{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T12:47:58Z","timestamp":1772196478297,"version":"3.50.1"},"reference-count":15,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2006,3,31]],"date-time":"2006-03-31T00:00:00Z","timestamp":1143763200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2006,4]]},"DOI":"10.1007\/s11036-006-4471-y","type":"journal-article","created":{"date-parts":[[2006,4,1]],"date-time":"2006-04-01T09:26:40Z","timestamp":1143883600000},"page":"187-200","source":"Crossref","is-referenced-by-count":178,"title":["Locating and Bypassing Holes in Sensor Networks"],"prefix":"10.1007","volume":"11","author":[{"given":"Qing","family":"Fang","sequence":"first","affiliation":[]},{"given":"Jie","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Leonidas J.","family":"Guibas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,3,31]]},"reference":[{"key":"4471_CR1","doi-asserted-by":"crossref","unstructured":"P. Bose, P. Morin, I. Stojmenovic and J, Urrutia, Routing with guaranteed delivery in ad hoc wireless networks. In Proceedings of the 3rd International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications (DialM \u201999) (1999) pp. 48\u201355.","DOI":"10.1145\/313239.313282"},{"key":"4471_CR2","doi-asserted-by":"crossref","unstructured":"S. Bruck, J. Gao and A. Jiang, Localization and routing in sensor networks by local angle information. In Proc. 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc\u201905), (May 2005)","DOI":"10.1145\/1062689.1062713"},{"key":"4471_CR3","unstructured":"D. Ganesan and D. Estrin, DIMENSIONS: Why do we need a new data handling architecture for sensor networks? In Proceedings of the ACM Workshop on Hot Topics in Networks (ACM Princeton, NJ, USA, Oct. 2002), pp. 143\u2013148."},{"key":"4471_CR4","doi-asserted-by":"crossref","unstructured":"J. Gao, L.J. Guibas, J. Hershberger, L. Zhang and A. Zhu, Geometric spanner for routing in mobile networks. In Proc. 2nd ACM Symposium in Mobile Ad Hoc Networking and Computing, (2001) pp. 45\u201355.","DOI":"10.1145\/501416.501424"},{"key":"4471_CR5","doi-asserted-by":"crossref","unstructured":"B. Karp and H. Kung, GPSR: Greedy perimeter stateless routing for wireless networks. In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MobiCom), (2000) pp. 243\u2013254.","DOI":"10.1145\/345910.345953"},{"key":"4471_CR6","unstructured":"E. Karnakis, H. Singh and J. Urrutia, Compass routing on geometric networks. In Proc. 11th Canadian Conference on Computational Gemetry (Vancouver, Aug. 1999) pp. 51\u201354."},{"key":"4471_CR7","doi-asserted-by":"crossref","unstructured":"F. Kuhn, R. Wattenhofer and A. Zollinger, Asymptotically optimal geometric mobile ad-hoc routing. In Proceedings of the 3rd International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications, (2002) pp. 24\u201333.","DOI":"10.1145\/570810.570814"},{"key":"4471_CR8","doi-asserted-by":"crossref","unstructured":"F. Kuhn, R. Wattenhofer and A. Zollinger, Worst-case optimal and average-case efficient geometric ad-hoc routing. In Proc. 4th ACM Symposium on Mobile Ad Hoc Networking and Computing, (2003) pp. 267\u2013278.","DOI":"10.1145\/778415.778447"},{"key":"4471_CR9","unstructured":"J. Li, J. Jannotti, D.S.J.D. Couto, D. R. Karger and R. Morris, A scalable location service for geographic ad-hoc rorting. In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MobiCom), (2003) pp. 120\u2013130."},{"issue":"10","key":"4471_CR10","first-page":"1035","volume":"14","author":"X. Li","year":"October 2003","unstructured":"X. Li, G. Calinescu, P. Wan and Y. Wang, Localized delaunay triangulation with application in ad hoc wireless networks. IEEE Transaction on Parallel and Distributed System 14(10) (2003) 1035\u20131047.","journal-title":"IEEE Transaction on Parallel and Distributed System"},{"issue":"8","key":"4471_CR11","doi-asserted-by":"crossref","first-page":"1472","DOI":"10.1109\/JSAC.2002.803067","volume":"20","author":"J. Liebeherr","year":"October 2002","unstructured":"J. Liebeherr, M. Nahas and W. Si, Application-layer multicasting with delaunay triangulation overlays, IEEE Journal on Selected Areas in Communications, 20(8) (2002) 1472\u20131488.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"6","key":"4471_CR12","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/65.967595","volume":"15","author":"M. Mauve","year":"November 2001","unstructured":"M. Mauve, J. Widmer and H. Hartenstein, A survey on position-based routing in mobile ad hoc networks. IEEE Network Magazine, 15(6) (2001) 30\u201339.","journal-title":"IEEE Network Magazine"},{"key":"4471_CR13","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4612-1098-6","volume-title":"Computational Geometry: An Introduction","author":"F. P. Preparata","year":"1985","unstructured":"F.P. Preparata and M.I. Shamos, Computational Geometry: An Introduction (Springer-Verlag, New York, NY, 1985)."},{"key":"4471_CR14","doi-asserted-by":"crossref","unstructured":"S. Ratnasamy, B. Karp, L. Yin, F. Yu, D. Estrin, R. Govindan and S. Shenker, GHT: A geographic hash table for data-centric storage in sensornets. In Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Applications (WSNA) (2002) pp. 78\u201387.","DOI":"10.1145\/570738.570750"},{"key":"4471_CR15","doi-asserted-by":"crossref","unstructured":"J. Urrutia, Routing with guaranteed delivery in geometric and wirelss networks. In I. Stojmenovic, editor, Handbook of Wireless Networks and Mobile Computing (John Wiley and Sons, 2002) pp. 393\u2013406.","DOI":"10.1002\/0471224561.ch18"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-006-4471-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11036-006-4471-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-006-4471-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T03:15:59Z","timestamp":1559358959000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11036-006-4471-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,3,31]]},"references-count":15,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2006,4]]}},"alternative-id":["4471"],"URL":"https:\/\/doi.org\/10.1007\/s11036-006-4471-y","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,3,31]]}}}