{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:28:20Z","timestamp":1750307300373,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,9,16]],"date-time":"2010-09-16T00:00:00Z","timestamp":1284595200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,9,16]]},"DOI":"10.1145\/1858378.1858422","type":"proceedings-article","created":{"date-parts":[[2010,9,22]],"date-time":"2010-09-22T12:04:33Z","timestamp":1285157073000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Real-time monitoring of explosives using wireless sensor networks"],"prefix":"10.1145","author":[{"given":"S.","family":"Simi","sequence":"first","affiliation":[{"name":"School of Engineering, Amrita University"}]},{"given":"Maneesha V.","family":"Ramesh","sequence":"additional","affiliation":[{"name":"School of Engineering, Amrita University"}]}],"member":"320","published-online":{"date-parts":[[2010,9,16]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1080\/09546550701246817"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1024422"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/332833.332838"},{"key":"e_1_3_2_1_4_1","unstructured":"}}National Research Council Existing and Potential Standoff Explosives Detection Techniques The National Academies Press Washington D. C. 2004.  }}National Research Council Existing and Potential Standoff Explosives Detection Techniques The National Academies Press Washington D. C. 2004."},{"volume-title":"Proc. 3rd IEEE Int. Conf. On Nano\/Micro Engineered and Molecular Systems January 6--9","year":"2008","author":"Deyi Kong MEMS","key":"e_1_3_2_1_5_1"},{"volume-title":"August 2007 Proceedings of the IEEE 1559--1565","author":"Baker T.","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","article-title":"Tiny, Sensitive Magnetic-Field Detectors: Arrays of cheap magnetic sensors could detect improvised explosive devices","author":"Bourzac","year":"2007","journal-title":"Technology Review, Massachusetts Institute of Technology"},{"key":"e_1_3_2_1_8_1","unstructured":"}}Subpicotesla atomic magnetometry with a microfabricated vapour cell DOI = http:\/\/tf.nist.gov\/timefreq\/general\/pdf\/2219.pdf  }}Subpicotesla atomic magnetometry with a microfabricated vapour cell DOI = http:\/\/tf.nist.gov\/timefreq\/general\/pdf\/2219.pdf"},{"key":"e_1_3_2_1_9_1","unstructured":"}}\"Hidden sensor network to detect explosives\" DOI=http:\/\/www.theengineer.co.uk\/news\/hidden-sensor-network-detects-explosives\/1000515.article  }} \"Hidden sensor network to detect explosives\" DOI=http:\/\/www.theengineer.co.uk\/news\/hidden-sensor-network-detects-explosives\/1000515.article"},{"key":"e_1_3_2_1_10_1","unstructured":"}}Thomas H. Coreman; Charles E. Leiserson; Rivest Ronald L.; Stein Clifford (2001). Dijkstra's algorithm \"MIT Press and McGraw-Hill. 595--601.  }}Thomas H. Coreman; Charles E. Leiserson; Rivest Ronald L.; Stein Clifford (2001). Dijkstra's algorithm \"MIT Press and McGraw-Hill. 595--601."},{"key":"e_1_3_2_1_11_1","unstructured":"}}William stallings. Data and computer Communications Prentice Hall mexico October 27--29 1981 224--229.  }}William stallings. Data and computer Communications Prentice Hall mexico October 27--29 1981 224--229."}],"event":{"name":"A2CWiC '10: Emerging Trends in Computing","acronym":"A2CWiC '10","location":"Coimbatore India"},"container-title":["Proceedings of the 1st Amrita ACM-W Celebration on Women in Computing in India"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1858378.1858422","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1858378.1858422","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:59:53Z","timestamp":1750244393000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1858378.1858422"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,9,16]]},"references-count":11,"alternative-id":["10.1145\/1858378.1858422","10.1145\/1858378"],"URL":"https:\/\/doi.org\/10.1145\/1858378.1858422","relation":{},"subject":[],"published":{"date-parts":[[2010,9,16]]},"assertion":[{"value":"2010-09-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}