{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,11]],"date-time":"2024-06-11T19:15:41Z","timestamp":1718133341893},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2016,2,9]],"date-time":"2016-02-09T00:00:00Z","timestamp":1454976000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Optim Lett"],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1007\/s11590-016-1014-8","type":"journal-article","created":{"date-parts":[[2016,2,9]],"date-time":"2016-02-09T11:24:07Z","timestamp":1455017047000},"page":"1101-1123","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["A unified solving approach for two and three dimensional coverage problems in sensor networks"],"prefix":"10.1007","volume":"10","author":[{"given":"Claudio","family":"Sterle","sequence":"first","affiliation":[]},{"given":"Antonio","family":"Sforza","sequence":"additional","affiliation":[]},{"given":"Annunziata Esposito","family":"Amideo","sequence":"additional","affiliation":[]},{"given":"Carmela","family":"Piccolo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,2,9]]},"reference":[{"issue":"4","key":"1014_CR1","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1016\/j.adhoc.2004.04.003","volume":"2","author":"IF Akyildiz","year":"2004","unstructured":"Akyildiz, I.F., Kasimoglu, I.H.: Wireless sensor and actor networks: research challenges. Ad Hoc Netw 2(4), 351\u2013367 (2004)","journal-title":"Ad Hoc Netw"},{"issue":"4","key":"1014_CR2","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1145\/1978802.1978811","volume":"43","author":"B Wang","year":"2011","unstructured":"Wang, B.: Coverage problems in sensor networks: a survey. ACM Comput. Surv 43(4), 32\u201353 (2011)","journal-title":"ACM Comput. Surv"},{"issue":"7","key":"1014_CR3","doi-asserted-by":"crossref","first-page":"1238","DOI":"10.1016\/j.adhoc.2011.02.003","volume":"9","author":"MA Guvensan","year":"2011","unstructured":"Guvensan, M.A., Yavuz, A.G.: On coverage issues in directional sensor networks: a survey. Ad Hoc Netw 9(7), 1238\u20131255 (2011)","journal-title":"Ad Hoc Netw"},{"key":"1014_CR4","doi-asserted-by":"crossref","unstructured":"Sforza, A., Sterle, C., D\u2019Amore, P., Tedesco, A., De Cillis, F., Setola, R.: Optimization models in a smart tool for the railway infrastructure protection. Lecture Notes in Computer Science, 8328 LNCS, pp. 191\u2013196 (2013)","DOI":"10.1007\/978-3-319-03964-0_17"},{"key":"1014_CR5","doi-asserted-by":"crossref","unstructured":"Sforza, A., Starita, S., Sterle, C.: Optimal location of security devices in railway infrastructure security. In: Setola, R., Sforza, A., Vittorini, V., Pragliola, C. (eds.) Railway infrastructure security, pp. 171\u2013196. Springer, New York (2015)","DOI":"10.1007\/978-3-319-04426-2_9"},{"key":"1014_CR6","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1016\/0095-8956(75)90061-1","volume":"18","author":"V Chv\u00e0tal","year":"1975","unstructured":"Chv\u00e0tal, V.: A combinatorial theorem in plane geometry. J. Combin. Theor. Ser. B 18, 39\u201341 (1975)","journal-title":"J. Combin. Theor. Ser. B"},{"key":"1014_CR7","volume-title":"Art Gallery Theorems and Algorithms","author":"J O\u2019Rourke","year":"1987","unstructured":"O\u2019Rourke, J.: Art Gallery Theorems and Algorithms. Oxford University Press, New York (1987)"},{"issue":"6","key":"1014_CR8","doi-asserted-by":"crossref","first-page":"718","DOI":"10.1016\/j.dam.2009.12.004","volume":"158","author":"SK Ghosh","year":"2010","unstructured":"Ghosh, S.K.: Approximation algorithms for art gallery problems in polygons. Discret. Appl. Math 158(6), 718\u2013722 (2010)","journal-title":"Discret. Appl. Math"},{"key":"1014_CR9","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1023\/A:1019225027893","volume":"98","author":"A Caprara","year":"2000","unstructured":"Caprara, A., Toth, P., Fischetti, M.: Algorithms for set covering problem. Ann. Oper. Res 98, 353\u2013371 (2000)","journal-title":"Ann. Oper. Res"},{"issue":"1","key":"1014_CR10","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1007\/s10852-008-9098-5","volume":"8","author":"M Boccia","year":"2009","unstructured":"Boccia, M., Sforza, A., Sterle, C.: Flow intercepting facility location: problems, models and heuristics. J. Math. Model. Algorithms 8(1), 35\u201379 (2009)","journal-title":"J. Math. Model. Algorithms"},{"key":"1014_CR11","doi-asserted-by":"crossref","first-page":"1675","DOI":"10.1016\/j.cor.2009.11.003","volume":"37","author":"O Berman","year":"2010","unstructured":"Berman, O., Drezner, Z., Krass, D.: Generalized coverage: new developments in covering location models. Comput. Oper. Res. 37, 1675\u20131687 (2010)","journal-title":"Comput. Oper. Res."},{"key":"1014_CR12","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1007\/s00186-011-0363-4","volume":"74","author":"X Li","year":"2011","unstructured":"Li, X., Zhao, Z., Zhu, X., Wyatt, T.: Covering models and optimization techniques for emergency response facility location and planning: a review. Math. Methods Oper. Res. 74, 281\u2013310 (2011)","journal-title":"Math. Methods Oper. Res."},{"issue":"1","key":"1014_CR13","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1007\/s11263-012-0587-7","volume":"101","author":"A Mavrinac","year":"2013","unstructured":"Mavrinac, A., Chen, X.: Modeling coverage in camera networks: a survey. Int. J. Comp. Vision 101(1), 205\u2013226 (2013)","journal-title":"Int. J. Comp. Vision"},{"issue":"12","key":"1014_CR14","doi-asserted-by":"crossref","first-page":"1448","DOI":"10.1109\/TC.2002.1146711","volume":"51","author":"K Chakrabarty","year":"2002","unstructured":"Chakrabarty, K., Sitharama, S., Cho, E.: Grid coverage for surveillance and target location in distributed sensor networks. IEEE Trans. Comput 51(12), 1448\u20131453 (2002)","journal-title":"IEEE Trans. Comput"},{"key":"1014_CR15","doi-asserted-by":"crossref","unstructured":"Dhillon, S.S., Chakrabarty, K., Iyengar, S.S.: Sensor placement for grid coverage under imprecise detections. In: Proceedings of the 15th International Conference on Information Fusion, 2, pp. 1581\u20131587 (2002)","DOI":"10.1109\/ICIF.2002.1021005"},{"key":"1014_CR16","doi-asserted-by":"crossref","unstructured":"H\u00f6rster, E., Lienhart, R.: On the optimal placement of multiple visual sensors. In: Proceedings of the 4th ACM international workshop on Video surveillance and sensor networks (VSSN), pp. 111\u2013120 (2006)","DOI":"10.1145\/1178782.1178800"},{"key":"1014_CR17","first-page":"2114","volume":"2008","author":"K Yabuta","year":"2008","unstructured":"Yabuta, K., Kitazawa, H.: Optimum camera placement considering camera specification for security monitoring. Int. Symp. Circuits Syst. ISCAS 2008, 2114\u20132117 (2008)","journal-title":"Int. Symp. Circuits Syst. ISCAS"},{"key":"1014_CR18","doi-asserted-by":"crossref","unstructured":"Osais, Y., St-Hilaire, M., Yu, F.: On sensor placement for directional wireless sensor networks. In: Proceeding of IEEE International Conference on on Communications (ICC\u201909), Dresden, Germany, pp. 1\u20135 (2009)","DOI":"10.1109\/ICC.2009.5199248"},{"key":"1014_CR19","unstructured":"Debaque, B., Jedidi, R., Prevost, D.: Optimal video camera network deployment to support security monitoring, information fusion, pp. 1730\u20131736 (2009)"},{"key":"1014_CR20","doi-asserted-by":"crossref","first-page":"528","DOI":"10.1016\/j.adhoc.2010.08.019","volume":"9","author":"SA Mostafavi","year":"2011","unstructured":"Mostafavi, S.A., Dehghan, M.: Optimal visual sensor placement for coverage based on target location profile. Ad Hoc Netw 9, 528\u2013541 (2011)","journal-title":"Ad Hoc Netw"},{"issue":"2","key":"1014_CR21","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1016\/j.compenvurbsys.2006.06.002","volume":"31","author":"AT Murray","year":"2007","unstructured":"Murray, A.T., Kim, K., Davis, J.W., Machiraju, R., Parent, R.: Coverage optimization to support security monitoring. Comput. Environ. Urban Syst 31(2), 133\u2013147 (2007)","journal-title":"Comput. Environ. Urban Syst"},{"key":"1014_CR22","doi-asserted-by":"crossref","first-page":"1363","DOI":"10.1287\/opre.19.6.1363","volume":"19","author":"C Toregas","year":"1971","unstructured":"Toregas, C., ReVelle, C., Swain, R., Bergman, L.: The location of emergency service facilities. Oper. Res 19, 1363\u20131373 (1971)","journal-title":"Oper. Res"},{"key":"1014_CR23","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1007\/BF01942293","volume":"32","author":"R Church","year":"1974","unstructured":"Church, R., ReVelle, C.: The maximal covering location problem. Papers Reg. Sci. Assoc 32, 101\u2013118 (1974)","journal-title":"Papers Reg. Sci. Assoc"},{"key":"1014_CR24","doi-asserted-by":"crossref","first-page":"1434","DOI":"10.1287\/mnsc.32.11.1434","volume":"32","author":"K Hogan","year":"1986","unstructured":"Hogan, K., ReVelle, C.: Concepts and applications of backup coverage. Manag. Sci 32, 1434\u20131444 (1986)","journal-title":"Manag. Sci"},{"key":"1014_CR25","unstructured":"Garey, M.R., Johnsons, D.S.: Computers and intractability: a guide to theory of NP-completeness. Freeman (1979)"},{"key":"1014_CR26","doi-asserted-by":"crossref","unstructured":"Marrone, S., Mazzocca, N., Pragliola, C., Sforza, A., Sterle, C., Vittorini, V.: The METRIP tool. In: Setola, R., Sforza, A., Vittorini, V., Pragliola, C. (eds.) Railway infrastructure security, pp. 197\u2013214. Springer (2015)","DOI":"10.1007\/978-3-319-04426-2_10"}],"container-title":["Optimization Letters"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11590-016-1014-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11590-016-1014-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11590-016-1014-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,4]],"date-time":"2019-09-04T11:10:02Z","timestamp":1567595402000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11590-016-1014-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,2,9]]},"references-count":26,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2016,6]]}},"alternative-id":["1014"],"URL":"https:\/\/doi.org\/10.1007\/s11590-016-1014-8","relation":{},"ISSN":["1862-4472","1862-4480"],"issn-type":[{"value":"1862-4472","type":"print"},{"value":"1862-4480","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,2,9]]}}}