{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T01:14:57Z","timestamp":1722906897128},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,4,10]],"date-time":"2014-04-10T00:00:00Z","timestamp":1397088000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1007\/s11277-014-1741-z","type":"journal-article","created":{"date-parts":[[2014,4,9]],"date-time":"2014-04-09T08:07:09Z","timestamp":1397030829000},"page":"151-169","source":"Crossref","is-referenced-by-count":11,"title":["Reliability Analysis for a Data Flow in Event-Driven Wireless Sensor Networks"],"prefix":"10.1007","volume":"78","author":[{"given":"Jie","family":"Cai","sequence":"first","affiliation":[]},{"given":"Xiaoyu","family":"Song","sequence":"additional","affiliation":[]},{"given":"Jinyuan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Ming","family":"Gu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,4,10]]},"reference":[{"issue":"12","key":"1741_CR1","doi-asserted-by":"crossref","first-page":"2292","DOI":"10.1016\/j.comnet.2008.04.002","volume":"52","author":"J Yick","year":"2008","unstructured":"Yick, J., Mukherjee, B., & Ghosal, D. (2008). Wireless sensor network survey. Computer Networks, 52(12), 2292\u20132330.","journal-title":"Computer Networks"},{"key":"1741_CR2","doi-asserted-by":"crossref","unstructured":"Romer, K., & Mattern, F. (Dec. 2004). The design space of wireless sensor networks. IEEE Wireless Communications, 11(6), 54\u201361.","DOI":"10.1109\/MWC.2004.1368897"},{"issue":"2","key":"1741_CR3","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1109\/TMC.2009.105","volume":"9","author":"K Xu","year":"2010","unstructured":"Xu, K., Hassanein, H., Takahara, G., & Wang, Q. (2010). Relay node deployment strategies in heterogeneous wireless sensor networks. IEEE Transactions on Mobile Computing, 9(2), 145\u2013159.","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"1","key":"1741_CR4","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1016\/j.engappai.2012.05.018","volume":"26","author":"S Sengupta","year":"2013","unstructured":"Sengupta, S., Das, S., Nasir, M., & Panigrahi, B. K. (2013). Multi-objective node deployment in wsns: In search of an optimal trade-off among coverage, lifetime, energy consumption, and connectivity. Engineering Applications of Artificial Intelligence, 26(1), 405\u2013416.","journal-title":"Engineering Applications of Artificial Intelligence"},{"key":"1741_CR5","unstructured":"Wang, N., Shen, X. L. (2009). Research on WSN nodes location technology in coal mine. In International forum on computer science-technology and applications (vol. 3, pp. 232\u2013234). Chongqing, China: IEEE."},{"key":"1741_CR6","unstructured":"Ho, D., & Shimamoto, S. (2011). Highly reliable communication protocol for WSN-UAV system employing TDMA and PFS scheme. In IEEE GLOBECOM workshops (pp. 1320\u20131324). Houston: IEEE."},{"issue":"2","key":"1741_CR7","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1109\/TR.2005.847268","volume":"54","author":"X Chen","year":"2005","unstructured":"Chen, X., & Lyu, M. (2005). Reliability analysis for various communication schemes in wireless CORBA. IEEE Transactions on Reliability, 54(2), 232\u2013242.","journal-title":"IEEE Transactions on Reliability"},{"issue":"6","key":"1741_CR8","doi-asserted-by":"crossref","first-page":"821","DOI":"10.1016\/j.ress.2006.04.021","volume":"92","author":"JL Cook","year":"2007","unstructured":"Cook, J. L., & Ramirez-Marquez, J. E. (2007). Two-terminal reliability analyses for a mobile ad hoc wireless network. Reliability Engineering and System Safety, 92(6), 821\u2013829.","journal-title":"Reliability Engineering and System Safety"},{"issue":"7","key":"1741_CR9","doi-asserted-by":"crossref","first-page":"1132","DOI":"10.1109\/JSAC.2009.090910","volume":"27","author":"G Egeland","year":"2009","unstructured":"Egeland, G., & Engelstad, P. (2009). The availability and reliability of wireless multi-hop networks with stochastic link failures. IEEE Journal on Selected Areas in Communications, 27(7), 1132\u20131146.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"1741_CR10","doi-asserted-by":"crossref","unstructured":"Kurp, T., Gao, R. X., Sah, S. (2010). An adaptive sampling scheme for improved energy utilization in wireless sensor networks. In Instrumentation and measurement technology conference (I2MTC), 2010 IEEE (pp. 93\u201398), 3\u20136 May 2010.","DOI":"10.1109\/IMTC.2010.5488247"},{"key":"1741_CR11","doi-asserted-by":"crossref","unstructured":"AboElFotoh, H. M. F., ElMallah, E. S., & Hassanein, H. S. (2006). On the reliability of wireless sensor networks. In IEEE International Conference on Communications, ICC 06 (vol. 8, pp. 3455\u20133460).","DOI":"10.1109\/ICC.2006.255607"},{"key":"1741_CR12","doi-asserted-by":"crossref","unstructured":"Korkmaz, T., Sarac, K. (2010). Characterizing link and path reliability in large-scale wireless sensor networks. In Wireless and mobile computing, networking and communications (WiMob), IEEE 6th international conference on 2010 (pp. 217\u2013224), IEEE.","DOI":"10.1109\/WIMOB.2010.5644996"},{"key":"1741_CR13","doi-asserted-by":"crossref","unstructured":"Shazly, M. H., Elmallah, E. S., AboElFotoh, H. (2010). A three-state node reliability model for sensor networks. In 2010 IEEE global telecommunications conference.","DOI":"10.1109\/GLOCOM.2010.5683750"},{"issue":"3","key":"1741_CR14","doi-asserted-by":"crossref","first-page":"675","DOI":"10.1109\/TR.2011.2135650","volume":"60","author":"B-C Cheng","year":"2011","unstructured":"Cheng, B.-C., Yeh, H.-H., & Hsu, P.-H. (2011). Schedulability analysis for hard network lifetime wireless sensor networks with high energy first clustering. IEEE Transactions on Reliability, 60(3), 675\u2013688.","journal-title":"IEEE Transactions on Reliability"},{"key":"1741_CR15","doi-asserted-by":"crossref","DOI":"10.1007\/1-84628-295-0","volume-title":"System software reliability","author":"H Pham","year":"2006","unstructured":"Pham, H. (2006). System software reliability. London: Springer."},{"key":"1741_CR16","volume-title":"Wireless communications: Principles and practice","author":"TS Rappaport","year":"2001","unstructured":"Rappaport, T. S. (2001). Wireless communications: Principles and practice (2nd ed.). New Jersey: Prentice Hall PTR.","edition":"2"},{"key":"1741_CR17","unstructured":"Benjamin, A. T., Quinn, J. (2003). Proofs that really count: The art of combinatorial proof. Mathematical Association of America."},{"key":"1741_CR18","volume-title":"WCDMA for UMTS\u2013Radio access for third generation mobile communications","author":"H Holma","year":"2001","unstructured":"Holma, H., & Toskala, A. (2001). WCDMA for UMTS\u2013Radio access for third generation mobile communications. Hoboken, NJ: Wiley."},{"key":"1741_CR19","unstructured":"UMTS 30.03. (1998). Annex B: Test environments and deployment models, TR 101 1112 v. 3.2.0, April."},{"key":"1741_CR20","unstructured":"Pitman, J. (1993). Probability (edition). Springer Publishers, p. 372."},{"key":"1741_CR21","unstructured":"http:\/\/en.wikipedia.org\/wiki\/Geometric_distribution ."},{"key":"1741_CR22","unstructured":"http:\/\/en.wikipedia.org\/wiki\/Negative_binomial_distribution ."},{"key":"1741_CR23","volume-title":"Handbook of the poisson distribution","author":"A Haight","year":"1967","unstructured":"Haight, A. (1967). Handbook of the poisson distribution. New York: John Wiley & Sons."},{"key":"1741_CR24","unstructured":"http:\/\/en.wikipedia.org\/wiki\/Poisson_distribution#cite_note-Garwood1936-10 ."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-014-1741-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-014-1741-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-014-1741-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T10:23:18Z","timestamp":1565346198000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-014-1741-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4,10]]},"references-count":24,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,9]]}},"alternative-id":["1741"],"URL":"https:\/\/doi.org\/10.1007\/s11277-014-1741-z","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,4,10]]}}}