{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T20:03:46Z","timestamp":1729627426067,"version":"3.28.0"},"reference-count":36,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,10]]},"DOI":"10.1109\/icumt.2010.5676484","type":"proceedings-article","created":{"date-parts":[[2011,1,3]],"date-time":"2011-01-03T20:50:24Z","timestamp":1294087824000},"page":"924-928","source":"Crossref","is-referenced-by-count":0,"title":["Configuration of alarm wireless sensor element"],"prefix":"10.1109","author":[{"given":"Mark Sh.","family":"Levin","sequence":"first","affiliation":[]},{"given":"Alexander V.","family":"Fimin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s10799-007-0025-7"},{"article-title":"Introduction to Knowledge Systems","year":"1995","author":"stefik","key":"ref32"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2006.871588"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1002\/047011276X"},{"article-title":"Discovery Invention, Research Through the Morphological Approach","year":"1969","author":"zwicky","key":"ref36"},{"article-title":"Network-Aware Wireless Sensor Management","year":"2007","author":"zadorozhny","key":"ref35"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/64.585104"},{"article-title":"Protocols and Architecture for Wireless Sensor Networks","year":"2007","author":"karl","key":"ref10"},{"key":"ref11","article-title":"Particle swarm optimization in wireless-sensor networks: A brief survey","author":"kulkarni","year":"2010","journal-title":"IEEE Trans on SMC Part C"},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-5831-6","article-title":"Combinatorial Engineering of Decomposable Systems","author":"levin","year":"1998"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2004.840065"},{"article-title":"Composite Systems Decisions","year":"2006","author":"levin","key":"ref14"},{"key":"ref15","first-page":"475","author":"levin","year":"2006","journal-title":"18th Int Conf on Design Theory and Methodology DTM2006"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1134\/S0005117909030187"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2009.5195785"},{"article-title":"Fragments of Objects Set Stratification Technology","year":"1988","author":"levin","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1002\/047168659X.ch2"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1287\/opre.6.1.1"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1002\/mcda.4020010107"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1115\/1.1315299"},{"article-title":"Synthesis of structures for special tools of machine graphics","year":"1991","author":"artamonov","key":"ref3"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1007\/s00163-002-0025-x","article-title":"The A-design approach to managing automated design synthesis","volume":"14","author":"campbell","year":"2003","journal-title":"Res in Eng Des"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2003.10.001"},{"article-title":"Wireless Sensor Networks","year":"2005","author":"bulusu","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2004.93"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"585","DOI":"10.15388\/Informatica.2007.195","article-title":"Reusing ontological knowledge about business processes in IS engineering: process configuration problem","volume":"18","author":"ciuksys","year":"2007","journal-title":"Informatica"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.10.002"},{"article-title":"Computers and Intractability. The Guide to the Theory of NP-Completeness","year":"1979","author":"garey","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(01)00302-4"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(82)90021-2"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/333580.333581"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2007.1009"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2005.844157"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/S0016-0032(01)00026-6"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/5254.708432"},{"key":"ref25","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-2500-1","article-title":"Multicriteria Methodology for Decision Aiding","author":"roy","year":"1996"}],"event":{"name":"2010 International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT 2010)","start":{"date-parts":[[2010,10,18]]},"location":"Moscow, Russia","end":{"date-parts":[[2010,10,20]]}},"container-title":["International Congress on Ultra Modern Telecommunications and Control Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5655222\/5676472\/05676484.pdf?arnumber=5676484","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,15]],"date-time":"2020-06-15T06:12:52Z","timestamp":1592201572000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5676484\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/icumt.2010.5676484","relation":{},"subject":[],"published":{"date-parts":[[2010,10]]}}}