{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:15:04Z","timestamp":1761621304172,"version":"3.37.3"},"reference-count":35,"publisher":"Oxford University Press (OUP)","issue":"10","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1093\/comjnl\/bxx014","type":"journal-article","created":{"date-parts":[[2017,2,24]],"date-time":"2017-02-24T15:09:36Z","timestamp":1487948976000},"page":"1417-1442","source":"Crossref","is-referenced-by-count":22,"title":["Large-Scale Programing Code Dissemination for Software-Defined Wireless Networks"],"prefix":"10.1093","volume":"60","author":[{"given":"Xiao","family":"Liu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5190-4761","authenticated-orcid":false,"given":"Anfeng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Qingyong","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Haolin","family":"Liu","sequence":"additional","affiliation":[]}],"member":"286","published-online":{"date-parts":[[2017,3,3]]},"reference":[{"key":"key\n\t\t\t\t20171004104220_bxx014C1","doi-asserted-by":"crossref","first-page":"1428","DOI":"10.1109\/TC.2015.2435778","article-title":"Bulk data dissemination in wireless sensor networks: analysis, implications and improvement","volume":"65","year":"2016","journal-title":"IEEE Trans. Comput."},{"volume-title":"ACM\/Springer Mobile Netw. Appl.","year":"2016","key":"key\n\t\t\t\t20171004104220_bxx014C2"},{"year":"2004","key":"key\n\t\t\t\t20171004104220_bxx014C3"},{"key":"key\n\t\t\t\t20171004104220_bxx014C4","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/MWC.2015.7224730","article-title":"Engineering searchable encryption of mobile cloud networks: when QoE meets. QoP","volume":"22","year":"2015","journal-title":"IEEE Wirel. Commun."},{"key":"key\n\t\t\t\t20171004104220_bxx014C5","doi-asserted-by":"crossref","first-page":"2013","DOI":"10.1109\/TIFS.2016.2570740","article-title":"ActiveTrust: secure and trustable routing in wireless sensor networks","volume":"11","year":"2016","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"year":"2016","journal-title":"J. Comput. Syst. Sci","article-title":"Trace malicious source to guarantee cyber security for mass monitor critical infrastructure","key":"key\n\t\t\t\t20171004104220_bxx014C6"},{"key":"key\n\t\t\t\t20171004104220_bxx014C7","doi-asserted-by":"crossref","first-page":"1268","DOI":"10.1109\/TMC.2013.129","article-title":"Mobility and intruder prior information improving the barrier coverage of sparse sensor networks","volume":"13","year":"2014","journal-title":"IEEE Trans. Mobile Comput."},{"key":"key\n\t\t\t\t20171004104220_bxx014C8","doi-asserted-by":"crossref","first-page":"2818","DOI":"10.1109\/TPDS.2013.269","article-title":"Data loss and reconstruction in wireless sensor networks","volume":"25","year":"2014","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"key\n\t\t\t\t20171004104220_bxx014C9","doi-asserted-by":"crossref","first-page":"938","DOI":"10.1093\/comjnl\/bxt028","article-title":"An energy-efficient routing protocol using movement trends in vehicular ad hoc networks","volume":"56","year":"2013","journal-title":"Comput. J."},{"key":"key\n\t\t\t\t20171004104220_bxx014C10","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/MWC.2015.7054715","article-title":"AIWAC: affective interaction through wearable computing and cloud technology","volume":"22","year":"2015","journal-title":"IEEE Wirel. Commun. Mag."},{"key":"key\n\t\t\t\t20171004104220_bxx014C11","doi-asserted-by":"crossref","first-page":"559","DOI":"10.1007\/s12083-016-0501-0","article-title":"Distributed duty cycle control for delay improvement in wireless sensor networks","volume":"10","year":"2017","journal-title":"Peer-to-Peer Netw. Appl."},{"year":"2016","journal-title":"Comput. Electr. Eng.","article-title":"A green and reliable communication modeling for industrial internet of things","key":"key\n\t\t\t\t20171004104220_bxx014C12"},{"key":"key\n\t\t\t\t20171004104220_bxx014C13","doi-asserted-by":"crossref","first-page":"312","DOI":"10.1109\/TDSC.2015.2406704","article-title":"Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data","volume":"13","year":"2016","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"key\n\t\t\t\t20171004104220_bxx014C14","doi-asserted-by":"crossref","first-page":"2053","DOI":"10.1109\/TPDS.2013.124","article-title":"EPPDR: an efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid","volume":"25","year":"2014","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"key\n\t\t\t\t20171004104220_bxx014C15","doi-asserted-by":"crossref","first-page":"1861","DOI":"10.1109\/TMC.2014.2368557","article-title":"Evaluating the on-demand mobile charging in wireless sensor networks","volume":"14","year":"2015","journal-title":"IEEE Trans. Mobile Comput."},{"year":"2016","journal-title":"IEEE Trans. Veh. Technol.","article-title":"Full-view area coverage in camera sensor networks: dimension reduction and near-optimal solutions","key":"key\n\t\t\t\t20171004104220_bxx014C16"},{"key":"key\n\t\t\t\t20171004104220_bxx014C17","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1023\/A:1013715909417","article-title":"Negotiation based protocols for disseminating information in wireless sensor networks","volume":"8","year":"2002","journal-title":"Wirel. Netw."},{"key":"key\n\t\t\t\t20171004104220_bxx014C18","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1109\/MNET.2013.6574659","article-title":"Enabling technologies for future data center networking: a primer","volume":"27","year":"2013","journal-title":"IEEE Netw."},{"key":"key\n\t\t\t\t20171004104220_bxx014C19","doi-asserted-by":"crossref","first-page":"9251","DOI":"10.1109\/ACCESS.2016.2647236","article-title":"A similarity scenario-based recommendation model with small disturbances for unknown items in social networks","volume":"4","year":"2016","journal-title":"IEEE Access"},{"key":"key\n\t\t\t\t20171004104220_bxx014C20","doi-asserted-by":"crossref","first-page":"1931","DOI":"10.1109\/TMC.2012.161","article-title":"Energy provisioning in wireless rechargeable sensor networks","volume":"12","year":"2013","journal-title":"IEEE Trans. Mob. Comput."},{"key":"key\n\t\t\t\t20171004104220_bxx014C21","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1016\/S0140-3664(00)00233-4","article-title":"Flooding in wireless ad hoc networks","volume":"24","year":"2001","journal-title":"Comput. Commun."},{"key":"key\n\t\t\t\t20171004104220_bxx014C22","doi-asserted-by":"crossref","first-page":"374","DOI":"10.1007\/PL00009201","article-title":"Approximation algorithms for connected dominating sets","volume":"20","year":"1998","journal-title":"Algorithmica"},{"key":"key\n\t\t\t\t20171004104220_bxx014C23","first-page":"585","article-title":"On the construction of energy-efficient broadcast and multicast trees in wireless networks","volume":"2000","year":"2000","journal-title":"IEEE INFOCOM"},{"key":"key\n\t\t\t\t20171004104220_bxx014C24","first-page":"523","article-title":"r-shrink: a heuristic for improving minimum power broadcast trees in wireless networks","volume":"2003","year":"2013","journal-title":"IEEE GLOBECOM"},{"key":"key\n\t\t\t\t20171004104220_bxx014C25","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1109\/TSC.2015.2449314","article-title":"Service pricing decision in cyber-physical systems: insights from game theory","volume":"9","year":"2016","journal-title":"IEEE Trans. Serv. Comput."},{"key":"key\n\t\t\t\t20171004104220_bxx014C26","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1016\/j.pmcj.2015.10.002","article-title":"Level-based approach for minimum-transmission broadcast in duty-cycled wireless sensor networks","volume":"27","year":"2016","journal-title":"Pervasive Mob. Comput."},{"key":"key\n\t\t\t\t20171004104220_bxx014C27","doi-asserted-by":"crossref","first-page":"2219","DOI":"10.1007\/s11276-014-0732-z","article-title":"Approximation algorithms for broadcasting in duty cycled wireless sensor networks","volume":"20","year":"2014","journal-title":"Wirel. Netw."},{"volume-title":"Int. J. Commun. Syst.","year":"2015","first-page":"296","key":"key\n\t\t\t\t20171004104220_bxx014C28"},{"key":"key\n\t\t\t\t20171004104220_bxx014C29","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1007\/s11042-012-1013-4","article-title":"Towards smart city: M2M communications with software agent intelligence","volume":"67","year":"2013","journal-title":"Multimed. Tools Appl."},{"key":"key\n\t\t\t\t20171004104220_bxx014C30","doi-asserted-by":"crossref","first-page":"1794","DOI":"10.1109\/TWC.2015.2496596","article-title":"Node scheduling control inspired by epidemic theory for data dissemination in wireless sensor-actuator networks with delay constraints","volume":"15","year":"2016","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"key\n\t\t\t\t20171004104220_bxx014C31","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1109\/MCOM.2016.7588229","article-title":"Embracing big data with compressive sensing: a green approach in industrial wireless networks","volume":"54","year":"2016","journal-title":"IEEE Commun. Mag."},{"key":"key\n\t\t\t\t20171004104220_bxx014C32","doi-asserted-by":"crossref","first-page":"7364","DOI":"10.1109\/JSEN.2016.2566808","article-title":"Adaptive barrier coverage using software defined sensor networks","volume":"16","year":"2016","journal-title":"IEEE Sens. J."},{"year":"2017","journal-title":"Mob. Inf. Syst.","article-title":"Energy-efficient broadcasting scheme for smart industrial wireless sensor networks","key":"key\n\t\t\t\t20171004104220_bxx014C33"},{"key":"key\n\t\t\t\t20171004104220_bxx014C34","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1016\/j.comnet.2015.12.021","article-title":"ICP: instantaneous clustering protocol for wireless sensor networks","volume":"101","year":"2016","journal-title":"Comput. Netw."},{"key":"key\n\t\t\t\t20171004104220_bxx014C35","doi-asserted-by":"crossref","first-page":"138","DOI":"10.3390\/s17010138","article-title":"Adaptive information dissemination control to provide diffdelay for internet of things","volume":"17","year":"2017","journal-title":"Sensors"}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/60\/10\/1417\/20509093\/bxx014.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,4]],"date-time":"2017-10-04T10:42:40Z","timestamp":1507113760000},"score":1,"resource":{"primary":{"URL":"http:\/\/academic.oup.com\/comjnl\/article\/60\/10\/1417\/3061103\/LargeScale-Programing-Code-Dissemination-for"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,3]]},"references-count":35,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2017,3,3]]},"published-print":{"date-parts":[[2017,10]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxx014","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"type":"print","value":"0010-4620"},{"type":"electronic","value":"1460-2067"}],"subject":[],"published":{"date-parts":[[2017,3,3]]}}}