{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T18:09:43Z","timestamp":1743098983090,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030146566"},{"type":"electronic","value":"9783030146573"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-14657-3_18","type":"book-chapter","created":{"date-parts":[[2019,3,6]],"date-time":"2019-03-06T06:40:50Z","timestamp":1551854450000},"page":"179-194","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Distributed Algorithm for Constructing Underwater Strong k-Barrier Coverage"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0980-0613","authenticated-orcid":false,"given":"Weiqiang","family":"Shen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3424-5749","authenticated-orcid":false,"given":"Chuanlin","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3933-9274","authenticated-orcid":false,"given":"Jinglun","family":"Shi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7616-308X","authenticated-orcid":false,"given":"Xiaona","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0524-0604","authenticated-orcid":false,"given":"Zhihong","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,7]]},"reference":[{"issue":"3","key":"18_CR1","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1002\/rsa.20656","volume":"49","author":"P Balister","year":"2016","unstructured":"Balister, P., Bollob\u00e1s, B., Sarkar, A.: Barrier coverage. Random Struct. Algorithms 49(3), 429\u2013478 (2016). \n                    https:\/\/doi.org\/10.1002\/rsa.20656","journal-title":"Random Struct. Algorithms"},{"issue":"5","key":"18_CR2","doi-asserted-by":"publisher","first-page":"616","DOI":"10.15837\/ijccc.2010.5.2217","volume":"5","author":"D Ban","year":"2010","unstructured":"Ban, D., Yang, W., Jiang, J., Wen, J., Dou, W.: Energy-efficient algorithms for k-barrier coverage in mobile sensor networks. Int. J. Comput. Commun. Control 5(5), 616\u2013624 (2010)","journal-title":"Int. J. Comput. Commun. Control"},{"issue":"5","key":"18_CR3","doi-asserted-by":"publisher","first-page":"370","DOI":"10.4304\/jcm.6.5.370-383","volume":"6","author":"SJ Barr","year":"2011","unstructured":"Barr, S.J., Wang, J., Liu, B.: An efficient method for constructing underwater sensor barriers. J. Commun. 6(5), 370\u2013383 (2011)","journal-title":"J. Commun."},{"key":"18_CR4","doi-asserted-by":"publisher","unstructured":"Chen, A., Lai, T., Xuan, D.: Measuring and guaranteeing quality of barrier-coverage in wireless sensor networks. In: Proceedings of the 9th ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2008, 26\u201330 May 2008, Hong Kong, China, pp. 421\u2013430 (2008). \n                    https:\/\/doi.org\/10.1145\/1374618.1374674","DOI":"10.1145\/1374618.1374674"},{"key":"18_CR5","unstructured":"Dobrev, S., et al.: Weak coverage of a rectangular barrier. CoRR abs\/1701.07294 (2017). \n                    http:\/\/arxiv.org\/abs\/1701.07294"},{"issue":"1","key":"18_CR6","first-page":"14","volume":"11","author":"H Fan","year":"2014","unstructured":"Fan, H., Li, M., Sun, X., Wan, P.J., Zhao, Y.: Barrier coverage by sensors with adjustable ranges. ACM Trans. Sens. Netw. (TOSN) 11(1), 14 (2014)","journal-title":"ACM Trans. Sens. Netw. (TOSN)"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Gage, D.W.: Command control for many-robot systems. Technical report, DTIC Document (1992)","DOI":"10.21236\/ADA422540"},{"issue":"7","key":"18_CR8","doi-asserted-by":"publisher","first-page":"1165","DOI":"10.1007\/s10514-015-9532-2","volume":"40","author":"V Ganesan","year":"2016","unstructured":"Ganesan, V., Chitre, M., Brekke, E.: Robust underwater obstacle detection and collision avoidance. Auton. Robots 40(7), 1165\u20131185 (2016)","journal-title":"Auton. Robots"},{"key":"18_CR9","doi-asserted-by":"publisher","unstructured":"He, S., Gong, X., Zhang, J., Chen, J., Sun, Y.: Barrier coverage in wireless sensor networks: from lined-based to curve-based deployment. In: Proceedings of the IEEE INFOCOM 2013, 14\u201319 April 2013, Turin, Italy, pp. 470\u2013474 (2013). \n                    https:\/\/doi.org\/10.1109\/INFCOM.2013.6566817","DOI":"10.1109\/INFCOM.2013.6566817"},{"issue":"1\u20132","key":"18_CR10","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1002\/nav.3800020109","volume":"2","author":"HW Kuhn","year":"1955","unstructured":"Kuhn, H.W.: The Hungarian method for the assignment problem. Naval Res. Logistics Q. 2(1\u20132), 83\u201397 (1955)","journal-title":"Naval Res. Logistics Q."},{"key":"18_CR11","doi-asserted-by":"publisher","unstructured":"Kumar, S., Lai, T., Arora, A.: Barrier coverage with wireless sensors. In: Proceedings of the 11th Annual International Conference on Mobile Computing and Networking, MOBICOM 2005, Cologne, Germany, 28 August\u20132 September 2005, pp. 284\u2013298 (2005). \n                    https:\/\/doi.org\/10.1145\/1080829.1080859","DOI":"10.1145\/1080829.1080859"},{"key":"18_CR12","doi-asserted-by":"publisher","unstructured":"Li, S., Shen, H.: Minimizing the maximum sensor movement for barrier coverage in the plane. In: 2015 IEEE Conference on Computer Communications, INFOCOM 2015, 26 April\u20131 May 2015, Kowloon, Hong Kong, pp. 244\u2013252 (2015). \n                    https:\/\/doi.org\/10.1109\/INFOCOM.2015.7218388","DOI":"10.1109\/INFOCOM.2015.7218388"},{"key":"18_CR13","doi-asserted-by":"crossref","unstructured":"Li, S., Shen, H.: Minimizing the maximum sensor movement for barrier coverage in the plane. In: 2015 IEEE Conference on Computer Communications (INFOCOM), pp. 244\u2013252. IEEE (2015)","DOI":"10.1109\/INFOCOM.2015.7218388"},{"key":"18_CR14","doi-asserted-by":"publisher","unstructured":"Liu, B., Dousse, O., Wang, J., Saipulla, A.: Strong barrier coverage of wireless sensor networks. In: Proceedings of the 9th ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2008, 26\u201330 May 2008, Hong Kong, China, pp. 411\u2013420 (2008). \n                    https:\/\/doi.org\/10.1145\/1374618.1374673","DOI":"10.1145\/1374618.1374673"},{"key":"18_CR15","unstructured":"Rafferty, J.P., et al.: Oceans and Oceanography. Britannica Educational Publishing, Chicago (2010)"},{"key":"18_CR16","doi-asserted-by":"publisher","unstructured":"Saipulla, A., Liu, B., Xing, G., Fu, X., Wang, J.: Barrier coverage with sensors of limited mobility. In: Proceedings of the 11th ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2010, 20\u201324 September 2010, Chicago, IL, USA, pp. 201\u2013210 (2010). \n                    https:\/\/doi.org\/10.1145\/1860093.1860121","DOI":"10.1145\/1860093.1860121"},{"key":"18_CR17","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1016\/j.adhoc.2016.10.010","volume":"54","author":"S Silvestri","year":"2017","unstructured":"Silvestri, S., Goss, K.: Mobibar: an autonomous deployment algorithm for barrier coverage with mobile sensors. Ad Hoc Netw. 54, 111\u2013129 (2017)","journal-title":"Ad Hoc Netw."},{"key":"18_CR18","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1016\/j.comnet.2016.11.014","volume":"112","author":"Z Wang","year":"2017","unstructured":"Wang, Z., Chen, H., Cao, Q., Qi, H., Wang, Z., Wang, Q.: Achieving location error tolerant barrier coverage for wireless sensor networks. Comput. Netw. 112, 314\u2013328 (2017)","journal-title":"Comput. Netw."},{"issue":"6","key":"18_CR19","doi-asserted-by":"publisher","first-page":"968","DOI":"10.1007\/s11704-016-5532-4","volume":"10","author":"F Wu","year":"2016","unstructured":"Wu, F., Gui, Y., Wang, Z., Gao, X., Chen, G.: A survey on barrier coverage with sensors. Frontiers Comput. Sci. 10(6), 968\u2013984 (2016)","journal-title":"Frontiers Comput. Sci."},{"key":"18_CR20","doi-asserted-by":"publisher","unstructured":"Yang, G., Qiao, D.: Multi-round sensor deployment for guaranteed barrier coverage. In: 29th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, INFOCOM 2010, 15\u201319 March 2010, San Diego, CA, USA, pp. 2462\u20132470 (2010). \n                    https:\/\/doi.org\/10.1109\/INFCOM.2010.5462074","DOI":"10.1109\/INFCOM.2010.5462074"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","IoT as a Service"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-14657-3_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T01:29:21Z","timestamp":1558402161000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-14657-3_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030146566","9783030146573"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-14657-3_18","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"7 March 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IoTaaS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Internet of Things as a Service","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iotaas2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"confy.eai.eu","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"83","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"50","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"60% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}