{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T10:38:14Z","timestamp":1725619094650},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642245497"},{"type":"electronic","value":"9783642245503"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-24550-3_3","type":"book-chapter","created":{"date-parts":[[2011,10,8]],"date-time":"2011-10-08T06:56:37Z","timestamp":1318056997000},"page":"5-18","source":"Crossref","is-referenced-by-count":0,"title":["The K-Observer Problem in Computer Networks"],"prefix":"10.1007","author":[{"given":"H. B.","family":"Acharya","sequence":"first","affiliation":[]},{"given":"Taehwan","family":"Choi","sequence":"additional","affiliation":[]},{"given":"Rida A.","family":"Bazzi","sequence":"additional","affiliation":[]},{"given":"Mohamed G.","family":"Gouda","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Acharya, H.B., Joshi, A., Gouda, M.G.: Firewall modules and modular firewalls. In: Proceedings of the 18TH IEEE International Conference on Network Protocols, ICNP 2010 (2010)","key":"3_CR1","DOI":"10.1109\/ICNP.2010.5762766"},{"key":"3_CR2","first-page":"157","volume-title":"Proceedings of the 3rd ACM International Symposium on Mobile ad Hoc Networking & Computing, MobiHoc 2002","author":"K.M. Alzoubi","year":"2002","unstructured":"Alzoubi, K.M., Wan, P.-J., Frieder, O.: Message-optimal connected dominating sets in mobile ad hoc networks. In: Proceedings of the 3rd ACM International Symposium on Mobile ad Hoc Networking & Computing, MobiHoc 2002, pp. 157\u2013164. ACM, New York (2002)"},{"doi-asserted-by":"crossref","unstructured":"Armbruster, B., Smith, J.C., Park, K.: A packet filter placement problem with application to defense against spoofed denial of service attacks. European Journal of Operational Research (2007)","key":"3_CR3","DOI":"10.1016\/j.ejor.2005.09.031"},{"doi-asserted-by":"crossref","unstructured":"Breslau, L., Diakonikolas, I., Duffield, N., Gu, Y., Hajiaghayi, M., Johnson, D.S., Karloff, H., Resende, M., Sen, S.: Disjoint-path facility location: Theory and practice. In: Proceedings of the Thirteenth Workshop on Algorithm Engineering and Experiments, ALENEX (2011)","key":"3_CR4","DOI":"10.1137\/1.9781611972917.7"},{"key":"3_CR5","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1109\/35.587723","volume":"35","author":"K. Calvert","year":"1997","unstructured":"Calvert, K., Doar, M.B., Nexion, A., Zegura, E.W.: Modeling internet topology. IEEE Communications Magazine\u00a035, 160\u2013163 (1997)","journal-title":"IEEE Communications Magazine"},{"key":"3_CR6","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1023\/A:1016542229220","volume":"8","author":"B. Chen","year":"2002","unstructured":"Chen, B., Jamieson, K., Balakrishnan, H., Morris, R.: Span: an energy-efficient coordination algorithm for topology maintenance in ad hoc wireless networks. Wirel. Netw.\u00a08, 481\u2013494 (2002)","journal-title":"Wirel. Netw."},{"doi-asserted-by":"crossref","unstructured":"Chv\u00e1tal, V.: A combinatorial theorem in plane geometry. Journal of Combinatorial Theory, Series B, 39\u201341 (1975)","key":"3_CR7","DOI":"10.1016\/0095-8956(75)90061-1"},{"key":"3_CR8","first-page":"251","volume-title":"Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, SIGCOMM 1999","author":"M. Faloutsos","year":"1999","unstructured":"Faloutsos, M., Faloutsos, P., Faloutsos, C.: On power-law relationships of the internet topology. In: Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, SIGCOMM 1999, pp. 251\u2013262. ACM, New York (1999)"},{"key":"3_CR9","volume-title":"Computers and Intractability; A Guide to the Theory of NP-Completeness","author":"M.R. Garey","year":"1990","unstructured":"Garey, M.R., Johnson, D.S.: Computers and Intractability; A Guide to the Theory of NP-Completeness. W. H. Freeman & Co., New York (1990)"},{"key":"3_CR10","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1145\/941350.941367","volume-title":"Proceedings of the 2nd ACM International Conference on Wireless Sensor Networks and Applications, WSNA 2003","author":"C.-F. Huang","year":"2003","unstructured":"Huang, C.-F., Tseng, Y.-C.: The coverage problem in a wireless sensor network. In: Proceedings of the 2nd ACM International Conference on Wireless Sensor Networks and Applications, WSNA 2003, pp. 115\u2013121. ACM, New York (2003)"},{"key":"3_CR11","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/978-1-4684-2001-2_9","volume-title":"Complexity of Computer Computations","author":"R. Karp","year":"1972","unstructured":"Karp, R.: Reducibility among combinatorial problems. In: Miller, R., Thatcher, J. (eds.) Complexity of Computer Computations, pp. 85\u2013103. Plenum Press, New York (1972)"},{"key":"3_CR12","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1023\/A:1011478628358","volume":"6","author":"S.-J. Lee","year":"2001","unstructured":"Lee, S.-J., Su, W., Gerla, M.: Wireless ad hoc multicast routing with mobility prediction. Mob. Netw. Appl.\u00a06, 351\u2013360 (2001)","journal-title":"Mob. Netw. Appl."},{"doi-asserted-by":"crossref","unstructured":"Meguerdichian, S., Koushanfar, F., Potkonjak, M., Srivastava, M.B.: Coverage problems in wireless ad-hoc sensor networks. In: Prodeedings of IEEE INFOCOM, pp. 1380\u20131387 (2001)","key":"3_CR13","DOI":"10.1109\/INFCOM.2001.916633"},{"unstructured":"Qiu, L., Padmanabhan, V.N., Voelker, G.M.: On the placement of web server replicas. In: Proceedings of IEEE INFOCOM, pp. 1587\u20131596 (2001)","key":"3_CR14"},{"doi-asserted-by":"crossref","unstructured":"Qiu, T., Ji, L., Pei, D., Wang, J., Xu, J.: Towerdefense: Deployment strategies for battling against ip prefix hijacking. In: Proceedings of the 18th IEEE International Conference on Network Protocols, ICNP (October 2010)","key":"3_CR15","DOI":"10.1109\/ICNP.2010.5762762"},{"doi-asserted-by":"crossref","unstructured":"Roy, S., Pucha, H., Zhang, Z., Hu, Y.C., Qiu, L.: Overlay node placement: Analysis, algorithms and impact on applications. In: International Conference on Distributed Computing Systems, p. 53 (2007)","key":"3_CR16","DOI":"10.1109\/ICDCS.2007.127"},{"key":"3_CR17","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1023\/B:MONE.0000013625.87793.13","volume":"9","author":"P.-J. Wan","year":"2004","unstructured":"Wan, P.-J., Alzoubi, K.M., Frieder, O.: Distributed construction of connected dominating set in wireless ad hoc networks. Mob. Netw. Appl.\u00a09, 141\u2013149 (2004)","journal-title":"Mob. Netw. Appl."},{"key":"3_CR18","volume-title":"Theory of the Location of Industries","author":"A. Weber","year":"1909","unstructured":"Weber, A.: Theory of the Location of Industries. The University of Chicago Press, Chicago (1909)"},{"key":"3_CR19","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1145\/313239.313261","volume-title":"Proceedings of the 3rd International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications, DIALM 1999","author":"J. Wu","year":"1999","unstructured":"Wu, J., Li, H.: On calculating connected dominating set for efficient routing in ad hoc wireless networks. In: Proceedings of the 3rd International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications, DIALM 1999, pp. 7\u201314. ACM, New York (1999)"}],"container-title":["Lecture Notes in Computer Science","Stabilization, Safety, and Security of Distributed Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-24550-3_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,17]],"date-time":"2019-06-17T06:53:30Z","timestamp":1560754410000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-24550-3_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642245497","9783642245503"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-24550-3_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}