{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:09:10Z","timestamp":1758845350166,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,4]]},"DOI":"10.1109\/mownet.2016.7496626","type":"proceedings-article","created":{"date-parts":[[2016,6,25]],"date-time":"2016-06-25T07:39:28Z","timestamp":1466840368000},"page":"1-7","source":"Crossref","is-referenced-by-count":6,"title":["Distributed monitoring in 6LoWPAN based Internet of Things"],"prefix":"10.1109","author":[{"given":"B.","family":"Mostafa","sequence":"first","affiliation":[]},{"given":"A.","family":"Benslimane","sequence":"additional","affiliation":[]},{"given":"E.","family":"Boureau","sequence":"additional","affiliation":[]},{"given":"M.","family":"Molnar","sequence":"additional","affiliation":[]},{"given":"M.","family":"Saleh","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/0196-6774(86)90023-4"},{"article-title":"Domain Specific Language for Dynamic Programming on Nice-tree Decompositions","year":"2013","author":"carroll","key":"ref11"},{"key":"ref12","first-page":"50","article-title":"Dependable Networks and Services: 6th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2012, Luxembourg, Luxembourg, June 4&#x2013;8, 2012. Proceedings","author":"korte","year":"2012","journal-title":"Springer Berlin Heidelberg"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.4007\/annals.2005.162.439"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.17487\/rfc6550","article-title":"RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks","author":"winter","year":"2012"},{"key":"ref3","first-page":"126","article-title":"Computing Bounded Path Decompositions in Logspace","volume":"19","author":"kintali s","year":"2012","journal-title":"Electronic Colloquium on Computational Complexity (ECCC)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.06.016"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxm037"},{"article-title":"Exact Algorithms for Generalizations of Vertex Cover","year":"2005","author":"moser","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.04.014"},{"key":"ref2","first-page":"309","article-title":"Intelligence-Based Systems Engineering","author":"jurdak","year":"2011"},{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.17487\/rfc4919","article-title":"IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals","author":"kushalnagar","year":"2007"},{"key":"ref9","first-page":"97","article-title":"Algorithm Theory - SWAT 2000: 7th Scandinavian Workshop on Algorithm Theory Bergen, Norway, July 5&#x2013;7, 2000 Proceedings","author":"alber","year":"2000","journal-title":"Springer Berlin Heidelberg"}],"event":{"name":"2016 International Conference on Selected Topics in Mobile & Wireless Networking (MoWNeT)","start":{"date-parts":[[2016,4,11]]},"location":"Cairo, Egypt","end":{"date-parts":[[2016,4,13]]}},"container-title":["2016 International Conference on Selected Topics in Mobile &amp; Wireless Networking (MoWNeT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7492633\/7496590\/07496626.pdf?arnumber=7496626","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,10]],"date-time":"2019-09-10T01:32:19Z","timestamp":1568079139000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7496626\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/mownet.2016.7496626","relation":{},"subject":[],"published":{"date-parts":[[2016,4]]}}}