{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T18:36:45Z","timestamp":1729622205542,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,3]]},"DOI":"10.1109\/infcom.2012.6195826","type":"proceedings-article","created":{"date-parts":[[2012,5,24]],"date-time":"2012-05-24T22:26:40Z","timestamp":1337898400000},"page":"792-800","source":"Crossref","is-referenced-by-count":22,"title":["Sherlock is around: Detecting network failures with local evidence fusion"],"prefix":"10.1109","author":[{"given":"Qiang","family":"Ma","sequence":"first","affiliation":[]},{"given":"Kebin","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Miao","sequence":"additional","affiliation":[]},{"given":"Yunhao","family":"Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS.2010.29"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1098918.1098946"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/34.55104"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934945"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-9236(99)00084-6"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2009.2037497"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1859995.1860030"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934944"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2010.5762754"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/958492.958494"},{"key":"20","first-page":"1","article-title":"Multicast performance with hierarchical cooperation","volume":"20","author":"wang","year":"2011","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2008.55"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031498"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0255(87)90007-7"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/1322263.1322282"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69170-9_6"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1460412.1460422"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935040"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.2008000"},{"journal-title":"An Introduction to Bayesian and Dempster-Shafer Data Fusion","year":"2003","author":"koks","key":"7"},{"key":"6","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1016\/S1566-2535(02)00076-3","article-title":"Are alternatives to dempster's rule of combination alternatives? comments on \"about the belief combination and the conflict management problem","volume":"3","author":"haenni","year":"2002","journal-title":"Int J Inform Fusion"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1644038.1644064"},{"key":"4","article-title":"Emstar: A software environment for developing and deploying wireless sensor networks","author":"girod","year":"0","journal-title":"Proceedings of the USENIX Annual Technical Conference Boston MA 2004"},{"key":"9","article-title":"A generic framework for resolving the conflict in the combination of belief structures","author":"lefevre","year":"0","journal-title":"Proc 3rd Int Conf Information Fusion Paris France 2000"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2005.1605894"}],"event":{"name":"IEEE INFOCOM 2012 - IEEE Conference on Computer Communications","start":{"date-parts":[[2012,3,25]]},"location":"Orlando, FL, USA","end":{"date-parts":[[2012,3,30]]}},"container-title":["2012 Proceedings IEEE INFOCOM"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6189419\/6195452\/06195826.pdf?arnumber=6195826","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T19:14:10Z","timestamp":1497986050000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6195826\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,3]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/infcom.2012.6195826","relation":{},"subject":[],"published":{"date-parts":[[2012,3]]}}}