{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T19:53:44Z","timestamp":1730231624649,"version":"3.28.0"},"reference-count":41,"publisher":"IEEE","license":[{"start":{"date-parts":[[2005,1,1]],"date-time":"2005-01-01T00:00:00Z","timestamp":1104537600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2005,1,1]],"date-time":"2005-01-01T00:00:00Z","timestamp":1104537600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1109\/icbn.2005.1589698","type":"proceedings-article","created":{"date-parts":[[2006,2,15]],"date-time":"2006-02-15T19:29:31Z","timestamp":1140031771000},"page":"876-885 Vol. 2","source":"Crossref","is-referenced-by-count":23,"title":["Network selection using fuzzy logic"],"prefix":"10.1109","author":[{"given":"S.","family":"Kher","sequence":"first","affiliation":[{"name":"Dept. of Electr. & Comput. Eng., Iowa State Univ., Ames, IA, USA"}]},{"given":"A.K.","family":"Somani","sequence":"additional","affiliation":[{"name":"Dept. of Electr. & Comput. Eng., Iowa State Univ., Ames, IA, USA"}]},{"given":"R.","family":"Gupta","sequence":"additional","affiliation":[{"name":"Dept. of Electr. & Comput. Eng., Iowa State Univ., Ames, IA, USA"}]}],"member":"263","reference":[{"key":"19","article-title":"Data-Driven Modelling: Paradigm, methods, experiences","author":"solomatine","year":"2002","journal-title":"Proc of 5th international conference on hydroinformatics Cardiff UK"},{"doi-asserted-by":"publisher","key":"35","DOI":"10.1016\/S0169-7552(98)00110-X"},{"year":"0","key":"17"},{"doi-asserted-by":"publisher","key":"36","DOI":"10.1145\/324133.324140"},{"doi-asserted-by":"publisher","key":"18","DOI":"10.1017\/CBO9780511606076"},{"year":"1988","author":"david","journal-title":"The Method of Paired Comparisons","key":"33"},{"year":"1963","author":"arrow","journal-title":"Social Choice and Individual Values","key":"15"},{"doi-asserted-by":"publisher","key":"34","DOI":"10.1007\/978-3-642-60805-6"},{"year":"1970","author":"sen","journal-title":"Individual Choice and Social Welfare","key":"16"},{"doi-asserted-by":"publisher","key":"39","DOI":"10.1109\/FUZZY.1992.258721"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1016\/0306-4573(76)90048-0"},{"year":"1978","author":"elo","journal-title":"The Rating of Chess Players Past and Prsent","key":"14"},{"year":"1999","author":"page","article-title":"The PageRank citation rankings: Bringing order to the web","key":"37"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1109\/INFCOM.2003.1208963"},{"key":"38","article-title":"Hypersearching the web","author":"chakrabarti","year":"1999","journal-title":"Scientific American"},{"key":"12","article-title":"Evolving and Managing Trust in Grid Computing Systems","author":"farag","year":"2002","journal-title":"Proc 2002 IEEE Canadian Conf Electrical and Computer Engineering"},{"year":"1952","author":"wei","journal-title":"The algebraic foundation of ranking theory","key":"21"},{"year":"0","key":"20"},{"doi-asserted-by":"publisher","key":"41","DOI":"10.1518\/hfes.45.1.117.27228"},{"year":"1997","author":"jang","journal-title":"Neuro-Fuzzy and Soft Computing","key":"40"},{"doi-asserted-by":"publisher","key":"22","DOI":"10.2307\/3001479"},{"doi-asserted-by":"publisher","key":"23","DOI":"10.1093\/biomet\/56.2.295"},{"year":"1968","author":"moon","journal-title":"Topics on Tournaments","key":"24"},{"doi-asserted-by":"publisher","key":"25","DOI":"10.1137\/0606009"},{"doi-asserted-by":"publisher","key":"26","DOI":"10.1137\/1035004"},{"year":"1995","author":"lechenkov","journal-title":"Self-consistent rule for group choice Axiomatic approach","key":"27"},{"key":"28","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1016\/S0378-8733(00)00019-8","article-title":"Measuring domination in directed networks","volume":"22","author":"den brink","year":"2000","journal-title":"Social Networks"},{"year":"2001","author":"herings","journal-title":"Measuring the power of nodes indigraphs","key":"29"},{"year":"0","journal-title":"Seti home","key":"3"},{"year":"0","journal-title":"Gnutella","key":"2"},{"year":"0","key":"10"},{"year":"0","journal-title":"Napster","key":"1"},{"year":"2002","author":"palacios-huerta","journal-title":"The measurement of intellectual influence","key":"30"},{"key":"7","article-title":"EigenRep: Reputation Management in P2P Networks","author":"kamvar","year":"2003","journal-title":"Proc ACM Int Conf World Wide Web"},{"year":"2004","author":"foster","journal-title":"The Grid Blueprint for a New Computing Infrastructure","key":"6"},{"doi-asserted-by":"publisher","key":"32","DOI":"10.1093\/biomet\/74.2.432"},{"year":"0","key":"5"},{"doi-asserted-by":"publisher","key":"31","DOI":"10.1017\/S0956792500004150"},{"year":"0","key":"4"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1007\/BF03160228"},{"year":"0","key":"8"}],"event":{"name":"2005 2nd International Conference on Broadband Networks (Broadnets)","start":{"date-parts":[[2005,10,7]]},"location":"Boston, MA, USA","end":{"date-parts":[[2005,10,7]]}},"container-title":["2nd International Conference on Broadband Networks, 2005."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10596\/33500\/01589698.pdf?arnumber=1589698","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,8]],"date-time":"2024-03-08T18:43:42Z","timestamp":1709923422000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/1589698\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/icbn.2005.1589698","relation":{},"subject":[],"published":{"date-parts":[[2005]]}}}