{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T18:29:48Z","timestamp":1725474588873},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540499329"},{"type":"electronic","value":"9783540499336"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11943952_11","type":"book-chapter","created":{"date-parts":[[2006,11,27]],"date-time":"2006-11-27T14:01:12Z","timestamp":1164636072000},"page":"119-130","source":"Crossref","is-referenced-by-count":4,"title":["Smart Path-Finding with Local Information in a Sensory Field"],"prefix":"10.1007","author":[{"given":"Wenzhe","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Minglu","family":"Li","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Shu","sequence":"additional","affiliation":[]},{"given":"Min-You","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Mainwaring, A.: Wireless sensor networks for habitat monitoring. In: ACM Int\u2019l Workshop on Wireless Sensor Networks and Applications (WSNA), Atlanta, Georgia, USA, pp. 88\u201397 (2002)","key":"11_CR1","DOI":"10.1145\/570738.570751"},{"issue":"10","key":"11_CR2","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1109\/MC.2002.1039518","volume":"35","author":"A.D. Wood","year":"2002","unstructured":"Wood, A.D., Stankovic, J.A.: Denial of Service in Sensor Networks. IEEE Computer\u00a035(10), 54\u201362 (2002)","journal-title":"IEEE Computer"},{"issue":"3","key":"11_CR3","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1109\/TC.2004.1261841","volume":"53","author":"V. Phipatanasuphorn","year":"2004","unstructured":"Phipatanasuphorn, V., Ramanathan, P.: Vulnerability of Sensor Networks to unauthorized Traversal and Monitoring. IEEE Transactions on Computers\u00a053(3), 364\u2013369 (2004)","journal-title":"IEEE Transactions on Computers"},{"key":"11_CR4","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/958491.958497","volume-title":"Proc. of the ACM Int\u2019l Conf. on Embedded Networked Sensor Systems (SenSys)","author":"G. Veltri","year":"2003","unstructured":"Veltri, G., Huang, Q., Qu, G., Potkonjak, M.: Minimal and maximal exposure path algorithms for wireless embedded sensor networks. In: Akyildiz, I.F., Estion, D. (eds.) Proc. of the ACM Int\u2019l Conf. on Embedded Networked Sensor Systems (SenSys), pp. 40\u201350. ACM Press, New York (2003)"},{"issue":"6","key":"11_CR5","doi-asserted-by":"publisher","first-page":"753","DOI":"10.1109\/TC.2003.1204831","volume":"52","author":"X.Y. Li","year":"2003","unstructured":"Li, X.Y.: Coverage in Wireless Ad Hoc Sensor Networks. IEEE Transactions on Computers\u00a052(6), 753\u2013763 (2003)","journal-title":"IEEE Transactions on Computers"},{"issue":"1","key":"11_CR6","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/TMC.2005.15","volume":"4","author":"S. Megerian","year":"2005","unstructured":"Megerian, S., Koushanfar, F., Potkonjak, M., Srivastava, M.: Worst and Best-Case Coverage in Sensor Networks. IEEE Transactions on Mobile Computing\u00a04(1), 84\u201392 (2005)","journal-title":"IEEE Transactions on Mobile Computing"},{"doi-asserted-by":"crossref","unstructured":"Meguerdichian, S., Koushanfar, F., Potkonjak, M., Srivastava, M.: Coverage problems in wireless ad-hoc sensor networks. In: IEEE INFOCOM, vol.\u00a03, pp. 1380\u20131387 (2001)","key":"11_CR7","DOI":"10.1109\/INFCOM.2001.916633"},{"doi-asserted-by":"crossref","unstructured":"Meguerdichian, S., Koushanfar, F., Qu, G., Potkonjak, M.: Exposure in wireless ad-hoc sensor networks. In: ACM MobiCom, pp. 139\u2013150 (July 2001)","key":"11_CR8","DOI":"10.1145\/381677.381691"},{"unstructured":"Savvides, A.: Location Discovery in Ad-hoc Wireless Sensor Networks. Dept.of EE and CS, UCLA (unpublished)","key":"11_CR9"},{"issue":"3","key":"11_CR10","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1145\/116873.116880","volume":"23","author":"F. Aurenhammer","year":"1991","unstructured":"Aurenhammer, F.: Voronoi Diagrams \u2013 A Survey of A Fundamental Geometric Data Structure. ACM Computing Surveys\u00a023(3), 345\u2013405 (1991)","journal-title":"ACM Computing Surveys"},{"key":"11_CR11","volume-title":"Computational Geometry: An Introduction through Randomized Algorithms","author":"K. Mulmuley","year":"1994","unstructured":"Mulmuley, K.: Computational Geometry: An Introduction through Randomized Algorithms. Prentice-Hall, Englewood Cliffs (1994)"},{"key":"11_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/3-540-46632-0_12","volume-title":"Algorithms and Computations","author":"P. Bose","year":"1999","unstructured":"Bose, P., Morin, P.: Online routing in triangulations. In: Aggarwal, A.K., Pandu Rangan, C. (eds.) ISAAC 1999. LNCS, vol.\u00a01741, pp. 113\u2013122. Springer, Heidelberg (1999)"},{"issue":"6","key":"11_CR13","doi-asserted-by":"publisher","first-page":"609","DOI":"10.1023\/A:1012319418150","volume":"7","author":"P. Bose","year":"2001","unstructured":"Bose, P., Morin, P., Stojmenovic, I., Urrutia, J.: Routing with guaranteed delivery in ad hoc wireless networks. ACM\/Kluwer Wireless Networks\u00a07(6), 609\u2013616 (2001)","journal-title":"ACM\/Kluwer Wireless Networks"},{"unstructured":"Kranakis, E., Singh, H., Urrutia, J.: Compass routing on geometric networks. In: The 11th Canadian Conference on Computational Geometry, pp. 52\u201354 (August 1999)","key":"11_CR14"}],"container-title":["Lecture Notes in Computer Science","Mobile Ad-hoc and Sensor Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11943952_11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T03:51:47Z","timestamp":1619495507000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11943952_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540499329","9783540499336"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/11943952_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}