{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:03:55Z","timestamp":1729616635354,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/iwcmc.2013.6583768","type":"proceedings-article","created":{"date-parts":[[2013,8,29]],"date-time":"2013-08-29T15:31:30Z","timestamp":1377790290000},"page":"1442-1447","source":"Crossref","is-referenced-by-count":0,"title":["Consistency analysis of sensor data distribution"],"prefix":"10.1109","author":[{"given":"Gianluca","family":"Reali","sequence":"first","affiliation":[]},{"given":"Mauro","family":"Femminella","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","article-title":"Constrained application protocol (CoAP)","author":"shelby","year":"2012","journal-title":"Draft-ietf-core-coap-13 IETF Draft"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2011.6085639"},{"key":"13","article-title":"How and how not to compute the exponential of a matrix","author":"higham","year":"2010","journal-title":"Keynote Speech at Numerical Algorithms Group Technical Event"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1080\/15326349308807278"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS.2010.67"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2012.6212024"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2011.093011.110851"},{"key":"2","doi-asserted-by":"crossref","DOI":"10.1145\/316188.316202","article-title":"A model, analysis, and protocol framework for soft state-based communication","author":"raman","year":"1999","journal-title":"SIGCOMM'99"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.892849"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2009.168"},{"key":"7","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1007\/978-1-4757-4828-4_3","article-title":"Transient solutions for markov chains","author":"de souza","year":"2000","journal-title":"Chapter 3 in Computational Probability"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23217-6_10"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1080\/15326348708807067"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/LANMAN.2013.6528285"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1098\/rspa.1955.0198"},{"key":"8","article-title":"Syste?mes semi-Markoviens a? au plus une infinite? de?nombrable d'e?tats","volume":"2","author":"le?vy","year":"1954","journal-title":"Proc Int Congr Math"}],"event":{"name":"2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC 2013)","start":{"date-parts":[[2013,7,1]]},"location":"Sardinia, Italy","end":{"date-parts":[[2013,7,5]]}},"container-title":["2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6578011\/6583517\/06583768.pdf?arnumber=6583768","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T16:58:31Z","timestamp":1498064311000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6583768\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/iwcmc.2013.6583768","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}