{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:35:16Z","timestamp":1750307716541,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,5,18]],"date-time":"2009-05-18T00:00:00Z","timestamp":1242604800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,5,18]]},"DOI":"10.1145\/1530748.1530768","type":"proceedings-article","created":{"date-parts":[[2009,7,15]],"date-time":"2009-07-15T13:51:31Z","timestamp":1247665891000},"page":"145-154","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":47,"title":["Low-connectivity and full-coverage three dimensional wireless sensor networks"],"prefix":"10.1145","author":[{"given":"Xiaole","family":"Bai","sequence":"first","affiliation":[{"name":"The Ohio State University, Columbus, OH, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Chuanlin","family":"Zhang","sequence":"additional","affiliation":[{"name":"Jinan University, Guangzhou, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dong","family":"Xuan","sequence":"additional","affiliation":[{"name":"The Ohio State University, Columbus, OH, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jin","family":"Teng","sequence":"additional","affiliation":[{"name":"City University of Hong Kong, Hong Kong, Hong Kong"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Weijia","family":"Jia","sequence":"additional","affiliation":[{"name":"City University of Hong Kong, Hong Kong, Hong Kong"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2009,5,18]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"we live in a 3-dworld, and so should computers,\" http:\/\/www.neptec.com\/News2006\/1Oct06-MilAero.html","author":"Campbell M.","year":"2006","unstructured":"M. Campbell , \"Intelligence in three dimensions : we live in a 3-dworld, and so should computers,\" http:\/\/www.neptec.com\/News2006\/1Oct06-MilAero.html , 2006 . M. Campbell, \"Intelligence in three dimensions: we live in a 3-dworld, and so should computers,\" http:\/\/www.neptec.com\/News2006\/1Oct06-MilAero.html, 2006."},{"key":"e_1_3_2_1_2_1","first-page":"18","article-title":"Practical applications and connectivity: Algorithmsin future wireless sensor networks","volume":"4","author":"Watfa M.K.","year":"2007","unstructured":"M.K. Watfa , \" Practical applications and connectivity: Algorithmsin future wireless sensor networks ,\" International Journal of Information Technolog , vol. 4 , pp. 18 -- 28 , 2007 . M.K. Watfa, \"Practical applications and connectivity: Algorithmsin future wireless sensor networks,\" International Journal of Information Technolog, vol. 4, pp. 18--28, 2007.","journal-title":"International Journal of Information Technolog"},{"key":"e_1_3_2_1_3_1","unstructured":"\"Aerial common sensor (acs) \" http:\/\/www.global-security.org\/intell\/systems\/acs.htm 2007.  \"Aerial common sensor (acs) \" http:\/\/www.global-security.org\/intell\/systems\/acs.htm 2007."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.snb.2005.02.008"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1161039.1161045"},{"key":"e_1_3_2_1_6_1","volume-title":"Research challenges and applications for underwater sensor networking,\" in Proc. of IEEE Wireless Communications and Networking Conference (WCNC)","author":"Heidemann J.","year":"2006","unstructured":"J. Heidemann , W. Ye , J. Wills , A. Syed , and Y. Li , \" Research challenges and applications for underwater sensor networking,\" in Proc. of IEEE Wireless Communications and Networking Conference (WCNC) , 2006 . J. Heidemann, W. Ye, J. Wills, A. Syed, and Y. Li, \"Research challenges and applications for underwater sensor networking,\" in Proc. of IEEE Wireless Communications and Networking Conference (WCNC), 2006."},{"key":"e_1_3_2_1_7_1","volume-title":"Underwater localization in sparse 3d acoustic sensor networks,\" in Proc. of IEEE Annual Conference on Computer Communications","author":"Cheng W.","year":"2008","unstructured":"W. Cheng , A. Teymorian , L. Ma , X. Cheng , X. Lu , and Z. Lu , \" Underwater localization in sparse 3d acoustic sensor networks,\" in Proc. of IEEE Annual Conference on Computer Communications ( IEEE INFOCOM) , 2008 . W. Cheng, A. Teymorian, L. Ma, X. Cheng, X. Lu, and Z. Lu, \"Underwater localization in sparse 3d acoustic sensor networks,\" in Proc. of IEEE Annual Conference on Computer Communications (IEEE INFOCOM), 2008."},{"issue":"24","key":"e_1_3_2_1_8_1","first-page":"503","article-title":"On the division of space with minimumpartition area","author":"Kelvin W.L.","year":"1887","unstructured":"Thomson and S. W.L. Kelvin , \" On the division of space with minimumpartition area ,\" Philosophical Magazine , no. 24 , pp. 503 -- 514 , 1887 . Thomson and S.W.L. Kelvin, \"On the division of space with minimumpartition area,\" Philosophical Magazine, no. 24, pp. 503--514, 1887.","journal-title":"Philosophical Magazine"},{"issue":"10","key":"e_1_3_2_1_9_1","first-page":"25","article-title":"On lattice coverings by spheres","author":"Bambah R.P.","year":"1954","unstructured":"R.P. Bambah , \" On lattice coverings by spheres ,\" in Proc. of Nat. Sci. India , no. 10 , pp. 25 -- 52 , 1954 . R.P. Bambah, \"On lattice coverings by spheres,\" in Proc. of Nat. Sci. India, no. 10, pp. 25--52, 1954.","journal-title":"Proc. of Nat. Sci. India"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.4153\/CJM-1956-033-4"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1112\/S0025579300001819"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0305004100029248"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.4153\/CJM-1962-054-7"},{"key":"e_1_3_2_1_14_1","volume-title":"Introduction to Geometry","author":"Coxeter S.M.","year":"1961","unstructured":"H. S.M. Coxeter , Introduction to Geometry . New York : John Wiley , 1961 . H.S.M. Coxeter, Introduction to Geometry. New York: John Wiley, 1961."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.4007\/annals.2005.162.1065"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1038\/425126c"},{"key":"e_1_3_2_1_17_1","volume-title":"Kepler's Conjecture: How Some of the Greatest Minds in History Helped Solve One of the Oldest Math Problems in the World","author":"Szpiro G.G.","year":"2003","unstructured":"G.G. Szpiro , Kepler's Conjecture: How Some of the Greatest Minds in History Helped Solve One of the Oldest Math Problems in the World . John Wiley Sons, Inc. , 2003 . G.G. Szpiro, Kepler's Conjecture: How Some of the Greatest Minds in History Helped Solve One of the Oldest Math Problems in the World. John Wiley Sons, Inc., 2003."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1132905.1132921"},{"key":"e_1_3_2_1_19_1","volume-title":"Deploying four-connectivity and full-coverage wireless sensor networks,\" in Proc. of IEEE Annual Conference on Computer Communications","author":"Bai X.","year":"2008","unstructured":"X. Bai , Z. Yun , D. Xuan , T.H. Lai , and W. Jia , \" Deploying four-connectivity and full-coverage wireless sensor networks,\" in Proc. of IEEE Annual Conference on Computer Communications ( IEEE INFOCOM) , 2008 . X. Bai, Z. Yun, D. Xuan, T.H. Lai, and W. Jia, \"Deploying four-connectivity and full-coverage wireless sensor networks,\" in Proc. of IEEE Annual Conference on Computer Communications (IEEE INFOCOM), 2008."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1374618.1374672"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1161089.1161128"},{"key":"e_1_3_2_1_22_1","volume-title":"A coverage algorithm in 3d wireless sensor networks,\" The 1st International Symposium on Wireless Pervasive Computing","author":"Watfa M.K.","year":"2006","unstructured":"M.K. Watfa and S. Commuri , \" A coverage algorithm in 3d wireless sensor networks,\" The 1st International Symposium on Wireless Pervasive Computing , 2006 . M.K. Watfa and S. Commuri, \"A coverage algorithm in 3d wireless sensor networks,\" The 1st International Symposium on Wireless Pervasive Computing, 2006."},{"key":"e_1_3_2_1_23_1","volume-title":"The coverage problem in three-dimensional wireless sensor networks,\" in Proc. of IEEE Global Communications Conference (Globecom)","author":"Huang C.F.","year":"2004","unstructured":"C.F. Huang , Y.C. Tseng , and L.C. Lo , \" The coverage problem in three-dimensional wireless sensor networks,\" in Proc. of IEEE Global Communications Conference (Globecom) , 2004 . C.F. Huang, Y.C. Tseng, and L.C. Lo, \"The coverage problem in three-dimensional wireless sensor networks,\" in Proc. of IEEE Global Communications Conference (Globecom), 2004."},{"key":"e_1_3_2_1_24_1","volume-title":"Dbr: Depth-based routing forunder water sensor networks,\" IFIP Networking","author":"Yan H.","year":"2008","unstructured":"H. Yan , Z. Shi , and J. Cui , \" Dbr: Depth-based routing forunder water sensor networks,\" IFIP Networking , 2008 . H. Yan, Z. Shi, and J. Cui, \"Dbr: Depth-based routing forunder water sensor networks,\" IFIP Networking, 2008."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1089803.1089988"},{"key":"e_1_3_2_1_26_1","volume-title":"Scalable localization withmobility prediction for underwater sensor networks,\" in Proc. of IEEE Annual Conference on Computer Communications","author":"Zhou Z.","year":"2008","unstructured":"Z. Zhou , J. Cui , and A. Bagtzoglou , \" Scalable localization withmobility prediction for underwater sensor networks,\" in Proc. of IEEE Annual Conference on Computer Communications ( IEEE INFOCOM) , 2008 . Z. Zhou, J. Cui, and A. Bagtzoglou, \"Scalable localization withmobility prediction for underwater sensor networks,\" in Proc. of IEEE Annual Conference on Computer Communications (IEEE INFOCOM), 2008."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016586011473"},{"key":"e_1_3_2_1_28_1","volume-title":"Sensor deployment and target localization based on virtual force,\" in Proc. of IEEE Annual Conference on Computer Communications","author":"Zhou Y.","year":"2003","unstructured":"Y. Zhou and K. Charkrabarty , \" Sensor deployment and target localization based on virtual force,\" in Proc. of IEEE Annual Conference on Computer Communications ( IEEE INFOCOM) , 2003 . Y. Zhou and K. Charkrabarty, \"Sensor deployment and target localization based on virtual force,\" in Proc. of IEEE Annual Conference on Computer Communications (IEEE INFOCOM), 2003."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/11502593_22"},{"key":"e_1_3_2_1_31_1","volume-title":"Full-Coverage and k-Connectivity (k=14, 6) Three Dimensional Networks,\" in Proc. of IEEE Annual Conference on Computer Communications","author":"Bai X.","year":"2009","unstructured":"X. Bai , C. Zhang , D. Xuan and W. Jia , \" Full-Coverage and k-Connectivity (k=14, 6) Three Dimensional Networks,\" in Proc. of IEEE Annual Conference on Computer Communications ( IEEE INFOCOM) , 2009 . X. Bai, C. Zhang, D. Xuan and W. Jia, \"Full-Coverage and k-Connectivity (k=14, 6) Three Dimensional Networks,\" in Proc. of IEEE Annual Conference on Computer Communications (IEEE INFOCOM), 2009."}],"event":{"name":"MobiHoc '09: The Tenth ACM International Symposium on Mobile Ad Hoc Networking and Computing","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","ACM Association for Computing Machinery"],"location":"New Orleans LA USA","acronym":"MobiHoc '09"},"container-title":["Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1530748.1530768","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1530748.1530768","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:30:22Z","timestamp":1750253422000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1530748.1530768"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,5,18]]},"references-count":30,"alternative-id":["10.1145\/1530748.1530768","10.1145\/1530748"],"URL":"https:\/\/doi.org\/10.1145\/1530748.1530768","relation":{},"subject":[],"published":{"date-parts":[[2009,5,18]]},"assertion":[{"value":"2009-05-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}