{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:04:42Z","timestamp":1775066682302,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2005,8,28]],"date-time":"2005-08-28T00:00:00Z","timestamp":1125187200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,8,28]]},"DOI":"10.1145\/1080829.1080859","type":"proceedings-article","created":{"date-parts":[[2005,11,7]],"date-time":"2005-11-07T17:34:39Z","timestamp":1131384879000},"page":"284-298","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":325,"title":["Barrier coverage with wireless sensors"],"prefix":"10.1145","author":[{"given":"Santosh","family":"Kumar","sequence":"first","affiliation":[{"name":"Ohio State University"}]},{"given":"Ten H.","family":"Lai","sequence":"additional","affiliation":[{"name":"Ohio State University"}]},{"given":"Anish","family":"Arora","sequence":"additional","affiliation":[{"name":"Ohio State University"}]}],"member":"320","published-online":{"date-parts":[[2005,8,28]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Extreme scale wireless sensor networking. Technical report http:\/\/www.cse.ohio-state.edu\/exscal 2004. Extreme scale wireless sensor networking. Technical report http:\/\/www.cse.ohio-state.edu\/exscal 2004."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1002\/0471722154"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2004.06.007"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511546587"},{"key":"e_1_3_2_1_5_1","volume-title":"Introduction to Geometry","author":"Coxeter H. S. M.","year":"1969","unstructured":"H. S. M. Coxeter . Introduction to Geometry . New York , Wiley , 1969 . H. S. M. Coxeter. Introduction to Geometry. New York, Wiley, 1969."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA422540"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1023720.1023734"},{"key":"e_1_3_2_1_8_1","volume-title":"Introduction to the Theory of Coverage Processes","author":"Hall P.","year":"1988","unstructured":"P. Hall . Introduction to the Theory of Coverage Processes . John Wiley & Sons , 1988 . P. Hall. Introduction to the Theory of Coverage Processes. John Wiley & Sons, 1988."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/941350.941367"},{"key":"e_1_3_2_1_10_1","volume-title":"Master's Thesis","author":"Hynes S.","year":"2003","unstructured":"S. Hynes . Multi-agent simulations (mas) for assessing massive sensor coverage and deployment. Technical report , Master's Thesis , Naval Postgraduate School , 2003 . S. Hynes. Multi-agent simulations (mas) for assessing massive sensor coverage and deployment. Technical report, Master's Thesis, Naval Postgraduate School, 2003."},{"key":"e_1_3_2_1_11_1","volume-title":"ExScal Note Series: ExScal-OSU-EN00-2004-01-30","author":"Kumar S.","year":"2004","unstructured":"S. Kumar and A. Arora . Echelon topology for node deployment. Technical report , ExScal Note Series: ExScal-OSU-EN00-2004-01-30 , The Ohio State University , 2004 . S. Kumar and A. Arora. Echelon topology for node deployment. Technical report, ExScal Note Series: ExScal-OSU-EN00-2004-01-30, The Ohio State University, 2004."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1023720.1023735"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01049720"},{"key":"e_1_3_2_1_14_1","volume-title":"Modeling and Optimization in Mobile","author":"Liu B.","year":"2003","unstructured":"B. Liu and D. Towsley . On the coverage and detectability of large-scale wireless sensor networks . In Modeling and Optimization in Mobile , Ad-Hoc and Wireless Networks , 2003 . B. Liu and D. Towsley. On the coverage and detectability of large-scale wireless sensor networks. In Modeling and Optimization in Mobile, Ad-Hoc and Wireless Networks, 2003."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2001.916633"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/381677.381691"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1006\/jctb.1996.0073"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","DOI":"10.56021\/9780801866890","volume-title":"Graphs on Surfaces","author":"Mohar B.","year":"2001","unstructured":"B. Mohar and C. Thomassen . Graphs on Surfaces . Johns Hopkins University Press , 2001 . B. Mohar and C. Thomassen. Graphs on Surfaces. Johns Hopkins University Press, 2001."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","DOI":"10.1137\/1.9780898719772","volume-title":"Distributed Computing: A Loaclity-Sensitive Approach","author":"Peleg D.","year":"2000","unstructured":"D. Peleg . Distributed Computing: A Loaclity-Sensitive Approach . Society for Industrial and Applied Mathematics (SIAM) , 2000 . D. Peleg. Distributed Computing: A Loaclity-Sensitive Approach. Society for Industrial and Applied Mathematics (SIAM), 2000."},{"key":"e_1_3_2_1_20_1","volume-title":"Introduction to Probability Models","author":"Ross S. M.","year":"2000","unstructured":"S. M. Ross . Introduction to Probability Models . Academic Press , 2000 . S. M. Ross. Introduction to Probability Models. Academic Press, 2000."},{"key":"e_1_3_2_1_21_1","volume-title":"Combinatorial Optimization","author":"Schrijver A.","year":"2003","unstructured":"A. Schrijver . Combinatorial Optimization . Springer , 2003 . A. Schrijver. Combinatorial Optimization. Springer, 2003."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/958491.958497"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/958491.958496"},{"key":"e_1_3_2_1_24_1","volume-title":"Introduction to Graph Theory","author":"West D. B.","year":"2001","unstructured":"D. B. West . Introduction to Graph Theory . Prentice Hall , 2001 . D. B. West. Introduction to Graph Theory. Prentice Hall, 2001."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/989459.989475"}],"event":{"name":"MobiCom05: 11th Annual International Conference on Mobile Computing and Networking","location":"Cologne Germany","acronym":"MobiCom05","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 11th annual international conference on Mobile computing and networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1080829.1080859","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1080829.1080859","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:18:42Z","timestamp":1750263522000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1080829.1080859"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,8,28]]},"references-count":25,"alternative-id":["10.1145\/1080829.1080859","10.1145\/1080829"],"URL":"https:\/\/doi.org\/10.1145\/1080829.1080859","relation":{},"subject":[],"published":{"date-parts":[[2005,8,28]]},"assertion":[{"value":"2005-08-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}