{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T12:26:39Z","timestamp":1772022399839,"version":"3.50.1"},"reference-count":42,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2009,8,1]],"date-time":"2009-08-01T00:00:00Z","timestamp":1249084800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Ind. Inf."],"published-print":{"date-parts":[[2009,8]]},"DOI":"10.1109\/tii.2009.2026643","type":"journal-article","created":{"date-parts":[[2009,8,11]],"date-time":"2009-08-11T19:08:16Z","timestamp":1250017696000},"page":"299-313","source":"Crossref","is-referenced-by-count":77,"title":["Improving Quality-of-Service in Wireless Sensor Networks by Mitigating \u201cHidden-Node Collisions\u201d"],"prefix":"10.1109","volume":"5","author":[{"given":"Anis","family":"Koubaa","sequence":"first","affiliation":[]},{"given":"Ricardo","family":"Severino","sequence":"additional","affiliation":[]},{"given":"M\u00c1rio","family":"Alves","sequence":"additional","affiliation":[]},{"given":"Eduardo","family":"Tovar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2007.1045"},{"key":"ref38","year":"2006","journal-title":"Chipcon Packet Sniffer for IEEE 802 15 4"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS.2006.29"},{"key":"ref32","year":"2006","journal-title":"ZigBee specification"},{"key":"ref31","year":"2006"},{"key":"ref30","author":"severino","year":"2008","journal-title":"On the use of IEEE 802 15 4\/ZigBee for Time-Sensitive Wireless Sensor Network Applications"},{"key":"ref37","year":"0","journal-title":"MICAz\/MICA2 Mote Datasheets"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/WFCS.2006.1704149"},{"key":"ref35","year":"2006","journal-title":"An Open-Source Toolset for the IEEE 802 15 4\/ZigBee Protocol Stack"},{"key":"ref34","year":"2007"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/55483.55518"},{"key":"ref40","author":"kouba","year":"2007","journal-title":"H-NAMe Specifying implementing and testing a hidden-node avoidance mechanism for wireless sensor networks"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2002.1010617"},{"key":"ref12","first-page":"397","article-title":"wireless collision detect (wcd): multiple access with receiver initiated feedback and carrier detect signal","author":"chandra","year":"2000","journal-title":"Proc IEEE ICC"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2005.1558014"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1976.1093393"},{"key":"ref15","first-page":"134","article-title":"macaa new channel access method for packet radio","author":"karn","year":"1990","journal-title":"ARRL\/CRRL Amateur Radio 9th Comp Net Conf"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/190314.190334"},{"key":"ref17","year":"1999","journal-title":"Part 11 Wireless LAN medium access control (MAC) and physical layer (PHY) specifications"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1145\/263109.263137","article-title":"solutions to hidden terminal problems in wireless networks","author":"fullmer","year":"1997","journal-title":"Proc ACM Sigcomm"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"3978","DOI":"10.1016\/j.comnet.2007.04.016","article-title":"double sense multiple access for wireless ad-hoc networks","volume":"51","author":"yang","year":"2007","journal-title":"Int J Comput Telecomm Netw"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/WICON.2005.16"},{"key":"ref4","author":"jurck","year":"2007","journal-title":"The IEEE 802 15 4 OPNET Simulation Model Reference Guide v2 0"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402977"},{"key":"ref3","year":"2006"},{"key":"ref6","author":"cunha","year":"2007"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ECRTS.2007.82"},{"key":"ref5","year":"2003","journal-title":"Part 15 4 Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2005.66"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"1179","DOI":"10.1016\/j.comcom.2004.07.024","article-title":"performance of wireless networks with hidden nodes: a queuing-theoretic analysis","volume":"28","author":"ray","year":"2005","journal-title":"Comput Commun"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1384609.1384618"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1975.1092767"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2005.386"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/S1570-8705(03)00015-5"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"1013","DOI":"10.1109\/GLOCOM.2003.1258391","article-title":"improving spatial reuse of ieee 802.11 based ad hoc networks","volume":"2","author":"ye","year":"2003","journal-title":"Proc IEEE Global Telecommun Conf (GLOBECOM'03)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2004.1378900"},{"key":"ref42","year":"0","journal-title":"CC2420 Transceiver Datasheet"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2007.1045"},{"key":"ref41","author":"severino","year":"2006","journal-title":"On a test-bed application for the ART-WiSe framework"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.119"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409983"},{"key":"ref25","first-page":"339","article-title":"interference cancellation: better receivers for a new wireless mac","author":"halperin","year":"2007","journal-title":"Proc HOTNETS"}],"container-title":["IEEE Transactions on Industrial Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9424\/5196841\/05196849.pdf?arnumber=5196849","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,10]],"date-time":"2021-10-10T23:59:13Z","timestamp":1633910353000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5196849\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,8]]},"references-count":42,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tii.2009.2026643","relation":{},"ISSN":["1551-3203"],"issn-type":[{"value":"1551-3203","type":"print"}],"subject":[],"published":{"date-parts":[[2009,8]]}}}