{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T21:35:14Z","timestamp":1729632914376,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,3]]},"DOI":"10.1109\/icassp.2016.7472905","type":"proceedings-article","created":{"date-parts":[[2016,6,23]],"date-time":"2016-06-23T21:58:30Z","timestamp":1466719110000},"page":"6380-6384","source":"Crossref","is-referenced-by-count":6,"title":["Maintaining throughput network connectivity in ad hoc networks"],"prefix":"10.1109","author":[{"given":"Ying","family":"Liu","sequence":"first","affiliation":[]},{"given":"Audrey","family":"Garnaev","sequence":"additional","affiliation":[]},{"given":"Wade","family":"Trappe","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Game Theory","year":"1982","author":"owen","key":"ref30"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.110418"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-03871-1_15"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-16292-8_17"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2011.6133863"},{"journal-title":"Wireless Networks Multiuser Detection in Cross-Layer Design","year":"2005","author":"comaniciu","key":"ref14"},{"journal-title":"Multiuser Detectiony","year":"1998","author":"verdu","key":"ref15"},{"journal-title":"Detection Estimation and Modulation Theory","year":"2001","author":"trees","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1967.5573"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2003.1204119"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2015.7178268"},{"key":"ref28","article-title":"SDPA-M (semidefinite programming algorithm in matlab) user's manual-version 6.2","volume":"10","author":"fujisawa","year":"2000","journal-title":"Research Reports on Mathematical and Computing Sciences Series B Operation Res Dep Math and Computing Sci Tokyo Institute of Technol"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2007.223"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2007.223"},{"key":"ref3","first-page":"2801","article-title":"On the control of the algebraic connectivity and clustering of a mobile robotic network","author":"morbidi","year":"2013","journal-title":"Proc European Control Conference (ECC)"},{"key":"ref6","first-page":"3628","article-title":"Decentralized control of connectivity for multi-agent systems","author":"de gennaro","year":"2009","journal-title":"Proc IEEE Conference on Decision and Control (CDC"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1080\/10556789908805765"},{"key":"ref5","first-page":"76","article-title":"Improvement of connectivity in mobile ad-hoc networks by adding static nodes based on a realistic mobility model","volume":"8","author":"romoozi","year":"2011","journal-title":"IJCSI International Journal of Computer Science Issues"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2009.2015953"},{"key":"ref7","first-page":"99","article-title":"On maximizing the second smallest eigenvalue of a state-dependent graph laplacian","author":"kim","year":"2005","journal-title":"Proc American Control Conference (ACC)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2014.2355778"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/GAMENETS.2009.5137463"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2006.377282"},{"key":"ref20","article-title":"Anti-jamming strategy versus a low-power jamming attack when intelligence of adversary's attack type is unknown","author":"garnaev","year":"2015","journal-title":"IEEE Trans Signal Inf Process Over Netw"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2014.6997463"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2012.6503252"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1137\/1038003"},{"key":"ref23","article-title":"Eigenvalue and singular value optimization","author":"blanco","year":"2003","journal-title":"Mecanica Computational"},{"key":"ref26","article-title":"A MATLAB software package for semidefinite programming","author":"todd","year":"1996","journal-title":"Technical report School of OR and IE Cornell University"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s10107-002-0347-5"}],"event":{"name":"2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","start":{"date-parts":[[2016,3,20]]},"location":"Shanghai","end":{"date-parts":[[2016,3,25]]}},"container-title":["2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7465907\/7471614\/07472905.pdf?arnumber=7472905","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,10,13]],"date-time":"2016-10-13T11:55:44Z","timestamp":1476359744000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7472905\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/icassp.2016.7472905","relation":{},"subject":[],"published":{"date-parts":[[2016,3]]}}}