{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T09:01:09Z","timestamp":1773910869977,"version":"3.50.1"},"reference-count":29,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","license":[{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872193"],"award-info":[{"award-number":["61872193"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872191"],"award-info":[{"award-number":["61872191"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072254"],"award-info":[{"award-number":["62072254"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Mobile Comput."],"published-print":{"date-parts":[[2023,8,1]]},"DOI":"10.1109\/tmc.2022.3162112","type":"journal-article","created":{"date-parts":[[2022,3,24]],"date-time":"2022-03-24T17:41:59Z","timestamp":1648143719000},"page":"4563-4577","source":"Crossref","is-referenced-by-count":15,"title":["Comprehensive Cost Optimization for Charger Deployment in Multi-hop Wireless Charging"],"prefix":"10.1109","volume":"22","author":[{"given":"Sixu","family":"Wu","sequence":"first","affiliation":[{"name":"Jiangsu Key Laboratory of Big Data Security and Intelligent Processing, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0545-8187","authenticated-orcid":false,"given":"Haipeng","family":"Dai","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, Jiangsu, China"}]},{"given":"Lijie","family":"Xu","sequence":"additional","affiliation":[{"name":"Jiangsu Key Laboratory of Big Data Security and Intelligent Processing, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0824-6203","authenticated-orcid":false,"given":"Linfeng","family":"Liu","sequence":"additional","affiliation":[{"name":"Jiangsu Key Laboratory of Big Data Security and Intelligent Processing, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1815-2793","authenticated-orcid":false,"given":"Fu","family":"Xiao","sequence":"additional","affiliation":[{"name":"Jiangsu Key Laboratory of Big Data Security and Intelligent Processing, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0523-9673","authenticated-orcid":false,"given":"Jia","family":"Xu","sequence":"additional","affiliation":[{"name":"Jiangsu Key Laboratory of Big Data Security and Intelligent Processing, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2499783"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2016.2567382"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ECCE.2010.5617728"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ELEKTRO.2018.8398268"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICICCS48265.2020.9120916"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.2997602"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2019.00085"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3023695"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ISSNIP.2008.4762042"},{"issue":"11","key":"ref10","doi-asserted-by":"crossref","first-page":"4750","DOI":"10.1109\/TPEL.2011.2174655","article-title":"Wireless power domino-resonator systems with noncoaxial axes and circular structures","volume":"27","author":"Zhong","year":"2012","journal-title":"IEEE Trans. Power Electron."},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS51616.2021.00071"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2021.102059"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2013.6831114"},{"key":"ref15","first-page":"42","article-title":"Deployment method for resonant repeaters in multi-hop Wireless rechargeable sensor networks","volume":"37","author":"Wu","year":"2018","journal-title":"Transducer Microsystem Technol."},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1030.0193"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2841420"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS.2010.35"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934919"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737505"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2732979"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-27119-4_45"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/S0377-2217(99)00105-8"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/S0377-2217(96)00227-5"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3410454"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511800481.017"},{"key":"ref27","first-page":"118","article-title":"For a proof of unique existence","volume-title":"Game Theory Economic Analysis","author":"Ichiishi","year":"2014"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/10.1.85"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1983.1095881"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2005.845533"}],"container-title":["IEEE Transactions on Mobile Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7755\/10169862\/09741376.pdf?arnumber=9741376","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T18:05:36Z","timestamp":1761847536000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9741376\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,1]]},"references-count":29,"journal-issue":{"issue":"8"},"URL":"https:\/\/doi.org\/10.1109\/tmc.2022.3162112","relation":{},"ISSN":["1536-1233","1558-0660","2161-9875"],"issn-type":[{"value":"1536-1233","type":"print"},{"value":"1558-0660","type":"electronic"},{"value":"2161-9875","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8,1]]}}}