{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:46:29Z","timestamp":1742913989471,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642281686"},{"type":"electronic","value":"9783642281693"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-28169-3_3","type":"book-chapter","created":{"date-parts":[[2012,2,7]],"date-time":"2012-02-07T20:29:24Z","timestamp":1328646564000},"page":"33-48","source":"Crossref","is-referenced-by-count":0,"title":["Immune Size Approximation Algorithms in Ad\u00a0Hoc Radio Network"],"prefix":"10.1007","author":[{"given":"Marek","family":"Klonowski","sequence":"first","affiliation":[]},{"given":"Kamil","family":"Wolny","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/BF02259748","volume":"5","author":"R. Bar-Yehuda","year":"1991","unstructured":"Bar-Yehuda, R., Goldreich, O., Itai, A.: Efficient emulation of single-hop radio network with collision detection on multi-hop radio network with no collision detection. Distributed Computing\u00a05, 67\u201371 (1991)","journal-title":"Distributed Computing"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Bordim, J.L., Cui, J.T., Ishii, N., Nakano, K.: Doubly-logarithmic energy-efficient initialization protocols for single-hop radio networks. In: IPDPS. IEEE Computer Society (2002)","DOI":"10.1109\/IPDPS.2002.1016534"},{"key":"3_CR3","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1214\/aoms\/1177729330","volume":"23","author":"H. Chernoff","year":"1952","unstructured":"Chernoff, H.: A measure of asymptotic efficiency for tests of a hypothesis based on the sum of observations. Ann. Math. Stat.\u00a023, 493\u2013507 (1952)","journal-title":"Ann. Math. Stat."},{"key":"3_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1007\/978-3-642-10433-6_31","volume-title":"Cryptology and Network Security","author":"E. Dahmen","year":"2009","unstructured":"Dahmen, E., Krau\u00df, C.: Short Hash-Based Signatures for Wireless Sensor Networks. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol.\u00a05888, pp. 463\u2013476. Springer, Heidelberg (2009)"},{"key":"3_CR5","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/0304-3975(94)00281-M","volume":"144","author":"P. Flajolet","year":"1995","unstructured":"Flajolet, P., Sedgewick, R.: Mellin transforms and asymptotics: Finite differences and rice\u2019s integrals. Theoretical Computer Science\u00a0144, 101\u2013124 (1995)","journal-title":"Theoretical Computer Science"},{"issue":"2","key":"3_CR6","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1145\/23005.23006","volume":"34","author":"A.G. Greenberg","year":"1987","unstructured":"Greenberg, A.G., Flajolet, P., Ladner, R.E.: Estimating the multiplicities of conflicts to speed their resolution in multiple access channels. J. ACM\u00a034(2), 289\u2013325 (1987)","journal-title":"J. ACM"},{"key":"3_CR7","unstructured":"Hofri, M.: A feedback-less distributed broadcast algorithm for multihop radio networks with time-varying structure. In: Iazeolla, G., Courtois, P.-J., Boxma, O.J. (eds.) Computer Performance and Reliability, pp. 353\u2013368. North-Holland (1987)"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Jurdzinski, T., Kutylowski, M., Zatopianski, J.: Efficient algorithms for leader election in radio networks. In: PODC, pp. 51\u201357 (2002)","DOI":"10.1145\/571831.571833"},{"key":"3_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/3-540-45655-4_31","volume-title":"Computing and Combinatorics","author":"T. Jurdzi\u0144ski","year":"2002","unstructured":"Jurdzi\u0144ski, T., Kuty\u0142owski, M., Zatopianski, J.: Energy-Efficient Size Approximation of Radio Networks with No Collision Detection. In: Ibarra, O.H., Zhang, L. (eds.) COCOON 2002. LNCS, vol.\u00a02387, pp. 279\u2013289. Springer, Heidelberg (2002)"},{"key":"3_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/11750321_14","volume-title":"Theory and Applications of Models of Computation","author":"J. Kabarowski","year":"2006","unstructured":"Kabarowski, J., Kuty\u0142owski, M., Rutkowski, W.: Adversary Immune Size Approximation of Single-Hop Radio Networks. In: Cai, J.-Y., Cooper, S.B., Li, A. (eds.) TAMC 2006. LNCS, vol.\u00a03959, pp. 148\u2013158. Springer, Heidelberg (2006)"},{"key":"3_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/11611257_37","volume-title":"SOFSEM 2006: Theory and Practice of Computer Science","author":"J. Kuty\u0142owski","year":"2006","unstructured":"Kuty\u0142owski, J., Zag\u00f3rski, F.: Reliable Broadcasting Without Collision Detection. In: Wiedermann, J., Tel, G., Pokorn\u00fd, J., Bielikov\u00e1, M., \u0160tuller, J. (eds.) SOFSEM 2006. LNCS, vol.\u00a03831, pp. 389\u2013398. Springer, Heidelberg (2006)"},{"key":"3_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1007\/978-3-540-39658-1_37","volume-title":"Algorithms - ESA 2003","author":"M. Kuty\u0142owski","year":"2003","unstructured":"Kuty\u0142owski, M., Rutkowski, W.: Adversary Immune Leader Election in ad hoc Radio Networks. In: Di Battista, G., Zwick, U. (eds.) ESA 2003. LNCS, vol.\u00a02832, pp. 397\u2013408. Springer, Heidelberg (2003)"},{"key":"3_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1007\/3-540-48184-2_32","volume-title":"Advances in Cryptology - CRYPTO \u201987","author":"R.C. Merkle","year":"1988","unstructured":"Merkle, R.C.: A Digital Signature Based on a Conventional Encryption Function. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol.\u00a0293, pp. 369\u2013378. Springer, Heidelberg (1988)"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Motwani, R., Raghavan, P.: Randomized Algorithms. Cambridge University Press (1995)","DOI":"10.1017\/CBO9780511814075"},{"key":"3_CR15","first-page":"401","volume":"43","author":"W. Szpankowski","year":"1990","unstructured":"Szpankowski, W., Rego, V.: Yet another application of a binomial recurrence. order statistics\u00a043, 401\u2013410 (1990)","journal-title":"order statistics"},{"key":"3_CR16","unstructured":"Weisstein, E.W.: Weisstein, eric w. \u201dexponential integral.\u201d from mathworld\u2013a wolfram web resource, \n                    \n                      http:\/\/mathworld.wolfram.com\/exponentialintegral.html"},{"key":"3_CR17","unstructured":"Weisstein, E.W.: Weisstein, eric w. \u201dshi.\u201d from mathworld\u2013a wolfram web resource, \n                    \n                      http:\/\/mathworld.wolfram.com\/shi.html"},{"issue":"2","key":"3_CR18","doi-asserted-by":"publisher","first-page":"468","DOI":"10.1137\/0215032","volume":"15","author":"D.E. Willard","year":"1986","unstructured":"Willard, D.E.: Log-logarithmic selection resolution protocols in a multiple access channel. SIAM J. Comput.\u00a015(2), 468\u2013477 (1986)","journal-title":"SIAM J. Comput."}],"container-title":["Lecture Notes in Computer Science","Wireless Sensor Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-28169-3_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,27]],"date-time":"2019-04-27T05:41:42Z","timestamp":1556343702000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-28169-3_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642281686","9783642281693"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-28169-3_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}