{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T10:15:46Z","timestamp":1760955346317},"reference-count":16,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Inform. Theory"],"published-print":{"date-parts":[[2012,1]]},"DOI":"10.1109\/tit.2011.2169300","type":"journal-article","created":{"date-parts":[[2012,1,11]],"date-time":"2012-01-11T21:58:12Z","timestamp":1326319092000},"page":"430-437","source":"Crossref","is-referenced-by-count":16,"title":["Coverage Properties of the Target Area in Wireless Sensor Networks"],"prefix":"10.1109","volume":"58","author":[{"given":"Xiaoyun","family":"Li","sequence":"first","affiliation":[]},{"given":"David K.","family":"Hunter","sequence":"additional","affiliation":[]},{"given":"Sergei","family":"Zuyev","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/989459.989475"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2009.026363"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.67"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1239\/aap\/1029955139"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1239\/aap\/1046366099"},{"key":"ref15","year":"0","journal-title":"R A Language and Environment for Statistical Computing"},{"key":"ref16","author":"daley","year":"2003","journal-title":"An Introduction to the Theory of Point Processes Vol I Elementary Theory and Methods"},{"key":"ref4","first-page":"689","author":"biswas","year":"2007","journal-title":"Hybrid Sensor Network Test Bed for Reinforced Target Tracking"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780198506263.001.0001"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICSENS.2003.1279085"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1072989.1072992"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/BF02399201"},{"key":"ref7","first-page":"144","article-title":"On <formula formulatype=\"inline\"> <tex Notation=\"TeX\">$k$<\/tex><\/formula>-coverage in a mostly sleeping sensor network","author":"kumar","year":"2004","journal-title":"Proc 10th Int Conf Mobile Comput Netw"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.66.016121"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/0012-365X(90)90358-O"},{"key":"ref9","author":"hall","year":"1988","journal-title":"Introduction to the Theory of Coverage Processes"}],"container-title":["IEEE Transactions on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/18\/6121971\/06121992.pdf?arnumber=6121992","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,10]],"date-time":"2021-10-10T23:47:18Z","timestamp":1633909638000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6121992\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,1]]},"references-count":16,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tit.2011.2169300","relation":{},"ISSN":["0018-9448","1557-9654"],"issn-type":[{"value":"0018-9448","type":"print"},{"value":"1557-9654","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,1]]}}}