{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T00:50:00Z","timestamp":1767142200979,"version":"build-2238731810"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2017,4,4]],"date-time":"2017-04-04T00:00:00Z","timestamp":1491264000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2017,8]]},"DOI":"10.1007\/s11277-017-4115-5","type":"journal-article","created":{"date-parts":[[2017,4,5]],"date-time":"2017-04-05T06:04:33Z","timestamp":1491372273000},"page":"4717-4732","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Modeling and Analysis of Grid-Based Target Searching Problems in a Mobile Sensor Network"],"prefix":"10.1007","volume":"95","author":[{"given":"Tanmoy","family":"Hazra","sequence":"first","affiliation":[]},{"given":"C. R. S.","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Manisha J.","family":"Nene","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,4,4]]},"reference":[{"issue":"3","key":"4115_CR1","doi-asserted-by":"crossref","first-page":"521","DOI":"10.4304\/jnw.6.3.521-532","volume":"6","author":"S Shen","year":"2011","unstructured":"Shen, S., Yue, G., & Cao, Q. (2011). A survey of game theory in wireless sensor networks security. Journal of Networks, 6(3), 521\u2013532.","journal-title":"Journal of Networks"},{"issue":"7","key":"4115_CR2","doi-asserted-by":"crossref","first-page":"9055","DOI":"10.3390\/s120709055","volume":"12","author":"HY Shi","year":"2012","unstructured":"Shi, H. Y., Wang, W. L., Kwok, N. M., & Chen, S. Y. (2012). Game theory for wireless sensor networks: A survey. Sensors, 12(7), 9055\u20139097.","journal-title":"Sensors"},{"key":"4115_CR3","doi-asserted-by":"crossref","first-page":"3047","DOI":"10.1016\/j.gaceta.2008.07.003","volume":"52","author":"R Machado","year":"2008","unstructured":"Machado, R., & Tekinay, S. (2008). A survey of game-theoretic approaches in wireless sensor networks. Computer Networks (Elsevier), 52, 3047\u20133061.","journal-title":"Computer Networks (Elsevier)"},{"issue":"6","key":"4115_CR4","first-page":"935","volume":"8","author":"J Berger","year":"2014","unstructured":"Berger, J., Lo, N., & Noel, M. (2014). A new multi-target, multi-agent search-and-rescue path planning approach. International Journal of Computer, Electrical, Automation, Control and Information Engineering, 8(6), 935\u2013944.","journal-title":"International Journal of Computer, Electrical, Automation, Control and Information Engineering"},{"key":"4115_CR5","doi-asserted-by":"crossref","unstructured":"Nussbaum, D., & Y\u00f6r\u00fckc\u00fc, A. (2015). Moving target search with subgoal graphs. In 8th International symposium on combinatorial search (SoCS).","DOI":"10.1609\/icaps.v25i1.13709"},{"issue":"5","key":"4115_CR6","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1109\/MWC.2012.6339474","volume":"19","author":"HS Ramos","year":"2012","unstructured":"Ramos, H. S., Boukerche, A., Pazzi, R. W., Frery, A. C., & Loureiro, A. A. F. (2012). Cooperative target tracking in vehicular sensor networks. IEEE Wireless Communications, 19(5), 66\u201373.","journal-title":"IEEE Wireless Communications"},{"issue":"11","key":"4115_CR7","doi-asserted-by":"crossref","first-page":"6496","DOI":"10.1109\/TWC.2014.2329306","volume":"13","author":"Y Zhu","year":"2014","unstructured":"Zhu, Y., Vikram, A., Fu, H., & Guan, Y. (2014). On non-cooperative multiple-target tracking with wireless sensor networks. IEEE Transactions on Wireless Communications, 13(11), 6496\u20136510.","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"4115_CR8","unstructured":"Yan, D., Wang, J., Liu, L., & Song, A. (2008). Target tracking based on multiagent and game theory in wireless sensor network. In 11th IEEE international conference (ICCT) (pp. 97\u2013100)."},{"key":"4115_CR9","unstructured":"Van, D., Wang, J., Liu, L., & Gao, J. (2008). Target tracking based on cluster and game theory in wireless sensor network. In 2nd IET international conference (ICWMMN) (pp. 45\u201348)."},{"key":"4115_CR10","unstructured":"Jiang, C., Dong, G., & Wang, B. (2005). Detection and tracking of region-based evolving targets in sensor networks. In IEEE international conference (ICCCN) (pp. 563\u2013568)."},{"issue":"4","key":"4115_CR11","doi-asserted-by":"crossref","first-page":"341","DOI":"10.5772\/6232","volume":"5","author":"Y Meng","year":"2008","unstructured":"Meng, Y. (2008). Multi-robot searching using game-theory based approach. International Journal Advanced Robotic Systems, 5(4), 341\u2013350.","journal-title":"International Journal Advanced Robotic Systems"},{"key":"4115_CR12","doi-asserted-by":"crossref","unstructured":"Das, T., & Roy, S. (2014). Game theory inspired mobile object trapping system in mobile wireless sensor network. In IEEE international conference (ICESC) (pp. 245\u2013250).","DOI":"10.1109\/ICESC.2014.47"},{"key":"4115_CR13","doi-asserted-by":"crossref","unstructured":"Antoniades, A., Kim, H. J., & Sastry, S. (2003). Pursuit-evasion strategies for teams of multiple agents with incomplete information. In 42nd IEEE conference (ICDC) (Vol. 1, pp. 756\u2013761).","DOI":"10.1109\/CDC.2003.1272656"},{"key":"4115_CR14","doi-asserted-by":"crossref","unstructured":"Chung, T. H., & Burdick, J. W. (2008). Multi-agent probabilistic search in a sequential decision-theoretic framework. In IEEE international conference (ICRA) (pp. 146\u2013151).","DOI":"10.1109\/ROBOT.2008.4543200"},{"key":"4115_CR15","doi-asserted-by":"crossref","unstructured":"Renzaglia, A., Noori, N., & Isler, V. (2014). The role of target modeling in designing search strategies. IEEE (IROS), 4260\u20134265.","DOI":"10.1109\/IROS.2014.6943163"},{"key":"4115_CR16","doi-asserted-by":"crossref","unstructured":"Waharte, S., Symington, A., & Trigoni, N. (2010). Probabilistic search with agile UAVs. In IEEE international conference (ICRA) (pp. 2840\u20132845).","DOI":"10.1109\/ROBOT.2010.5509962"},{"issue":"5","key":"4115_CR17","doi-asserted-by":"crossref","first-page":"875","DOI":"10.1109\/TRO.2005.851373","volume":"21","author":"V Isler","year":"2005","unstructured":"Isler, V., Kannan, S., & Khanna, S. (2005). Randomized pursuit-evasion in a polygonal environment. IEEE Transactions on Robototics, 21(5), 875\u2013884.","journal-title":"IEEE Transactions on Robototics"},{"key":"4115_CR18","doi-asserted-by":"crossref","unstructured":"Khan, A., Yanmaz, E., & Rinner, B. (2014). Information merging in multi-UAV cooperative search. In IEEE international conference (ICRA) (pp. 3122\u20133129).","DOI":"10.1109\/ICRA.2014.6907308"},{"key":"4115_CR19","doi-asserted-by":"crossref","unstructured":"Bhattacharyya, C. K., & Bhattacharyya, S. (2008). Detecting re-entry of a moving object in an irregular space. In 3rd International conference on sensing technology.","DOI":"10.1109\/ICSENST.2008.4757169"},{"key":"4115_CR20","unstructured":"Nieberg, S. M., Kropat, E., Pickl, S., & Bordetsky, A. (2013). Intercepting a target with sensor swarms. In IEEE international conference (HICSS) (pp. 1222\u20131230)."},{"key":"4115_CR21","unstructured":"Maxwell, P., Maciejewski, A. A., Siegel, H. J., Potter, J., & Smith, J. (2009). A mathematical model of robust military village searches for decision making purposes. In International conference on information and knowledge engineering (IKE 09) (pp. 311\u2013316)."},{"key":"4115_CR22","doi-asserted-by":"crossref","unstructured":"Cox, J. S., & Durfee, E. H. (2005). An efficient algorithm for multiagent plan coordination. In International joint conference on autonomous agents and multiagent systems.","DOI":"10.1145\/1082473.1082599"},{"key":"4115_CR23","doi-asserted-by":"crossref","unstructured":"Strode, C. (2011). Optimising multistatic sensor locations using path planning and game theory. In IEEE symposium (CISDA) (pp. 9\u201316).","DOI":"10.1109\/CISDA.2011.5945938"},{"key":"4115_CR24","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1017\/CBO9780511525537.010","volume-title":"The geometry of ecological interactions: Simplifying spatial complexity","author":"MA Nowak","year":"2000","unstructured":"Nowak, M. A., & Sigmund, K. (2000). Games on grids. In U. Dieckmann, R. Law, & J. A. J. Metz (Eds.), The geometry of ecological interactions: Simplifying spatial complexity (pp. 135\u2013150). Cambridge: Cambridge University Press."},{"key":"4115_CR25","unstructured":"Malvone, V., Murano, A., & Sorrentino, L. (2015). Games with additional winning strategies. In CILC\u201915, CEUR workshop proceedings (pp. 175\u2013180)."},{"key":"4115_CR26","unstructured":"Romero, J. (2011). Finite automata in undiscounted repeated games with private monitoring. Purdue University, Department of Economics, Purdue University Economics."},{"key":"4115_CR27","doi-asserted-by":"crossref","unstructured":"Bertrand, N., Genest, B., & Gimbert, H. (2009). Qualitative determinacy and decidability of stochastic games with signals. In Proceedings of LICS: Logic in computer science (319\u2013328). IEEE Computer Society.","DOI":"10.1109\/LICS.2009.31"},{"key":"4115_CR28","doi-asserted-by":"crossref","unstructured":"Chatterjee, K., & Doyen, L. (2012). Partial-observation stochastic games: How to win when belief fails. In Proceedingsof LICS (pp. 175\u2013184). IEEE Computer Society Press.","DOI":"10.1109\/LICS.2012.28"},{"key":"4115_CR29","unstructured":"Marks, R. (1992). Repeated games and finite automata. In J. Creedy, J. Borland, & J. Eichberger (Eds.), Recent developments in game theory (Chap. 2, pp. 43\u201364). London: Edward Elgar Publishing Limited."},{"issue":"1","key":"4115_CR30","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1137\/0317009","volume":"17","author":"S Gal","year":"1979","unstructured":"Gal, S. (1979). Search games with mobile and immobile hider. SIAM Journal on Control and Optimization, 17(1), 99\u2013122.","journal-title":"SIAM Journal on Control and Optimization"},{"key":"4115_CR31","doi-asserted-by":"crossref","unstructured":"Adler, M., R\u00e4cke, H., Sivadasan, N., Sohler, C., & V\u00f6cking, B. (2002). Randomized pursuit-evasion in graphs. In ICALP (pp. 901\u2013912).","DOI":"10.1007\/3-540-45465-9_77"},{"key":"4115_CR32","unstructured":"Isler, V., Kannan, S., & Khanna, S. (2004). Randomized pursuit-evasion with limited visibility. In Proceedings of ACM-SIAM symposium on discrete algorithms-SODA (pp. 1053\u20131063)."},{"key":"4115_CR33","doi-asserted-by":"crossref","unstructured":"Hazra, T., Nene, M., & Kumar, C. R. S. (2016). Optimal strategies for searching a mobile object using mobile sensors in a grid environment. In IEEE international conference (ICACCS).","DOI":"10.1109\/ICACCS.2016.7586394"},{"key":"4115_CR34","doi-asserted-by":"publisher","unstructured":"Hazra, T., Nene, M., & Kumar, C. R. S. (2017). A strategic framework for searching mobile targets using mobile sensors. Wireless Personal Communications. doi: 10.1007\/s11277-017-4113-7 .","DOI":"10.1007\/s11277-017-4113-7"}],"updated-by":[{"DOI":"10.1007\/s11277-017-4930-8","type":"erratum","label":"Erratum","source":"publisher","updated":{"date-parts":[[2017,9,12]],"date-time":"2017-09-12T00:00:00Z","timestamp":1505174400000}}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-017-4115-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-4115-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-4115-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,22]],"date-time":"2023-08-22T20:35:05Z","timestamp":1692736505000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-017-4115-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4,4]]},"references-count":34,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,8]]}},"alternative-id":["4115"],"URL":"https:\/\/doi.org\/10.1007\/s11277-017-4115-5","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,4,4]]}}}