{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T19:32:00Z","timestamp":1774121520321,"version":"3.50.1"},"reference-count":35,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2013,2,1]],"date-time":"2013-02-01T00:00:00Z","timestamp":1359676800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Ind. Inf."],"published-print":{"date-parts":[[2013,2]]},"DOI":"10.1109\/tii.2011.2174247","type":"journal-article","created":{"date-parts":[[2011,11,1]],"date-time":"2011-11-01T20:08:34Z","timestamp":1320178114000},"page":"514-526","source":"Crossref","is-referenced-by-count":46,"title":["Harvesting-Aware Energy Management for Time-Critical Wireless Sensor Networks With Joint Voltage and Modulation Scaling"],"prefix":"10.1109","volume":"9","author":[{"given":"Bo","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Robert","family":"Simon","sequence":"additional","affiliation":[]},{"given":"Hakan","family":"Aydin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2010.5457052"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1109\/REAL.2002.1181582","article-title":"WCET analysis of probabilistic hard real-time systems","author":"bernat","year":"2002","journal-title":"Proc IEEE Real-Time Syst Symp (RTSS'02)"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2009.2025656"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2009.2017938"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1594233.1594338"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1629911.1630113"},{"key":"ref10","first-page":"315","article-title":"Decentralized, adaptive resource allocation for sensor networks","author":"mainland","year":"2005","journal-title":"Proc of the 2nd Symp on Networked System Design and Implementation (NSDI)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2008.2011052"},{"key":"ref12","article-title":"Automated design of pinconstrained digital microfluidic arrays for lab-on-a-chip applications","author":"hwang","year":"2006","journal-title":"Proc ACM Design Autom Conf"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1274858.1274870"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2008.4484692"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1060289.1060303"},{"key":"ref16","year":"2005","journal-title":"Xscale pxa27x data sheet"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1773814.1773818"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2009.158"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ECRTS.2006.23"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2006.04709"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2010.2040630"},{"key":"ref27","first-page":"1","article-title":"Designing modular and redundant cyber architectures for process control: Lessons learned","author":"verissimo","year":"2009","journal-title":"Proc 42nd Hawaii Int Conf Syst Sci (HICSS'09)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2010.2102321"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2004.1275298"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2007.364653"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1460412.1460430"},{"key":"ref8","year":"2006","journal-title":"Crossbow Technology iMote2 Datasheet"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1644038.1644112"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2009.2025863"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2010.2091280"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2010.2050144"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1777406.1777413"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2008.124"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICETET.2008.161"},{"key":"ref24","author":"tidwell","year":"2010","journal-title":"Optimal Time Utility Based Scheduling Policy Design for Cyber-Physical Systems TR 2010-27"},{"key":"ref23","year":"0","journal-title":"Texas Instrument CC2420 Data Sheet docs tinyos net\/index php\/CC2420"},{"key":"ref26","year":"2010","journal-title":"U S Environmental Protection Agency EPANET 2 0 water supply and water resources"},{"key":"ref25","year":"2009","journal-title":"U S Department of Energy National SCADA test bed study of security attributes of smart grid systems current cyber security issues"}],"container-title":["IEEE Transactions on Industrial Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9424\/6387656\/06064890.pdf?arnumber=6064890","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,10]],"date-time":"2021-10-10T23:53:24Z","timestamp":1633910004000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6064890\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,2]]},"references-count":35,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tii.2011.2174247","relation":{},"ISSN":["1551-3203","1941-0050"],"issn-type":[{"value":"1551-3203","type":"print"},{"value":"1941-0050","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,2]]}}}