{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T05:09:33Z","timestamp":1725599373197},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642228742"},{"type":"electronic","value":"9783642228759"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22875-9_18","type":"book-chapter","created":{"date-parts":[[2011,8,4]],"date-time":"2011-08-04T03:29:18Z","timestamp":1312428558000},"page":"197-208","source":"Crossref","is-referenced-by-count":4,"title":["Analysing and Improving Energy Efficiency of Distributed Slotted Aloha"],"prefix":"10.1007","author":[{"given":"Haidi","family":"Yue","sequence":"first","affiliation":[]},{"given":"Henrik","family":"Bohnenkamp","sequence":"additional","affiliation":[]},{"given":"Malte","family":"Kampschulte","sequence":"additional","affiliation":[]},{"given":"Joost-Pieter","family":"Katoen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"7","key":"18_CR1","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/MC.2006.242","volume":"39","author":"T.R. Andel","year":"2006","unstructured":"Andel, T.R., Yasinac, A.: On the credibility of MANET simulations. IEEE Computer\u00a039(7), 48\u201354 (2006)","journal-title":"IEEE Computer"},{"key":"18_CR2","volume-title":"Proceedings of the 2003 International Conference on Dependable Systems and Networks","author":"H. Bohnenkamp","year":"2003","unstructured":"Bohnenkamp, H., Courtney, T., Daly, D., Derisavi, S., Hermanns, H., Katoen, J.-P., Vi Lam, V., Sanders, B.: On integrating the M\u00f6bius and MoDeST modeling tools. In: Proceedings of the 2003 International Conference on Dependable Systems and Networks, vol.\u00a04424. IEEE Computer Society Press, Los Alamitos (2003)"},{"issue":"10","key":"18_CR3","doi-asserted-by":"publisher","first-page":"812","DOI":"10.1109\/TSE.2006.104","volume":"32","author":"H. Bohnenkamp","year":"2006","unstructured":"Bohnenkamp, H., D\u2019Argenio, P.R., Hermanns, H., Katoen, J.-P.: MoDeST: A compositional modeling formalism for real-time and stochastic systems. IEEE Trans. on Software Engineering\u00a032(10), 812\u2013830 (2006)","journal-title":"IEEE Trans. on Software Engineering"},{"key":"18_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"500","DOI":"10.1007\/978-3-540-71209-1_38","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"H. Bohnenkamp","year":"2007","unstructured":"Bohnenkamp, H., Hermanns, H., Katoen, J.-P.: Motor: The MoDeST tool environment. In: Grumberg, O., Huth, M. (eds.) TACAS 2007. LNCS, vol.\u00a04424, pp. 500\u2013504. Springer, Heidelberg (2007)"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Cavin, D., Sasson, Y., Schiper, A.: On the accuracy of MANET simulators. In: ACM Workshop on Principles of Mobile Computing, pp. 38\u201343 (2002)","DOI":"10.1145\/584490.584499"},{"key":"18_CR6","unstructured":"Chen, Z., Khokhar, A.: Self organization and energy efficient TDMA MAC protocol by wake up for wireless sensor networks. In: Sensor and Ad Hoc Communications and Networks, pp. 335\u2013341 (2004)"},{"issue":"10","key":"18_CR7","doi-asserted-by":"publisher","first-page":"956","DOI":"10.1109\/TSE.2002.1041052","volume":"28","author":"D.D. Deavours","year":"2002","unstructured":"Deavours, D.D., Clark, G., Courtney, T., Daly, D., Derisavi, S., Doyle, J.M., Sanders, W.H., Webster, P.G.: The M\u00f6bius framework and its implementation. IEEE Trans. on Software Engineering\u00a028(10), 956\u2013969 (2002)","journal-title":"IEEE Trans. on Software Engineering"},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"Fangh\u00e4nel, A., Kesselheim, T., R\u00e4cke, H., V\u00f6cking, B.: Oblivious interference scheduling. In: ACM Symposium on Principles of Distributed Computing (PODC), pp. 220\u2013229 (2009)","DOI":"10.1145\/1582716.1582752"},{"key":"18_CR9","volume-title":"Performance Analysis of Local Computer Networks","author":"J.L. Hammond","year":"1986","unstructured":"Hammond, J.L., O\u2019Reilly, P.J.P.: Performance Analysis of Local Computer Networks. Addison-Wesley, Reading (1986)"},{"key":"18_CR10","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1109\/TII.2010.2051813","volume":"6","author":"M.R. Jongerden","year":"2010","unstructured":"Jongerden, M.R., Mereacre, A., Bohnenkamp, H., Haverkort, B.R., Katoen, J.-P.: Computing optimal schedules for battery usage in embedded systems. IEEE Trans. Industrial Informatics\u00a06, 276\u2013286 (2010)","journal-title":"IEEE Trans. Industrial Informatics"},{"key":"18_CR11","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1109\/18.825799","volume":"46","author":"P. Gupta","year":"2000","unstructured":"Gupta, P., Kumar, P.R.: The capacity of wireless networks. IEEE Transactions on Information Theory\u00a046, 338\u2013404 (2000)","journal-title":"IEEE Transactions on Information Theory"},{"key":"18_CR12","unstructured":"Rashid, R.A., Mohd, W., Ehsan, A., Embong, W., Zaharim, A., Fisal, N.: Development of energy aware TDMA-Based MAC protocol for wireless sensor network system. European J. of Scientific Research, 571\u2013578 (2009)"},{"key":"18_CR13","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1145\/1024916.1024920","volume":"5","author":"L.G. Roberts","year":"1975","unstructured":"Roberts, L.G.: Aloha packet system with and without slots and capture. ACM SIGCOMM Computer Communication Review\u00a05, 28\u201342 (1975)","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"18_CR14","unstructured":"Nordic Semiconductors. nRF2401 Single-chip 2.4GHz Transceiver Data Sheet (2002)"},{"key":"18_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/978-3-642-12104-3_10","volume-title":"Measurement, Modelling, and Evaluation of Computing Systems and Dependability and Fault Tolerance","author":"H. Yue","year":"2010","unstructured":"Yue, H., Bohnenkamp, H., Katoen, J.-P.: Analyzing energy consumption in a gossiping MAC protocol. In: M\u00fcller-Clostermann, B., Echtle, K., Rathgeb, E.P. (eds.) MMB&DFT 2010. LNCS, vol.\u00a05987, pp. 107\u2013119. Springer, Heidelberg (2010)"}],"container-title":["Lecture Notes in Computer Science","Smart Spaces and Next Generation Wired\/Wireless Networking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22875-9_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,13]],"date-time":"2019-06-13T19:17:18Z","timestamp":1560453438000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22875-9_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642228742","9783642228759"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22875-9_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}