{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:34:46Z","timestamp":1750221286616,"version":"3.41.0"},"reference-count":34,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2017,12,21]],"date-time":"2017-12-21T00:00:00Z","timestamp":1513814400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Research Committee of University of Macau","award":["MYRG2017-00029-FST and MYRG2016-00148-FST"],"award-info":[{"award-number":["MYRG2017-00029-FST and MYRG2016-00148-FST"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Sen. Netw."],"published-print":{"date-parts":[[2018,2,28]]},"abstract":"<jats:p>\n            Complex non-convex ad hoc networks (CNCAH) contain intersecting polygons and edges. In many instances, the layouts of these networks are not entirely convex in shape. In this article, we propose a Kamada-Kawai-based algorithm called W-KK-MS for boundary node detection problems, which is capable of aligning node positions while achieving high sensitivity, specificity, and accuracy in producing a visual drawing from the input network topology. The algorithm put forward in this article selects and assigns weights to top-\n            <jats:italic>k<\/jats:italic>\n            nodes in each iteration to speed up the updating process of nodes. We also propose a novel approach to detect and unfold stacked regions in CNCAH networks. Experimental results show that the proposed algorithms can achieve fast convergence on boundary node detection in CNCAH networks and are able to successfully unfold stacked regions. The design and implementation of a prototype system called ELnet for analyzing CNCAH networks is also described in this article. The ELnet system is capable of generating synthetic networks for testing, integrating with force-directed algorithms, and visualizing and analyzing algorithms\u2019 outcomes.\n          <\/jats:p>","DOI":"10.1145\/3154424","type":"journal-article","created":{"date-parts":[[2017,12,21]],"date-time":"2017-12-21T16:58:29Z","timestamp":1513875509000},"page":"1-34","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Boundary Node Detection and Unfolding of Complex Non-Convex Ad Hoc Networks"],"prefix":"10.1145","volume":"14","author":[{"given":"Se-Hang","family":"Cheong","sequence":"first","affiliation":[{"name":"University of Macau, Macau, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8468-6182","authenticated-orcid":false,"given":"Yain-Whar","family":"Si","sequence":"additional","affiliation":[{"name":"University of Macau, Macau, China"}]}],"member":"320","published-online":{"date-parts":[[2017,12,21]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/9\/6\/176"},{"key":"e_1_2_1_2_1","unstructured":"T. J. Barth T. Chan and R. Haimes. 2012. Multiscale and Multiresolution Methods: Theory and Applications. Springer.  T. J. Barth T. Chan and R. Haimes. 2012. Multiscale and Multiresolution Methods: Theory and Applications. Springer."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1088\/1742-5468\/2008\/10\/P10008"},{"volume-title":"Fundamental Algorithms for Computer Graphics","author":"Bresenham J. E.","key":"e_1_2_1_4_1"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1121782.1121784"},{"volume-title":"Information Visualization Beyond the Horizon","author":"Chen C.","key":"e_1_2_1_6_1"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2011.70"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/234535.234538"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1530748.1530767"},{"volume-title":"Congressus Numerantium 42","year":"1984","author":"Eades P.","key":"e_1_2_1_10_1"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807048.1807057"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380211102"},{"volume-title":"Wireless Communications","author":"Goldsmith A.","key":"e_1_2_1_13_1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511841224"},{"key":"e_1_2_1_14_1","unstructured":"C. Gutwenger M. Chimani M. J\u00fcnger G. W. Klau K. Klein and P. Mutzel. 2013. Open graph drawing framework (OGDF). In Handbook of Graph Drawing and Visualization R. Tamassia (eds.). CRC Boca Raton 543--569.  C. Gutwenger M. Chimani M. J\u00fcnger G. W. Klau K. Klein and P. Mutzel. 2013. Open graph drawing framework (OGDF). In Handbook of Graph Drawing and Visualization R. Tamassia (eds.). CRC Boca Raton 543--569."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(89)90102-6"},{"volume-title":"Proceedings of the In Algorithms for Sensor Systems. Springer","author":"Kevin C.","key":"e_1_2_1_16_1"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2012.11"},{"volume-title":"Proceedings of the 2011 International Conference on Localization and GNSS (ICL-GNSS\u201911)","author":"Lui G.","key":"e_1_2_1_18_1"},{"key":"e_1_2_1_19_1","unstructured":"B. Naveh. 2013. JGraphT.  B. Naveh. 2013. JGraphT."},{"key":"e_1_2_1_20_1","unstructured":"Networkx Developer Team. 2014. NetworkX.  Networkx Developer Team. 2014. NetworkX."},{"key":"e_1_2_1_21_1","doi-asserted-by":"crossref","unstructured":"W. D. Nooy A. Mrvar and V. Batagelj. 2005. Exploratory Social Network Analysis with Pajek. Cambridge University Press.   W. D. Nooy A. Mrvar and V. Batagelj. 2005. Exploratory Social Network Analysis with Pajek. Cambridge University Press.","DOI":"10.1017\/CBO9780511806452"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1869983.1870035"},{"key":"e_1_2_1_23_1","doi-asserted-by":"crossref","unstructured":"D. D. Perkins R. Tumati H. Wu and I. Ajbar. 2005. Localization in wireless ad hoc networks. In Resource Management in Wireless Networking M. Cardei I. Cardei and D.-Z. Du (Eds.) Springer Boston 507--542.  D. D. Perkins R. Tumati H. Wu and I. Ajbar. 2005. Localization in wireless ad hoc networks. In Resource Management in Wireless Networking M. Cardei I. Cardei and D.-Z. Du (Eds.) Springer Boston 507--542.","DOI":"10.1007\/0-387-23808-5_18"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCS.1979.1084652"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1754414.1754416"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1534490.1534492"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.83.036103"},{"volume-title":"Handbook of Graph Drawing and Visualization","author":"Tamassia R.","key":"e_1_2_1_28_1","doi-asserted-by":"crossref","DOI":"10.1201\/b15385"},{"volume-title":"Postgraduate Seminar Report, Control Engineering Laboratory","author":"Virrankoski R.","key":"e_1_2_1_29_1"},{"volume-title":"Proceedings of the Localization and GNSS (ICL-GNSS\u201912)","author":"Volker M.","key":"e_1_2_1_30_1"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1161089.1161104"},{"volume-title":"Principles of Multiscale Modeling","author":"Weinan E.","key":"e_1_2_1_32_1"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPEC.2014.7040973"},{"volume-title":"Proceedings of the 2006 IEEE International Conference on Networking, Sensing and Control. IEEE, 868--873","author":"Zhang C.","key":"e_1_2_1_34_1"}],"container-title":["ACM Transactions on Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3154424","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3154424","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:26Z","timestamp":1750212686000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3154424"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,21]]},"references-count":34,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,2,28]]}},"alternative-id":["10.1145\/3154424"],"URL":"https:\/\/doi.org\/10.1145\/3154424","relation":{},"ISSN":["1550-4859","1550-4867"],"issn-type":[{"type":"print","value":"1550-4859"},{"type":"electronic","value":"1550-4867"}],"subject":[],"published":{"date-parts":[[2017,12,21]]},"assertion":[{"value":"2016-01-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-10-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-12-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}