{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T19:37:07Z","timestamp":1729625827674,"version":"3.28.0"},"reference-count":49,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1109\/iwqos.2015.7404753","type":"proceedings-article","created":{"date-parts":[[2016,2,12]],"date-time":"2016-02-12T04:06:12Z","timestamp":1455249972000},"page":"339-348","source":"Crossref","is-referenced-by-count":9,"title":["Scheduling with predictable link reliability for wireless networked control"],"prefix":"10.1109","author":[{"given":"Hongwei","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Xiaohui","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Chuan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Che","sequence":"additional","affiliation":[]},{"given":"Feng","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Le Yi","family":"Wang","sequence":"additional","affiliation":[]},{"given":"George","family":"Yin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1109\/TMC.2012.81"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1145\/1031495.1031508"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1109\/JPROC.2006.887290","article-title":"Control and communication challenges in networked real-time systems","volume":"95","author":"moyne","year":"2007","journal-title":"Proceedings of the IEEE"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1109\/INFCOM.2010.5462065"},{"key":"ref31","article-title":"A stochastic model for optimizing physical carrier sensing and spatial reuse in wireless ad hoc networks","author":"ma","year":"2005","journal-title":"IEEE MASS"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1145\/2248371.2248385"},{"key":"ref37","article-title":"Adaptive physical carrier sense in topology-controlled wireless networks","volume":"9","author":"park","year":"2009","journal-title":"IEEE Transactions on Mobile Computing"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1109\/TAC.2011.2163864"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1109\/INFCOM.2010.5462229"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1109\/JPROC.2006.887325"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/ICNP.2010.5762754"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1145\/1182807.1182830"},{"year":"2014","author":"liu","journal-title":"A maximal concurrency and low latency distributed scheduling protocol for wireless sensor networks arXiv 1403 4637v2","key":"ref29"},{"year":"0","journal-title":"Scheduling with predictable link reliability for wireless networked control","key":"ref2"},{"year":"0","journal-title":"Scheduling with predictable link reliability for wireless networked control","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1002\/047166880X"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1145\/938990.938993"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/ICDCS.2011.47"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1002\/dac.2381"},{"key":"ref23","article-title":"Improving throughput and fairness by reducing exposed and hidden nodes in 802.11 networks","volume":"7","author":"jiang","year":"2006","journal-title":"IEEE Transactions on Mobile Computing"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1145\/1860093.1860100"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1007\/978-3-540-92862-1_6"},{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4419-6047-4","author":"chen","year":"2010","journal-title":"Wirelesshart Real-time Mesh Network for Industrial Automation"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/ICNP.2010.5762757"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1109\/INFCOM.2009.5062105"},{"key":"ref12","article-title":"p3: A Practical Packet Pipeline Using Synchronous Transmissions for Wireless Sensor Networks","author":"doddavenkatappa","year":"2014","journal-title":"ACM\/IEEE IPSN"},{"key":"ref13","article-title":"Splash: Fast Data Dissemination with Constructive Interference in Wireless Sensor Networks","author":"doddavenkatappa","year":"2013","journal-title":"USENIX NSDI"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/INFCOM.2005.1498494"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.1145\/2426656.2426658","article-title":"Low-power wireless bus","author":"ferrari","year":"2012","journal-title":"ACM SenSys"},{"key":"ref16","article-title":"Efficient network flooding and time synchronization with glossy","author":"ferrari","year":"2011","journal-title":"ACM\/IEEE IPSN"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/INFCOM.2010.5462088"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1145\/1288107.1288122"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/TWC.2007.04793"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/MAHSS.2008.4660056"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/TMC.2010.81"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/ICDCS.2008.104"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1145\/1161089.1161092"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1145\/1062689.1062741"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/TWC.2009.080155"},{"key":"ref49","article-title":"RID: Radio interference detection in wireless sensor networks","author":"zhou","year":"2005","journal-title":"IEEE INFOCOM"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/TWC.2014.2321756"},{"doi-asserted-by":"publisher","key":"ref46","DOI":"10.1109\/INFCOM.2007.42"},{"key":"ref45","first-page":"1567","article-title":"An energy-efficient MAC protocol for wireless sensor networks","author":"ye","year":"2002","journal-title":"IEEE INFOCOM"},{"doi-asserted-by":"publisher","key":"ref48","DOI":"10.1145\/2530286"},{"doi-asserted-by":"publisher","key":"ref47","DOI":"10.1109\/TMC.2008.155"},{"key":"ref42","article-title":"Harnessing exposed terminals in wireless networks","author":"vutukuru","year":"2008","journal-title":"NSDI"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1109\/ALLERTON.2010.5707035"},{"doi-asserted-by":"publisher","key":"ref44","DOI":"10.1109\/TMC.2012.113"},{"doi-asserted-by":"publisher","key":"ref43","DOI":"10.1109\/ALLERTON.2010.5706950"}],"event":{"name":"2015 IEEE 23rd International Symposium on Quality of Service (IWQoS)","start":{"date-parts":[[2015,6,15]]},"location":"Portland, OR, USA","end":{"date-parts":[[2015,6,16]]}},"container-title":["2015 IEEE 23rd International Symposium on Quality of Service (IWQoS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7395993\/7404688\/07404753.pdf?arnumber=7404753","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,14]],"date-time":"2024-06-14T09:25:59Z","timestamp":1718357159000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7404753"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6]]},"references-count":49,"URL":"https:\/\/doi.org\/10.1109\/iwqos.2015.7404753","relation":{},"subject":[],"published":{"date-parts":[[2015,6]]}}}