{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:23:37Z","timestamp":1740122617115,"version":"3.37.3"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2016,8,17]],"date-time":"2016-08-17T00:00:00Z","timestamp":1471392000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,8,17]],"date-time":"2016-08-17T00:00:00Z","timestamp":1471392000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100000083","name":"Directorate for Computer and Information Science and Engineering","doi-asserted-by":"publisher","award":["CNS-0737325","CNS-0716211","CCF-0829827"],"award-info":[{"award-number":["CNS-0737325","CNS-0716211","CCF-0829827"]}],"id":[{"id":"10.13039\/100000083","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS- 1059265"],"award-info":[{"award-number":["CNS- 1059265"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2017,2]]},"DOI":"10.1007\/s11277-016-3607-z","type":"journal-article","created":{"date-parts":[[2016,8,17]],"date-time":"2016-08-17T14:21:36Z","timestamp":1471443696000},"page":"1303-1332","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Bio-inspired Patrolling Scheme Design in Wireless and Mobile Sensor and Robot Networks"],"prefix":"10.1007","volume":"92","author":[{"given":"Yanping","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Yang","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Yun","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Patrick","family":"Mosca","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,17]]},"reference":[{"issue":"5","key":"3607_CR1","doi-asserted-by":"publisher","first-page":"723","DOI":"10.1007\/s11036-006-7798-5","volume":"11","author":"L Wang","year":"2006","unstructured":"Wang, L., & Xiao, Y. (2006). A survey of energy-efficient scheduling mechanisms in sensor networks. ACM\/Springer Mobile Networks and Applications (MONET), \n                           11(5), 723\u2013740.","journal-title":"ACM\/Springer Mobile Networks and Applications (MONET)"},{"issue":"6","key":"3607_CR2","doi-asserted-by":"publisher","first-page":"562","DOI":"10.1109\/TPDS.2006.77","volume":"17","author":"C Liu","year":"2006","unstructured":"Liu, C., Wu, K., Xiao, Y., & Sun, B. (2006). Random coverage with guaranteed connectivity: Joint scheduling for wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, \n                           17(6), 562\u2013575.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"6","key":"3607_CR3","doi-asserted-by":"publisher","first-page":"837","DOI":"10.1007\/s11036-005-4442-8","volume":"10","author":"K Wu","year":"2005","unstructured":"Wu, K., Gao, Y., Li, F., & Xiao, Y. (2005). Lightweight deployment-aware scheduling for wireless sensor networks. ACM\/Springer Mobile Networks and Applications (MONET) Journal, \n                           10(6), 837\u2013852.","journal-title":"ACM\/Springer Mobile Networks and Applications (MONET) Journal"},{"issue":"12","key":"3607_CR4","doi-asserted-by":"publisher","first-page":"2022","DOI":"10.1016\/j.comnet.2009.02.023","volume":"53","author":"S Ozdemir","year":"2009","unstructured":"Ozdemir, S., & Xiao, Y. (2009). Secure data aggregation in wireless sensor networks: A comprehensive overview. Computer Networks, \n                           53(12), 2022\u20132037.","journal-title":"Computer Networks"},{"issue":"7","key":"3607_CR5","doi-asserted-by":"publisher","first-page":"964","DOI":"10.1002\/wcm.863","volume":"11","author":"Y Xiao","year":"2011","unstructured":"Xiao, Y., & Zhang, Y. (2011). Divide- and conquer-based surveillance framework using robots, sensor nodes, and RFID tags. Wireless Communications and Mobile Computing (WCMC), \n                           11(7), 964\u2013979.","journal-title":"Wireless Communications and Mobile Computing (WCMC)"},{"issue":"2","key":"3607_CR6","first-page":"423","volume":"52","author":"Y Xiao","year":"2013","unstructured":"Xiao, Y., & Zhang, Y. (2013). A critical line based boundary surveillance strategy in wireless sensor networks. Telecommunication Systems Journal, \n                           52(2), 423\u2013434.","journal-title":"Telecommunication Systems Journal"},{"issue":"4","key":"3607_CR7","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1145\/2019591.2019595","volume":"6","author":"Y Xiao","year":"2011","unstructured":"Xiao, Y., Zhang, Y., & Liang, X. (2011). Primate-inspired communication methods for mobile and static sensors and RFID tags. ACM Transactions on Autonomous and Adaptive Systems, \n                           6(4), 26. doi:\n                    10.1145\/2019591.2019595\n                    \n                  .","journal-title":"ACM Transactions on Autonomous and Adaptive Systems"},{"key":"3607_CR8","unstructured":"History of US Drones: The rise of the predator empire: Tracing the history of US Drones. \n                    https:\/\/understandingempire.wordpress.com\/2-0-a-brief-history-of-u-s-drones\/\n                    \n                  ."},{"key":"3607_CR9","unstructured":"http:\/\/www.lyftvsuber.com\/\n                    \n                  ."},{"issue":"4","key":"3607_CR10","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1504\/IJSNET.2013.059086","volume":"14","author":"J He","year":"2013","unstructured":"He, J., & Xu, Z. (2013). Authentication and search mechanism for diffusing RFID-sensor networks. International Journal of Sensor Networks, \n                           14(4), 211\u2013217.","journal-title":"International Journal of Sensor Networks"},{"issue":"4","key":"3607_CR11","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1504\/IJSNET.2009.027629","volume":"5","author":"Y Zhang","year":"2009","unstructured":"Zhang, Y., Xiao, Y., & Bales, K. L. (2009). Primate social systems, scent-marking, and their applications in mobile and static sensor networks. International Journal of Sensor Networks, \n                           5(4), 210\u2013222.","journal-title":"International Journal of Sensor Networks"},{"key":"3607_CR12","doi-asserted-by":"crossref","unstructured":"Zhang, Y., & Xiao, Y. (2009). Primate-inspired scent marking for mobile and static sensors and RFID tags. In Proceedings of 18th international conference on computer communications and networks, 2009 (ICCCN 2009).","DOI":"10.1109\/ICCCN.2009.5235294"},{"key":"3607_CR13","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1016\/S0303-2647(97)01708-5","volume":"43","author":"M Dorigo","year":"1997","unstructured":"Dorigo, M., & Gambardella, L. M. (1997). Ant colonies for the traveling salesman problem. BioSystems, \n                           43, 73\u201381.","journal-title":"BioSystems"},{"key":"3607_CR14","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/1290.001.0001","volume-title":"Ant colony optimization","author":"M Dorigo","year":"2004","unstructured":"Dorigo, M., & St\u00fctzle, T. (2004). Ant colony optimization. Cambridge: MIT Press."},{"key":"3607_CR15","first-page":"36","volume-title":"Proceedings of the autonomic and autonomous space exploration systems (A&A-SES-1) at 2005 international conference software engineering research and practice (SERP\u201905)","author":"MG Hinchey","year":"2005","unstructured":"Hinchey, M. G., Rash, J. L., Truszkowski, W. F., Rouff, C. A., & Sterritt, R. (2005). Autonomous and autonomic swarms. Proceedings of the autonomic and autonomous space exploration systems (A&A-SES-1) at 2005 international conference software engineering research and practice (SERP\u201905) (pp. 36\u201342). Las Vegas, NV: CREA Press."},{"key":"3607_CR16","doi-asserted-by":"crossref","unstructured":"Marwaha, S., Indulska, J., & Portmann, M. (2009). Biologically inspired ant-based routing in mobile ad hoc networks (MANET): A survey. In The sixth international conference on ubiquitous intelligence and computing.","DOI":"10.1109\/UIC-ATC.2009.95"},{"issue":"5","key":"3607_CR17","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1109\/TSMCC.2010.2046411","volume":"4","author":"Y Liang","year":"2010","unstructured":"Liang, Y., Cao, J., Zhang, L., Wang, R., & Pan, Q. (2010). A biologically inspired sensor wakeup control method for wireless sensor networks. IEEE Transactions on Systems, Man, and Cybernetics Part C: Applications and Reviews, \n                           4(5), 525\u2013538.","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics Part C: Applications and Reviews"},{"key":"3607_CR18","doi-asserted-by":"crossref","unstructured":"Ota, K., Dong, M., Wang, J., Guo, S., Cheng, Z., & Guo, M. (2010). Dynamic itinerary planning for mobile agents with a content-specific approach in wireless sensor networks. In Proceedings of 2010 IEEE 72nd vehicular technology conference.","DOI":"10.1109\/VETECF.2010.5594122"},{"key":"3607_CR19","doi-asserted-by":"crossref","unstructured":"Chawathe, S. (2007). Organizing hot-spot police patrol routes. In Proceedings of IEEE 2007 intelligence and security informatics.","DOI":"10.1109\/ISI.2007.379538"},{"key":"3607_CR20","doi-asserted-by":"crossref","unstructured":"Chang, C., Lin, C., Hsieh, C., & Ho, Y. (2011). Patrolling mechanisms for disconnected targets in wireless mobile data mules networks. In The 2011 IEEE international conference on parallel processing (IEEE ICPP), Taiwan.","DOI":"10.1109\/ICPP.2011.25"},{"key":"3607_CR21","unstructured":"Liu, Z., Kwiatkowska M.Z., & Constantinou, C. (2005). A biologically inspired congestion control routing algorithm for MANETs. In Third IEEE international conference on pervasive computing and communications workshops, 2005. PerCom 2005 workshops (pp. 226\u2013231)."},{"issue":"2","key":"3607_CR22","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1504\/IJSNET.2009.024680","volume":"5","author":"J Liu","year":"2009","unstructured":"Liu, J., Xiao, Y., Hao, Q., & Ghaboosi, K. (2009). Bio-inspired visual attention in agile sensing for target detection. International Journal of Sensor Networks, \n                           5(2), 98\u2013111.","journal-title":"International Journal of Sensor Networks"},{"issue":"3","key":"3607_CR23","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1504\/IJSNET.2015.068183","volume":"17","author":"S Ling-Dong","year":"2015","unstructured":"Ling-Dong, S., Ming-Yue, Z., & Qi-Lin, M. (2015). Target tracking of binary wireless sensor networks in the domain of medicine and healthcare. International Journal of Sensor Networks, \n                           17(3), 188\u2013194.","journal-title":"International Journal of Sensor Networks"},{"issue":"1","key":"3607_CR24","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1504\/IJSNET.2014.065784","volume":"16","author":"L Shi","year":"2014","unstructured":"Shi, L., & Tan, J. (2014). Two-tier target tracking framework in distributed sensor networks. International Journal of Sensor Networks, \n                           16(1), 32\u201340.","journal-title":"International Journal of Sensor Networks"},{"issue":"8","key":"3607_CR25","doi-asserted-by":"publisher","first-page":"1011","DOI":"10.1002\/wcm.660","volume":"8","author":"Y Huang","year":"2008","unstructured":"Huang, Y., Liang, W., Yu, H.-B., & Xiao, Y. (2008). Target tracking based on a distributed particle filter in underwater sensor networks. Wireless Communications and Mobile Computing (WCMC), \n                           8(8), 1011\u20131022.","journal-title":"Wireless Communications and Mobile Computing (WCMC)"},{"key":"3607_CR26","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.autcon.2012.05.016","volume":"28","author":"D Grau","year":"2012","unstructured":"Grau, D., Zeng, L., & Xiao, Y. (2012). Automatically tracking engineered components through shipping and receiving processes with passive identification technologies. Automation in Construction, \n                           28, 36\u201344.","journal-title":"Automation in Construction"},{"issue":"1","key":"3607_CR27","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/s11277-014-1748-5","volume":"78","author":"S Xie","year":"2014","unstructured":"Xie, S., & Wang, Y. (2014). Construction of tree network with limited delivery latency in homogeneous wireless sensor networks. Wireless Personal Communications, \n                           78(1), 231\u2013246.","journal-title":"Wireless Personal Communications"},{"issue":"1","key":"3607_CR28","first-page":"171","volume":"16","author":"J Shen","year":"2015","unstructured":"Shen, J., Tan, H., Wang, J., Wang, J., & Lee, S. (2015). A novel routing protocol providing good transmission reliability in underwater sensor networks. Journal of Internet Technology, \n                           16(1), 171\u2013178.","journal-title":"Journal of Internet Technology"},{"issue":"1","key":"3607_CR29","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1109\/TCYB.2014.2320717","volume":"45","author":"B Fu","year":"2015","unstructured":"Fu, B., Xiao, Y., Liang, X., & Chen, C. L. P. (2015). Bio-inspired group modeling and analysis for intruder detection in mobile sensor\/robotic networks. IEEE Transactions on Cybernetics, \n                           45(1), 103\u2013115.","journal-title":"IEEE Transactions on Cybernetics"},{"issue":"3","key":"3607_CR30","doi-asserted-by":"publisher","first-page":"683","DOI":"10.1109\/TSMCB.2009.2034976","volume":"40","author":"X Liang","year":"2010","unstructured":"Liang, X., & Xiao, Y. (2010). Studying bio-inspired coalition formation of robots for detecting intrusions using game theory. IEEE Transactions on Systems, Man, and Cybernetics, Part B, Special Issue on Game Theory, \n                           40(3), 683\u2013693.","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part B, Special Issue on Game Theory"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-016-3607-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-016-3607-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-016-3607-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-016-3607-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,17]],"date-time":"2020-05-17T14:10:00Z","timestamp":1589724600000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-016-3607-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,17]]},"references-count":30,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,2]]}},"alternative-id":["3607"],"URL":"https:\/\/doi.org\/10.1007\/s11277-016-3607-z","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2016,8,17]]},"assertion":[{"value":"17 August 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}