{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,5]],"date-time":"2025-06-05T17:44:52Z","timestamp":1749145492318},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/iotsms.2018.8554663","type":"proceedings-article","created":{"date-parts":[[2018,12,4]],"date-time":"2018-12-04T00:54:17Z","timestamp":1543884857000},"page":"208-215","source":"Crossref","is-referenced-by-count":7,"title":["A Two-Tier Edge Computing Based Model for Advanced Traffic Detection"],"prefix":"10.1109","author":[{"given":"Abbas","family":"Kiani","sequence":"first","affiliation":[]},{"given":"Guanxiong","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Hang","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Abdallah","family":"Khreishah","sequence":"additional","affiliation":[]},{"given":"Nirwan","family":"Ansari","sequence":"additional","affiliation":[]},{"given":"Jo Young","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Chengjun","family":"Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/MC.2016.145"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/MC.2017.9"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1145\/2462456.2464440"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/ICPR.2004.1333992"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/ICCV.2003.1238315"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/CVPR.1999.784637"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/CVPR.2000.854767"},{"year":"2003","author":"webb","journal-title":"Statistical Pattern Recognition","key":"ref17"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1016\/j.patrec.2005.11.005"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/JIOT.2016.2584538"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/MPRV.2009.82"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/JSAC.2016.2545384"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/SCCC.2016.7836028"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/LCOMM.2017.2764904"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/JIOT.2017.2750030"},{"key":"ref2","first-page":"13","article-title":"Connected vehicles, the internet of things, and fog computing","author":"bonomi","year":"2011","journal-title":"The Eighth ACM International Workshop on Vehicular Inter-Networking (VANET) Las Vegas USA"},{"year":"0","article-title":"China's CCTV surveillance network took just 7 minutes to capture bbc reporter","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/JIOT.2016.2579198"}],"event":{"name":"2018 Fifth International Conference on Internet of Things: Systems, Management and Security (IoTSMS)","start":{"date-parts":[[2018,10,15]]},"location":"Valencia","end":{"date-parts":[[2018,10,18]]}},"container-title":["2018 Fifth International Conference on Internet of Things: Systems, Management and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8537438\/8554379\/08554663.pdf?arnumber=8554663","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,15]],"date-time":"2019-01-15T10:00:54Z","timestamp":1547546454000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8554663\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/iotsms.2018.8554663","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}