{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T21:11:48Z","timestamp":1743109908425,"version":"3.40.3"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319218366"},{"type":"electronic","value":"9783319218373"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-21837-3_45","type":"book-chapter","created":{"date-parts":[[2015,7,31]],"date-time":"2015-07-31T13:40:31Z","timestamp":1438350031000},"page":"457-466","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Information-Centric Resource Management for Air Pollution Monitoring with Multihop Cellular Network Architecture"],"prefix":"10.1007","author":[{"given":"Pengbo","family":"Si","sequence":"first","affiliation":[]},{"given":"Qiuran","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yanhua","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yuguang","family":"Fang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,1]]},"reference":[{"key":"45_CR1","unstructured":"Pan, X., Li, G., Gao, T.: Dangerous breathing-PM2.5: measuring the human health and economic impacts on China\u2019s largest cities. Technical report, Greenpeace (2012)"},{"issue":"12","key":"45_CR2","doi-asserted-by":"publisher","first-page":"1669","DOI":"10.1049\/iet-com.2010.0574","volume":"5","author":"A Cuevas","year":"2011","unstructured":"Cuevas, A., Urue\u00f1a, M., Cuevas, R., Romeral, R.: Modelling data-aggregation in multi-replication data centric storage systems for wireless sensor and actor networks. IET Commun. 5(12), 1669\u20131681 (2011)","journal-title":"IET Commun."},{"key":"45_CR3","doi-asserted-by":"crossref","unstructured":"Chuang, T.-Y., Chen, K.-C., Poor, H.V.: Information centric sensor network management via community structure. IEEE Commun. Lett. 19(5), 767\u2013770 (2015)","DOI":"10.1109\/LCOMM.2015.2409070"},{"issue":"8","key":"45_CR4","doi-asserted-by":"publisher","first-page":"995","DOI":"10.1049\/iet-com:20070424","volume":"2","author":"F Zabin","year":"2008","unstructured":"Zabin, F., Misra, S., Woungang, I., Rashvand, H.F., Ma, N.-W., Ali, M.A.: REEP: data-centric, energy-efficient and reliable routing protocol for wireless sensor networks. IET Commun. 2(8), 995\u20131008 (2008)","journal-title":"IET Commun."},{"issue":"12","key":"45_CR5","doi-asserted-by":"publisher","first-page":"989","DOI":"10.1109\/LCOMM.2009.12.091596","volume":"13","author":"X Hoang","year":"2009","unstructured":"Hoang, X., Lee, Y.: An efficient scheme for reducing overhead in data-centric storage sensor networks. IEEE Commun. Lett. 13(12), 989\u2013991 (2009)","journal-title":"IEEE Commun. Lett."},{"issue":"4","key":"45_CR6","doi-asserted-by":"publisher","first-page":"1760","DOI":"10.1109\/TVT.2010.2041941","volume":"59","author":"P Si","year":"2010","unstructured":"Si, P., Ji, H., Yu, F.R., Leung, V.C.: Optimal cooperative internetwork spectrum sharing for cognitive radio systems with spectrum pooling. IEEE Trans. Veh. Technol. 59(4), 1760\u20131768 (2010)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"45_CR7","doi-asserted-by":"crossref","unstructured":"Si, P., Yu, F.R., Zhang, Y.: Joint cloud and radio resource management for video transmissions in mobile cloud computing networks. In: Proceedings of the IEEE International Conference on Communications (ICC), Sydney, Australia, pp. 2270\u20132275. IEEE, June 2014","DOI":"10.1109\/ICC.2014.6883661"},{"key":"45_CR8","series-title":"J. Appl. Probab.","first-page":"287","volume-title":"A Celebration of Applied Probability","author":"P Whittle","year":"1988","unstructured":"Whittle, P.: Restless bandits: activity allocation in a changing world. In: Gani, J. (ed.) A Celebration of Applied Probability. J. Appl. Probab., vol. 25, pp. 287\u2013298. Applied Probability Trust, Sheffield (1988)"},{"issue":"3","key":"45_CR9","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1109\/MAP.2003.1232163","volume":"45","author":"TK Sarkar","year":"2003","unstructured":"Sarkar, T.K., Ji, Z., Kim, K., Medouri, A., Salazar-Palma, M.: A survey of various propagation models for mobile communication. IEEE Antennas Propag. Mag. 45(3), 51\u201382 (2003)","journal-title":"IEEE Antennas Propag. Mag."},{"key":"45_CR10","unstructured":"Gusev, A., Chambers, N., Khaitan, P., Khilnani, D., Bethard, S., Jurafsky, D.: Using query patterns to learn the duration of events. In: Proceedings of the Ninth International Conference on Computational Semantics (IWCS), Oxford, UK, pp. 145\u2013154. Association for Computational Linguistics, January 2011"},{"issue":"8","key":"45_CR11","first-page":"1","volume":"10","author":"P Si","year":"2013","unstructured":"Si, P., Yu, F.R., Wang, H., Zhang, Y.: Optimal transmission behaviour policies of secondary users in proactive-optimization cognitive radio networks. China Commun. 10(8), 1\u201317 (2013)","journal-title":"China Commun."},{"issue":"1","key":"45_CR12","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1287\/opre.48.1.80.12444","volume":"48","author":"D Bertsimas","year":"2000","unstructured":"Bertsimas, D., Ni\u00f1o-Mora, J.: Restless bandits, linear programming relaxations, and a primal-dual index heuristic. Oper. Res. 48(1), 80\u201390 (2000)","journal-title":"Oper. Res."}],"container-title":["Lecture Notes in Computer Science","Wireless Algorithms, Systems, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-21837-3_45","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,21]],"date-time":"2023-02-21T09:56:38Z","timestamp":1676973398000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-21837-3_45"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319218366","9783319218373"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-21837-3_45","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"1 August 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}