{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:17:58Z","timestamp":1761401878285,"version":"3.41.0"},"reference-count":33,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2017,5,26]],"date-time":"2017-05-26T00:00:00Z","timestamp":1495756800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"The National Basic Research Program of China","award":["2014CB046305"],"award-info":[{"award-number":["2014CB046305"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61379110, 61073104, 61370229 and 61370178"],"award-info":[{"award-number":["61379110, 61073104, 61370229 and 61370178"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"GDUPS"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Embed. Comput. Syst."],"published-print":{"date-parts":[[2017,8,31]]},"abstract":"<jats:p>A multi-representative re-fusion (MRRF) approximate data collection approach is proposed in which multiple nodes with similar readings form a data coverage set (DCS). The reading value of the DCS is represented by an R-node. The set near the Sink is smaller, while the set far from the Sink is larger, which can reduce the energy consumption in hotspot areas. Then, a distributed data-aggregation strategy is proposed that can re-fuse the value of R-nodes that are far from each other but have similar readings. Both comprehensive theoretical and experimental results indicate that the MRRF approach increases lifetime and energy efficiency.<\/jats:p>","DOI":"10.1145\/2974021","type":"journal-article","created":{"date-parts":[[2017,5,31]],"date-time":"2017-05-31T19:32:40Z","timestamp":1496259160000},"page":"1-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["Distributed Multi-Representative Re-Fusion Approach for Heterogeneous Sensing Data Collection"],"prefix":"10.1145","volume":"16","author":[{"given":"Anfeng","family":"Liu","sequence":"first","affiliation":[{"name":"Central South University, ChangSha, China"}]},{"given":"Xiao","family":"Liu","sequence":"additional","affiliation":[{"name":"Central South University, ChangSha, China"}]},{"given":"Tianyi","family":"Wei","sequence":"additional","affiliation":[{"name":"Central South University, ChangSha, China"}]},{"given":"Laurence T.","family":"Yang","sequence":"additional","affiliation":[{"name":"St. Francis Xavier University, Antigonish, NS, Canada"}]},{"given":"Seungmin (Charlie)","family":"Rho","sequence":"additional","affiliation":[{"name":"Sungkyul University, Anyang-si, Korea"}]},{"given":"Anand","family":"Paul","sequence":"additional","affiliation":[{"name":"Kyungpook National University, Korea"}]}],"member":"320","published-online":{"date-parts":[[2017,5,26]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2011.0143"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2014.6724102"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2520"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-016-0501-0"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.858980"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2517405"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2015.7224727"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2014.2308391"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2011.224"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2011.02.003"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2002.808417"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2013.2256795"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.134"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2002.1036066"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.aeue.2015.06.016"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2007.1046"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2570740"},{"key":"e_1_2_1_18_1","unstructured":"X. Liu M. Dong K. Ota L. T. Yang and A. Liu. 2016a. Trace malicious source to guarantee cyber security for mass monitor critical infrastructure. Journal of Computer and System Sciences. 2016.  X. Liu M. Dong K. Ota L. T. Yang and A. Liu. 2016a. Trace malicious source to guarantee cyber security for mass monitor critical infrastructure. Journal of Computer and System Sciences. 2016."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2015.2449314"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2016.09.005"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2007.4395109"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/844128.844142"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2720"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.11.021"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2009.10.080230"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2311791"},{"volume-title":"Retrieved","year":"2015","key":"e_1_2_1_27_1","unstructured":"OMNet++. 2015 . Network Simulation Framework . Retrieved March 28, 2017 from http:\/\/www.omnetpp.org\/. OMNet++. 2015. Network Simulation Framework. Retrieved March 28, 2017 from http:\/\/www.omnetpp.org\/."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2316816"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2723161"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-004-4752-y"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2011.122211.110417"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2014.04.002"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.1384"}],"container-title":["ACM Transactions on Embedded Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2974021","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2974021","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:43Z","timestamp":1750220623000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2974021"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,26]]},"references-count":33,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,8,31]]}},"alternative-id":["10.1145\/2974021"],"URL":"https:\/\/doi.org\/10.1145\/2974021","relation":{},"ISSN":["1539-9087","1558-3465"],"issn-type":[{"type":"print","value":"1539-9087"},{"type":"electronic","value":"1558-3465"}],"subject":[],"published":{"date-parts":[[2017,5,26]]},"assertion":[{"value":"2016-01-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-07-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-05-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}