{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T17:13:02Z","timestamp":1742922782033,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030670863"},{"type":"electronic","value":"9783030670870"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-67087-0_16","type":"book-chapter","created":{"date-parts":[[2021,1,14]],"date-time":"2021-01-14T01:17:39Z","timestamp":1610587059000},"page":"244-260","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Generic Framework for Optimization of Local Dissemination in Wireless Networks"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1316-7788","authenticated-orcid":false,"given":"Dariusz R.","family":"Kowalski","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5842-6256","authenticated-orcid":false,"given":"Miguel A.","family":"Mosteiro","sequence":"additional","affiliation":[]},{"given":"Krutika","family":"Wadhwa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,14]]},"reference":[{"key":"16_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41527-2","volume-title":"Distributed Computing","year":"2013","unstructured":"Afek, Y. (ed.): DISC 2013. LNCS, vol. 8205. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-41527-2"},{"issue":"10","key":"16_CR2","doi-asserted-by":"publisher","first-page":"1209","DOI":"10.1109\/TC.1987.1676861","volume":"36","author":"I Chlamtac","year":"1987","unstructured":"Chlamtac, I., Kutten, S.: Tree-based broadcasting in multihop radio networks. IEEE Trans. Comput. 36(10), 1209\u20131223 (1987)","journal-title":"IEEE Trans. Comput."},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Daum, S., Gilbert, S., Kuhn, F., Newport, C.C.: Broadcast in the ad hoc sinr model. In: Afek [1], pp. 358\u2013372 (2013)","DOI":"10.1007\/978-3-642-41527-2_25"},{"key":"16_CR4","unstructured":"Genova, K., Guliashki, V.: Linear integer programming methods and approaches\u2013a survey. J. Cybernetics Inf. Technol. 11(1) 56 (2011)"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Halld\u00f3rsson, M.M., Wattenhofer, R.: Wireless communication is in apx. In: Proceedings of the 36th International Colloquium on Automata, Languages and Programming, Part I. pp. 525\u2013536 (2009)","DOI":"10.1007\/978-3-642-02927-1_44"},{"key":"16_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4939-2864-4","volume-title":"Encyclopedia of Algorithms","year":"2016","unstructured":"Kao, M.-Y. (ed.): Encyclopedia of Algorithms. Springer, New York (2016). https:\/\/doi.org\/10.1007\/978-1-4939-2864-4"},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Jurdzinski, T., Kowalski, D.R., Rozanski, M., Stachowiak, G.: Distributed randomized broadcasting in wireless networks under the sinr model. In: Afek [1], pp. 373\u2013387 (2013)","DOI":"10.1007\/978-3-642-41527-2_26"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Jurdzinski, T., Kowalski, D.R., Rozanski, M., Stachowiak, G.: Deterministic digital clustering of wireless ad hoc networks. In: Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing, pp. 105\u2013114 (2018)","DOI":"10.1145\/3212734.3212752"},{"key":"16_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/978-3-642-40164-0_20","volume-title":"Fundamentals of Computation Theory","author":"T Jurdzinski","year":"2013","unstructured":"Jurdzinski, T., Kowalski, D.R., Stachowiak, G.: Distributed deterministic broadcasting in uniform-power ad hoc wireless networks. In: Gasieniec, L., Wolter, F. (eds.) FCT 2013. LNCS, vol. 8070, pp. 195\u2013209. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40164-0_20"},{"key":"16_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1007\/978-3-662-55751-8_25","volume-title":"Fundamentals of Computation Theory","author":"T Jurdzi\u0144ski","year":"2017","unstructured":"Jurdzi\u0144ski, T., R\u00f3\u017ca\u0144ski, M.: Deterministic oblivious local broadcast in the SINR model. In: Klasing, R., Zeitoun, M. (eds.) FCT 2017. LNCS, vol. 10472, pp. 312\u2013325. Springer, Heidelberg (2017). https:\/\/doi.org\/10.1007\/978-3-662-55751-8_25"},{"key":"16_CR11","doi-asserted-by":"publisher","unstructured":"Karp, R.M.: Reducibility among combinatorial problems. In: Complexity of Computer Computations, pp. 85\u2013103. Springer, Boston (1972). https:\/\/doi.org\/10.1007\/978-1-4684-2001-2_9","DOI":"10.1007\/978-1-4684-2001-2_9"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Kesselheim, T.: Dynamic packet scheduling in wireless networks. In: Proceedings of the 31st Annual ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing, pp. 281\u2013290 (2012)","DOI":"10.1145\/2332432.2332487"},{"key":"16_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/978-3-642-15763-9_16","volume-title":"Distributed Computing","author":"T Kesselheim","year":"2010","unstructured":"Kesselheim, T., V\u00f6cking, B.: Distributed contention resolution in wireless networks. In: Lynch, N.A., Shvartsman, A.A. (eds.) DISC 2010. LNCS, vol. 6343, pp. 163\u2013178. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-15763-9_16"},{"key":"16_CR14","unstructured":"Khachiyan, L.G.: A polynomial algorithm in linear programming. In: Doklady Akademii Nauk. vol. 244, pp. 1093\u20131096. Russian Academy of Sciences (1979)"},{"key":"16_CR15","unstructured":"Kowalski, D.R., Mosteiro, M.A., Rouse, T.: Dynamic multiple-message broadcast: bounding throughput in the affectance model. In: 10th ACM International Workshop on Foundations of Mobile Computing, FOMC 2014, Philadelphia, PA, USA, August 11, 2014, pp. 39\u201346 (2014)"},{"key":"16_CR16","unstructured":"Kowalski, D.R., Mosteiro, M.A., Zaki, K.: Dynamic multiple-message broadcast: Bounding throughput in the affectance model. CoRR abs\/1512.00540 (2015), http:\/\/arxiv.org\/abs\/1512.00540"},{"key":"16_CR17","doi-asserted-by":"publisher","unstructured":"Kumar, A., Manjunath, D., Kuri, J.: Chapter 2 - wireless communication: Concepts, techniques, models. In: Kumar, A., Manjunath, D., Kuri, J. (eds.) Wireless Networking, pp. 15\u201351. The Morgan Kaufmann Series in Networking, Morgan Kaufmann, Burlington (2008). https:\/\/doi.org\/10.1016\/B978-012374254-4.50003-X, http:\/\/www.sciencedirect.com\/science\/article\/pii\/B978012374254450003X","DOI":"10.1016\/B978-012374254-4.50003-X"},{"issue":"4","key":"16_CR18","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1007\/BF02579324","volume":"7","author":"P Raghavan","year":"1987","unstructured":"Raghavan, P., Tompson, C.D.: Randomized rounding: a technique for provably good algorithms and algorithmic proofs. Combinatorica 7(4), 365\u2013374 (1987)","journal-title":"Combinatorica"},{"key":"16_CR19","doi-asserted-by":"crossref","unstructured":"Scheideler, C., Richa, A.W., Santi, P.: An o(log n) dominating set protocol for wireless ad-hoc networks under the physical interference model. In: Proceedings of the 9th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 91\u2013100. ACM (2008)","DOI":"10.1145\/1374618.1374632"},{"key":"16_CR20","unstructured":"Vutukuru, M., Jamieson, K., Balakrishnan, H.: Harnessing exposed terminals in wireless networks. In: Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation, pp. 59\u201372 (2008)"}],"container-title":["Lecture Notes in Computer Science","Networked Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-67087-0_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,14]],"date-time":"2021-01-14T01:50:44Z","timestamp":1610589044000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-67087-0_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030670863","9783030670870"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-67087-0_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"14 January 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NETYS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Networked Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Marrakech","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Morocco","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 June 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 June 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"netys2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/netys.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"46","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.75","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually. Three invited papers are also included.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}