{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T05:46:36Z","timestamp":1777527996536,"version":"3.51.4"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1109\/icumt.2016.7765398","type":"proceedings-article","created":{"date-parts":[[2016,12,5]],"date-time":"2016-12-05T21:54:34Z","timestamp":1480974874000},"page":"432-437","source":"Crossref","is-referenced-by-count":5,"title":["Wireless crowdsourced performance monitoring and verification: WiFi performance measurement using end-user mobile device feedback"],"prefix":"10.1109","author":[{"given":"Vasileios","family":"Kokkinos","sequence":"first","affiliation":[]},{"given":"Kostas","family":"Stamos","sequence":"additional","affiliation":[]},{"given":"Nikolaos","family":"Kanakis","sequence":"additional","affiliation":[]},{"given":"Kurt","family":"Baumann","sequence":"additional","affiliation":[]},{"given":"Anna","family":"Wilson","sequence":"additional","affiliation":[]},{"given":"James","family":"Healy","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","article-title":"Google Code Archive","year":"2016"},{"key":"ref3","article-title":"SOASTA\/boomerang","year":"2016"},{"key":"ref10","article-title":"Hibernate. Everything data","year":"2016"},{"key":"ref6","article-title":"Beautiful metric & analytic dashboards","year":"2016"},{"key":"ref11","article-title":"Common Remote Authentication Dial In User Service (RADIUS) Implementation Issues and Suggested Fixes","author":"nelson","year":"2016"},{"key":"ref5","article-title":"Radius Authentication Dial In User Service (RADIUS)","author":"ringney","year":"2016","journal-title":"IETF RFC2138 June 2000"},{"key":"ref12","article-title":"SO MANY APPS, SO MUCH MORE TIME FOR ENTERTAINMENT","year":"2016"},{"key":"ref8","article-title":"influxDB","year":"2016"},{"key":"ref7","article-title":"EAP Tunneled TLS Authentication Protocol","author":"funk","year":"2004"},{"key":"ref2","article-title":"Definiton of Reference Data","year":"2016"},{"key":"ref9","article-title":"Building an Application with Spring Boot","year":"2016"},{"key":"ref1","article-title":"How to deploy eduroam on-site or on campus","year":"2016"}],"event":{"name":"2016 8th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","location":"Lisbon, Portugal","start":{"date-parts":[[2016,10,18]]},"end":{"date-parts":[[2016,10,20]]}},"container-title":["2016 8th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7761914\/7765220\/07765398.pdf?arnumber=7765398","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,1,5]],"date-time":"2017-01-05T13:10:59Z","timestamp":1483621859000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7765398\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/icumt.2016.7765398","relation":{},"subject":[],"published":{"date-parts":[[2016,10]]}}}