{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T00:38:23Z","timestamp":1730248703566,"version":"3.28.0"},"reference-count":5,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/icitst.2016.7856722","type":"proceedings-article","created":{"date-parts":[[2017,2,16]],"date-time":"2017-02-16T17:16:34Z","timestamp":1487265394000},"page":"326-327","source":"Crossref","is-referenced-by-count":1,"title":["Experience-based learning for identifying sub-regions in Wireless Sensor Networks"],"prefix":"10.1109","author":[{"given":"Aiman","family":"Ghannami","sequence":"first","affiliation":[]},{"family":"ChenXi Shao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/TC.2011.82"},{"key":"ref3","first-page":"519","article-title":"The coverage problem in a wirelesssensor network","volume":"10 4","author":"chi-fu","year":"2005","journal-title":"Mobile Networks and Applications"},{"key":"ref5","article-title":"An area-based collaborative sleeping protocol for wireless sensor networks","author":"yanli","year":"2006","journal-title":"Asia-Pacific Web Conference"},{"key":"ref2","first-page":"1672","article-title":"An algorithmic solution for computing circle intersection areas and its applications to wireless communications","volume":"14 18","author":"federico","year":"2014","journal-title":"Wireless Communications and Mobile Computing"},{"year":"2010","author":"waltenegus","journal-title":"Fundamentals of Wireless Sensor Networks Theory and Practice","key":"ref1"}],"event":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2016,12,5]]},"location":"Barcelona, Spain","end":{"date-parts":[[2016,12,7]]}},"container-title":["2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7847254\/7856645\/07856722.pdf?arnumber=7856722","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,1]],"date-time":"2017-03-01T17:39:36Z","timestamp":1488389976000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7856722\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":5,"URL":"https:\/\/doi.org\/10.1109\/icitst.2016.7856722","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}