{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,9]],"date-time":"2025-02-09T05:17:25Z","timestamp":1739078245281,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540922940"},{"type":"electronic","value":"9783540922957"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-92295-7_38","type":"book-chapter","created":{"date-parts":[[2009,3,25]],"date-time":"2009-03-25T08:00:00Z","timestamp":1237968000000},"page":"318-324","source":"Crossref","is-referenced-by-count":0,"title":["Field Sensing and Target Tracking Using Mobile Sensors"],"prefix":"10.1007","author":[{"given":"Parchand Amit","family":"Madhukar","sequence":"first","affiliation":[]},{"given":"R. K.","family":"Ghosh","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"38_CR1","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1007\/s11036-005-1564-y","volume":"10","author":"T. Huang","year":"2003","unstructured":"Huang, T., Tseng, Y.: Coverage problems in wireless sensor networks. ACM Mobile Networks and Applications (MONET), special issue on Wireless Sensor Networks\u00a010(4), 519\u2013528 (2003)","journal-title":"ACM Mobile Networks and Applications (MONET), special issue on Wireless Sensor Networks"},{"key":"38_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1007\/3-540-36978-3_31","volume-title":"Information Processing in Sensor Networks","author":"J. Hui","year":"2003","unstructured":"Hui, J., Ren, Z., Krogh, B.H.: Sentry based power management in wireless sensor networks. In: Zhao, F., Guibas, L.J. (eds.) IPSN 2003. LNCS, vol.\u00a02634, pp. 459\u2013472. Springer, Heidelberg (2003)"},{"key":"38_CR3","doi-asserted-by":"crossref","unstructured":"Ngai, E.C.H., Liu, J., Lyu1, M.R.: On the intruder detection for sinkhole attack in wireless sensor networks. In: IEEE International Conference on Communication (ICC), vol.\u00a08, pp. 3383\u20133389 (2006)","DOI":"10.1109\/ICC.2006.255595"},{"key":"38_CR4","first-page":"1915","volume-title":"Wireless Communications and Networking Conference","author":"Z. Yu","year":"2005","unstructured":"Yu, Z., Guan, Y.: A robust group-based key management scheme for woreless sensor networks. In: Wireless Communications and Networking Conference, vol.\u00a04, pp. 1915\u20131920. IEEE, Los Alamitos (2005)"},{"issue":"1","key":"38_CR5","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/TNET.2005.863478","volume":"14","author":"H. Gupta","year":"2006","unstructured":"Gupta, H., Zhou, Z., Das, S.R., Gu, Q.: Connected sensor cover: self-organization of sensor networks for efficient query execution. IEEE\/ACM Transactions on Network\u00a014(1), 55\u201367 (2006)","journal-title":"IEEE\/ACM Transactions on Network"},{"issue":"5","key":"38_CR6","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1109\/70.880813","volume":"16","author":"S.S. Ge","year":"2000","unstructured":"Ge, S.S., Cui, Y.J.: New potential functions for mobile robot path planning. IEEE Transaction on Robotics and Automation\u00a016(5), 615\u2013620 (2000)","journal-title":"IEEE Transaction on Robotics and Automation"},{"issue":"2","key":"38_CR7","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1109\/21.148426","volume":"22","author":"J. Barraquand","year":"1992","unstructured":"Barraquand, J., Langlois, B., Latombe, J.C.: Numerical potential field techniques for robot path planning. IEEE Transactions on Systems, Man and Cybernetics\u00a022(2), 224\u2013241 (1992)","journal-title":"IEEE Transactions on Systems, Man and Cybernetics"}],"container-title":["Lecture Notes in Computer Science","Distributed Computing and Networking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-92295-7_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,8]],"date-time":"2025-02-08T17:25:56Z","timestamp":1739035556000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-92295-7_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540922940","9783540922957"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-92295-7_38","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}