{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T22:24:27Z","timestamp":1757456667384},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2017,4,3]],"date-time":"2017-04-03T00:00:00Z","timestamp":1491177600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2017,8]]},"DOI":"10.1007\/s11277-017-4113-7","type":"journal-article","created":{"date-parts":[[2017,4,3]],"date-time":"2017-04-03T10:59:12Z","timestamp":1491217152000},"page":"4681-4696","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["A Strategic Framework for Searching Mobile Targets Using Mobile Sensors"],"prefix":"10.1007","volume":"95","author":[{"given":"Tanmoy","family":"Hazra","sequence":"first","affiliation":[]},{"given":"Manisha J.","family":"Nene","sequence":"additional","affiliation":[]},{"given":"C. R. S.","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,4,3]]},"reference":[{"issue":"3","key":"4113_CR1","doi-asserted-by":"crossref","first-page":"521","DOI":"10.4304\/jnw.6.3.521-532","volume":"6","author":"S Shen","year":"2011","unstructured":"Shen, S., Yue, G., & Cao, Q. (2011). A survey of game theory in wireless sensor networks security. Journal of Networks, 6(3), 521\u2013532.","journal-title":"Journal of Networks"},{"issue":"7","key":"4113_CR2","doi-asserted-by":"crossref","first-page":"9055","DOI":"10.3390\/s120709055","volume":"12","author":"HY Shi","year":"2012","unstructured":"Shi, H. Y., Wang, W. L., Kwok, N. M., & Chen, S. Y. (2012). Game theory for wireless sensor networks: A survey. Sensors, 12(7), 9055\u20139097.","journal-title":"Sensors"},{"key":"4113_CR3","doi-asserted-by":"crossref","first-page":"3047","DOI":"10.1016\/j.gaceta.2008.07.003","volume":"52","author":"R Machado","year":"2008","unstructured":"Machado, R., & Tekinay, S. (2008). A survey of game-theoretic approaches in wireless sensor networks. Computer Networks, 52, 3047\u20133061.","journal-title":"Computer Networks"},{"key":"4113_CR4","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1016\/j.future.2013.12.014","volume":"39","author":"J Zheng","year":"2014","unstructured":"Zheng, J., Bhuiyan, M. Z. A., Liang, S., Xing, X., & Wang, G. (2014). Auction-based adaptive sensor activation algorithm for target tracking in wireless sensor networks. Future Generation Computer Systems, 39, 88\u201399.","journal-title":"Future Generation Computer Systems"},{"issue":"6","key":"4113_CR5","first-page":"935","volume":"8","author":"J Berger","year":"2014","unstructured":"Berger, J., Lo, N., & Noel, M. (2014). A new multi-target, multi-agent search-and-rescue path planning approach. International Journal of Computer, Electrical, Automation, Control and Information Engineering, 8(6), 935\u2013944.","journal-title":"International Journal of Computer, Electrical, Automation, Control and Information Engineering"},{"issue":"5","key":"4113_CR6","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1109\/MWC.2012.6339474","volume":"19","author":"HS Ramos","year":"2012","unstructured":"Ramos, H. S., Boukerche, A., Pazzi, R. W., Frery, A. C., & Loureiro, A. A. F. (2012). Cooperative target tracking in vehicular sensor networks. IEEE Wireless Communications, 19(5), 66\u201373.","journal-title":"IEEE Wireless Communications"},{"issue":"11","key":"4113_CR7","doi-asserted-by":"crossref","first-page":"6496","DOI":"10.1109\/TWC.2014.2329306","volume":"13","author":"Y Zhu","year":"2014","unstructured":"Zhu, Y., Vikram, A., Fu, H., & Guan, Y. (2014). On non-cooperative multiple-target tracking with wireless sensor networks. IEEE Transactions on Wireless Communications, 13(11), 6496\u20136510.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"4","key":"4113_CR8","doi-asserted-by":"crossref","first-page":"341","DOI":"10.5772\/6232","volume":"5","author":"Y Meng","year":"2008","unstructured":"Meng, Y. (2008). Multi-robot searching using game-theory based approach. International Journal Advanced Robotic Systems, 5(4), 341\u2013350.","journal-title":"International Journal Advanced Robotic Systems"},{"key":"4113_CR9","unstructured":"Yan, D., Wang, J., Liu, L., & Song, A. (2008). Target tracking based on multiagent and game theory in wireless sensor network. In 11th IEEE International Conference (ICCT), 97-100."},{"key":"4113_CR10","unstructured":"Van, D., Wang, J., Liu, L., & Gao, J. (2008). Target tracking based on cluster and game theory in wireless sensor network. In 2nd IET international conference (ICWMMN), pp. 45\u201348."},{"key":"4113_CR11","doi-asserted-by":"crossref","unstructured":"Das, T., & Roy, S. (2014). Game theory inspired mobile object trapping system in mobile wireless sensor network. In IEEE international conference (ICESC), pp. 245\u2013250.","DOI":"10.1109\/ICESC.2014.47"},{"key":"4113_CR12","doi-asserted-by":"crossref","unstructured":"Antoniades, A., Kim, H. J., & Sastry, S. (2003). Pursuit-Evasion strategies for teams of multiple agents with incomplete information. In 42nd IEEE conference (ICDC), Vol. 1, pp. 756\u2013761.","DOI":"10.1109\/CDC.2003.1272656"},{"key":"4113_CR13","doi-asserted-by":"crossref","unstructured":"Chung, T. H., & Burdick, J. W. (2008). Multi-agent Probabilistic Search in a Sequential Decision-theoretic Framework. In IEEE international conference (ICRA), pp. 146\u2013151.","DOI":"10.1109\/ROBOT.2008.4543200"},{"key":"4113_CR14","doi-asserted-by":"crossref","unstructured":"Waharte, S., Symington, A., & Trigoni, N. (2010). Probabilistic Search with Agile UAVs. In IEEE international conference (ICRA), pp. 2840\u20132845.","DOI":"10.1109\/ROBOT.2010.5509962"},{"key":"4113_CR15","doi-asserted-by":"crossref","unstructured":"Khan, A., Yanmaz, E., & Rinner, B. (2014). Information merging in multi-UAV cooperative search. In IEEE international conference (ICRA), pp. 3122\u20133129.","DOI":"10.1109\/ICRA.2014.6907308"},{"key":"4113_CR16","doi-asserted-by":"crossref","unstructured":"Strode, C. (2011). Optimising multistatic sensor locations using path planning and game theory. In IEEE Symposium (CISDA), pp. 9\u201316.","DOI":"10.1109\/CISDA.2011.5945938"},{"key":"4113_CR17","doi-asserted-by":"crossref","unstructured":"Hadzic, S., Bastos, J., & Rodriguez, J. (2012). Reference node selection for cooperative positioning using coalition formation games. In 9th IEEE workshop (WPNC), pp. 105\u2013108.","DOI":"10.1109\/WPNC.2012.6268747"},{"key":"4113_CR18","doi-asserted-by":"crossref","unstructured":"Bhattacharyya, C. K., & Bhattacharyya, S. (2008). Detecting Re-entry of a moving object in an irregular space. In 3rd international conference on sensing technology.","DOI":"10.1109\/ICSENST.2008.4757169"},{"key":"4113_CR19","unstructured":"Jiang, C., Dong, G., & Wang, B. (2005). Detection and tracking of region-based evolving targets in sensor networks. In IEEE international conference (ICCCN), pp. 563\u2013568."},{"key":"4113_CR20","unstructured":"Nieberg, S. M., Kropat, E., Pickl, S., & Bordetsky, A. (2013). Intercepting a Target with Sensor Swarms. In IEEE international conference (HICSS), pp. 1222\u20131230."},{"key":"4113_CR21","doi-asserted-by":"crossref","unstructured":"Nussbaum, D., & Y\u00f6or\u00fckc\u00fc, A. (2015). Moving target search with subgoal graphs. In 8th International symposium on combinatorial search (SoCS).","DOI":"10.1609\/icaps.v25i1.13709"},{"issue":"5","key":"4113_CR22","doi-asserted-by":"crossref","first-page":"875","DOI":"10.1109\/TRO.2005.851373","volume":"21","author":"V Isler","year":"2005","unstructured":"Isler, V., Kannan, S., & Khanna, S. (2005). Randomized pursuit-evasion in a polygonal environment. IEEE Transactions on Robototics, 21(5), 875\u2013884.","journal-title":"IEEE Transactions on Robototics"},{"key":"4113_CR23","doi-asserted-by":"crossref","unstructured":"Renzaglia, A., Noori, N., & Isler, V. (2014). The role of target modeling in designing search strategies. In IEEE (IROS), pp. 4260\u20134265.","DOI":"10.1109\/IROS.2014.6943163"},{"key":"4113_CR24","unstructured":"Maxwell, P., Maciejewski, A. A., Siegel, H. J., Potter, J., & Smith, J. (2009). A mathematical model of robust military village searches for decision making purposes. In International conference on information and knowledge engineering (IKE 09), pp. 311\u2013316."},{"key":"4113_CR25","doi-asserted-by":"crossref","unstructured":"Cox, J. S., & Durfee, E. H. (2005). An efficient algorithm for multiagent plan coordination. In Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems.","DOI":"10.1145\/1082473.1082599"},{"key":"4113_CR26","doi-asserted-by":"crossref","unstructured":"Hazra, T., Nene, M., & Kumar, C. R. S. (2016). Optimal strategies for searching a mobile object using mobile sensors in a grid environment. In IEEE international conference (ICACCS).","DOI":"10.1109\/ICACCS.2016.7586394"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-017-4113-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-4113-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-4113-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,23]],"date-time":"2024-06-23T11:39:36Z","timestamp":1719142776000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-017-4113-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4,3]]},"references-count":26,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,8]]}},"alternative-id":["4113"],"URL":"https:\/\/doi.org\/10.1007\/s11277-017-4113-7","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,4,3]]}}}