{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:26:52Z","timestamp":1725568012136},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540235262"},{"type":"electronic","value":"9783540301820"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30182-0_37","type":"book-chapter","created":{"date-parts":[[2010,10,24]],"date-time":"2010-10-24T23:50:40Z","timestamp":1287964240000},"page":"363-372","source":"Crossref","is-referenced-by-count":1,"title":["Finding Breach Paths Using the Watershed Segmentation Algorithm in Surveillance Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Ertan","family":"Onur","sequence":"first","affiliation":[]},{"given":"Cem","family":"Ersoy","sequence":"additional","affiliation":[]},{"given":"Hakan","family":"Deli\u00e7","sequence":"additional","affiliation":[]},{"given":"Lale","family":"Akarun","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"37_CR1","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/MC.2004.1266294","volume":"37","author":"J. Carle","year":"2004","unstructured":"Carle, J., Simplot-Ryl, D.: Energy-Efficient Area Monitoring for Sensor Networks. IEEE Computer\u00a037, 40\u201346 (2004)","journal-title":"IEEE Computer"},{"key":"37_CR2","doi-asserted-by":"crossref","unstructured":"Clouqueur, T., Phipatanasuphorn, V., Ramanathan, P., Saluja, K.K.: Sensor Deployment Strategy for Target Detection. In: Proceedings of the First ACM International Workshop on Wireless Sensor Networks and Applications, Atlanta, USA, pp. 42\u201348 (2002)","DOI":"10.1145\/570738.570745"},{"key":"37_CR3","unstructured":"Elfes, A.: Occupancy Grids: A Stochastic Spatial Representation for Active Robot Perception. In: Proceedings of the Sixth Conference on Uncertainty in AI, pp. 60\u201370 (1990)"},{"key":"37_CR4","doi-asserted-by":"crossref","unstructured":"He, T., Krishnamurthy, S., Stankovic, J.A., Abdelzaher, T., Luo, L., Stoleru, R., Yan, T., Gu, L.: Energy-Efficient Surveillance System Using Wireless Sensor Networks. In: The Second International Conference on Mobile Systems, Applications, and Services, Boston, USA (2004)","DOI":"10.1145\/990064.990096"},{"key":"37_CR5","unstructured":"Onur, E., Ersoy, C., Deli\u00e7, H.: Finding Sensing Coverage and Breach Paths in Surveillance Wireless Sensor Networks. In: Proceedings of the 15th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Barcelona, Spain (2004)"},{"key":"37_CR6","doi-asserted-by":"crossref","unstructured":"Veltri, G., Qu, G., Huang, Q., Potkonjak, M.: Minimal and Maximal Exposure Path Algorithms for Wireless Embedded Sensor Networks. In: Proceedings of the First International ACM Conference on Embedded Networked Sensor Systems, Los Angeles, USA, pp. 40\u201350 (2003)","DOI":"10.1145\/958491.958497"},{"key":"37_CR7","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1109\/34.87344","volume":"13","author":"L. Vincent","year":"1991","unstructured":"Vincent, L., Soile, P.: Watersheds in Digital Spaces: An Efficient Algorithm Based on Immersion Simulations. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a013, 583\u2013598 (1991)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"37_CR8","doi-asserted-by":"crossref","unstructured":"Wang, X., Xing, G., Zhang, Y., Lu, C., Pless, R., Gill, C.: Integrated Coverage and Connectivity Configuration in Wireless Sensor Networks. In: Proceedings of the First International ACM Conference on Embedded Networked Sensor Systems, Los Angeles, USA, pp. 28\u201339 (2003)","DOI":"10.1145\/958491.958496"},{"key":"37_CR9","volume-title":"Data Structures and Algorithm Analysis in C++","author":"M.A. Weiss","year":"1999","unstructured":"Weiss, M.A.: Data Structures and Algorithm Analysis in C++, 2nd edn. Addison-Wesley, Reading (1999)","edition":"2"},{"key":"37_CR10","doi-asserted-by":"crossref","unstructured":"Zhang, H., Hou, C.J.: Maintaining Sensing Coverage and Connectivity in Large Sensor Networks. In: Proceedings of the NSF International Workshop on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks, Fort Lauderdale, USA (2004)","DOI":"10.1201\/9780203323687.ch28"},{"key":"37_CR11","doi-asserted-by":"crossref","unstructured":"Zou, Y., Chakrabarty, K.: Energy-Aware Target Localization in Wireless Sensor Networks. In: Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, Fort Worth, USA, pp. 60\u201367 (2003)","DOI":"10.1109\/PERCOM.2003.1192727"},{"key":"37_CR12","doi-asserted-by":"crossref","unstructured":"Zou, Y., Chakrabarty, K.: Sensor Deployment and Target Localization Based on Virtual Forces. In: Proceedings of the IEEE INFOCOM, San Francisco, USA, pp. 1293\u20131303 (2003)","DOI":"10.1109\/INFCOM.2003.1208965"}],"container-title":["Lecture Notes in Computer Science","Computer and Information Sciences - ISCIS 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30182-0_37.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:45:47Z","timestamp":1605761147000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30182-0_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540235262","9783540301820"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30182-0_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}