{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:14:32Z","timestamp":1750306472356,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,29]],"date-time":"2015-10-29T00:00:00Z","timestamp":1446076800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,29]]},"DOI":"10.1145\/2835043.2835056","type":"proceedings-article","created":{"date-parts":[[2015,12,30]],"date-time":"2015-12-30T13:13:44Z","timestamp":1451481224000},"page":"47-53","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Lifetime Optimization for Target Coverage in Wireless Sensor Networks"],"prefix":"10.1145","author":[{"given":"Pooja","family":"Chaturvedi","sequence":"first","affiliation":[{"name":"Department of Computer Science &amp; Engineering, M. M. M. University of Technology, Gorakhpur, India"}]},{"given":"A. K.","family":"Daniel","sequence":"additional","affiliation":[{"name":"Department of Computer Science &amp; Engineering, M. M. M. University of Technology, Gorakhpur, India"}]}],"member":"320","published-online":{"date-parts":[[2015,10,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"M Cardei My T. Thai Y. Li W. Wu \"Energy Efficient Target Coverage in Wireless Sensor Networks\" IEEE 2005.  M Cardei My T. Thai Y. Li W. Wu \"Energy Efficient Target Coverage in Wireless Sensor Networks\" IEEE 2005.","DOI":"10.1109\/MOBHOC.2006.278579"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2008.07.017"},{"key":"e_1_3_2_1_3_1","article-title":"Subjective Logic-Based Anomaly Detection Framework in Wireless Sensor Networks","volume":"2012","author":"Yuan Jinhui","unstructured":"Jinhui Yuan , Hongwei Zhou , Hong Chen , \" Subjective Logic-Based Anomaly Detection Framework in Wireless Sensor Networks \", Hindawi Publishing Corporation, International Journal of Distributed Sensor Networks , Volume 2012 . Jinhui Yuan, Hongwei Zhou, Hong Chen, \"Subjective Logic-Based Anomaly Detection Framework in Wireless Sensor Networks\", Hindawi Publishing Corporation, International Journal of Distributed Sensor Networks, Volume 2012.","journal-title":"Hindawi Publishing Corporation, International Journal of Distributed Sensor Networks"},{"key":"e_1_3_2_1_4_1","unstructured":"Rodrigo Roman M. Carmen Fernandez-Gago Javier Lopez \"Trust and Reputation Systems for Wireless Sensor Networks\" 2009.  Rodrigo Roman M. Carmen Fernandez-Gago Javier Lopez \"Trust and Reputation Systems for Wireless Sensor Networks\" 2009."},{"key":"e_1_3_2_1_5_1","volume-title":"SEPTEMBER","author":"Fan Gao Jun","year":"2010","unstructured":"Gao Jun Fan and ShiYao Jin , \" Coverage Problem in Wireless Sensor Network : A Survey\", JOURNAL OF NETWORKS, VOL. 5, NO. 9 , SEPTEMBER 2010 . Gao Jun Fan and ShiYao Jin, \"Coverage Problem in Wireless Sensor Network: A Survey\", JOURNAL OF NETWORKS, VOL. 5, NO. 9, SEPTEMBER 2010."},{"key":"e_1_3_2_1_6_1","volume-title":"Issue","author":"Dagar Anurag","year":"2013","unstructured":"Anurag Dagar , Vinod Saroha , \" An Efficient Coverage Scheme for Wireless Sensor Network\", Volume 3 , Issue 4, April 2013 ISSN: 2277 128X, International Journal of Advanced Research in Computer Science and Software Engineering . Anurag Dagar, Vinod Saroha, \"An Efficient Coverage Scheme for Wireless Sensor Network\", Volume 3, Issue 4, April 2013 ISSN: 2277 128X, International Journal of Advanced Research in Computer Science and Software Engineering."},{"key":"e_1_3_2_1_7_1","first-page":"299","volume-title":"Proc. Of the 6th International Symposium on Distributed Autonomous Robotics Systems, Fukuoka, Japan June 25--27","author":"Sukhatme M.J","year":"2002","unstructured":"Howard, A., Mataric, M.J , and Sukhatme , \" Mobile Sensor Network Deployment using Potential Fields : A Distributed, Scalable Solution to the Area Coverage Problem \", in Proc. Of the 6th International Symposium on Distributed Autonomous Robotics Systems, Fukuoka, Japan June 25--27 , 2002 pp. 299 -- 308 Howard, A., Mataric, M.J, and Sukhatme, \"Mobile Sensor Network Deployment using Potential Fields: A Distributed, Scalable Solution to the Area Coverage Problem\", in Proc. Of the 6th International Symposium on Distributed Autonomous Robotics Systems, Fukuoka, Japan June 25--27, 2002 pp. 299--308"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2006.255611"},{"key":"e_1_3_2_1_9_1","first-page":"1073","volume-title":"Proc. of Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies, Austin TX, USA","volume":"2","author":"Shakkottai Sanjay","year":"2003","unstructured":"Sanjay Shakkottai , R. Srikant , Ness Shroff , \" Unreliable Sensor Grids : Coverage, Connectivity and Diameter \", in Proc. of Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies, Austin TX, USA , Vol. 2 , pp. 1073 -- 1083 , March 30 - April 3, 2003 . Sanjay Shakkottai, R. Srikant, Ness Shroff, \"Unreliable Sensor Grids: Coverage, Connectivity and Diameter\", in Proc. of Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies, Austin TX, USA, Vol. 2, pp. 1073--1083, March 30-April 3, 2003."},{"issue":"5","key":"e_1_3_2_1_10_1","article-title":"Computational Geometry -- Some Easy Questions and their Recent Solutions","volume":"7","author":"F.","year":"2001","unstructured":"Aurenhammer, F. \" Computational Geometry -- Some Easy Questions and their Recent Solutions \", Journal of Universal Computer Science , vol. 7 , no. 5 , 2001 . Aurenhammer, F. \"Computational Geometry -- Some Easy Questions and their Recent Solutions\", Journal of Universal Computer Science, vol.7, no. 5, 2001.","journal-title":"Journal of Universal Computer Science"},{"key":"e_1_3_2_1_11_1","first-page":"315","volume-title":"Proc. of 11th IEEE International Conference on Network Protocols","author":"Porta G.","year":"2003","unstructured":"Wang, G., Cao, G. and Porta , T . L \"A Bidding Protocol for Deploying Mobile Sensors Network Protocols \", in Proc. of 11th IEEE International Conference on Network Protocols , pp. 315 -- 324 , 2003 . Wang, G., Cao, G. and Porta, T.L \"A Bidding Protocol for Deploying Mobile Sensors Network Protocols\", in Proc. of 11th IEEE International Conference on Network Protocols, pp.315 -- 324, 2003."},{"key":"e_1_3_2_1_12_1","volume-title":"Cambridge University Press","author":"Rourke J. O.","year":"2004","unstructured":"J. O. Rourke , \" Computational Geometry in C\" , Cambridge University Press , 2004 . J. O. Rourke, \"Computational Geometry in C\", Cambridge University Press, 2004."},{"key":"e_1_3_2_1_13_1","series-title":"MISRC Working Paper Series","volume-title":"Technical Report 96-04","author":"McKnight D.H.","year":"1996","unstructured":"D.H. McKnight , N. L. Chervany , \" The Meanings of Trust\" , Technical Report 96-04 , MISRC Working Paper Series , University of Minesota, Management Information Systems Research Center , 1996 . D.H. McKnight, N. L. Chervany, \"The Meanings of Trust\", Technical Report 96-04, MISRC Working Paper Series, University of Minesota, Management Information Systems Research Center, 1996."},{"key":"e_1_3_2_1_14_1","volume-title":"2013 International Workshop on Communications and Sensor Networks (ComSense-2013)","author":"Taghikhaki Zahra","year":"2013","unstructured":"Zahra Taghikhaki , Nirvana Meratnia , Paul J.M. Havinga , \" A Trust-based Probabilistic Coverage Algorithm for Wireless Sensor Networks\" , 2013 International Workshop on Communications and Sensor Networks (ComSense-2013) , Procedia, Computer Science 21 ( 2013 ), 455 -- 464. Zahra Taghikhaki, Nirvana Meratnia, Paul J.M. Havinga, \"A Trust-based Probabilistic Coverage Algorithm for Wireless Sensor Networks\", 2013 International Workshop on Communications and Sensor Networks (ComSense-2013), Procedia, Computer Science 21 (2013), 455 -- 464."},{"key":"e_1_3_2_1_15_1","article-title":"An Efficient Distributed Trust Model for Wireless Sensor Networks","author":"Jiang Jinfang","year":"2014","unstructured":"Jinfang Jiang , Guangjie Han , Feng Wang , Lei Shu , Mohsen Guizani , \" An Efficient Distributed Trust Model for Wireless Sensor Networks \", IEEE Transactions on Parallel and Distributed Systems , 2014 . Jinfang Jiang, Guangjie Han, Feng Wang, Lei Shu, Mohsen Guizani, \"An Efficient Distributed Trust Model for Wireless Sensor Networks\", IEEE Transactions on Parallel and Distributed Systems, 2014.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"e_1_3_2_1_16_1","volume-title":"DMSN'10","author":"Lim Hyo Sang","year":"2010","unstructured":"Hyo Sang Lim , Yang Sae Moon , Elisa Bertino , Provenance based Trustworthiness Assessment in Sensor Networks , DMSN'10 , September 13, 2010 , Singapore. Hyo Sang Lim, Yang Sae Moon, Elisa Bertino, Provenance based Trustworthiness Assessment in Sensor Networks, DMSN'10, September 13, 2010, Singapore."},{"key":"e_1_3_2_1_17_1","first-page":"8020","volume-title":"HICSS '00: Proceedings of the 33rd Hawaii International Conference on System Sciences-Volume 8, IEEE Computer Society","author":"Chandrakasan W. R.","year":"2000","unstructured":"Heinzelman, W. R. , Chandrakasan , A. & Balakrishnan , H. ( 2000 ). Energy-efficient communication protocol for wireless microsensor networks , HICSS '00: Proceedings of the 33rd Hawaii International Conference on System Sciences-Volume 8, IEEE Computer Society , Washington, DC, USA , p. 8020 . Heinzelman, W. R., Chandrakasan, A. & Balakrishnan, H. (2000). Energy-efficient communication protocol for wireless microsensor networks, HICSS '00: Proceedings of the 33rd Hawaii International Conference on System Sciences-Volume 8, IEEE Computer Society, Washington, DC, USA, p. 8020."},{"volume-title":"IEEE 4th International Conference on Information Communication & Embedded Systems (ICICES-2014)","author":"Chaturvedi Pooja","key":"e_1_3_2_1_18_1","unstructured":"Pooja Chaturvedi , A. K. Daniel , \" Recovery of Holes Problem in Wireless Sensor Networks\" , IEEE 4th International Conference on Information Communication & Embedded Systems (ICICES-2014) , DOI: 10.1109\/ICICES.2014.7034172. 10.1109\/ICICES.2014.7034172 Pooja Chaturvedi, A. K. Daniel, \"Recovery of Holes Problem in Wireless Sensor Networks\", IEEE 4th International Conference on Information Communication & Embedded Systems (ICICES-2014), DOI: 10.1109\/ICICES.2014.7034172."},{"key":"e_1_3_2_1_19_1","first-page":"138","volume-title":"5th International Conference on Communication System and Network Technologies (CSNT-2015)","author":"Chaturvedi Pooja","year":"2015","unstructured":"Pooja Chaturvedi , A. K. Daniel , \" An Energy Efficient Node Scheduling Protocol for Target Coverage in Wireless Sensor Networks\" in the 5th International Conference on Communication System and Network Technologies (CSNT-2015) , April 2015 . pp 138 -- 142 , DOI:10.1109\/CSNT.2015.10. 10.1109\/CSNT.2015.10 Pooja Chaturvedi, A. K. Daniel, \"An Energy Efficient Node Scheduling Protocol for Target Coverage in Wireless Sensor Networks\" in the 5th International Conference on Communication System and Network Technologies (CSNT-2015), April 2015. pp 138--142, DOI:10.1109\/CSNT.2015.10."},{"volume-title":"3rd International Conference on Emerging Research in Computing, Information, Communication & Applications (ERCICA-2015)","author":"Chaturvedi Pooja","key":"e_1_3_2_1_20_1","unstructured":"Pooja Chaturvedi , A. K. Daniel \" Trust Based Node Scheduling Protocol for Target Coverage in Wireless Sensor Networks\" , 3rd International Conference on Emerging Research in Computing, Information, Communication & Applications (ERCICA-2015) , Springer India, DOI 10.1007\/978-81-322-2550-8_16. Pooja Chaturvedi, A. K. Daniel \"Trust Based Node Scheduling Protocol for Target Coverage in Wireless Sensor Networks\", 3rd International Conference on Emerging Research in Computing, Information, Communication & Applications (ERCICA-2015), Springer India, DOI 10.1007\/978-81-322-2550-8_16."},{"key":"e_1_3_2_1_21_1","volume-title":"International Conference on Green Computing & Internet of Things (ICGCIOT-2015)","author":"Chaturvedi Pooja","year":"2015","unstructured":"Pooja Chaturvedi , A. K. Daniel , \" Trust Based Energy Efficient Coverage Preserving Protocol for Wireless Sensor Networks\" , International Conference on Green Computing & Internet of Things (ICGCIOT-2015) , Oct 2015 . Pooja Chaturvedi, A. K. Daniel, \"Trust Based Energy Efficient Coverage Preserving Protocol for Wireless Sensor Networks\", International Conference on Green Computing & Internet of Things (ICGCIOT-2015), Oct 2015."},{"key":"e_1_3_2_1_22_1","volume-title":"12th International Conference on Distributed Computing & Internet Technology (ICDCIT-2016)","author":"Chaturvedi Pooja","year":"2016","unstructured":"Pooja Chaturvedi , A. K. Daniel , \" Trust Based Target Coverage Protocol for Wireless Sensor Networks Using Fuzzy Logic\" , 12th International Conference on Distributed Computing & Internet Technology (ICDCIT-2016) Jan 2016 . (Accepted) Pooja Chaturvedi, A. K. Daniel, \"Trust Based Target Coverage Protocol for Wireless Sensor Networks Using Fuzzy Logic\", 12th International Conference on Distributed Computing & Internet Technology (ICDCIT-2016) Jan 2016. (Accepted)"}],"event":{"name":"Compute '15: 8th Annual ACM India Conference","sponsor":["ACM India ACM India"],"location":"Ghaziabad India","acronym":"Compute '15"},"container-title":["Proceedings of the 8th Annual ACM India Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2835043.2835056","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2835043.2835056","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:09Z","timestamp":1750225689000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2835043.2835056"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,29]]},"references-count":22,"alternative-id":["10.1145\/2835043.2835056","10.1145\/2835043"],"URL":"https:\/\/doi.org\/10.1145\/2835043.2835056","relation":{},"subject":[],"published":{"date-parts":[[2015,10,29]]},"assertion":[{"value":"2015-10-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}