{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T10:08:03Z","timestamp":1742378883740},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2009,4,1]],"date-time":"2009-04-01T00:00:00Z","timestamp":1238544000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2009,4,1]],"date-time":"2009-04-01T00:00:00Z","timestamp":1238544000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,4]]},"DOI":"10.1109\/infcom.2009.5062258","type":"proceedings-article","created":{"date-parts":[[2009,6,3]],"date-time":"2009-06-03T15:10:14Z","timestamp":1244041814000},"page":"2916-2920","source":"Crossref","is-referenced-by-count":21,"title":["CASE: Connectivity-Based Skeleton Extraction in Wireless Sensor Networks"],"prefix":"10.1109","author":[{"family":"Hongbo Jiang","sequence":"first","affiliation":[{"name":"Dept. of EIE, Huazhong Univ. of Sci. & Technol., Wuhan"}]},{"family":"Wenping Liu","sequence":"additional","affiliation":[{"name":"Dept. of EIE, Huazhong Univ. of Sci. & Technol., Wuhan"}]},{"family":"Dan Wang","sequence":"additional","affiliation":[]},{"family":"Chen Tian","sequence":"additional","affiliation":[{"name":"Dept. of EIE, Huazhong Univ. of Sci. & Technol., Wuhan"}]},{"family":"Xiang Bai","sequence":"additional","affiliation":[{"name":"Dept. of EIE, Huazhong Univ. of Sci. & Technol., Wuhan"}]},{"family":"Xue Liu","sequence":"additional","affiliation":[]},{"family":"Ying Wu","sequence":"additional","affiliation":[]},{"family":"Wenyu Liu","sequence":"additional","affiliation":[{"name":"Dept. of EIE, Huazhong Univ. of Sci. & Technol., Wuhan"}]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.214"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/990680.990704"},{"key":"18","article-title":"boundary recognition in sensor networks by topological methods","author":"wang","year":"2006","journal-title":"Proceedings of ACM MOBICOM"},{"key":"15","article-title":"on boundary recognition without location information in wireless sensor networks","author":"saukh","year":"2008","journal-title":"Proc IPSN"},{"key":"16","article-title":"example-based skeleton extraction","author":"schaefer","year":"2007","journal-title":"Proceedings of Eurographics Symposium on Geometry Processing"},{"key":"13","article-title":"connectivity-based localization of large scale sensor networks with complex shape","author":"lederer","year":"2008","journal-title":"Proceedings of IEEE Infocom"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/RTCSA.2007.7"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2000.855792"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/34.879802"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-006-9857-z"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-006-9857-z"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.59"},{"key":"10","article-title":"coverage and hole-detection in sensor networks via homology","author":"ghrist","year":"2004","journal-title":"Proc IEEE IPSN"},{"key":"7","doi-asserted-by":"crossref","DOI":"10.1007\/s11036-006-4471-y","article-title":"locating and bypassing routing holes in sensor networks","author":"fang","year":"2006","journal-title":"Mobile Networks and Applications"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(02)00098-5"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-006-5684-5"},{"key":"4","article-title":"distributed navigation algorithms for sensor networks","author":"buragohain","year":"2006","journal-title":"Proceedings of IEEE Infocom"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/62.656334"},{"key":"8","article-title":"locating and bypassing routing holes in sensor networks","author":"fekete","year":"2004","journal-title":"Proc 1st Int Workshop on Algorithmic Aspects of Wireless Sensor Networks"}],"event":{"name":"2009 Proceedings IEEE INFOCOM","start":{"date-parts":[[2009,4,19]]},"location":"Rio de Janeiro, Brazil","end":{"date-parts":[[2009,4,25]]}},"container-title":["IEEE INFOCOM 2009"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5061887\/5061888\/05062258.pdf?arnumber=5062258","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,2]],"date-time":"2023-03-02T18:21:58Z","timestamp":1677781318000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/5062258\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,4]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/infcom.2009.5062258","relation":{},"subject":[],"published":{"date-parts":[[2009,4]]}}}