{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:50:22Z","timestamp":1750308622697,"version":"3.41.0"},"reference-count":49,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2011,10,1]],"date-time":"2011-10-01T00:00:00Z","timestamp":1317427200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000143","name":"Division of Computing and Communication Foundations","doi-asserted-by":"publisher","award":["CNS-0737325CNS-0716211CCF-0829827CNS-1059265"],"award-info":[{"award-number":["CNS-0737325CNS-0716211CCF-0829827CNS-1059265"]}],"id":[{"id":"10.13039\/100000143","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-0737325CNS-0716211CCF-0829827CNS-1059265"],"award-info":[{"award-number":["CNS-0737325CNS-0716211CCF-0829827CNS-1059265"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Auton. Adapt. Syst."],"published-print":{"date-parts":[[2011,10]]},"abstract":"<jats:p>Although previous bio-inspired models have concentrated on invertebrates, such as ants, mammals, such as primates with higher cognitive function, are valuable for modeling the increasingly complex problems in engineering. Understanding primates\u2019 social and communication systems and applying what is learned from them to engineering domains will likely lead to solutions to a number of problems. Scent-marking is an important behavior among primates and many other mammals. In this article, inspired by primates\u2019 scent-marking activity, we propose and study a collaboration strategy for mobile and static sensors with RFID tags, where mobile sensors can be treated as robots or mobile actuators and can leave information to direct others to find them. Mobile sensors are equipped with RFID tags (or sensors) that can be deployed whenever needed, and RFID tags (or sensors) carry related information for other robots to pick up. We propose several primate-inspired communication mechanisms, including delayed-and-relayed and scent-trail communication among robots. We analytically model and simulate scent-trail communication. We also study a tracking and pursuing scheme of mobile sensors using simulations in terms of robot speeds, searching function, deployment density, turning function, and so on. We assume that robots (mobile sensors or mobile actuators) are capable of deploying\/throwing-out sensors\/RFID tags.<\/jats:p>","DOI":"10.1145\/2019591.2019595","type":"journal-article","created":{"date-parts":[[2011,10,27]],"date-time":"2011-10-27T13:17:37Z","timestamp":1319721457000},"page":"1-37","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Primate-Inspired Communication Methods for Mobile and Static Sensors and RFID Tags"],"prefix":"10.1145","volume":"6","author":[{"given":"Yang","family":"Xiao","sequence":"first","affiliation":[{"name":"The University of Alabama"}]},{"given":"Yanping","family":"Zhang","sequence":"additional","affiliation":[{"name":"The University of Alabama"}]},{"given":"Xiannuan","family":"Liang","sequence":"additional","affiliation":[{"name":"The University of Alabama"}]}],"member":"320","published-online":{"date-parts":[[2011,10]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/984622.984684"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2011.040241"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2011.040235"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2011.040236"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2011.040901"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240226.1240229"},{"key":"e_1_2_1_7_1","unstructured":"Dias M. B. and Stentz A. 2000. A free market architecture for distributed control of a multirobot system In Proceedings of the 6th International Conference on Intelligent Autonomous Systems (IAS). 115--122. Dias M. B. and Stentz A. 2000. A free market architecture for distributed control of a multirobot system In Proceedings of the 6th International Conference on Intelligent Autonomous Systems (IAS). 115--122."},{"key":"e_1_2_1_8_1","unstructured":"Dixson A. F. and Brancoft J. 1998. Primate Sexuality. Oxford University Press 14--50. Dixson A. F. and Brancoft J. 1998. Primate Sexuality . Oxford University Press 14--50."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1002\/ajp.20257"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/778415.778438"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2011.040903"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2011.040238"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2011.040899"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2011.040900"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1002\/ajp.20256"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2011.040908"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2006.77"},{"volume-title":"Proceedings of the IEEE Gobal Communications Conference (GLOBECOM). 1102--1107","author":"Lu J.","key":"e_1_2_1_18_1","unstructured":"Lu , J. and Suda , T . 2007. Differentiated surveillance for static and random mobile sensor networks . In Proceedings of the IEEE Gobal Communications Conference (GLOBECOM). 1102--1107 . Lu, J. and Suda, T. 2007. Differentiated surveillance for static and random mobile sensor networks. In Proceedings of the IEEE Gobal Communications Conference (GLOBECOM). 1102--1107."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2011.040904"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2011.040237"},{"key":"e_1_2_1_21_1","volume-title":"Proceedings of SPIE","volume":"5778","author":"Miao L.","unstructured":"Miao , L. , Qi , H. , and Wang , F . 2005. Self-deployable mobile sensor networks for on-demand surveillance . In Proceedings of SPIE , vol. 5778 , 496. Miao, L., Qi, H., and Wang, F. 2005. Self-deployable mobile sensor networks for on-demand surveillance. In Proceedings of SPIE, vol. 5778, 496."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2011.040905"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.04.081098"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2009.2027908"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2011.040907"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2004.26"},{"volume-title":"Proceedings of the Annual Joint Conference of the IEEE Computer and Communication Societies (INFOCOM).","author":"Shakkottai S.","key":"e_1_2_1_27_1","unstructured":"Shakkottai , S. , Srikant , R. , and Shroff , N . 2003. Unreliable sensor grids: Coverage, connectivity and diameter . In Proceedings of the Annual Joint Conference of the IEEE Computer and Communication Societies (INFOCOM). Shakkottai, S., Srikant, R., and Shroff, N. 2003. Unreliable sensor grids: Coverage, connectivity and diameter. In Proceedings of the Annual Joint Conference of the IEEE Computer and Communication Societies (INFOCOM)."},{"key":"e_1_2_1_28_1","volume":"9","author":"Shen C.","year":"2011","unstructured":"Shen , C. , Hong , Y.-W. P. , Chao , C. , and Yang , S. 2011 . Editorial. Int. J. Sens. Netw. 9 , 3\/4, 121--123. Shen, C., Hong, Y.-W. P., Chao, C., and Yang, S. 2011. Editorial. Int. J. Sens. Netw. 9, 3\/4, 121--123.","journal-title":"Editorial. Int. J. Sens. Netw."},{"volume-title":"Proceedings of the National Conference on Artificial Intelligence (AAAI).","author":"Simmons R.","key":"e_1_2_1_29_1","unstructured":"Simmons , R. , Apfelbaum , D. , Burgard , W. , Fox , D. , Moors , M. , and Thrun , S . 2000. Coordination for multi-robot exploration and mapping . In Proceedings of the National Conference on Artificial Intelligence (AAAI). Simmons, R., Apfelbaum, D., Burgard, W., Fox, D., Moors, M., and Thrun, S. 2000. Coordination for multi-robot exploration and mapping. In Proceedings of the National Conference on Artificial Intelligence (AAAI)."},{"key":"e_1_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Smuts B. B. Cheney D. L. and Seyfarth R. M. 1987. Primate societies. In The National Academies 400--500. Smuts B. B. Cheney D. L. and Seyfarth R. M. 1987. Primate societies. In The National Academies 400--500.","DOI":"10.7208\/chicago\/9780226220468.001.0001"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2011.040902"},{"key":"e_1_2_1_32_1","unstructured":"Snowdon C. T. Brown C. H. and Peterson M. R. 1985. Primate Communication. Cambridge University Press 283--293. Snowdon C. T. Brown C. H. and Peterson M. R. 1985. Primate Communication. Cambridge University Press 283--293."},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2011.040239"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2011.040240"},{"key":"e_1_2_1_35_1","volume":"10","author":"Tseng C.","year":"2011","unstructured":"Tseng , C. , Lee , S. , Prasad , N. R. , and W\u00f3dczak , M. 2011 . Editorial. Int. J. Sens. Netw. 10 , 1\/2, 1--2. Tseng, C., Lee, S., Prasad, N. R., and W\u00f3dczak, M. 2011. Editorial. Int. J. Sens. Netw. 10, 1\/2, 1--2.","journal-title":"Editorial. Int. J. Sens. Netw."},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-006-7798-5"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2011.040906"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-005-4442-8"},{"volume-title":"Proceedings of the IEEE International Conference on Mechatronics and Automation (ICMA). 3573--3578","author":"Xiao Y.","key":"e_1_2_1_39_1","unstructured":"Xiao , Y. and Liang , X . 2009. Bio-inspired communications among robots, sensors, and RFID tags . In Proceedings of the IEEE International Conference on Mechatronics and Automation (ICMA). 3573--3578 . Xiao, Y. and Liang, X. 2009. Bio-inspired communications among robots, sensors, and RFID tags. In Proceedings of the IEEE International Conference on Mechatronics and Automation (ICMA). 3573--3578."},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2009.5235295"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.863"},{"key":"e_1_2_1_42_1","article-title":"A critical line based boundary surveillance strategy in wireless sensor networks","author":"Xiao Y.","year":"2011","unstructured":"Xiao , Y. and Zhang , Y. 2011 b. A critical line based boundary surveillance strategy in wireless sensor networks . Telecomm. Syst. J. (Special Issue on Challenges in Next-Generation and Resource-Constrained Networks). To appear. Xiao, Y. and Zhang, Y. 2011b. A critical line based boundary surveillance strategy in wireless sensor networks. Telecomm. Syst. J. (Special Issue on Challenges in Next-Generation and Resource-Constrained Networks). To appear.","journal-title":"Telecomm. Syst. J. (Special Issue on Challenges in Next-Generation and Resource-Constrained Networks). To appear."},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2009.170"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/280765.280773"},{"volume-title":"Proceedings of the IEEE International Conference on Mechatronics and Automation (ICMA). 459--464","author":"Zhang Y.","key":"e_1_2_1_45_1","unstructured":"Zhang , Y. and Xiao , Y . 2009a. A boundary surveillance strategy based on critical line in wireless sensor networks . In Proceedings of the IEEE International Conference on Mechatronics and Automation (ICMA). 459--464 . Zhang, Y. and Xiao, Y. 2009a. A boundary surveillance strategy based on critical line in wireless sensor networks. In Proceedings of the IEEE International Conference on Mechatronics and Automation (ICMA). 459--464."},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2009.5235294"},{"volume-title":"Proceedings of the 3rd International Workshop on Wireless Sensor, Actuator and Robot Networks (WiSARN) in conjunction with IEEE INFOCOM.","author":"Zhang Y.","key":"e_1_2_1_47_1","unstructured":"Zhang , Y. and Xiao , Y . 2011. A patrolling scheme in wireless sensor and robot networks . In Proceedings of the 3rd International Workshop on Wireless Sensor, Actuator and Robot Networks (WiSARN) in conjunction with IEEE INFOCOM. Zhang, Y. and Xiao, Y. 2011. A patrolling scheme in wireless sensor and robot networks. In Proceedings of the 3rd International Workshop on Wireless Sensor, Actuator and Robot Networks (WiSARN) in conjunction with IEEE INFOCOM."},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2009.027629"},{"volume-title":"Proceedings of the IEEE International Conference on Robotics and Automation.","author":"Zlot R. M.","key":"e_1_2_1_49_1","unstructured":"Zlot , R. M. , Stentz , A. , Dias , M. B. , and Thayer , S . 2002. Multi-robot exploration controlled by a market economy . In Proceedings of the IEEE International Conference on Robotics and Automation. Zlot, R. M., Stentz, A., Dias, M. B., and Thayer, S. 2002. Multi-robot exploration controlled by a market economy. In Proceedings of the IEEE International Conference on Robotics and Automation."}],"container-title":["ACM Transactions on Autonomous and Adaptive Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2019591.2019595","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2019591.2019595","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:07:42Z","timestamp":1750273662000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2019591.2019595"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10]]},"references-count":49,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2011,10]]}},"alternative-id":["10.1145\/2019591.2019595"],"URL":"https:\/\/doi.org\/10.1145\/2019591.2019595","relation":{},"ISSN":["1556-4665","1556-4703"],"issn-type":[{"type":"print","value":"1556-4665"},{"type":"electronic","value":"1556-4703"}],"subject":[],"published":{"date-parts":[[2011,10]]},"assertion":[{"value":"2010-01-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2010-08-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2011-10-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}