{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:27:34Z","timestamp":1750220854639,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,23]],"date-time":"2019-08-23T00:00:00Z","timestamp":1566518400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,23]]},"DOI":"10.1145\/3357419.3357452","type":"proceedings-article","created":{"date-parts":[[2019,10,11]],"date-time":"2019-10-11T15:16:45Z","timestamp":1570807005000},"page":"153-159","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Fault Prediction Model for Node Selection Function of Mobile Networks"],"prefix":"10.1145","author":[{"given":"Mykoniati","family":"Maria","sequence":"first","affiliation":[{"name":"Department of Digital Systems, University of Piraeus, Piraeus, Greece"}]},{"given":"Konstantinos","family":"Lambrinoudakis","sequence":"additional","affiliation":[{"name":"Department of Digital Systems, University of Piraeus, Piraeus, Greece"}]}],"member":"320","published-online":{"date-parts":[[2019,8,23]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"2","volume-title":"An Emerging Discipline,\" Proceedings of the 11th Canadian Information Technology Security Symposium (CITSS)","author":"Ellison R.J.","year":"1997","unstructured":"R.J. Ellison, D.A. Fisher, R.C. Linger, H.F. Lipson, T.A. Longstaff, N.R. Mead, \"Survivable Systems: An Emerging Discipline,\" Proceedings of the 11th Canadian Information Technology Security Symposium (CITSS), Ottawa, Ontario Canada, Communications Security Establishment, pp. 2, November 1997"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2004.1265710"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA407793"},{"key":"e_1_3_2_1_4_1","volume-title":"CERT Program, Carnegie Mellon.","author":"Ellison Robert J.","year":"2010","unstructured":"Robert J. Ellison, Carol Woody, (2010), \"Survivability Analysis Framework\", CERT Program, Carnegie Mellon."},{"key":"e_1_3_2_1_5_1","volume-title":"THE WILLOW SURVIVABILITY ARCHITECTURE","author":"Heimbigner Dennis","year":"2009","unstructured":"John, Knight, Dennis Heimbigner, Alexander Wolf, Antoinio Carzaniga, Jonathan Hill, Premkumar Devanbu, Michael Gertz, (2009), \"THE WILLOW SURVIVABILITY ARCHITECTURE\""},{"key":"e_1_3_2_1_6_1","volume-title":"A Dynamic Survivability Reconfiguration Framework Based on QoS","author":"Li Wang","year":"2008","unstructured":"Wang Li, Li Zhi-Shu, Yin Feng, (2008), \"A Dynamic Survivability Reconfiguration Framework Based on QoS\", IEEE Computer Society."},{"key":"e_1_3_2_1_7_1","volume-title":"A Network","author":"Song Qingyang","year":"2005","unstructured":"Qingyang Song, Abbas Jamlipour, (2005), \"A Network"},{"key":"e_1_3_2_1_8_1","volume-title":"Integrating Quality, Statistical Methods and Process Control","author":"Sahay Amar","year":"2016","unstructured":"Amar Sahay, \"Managing and Improving Quality: Integrating Quality, Statistical Methods and Process Control\", Business Expert Press \u00a9 2016"},{"key":"e_1_3_2_1_9_1","unstructured":"https:\/\/www.whatissixsigma.net\/10-things-about-six-sigma\/"},{"key":"e_1_3_2_1_10_1","volume-title":"FEI RICHARD YU2, (Senior Member","author":"YING","year":"2016","unstructured":"YING HE1, FEI RICHARD YU2, (Senior Member, IEEE), NAN ZHAO1, (Member, IEEE), HONGXI YIN1, HAIPENG YAO3, AND ROBERT C. QIU4,5, (Fellow, IEEE), \"Big Data Analytics in Mobile Cellular Networks\", IEEE Access, 2016"},{"key":"e_1_3_2_1_11_1","unstructured":"Mirza Golam Kibria Kien Nguyen Gabriel Porto Villardi Kentaro Ishizu and Fumihide Kojima \"Big Data Analytics and Artificial Intelligence in Next-Generation Wireless Networks\"."},{"key":"e_1_3_2_1_12_1","unstructured":"https:\/\/medium.com\/coinmonks\/linear-regression-with-tensorflow-canned-estimators-6cc4ffddd14f"}],"event":{"name":"ICICM 2019: The 9th International Conference on Information Communication and Management","sponsor":["Chinese Academy of Sciences"],"location":"Prague Czech Republic","acronym":"ICICM 2019"},"container-title":["Proceedings of the 9th International Conference on Information Communication and Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3357419.3357452","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3357419.3357452","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:21Z","timestamp":1750202601000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3357419.3357452"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,23]]},"references-count":12,"alternative-id":["10.1145\/3357419.3357452","10.1145\/3357419"],"URL":"https:\/\/doi.org\/10.1145\/3357419.3357452","relation":{},"subject":[],"published":{"date-parts":[[2019,8,23]]},"assertion":[{"value":"2019-08-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}