{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T12:31:51Z","timestamp":1742387511904,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540371892"},{"type":"electronic","value":"9783540371908"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11814856_60","type":"book-chapter","created":{"date-parts":[[2006,10,9]],"date-time":"2006-10-09T15:04:00Z","timestamp":1160406240000},"page":"643-651","source":"Crossref","is-referenced-by-count":2,"title":["The Effective Radius Model for Multi-hop Wireless Networks"],"prefix":"10.1007","author":[{"given":"Liran","family":"Ma","sequence":"first","affiliation":[]},{"given":"Weidong","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Kai","family":"Xing","sequence":"additional","affiliation":[]},{"given":"E. K.","family":"Park","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"60_CR1","volume-title":"Algorithms and Combinatorics","author":"J. Spencer","year":"2001","unstructured":"Spencer, J.: The Strange Logic of Random Graphs. In: Algorithms and Combinatorics, vol.\u00a022. Springer, Heidelberg (2001)"},{"key":"60_CR2","volume-title":"National Telecommunications Conference","author":"L. Kleinrock","year":"1978","unstructured":"Kleinrock, L., Silvester, J.A.: Optimum transmission radii in packet radio networks or why six is a magic number. In: National Telecommunications Conference, Birmingham, Alabama, pp. 4.3.1\u20134.3.5. IEEE, Los Alamitos (1978)"},{"key":"60_CR3","doi-asserted-by":"crossref","unstructured":"Bettstetter, C.: On the Minimum Node Degree and Connectivity of a Wireless Multihop Network. In: The ACM Symposium on Mobile Adhoc Networking and Computing (MOBIHOC 2002), Lausanne, Switzerland, June 9\u201311, pp. 80\u201391 (2002)","DOI":"10.1145\/513800.513811"},{"issue":"2","key":"60_CR4","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1023\/B:WINE.0000013081.09837.c0","volume":"10","author":"F. Xue","year":"2004","unstructured":"Xue, F., Kumar, P.: The number of neighbors needed for connectivity of wireless networks. Wireless Networks\u00a010(2), 169\u2013181 (2004)","journal-title":"Wireless Networks"},{"key":"60_CR5","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1109\/MCSA.1999.749281","volume-title":"Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications","author":"C.E. Perkins","year":"1999","unstructured":"Perkins, C.E., Royer, E.M.: Ad-hoc on-demand distance vector routing. In: Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications, p. 90. IEEE Computer Society Press, Los Alamitos (1999)"},{"key":"60_CR6","first-page":"139","volume-title":"Ad Hoc Networking","author":"D.B. Johnson","year":"2001","unstructured":"Johnson, D.B., Maltz, D.A., Broch, J.: DSR: The dynamic source routing protocol for multihop wireless ad hoc networks. In: Perkins, C. (ed.) Ad Hoc Networking, ch.\u00a05, pp. 139\u2013172. Addison-Wesley, Reading (2001), [Online]. Available: http:\/\/monarch.cs.rice.edu\/monarch-papers\/dsr-chapter00.ps"},{"key":"60_CR7","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1145\/778415.778431","volume-title":"MobiHoc 2003: Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing","author":"X.-Y. Li","year":"2003","unstructured":"Li, X.-Y., Wan, P.-J., Wang, Y., Yi, C.-W.: Fault tolerant deployment and topology control in wireless networks. In: MobiHoc 2003: Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing, pp. 117\u2013128. ACM Press, New York (2003)"},{"key":"60_CR8","doi-asserted-by":"crossref","unstructured":"Schurgers, C., Tsiatsis, V., Ganeriwal, S., Srivastava, M.: Topology Management for Sensor Networks: Exploiting Latency and Density. In: The ACM Symposium on Mobile Adhoc Networking and Computing (MOBIHOC 2002), Lausanne, Switzerland, June 9\u201311, pp. 135\u2013145 (2002)","DOI":"10.1145\/513800.513817"},{"key":"60_CR9","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1145\/938985.939015","volume-title":"MobiCom 2003: Proceedings of the 9th annual international conference on Mobile computing and networking","author":"J. Pan","year":"2003","unstructured":"Pan, J., Hou, Y.T., Cai, L., Shi, Y., Shen, S.X.: Topology control for wireless sensor networks. In: MobiCom 2003: Proceedings of the 9th annual international conference on Mobile computing and networking, pp. 286\u2013299. ACM Press, New York (2003)"},{"issue":"4","key":"60_CR10","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1023\/A:1011426611520","volume":"6","author":"A. Nasipuri","year":"2001","unstructured":"Nasipuri, A., Castaneda, R., Das, S.R.: Performance of multipath routing for on-demand protocols in mobile ad hoc networks. Mob. Netw. Appl.\u00a06(4), 339\u2013349 (2001)","journal-title":"Mob. Netw. Appl."},{"key":"60_CR11","doi-asserted-by":"crossref","unstructured":"Lou, W., Liu, W., Fang, Y.: Spread: Enhancing data confidentiality in mobile ad hoc networks. In: INFOCOM, pp. 2404\u20132413 (2004)","DOI":"10.1109\/INFCOM.2004.1354662"},{"key":"60_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1007\/978-3-540-39592-8_27","volume-title":"Information Security and Privacy","author":"H. Chan","year":"2003","unstructured":"Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol.\u00a02727, p. 197. Springer, Heidelberg (2003)"},{"key":"60_CR13","unstructured":"Zhu, S., Setia, S., Jajodia, S., Ning, P.: An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. In: IEEE Symposium on Security and Privacy, pp. 259\u2013271 (2004)"},{"key":"60_CR14","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1145\/1062689.1062696","volume-title":"MobiHoc 2005: Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing","author":"H. Yang","year":"2005","unstructured":"Yang, H., Ye, F., Yuan, Y., Lu, S., Arbaugh, W.: Toward resilient security in wireless sensor networks. In: MobiHoc 2005: Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing, pp. 34\u201345. ACM Press, New York (2005)"}],"container-title":["Lecture Notes in Computer Science","Wireless Algorithms, Systems, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11814856_60.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,11]],"date-time":"2025-01-11T09:28:36Z","timestamp":1736587716000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11814856_60"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540371892","9783540371908"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/11814856_60","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}