{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:28:17Z","timestamp":1761676097325,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,9,8]],"date-time":"2013-09-08T00:00:00Z","timestamp":1378598400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,9,8]]},"DOI":"10.1145\/2494091.2499579","type":"proceedings-article","created":{"date-parts":[[2013,9,11]],"date-time":"2013-09-11T06:54:53Z","timestamp":1378882493000},"page":"1123-1134","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Locating emergencies in a campus using wi-fi access point association data"],"prefix":"10.1145","author":[{"given":"Asma Ahmad","family":"Farhan","sequence":"first","affiliation":[{"name":"University of Connecticut, Storrs, CT, USA"}]},{"given":"Athanasios","family":"Bamis","sequence":"additional","affiliation":[{"name":"University of Connecticut, Storrs, CT, USA"}]},{"given":"Bing","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Connecticut, Storrs, CT, USA"}]}],"member":"320","published-online":{"date-parts":[[2013,9,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1452520.1452531"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-010-0282-z"},{"key":"e_1_3_2_1_3_1","unstructured":"C. Hor S. Watson D. I. and Majithia S. Assessing load forecast uncertainty using extreme value theory.  C. Hor S. Watson D. I. and Majithia S. Assessing load forecast uncertainty using extreme value theory."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/1053072.1053085"},{"key":"e_1_3_2_1_5_1","volume-title":"A location-based management system for enterprisewireless lans. NSDI","author":"Chandra R.","year":"2007","unstructured":"Chandra , R. , Padhye , J. , Wolman , A. , and Zill , B . A location-based management system for enterprisewireless lans. NSDI ( 2007 ). Chandra, R., Padhye, J., Wolman, A., and Zill, B. A location-based management system for enterprisewireless lans. NSDI (2007)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2398776.2398809"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1247660.1247690"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11265-010-0513-6"},{"volume-title":"Signal Processing Conference (EUSIPCO), 2012 Proceedings of the 20th European, IEEE (2012)","author":"Debbabi N.","key":"e_1_3_2_1_9_1","unstructured":"Debbabi , N. , Kratz , M. , Mboup , M. , and El Asmi , S. Combining algebraic approach with extreme value theory for spike detection . In Signal Processing Conference (EUSIPCO), 2012 Proceedings of the 20th European, IEEE (2012) , 1836--1840. Debbabi, N., Kratz, M., Mboup, M., and El Asmi, S. Combining algebraic approach with extreme value theory for spike detection. In Signal Processing Conference (EUSIPCO), 2012 Proceedings of the 20th European, IEEE (2012), 1836--1840."},{"key":"e_1_3_2_1_10_1","volume-title":"International Conference on Digital Image Computing: Techniques and Applications","author":"Dick A.","year":"2003","unstructured":"Dick , A. , and Brooks , M . Issues in automated visual surveillance . In International Conference on Digital Image Computing: Techniques and Applications ( 2003 ). Dick, A., and Brooks, M. Issues in automated visual surveillance. In International Conference on Digital Image Computing: Techniques and Applications (2003)."},{"key":"e_1_3_2_1_11_1","volume-title":"Proc. VIIth Digital Image","author":"Dick A. R.","year":"2003","unstructured":"Dick , A. R. , and Brooks , M. J . Issues in automated visual surveillance . In Proc. VIIth Digital Image ( 2003 ), 195--204. Dick, A. R., and Brooks, M. J. Issues in automated visual surveillance. In Proc. VIIth Digital Image (2003), 195--204."},{"key":"e_1_3_2_1_12_1","volume-title":"Proc. of PAM","author":"Gember A.","year":"2011","unstructured":"Gember , A. , Anand , A. , and Akella , A . A comparative study of handheld and non-handheld traffic in campus WiFi networks . In Proc. of PAM ( 2011 ). Gember, A., Anand, A., and Akella, A. A comparative study of handheld and non-handheld traffic in campus WiFi networks. In Proc. of PAM (2011)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287853.1287899"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/AIPR.2008.4906450"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1868521.1868561"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compenvurbsys.2003.08.002"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080091.1080118"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1868521.1868562"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1452520.1452539"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2398776.2398814"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/585147.585172"},{"key":"e_1_3_2_1_22_1","volume-title":"Extreme value theory. Handbook of applicable mathematics 7","author":"Smith R. L.","year":"1990","unstructured":"Smith , R. L. Extreme value theory. Handbook of applicable mathematics 7 ( 1990 ), 437--471. Smith, R. L. Extreme value theory. Handbook of applicable mathematics 7 (1990), 437--471."},{"key":"e_1_3_2_1_23_1","volume-title":"In Proceedings of the 19th National Information Systems Security Conference","author":"Staniford","year":"1996","unstructured":"Staniford -chen, S., Cheung , S. , Crawford , R. , Dilger , M. , Frank , J. , Hoagl , J. , Levitt , K. , Wee , C. , Yip , R. , and Zerkle , D . Grids - a graph based intrusion detection system for large networks . In In Proceedings of the 19th National Information Systems Security Conference ( 1996 ), 361--370. Staniford-chen, S., Cheung, S., Crawford, R., Dilger, M., Frank, J., Hoagl, J., Levitt, K., Wee, C., Yip, R., and Zerkle, D. Grids - a graph based intrusion detection system for large networks. In In Proceedings of the 19th National Information Systems Security Conference (1996), 361--370."},{"key":"e_1_3_2_1_24_1","volume-title":"B., and Yao, X. The Design of a Dynamic Emergency Response Management Information System (DERMIS)","author":"Turoff M.","year":"2004","unstructured":"Turoff , M. , Chumer , M. , Van De Walle , B., and Yao, X. The Design of a Dynamic Emergency Response Management Information System (DERMIS) . National Emergency Training Center , 2004 . Turoff, M., Chumer, M., Van De Walle, B., and Yao, X. The Design of a Dynamic Emergency Response Management Information System (DERMIS). National Emergency Training Center, 2004."},{"key":"e_1_3_2_1_25_1","series-title":"The Jossey-Bass higher and adult education series","volume-title":"Prevention, Response, and Recovery","author":"Zdziarski E.","year":"2007","unstructured":"Zdziarski , E. , Dunkel , N. , and Rollo , J . Campus Crisis Management: A Comprehensive Guide to Planning , Prevention, Response, and Recovery . The Jossey-Bass higher and adult education series . Wiley , 2007 . Zdziarski, E., Dunkel, N., and Rollo, J. Campus Crisis Management: A Comprehensive Guide to Planning, Prevention, Response, and Recovery. The Jossey-Bass higher and adult education series. Wiley, 2007."}],"event":{"name":"UbiComp '13: The 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","University of Florida University of Florida","SIGCHI ACM Special Interest Group on Computer-Human Interaction","SIGSPATIAL ACM Special Interest Group on Spatial Information"],"location":"Zurich Switzerland","acronym":"UbiComp '13"},"container-title":["Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2494091.2499579","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2494091.2499579","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:34:18Z","timestamp":1750232058000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2494091.2499579"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9,8]]},"references-count":25,"alternative-id":["10.1145\/2494091.2499579","10.1145\/2494091"],"URL":"https:\/\/doi.org\/10.1145\/2494091.2499579","relation":{},"subject":[],"published":{"date-parts":[[2013,9,8]]},"assertion":[{"value":"2013-09-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}