{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T18:16:51Z","timestamp":1761157011640,"version":"3.28.0"},"reference-count":37,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1109\/iscc50000.2020.9219548","type":"proceedings-article","created":{"date-parts":[[2020,10,12]],"date-time":"2020-10-12T21:03:51Z","timestamp":1602536631000},"page":"1-6","source":"Crossref","is-referenced-by-count":9,"title":["A Continuous Data Imputation Mechanism based on Streams Correlation"],"prefix":"10.1109","author":[{"given":"Panagiotis","family":"Fountas","sequence":"first","affiliation":[]},{"given":"Kostas","family":"Kolomvatsos","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btr597"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/2935248"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3140649.3140656"},{"key":"ref30","article-title":"A Comparison of Six Methods for Missing Data Imputation","volume":"6","author":"schmitt","year":"2015","journal-title":"Journal of Biometrics &amp; Biostatistics"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICICTA.2014.83"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2017.11.002"},{"key":"ref35","doi-asserted-by":"crossref","DOI":"10.1186\/1471-2105-7-32","article-title":"Missing value estimation for DNA microarray gene Expression data by support vector regression imputation and orthogonal coding scheme","volume":"7","author":"wang","year":"2006","journal-title":"BMC Bioinformatics"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/17.6.520"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2793350"},{"key":"ref11","article-title":"Missing Values in data Analysis: Ignore or Impute?","volume":"3","author":"guan","year":"2011","journal-title":"EMJ"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2015.12"},{"journal-title":"Data Mining Concepts and Techniques","year":"2012","author":"han","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/EDGE.2018.00020"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1161\/CIRCOUTCOMES.109.875658"},{"key":"ref16","first-page":"1","article-title":"Amelia II: A program for missing data","volume":"45","author":"honaker","year":"2011","journal-title":"JSS"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75444-2_14"},{"key":"ref18","first-page":"1443","article-title":"An IoT-Oriented Data Storage Framework in Cloud Computing Platform","volume":"10","author":"jiang","year":"2015","journal-title":"IEEE TII"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2105-5-160"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid.2012.100"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2619369"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CIHSPS.2005.1500609"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.18637\/jss.v045.i03"},{"key":"ref6","article-title":"Self organization in ad hoc sensor networks: An empirical study","author":"catterall","year":"2002","journal-title":"8th ICSSL"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2721914.2721921"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/0893-6080(91)90056-B"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/GIOTS.2017.8016213"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TMEE.2011.6199284"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1093\/nar\/gnh026"},{"key":"ref9","first-page":"731","article-title":"Distributing Computing in the Internet of Things: Cloud, Fog and Edge Computing Overview","author":"escamilla-ambrosio","year":"2018","journal-title":"Studies in Computational Intelligence"},{"key":"ref1","first-page":"1","article-title":"From Predictive Methods to Missing Data Imputation: An Optimization Approach","volume":"18","author":"bertsimas","year":"2018","journal-title":"JMLR"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/FISTS.2016.7552320"},{"journal-title":"Statistical Analysis with Missing Data","year":"1987","author":"little","key":"ref22"},{"key":"ref21","article-title":"A spatial-temporal imputation technique for classification with missing data in a wireless sensor network","author":"li","year":"2008","journal-title":"ICIRS"},{"key":"ref24","article-title":"Bayesian exponential family PCA","author":"mohamed","year":"2009","journal-title":"ANIPS"},{"key":"ref23","first-page":"2287","article-title":"Spectral regularization algorithms for learning large incomplete matrices","volume":"11","author":"mazumder","year":"2010","journal-title":"JMLR"},{"key":"ref26","first-page":"85","article-title":"A multivariate technique for multiply imputing missing values using a sequence of regression models","volume":"27","author":"raghunathan","year":"2001","journal-title":"Survey Methodology"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btg287"}],"event":{"name":"2020 IEEE Symposium on Computers and Communications (ISCC)","start":{"date-parts":[[2020,7,7]]},"location":"Rennes, France","end":{"date-parts":[[2020,7,10]]}},"container-title":["2020 IEEE Symposium on Computers and Communications (ISCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9213178\/9219543\/09219548.pdf?arnumber=9219548","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,23]],"date-time":"2022-11-23T01:47:11Z","timestamp":1669168031000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9219548\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/iscc50000.2020.9219548","relation":{},"subject":[],"published":{"date-parts":[[2020,7]]}}}