{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,28]],"date-time":"2025-04-28T11:28:28Z","timestamp":1745839708456},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1109\/infocom.2019.8737607","type":"proceedings-article","created":{"date-parts":[[2019,6,18]],"date-time":"2019-06-18T00:35:56Z","timestamp":1560818156000},"page":"1369-1377","source":"Crossref","is-referenced-by-count":12,"title":["Maximum Lifetime Analytics in IoT Networks"],"prefix":"10.1109","author":[{"given":"Victor","family":"Valls","sequence":"first","affiliation":[]},{"given":"George","family":"Iosifidis","sequence":"additional","affiliation":[]},{"given":"Theodoros","family":"Salonidis","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"ref31"},{"year":"0","key":"ref30"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2005.11010"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.1657814"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45551-5_59"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2016.08.028"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.39"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.23919\/WIOPT.2018.8362855"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2016.7562090"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057039"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/18.825799"},{"key":"ref19","article-title":"Yolov3: An incremental improvement","author":"redmon","year":"2018","journal-title":"arXiv 1804 02767"},{"key":"ref28","article-title":"Stability and Capacity Regions or Discrete Time Queueing Networks","author":"neely","year":"2010","journal-title":"ArXiv e-prints"},{"journal-title":"IDC FutureScape","article-title":"WorldWide IoT 2016 Predictions","year":"2016","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.897944"},{"journal-title":"White paper Cisco Global Cloud","article-title":"Forecast and methodology","year":"2015","key":"ref3"},{"key":"ref6","article-title":"Routing for maximum system lifetime in wireless ad-hoc networks","author":"chang","year":"1999","journal-title":"Allerton Conference"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2009.090902"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2004.833122"},{"key":"ref8","article-title":"A utility-based distributed maximum lifetime routing algorithm for wireless networks","author":"xue","year":"2005","journal-title":"Quality of Service in Heterogeneous Wired\/Wireless Networks"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2006.1687734"},{"key":"ref2","article-title":"Cognitive hyperconnected digital transformation internet of things intelligence evolution","author":"vermesan","year":"2017","journal-title":"Series in Communications"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2008.252"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7996821"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1080829.1080837"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804441"},{"journal-title":"Linear Programming and Extensions","year":"1963","author":"dantzig","key":"ref21"},{"journal-title":"SCS Splitting conic solver version 2 0 2","year":"2017","author":"o\u2019donoghue","key":"ref24"},{"journal-title":"Convex Analysis and Optimization","year":"2003","author":"bertsekas","key":"ref23"},{"journal-title":"Nonlinear Programming","year":"1999","author":"bertsekas","key":"ref26"},{"journal-title":"Resource Allocation and Cross-Layer Control in Wireless Networks","year":"2006","author":"georgiadis","key":"ref25"}],"event":{"name":"IEEE INFOCOM 2019 - IEEE Conference on Computer Communications","start":{"date-parts":[[2019,4,29]]},"location":"Paris, France","end":{"date-parts":[[2019,5,2]]}},"container-title":["IEEE INFOCOM 2019 - IEEE Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8732929\/8737365\/08737607.pdf?arnumber=8737607","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T03:15:01Z","timestamp":1657854901000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8737607\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/infocom.2019.8737607","relation":{},"subject":[],"published":{"date-parts":[[2019,4]]}}}