{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:40:56Z","timestamp":1740148856884,"version":"3.37.3"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2016,6,10]],"date-time":"2016-06-10T00:00:00Z","timestamp":1465516800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"the State Key Development Program for Basic Research of China","award":["973 project 2012CB316201"],"award-info":[{"award-number":["973 project 2012CB316201"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61202024","61422208","61472252","61272443","61133006"],"award-info":[{"award-number":["61202024","61422208","61472252","61272443","61133006"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100007219","name":"Natural Science Foundation of Shanghai","doi-asserted-by":"publisher","award":["12ZR1445000"],"award-info":[{"award-number":["12ZR1445000"]}],"id":[{"id":"10.13039\/100007219","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shanghai Chenguang Grant","award":["12CG09"],"award-info":[{"award-number":["12CG09"]}]},{"name":"Shanghai Pujiang Grant","award":["13PJ1403900"],"award-info":[{"award-number":["13PJ1403900"]}]},{"name":"Jiangsu Future Network Research Project","award":["No. BY2013095-1-10"],"award-info":[{"award-number":["No. BY2013095-1-10"]}]},{"name":"CCF-Intel Young Faculty Researcher Program"},{"name":"CCF-Tencent Open Fund"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1007\/s12083-016-0469-9","type":"journal-article","created":{"date-parts":[[2016,6,10]],"date-time":"2016-06-10T03:47:57Z","timestamp":1465530477000},"page":"1063-1078","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Minimizing mobile sensor movements to form a line K-coverage"],"prefix":"10.1007","volume":"10","author":[{"given":"Yang","family":"Wang","sequence":"first","affiliation":[]},{"given":"Shuang","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Xiaofeng","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Fan","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Guihai","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,10]]},"reference":[{"issue":"12","key":"469_CR1","doi-asserted-by":"publisher","first-page":"754","DOI":"10.1016\/j.peva.2009.08.004","volume":"66","author":"W Choi","year":"2009","unstructured":"Choi W, Das SK (2009) Cross: a probabilistic constrained random sensor selection scheme in wireless sensor networks. Perform Eval 66(12):754\u2013772","journal-title":"Perform Eval"},{"key":"469_CR2","doi-asserted-by":"publisher","unstructured":"Boukerche A, Xin F (2007) A voronoi approach for coverage protocols in wireless sensor networks. In: IEEE global telecommunications conference (GLOBECOM), pp 5190\u20135194","DOI":"10.1109\/GLOCOM.2007.984"},{"issue":"1","key":"469_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10626-006-0005-9","volume":"17","author":"H Bai","year":"2007","unstructured":"Bai H, Chen X, Li B, Han D (2007) A location-free algorithm of energy-efficient connected coverage for high density wireless sensor networks. Discrete Event Dynamic Systems 17(1):1\u201321","journal-title":"Discrete Event Dynamic Systems"},{"key":"469_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.adhoc.2014.05.015","volume":"23","author":"H Chizari","year":"2014","unstructured":"Chizari H, Poston T, Razak SA, Abdullah AH, Salleh S (2014) Local coverage measurement algorithm in GPS-free wireless sensor networks. Ad Hoc Networks 23:1\u201317","journal-title":"Ad Hoc Networks"},{"key":"469_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84996-059-5","volume-title":"Coverage control in sensor networks","author":"B Wang","year":"2010","unstructured":"Wang B (2010) Coverage control in sensor networks. Springer, London"},{"issue":"1","key":"469_CR6","first-page":"240","volume":"163","author":"JB Liang","year":"2014","unstructured":"Liang JB, Liu M, Kui XY (2014) A survey of coverage problems in wireless sensor networks. Sensors & Transducers 163(1):240\u2013246","journal-title":"Sensors & Transducers"},{"key":"469_CR7","unstructured":"Fan X, Li VOK (2011) The probabilistic maximum coverage problem in social networks. In: IEEE global telecommunications conference (GLOBECOM), 6613(1): 1\u20135"},{"key":"469_CR8","doi-asserted-by":"publisher","unstructured":"Zhang P, Chen W, Sun X, Wang Y, Zhang J (2014) Minimizing seed set selection with probabilistic coverage guarantee in a social network. In: ACM international conference on knowledge discovery & data mining (SIGKDD), pp 1306\u20131315","DOI":"10.1145\/2623330.2623684"},{"issue":"7","key":"469_CR9","doi-asserted-by":"publisher","first-page":"2596","DOI":"10.1016\/j.jpdc.2014.03.004","volume":"74","author":"D Dash","year":"2014","unstructured":"Dash D, Gupta A, Bishnu A, Nandy SC (2014) Line coverage measures in wireless sensor networks. J Parallel Distrib Comput 74(7):2596\u20132614","journal-title":"J Parallel Distrib Comput"},{"issue":"4","key":"469_CR10","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1007\/s11036-005-1564-y","volume":"10","author":"C Huang","year":"2005","unstructured":"Huang C, Tseng Y (2005) The coverage problem in wireless sensor network. Mobile Network Application 10(4):519\u2013528","journal-title":"Mobile Network Application"},{"key":"469_CR11","doi-asserted-by":"publisher","unstructured":"Kumar S, Lai TH, Arora A (2005) Barrier coverage with wireless sensors. In: The annual international conference on mobile computing & networking (ICMCN), pp 284\u2013298","DOI":"10.1145\/1080829.1080859"},{"key":"469_CR12","doi-asserted-by":"publisher","unstructured":"Shen C, Cheng W, Liao X, Peng S (2008) Barrier coverage with mobile sensors. In: IEEE international symposium on parallel architectures, algorithms & networks (ISPAN), pp 99\u2013104","DOI":"10.1109\/I-SPAN.2008.8"},{"key":"469_CR13","doi-asserted-by":"publisher","unstructured":"Balister P, Zheng Z, Kumar S, Sinha P (2009) Trap coverage: allowing coverage holes of bounded dimeter in wireless sensor network. In: IEEE international conference on computer communications (INFOCOM), pp 136\u2013144","DOI":"10.1109\/INFCOM.2009.5061915"},{"issue":"8","key":"469_CR14","doi-asserted-by":"publisher","first-page":"1113","DOI":"10.1109\/TC.2008.56","volume":"57","author":"K Baumgartner","year":"2008","unstructured":"Baumgartner K, Ferrari S (2008) A geometric transversal approach to analyzing track coverage in sensor networks. IEEE Transactions on Computers (TC) 57(8):1113\u20131128","journal-title":"IEEE Transactions on Computers (TC)"},{"issue":"7","key":"469_CR15","doi-asserted-by":"publisher","first-page":"1014","DOI":"10.1016\/j.comnet.2008.12.003","volume":"53","author":"J Harada","year":"2009","unstructured":"Harada J, Shioda S, Saito H (2009) Path coverage properties of randomly deployed sensors with finite data-transmission ranges. Comput Netw 53(7):1014\u20131026","journal-title":"Comput Netw"},{"issue":"5","key":"469_CR16","first-page":"446","volume":"6","author":"S Sundhar Ram","year":"2007","unstructured":"Sundhar Ram S, Manjunath D, Iyer SK, Yogeshwaran D (2007) On the path coverage properties of random sensor networks. IEEE Trans Mob Comput 6(5):446\u2013458","journal-title":"IEEE Trans Mob Comput"},{"key":"469_CR17","doi-asserted-by":"publisher","unstructured":"Czyzowicz J, Kranakis E, Krizanc D, Lambadaris I, Narayanan L, Opatrny J, Stacho L, Urrutia J, Yazdani M (2010) On minimizing the sum of sensor movements for barrier coverage of a line segment. In: International conference on ad hoc networks & wireless (ADHOC-NOW), 6288: 29\u201342","DOI":"10.1007\/978-3-642-14785-2_3"},{"issue":"2","key":"469_CR18","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/1394555.1394565","volume":"12","author":"X Li","year":"2008","unstructured":"Li X, Frey H, Santoro N, Stojmenovic I (2008) Localized sensor self-deployment with coverage guarantee. ACM Mobile Computing & Communications Review 12(2):50\u201352","journal-title":"ACM Mobile Computing & Communications Review"},{"issue":"8","key":"469_CR19","doi-asserted-by":"publisher","first-page":"1108","DOI":"10.1109\/TPDS.2007.1048","volume":"18","author":"SH Yang","year":"2007","unstructured":"Yang SH, Li ML, Wu J (2007) Scan-based movement-assisted sensor deployment methods in wireless sensor networks. IEEE Trans Parallel Distrib Syst 18(8):1108\u20131121","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"8","key":"469_CR20","doi-asserted-by":"publisher","first-page":"978","DOI":"10.1109\/TC.2005.123","volume":"54","author":"Y Zou","year":"2005","unstructured":"Zou Y, Chakrabarty K (2005) A distributed coverage- and connectivity-centric technique for selecting active nodes in wireless sensor networks. IEEE Transactions on Computers (TC) 54(8):978\u2013991","journal-title":"IEEE Transactions on Computers (TC)"},{"key":"469_CR21","first-page":"134","volume":"2011","author":"A Ahmed","year":"2011","unstructured":"Ahmed A, Yasumoto K, Yamauchi Y, Ito M (2011) Distance and time based node selection for probabilistic coverage in people-centric sensing. IEEE Communications Society Conference on Sensor, Mesh & Ad Hoc Communications and Networks 2011:134\u2013142","journal-title":"IEEE Communications Society Conference on Sensor, Mesh & Ad Hoc Communications and Networks"},{"issue":"4","key":"469_CR22","doi-asserted-by":"publisher","first-page":"983","DOI":"10.1142\/S0129054111008520","volume":"22","author":"D Mondal","year":"2011","unstructured":"Mondal D, Kumar A, Bishnu A, Mukhopadhyaya K, Nandy SC (2011) Measuring the quality of surveillance in a wireless sensor network. Int J Found Comput Sci 22(4):983\u2013998","journal-title":"Int J Found Comput Sci"},{"key":"469_CR23","unstructured":"Hesari ME, Kranakis E, Krizanc D, Ponce OM, Narayanan L, Opatrny J, Shende SM (2013) Distributed algorithms for barrier coverage using relocatable sensors. In: ACM symposium on principles of distributed computing (SPDC), pp 383\u2013392"},{"key":"469_CR24","doi-asserted-by":"publisher","unstructured":"Bar-Noy A, Rawitz D, Terlecky P (2013) Maximizing barrier coverage lifetime with mobile sensors. In: The Annual European Symposium Algorithm (ESA), pp 97\u2013108","DOI":"10.1007\/978-3-642-40450-4_9"},{"issue":"4","key":"469_CR25","doi-asserted-by":"publisher","first-page":"1381","DOI":"10.1016\/j.adhoc.2010.10.002","volume":"11","author":"A Saipulla","year":"2013","unstructured":"Saipulla A, Westphal C, Liu B, Wang J (2013) Barrier coverage with line-based deployed mobile sensors. Ad Hoc Netw 11(4):1381\u20131391","journal-title":"Ad Hoc Netw"},{"issue":"3","key":"469_CR26","doi-asserted-by":"publisher","first-page":"711","DOI":"10.1016\/j.comnet.2010.10.008","volume":"55","author":"L Li","year":"2011","unstructured":"Li L, Zhang B, Shen X, Zheng J, Yao Z (2011) A study on the weak barrier coverage problem in wireless sensor networks. Computer Networks (CN) 55(3):711\u2013721","journal-title":"Computer Networks (CN)"},{"issue":"7","key":"469_CR27","doi-asserted-by":"publisher","first-page":"1443","DOI":"10.1109\/TMC.2013.118","volume":"13","author":"Z Wang","year":"2013","unstructured":"Wang Z, Liao J, Cao Q, Qi H, Wang Z (2013) Achieving k-barrier coverage in hybrid directional sensor networks. IEEE Trans Mob Comput 13(7):1443\u20131455","journal-title":"IEEE Trans Mob Comput"},{"key":"469_CR28","doi-asserted-by":"publisher","unstructured":"Saipulla A, Liu B, Xing G, Fu X, Wang J (2010) Barrier coverage with sensors of limited mobility. In: ACM international symposium on mobile ad hoc networking & computing (MOBIHOC), pp 201\u2013210","DOI":"10.1145\/1860093.1860121"},{"key":"469_CR29","unstructured":"Chang WY, Yu KM, So WT, Lin C-T, Lin CY (2011) Target coverage in wireless sensor networks. In: IEEE international conference on mobile ad-hoc & sensor networks (MSN), pp 408\u2013412"},{"key":"469_CR30","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1002\/nav.3800020109","volume":"2","author":"HW Kuhn","year":"1955","unstructured":"Kuhn HW (1955) The Hungarian method for the assignment problem. Naval Research Logistics Quarterly 2:83\u201397","journal-title":"Naval Research Logistics Quarterly"},{"issue":"1","key":"469_CR31","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1137\/0105003","volume":"5","author":"J Munkres","year":"1957","unstructured":"Munkres J (1957) Algorithms for the assignment and transportation problems. J Soc Ind Appl Math 5(1):32\u201338","journal-title":"J Soc Ind Appl Math"},{"key":"469_CR32","doi-asserted-by":"publisher","unstructured":"Czyzowicz J, Kranakis E, Krizanc D, Lambadaris I, Narayanan L, Opatrny J, Stacho L, Urrutia J, Yazdani M (2009) On minimizing the maximum sensor movement for barrier coverage of a line segment. In: International conference on ad hoc networks & wireless (ADHOC-NOW), 5793: 194\u2013212","DOI":"10.1007\/978-3-642-04383-3_15"},{"issue":"2","key":"469_CR33","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1007\/s00454-013-9525-x","volume":"50","author":"DZ Chen","year":"2013","unstructured":"Chen DZ, Gu Y, Li J, Wang H (2013) Algorithms on minimizing the maximum sensor movement for barrier coverage of a linear domain. Discrete Comput Geom 50(2):374\u2013408","journal-title":"Discrete Comput Geom"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-016-0469-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12083-016-0469-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-016-0469-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-016-0469-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,4,28]],"date-time":"2017-04-28T00:21:17Z","timestamp":1493338877000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12083-016-0469-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6,10]]},"references-count":33,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,7]]}},"alternative-id":["469"],"URL":"https:\/\/doi.org\/10.1007\/s12083-016-0469-9","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2016,6,10]]}}}