{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T08:50:03Z","timestamp":1729673403049,"version":"3.28.0"},"reference-count":38,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1109\/wowmom.2015.7158131","type":"proceedings-article","created":{"date-parts":[[2015,7,16]],"date-time":"2015-07-16T17:52:09Z","timestamp":1437069129000},"page":"1-9","source":"Crossref","is-referenced-by-count":1,"title":["Analysis of deployment and movement policies in wireless sensor and robot networks"],"prefix":"10.1109","author":[{"given":"Andrew","family":"Wichmann","sequence":"first","affiliation":[]},{"given":"Turgay","family":"Korkmaz","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref38","first-page":"277","article-title":"Perturbation of extended enumerations of eigenvalues","volume":"65","author":"bhatia","year":"1999","journal-title":"Acta Mathematica Scientia"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/S0377-2217(98)00186-6"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/957195.808055"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2006.04.003"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.22.1.57"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.2307\/3007312"},{"key":"ref36","first-page":"574","article-title":"Continue research on topological characteristics of random multihop wireless networks","author":"lu","year":"2008","journal-title":"Communication Systems 2008 ICCS 2008 11th IEEE Singapore International Conference on"},{"journal-title":"Mesquite Software","article-title":"CSIM","year":"0","key":"ref35"},{"article-title":"JGAP - Java Genetic Algorithms and Genetic Programming Package","year":"0","author":"meffert","key":"ref34"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1287\/opre.11.3.331"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/321738.321743"},{"journal-title":"Network Flows Theory Algorithms and Applications","year":"1993","author":"ahuja","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/0305-0548(95)00063-1"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1993042.1993049"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2011.2157132"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5962922"},{"key":"ref17","article-title":"Scheduling under location and time constraints for data collection in sensor networks","author":"sugihara","year":"2007","journal-title":"Proceedings of the 28th IEEE International Real-Time Systems Symposium"},{"key":"ref18","article-title":"Path planning of data mules in sensor networks","author":"sugihara","year":"2009","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2009.113"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.apm.2009.10.005"},{"journal-title":"Robot-Sensor Networks for Search and Rescue","year":"2006","author":"reich","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1287\/trsc.4.4.406"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/10991459_51"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78831-7_27"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2008.11.015"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.10.002"},{"journal-title":"The IEEE International Conference on Industrial Inforatics(INDIN 2008) Deajon Korea","year":"2008","author":"farkhatdinov","key":"ref8"},{"journal-title":"A Survey on Teleoperation","year":"2007","author":"lichiardopol","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1002\/047174414X"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.06.005"},{"journal-title":"Protocols and Architectures for Wireless Sensor Networks","year":"2006","author":"karl","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.193"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CIRA.2007.382919"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88513-9_89"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/REAL.2004.31"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1002\/net.20454"},{"key":"ref26","doi-asserted-by":"crossref","DOI":"10.1007\/11502593_20","article-title":"Multiple controlled mobile elements (data mules) for data collection in sensor networks","author":"jea","year":"2005","journal-title":"International Conference on Distributed Computing in Sensor Systems"},{"key":"ref25","first-page":"1","author":"xu","year":"2010","journal-title":"INFOCOM 2010 Proceedings IEEE"}],"event":{"name":"2015 IEEE 16th International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","start":{"date-parts":[[2015,6,14]]},"location":"Boston, MA, USA","end":{"date-parts":[[2015,6,17]]}},"container-title":["2015 IEEE 16th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7152453\/7158105\/07158131.pdf?arnumber=7158131","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T11:45:33Z","timestamp":1602675933000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7158131"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/wowmom.2015.7158131","relation":{},"subject":[],"published":{"date-parts":[[2015,6]]}}}