{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T02:25:04Z","timestamp":1742955904359,"version":"3.40.3"},"publisher-location":"New York, NY","reference-count":14,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9781493928637"},{"type":"electronic","value":"9781493928644"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-1-4939-2864-4_262","type":"book-chapter","created":{"date-parts":[[2016,4,21]],"date-time":"2016-04-21T20:04:14Z","timestamp":1461269054000},"page":"1434-1439","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Obstacle Avoidance Algorithms in Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Sotiris","family":"Nikoletseas","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Olivier","family":"Powell","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2016,4,22]]},"reference":[{"key":"263_CR1560","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1145\/1072989.1072992","volume":"9","author":"N Ahmed","year":"2005","unstructured":"Ahmed N, Kanhere SS, Jha S (2005) The holes problem in wireless sensor networks: a survey. SIGMOBILE Mob Comput Commun Rev 9:4\u201318","journal-title":"SIGMOBILE Mob Comput Commun Rev"},{"key":"263_CR1561","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/MWC.2004.1368893","volume":"11","author":"JN Al-Karaki","year":"2004","unstructured":"Al-Karaki JN, Kamal AE (2004) Routing techniques in wireless sensor networks: a survey. Wirel Commun IEEE 11:6\u201328","journal-title":"Wirel Commun IEEE"},{"key":"263_CR1562","doi-asserted-by":"crossref","unstructured":"Bose P, Morin P, Stojmenovic I, Urrutia J (1999) Routing with guaranteed delivery in ad hoc wireless networks. In: Discrete algorithms and methods for mobile computing and communications","DOI":"10.1145\/313239.313282"},{"key":"263_CR1563","unstructured":"Chatzigiannakis I, Dimitriou T, Nikoletseas S, Spirakis P (2004) A probabilistic forwarding protocol for efficient data propagation in sensor networks. In: European wireless conference on mobility and wireless systems beyond 3G (EW2004), Barcelona, pp 344\u2013350"},{"key":"263_CR1564","doi-asserted-by":"crossref","unstructured":"Chatzigiannakis I, Mylonas G, Nikoletseas S (2006) Modeling and evaluation of the effect of obstacles on the performance of wireless sensor networks. In: 39th ACM\/IEEE simulation symposium (ANSS), Los Alamitos. IEEE Computer Society, pp 50\u201360","DOI":"10.1109\/ANSS.2006.26"},{"key":"263_CR1565","first-page":"621","volume":"10","author":"I Chatzigiannakis","year":"2005","unstructured":"Chatzigiannakis I, Nikoletseas S, Spirakis P (2005) Smart dust protocols for local detection and propagation. J Mob Netw (MONET) 10:621\u2013635","journal-title":"J Mob Netw (MONET)"},{"key":"263_CR1566","doi-asserted-by":"publisher","DOI":"10.1002\/0470095121","volume-title":"Protocols and architectures for wireless sensor networks","author":"H Karl","year":"2005","unstructured":"Karl H, Willig A (2005) Protocols and architectures for wireless sensor networks. Wiley, West Sussex"},{"key":"263_CR1567","volume-title":"Mobile computing and networking","author":"B Karp","year":"2000","unstructured":"Karp B, Kung HT (2000) GPSR: greedy perimeter stateless routing for wireless networks. In: Mobile computing and networking. ACM, New York"},{"key":"263_CR1568","volume-title":"Embedded networked sensor systems","author":"YJ Kim","year":"2006","unstructured":"Kim YJ, Govindan R, Karp B, Shenker S (2006) Lazy cross-link removal for geographic routing. In: Embedded networked sensor systems. ACM, New York"},{"key":"263_CR1569","volume-title":"Principles of distributed computing","author":"F Kuhn","year":"2003","unstructured":"Kuhn F, Wattenhofer R, Zhang Y, Zollinger A (2003) Geometric ad-hoc routing: of theory and practice. In: Principles of distributed computing. ACM, New York"},{"key":"263_CR1570","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1145\/1062689.1062720","volume-title":"MobiHoc'05: proceedings of the 6th ACM international symposium on mobile ad hoc networking and computing","author":"S Lee","year":"2005","unstructured":"Lee S, Bhattacharjee B, Banerjee S (2005) Efficient geographic routing in multihop wireless networks. In: MobiHoc'05: proceedings of the 6th ACM international symposium on mobile ad hoc networking and computing. ACM, New York, pp 230\u2013241"},{"key":"263_CR1571","volume-title":"WEA 6th workshop on experimental algorithms, Rome","author":"O Powell","year":"2007","unstructured":"Powell O, Nikolesteas S (2007) Simple and efficient geographic routing around obstacles for wireless sensor networks. In: WEA 6th workshop on experimental algorithms, Rome. Springer, Berlin"},{"key":"263_CR1572","doi-asserted-by":"publisher","first-page":"1023","DOI":"10.1109\/71.963415","volume":"12","author":"I Stojmenovic","year":"2001","unstructured":"Stojmenovic I, Lin X (2001) Loop-free hybrid single-path\/flooding routing algorithms with guaranteed delivery for wireless networks. IEEE Trans Parallel Distrib Syst 12:1023\u20131032","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"263_CR1573","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/TCOM.1984.1096061","volume":"32","author":"H Takagi","year":"1984","unstructured":"Takagi H, Kleinrock L (1984) Optimal transmission ranges for randomly distributed packet radio terminals. IEEE Trans Commun [legacy, pre-1988] 32:46\u2013257","journal-title":"IEEE Trans Commun"}],"container-title":["Encyclopedia of Algorithms"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4939-2864-4_262","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,20]],"date-time":"2019-03-20T16:05:03Z","timestamp":1553097903000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4939-2864-4_262"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9781493928637","9781493928644"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-1-4939-2864-4_262","relation":{},"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"22 April 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"22 April 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"22 April 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"22 April 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"22 April 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"22 April 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"22 April 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"22 April 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"22 April 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"22 April 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"22 April 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"22 April 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"22 April 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"22 April 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"22 April 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"22 April 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"22 April 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"22 April 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}