributed average consensus with least-mean-square deviation","volume":"67","author":"xiao","year":"2005","journal-title":"Journal of Parallel and Distributed Computing"},{"journal-title":"Data Mining and Coordination to Avoid Interference in Wireless Networks","year":"0","author":"rengarajan","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1052812.1052823"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2012.01.016"},{"journal-title":"Data Mining for Network Intrusion Detection How to get started","year":"2001","author":"bloedorn","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2012.2215603"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6178833"}],"event":{"name":"2013 9th International Conference on Network and Service Management (CNSM)","start":{"date-parts":[[2013,10,14]]},"location":"Zurich, Switzerland","end":{"date-parts":[[2013,10,18]]}},"container-title":["Proceedings of the 9th International Conference on Network and Service Management (CNSM 2013)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6713382\/6727796\/06727832.pdf?arnumber=6727832","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T07:06:02Z","timestamp":1498115162000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6727832\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/cnsm.2013.6727832","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}