{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T20:49:41Z","timestamp":1729630181566,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,5]]},"DOI":"10.1109\/iscas.2009.5118299","type":"proceedings-article","created":{"date-parts":[[2009,7,1]],"date-time":"2009-07-01T10:59:27Z","timestamp":1246445967000},"page":"2461-2464","source":"Crossref","is-referenced-by-count":0,"title":["Multiple-access interference constrained source extraction in wireless sensor networks"],"prefix":"10.1109","author":[{"given":"Hong-bin","family":"Chen","sequence":"first","affiliation":[]},{"given":"Jiu-chao","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Chi K.","family":"Tse","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2004.832723"},{"year":"0","key":"17"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/TBME.2004.828048"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2004.830118"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.7.1483"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2007.895378"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.070208"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2008.924639"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2004.830899"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1024422"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2008.922023"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2006.888671"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2007.906762"},{"key":"7","doi-asserted-by":"crossref","first-page":"947","DOI":"10.1109\/TCSII.2008.924373","article-title":"source extraction in bandwidth constrained wireless sensor networks","volume":"55","author":"chen","year":"2008","journal-title":"IEEE Trans Circ Syst II"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.855580"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.843545"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.847692"},{"key":"9","doi-asserted-by":"crossref","first-page":"4683","DOI":"10.1109\/TSP.2007.896019","article-title":"estimation diversity and energy efficiency in distributed sensing","volume":"55","author":"cui","year":"2007","journal-title":"IEEE Trans Signal Process"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2005.861898"}],"event":{"name":"2009 IEEE International Symposium on Circuits and Systems - ISCAS 2009","start":{"date-parts":[[2009,5,24]]},"location":"Taipei, Taiwan","end":{"date-parts":[[2009,5,27]]}},"container-title":["2009 IEEE International Symposium on Circuits and Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5076158\/5117665\/05118299.pdf?arnumber=5118299","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T17:29:01Z","timestamp":1497806941000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5118299\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,5]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/iscas.2009.5118299","relation":{},"subject":[],"published":{"date-parts":[[2009,5]]}}}