{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T04:17:10Z","timestamp":1725769030460},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,6]]},"DOI":"10.1109\/dcoss.2011.5982176","type":"proceedings-article","created":{"date-parts":[[2011,9,23]],"date-time":"2011-09-23T13:53:03Z","timestamp":1316785983000},"page":"1-8","source":"Crossref","is-referenced-by-count":6,"title":["Planning the trajectories of multiple mobile sinks in large-scale, time-sensitive WSNs"],"prefix":"10.1109","author":[{"given":"Wint Yi","family":"Poe","sequence":"first","affiliation":[]},{"given":"Michael","family":"Beck","sequence":"additional","affiliation":[]},{"given":"Jens B.","family":"Schmitt","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SNPA.2003.1203354"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1975.8"},{"key":"ref12","article-title":"A Low-Cost Method to Thwart Relay Attacks in Wireless Sensor Networks","author":"shokri","year":"2007","journal-title":"Proj Report IC-71"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2006.109"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062188"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2005.259"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/WOWMOM.2009.5282492"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1298091.1298097"},{"article-title":"Mobility in Wireless Networks: Friend or Foe - Network Design and Control in the Age of Mobile Computing","year":"2006","author":"luo","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/989459.989481"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/DCOSS.2011.5982176"},{"key":"ref7","article-title":"Maximum lifetime routing to mobile sink in wireless sensor networks","author":"papadimitriou","year":"2005","journal-title":"Proc Int Conf on Software Telecommunications and Computer Networks"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-007-0017-x"},{"journal-title":"MPR-MIB Users Manual","year":"2007","key":"ref1"},{"key":"ref9","article-title":"Sensor Network Calculus - A Framework for Worst Case Analysis","author":"schmitt","year":"2005","journal-title":"Proc DCOSS"}],"event":{"name":"2011 International Conference on Distributed Computing in Sensor Systems (DCOSS)","start":{"date-parts":[[2011,6,27]]},"location":"Barcelona, Spain","end":{"date-parts":[[2011,6,29]]}},"container-title":["2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5970758\/5982133\/05982176.pdf?arnumber=5982176","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T06:35:05Z","timestamp":1490078105000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5982176\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/dcoss.2011.5982176","relation":{},"subject":[],"published":{"date-parts":[[2011,6]]}}}