{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T17:09:45Z","timestamp":1767978585425,"version":"3.49.0"},"reference-count":26,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2016,12,19]],"date-time":"2016-12-19T00:00:00Z","timestamp":1482105600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Research Committee of University of Macau","award":["MYRG2015-00054-FST and MYRG2016-00148-FST"],"award-info":[{"award-number":["MYRG2015-00054-FST and MYRG2016-00148-FST"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Sen. Netw."],"published-print":{"date-parts":[[2017,2,28]]},"abstract":"<jats:p>Force-directed algorithms such as the Kamada-Kawai algorithm have shown promising results for solving the boundary detection problem in a mobile ad hoc network. However, the classical Kamada-Kawai algorithm does not scale well when it is used in networks with large numbers of nodes. It also produces poor results in non-convex networks. To address these problems, this article proposes an improved version of the Kamada-Kawai algorithm. The proposed extension includes novel heuristics and algorithms that achieve a faster energy level reduction. Our experimental results show that the improved algorithm can significantly shorten the processing time and detect boundary nodes with an acceptable level of accuracy.<\/jats:p>","DOI":"10.1145\/3005718","type":"journal-article","created":{"date-parts":[[2016,12,19]],"date-time":"2016-12-19T17:06:31Z","timestamp":1482167191000},"page":"1-29","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Accelerating the Kamada-Kawai Algorithm for Boundary Detection in a Mobile Ad Hoc Network"],"prefix":"10.1145","volume":"13","author":[{"given":"Se-Hang","family":"Cheong","sequence":"first","affiliation":[{"name":"University of Macau, Macau, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8468-6182","authenticated-orcid":false,"given":"Yain-Whar","family":"Si","sequence":"additional","affiliation":[{"name":"University of Macau, Macau, China"}]}],"member":"320","published-online":{"date-parts":[[2016,12,19]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Information Visualization Beyond the Horizon","author":"Chen C."},{"key":"e_1_2_1_2_1","volume-title":"Proceedings of the Wireless Communications and Networking Conference (WCNC). IEEE","author":"Chen Y. H."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2011.70"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/234535.234538"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1530748.1530767"},{"key":"e_1_2_1_6_1","volume-title":"Congressus Numerantium 42","author":"Eades P.","year":"1984"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056714"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807048.1807057"},{"key":"e_1_2_1_9_1","volume-title":"Proceedings of the 23rd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM","author":"Fang Q.","year":"2004"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2008.12.001"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2009.024681"},{"key":"e_1_2_1_12_1","volume-title":"Proceedings of the 17th Canadian Conference on Computational Geometry, 82--85","author":"Fekete S. P."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-27820-7_12"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380211102"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comgeo.2004.03.014"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.7155\/jgaa.00051"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(89)90102-6"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-013-0630-9"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2009.2024940"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2012.11"},{"key":"e_1_2_1_21_1","doi-asserted-by":"crossref","unstructured":"W. D. Nooy A. Mrvar and V. Batagelj. 2005. Exploratory Social Network Analysis with Pajek. Cambridge University Press.   W. D. Nooy A. Mrvar and V. Batagelj. 2005. Exploratory Social Network Analysis with Pajek. Cambridge University Press.","DOI":"10.1017\/CBO9780511806452"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2011.6115201"},{"key":"e_1_2_1_23_1","volume-title":"Proceedings of the IFIP International Conference on Wireless and Optical Communications Networks","author":"Sahoo P. K.","year":"2007"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1754414.1754416"},{"key":"e_1_2_1_25_1","volume-title":"An Algorithmic View on Sensor Networks: Surveillance, Localization, and Communication. Epubli GmbH","author":"Schieferdecker D."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1161089.1161104"}],"container-title":["ACM Transactions on Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3005718","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3005718","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:39:38Z","timestamp":1750217978000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3005718"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12,19]]},"references-count":26,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,2,28]]}},"alternative-id":["10.1145\/3005718"],"URL":"https:\/\/doi.org\/10.1145\/3005718","relation":{},"ISSN":["1550-4859","1550-4867"],"issn-type":[{"value":"1550-4859","type":"print"},{"value":"1550-4867","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,12,19]]},"assertion":[{"value":"2015-08-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-10-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-12-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}