{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,9]],"date-time":"2025-02-09T05:17:47Z","timestamp":1739078267868,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540922940"},{"type":"electronic","value":"9783540922957"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-92295-7_50","type":"book-chapter","created":{"date-parts":[[2009,3,25]],"date-time":"2009-03-25T08:00:00Z","timestamp":1237968000000},"page":"414-424","source":"Crossref","is-referenced-by-count":1,"title":["Flooding-Assisted Threshold Assignment for Aggregate Monitoring in Sensor Networks"],"prefix":"10.1007","author":[{"given":"Ali","family":"Abbasi","sequence":"first","affiliation":[]},{"given":"Ahmad","family":"Khonsari","sequence":"additional","affiliation":[]},{"given":"Mohammad Sadegh","family":"Talebi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"8","key":"50_CR1","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1109\/MCOM.2002.1024422","volume":"40","author":"I.F. Akyildiz","year":"2002","unstructured":"Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A Survey on Sensor Networks. IEEE Communications Magazine\u00a040(8), 102\u2013114 (2002)","journal-title":"IEEE Communications Magazine"},{"key":"50_CR2","doi-asserted-by":"crossref","unstructured":"Aggrawal, S., Deb, S., Naidu, K.V.M., Rastogi, R.: Efficient Detection of Distributed Constraint Violations. In: Proc. of IEEE ICDE, pp. 1320\u20131324 (2007)","DOI":"10.1109\/ICDE.2007.369002"},{"key":"50_CR3","doi-asserted-by":"crossref","unstructured":"Babcock, B., Olston, C.: Distributed Top-k Monitoring. In: Proc. of ACM SIGMOD, pp. 28\u201339 (2003)","DOI":"10.1145\/872757.872764"},{"key":"50_CR4","unstructured":"Bertsekas, D.: Nonlinear Programming. Athena Scientific (1999)"},{"key":"50_CR5","doi-asserted-by":"crossref","unstructured":"Boyd, S., Ghosh, A., Prabhakar, B., Shah, D.: Gossip Algorithms: Design, Analysis, and Applications. In: Proc. IEEE INFOCOM, pp. 1653\u20131664 (2005)","DOI":"10.1109\/INFCOM.2005.1498447"},{"key":"50_CR6","unstructured":"Cormode, G., Garofalakis, M.: Sketching streams through the net: Distributed approximate query tracking. In: Proc. VLDB, pp. 13\u201324 (2005)"},{"key":"50_CR7","doi-asserted-by":"crossref","unstructured":"Cormode, G., Garofalakis, M., Muthukrishnan, S., Rastogi., R.: Holistic aggregates in a networked world: Distributed tracking of approximate quantiles. In: Proc. ACM SIGMOD, pp. 25\u201336 (2005)","DOI":"10.1145\/1066157.1066161"},{"key":"50_CR8","unstructured":"Cormode, G., Muthurikshnan, S., Yi, K.: Algorithms for Distributed Functional Monitoring. In: Proc. ACM SODA, pp. 1076\u20131085 (2008)"},{"key":"50_CR9","doi-asserted-by":"crossref","unstructured":"Das, A., Ganguly, S., Garofalakis, M., Rastogi, R.: Distributed set-expression cardinality estimation. In: Proc. VLDB, pp. 312\u2013323 (2004)","DOI":"10.1016\/B978-012088469-8.50030-9"},{"key":"50_CR10","doi-asserted-by":"crossref","unstructured":"Deshpande, A., Guestrin, C., Madden, S., Hellerstein, J.M., Hong, W.: Model-Driven Data Acquisition in Sensor Networks. In: Proc. VLDB, pp. 588\u2013599 (2004)","DOI":"10.1016\/B978-012088469-8.50053-X"},{"key":"50_CR11","unstructured":"Deshpande, A., Guestrin, C., Madden, S.: Using Probabilistic Models for Data Management in Acquisitional Environments. In: Proc. CIDR, pp. 317\u2013328 (2005)"},{"key":"50_CR12","doi-asserted-by":"crossref","unstructured":"Dilman, M., Raz, D.: Efficient Reactive Monitoring. In: Proc. IEEE INFOCOM, pp. 1012\u20131019 (2001)","DOI":"10.1109\/INFCOM.2001.916294"},{"issue":"6","key":"50_CR13","doi-asserted-by":"publisher","first-page":"988","DOI":"10.1109\/TAC.2003.812781","volume":"48","author":"A. Jadbabaie","year":"2003","unstructured":"Jadbabaie, A., Lin, J., Stephen Morse, A.: Coordination of Groups of Mobile Autonomous Agents Using Nearest Neighbor Rules. IEEE Transactions on Automatic Control\u00a048(6), 988\u20131001 (2003)","journal-title":"IEEE Transactions on Automatic Control"},{"key":"50_CR14","doi-asserted-by":"crossref","unstructured":"Kashyap, S., Ramamirtham, J., Rastogi, R., Shukla, P.: Efficient Constraint Monitoring Using Adaptive Thresholds. In: Proc. IEEE ICDE, pp. 526\u2013535 (2006)","DOI":"10.1109\/ICDE.2008.4497461"},{"issue":"3","key":"50_CR15","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1057\/palgrave.jors.2600523","volume":"49","author":"F.P. Kelly","year":"1998","unstructured":"Kelly, F.P., Maulloo, A., Tan, D.K.H.: Rate Control for Communication Networks: Shadow Prices, Proportional Fairness, and Stability. Operational Research Society\u00a049(3), 237\u2013252 (1998)","journal-title":"Operational Research Society"},{"key":"50_CR16","doi-asserted-by":"crossref","unstructured":"Keralapura, R., Cormode, G., Ramamirtham, J.: Communication-Efficient Distributed Monitoring of Thresholded Counts. In: Proc. ACM SIGMOD, pp. 289\u2013300 (2006)","DOI":"10.1145\/1142473.1142507"},{"key":"50_CR17","doi-asserted-by":"crossref","unstructured":"Kifer, D., Shai, B., Gehrke, J.: Detecting Change in Data Streams. In: Proc. VLDB, pp. 180\u2013191 (2004)","DOI":"10.1016\/B978-012088469-8.50019-X"},{"key":"50_CR18","doi-asserted-by":"crossref","unstructured":"Olston, C., Jiang, J., Widom, J.: Adaptive filters for continuous queries over distributed data streams. In: Proc. ACM SIGMOD, pp. 563\u2013574 (2003)","DOI":"10.1145\/872757.872825"},{"key":"50_CR19","unstructured":"Poosala, V., Ioannidis, Y.: Selectivity Estimation Without The Attribute Value Independence Assumption. In: Proc. VLDB, pp. 486\u2013495 (1997)"},{"key":"50_CR20","doi-asserted-by":"crossref","unstructured":"Sharfman, I., Schuster, A., Keren, D.: A Geometric Approach to Monitoring Threshold Functions over Distributed Data Streams. In: Proc. ACM SIGMOD, pp. 301\u2013312 (2006)","DOI":"10.1145\/1142473.1142508"}],"container-title":["Lecture Notes in Computer Science","Distributed Computing and Networking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-92295-7_50","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,8]],"date-time":"2025-02-08T17:26:22Z","timestamp":1739035582000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-92295-7_50"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540922940","9783540922957"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-92295-7_50","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}