{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T04:42:59Z","timestamp":1769920979354,"version":"3.49.0"},"reference-count":30,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2015,12,1]],"date-time":"2015-12-01T00:00:00Z","timestamp":1448928000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE\/ACM Trans. Networking"],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1109\/tnet.2014.2338355","type":"journal-article","created":{"date-parts":[[2014,7,24]],"date-time":"2014-07-24T18:40:27Z","timestamp":1406227227000},"page":"1705-1718","source":"Crossref","is-referenced-by-count":46,"title":["Homology-Based Distributed Coverage Hole Detection in Wireless Sensor Networks"],"prefix":"10.1109","volume":"23","author":[{"given":"Feng","family":"Yan","sequence":"first","affiliation":[]},{"given":"Anais","family":"Vergne","sequence":"additional","affiliation":[]},{"given":"Philippe","family":"Martins","sequence":"additional","affiliation":[]},{"given":"Laurent","family":"Decreusefond","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","author":"tong","year":"2006","journal-title":"?On discovering sensing coverage holes in large-scale sensor networks ?"},{"key":"ref10","first-page":"1024","article-title":"Control using higher order Laplacians in network topologies","author":"muhammad","year":"2006","journal-title":"Proc 17th Int Symp Math Theory Netw Syst"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2010.2047541"},{"key":"ref12","first-page":"475","article-title":"A study of the coverage of large-scale sensor networks","author":"liu","year":"2004","journal-title":"Proc IEEE MASS"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"2658","DOI":"10.1109\/TIT.2005.862092","article-title":"Coverage by randomly deployed wireless sensor networks","volume":"52","author":"wan","year":"2006","journal-title":"IEEE Trans Inf Theory"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1167935.1167937"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2169300"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6364341"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1177\/0278364906072252"},{"key":"ref18","first-page":"10","article-title":"Homological sensor networks","volume":"54","author":"silva","year":"2007","journal-title":"Notices Amer Math Soc"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2007.4283133"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1530748.1530767"},{"key":"ref4","first-page":"868","article-title":"Detecting coverage boundary nodes in wireless sensor networks","author":"zhang","year":"2006","journal-title":"Proc IEEE Int Conf Netw Sensing Control"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MWCN.2002.1045708"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-007-0021-1"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.85"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6566818"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.67"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.2140\/agt.2007.7.339"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.15607\/RSS.2005.I.044"},{"key":"ref2","first-page":"2469","article-title":"Movement-assisted sensor deployment","volume":"4","author":"wang","year":"2004","journal-title":"Proc IEEE InfoCom"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2005.1440933"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2004.1354667"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1007\/s00200-012-0167-7","article-title":"Distributed computation of coverage in sensor networks by homological methods","volume":"23","author":"dlotko","year":"2012","journal-title":"Appl Algebra Eng Commun Comput"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1614320.1614339"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2010.9"},{"key":"ref24","author":"munkres","year":"1984","journal-title":"Elements of Algebraic Topology"},{"key":"ref23","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-1793-8","author":"armstrong","year":"1983","journal-title":"Basic Topology"},{"key":"ref26","first-page":"1","article-title":"Connectivity-based distributed coverage hole detection in wireless sensor networks","author":"yan","year":"2011","journal-title":"Proc IEEE Globecom"},{"key":"ref25","author":"hatcher","year":"2002","journal-title":"Algebraic Topology"}],"container-title":["IEEE\/ACM Transactions on Networking"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/90\/7358195\/06863696.pdf?arnumber=6863696","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:28:21Z","timestamp":1642004901000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6863696\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12]]},"references-count":30,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tnet.2014.2338355","relation":{},"ISSN":["1063-6692","1558-2566"],"issn-type":[{"value":"1063-6692","type":"print"},{"value":"1558-2566","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,12]]}}}