iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1109/CIT/IUCC/DASC/PICOM.2015.16
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:30:02Z","timestamp":1729618202742,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/cit\/iucc\/dasc\/picom.2015.16","type":"proceedings-article","created":{"date-parts":[[2015,12,28]],"date-time":"2015-12-28T21:32:48Z","timestamp":1451338368000},"page":"92-99","source":"Crossref","is-referenced-by-count":4,"title":["Collision-Free Routing Protocol in Multi-hop Wireless Sensor Networks"],"prefix":"10.1109","author":[{"given":"Hicham","family":"Lakhlef","sequence":"first","affiliation":[]},{"given":"Julien","family":"Bourgeois","sequence":"additional","affiliation":[]},{"given":"Saad","family":"Harous","sequence":"additional","affiliation":[]},{"given":"Jean Frederic","family":"Myoupo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICVD.2001.902661"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/WFCS.2006.1704148"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/AINAW.2007.272"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1109\/79.985674","article-title":"Detection, classification, and tracking of targets","volume":"19","author":"li","year":"2002","journal-title":"IEEE Signal Processing Mag"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SAM.2002.1191063"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS.2012.12"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/71.819949"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/71.932709"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2003.1214289"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2003.1213175"},{"year":"2015","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2002.808417"},{"key":"ref27","first-page":"691","article-title":"Secure permutation routing protocol in multihop wireess sensor networks","author":"lakhlef","year":"2011","journal-title":"International Conference on Security and Management"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2010.5735827"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2014.10.003"},{"key":"ref5","first-page":"459","article-title":"Power control and clustering in Ad Hoc networks","author":"kawadia","year":"2003","journal-title":"Proceedings of IEEE Infocom"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1117\/12.392565"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2008.04.002"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2013.09.012"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/98.878532"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(01)00302-4"},{"journal-title":"J Parallel Distrib Comput","article-title":"Nicholas Lownes Communication and energy efficient routing protocols for single-hop radio networks","year":"2012","author":"sanguthevar","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2004.1271182"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31957-3_14"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-005-0033-5"},{"journal-title":"International Network Optimization Conference","article-title":"Optimal Permutation Routing on Mesh Networks","year":"2008","author":"walls","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-34738-7_4"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.4236\/wsn.2010.24040"}],"event":{"name":"2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT\/IUCC\/DASC\/PICOM)","start":{"date-parts":[[2015,10,26]]},"location":"LIVERPOOL, United Kingdom","end":{"date-parts":[[2015,10,28]]}},"container-title":["2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7361821\/7362962\/07363057.pdf?arnumber=7363057","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T02:36:36Z","timestamp":1498271796000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7363057\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":28,"URL":"http:\/\/dx.doi.org\/10.1109\/cit\/iucc\/dasc\/picom.2015.16","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}