{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T19:15:07Z","timestamp":1729624507031,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1109\/lcn.2014.6925771","type":"proceedings-article","created":{"date-parts":[[2014,10,22]],"date-time":"2014-10-22T16:15:47Z","timestamp":1413994547000},"page":"185-192","source":"Crossref","is-referenced-by-count":4,"title":["A cooperative localization scheme using RFID crowdsourcing and time-shifted multilateration"],"prefix":"10.1109","author":[{"given":"Lobna M.","family":"Eslim","sequence":"first","affiliation":[]},{"given":"Hossam S.","family":"Hassanein","sequence":"additional","affiliation":[]},{"given":"Walid M.","family":"Ibrahim","sequence":"additional","affiliation":[]},{"given":"Abdallah","family":"Alma'aitah","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"2174","article-title":"Privacy-preserving RFID authentication based on cryptographical encoding","author":"li","year":"2012","journal-title":"Proc IEEE InfoCom"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/RFID.2010.5467268"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2013.6831061"},{"key":"15","article-title":"VIRE: Active RFID-based localization using virtual reference elimination","author":"zhao","year":"2007","journal-title":"Proc of ICPP"},{"key":"16","doi-asserted-by":"crossref","first-page":"1485","DOI":"10.1016\/j.comcom.2009.05.007","article-title":"L-virt: Range-free 3-d localization of rfid tags based on topological constraints","volume":"32","author":"bouet","year":"2009","journal-title":"Computer Communications"},{"key":"13","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/SUTC.2006.1636157","article-title":"An indoor localization mechanism using active RFID tag","volume":"1","author":"in","year":"2006","journal-title":"IEEE International Conference on Sensor Networks Ubiquitous and Trustworthy Computing"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/WIMOB.2007.4390815"},{"key":"11","first-page":"2183","article-title":"Fault-tolerant RFID reader localization based on passive RFID tags","author":"zhu","year":"2012","journal-title":"INFOCOM 2012 Proceedings IEEE"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1023\/B:WINE.0000044029.06344.dd"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1115\/1.3662552"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/SECON.2012.6275791"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijforecast.2003.09.015"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/AICT.2009.51"},{"year":"0","key":"24"},{"key":"25","article-title":"Graph-based mobility model for mobile ad hoc network simulation","author":"tian","year":"2002","journal-title":"The Proceedings of 35th Annual Simulation Symposium in Cooperation with the IEEE Computer Society and ACM"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.3141\/1538-04"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2007.914349"},{"year":"2014","key":"28"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1145\/2426656.2426667"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2009.52"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2012.02.016"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.147"},{"key":"1","first-page":"787","volume":"54","author":"atzo ri","year":"2010","journal-title":"The Internet of Things A Survey Computer Networks"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/RFID.2013.6548157"},{"year":"2008","key":"6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/RFID.2010.5467252"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/s10845-008-0158-5"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2007.906134"},{"key":"8","first-page":"5934","author":"lee","year":"2006","journal-title":"Localization of Mobile Robot Based on Radio Frequency Identification Devices SICE-ICASE International Join T Conference"}],"event":{"name":"2014 IEEE 39th Conference on Local Computer Networks (LCN)","start":{"date-parts":[[2014,9,8]]},"location":"Edmonton, AB","end":{"date-parts":[[2014,9,11]]}},"container-title":["39th Annual IEEE Conference on Local Computer Networks"],"original-title":[],"link":[{"URL":"http:\/\/ieeexplore.ieee.org\/iel7\/6916486\/6925725\/06925771.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6916486\/6925725\/06925771.pdf?arnumber=6925771","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T18:52:25Z","timestamp":1498157545000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6925771\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/lcn.2014.6925771","relation":{},"subject":[],"published":{"date-parts":[[2014,9]]}}}