{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T06:30:19Z","timestamp":1760596219266,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,6,16]],"date-time":"2010-06-16T00:00:00Z","timestamp":1276646400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["200955711"],"award-info":[{"award-number":["200955711"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,6,16]]},"DOI":"10.1145\/1853079.1853100","type":"proceedings-article","created":{"date-parts":[[2010,9,2]],"date-time":"2010-09-02T13:14:34Z","timestamp":1283433274000},"page":"79-84","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Credit based network management by discriminate analysis"],"prefix":"10.1145","author":[{"given":"Qin","family":"Yan","sequence":"first","affiliation":[{"name":"Hohai University Computer and Information College"}]},{"given":"Fei","family":"Wang","sequence":"additional","affiliation":[{"name":"Hohai University Computer and Information College"}]},{"given":"Jilong","family":"Wang","sequence":"additional","affiliation":[{"name":"Tsinghua University"}]}],"member":"320","published-online":{"date-parts":[[2010,6,16]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Communication System and Networks and Workshops. 5--10","author":"Wang J","year":"2009","unstructured":"J Wang , DM Chiu , JCS Lui . 2009 . Credit-based network manage-ment . Communication System and Networks and Workshops. 5--10 . J Wang, DM Chiu, JCS Lui. 2009. Credit-based network manage-ment. Communication System and Networks and Workshops. 5--10."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2007.4342832"},{"key":"e_1_3_2_1_3_1","unstructured":"Xiangyang Xu and Jike Ge. 2006. search on Personal Credit Scoring Model based on Clustering. Microcomputer Information. 229--231.  Xiangyang Xu and Jike Ge. 2006. search on Personal Credit Scoring Model based on Clustering. Microcomputer Information . 229--231."},{"key":"e_1_3_2_1_4_1","volume-title":"Analysis and application of AHP. Mathematical Modeling","author":"Feng Liu","year":"2005","unstructured":"Liu Feng . 2005. Analysis and application of AHP. Mathematical Modeling , Nanjing University . ( September . 2005 ), 236. Liu Feng. 2005. Analysis and application of AHP. Mathematical Modeling, Nanjing University. (September. 2005), 236."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/944919.944968"},{"volume-title":"The nature of statistical learning theory","author":"Vapnik V","key":"e_1_3_2_1_6_1","unstructured":"V Vapnik . 1995. The nature of statistical learning theory . New York : Springer Verlag . V Vapnik. 1995. The nature of statistical learning theory. New York: Springer Verlag."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2004.1273927"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0893-6080(00)00026-5"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/72.761722"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1166\/jctn.2007.2413"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2006.880628"}],"event":{"name":"CFI '10: Conference on the Future of the Internet 2010","sponsor":["AsiaFI Asia Future Internet","FIF Future Internet Forum","SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Seoul Korea","acronym":"CFI '10"},"container-title":["Proceedings of the 5th International Conference on Future Internet Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1853079.1853100","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1853079.1853100","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:08:42Z","timestamp":1750248522000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1853079.1853100"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6,16]]},"references-count":11,"alternative-id":["10.1145\/1853079.1853100","10.1145\/1853079"],"URL":"https:\/\/doi.org\/10.1145\/1853079.1853100","relation":{},"subject":[],"published":{"date-parts":[[2010,6,16]]},"assertion":[{"value":"2010-06-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}