{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:53:20Z","timestamp":1750308800148,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,6,21]],"date-time":"2009-06-21T00:00:00Z","timestamp":1245542400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,6,21]]},"DOI":"10.1145\/1582379.1582392","type":"proceedings-article","created":{"date-parts":[[2009,8,4]],"date-time":"2009-08-04T13:38:06Z","timestamp":1249393086000},"page":"52-56","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Topology management for public safety networks"],"prefix":"10.1145","author":[{"given":"Daniel","family":"C\u00e2mara","sequence":"first","affiliation":[{"name":"EURECOM, Sophia-Antipolis, France"}]},{"given":"Christian","family":"Bonnet","sequence":"additional","affiliation":[{"name":"EURECOM, Sophia-Antipolis, France"}]}],"member":"320","published-online":{"date-parts":[[2009,6,21]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"IEEE Conference on Technologies for Homeland Security: Enhancing Critical Infrastructure Dependability","author":"Huang Ying","year":"2008","unstructured":"Ying Huang , Wenbo He , Klara Nahrstedt , Whay C. Lee , Incident Scene Mobility Analysis , IEEE Conference on Technologies for Homeland Security: Enhancing Critical Infrastructure Dependability , Waltham, MA , May 2008 Ying Huang, Wenbo He, Klara Nahrstedt, Whay C. Lee, Incident Scene Mobility Analysis, IEEE Conference on Technologies for Homeland Security: Enhancing Critical Infrastructure Dependability, Waltham, MA, May 2008"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/564585.564602"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","DOI":"10.1002\/0470094559","volume-title":"Topology Control in Wireless Ad Hoc and Sensor Networks","author":"Santi Paolo","year":"2005","unstructured":"Paolo Santi , Topology Control in Wireless Ad Hoc and Sensor Networks , WILEY , July 2005 Paolo Santi, Topology Control in Wireless Ad Hoc and Sensor Networks, WILEY, July 2005"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2007.234"},{"volume-title":"last visited","year":"2009","key":"e_1_3_2_1_5_1","unstructured":"http:\/\/www.chorist.eu\/ , last visited Apr. 2009 http:\/\/www.chorist.eu\/, last visited Apr. 2009"},{"key":"e_1_3_2_1_6_1","volume-title":"Proc. First IEEE Workshop on Disaster Recover Networks","author":"Midkiff S. F.","year":"2002","unstructured":"S. F. Midkiff and C. W. Bostian . Rapidly-deployable broadband wireless networks for disaster and emergency response . In Proc. First IEEE Workshop on Disaster Recover Networks , June 2002 S. F. Midkiff and C. W. Bostian. Rapidly-deployable broadband wireless networks for disaster and emergency response. In Proc. First IEEE Workshop on Disaster Recover Networks, June 2002"},{"key":"e_1_3_2_1_7_1","volume-title":"CRC","author":"Haynes Teresa W.","year":"1998","unstructured":"Teresa W. Haynes , S. T. Hedetniemi , Peter J. Slater , Fundamentals of Domination in Graphs , CRC ; 1 ed., Jan , 1998 Teresa W. Haynes, S. T. Hedetniemi, Peter J. Slater, Fundamentals of Domination in Graphs, CRC; 1 ed., Jan, 1998"},{"key":"e_1_3_2_1_8_1","volume-title":"Computers and Intractability: A Guide to the Theory of NP-Complet","author":"Garey M.","year":"1979","unstructured":"M. Garey and D. Johnson , Computers and Intractability: A Guide to the Theory of NP-Complet ., Freeman , New York , 1979 M. Garey and D. Johnson, Computers and Intractability: A Guide to the Theory of NP-Complet., Freeman, New York, 1979"},{"volume-title":"Math of Operation Research","author":"Chvatal V.","key":"e_1_3_2_1_9_1","unstructured":"V. Chvatal , A greedy heuristic for the set-covering problem , Math of Operation Research , vol. 4 , no. 3, 1979 V. Chvatal, A greedy heuristic for the set-covering problem, Math of Operation Research, vol. 4, no. 3, 1979"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/PL00009201"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2007.04.003"},{"volume-title":"last visited","year":"2009","key":"e_1_3_2_1_12_1","unstructured":"http:\/\/dcg.ethz.ch\/projects\/sinalgo\/ , last visited Apr. 2009 http:\/\/dcg.ethz.ch\/projects\/sinalgo\/, last visited Apr. 2009"}],"event":{"name":"IWCMC '09: 2009 International Wireless Communications and Mobile Computing Conference","sponsor":["ACM Association for Computing Machinery","Wiley-Blackwell","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGCOMM ACM Special Interest Group on Data Communication","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGDOC ACM Special Interest Group for Design of Communications"],"location":"Leipzig Germany","acronym":"IWCMC '09"},"container-title":["Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1582379.1582392","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1582379.1582392","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:25:57Z","timestamp":1750278357000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1582379.1582392"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6,21]]},"references-count":12,"alternative-id":["10.1145\/1582379.1582392","10.1145\/1582379"],"URL":"https:\/\/doi.org\/10.1145\/1582379.1582392","relation":{},"subject":[],"published":{"date-parts":[[2009,6,21]]},"assertion":[{"value":"2009-06-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}