{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T18:17:39Z","timestamp":1758824259000,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1109\/broadnets.2007.4550425","type":"proceedings-article","created":{"date-parts":[[2008,6,24]],"date-time":"2008-06-24T18:27:28Z","timestamp":1214332048000},"page":"197-206","source":"Crossref","is-referenced-by-count":9,"title":["Joint monitoring and routing in wireless sensor networks using robust identifying codes"],"prefix":"10.1109","author":[{"given":"Moshe","family":"Laifenfeld","sequence":"first","affiliation":[]},{"given":"Ari","family":"Trachtenberg","sequence":"additional","affiliation":[]},{"given":"Reuven","family":"Cohen","sequence":"additional","affiliation":[]},{"given":"David","family":"Starobinski","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"crossref","DOI":"10.37236\/1910","article-title":"Construction of codes identifying sets of vertices","volume":"12","author":"gravier","year":"2005","journal-title":"The Electronic Journal of Combinatorics"},{"key":"ref30","article-title":"Compact routing on euclidean metrics","author":"abraham","year":"2004","journal-title":"Proceedings of the 23rd ACM Symposium on Principles of Distributed Computing (PODC'2004)"},{"key":"ref10","article-title":"Identifying codes in random networks","author":"moncel","year":"2005","journal-title":"IEEE Int Symp on Information Theory"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-3975(02)00536-4"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2002.800490"},{"article-title":"Optimal graphs for identification of vertices in networks","year":"0","author":"moncel","key":"ref13"},{"key":"ref14","article-title":"ch. Connected Dominating Set in Sensor Networks and MANETs","author":"blum","year":"2004","journal-title":"Handbook of Combinatorial Optimization"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.1023\/A:1019142928567","article-title":"A dominating-set-based routing scheme in ad hoc wireless networks","author":"wu","year":"0","journal-title":"Telecommunication Systems"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1002\/0471224561.ch20"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.862097"},{"journal-title":"Introduction to Algorithms","year":"2001","author":"cormen","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-0000(74)80044-9"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1006\/jagm.2000.1134"},{"journal-title":"sensicast Systems Inc","article-title":"Pump monitoring at a nuclear generating station","year":"2005","key":"ref4"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/378580.378581","article-title":"Compact routing schemes","author":"thorup","year":"2001","journal-title":"Proceedings of the Thirteenth Annual ACM Symposium on Parallel Algorithms and Architectures"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031498"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2004.830895"},{"key":"ref29","first-page":"217","article-title":"A survey on interval routing schemes","volume":"249","author":"gavoille","year":"1999","journal-title":"Theoret Comput Sci"},{"key":"ref5","article-title":"Robust location detection in emergency sensor net-works","author":"ray","year":"2003","journal-title":"Proc INFOCOM"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2005.03.005"},{"key":"ref7","article-title":"Discrete sensor placement problems in distribution networks","author":"berger-wolf","year":"2003","journal-title":"SIAM Conference on Mathematics for Industry"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1098918.1098925"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/18.661507"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/605397.605408"},{"key":"ref20","article-title":"A threshold of In $n$ for approximating set cover","author":"feige","year":"1996","journal-title":"Proc ACM Symposium on Theory of NP-Completeness"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2005.1523331"},{"journal-title":"Approximation Algorithms","year":"2001","author":"vazirani","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1997.646119"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539793260763"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/65950.65953"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/872035.872040"}],"event":{"name":"2007 4th International Conference on Broadband Communications, Networks and Systems (BROADNETS 2007)","start":{"date-parts":[[2007,9,10]]},"location":"Raleigh, NC, USA","end":{"date-parts":[[2007,9,14]]}},"container-title":["2007 Fourth International Conference on Broadband Communications, Networks and Systems (BROADNETS '07)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4543893\/4550387\/04550425.pdf?arnumber=4550425","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,6]],"date-time":"2020-05-06T15:56:41Z","timestamp":1588780601000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4550425\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/broadnets.2007.4550425","relation":{},"subject":[],"published":{"date-parts":[[2007]]}}}