{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:00:48Z","timestamp":1772038848559,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,11,5]],"date-time":"2008-11-05T00:00:00Z","timestamp":1225843200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,11,5]]},"DOI":"10.1145\/1460412.1460424","type":"proceedings-article","created":{"date-parts":[[2008,11,14]],"date-time":"2008-11-14T13:17:40Z","timestamp":1226668660000},"page":"113-126","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":59,"title":["Passive diagnosis for wireless sensor networks"],"prefix":"10.1145","author":[{"given":"Kebin","family":"Liu","sequence":"first","affiliation":[{"name":"Shanghai Jiaotong University &amp; HKUST, Hong Kong, China"}]},{"given":"Mo","family":"Li","sequence":"additional","affiliation":[{"name":"Hong Kong University of Science and Technology, Hong Kong, China"}]},{"given":"Yunhao","family":"Liu","sequence":"additional","affiliation":[{"name":"Hong Kong University of Science and Technology, Hong Kong, China"}]},{"given":"Minglu","family":"Li","sequence":"additional","affiliation":[{"name":"Shanghai Jiaotong University, Shanghai, China"}]},{"given":"Zhongwen","family":"Guo","sequence":"additional","affiliation":[{"name":"Ocean University of China, Qingdao, China"}]},{"given":"Feng","family":"Hong","sequence":"additional","affiliation":[{"name":"Ocean University of China, Qingdao, China"}]}],"member":"320","published-online":{"date-parts":[[2008,11,5]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"\"IBM Tivoli \" http:\/\/www.ibm.com\/software\/tivoli\/  \"IBM Tivoli \" http:\/\/www.ibm.com\/software\/tivoli\/"},{"key":"e_1_3_2_1_2_1","unstructured":"\"HP Openview \" http:\/\/www.openview.hp.com\/  \"HP Openview \" http:\/\/www.openview.hp.com\/"},{"key":"e_1_3_2_1_3_1","unstructured":"\"Microsoft Operations Manager \" http:\/\/www.microsoft.com\/mom\/  \"Microsoft Operations Manager \" http:\/\/www.microsoft.com\/mom\/"},{"key":"e_1_3_2_1_4_1","unstructured":"\"OceanSense: Sensor Network for Sea Monitoring \" http:\/\/www.cse.ust.hk\/~liu\/Ocean\/index.html  \"OceanSense: Sensor Network for Sea Monitoring \" http:\/\/www.cse.ust.hk\/~liu\/Ocean\/index.html"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282383"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1374618.1374672"},{"key":"e_1_3_2_1_7_1","volume-title":"A Reliable Mobile Agent Communication Protocol,\" In Proc. of IEEE ICDCS","author":"Cao J.","year":"2004","unstructured":"J. Cao , L. Zhang , J. Yang , and S. Das , \" A Reliable Mobile Agent Communication Protocol,\" In Proc. of IEEE ICDCS , 2004 . J. Cao, L. Zhang, J. Yang, and S. Das, \"A Reliable Mobile Agent Communication Protocol,\" In Proc. of IEEE ICDCS, 2004."},{"key":"e_1_3_2_1_8_1","volume-title":"Technical Report","author":"Cooper G.","year":"1987","unstructured":"G. Cooper , \" Probabilistic Inference using Belief Networks is NP- Hard ,\" Stanford Knowledge Systems Laboratory , Technical Report 1987 . G. Cooper, \"Probabilistic Inference using Belief Networks is NP-Hard,\" Stanford Knowledge Systems Laboratory, Technical Report 1987."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(93)90036-B"},{"key":"e_1_3_2_1_10_1","volume-title":"Locating and Bypassing Routing Holes in Sensor Networks,\" In Proc. of IEEE INFOCOM","author":"Fang Q.","year":"2004","unstructured":"Q. Fang , J. Gao , and L. Guibas , \" Locating and Bypassing Routing Holes in Sensor Networks,\" In Proc. of IEEE INFOCOM , 2004 . Q. Fang, J. Gao, and L. Guibas, \"Locating and Bypassing Routing Holes in Sensor Networks,\" In Proc. of IEEE INFOCOM, 2004."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1182807.1182829"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2007.1110"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/990064.990096"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080173.1080178"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1322263.1322270"},{"key":"e_1_3_2_1_16_1","volume-title":"IP Fault Localization Via Risk Modeling,\" In Proc. of USENIX NSDI","author":"Kompella R.","year":"2005","unstructured":"R. Kompella , J. Yates , A. Greenberg , and A. Snoeren , \" IP Fault Localization Via Risk Modeling,\" In Proc. of USENIX NSDI , 2005 . R. Kompella, J. Yates, A. Greenberg, and A. Snoeren, \"IP Fault Localization Via Risk Modeling,\" In Proc. of USENIX NSDI, 2005."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2005.64"},{"key":"e_1_3_2_1_18_1","volume-title":"Maximal Lifetime Scheduling in Sensor Surveillance Networks,\" In Proc. of IEEE INFOCOM","author":"Liu H.","year":"2005","unstructured":"H. Liu , P. Wan , C. Yi , X. Jia , S. Makki , and N. Pissinou , \" Maximal Lifetime Scheduling in Sensor Surveillance Networks,\" In Proc. of IEEE INFOCOM , 2005 . H. Liu, P. Wan, C. Yi, X. Jia, S. Makki, and N. Pissinou, \"Maximal Lifetime Scheduling in Sensor Surveillance Networks,\" In Proc. of IEEE INFOCOM, 2005."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2008.91"},{"key":"e_1_3_2_1_20_1","volume-title":"Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference: Morgan Kaufmann","author":"Pearl J.","year":"1988","unstructured":"J. Pearl , Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference: Morgan Kaufmann , 1988 . J. Pearl, Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference: Morgan Kaufmann, 1988."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1098918.1098946"},{"key":"e_1_3_2_1_22_1","volume-title":"Increasing Robustness of Fault Localization Through Analysis of Lost, Spurious, and Positive Symptoms,\" In Proc. of IEEE INFOCOM","author":"Steinder M.","year":"2002","unstructured":"M. Steinder and A. Sethi , \" Increasing Robustness of Fault Localization Through Analysis of Lost, Spurious, and Positive Symptoms,\" In Proc. of IEEE INFOCOM , 2002 . M. Steinder and A. Sethi, \"Increasing Robustness of Fault Localization Through Analysis of Lost, Spurious, and Positive Symptoms,\" In Proc. of IEEE INFOCOM, 2002."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2004.836121"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1236360.1236387"},{"key":"e_1_3_2_1_25_1","volume-title":"SMART: A Scan-Based Movement-Assisted Sensor Deployment Method in Wireless Sensor Networks,\" In Proc. of IEEE INFOCOM","author":"Wu J.","year":"2005","unstructured":"J. Wu and S. Yang , \" SMART: A Scan-Based Movement-Assisted Sensor Deployment Method in Wireless Sensor Networks,\" In Proc. of IEEE INFOCOM , 2005 . J. Wu and S. Yang, \"SMART: A Scan-Based Movement-Assisted Sensor Deployment Method in Wireless Sensor Networks,\" In Proc. of IEEE INFOCOM, 2005."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031498"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1322263.1322282"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS.2007.45"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2006.320201"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/0951-8320(94)90114-7"},{"key":"e_1_3_2_1_31_1","volume-title":"Residual Energy Scan for Monitoring Sensor Networks,\" In Proc. of IEEE WCNC","author":"Zhao J.","year":"2002","unstructured":"J. Zhao , R. Govindan , and D. Estrin , \" Residual Energy Scan for Monitoring Sensor Networks,\" In Proc. of IEEE WCNC , 2002 . J. Zhao, R. Govindan, and D. Estrin, \"Residual Energy Scan for Monitoring Sensor Networks,\" In Proc. of IEEE WCNC, 2002."}],"event":{"name":"SenSys08: The 6th ACM Conference on Embedded Networked Sensor Systems","location":"Raleigh NC USA","acronym":"SenSys08","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems","ACM Association for Computing Machinery","SIGBED ACM Special Interest Group on Embedded Systems","SIGARCH ACM Special Interest Group on Computer Architecture"]},"container-title":["Proceedings of the 6th ACM conference on Embedded network sensor systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1460412.1460424","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1460412.1460424","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:44:01Z","timestamp":1750290241000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1460412.1460424"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,11,5]]},"references-count":31,"alternative-id":["10.1145\/1460412.1460424","10.1145\/1460412"],"URL":"https:\/\/doi.org\/10.1145\/1460412.1460424","relation":{},"subject":[],"published":{"date-parts":[[2008,11,5]]},"assertion":[{"value":"2008-11-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}