{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T08:57:09Z","timestamp":1762505829420},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2011,8,31]],"date-time":"2011-08-31T00:00:00Z","timestamp":1314748800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/2.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1186\/1687-1499-2011-82","type":"journal-article","created":{"date-parts":[[2011,9,1]],"date-time":"2011-09-01T01:59:18Z","timestamp":1314842358000},"source":"Crossref","is-referenced-by-count":12,"title":["Modelling the guaranteed QoS for wireless sensor networks: a network calculus approach"],"prefix":"10.1186","volume":"2011","author":[{"given":"Lianming","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Jianping","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Xiaoheng","family":"Deng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,8,31]]},"reference":[{"issue":"4","key":"83_CR1","doi-asserted-by":"publisher","first-page":"921","DOI":"10.1016\/j.comnet.2006.10.002","volume":"51","author":"IF Akyildiz","year":"2007","unstructured":"Akyildiz IF, Melodia T, Chowdhury KR: A survey on wireless multimedia sensor networks. Comput Netw 2007, 51(4):921-960. 10.1016\/j.comnet.2006.10.002","journal-title":"Comput Netw"},{"issue":"12","key":"83_CR2","doi-asserted-by":"publisher","first-page":"2292","DOI":"10.1016\/j.comnet.2008.04.002","volume":"52","author":"J Yick","year":"2008","unstructured":"Yick J, Mukherjee B, Ghosal D: Wireless sensor network survey. Comput Netw 2008, 52(12):2292-2330. 10.1016\/j.comnet.2008.04.002","journal-title":"Comput Netw"},{"issue":"15","key":"83_CR3","doi-asserted-by":"publisher","first-page":"2688","DOI":"10.1016\/j.comnet.2010.05.003","volume":"54","author":"H Alemdar","year":"2010","unstructured":"Alemdar H, Ersoy C: Wireless sensor networks for healthcare: a survey. Comput Netw 2010, 54(15):2688-2710. 10.1016\/j.comnet.2010.05.003","journal-title":"Comput Netw"},{"key":"83_CR4","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1145\/958491.958505","volume-title":"Proceedings of 1st ACM Conference on Embedded Networked Sensor Systems (SenSys'03)","author":"R Kumar","year":"2003","unstructured":"Kumar R, Wolenetz M, Agarwalla B, Shin J, Hutto P, Paul A, Ramachandran U, DFuse: a framework for distributed data fusion. In Proceedings of 1st ACM Conference on Embedded Networked Sensor Systems (SenSys'03). Los Angeles, CA, USA; 2003:114-125."},{"key":"83_CR5","volume-title":"Network Calculus","author":"J-Y Le Boudec","year":"2004","unstructured":"Le Boudec J-Y, Thiran P: Network Calculus. Springer Verlag; 2004."},{"issue":"1","key":"83_CR6","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1109\/SURV.2010.020110.00019","volume":"12","author":"M Fidler","year":"2010","unstructured":"Fidler M: A survey of deterministic and stochastic service curve models in the network calculus. IEEE Commun Surveys Tutor 2010, 12(1):59-86.","journal-title":"IEEE Commun Surveys Tutor"},{"key":"83_CR7","volume-title":"Proceedings of the 2nd International Conference on Performance Evaluation Methodologies and Tools (VALUETOOLS'07)","author":"L Lenzini","year":"2007","unstructured":"Lenzini L, Mingozzi E, Stea G: End-to-end delay bounds in FIFO-multiplexing tandems. In Proceedings of the 2nd International Conference on Performance Evaluation Methodologies and Tools (VALUETOOLS'07). Nantes, France; 2007."},{"key":"83_CR8","volume-title":"Proceedings of 27th IEEE International Conference on Computer Communications (INFOCOM'08)","author":"JB Schmitt","year":"2008","unstructured":"Schmitt JB, Zdarsky FA, Fidler M: Delay bounds under arbitrary multiplexing: when network calculus leaves you in the lurch .... In Proceedings of 27th IEEE International Conference on Computer Communications (INFOCOM'08). Phoenix, AZ, USA; 2008."},{"key":"83_CR9","first-page":"1316","volume-title":"Proceedings of the 29th IEEE International Conference on Computer Communications (INFOCOM'10)","author":"A Bouillard","year":"2010","unstructured":"Bouillard A, Jouhet L, Thierry E: Tight performance bounds in the worst-case analysis of feed-forward networks. In Proceedings of the 29th IEEE International Conference on Computer Communications (INFOCOM'10). San Diego, CA, USA; 2010:1316-1324."},{"key":"83_CR10","volume-title":"Proceedings of Fifteenth International Symposium on Mathematical Theory of Networks and Systems (MTNS'02)","author":"J Zhang","year":"2002","unstructured":"Zhang J, Premaratne K, Bauer PH: Resource allocation and congestion control in distributed sensor networks-a network calculus approach. In Proceedings of Fifteenth International Symposium on Mathematical Theory of Networks and Systems (MTNS'02). Notre Dame, Indiana, USA; 2002."},{"key":"83_CR11","volume-title":"Proceedings of the 1st workshop on Resource Allocation in Wireless Networks (RAWNET'05)","author":"JB Schmitt","year":"2005","unstructured":"Schmitt JB, Roedig U: Worst case dimensioning of wireless sensor networks under uncertain topologies. In Proceedings of the 1st workshop on Resource Allocation in Wireless Networks (RAWNET'05). Washington, DC, USA; 2005."},{"key":"83_CR12","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1007\/11502593_13","volume-title":"Proceedings of the International Conference on Distributed Computing in Sensor Systems (DCOSS'05)","author":"JB Schmitt","year":"2005","unstructured":"Schmitt JB, Roedig U: Sensor network calculus-A framework for worst case analysis. In Proceedings of the International Conference on Distributed Computing in Sensor Systems (DCOSS'05). Los Alamitos, CA, USA; 2005:141-154."},{"key":"83_CR13","first-page":"6","volume-title":"Proceedings of IFIP Networking Workshop on Performance Control in Wireless Sensor Networks (PWSN'06)","author":"JB Schmitt","year":"2006","unstructured":"Schmitt JB, Zdarsky FA, Roedig U: Sensor network calculus with multiple sinks. In Proceedings of IFIP Networking Workshop on Performance Control in Wireless Sensor Networks (PWSN'06). Coimbra, Portugal; 2006:6-13."},{"key":"83_CR14","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1109\/RTSS.2007.17","volume-title":"Proceedings of the 28th IEEE International Real-Time Systems Symposium (RTSS'07)","author":"JB Schmitt","year":"2007","unstructured":"Schmitt JB, Zdarsky FA, Thiele L: A comprehensive worst-case calculus for wireless sensor networks with in-network processing. In Proceedings of the 28th IEEE International Real-Time Systems Symposium (RTSS'07). Tucson, AZ, USA; 2007:193-202."},{"key":"83_CR15","first-page":"981","volume-title":"Proceedings of the IEEE Global Communications Conference (GLOBECOM'07)","author":"Y Cao","year":"2007","unstructured":"Cao Y, Xue Y, Cui Y: Network-calculus-based analysis of power management in video sensor networks. In Proceedings of the IEEE Global Communications Conference (GLOBECOM'07). Washington, DC, USA; 2007:981-985."},{"key":"83_CR16","first-page":"1081","volume-title":"Proceedings of the International Wireless Communications and Mobile Computing Conference (IWCMC'08)","author":"H She","year":"2008","unstructured":"She H, Lu Z, Jantsch A, Zheng L-R, Zhou D: Deterministic worst-case performance analysis for wireless sensor networks. In Proceedings of the International Wireless Communications and Mobile Computing Conference (IWCMC'08). Crete Island, Greece; 2008:1081-1086."},{"key":"83_CR17","first-page":"412","volume-title":"Proceedings of the 27th IEEE International Real-Time Systems Symposium (RTSS'06)","author":"A Koubaa","year":"2006","unstructured":"Koubaa A, Alves M, Tovar E: Modeling and worst-case dimensioning of cluster-tree wireless sensor networks. In Proceedings of the 27th IEEE International Real-Time Systems Symposium (RTSS'06). Rio de Janeiro, Brazil; 2006:412-421."},{"key":"83_CR18","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS.2006.29","volume-title":"Modeling and worst-case dimensioning of cluster-tree wireless sensor networks: proofs and computation details","author":"A Koubaa","year":"2006","unstructured":"Koubaa A, Alves M, Tovar E: Modeling and worst-case dimensioning of cluster-tree wireless sensor networks: proofs and computation details. Technical Report, TR-060601, CISTER-ISEP Research Unit, Porto, Portugal; 2006."},{"issue":"2","key":"83_CR19","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1145\/1824766.1824770","volume":"7","author":"P Jurcik","year":"2010","unstructured":"Jurcik P, Severino R, Koubaa A, Alves M, Tovar E: Dimensioning and worst-case analysis of cluster-tree sensor networks. ACM Trans Sensor Netw 2010, 7(2):14.","journal-title":"ACM Trans Sensor Netw"},{"key":"83_CR20","volume-title":"Proceedings of First International Conference on Communications and Networking in China (ChinaCom'06)","author":"L Zhang","year":"2006","unstructured":"Zhang L, Chen Z, Deng X, Huang G, Liu Y: A scalable framework for QoS guarantees. In Proceedings of First International Conference on Communications and Networking in China (ChinaCom'06). Beijing, China; 2006."},{"key":"83_CR21","doi-asserted-by":"publisher","first-page":"538","DOI":"10.1109\/CCCM.2008.23","volume-title":"Proceedings of 2008 ISECS International Colloquium on Computing, Communication, Control, and Management (CCCM'08)","author":"L Zhang","year":"2008","unstructured":"Zhang L: Bounds on end-to-end delay jitter with self-similar input traffic an ad hoc wireless network. In Proceedings of 2008 ISECS International Colloquium on Computing, Communication, Control, and Management (CCCM'08). Guangzhou, China; 2008:538-541."},{"key":"83_CR22","first-page":"179","volume-title":"Proceedings of 2008 International Workshop on Information Technology and Security (WIST'08)","author":"L Zhang","year":"2008","unstructured":"Zhang L, Liu S, Xu H: End-to-end delay in wireless sensor network by network calculus. In Proceedings of 2008 International Workshop on Information Technology and Security (WIST'08). Shanghai, China; 2008:179-183."},{"key":"83_CR23","first-page":"493","volume-title":"Proceedings of the 9th International Conference for Young Computer Scientists (ICYCS'08)","author":"H Qi","year":"2008","unstructured":"Qi H, Chen Z, Zhang L: Towards end-to-end delay on WMNs based on statistical network calculus. In Proceedings of the 9th International Conference for Young Computer Scientists (ICYCS'08). Zhang Jia Jie, Hunan, China; 2008:493-497."},{"issue":"12","key":"83_CR24","doi-asserted-by":"publisher","first-page":"2651","DOI":"10.1109\/49.898747","volume":"18","author":"R-R Boorstyn","year":"2002","unstructured":"Boorstyn R-R, Burchard A, Liebeherr J, Oottamakorn C: Statistical service assurances for traffic scheduling algorithms. IEEE J Sel Areas Commun 2002, 18(12):2651-2662.","journal-title":"IEEE J Sel Areas Commun"},{"issue":"4","key":"83_CR25","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1016\/j.comnet.2003.12.004","volume":"44","author":"M Fidler","year":"2004","unstructured":"Fidler M, Sander V: A parameter based admission control for differentiated services networks. Comput Netw 2004, 44(4):463-447. 10.1016\/j.comnet.2003.12.004","journal-title":"Comput Netw"},{"issue":"11","key":"83_CR26","doi-asserted-by":"publisher","first-page":"1009","DOI":"10.1016\/S0140-3664(02)00015-4","volume":"25","author":"G Procissi","year":"2002","unstructured":"Procissi G, Garg A, Gerla M, Sanadidi MY: Token bucket characterization of long-range dependent traffic. Comput Commun 2002, 25(11):1009-1017. 10.1016\/S0140-3664(02)00015-4","journal-title":"Comput Commun"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1186\/1687-1499-2011-82\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2011-82.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2011-82.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,21]],"date-time":"2019-01-21T21:50:09Z","timestamp":1548107409000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/1687-1499-2011-82"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,8,31]]},"references-count":26,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,12]]}},"alternative-id":["83"],"URL":"https:\/\/doi.org\/10.1186\/1687-1499-2011-82","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,8,31]]},"article-number":"82"}}