{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:54:33Z","timestamp":1725468873624},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,10]]},"DOI":"10.1109\/cnsm.2010.5691315","type":"proceedings-article","created":{"date-parts":[[2011,1,17]],"date-time":"2011-01-17T16:12:04Z","timestamp":1295280724000},"page":"150-157","source":"Crossref","is-referenced-by-count":4,"title":["Application of time series analysis to fault management in MANETs"],"prefix":"10.1109","author":[{"given":"Angelo","family":"Sapello","sequence":"first","affiliation":[]},{"given":"Adarsh","family":"Sethi","sequence":"additional","affiliation":[]},{"given":"Marian","family":"Nodine","sequence":"additional","affiliation":[]},{"given":"Ritu","family":"Chadha","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2008.ECP.89"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2000.904959"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICPWC.2002.1177291"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.1999.5340514"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2004.1325887"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1062689.1062697"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2008.4753380"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2009.5379720"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1002\/9780470058800"},{"journal-title":"Emerging Technologies in Wireless LANs Theory Design and Deployment","year":"2008","author":"bing","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/35.492975"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-34890-2_25"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2004.01.007"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2004.836121"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1002\/nem.659"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-34890-2_24"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/90.477721"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/65.244794"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2009.090405"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1137\/1.9780898719574"},{"journal-title":"Introduction to Data Compression","year":"2005","author":"sayood","key":"ref22"},{"journal-title":"Fourier Series","year":"1962","author":"tolstov","key":"ref21"},{"article-title":"The instrusion detection message exchange format (ID-MEF)","year":"2007","author":"debar","key":"ref24"},{"journal-title":"Computer Networking A Top-down Approach","year":"2010","author":"kurose","key":"ref23"}],"event":{"name":"2010 International Conference on Network and Service Management (CNSM)","start":{"date-parts":[[2010,10,25]]},"location":"Niagara Falls, ON, Canada","end":{"date-parts":[[2010,10,29]]}},"container-title":["2010 International Conference on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5668576\/5691186\/05691315.pdf?arnumber=5691315","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T01:15:56Z","timestamp":1490058956000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5691315\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/cnsm.2010.5691315","relation":{},"subject":[],"published":{"date-parts":[[2010,10]]}}}