{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:24Z","timestamp":1750220904680,"version":"3.41.0"},"publisher-location":"New York, New York, USA","reference-count":18,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1145\/3368926.3369685","type":"proceedings-article","created":{"date-parts":[[2019,12,20]],"date-time":"2019-12-20T13:30:11Z","timestamp":1576848611000},"page":"441-448","source":"Crossref","is-referenced-by-count":1,"title":["Recursive Gateway Allocation Combined with Self-localization and Model Checking in Mobile Ad-hoc Networks"],"prefix":"10.1145","author":[{"given":"Toshifusa","family":"Sekizawa","sequence":"first","affiliation":[{"name":"College of Engineering, Nihon University, Koriyama, Fukushima, Japan"}]},{"given":"Qian","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Electrical & Computer Engineering, The University of Texas at San Antonio, San Antonio, Texas, USA"}]},{"given":"Taiju","family":"Mikoshi","sequence":"additional","affiliation":[{"name":"College of Engineering, Nihon University, Koriyama, Fukushima, Japan"}]}],"member":"320","reference":[{"key":"key-10.1145\/3368926.3369685-1","unstructured":"Erika &#193;brah&#225;m, Bernd Becker, Christian Dehnert, Nils Jansen, Joost-Pieter Katoen, and Ralf Wimmer. 2014. Counterexample Generation for Discrete-Time Markov Models: An Introductory Survey. In Formal Methods for Executable Software Models - 14th International School on Formal Methods for the Design of Computer, Communication, and Software Systems, SFM 2014, Bertinoro, Italy, June 16-20, 2014, Advanced Lectures (Lecture Notes in Computer Science), Marco Bernardo 0001, Ferruccio Damiani, Reiner H&#228;hnle, Einar Broch Johnsen, and Ina Schaefer (Eds.), Vol. 8483. Springer, 65--121."},{"key":"key-10.1145\/3368926.3369685-2","unstructured":"Christel Baier and Joost-Pieter Katoen. 2008. Principles of Model Checking (Representation and Mind Series). The MIT Press."},{"key":"key-10.1145\/3368926.3369685-3","doi-asserted-by":"crossref","unstructured":"W. Chiu, B. Chen, and C. Yang. 2012. Robust Relative Location Estimation in Wireless Sensor Networks with Inexact Position Problems. IEEE Transactions on Mobile Computing 11, 6 (June 2012), 935--946. https:\/\/doi.org\/10.1109\/TMC.2011.111","DOI":"10.1109\/TMC.2011.111"},{"key":"key-10.1145\/3368926.3369685-4","unstructured":"Edmund M. Clarke, Orna Grumberg, and Doron Peled. 1999. Model Checking. MIT Press."},{"key":"key-10.1145\/3368926.3369685-5","doi-asserted-by":"crossref","unstructured":"Edmund M. Clarke, Thomas A. Henzinger, Helmut Veith, and Roderick Bloem (Eds.). 2018. Handbook of Model Checking. Springer.","DOI":"10.1007\/978-3-319-10575-8"},{"key":"key-10.1145\/3368926.3369685-6","doi-asserted-by":"crossref","unstructured":"K. A. Denney, M. Hamada, Y. Nagao, M. Kurosaki, and H. Ochi. 2016. ToA-based positioning system for industrial wireless LAN. In 2016 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS). 1--5. https:\/\/doi.org\/10.1109\/ISPACS.2016.7824744","DOI":"10.1109\/ISPACS.2016.7824744"},{"key":"key-10.1145\/3368926.3369685-7","unstructured":"E. Allen Emerson. 1990. Temporal and Modal Logic. In Handbook of Theoretical Computer Science. Vol. B. Elsevier, Chapter 16, 995--1072."},{"key":"key-10.1145\/3368926.3369685-8","doi-asserted-by":"crossref","unstructured":"H. Fetng, C. Hung, and Y. Tseng. 2018. Gateway Deployment in a Wireless Mesh Network for Load Balancing and Transmission Reduction. In 2018 IEEE 7th Global Conference on Consumer Electronics (GCCE). 109--113. https:\/\/doi.org\/10.1109\/GCCE.2018.8574482","DOI":"10.1109\/GCCE.2018.8574482"},{"key":"key-10.1145\/3368926.3369685-9","doi-asserted-by":"crossref","unstructured":"F. Hoffmann, D. Medina, and A. Wolisz. 2011. Optimization of routing and gateway allocation in aeronautical ad hoc networks using genetic algorithms. In 2011 7th International Wireless Communications and Mobile Computing Conference. 1391--1396. https:\/\/doi.org\/10.1109\/IWCMC.2011.5982741","DOI":"10.1109\/IWCMC.2011.5982741"},{"key":"key-10.1145\/3368926.3369685-10","unstructured":"Gerard J. Holzmann. 2003. The Spin Model Checker. Addison-Wesley."},{"key":"key-10.1145\/3368926.3369685-11","unstructured":"M. Kwiatkowska, G. Norman, and D. Parker. 2011. PRISM 4.0: Verification of Probabilistic Real-time Systems. In Proc. 23rd International Conference on Computer Aided Verification (CAV'11) (LNCS), Vol. 6806. Springer, 585--591."},{"key":"key-10.1145\/3368926.3369685-12","doi-asserted-by":"crossref","unstructured":"Z. Luo and T. C. Jannett. 2012. Modeling sensor position uncertainty for robust target localization in wireless sensor networks. In 2012 IEEE Radio and Wireless Symposium. 239--242. https:\/\/doi.org\/10.1109\/RWS.2012.6175293","DOI":"10.1109\/RWS.2012.6175293"},{"key":"key-10.1145\/3368926.3369685-13","doi-asserted-by":"crossref","unstructured":"M. Ohtani, H. Iwai, and H. Sasaoka. 2014. Improvement of position estimation accuracy using multiple access points in terminal position estimation based on position fingerprint. In 2014 International Symposium on Antennas and Propagation Conference Proceedings. 399--400. https:\/\/doi.org\/10.1109\/ISANP.2014.7026698","DOI":"10.1109\/ISANP.2014.7026698"},{"key":"key-10.1145\/3368926.3369685-14","doi-asserted-by":"crossref","unstructured":"M. L. Sanni, A. A. Hashim, F. Anwar, A. W. Naji, and G. S. M. Ahmed. 2012. Gateway placement optimisation problem for mobile multicast design in Wireless Mesh Networks. In 2012 International Conference on Computer and Communication Engineering(ICCCE). 446--451. https:\/\/doi.org\/10.1109\/ICCCE.2012.6271227","DOI":"10.1109\/ICCCE.2012.6271227"},{"key":"key-10.1145\/3368926.3369685-15","doi-asserted-by":"crossref","unstructured":"Toshifusa Sekizawa, Taiju Mikoshi, Masataka Nagura, Ryo Watanabe, and Qian Chen. 2018. Probabilistic Position Estimation and Model Checking for Resource-Constrained IoT Devices. In ICCCN. IEEE, 1--7. http:\/\/ieeexplore.ieee.org\/xpl\/mostRecentIssue.jsp?punumber=8486798","DOI":"10.1109\/ICCCN.2018.8487444"},{"key":"key-10.1145\/3368926.3369685-16","unstructured":"Sebastian Thrun, Wolfram Burgard, and Dieter Fox. 2005. Probabilistic Robotics. MIT Press."},{"key":"key-10.1145\/3368926.3369685-17","unstructured":"Ryo Watanabe, Kozo Okano, and Toshifusa Sekizawa. 2017. Towards Verification of Robot Design for Self-localization. In Hardware and Software: Verification and Testing - 13th International Haifa Verification Conference, HVC 2017, Haifa, Israel, November 13-15, 2017, Proceedings (LNCS), Vol. 10629. Springer, 245--248."},{"key":"key-10.1145\/3368926.3369685-18","doi-asserted-by":"crossref","unstructured":"Ryo Watanabe and Toshifusa Sekizawa. 2019. Counter Example Analysis of Robot Action Design for Self-localization Based on Model Checking Using Probability Removed Model. In IEEE 4th International Conference on Computer and Communication Systems. 111--114.","DOI":"10.1109\/CCOMS.2019.8821644"}],"event":{"number":"10","sponsor":["SOICT, School of Information and Communication Technology - HUST","NAFOSTED, The National Foundation for Science and Technology Development"],"acronym":"SoICT 2019","name":"the Tenth International Symposium","start":{"date-parts":[[2019,12,4]]},"location":"Hanoi, Ha Long Bay, Viet Nam","end":{"date-parts":[[2019,12,6]]}},"container-title":["Proceedings of the Tenth International Symposium on Information and Communication Technology  - SoICT 2019"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368926.3369685","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=3369685&ftid=2101283&dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:51Z","timestamp":1750203891000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=3368926.3369685"}},"subtitle":[],"proceedings-subject":"Information and Communication Technology","short-title":[],"issued":{"date-parts":[[2019]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1145\/3368926.3369685","relation":{},"subject":[],"published":{"date-parts":[[2019]]}}}