{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T05:02:31Z","timestamp":1766466151012},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540683797"},{"type":"electronic","value":"9783540683803"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11951957_3","type":"book-chapter","created":{"date-parts":[[2006,11,30]],"date-time":"2006-11-30T10:17:52Z","timestamp":1164881872000},"page":"27-40","source":"Crossref","is-referenced-by-count":9,"title":["Optimisation Problems Based on the Maximal Breach Path Measure for Wireless Sensor Network Coverage"],"prefix":"10.1007","author":[{"given":"Anirvan","family":"DuttaGupta","sequence":"first","affiliation":[]},{"given":"Arijit","family":"Bishnu","sequence":"additional","affiliation":[]},{"given":"Indranil","family":"Sengupta","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"3_CR1","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/TMC.2005.15","volume":"4","author":"S. Megerian","year":"2005","unstructured":"Megerian, S., Koushanfar, F., Potkonjak, M., Srivastava, M.B.: Worst and Best-Case Coverage in Sensor Networks. IEEE Transactions on Mobile Computing\u00a04(1), 84\u201392 (2005)","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Meguerdichian, S., Koushanfar, F., Potkonjak, M., Srivastava, M.B.: Coverage Problems in Wireless Ad-hoc Sensor Networks. In: Proceedings of the 20th Annual Joint Conference of the IEEE Computer and Communications Societies, IEEE INFOCOM 2001 (April 2001)","DOI":"10.1109\/INFCOM.2001.916633"},{"issue":"6","key":"3_CR3","first-page":"53","volume":"52","author":"X.-Y. Li","year":"2003","unstructured":"Li, X.-Y., Wan, P.-J., Frieder, O.: Coverage in Wireless Ad-hoc oc Sensor Networks. IEEE Transactions on Computers\u00a052(6), 53\u2013763 (2003)","journal-title":"IEEE Transactions on Computers"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Kumar, S., Lai, T.H., Arora, A.: Barrier Coverage with Wireless Sensors. In: Proceedings of the 11th annual international conference on Mobile computing and networking, MobiCom 2005 (August 2005)","DOI":"10.1145\/1080829.1080859"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Huang, C.-F., Tseng, Y.-C.: The Coverage Problem in Wireless Sensor Networks. In: Proceedings of the 2nd ACM international conference on Wireless sensor networks and applications (September 2003)","DOI":"10.1145\/941350.941367"},{"key":"3_CR6","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-03427-9","volume-title":"Computational Geometry Algorithms and Applications","author":"M. Berg de","year":"1997","unstructured":"de Berg, M., Van Kreveld, M., Overmars, M., Schwarzkopf, O.: Computational Geometry Algorithms and Applications. Springer, Heidelberg (1997)"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Aurenhammer, F.: Voronoi Diagrams - A Survey of a Fundamental Geometric Data Structure. ACM Computing Surveys\u00a023(3) (September 1991)","DOI":"10.1145\/116873.116880"},{"key":"3_CR8","volume-title":"The LEDA Platform of Combinatorial and Geometric Computing","author":"K. Mehlhorn","year":"1999","unstructured":"Mehlhorn, K., N\u00e4her, S.: The LEDA Platform of Combinatorial and Geometric Computing. Cambridge University Press, Cambridge (1999)"},{"key":"3_CR9","volume-title":"Introduction to Algorithms","author":"T.H. Cormen","year":"2001","unstructured":"Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to Algorithms, 2nd edn. MIT Press, Cambridge (2001)","edition":"2"},{"key":"3_CR10","unstructured":"Melissen, H.: Packing and Covering with Circles, Ph.D. thesis, University of Utrecht (1997)"}],"container-title":["Lecture Notes in Computer Science","Distributed Computing and Internet Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11951957_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:00:32Z","timestamp":1605643232000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11951957_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540683797","9783540683803"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/11951957_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}