iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1186/S13638-018-1057-X
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T07:47:36Z","timestamp":1722498456048},"reference-count":62,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2018,3,1]],"date-time":"2018-03-01T00:00:00Z","timestamp":1519862400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772554"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1186\/s13638-018-1057-x","type":"journal-article","created":{"date-parts":[[2018,2,28]],"date-time":"2018-02-28T20:14:06Z","timestamp":1519848846000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Cross-layer design for reducing delay and maximizing lifetime in industrial wireless sensor networks"],"prefix":"10.1186","volume":"2018","author":[{"given":"Jiawei","family":"Tan","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-5190-4761","authenticated-orcid":false,"given":"Anfeng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Ming","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Hailan","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Ming","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,1]]},"reference":[{"key":"1057_CR1","doi-asserted-by":"publisher","unstructured":"H Zheng, W Guo, N Xiong, A kernel-based compressive sensing approach for mobile data gathering in wireless sensor network systems. IEEE Transactions on Systems. Man Cybern. Syst. (2017). \n https:\/\/doi.org\/10.1109\/TSMC.2017.2734886\n \n .","DOI":"10.1109\/TSMC.2017.2734886"},{"key":"1057_CR2","doi-asserted-by":"publisher","unstructured":"J Gao, J Wang, P Zhong, H Wang, On threshold free error detection for industrial wireless sensor networks. IEEE Trans. Ind. Inform. (2017). \n https:\/\/doi.org\/10.1109\/TII.2017.2785395\n \n .","DOI":"10.1109\/TII.2017.2785395"},{"key":"1057_CR3","doi-asserted-by":"publisher","unstructured":"J Gao, Q Ping, J Wang, Resisting re-identification mining on social graph data. World Wide Web. (2018). \n https:\/\/doi.org\/10.1007\/s11280-017-0524-3","DOI":"10.1007\/s11280-017-0524-3"},{"issue":"4","key":"1057_CR4","doi-asserted-by":"publisher","first-page":"1945","DOI":"10.3390\/sym7041945","volume":"7","author":"A Shahzad","year":"2015","unstructured":"A Shahzad, M Lee, HD Kim, S Woo, N Xiong, New security development and trends to secure the SCADA sensors automated transmission during critical sessions. Symmetry 7(4), 1945\u20131980 (2015). \n https:\/\/doi.org\/10.3390\/sym7041945\n \n .","journal-title":"Symmetry"},{"issue":"1","key":"1057_CR5","doi-asserted-by":"publisher","first-page":"174","DOI":"10.3390\/s17010174","volume":"17","author":"N Xiong","year":"2017","unstructured":"N Xiong, RW Liu, M Liang, D Wu, Z Liu, H Wu, Effective alternating direction optimization methods for sparsity-constrained blind image deblurring. Sensors 17(1), 174 (2017). \n https:\/\/doi.org\/10.3390\/s17010174\n \n .","journal-title":"Sensors"},{"key":"1057_CR6","doi-asserted-by":"publisher","unstructured":"W Cheng, M Zhao, N Xiong, KT Chui, Non-convex sparse and low-rank based robust subspace segmentation for data mining. Sensors (2017). \n https:\/\/doi.org\/10.3390\/s17071633\n \n .","DOI":"10.3390\/s17071633"},{"key":"1057_CR7","doi-asserted-by":"publisher","unstructured":"Z Ning, X Wang, X Kong, W Hou, A social-aware group formation framework for information diffusion in narrowband Internet of things. IEEE Internet Things J. (2017). \n https:\/\/doi.org\/10.1109\/JIOT.2017.2777480\n \n .","DOI":"10.1109\/JIOT.2017.2777480"},{"key":"1057_CR8","doi-asserted-by":"publisher","unstructured":"Y Xu, A Liu, C Huang, Delay-aware program codes dissemination scheme in Internet of everything. Mob. Inf. Syst. (2016). \n https:\/\/doi.org\/10.1155\/2016\/2436074\n \n .","DOI":"10.1155\/2016\/2436074"},{"key":"1057_CR9","doi-asserted-by":"publisher","unstructured":"X Liu, S Zhao, A Liu, N Xiong, AV Vasilakos, Knowledge-aware proactive nodes selection approach for energy management in Internet of things. Futur. Gener. Comput. Syst. (2017). \n https:\/\/doi.org\/10.1016\/j.future.2017.07.022\n \n .","DOI":"10.1016\/j.future.2017.07.022"},{"issue":"1","key":"1057_CR10","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1186\/s13638-016-0754-6","volume":"2016","author":"Q Zhang","year":"2016","unstructured":"Q Zhang, A Liu, An unequal redundancy level-based mechanism for reliable data collection in wireless sensor networks. EURASIP J. Wirel. Commun. Netw. 2016(1), 258 (2016)","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"issue":"3","key":"1057_CR11","first-page":"68","volume":"16","author":"A Liu","year":"2017","unstructured":"A Liu, X Liu, Z Tang, LT Yang, Z Shao, Preserving smart sink location privacy with delay guaranteed routing scheme for WSNs. ACM Trans. Embed. Comput. Syst. 16(3), 68 (2017)","journal-title":"ACM Trans. Embed. Comput. Syst."},{"key":"1057_CR12","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/j.neucom.2016.12.105","volume":"270","author":"X Liu","year":"2017","unstructured":"X Liu, A Liu, Z Li, S Tian, YJ Choi, H Sekiya, J Li, Distributed cooperative communication nodes control and optimization reliability for resource-constrained WSNs. Neurocomputing 270, 122\u2013136 (2017)","journal-title":"Neurocomputing"},{"key":"1057_CR13","doi-asserted-by":"publisher","unstructured":"X Chen, M Ma, A Liu, Dynamic power management and adaptive packet size selection for IoT in e-healthcare. Comput. Electrical Eng. (2017). \n https:\/\/doi.org\/10.1016\/j.compeleceng.2017.06.010\n \n .","DOI":"10.1016\/j.compeleceng.2017.06.010"},{"key":"1057_CR14","doi-asserted-by":"publisher","unstructured":"X Liu, G Li, S Zhang, A Liu, Big program code dissemination scheme for emergency software-define wireless sensor networks. Peer-to-Peer Netw. Appl. 2017 (2017). \n https:\/\/doi.org\/10.1007\/s12083-017-0565-5\n \n .","DOI":"10.1007\/s12083-017-0565-5"},{"issue":"3","key":"1057_CR15","doi-asserted-by":"publisher","first-page":"509","DOI":"10.3390\/s17030509","volume":"17","author":"RW Liu","year":"2017","unstructured":"RW Liu, L Shi, SCH Yu, N Xiong, D Wang, Reconstruction of undersampled big dynamic MRI data using non-convex low-rank and sparsity constraints. Sensors 17(3), 509 (2017)","journal-title":"Sensors"},{"issue":"10","key":"1057_CR16","doi-asserted-by":"publisher","first-page":"221","DOI":"10.3390\/sym9100221","volume":"9","author":"J Xu","year":"2017","unstructured":"J Xu, X Liu, M Ma, A Liu, T Wang, C Huang, Intelligent aggregation based on content routing scheme for cloud computing. Symmetry 9(10), 221 (2017)","journal-title":"Symmetry"},{"key":"1057_CR17","doi-asserted-by":"publisher","unstructured":"Z Ning, X Hu, Z Chen, M Zhou, B Hu, J Cheng, M Obaidat, A cooperative quality aware service access system for social Internet of vehicles. IEEE Int. Things J. (2017). \n https:\/\/doi.org\/10.1109\/JIOT.2017.2764259\n \n .","DOI":"10.1109\/JIOT.2017.2764259"},{"key":"1057_CR18","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1016\/j.ins.2017.09.036","volume":"424","author":"A Liu","year":"2018","unstructured":"A Liu, Z Chen, N Xiong, An adaptive virtual relaying set scheme for loss-and-delay sensitive WSNs. Inf. Sci. 424, 118\u2013136 (2018)","journal-title":"Inf. Sci."},{"key":"1057_CR19","doi-asserted-by":"publisher","first-page":"9715428","DOI":"10.1155\/2018\/9715428","volume":"2018","author":"M Huang","year":"2018","unstructured":"M Huang, A Liu, T Wang, C Huang, Green data gathering under delay differentiated services constraint for Internet of things. Wirel. Commun. Mob. Comput. 2018, 9715428 (2018). \n https:\/\/doi.org\/10.1155\/2018\/9715428\n \n .","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"1057_CR20","doi-asserted-by":"publisher","first-page":"21296","DOI":"10.1109\/ACCESS.2017.2756826","volume":"5","author":"T Li","year":"2017","unstructured":"T Li, Y Liu, L Gao, A Liu, A cooperative-based model for smart-sensing tasks in fog computing. IEEE Access 5, 21296\u201321311 (2017)","journal-title":"IEEE Access"},{"issue":"9","key":"1057_CR21","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/j.adhoc.2017.06.004","volume":"64","author":"Z Wang","year":"2017","unstructured":"Z Wang, Q Cao, H Qi, H Chen, Q Wang, Cost-effective barrier coverage formation in heterogeneous wireless sensor networks. Ad Hoc Netw. 64(9), 65\u201379 (2017)","journal-title":"Ad Hoc Netw."},{"key":"1057_CR22","doi-asserted-by":"publisher","unstructured":"Y Liu, A Liu, S Guo, Z Li, YJ Choi, H Sekiya, Context-aware collect data with energy efficient in cyber-physical cloud systems. Futur. Gener. Comput. Syst. (2017). \n https:\/\/doi.org\/10.1016\/j.future.2017.05.029\n \n .","DOI":"10.1016\/j.future.2017.05.029"},{"key":"1057_CR23","doi-asserted-by":"publisher","first-page":"888","DOI":"10.3390\/s17040888","volume":"17","author":"Y Xu","year":"2017","unstructured":"Y Xu, X Chen, A Liu, C Hu, A latency and coverage optimized data collection scheme for smart cities based on vehicular ad-hoc networks. Sensors 17, 888 (2017)","journal-title":"Sensors"},{"issue":"10","key":"1057_CR24","doi-asserted-by":"publisher","first-page":"4994","DOI":"10.1109\/TWC.2013.081913.121709","volume":"12","author":"K Xie","year":"2013","unstructured":"K Xie, J Cao, X Wang, J Wen, Optimal resource allocation for reliable and energy efficient cooperative communications. IEEE Trans. Wirel. Commun. 12(10), 4994\u20135007 (2013)","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"1057_CR25","doi-asserted-by":"crossref","unstructured":"J Xu, A Liu, N Xiong, T Wang, Z Zuo, Integrated collaborative filtering recommendation in social cyber-physical systems. Int. J. Distributed Sens. Netw. 13(12), 1550147717749745 (2017)","DOI":"10.1177\/1550147717749745"},{"key":"1057_CR26","doi-asserted-by":"publisher","first-page":"8052620","DOI":"10.1155\/2018\/8052620","volume":"2018","author":"F Ma","year":"2018","unstructured":"F Ma, X Liu, A Liu, M Zhao, C Huang, T Wang, A time and location correlation incentive scheme for deeply data gathering in crowdsourcing networks. Wirel. Commun. Mob. Comput. 2018, 8052620 (2018). \n https:\/\/doi.org\/10.1155\/2018\/8052620\n \n .","journal-title":"Wirel. Commun. Mob. Comput."},{"issue":"9","key":"1057_CR27","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1109\/MCOM.2017.1700090","volume":"55","author":"X Liu","year":"2017","unstructured":"X Liu, Y Liu, H Song, A Liu, Big data orchestration as a service networking. IEEE Commun. Mag. 55(9), 94\u2013101 (2017)","journal-title":"IEEE Commun. Mag."},{"key":"1057_CR28","doi-asserted-by":"publisher","unstructured":"J Wang, A Liu, S Zhang, Key parameters decision for cloud computing: insights from a multiple game model. Concurrency Comput. Pract. Exp. (2017). \n https:\/\/doi.org\/10.1002\/cpe.4200\n \n .","DOI":"10.1002\/cpe.4200"},{"key":"1057_CR29","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1186\/s13638-017-1015-z","volume":"2018","author":"M Wu","year":"2018","unstructured":"M Wu, Y Wu, X Liu, M Ma, A Liu, M Zhao, Learning based synchronous approach from forwarding nodes to reduce the delay for industrial Internet of things. EURASIP J. Wirel. Commun. Netw. 2018, 10 (2018). \n https:\/\/doi.org\/10.1186\/s13638-017-1015-z\n \n .","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"1057_CR30","doi-asserted-by":"publisher","unstructured":"K Ota, M Dong, J Gui, A Liu, QUOIN: incentive mechanisms for crowd sensing networks. IEEE Netw. Mag. (2017). \n https:\/\/doi.org\/10.1109\/MNET.2017.1500151\n \n .","DOI":"10.1109\/MNET.2017.1500151"},{"issue":"4","key":"1057_CR31","doi-asserted-by":"publisher","first-page":"1513","DOI":"10.1109\/TII.2016.2627478","volume":"13","author":"S Manfredi","year":"2017","unstructured":"S Manfredi, E Di Tucci, Decentralized control algorithm for fast monitoring and efficient energy consumption in energy harvesting wireless sensor networks. IEEE Trans. Ind. Inform. 13(4), 1513\u20131520 (2017)","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"6","key":"1057_CR32","doi-asserted-by":"publisher","first-page":"2206","DOI":"10.1109\/TII.2016.2606084","volume":"12","author":"M Farooq-I-Azam","year":"2016","unstructured":"M Farooq-I-Azam, Q Ni, EA Ansari, Intelligent energy efficient localization using variable range beacons in industrial wireless sensor networks. IEEE Trans. Ind. Inform. 12(6), 2206\u20132216 (2016)","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"7","key":"1057_CR33","doi-asserted-by":"publisher","first-page":"1443","DOI":"10.1109\/TMC.2013.118","volume":"13","author":"Z Wang","year":"2014","unstructured":"Z Wang, J Liao, Q Cao, H Qi, Z Wang, Achieving k-barrier coverage in hybrid directional sensor networks. IEEE Trans. Mob. Comput. 13(7), 1443\u20131455 (2014)","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"2","key":"1057_CR34","doi-asserted-by":"publisher","first-page":"859","DOI":"10.1109\/TNET.2015.2397035","volume":"24","author":"K Xie","year":"2016","unstructured":"K Xie, X Wang, J Wen, J Cao, Cooperative routing with relay assignment in multi-radio multi-hop wireless networks. IEEE\/ACM Trans. Networking 24(2), 859\u2013872 (2016)","journal-title":"IEEE\/ACM Trans. Networking"},{"key":"1057_CR35","doi-asserted-by":"publisher","unstructured":"Q Liu, A Liu, On the hybrid using of unicast-broadcast in wireless sensor networks. Comput. Electrical Eng. (2017). \n https:\/\/doi.org\/10.1016\/j.compeleceng.2017.03.004","DOI":"10.1016\/j.compeleceng.2017.03.004"},{"issue":"4","key":"1057_CR36","doi-asserted-by":"publisher","first-page":"900","DOI":"10.3390\/s17040900","volume":"17","author":"X Chen","year":"2017","unstructured":"X Chen, Y Xu, A Liu, Cross layer design for optimal delay, energy efficiency and lifetime in body sensor networks. Sensors 17(4), 900 (2017). \n https:\/\/doi.org\/10.3390\/s17040900\n \n .","journal-title":"Sensors"},{"key":"1057_CR37","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1016\/j.ins.2015.09.039","volume":"329","author":"H Cheng","year":"2016","unstructured":"H Cheng, Z Su, N Xiong, Y Xiao, Energy-efficient nodes scheduling algorithms for wireless sensor networks using Markov random field model. Inf. Sci. 329, 461\u2013477 (2016)","journal-title":"Inf. Sci."},{"key":"1057_CR38","doi-asserted-by":"publisher","unstructured":"X Liu, M Dong, K Ota, LT Yang, A Liu, Trace malicious source to guarantee cyber security for mass monitor critical infrastructure. J. Comput. Syst. Sci. (2016). \n https:\/\/doi.org\/10.1016\/j.jcss.2016.09.008","DOI":"10.1016\/j.jcss.2016.09.008"},{"key":"1057_CR39","doi-asserted-by":"publisher","unstructured":"J Tang, A Liu, M Zhao, T Wang, An aggregate signature based trust routing for data gathering in sensor networks. Secur. Commun. Netw. (2018). \n https:\/\/doi.org\/10.1155\/2018\/6328504","DOI":"10.1155\/2018\/6328504"},{"issue":"99","key":"1057_CR40","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TSMC.2017.2698457","volume":"1","author":"K Huang","year":"2017","unstructured":"K Huang, Q Zhang, C Zhou, N Xiong, Y Qin, An efficient intrusion detection approach for visual sensor networks based on traffic pattern learning. IEEE Trans. Syst. Man. Cybern. 1(99), 1\u201310 (2017). \n https:\/\/doi.org\/10.1109\/TSMC.2017.2698457\n \n .","journal-title":"IEEE Trans. Syst. Man. Cybern."},{"key":"1057_CR41","doi-asserted-by":"publisher","first-page":"550","DOI":"10.1016\/j.ins.2016.06.049","volume":"367","author":"Q Fan","year":"2016","unstructured":"Q Fan, N Xiong, K Zeitouni, Q Wu, A Vasilakos, YC Tian, Game balanced multi-factor multicast routing in sensor grid networks. Inf. Sci. 367, 550\u2013572 (2016). \n https:\/\/doi.org\/10.1016\/j.ins.2016.06.049\n \n .","journal-title":"Inf. Sci."},{"key":"1057_CR42","doi-asserted-by":"publisher","first-page":"789","DOI":"10.1007\/s10922-016-9367-y","volume":"24","author":"J Gui","year":"2016","unstructured":"J Gui, K Zhou, Flexible adjustments between energy and capacity for topology control in heterogeneous wireless multi-hop networks. J. Netw. Syst. Manag. 24, 789\u2013812 (2016)","journal-title":"J. Netw. Syst. Manag."},{"issue":"16","key":"1057_CR43","doi-asserted-by":"publisher","first-page":"5153","DOI":"10.1109\/JSEN.2017.2722462","volume":"17","author":"V Agarwal","year":"2017","unstructured":"V Agarwal, RA DeCarlo, LH Tsoukalas, Modeling energy consumption and lifetime of a wireless sensor node operating on a contention-based MAC protocol. IEEE Sensors J. 17(16), 5153\u20135168 (2017)","journal-title":"IEEE Sensors J."},{"key":"1057_CR44","doi-asserted-by":"crossref","unstructured":"M Zhou, M Zhao, A Liu, M Ma, T Wang, C Huang, Fast and efficient data forwarding scheme for tracking mobile target in sensor networks. Symmetry. 9(11), 269 (2017)","DOI":"10.3390\/sym9110269"},{"key":"1057_CR45","doi-asserted-by":"publisher","unstructured":"H Cheng, Y Chen, N Xiong, F Li, Layer-based data aggregation and performance analysis in wireless sensor networks. J. Appl. Math. 2013, (2016). \n https:\/\/doi.org\/10.1155\/2013\/502381","DOI":"10.1155\/2013\/502381"},{"key":"1057_CR46","unstructured":"A Liu, S Zhao, High performance target tracking scheme with low prediction precision requirement in WSNs. Int. J. Ad Hoc. Ubiquitous Comput. (2016). \n http:\/\/www.inderscience.com\/info\/ingeneral\/forthcoming.php?jcode=ijahuc"},{"key":"1057_CR47","doi-asserted-by":"publisher","unstructured":"J Gao, J Wang, J He, F Yan, Against signed graph deanonymization attacks on social network. Int. J. Parallel Prog. (2017). \n https:\/\/doi.org\/10.1007\/s10766-017-0546-6\n \n .","DOI":"10.1007\/s10766-017-0546-6"},{"issue":"4","key":"1057_CR48","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1109\/JSAC.2009.090512","volume":"27","author":"N Xiong","year":"2009","unstructured":"N Xiong, AV Vasilakos, LT Yang, L Song, Y Pan, R Kannan, Y Li, Comparative analysis of quality of service and memory usage for adaptive failure detectors in healthcare systems. IEEE J. Selected Areas Commun. 27(4), 495\u2013509 (2009)","journal-title":"IEEE J. Selected Areas Commun."},{"issue":"12","key":"1057_CR49","doi-asserted-by":"publisher","first-page":"3071","DOI":"10.3837\/tiis.2013.12.007","volume":"7","author":"X Chen","year":"2013","unstructured":"X Chen, Y Hu, A Liu, Z Chen, Cross layer optimal design with guaranteed reliability under Rayleigh block fading channels. KSII Trans. Internet Inf. Syst. 7(12), 3071\u20133095 (2013)","journal-title":"KSII Trans. Internet Inf. Syst."},{"key":"1057_CR50","doi-asserted-by":"publisher","first-page":"532045","DOI":"10.1155\/2015\/532045","volume":"2015","author":"J Long","year":"2015","unstructured":"J Long, A He, A Liu, X Chen, Adaptive sensing with reliable guarantee under white Gaussian noise channels of sensor networks. J. Sensors 2015, 532045 (2015). \n https:\/\/doi.org\/10.1155\/2015\/532045\n \n .","journal-title":"J. Sensors"},{"key":"1057_CR51","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1109\/ACCESS.2015.2426794","volume":"3","author":"J Long","year":"2015","unstructured":"J Long, M Dong, K Ota, A Liu, S Hai, Reliability guaranteed efficient data gathering in wireless sensor networks. IEEE Access 3, 430\u2013444 (2015)","journal-title":"IEEE Access"},{"issue":"5","key":"1057_CR52","doi-asserted-by":"publisher","first-page":"1517","DOI":"10.1109\/JIOT.2017.2740423","volume":"4","author":"S Ezdiani","year":"2017","unstructured":"S Ezdiani, IS Acharyya, S Sivakumar, A Al-Anbuky, Wireless sensor network softwarization: towards WSN adaptive QoS. IEEE Int. Things J. 4(5), 1517\u20131527 (2017)","journal-title":"IEEE Int. Things J."},{"issue":"1","key":"1057_CR53","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/s11265-015-1039-8","volume":"83","author":"R Anane","year":"2016","unstructured":"R Anane, K Raoof, R Bouallegue, Minimization of wireless sensor network energy consumption through optimal modulation scheme and channel coding strategy. J. Signal Process. Syst. 83(1), 65\u201381 (2016)","journal-title":"J. Signal Process. Syst."},{"key":"1057_CR54","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1016\/j.comnet.2017.06.012","volume":"124","author":"A Boukerche","year":"2017","unstructured":"A Boukerche, X Zhou, MAC transmission protocols for delay-tolerant sensor networks. Comput. Netw. 124, 108\u2013125 (2017)","journal-title":"Comput. Netw."},{"key":"1057_CR55","doi-asserted-by":"publisher","first-page":"1306","DOI":"10.1016\/j.adhoc.2012.03.012","volume":"10","author":"R Zhang","year":"2012","unstructured":"R Zhang, O Berder, J Gorce, O Sentieys, Energy\u2013delay tradeoff in wireless multihop networks with unreliable links. Ad Hoc Netw. 10, 1306\u20131321 (2012)","journal-title":"Ad Hoc Netw."},{"key":"1057_CR56","doi-asserted-by":"publisher","first-page":"945","DOI":"10.1109\/ICC.2002.996995","volume":"2","author":"P Chen","year":"2002","unstructured":"P Chen, B O\u2019Dea, E Callaway, Energy efficient system design with optimum transmission range for wireless ad hoc networks. Proc. IEEE Int. Conf. Commun. 2, 945\u2013952 (2002)","journal-title":"Proc. IEEE Int. Conf. Commun."},{"key":"1057_CR57","unstructured":"JL Gao, Analysis of energy consumption for ad hoc wireless sensor networks using a bit-meter-per-joule metric, Jet Propulsion Laboratory, California Institute of Technology. Tech. Rep. 42,150 (2002)"},{"key":"1057_CR58","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1016\/j.adhoc.2006.09.001","volume":"6","author":"Y Chen","year":"2008","unstructured":"Y Chen, C Chuah, Q Zhao, Network configuration for optimal utilization efficiency of wireless sensor networks. Ad Hoc Netw. 6, 92\u2013107 (2008)","journal-title":"Ad Hoc Netw."},{"issue":"6","key":"1057_CR59","doi-asserted-by":"publisher","first-page":"1303","DOI":"10.3390\/s17061303","volume":"17","author":"PF Wu","year":"2017","unstructured":"PF Wu, F Xiao, C Sha, HP Huang, RC Wang, N Xiong, Node scheduling strategies for achieving full-view area coverage in camera sensor networks. Sensors 17(6), 1303 (2017). \n https:\/\/doi.org\/10.3390\/s17061303\n \n .","journal-title":"Sensors"},{"key":"1057_CR60","doi-asserted-by":"publisher","first-page":"701","DOI":"10.1016\/j.adhoc.2011.09.011","volume":"11","author":"M Tahir","year":"2013","unstructured":"M Tahir, R Farrell, A cross-layer framework for optimal delay-margin, network lifetime and utility tradeoff in wireless visual sensor networks. Ad Hoc Netw. 11, 701\u2013711 (2013)","journal-title":"Ad Hoc Netw."},{"issue":"7","key":"1057_CR61","doi-asserted-by":"publisher","first-page":"3255","DOI":"10.1109\/TVT.2012.2205284","volume":"61","author":"A Liu","year":"2012","unstructured":"A Liu, Z Zheng, C Zhang, Z Chen, X Shen, Secure and energy-efficient disjoint multi-path routing for WSNs. IEEE Trans. Veh. Technol. 61(7), 3255\u20133265 (2012)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"1057_CR62","doi-asserted-by":"publisher","unstructured":"Q Fan, K Zeitouni, N Xiong, Q Wu, A General Nash Equilibrium Semantic Cache Algorithm in a sensor grid database system. IEEE Trans. Syst. Man. Cybern. 4(99) (2016). \n https:\/\/doi.org\/10.1109\/TSMC.2016.2523949\n \n .","DOI":"10.1109\/TSMC.2016.2523949"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-018-1057-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-018-1057-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-018-1057-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,7]],"date-time":"2019-03-07T11:46:33Z","timestamp":1551959193000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-018-1057-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,1]]},"references-count":62,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["1057"],"URL":"http:\/\/dx.doi.org\/10.1186\/s13638-018-1057-x","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,3,1]]},"assertion":[{"value":"27 December 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 February 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 March 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Publisher\u2019s Note"}}],"article-number":"50"}}