{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:17:52Z","timestamp":1761401872900,"version":"3.41.0"},"reference-count":36,"publisher":"EDP Sciences","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["RAIRO-Oper. Res."],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1051\/ro\/2017032","type":"journal-article","created":{"date-parts":[[2017,4,27]],"date-time":"2017-04-27T06:33:57Z","timestamp":1493274837000},"page":"607-625","source":"Crossref","is-referenced-by-count":12,"title":["Exact and heuristic approaches for the maximum lifetime problem in sensor networks with coverage and connectivity constraints"],"prefix":"10.1051","volume":"51","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2187-8624","authenticated-orcid":false,"given":"Francesco","family":"Carrabs","sequence":"first","affiliation":[]},{"given":"Raffaele","family":"Cerulli","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1274-6144","authenticated-orcid":false,"given":"Ciriaco","family":"D\u2019Ambrosio","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7188-8794","authenticated-orcid":false,"given":"Andrea","family":"Raiconi","sequence":"additional","affiliation":[]}],"member":"250","published-online":{"date-parts":[[2017,6,30]]},"reference":[{"key":"R1","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1007\/s10878-006-5975-x","volume":"11","author":"Ai","year":"2006","journal-title":"J. Comb. Optim."},{"key":"R2","doi-asserted-by":"crossref","first-page":"2688","DOI":"10.1016\/j.comnet.2010.05.003","volume":"54","author":"Alemdar","year":"2010","journal-title":"Comput. Netw."},{"key":"R3","doi-asserted-by":"crossref","first-page":"390","DOI":"10.1016\/j.ejor.2006.05.037","volume":"181","author":"Alfieri","year":"2007","journal-title":"Eur. J. Oper. Res."},{"key":"R4","doi-asserted-by":"crossref","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"Atzori","year":"2010","journal-title":"Comput. Netw."},{"key":"R5","doi-asserted-by":"crossref","unstructured":"W. Awada and M. Cardei, Energy-efficient data gathering in heterogeneous wireless sensor networks, in Proc. of the IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (2006) 53\u201360.","DOI":"10.1109\/WIMOB.2006.1696338"},{"key":"R6","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1016\/j.cor.2013.12.013","volume":"46","author":"Bianco","year":"2014","journal-title":"Comput. Oper. Res."},{"key":"R7","doi-asserted-by":"crossref","first-page":"1259","DOI":"10.1109\/TC.2009.40","volume":"58","author":"Cai","year":"2009","journal-title":"IEEE Trans. Comput."},{"key":"R8","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1504\/IJSNET.2008.018484","volume":"3","author":"Cardei","year":"2008","journal-title":"Int. J. Sensor Networks"},{"key":"R9","doi-asserted-by":"crossref","unstructured":"M. Cardei, M.T. Thai, Y. Li and W. Wu, Energy-efficient target coverage in wireless sensor networks. In Vol. 3 of Proc. of the 24th conference of the IEEE Communications Society (2005) 1976\u20131984.","DOI":"10.1109\/INFCOM.2005.1498475"},{"key":"R10","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1504\/IJSNET.2006.010833","volume":"1","author":"Cardei","year":"2006","journal-title":"Int. J. Sensor Networks"},{"key":"R11","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1016\/j.cor.2015.02.013","volume":"60","author":"Carrabs","year":"2015","journal-title":"Comput. Oper. Res."},{"key":"R12","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1016\/j.jnca.2015.08.018","volume":"58","author":"Carrabs","year":"2015","journal-title":"J. Network Comput. Appl."},{"key":"R13","doi-asserted-by":"crossref","unstructured":"F. Carrabs, R. Cerulli, C. D\u2019Ambrosio and A. Raiconi, An exact algorithm to extend lifetime through roles allocation in sensor networks with connectivity constraints. To published in: Optim. Lett. (2016). DOI: 10.1007\/s11590-016-1072-y.","DOI":"10.1007\/s11590-016-1072-y"},{"key":"R14","doi-asserted-by":"crossref","first-page":"973","DOI":"10.1016\/j.ifacol.2016.07.902","volume":"49","author":"Carrabs","year":"2016","journal-title":"IFAC-PapersOnLine"},{"key":"R15","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1007\/s10589-013-9556-5","volume":"56","author":"Carrabs","year":"2013","journal-title":"Comput. Optim. Appl."},{"key":"R16","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1016\/j.ejor.2014.08.013","volume":"241","author":"Casta\u00f1o","year":"2015","journal-title":"Eur. J. Oper. Res."},{"key":"R17","doi-asserted-by":"crossref","first-page":"220","DOI":"10.1016\/j.cor.2013.11.001","volume":"52","author":"Casta\u00f1o","year":"2014","journal-title":"Comput. Oper. Res."},{"key":"R18","doi-asserted-by":"crossref","first-page":"442","DOI":"10.1016\/j.ejor.2013.07.029","volume":"232","author":"Cerrone","year":"2014","journal-title":"Eur. J. Oper. Res."},{"key":"R19","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1016\/j.ejor.2012.01.046","volume":"220","author":"Cerulli","year":"2012","journal-title":"Eur. J. Oper. Res."},{"key":"R20","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1002\/net.21578","volume":"64","author":"Cerulli","year":"2014","journal-title":"Networks"},{"key":"R21","unstructured":"L. Davis, Handbook of Genetic Algorithms. Van Nostrand Reinhold, New York (1991)."},{"key":"R22","doi-asserted-by":"crossref","unstructured":"G. Desaulniers, J. Desrosiers and M. Solomon, Column Generation. Springer US (2005).","DOI":"10.1007\/b135457"},{"key":"R23","unstructured":"K. Deschinkel, A column generation based heuristic for maximum lifetime coverage in wireless sensor networks, in Vol. 4 of SENSORCOMM 11, 5th Int. Conf. on Sensor Technologies and Applications (2011) 209\u2013214."},{"key":"R24","doi-asserted-by":"crossref","unstructured":"A. Dhawan, C.T. Vu, A. Zelikovsky, Y. Li and S.K. Prasad, Maximum lifetime of sensor networks with adjustable sensing range, in Proc. of the Seventh ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel\/Distributed Computing (2006) 285 \u2013 289.","DOI":"10.1109\/SNPD-SAWN.2006.46"},{"key":"R25","unstructured":"C. Duin and S. Voss, Steiner tree heuristics \u2013 a survey, in Operations Research Proceedings 1993. Papers of the 22nd Annual Meeting of DGOR in Cooperation with NSOR, edited by H. Dyckhoff, U. Derigs, M. Salomon and H.C. Tijms. Springer-Verlag (1994) 485\u2013496."},{"key":"R26","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1007\/s11590-011-0405-0","volume":"7","author":"Gentili","year":"2013","journal-title":"Optim. Lett."},{"key":"R27","doi-asserted-by":"crossref","unstructured":"Y. Gu, Y. Ji and B. Zhao, Maximize lifetime of heterogeneous wireless sensor networks with joint coverage and connectivity requirement, in EmbeddedCom-09, 8th International Conference on Embedded Computing (2009) 226\u2013231.","DOI":"10.1109\/EmbeddedCom-ScalCom.2009.48"},{"key":"R28","doi-asserted-by":"crossref","unstructured":"F.K. Hwang, D.S. Richards and P. Winter, The Steiner Tree Problem. North-Holland, Amsterdam (1992).","DOI":"10.1002\/net.3230220105"},{"key":"R29","unstructured":"C.H. Papadimitriou and K. Steiglitz, Combinatorial Optimization: Algorithms and Complexity. Prentice-Hall, Englewood Cliffs, New Jersey (1982)."},{"key":"R30","unstructured":"A. Raiconi and M. Gentili, Exact and metaheuristic approaches to extend lifetime and maintain connectivity in wireless sensors networks, in Network Optimization, edited by J. Pahl, T. Reiners and S. Voss. Vol. 6701 of Lect. Notes Comput. Sci. Springer, Berlin\/Heidelberg (2011) 607\u2013619."},{"key":"R31","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11227-013-1021-9","volume":"68","author":"Rawat","year":"2014","journal-title":"J. Supercomput."},{"key":"R32","doi-asserted-by":"crossref","first-page":"3166","DOI":"10.1016\/j.cor.2012.04.001","volume":"39","author":"Rossi","year":"2012","journal-title":"Comput. Oper. Res."},{"key":"R33","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1016\/j.ejor.2013.05.033","volume":"231","author":"Rossi","year":"2013","journal-title":"Eur. J. Oper. Res."},{"key":"R34","first-page":"573","volume":"24","author":"Takahashi","year":"1980","journal-title":"Math. Japonica"},{"key":"R35","doi-asserted-by":"crossref","unstructured":"C. Wang, M.T. Thai, Y. Li, F. Wang and W. Wu, Minimum coverage breach and maximum network lifetime in wireless sensor networks. In Proc. of the IEEE Global Telecommunications Conference (2007) 1118\u20131123.","DOI":"10.1109\/GLOCOM.2007.215"},{"key":"R36","doi-asserted-by":"crossref","first-page":"1378","DOI":"10.1109\/TNET.2007.911432","volume":"16","author":"Zhao","year":"2008","journal-title":"IEEE\/ACM Trans. Netw."}],"container-title":["RAIRO - Operations Research"],"original-title":[],"link":[{"URL":"http:\/\/www.rairo-ro.org\/10.1051\/ro\/2017032\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:44:13Z","timestamp":1750207453000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.rairo-ro.org\/10.1051\/ro\/2017032"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,30]]},"references-count":36,"journal-issue":{"issue":"3"},"alternative-id":["ro170046"],"URL":"https:\/\/doi.org\/10.1051\/ro\/2017032","relation":{},"ISSN":["0399-0559","1290-3868"],"issn-type":[{"type":"print","value":"0399-0559"},{"type":"electronic","value":"1290-3868"}],"subject":[],"published":{"date-parts":[[2017,6,30]]}}}