{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T20:23:45Z","timestamp":1740169425665,"version":"3.37.3"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","license":[{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000181","name":"U.S. Air Force Office of Scientific Research","doi-asserted-by":"publisher","award":["FA9550-17-1-0151"],"award-info":[{"award-number":["FA9550-17-1-0151"]}],"id":[{"id":"10.13039\/100000181","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cybern."],"published-print":{"date-parts":[[2021,10]]},"DOI":"10.1109\/tcyb.2019.2891112","type":"journal-article","created":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T21:05:18Z","timestamp":1548363918000},"page":"5069-5081","source":"Crossref","is-referenced-by-count":0,"title":["Efficient Deterministic Algorithm for Huge-Sized Noisy Sensor Localization Problems via Canonical Duality Theory"],"prefix":"10.1109","volume":"51","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4644-848X","authenticated-orcid":false,"given":"Vittorio","family":"Latorre","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2245-8050","authenticated-orcid":false,"given":"David Yang","family":"Gao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"249","author":"latorre","year":"2017","journal-title":"Unified Interior Point Methodology for Canonical Duality in Global Optimization"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611971453"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s11590-015-0860-0"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2013.06.050"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2018.2882792"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2014.02.003"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"463","DOI":"10.1007\/s10898-009-9469-0","article-title":"Solutions to quadratic minimization problems with box and integer constraints","volume":"47","author":"ruan","year":"2010","journal-title":"J Glob Optim"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58017-3"},{"journal-title":"Canonical Duality-Triality Theory Unified Understanding for Modeling Problems and NP-Hardness in Global Optimization of Multi-Scale Systems","year":"2017","author":"gao","key":"ref35"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s10898-014-0236-5"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2017.2669996"},{"key":"ref40","first-page":"32","author":"aspnes","year":"2004","journal-title":"On the computational complexity of sensor network localization"},{"key":"ref11","volume":"347","author":"blumenthal","year":"1953","journal-title":"Theory and Applications of Distance Geometry"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1137\/S1052623495283024"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.11.018"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-010-0501-4"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2015.2454853"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2015.2411211"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2011.2122261"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2010.2045416"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2014.2302746"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s10898-012-9881-8"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"1318","DOI":"10.1109\/TCYB.2013.2265378","article-title":"Enhanced computer vision with microsoft kinect sensor: A review","volume":"43","author":"han","year":"2013","journal-title":"IEEE Trans Cybern"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.compchemeng.2009.06.009"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.1458284"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2017.2769722"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-88619-0_3"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/MSP.2005.1458273","article-title":"Signal processing techniques in network-aided positioning: A survey of state-of-the-art positioning designs","volume":"22","author":"sun","year":"2005","journal-title":"IEEE Signal Process Mag"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2017.2671032"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2016.2582081"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2013.2272735"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2012.2226151"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2003.814918"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1137\/080713380"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1080\/10556789908805766"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1137\/090759392"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2331130.2331135"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1023\/A:1026537630859"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jtbi.2011.06.024"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-3176-7"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.cma.2018.06.027"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/BF01582151"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1142\/S021812741650142X"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1017\/S0962492904000212"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2013.01.015"}],"container-title":["IEEE Transactions on Cybernetics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6221036\/9568742\/08625704.pdf?arnumber=8625704","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:53:23Z","timestamp":1652194403000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8625704\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10]]},"references-count":45,"journal-issue":{"issue":"10"},"URL":"https:\/\/doi.org\/10.1109\/tcyb.2019.2891112","relation":{},"ISSN":["2168-2267","2168-2275"],"issn-type":[{"type":"print","value":"2168-2267"},{"type":"electronic","value":"2168-2275"}],"subject":[],"published":{"date-parts":[[2021,10]]}}}