{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T17:16:01Z","timestamp":1743009361451,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642417726"},{"type":"electronic","value":"9783642417733"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-41773-3_6","type":"book-chapter","created":{"date-parts":[[2013,10,7]],"date-time":"2013-10-07T00:18:46Z","timestamp":1381105126000},"page":"55-64","source":"Crossref","is-referenced-by-count":1,"title":["Optimal Packet Length in Delay-Tolerant Networks under Mobile-to-Mobile Fading Channel"],"prefix":"10.1007","author":[{"given":"Yuan","family":"Liu","sequence":"first","affiliation":[]},{"given":"Sihai","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Ming","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Wuyang","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Zhuo, X., Li, Q., Gao, W., Cao, G., Dai, Y.: Contact duration aware data replication in Delay Tolerant Networks. In: Proc. IEEE International Conference on Network Protocols (ICNP), October 17-20, pp. 236\u2013245 (2011)","DOI":"10.1109\/ICNP.2011.6089057"},{"issue":"4","key":"6_CR2","doi-asserted-by":"publisher","first-page":"1825","DOI":"10.1109\/TVT.2011.2131693","volume":"60","author":"S. Qin","year":"2011","unstructured":"Qin, S., Feng, G., Zhang, Y.: How the Contact-Probing Mechanism Affects the Transmission Capacity of Delay-Tolerant Networks. IEEE Transactions on Vehicular Technology\u00a060(4), 1825\u20131834 (2011)","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Lin, C.-S., Chang, W.-S., Chen, L.-J., Chou, C.-F.: Performance Study of Routing Schemes in Delay Tolerant Networks. In: Proc. 22nd International Conference on Advanced Information Networking and Applications, March 25-28, pp. 1702\u20131707 (2008)","DOI":"10.1109\/WAINA.2008.216"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Song, W., Krishnan, M.N., Zakhor, A.: Adaptive Packetization for Error-Prone Transmission over 802.11 WLANs with Hidden Terminals. In: Proc. IEEE MMSP 2009, Rio De Janeiro, Brazil (October 2009)","DOI":"10.1109\/MMSP.2009.5293269"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Jayaweera, S.K., Wimalajeewa, T.: Optimal sensor deployment for distributed detection in the presence of channel fading. In: Proc. IEEE MILCOM, November 16-19, pp. 1\u20137 (2008)","DOI":"10.1109\/MILCOM.2008.4753637"},{"issue":"4","key":"6_CR6","doi-asserted-by":"publisher","first-page":"826","DOI":"10.1109\/25.330143","volume":"43","author":"A.S. Akki","year":"1994","unstructured":"Akki, A.S.: Statistical Properties of Mobile-to-Mobile Land Communication Channel. IEEE Transactions on Vehicular Technology\u00a043(4), 826\u2013831 (1994)","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"1","key":"6_CR7","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1109\/TMC.2010.144","volume":"10","author":"X. Chen","year":"2011","unstructured":"Chen, X., Jones, H.M., Jayalath, D.: Channel-Aware Routing in MANETs with Route Handoff. IEEE Transactions on Mobile Computing\u00a010(1), 108\u2013121 (2011)","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"6_CR8","volume-title":"Stochastic Models in Mobile Ad Hoc Networks","author":"R. Groenvelt","year":"2005","unstructured":"Groenvelt, R.: Stochastic Models in Mobile Ad Hoc Networks. University of Nice, Sophia Antipolis (2005)"},{"issue":"12","key":"6_CR9","doi-asserted-by":"publisher","first-page":"923","DOI":"10.1109\/LCOMM.2009.12.091520","volume":"13","author":"M. Karaliopoulos","year":"2009","unstructured":"Karaliopoulos, M.: Assessing the Vulnerability of DTN Data Relaying Schemes to Node Selfishness. IEEE Communication Letters\u00a013(12), 923\u2013925 (2009)","journal-title":"IEEE Communication Letters"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Wireless Internet"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-41773-3_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T15:15:30Z","timestamp":1558106130000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-41773-3_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642417726","9783642417733"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-41773-3_6","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2013]]}}}