{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,5]],"date-time":"2023-10-05T02:22:34Z","timestamp":1696472554251},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2007,10,31]],"date-time":"2007-10-31T00:00:00Z","timestamp":1193788800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Algorithmica"],"published-print":{"date-parts":[[2007,12,6]]},"DOI":"10.1007\/s00453-007-9092-8","type":"journal-article","created":{"date-parts":[[2007,10,30]],"date-time":"2007-10-30T18:40:17Z","timestamp":1193769617000},"page":"412-446","source":"Crossref","is-referenced-by-count":11,"title":["Localized Techniques for Broadcasting in Wireless Sensor Networks"],"prefix":"10.1007","volume":"49","author":[{"given":"Devdatt","family":"Dubhashi","sequence":"first","affiliation":[]},{"given":"Olle","family":"H\u00e4ggstr\u00f6m","sequence":"additional","affiliation":[]},{"given":"Lorenzo","family":"Orecchia","sequence":"additional","affiliation":[]},{"given":"Alessandro","family":"Panconesi","sequence":"additional","affiliation":[]},{"given":"Chiara","family":"Petrioli","sequence":"additional","affiliation":[]},{"given":"Andrea","family":"Vitaletti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2007,10,31]]},"reference":[{"key":"9092_CR1","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-8155-0","volume-title":"Branching Processes","author":"S. Asmussen","year":"1983","unstructured":"Asmussen, S., Hering, H.: Branching Processes. Birkh\u00e4user, Boston (1983)"},{"key":"9092_CR2","doi-asserted-by":"crossref","unstructured":"Badishi, G., Keidar, I., Sasson, A.: Exposing and eliminating vulnerabilities to denial of service attacks in secure gossip-based multicast. IEEE Trans. Dependable Secur. Comput. 3(1), 45 (Jan. 2006)","DOI":"10.1109\/TDSC.2006.12"},{"key":"9092_CR3","unstructured":"Badishi, G., Keidar, I., Melamed, R.: Towards survivability of application-level multicast. In: Proceedings of S.O.S. Survivability: Obstacles and Solutions 2nd Bertinoro Workshop on Future Directions in Distributed Computing, http:\/\/www.cs.utexas.edu\/users\/lorenzo\/sos"},{"key":"9092_CR4","doi-asserted-by":"crossref","unstructured":"Basagni, S., Carosi, A., Petrioli, C.: Sensor-DMAC: dynamic topology control for wireless sensor network. In: Proc. of IEEE VTC 2004 Fall, Los Angles, California, September 26\u201329, 2004","DOI":"10.1109\/VETECF.2004.1400597"},{"key":"9092_CR5","doi-asserted-by":"crossref","unstructured":"Basagni, S., Chlamtac, I., Syrotiuk, V.R., Woodward, B.A.: A distance routing effect algorithm for mobility (DREAM). In: ACM\/IEEE Intl. Conference on Mobile Computing and Networking (MobiCom), 1998","DOI":"10.1145\/288235.288254"},{"key":"9092_CR6","doi-asserted-by":"crossref","unstructured":"Birman, K.P., Hayden, M., Ozkasap, O., Xiao, Z., Budiu, M., Minsky, Y.: Bimodal multicast. ACM Trans. Comput. Syst. 17(2), 1999","DOI":"10.1145\/312203.312207"},{"key":"9092_CR7","doi-asserted-by":"crossref","unstructured":"Eugster, P.T., Guerraoui, R., Handurukande, S.B., Kermarrec, A.-M.: Lightweight probabilistic broadcast. ACM Trans. Comput. Syst. 21(4), Nov. 2003","DOI":"10.1145\/945506.945507"},{"key":"9092_CR8","doi-asserted-by":"crossref","unstructured":"Eugster, P.T., Guerraoui, R., Kermarrec, A.-M., Massouli\u00e9, L.: Epidemic information dissemination in distributed systems. Computer 37(5), 60\u201367 (May 2004)","DOI":"10.1109\/MC.2004.1297243"},{"key":"9092_CR9","doi-asserted-by":"crossref","unstructured":"Ferraguto, F., Mambrini, G., Panconesi, A., Petrioli, C.: A new approach to device discovery and scatternet formation in bluetooth networks. In: Proc. of the 18th International Parallel and Distributed Processing Symposium (IPDPS\u201904), Santa Fe, New Mexico, April 26\u201330, 2004, pp. 221","DOI":"10.1109\/IPDPS.2004.1303259"},{"key":"9092_CR10","doi-asserted-by":"crossref","unstructured":"Gupta, I., Birman, K.P., van Renesse, R.: Fighting fire with fire: using randomized gossip to combat stochastic scalability limits. Qual. Reliab. Eng. Int. 18 (2002)","DOI":"10.1002\/qre.473"},{"key":"9092_CR11","doi-asserted-by":"crossref","unstructured":"Haas, Z., Halpern, J., Li, L.: Gossip-based ad hoc routing. In: Proc. of IEEE INfocom 2002, New York, June 23\u201327, 2002","DOI":"10.1109\/INFCOM.2002.1019424"},{"issue":"3","key":"9092_CR12","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1002\/(SICI)1098-2418(199610)9:3<295::AID-RSA3>3.0.CO;2-S","volume":"9","author":"O. H\u00e4ggstr\u00f6m","year":"1996","unstructured":"H\u00e4ggstr\u00f6m, O., Meester, R.: Nearest neighbor and hard sphere models in continuum percolation. Random Struct. Algorithms 9(3), 295\u2013315 (1996)","journal-title":"Random Struct. Algorithms"},{"key":"9092_CR13","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-51866-9","volume-title":"The Theory of Branching Processes","author":"T.E. Harris","year":"1963","unstructured":"Harris, T.E.: The Theory of Branching Processes. Springer, Berlin (1963)"},{"key":"9092_CR14","doi-asserted-by":"crossref","unstructured":"Hass, Z.J., Halpern, J.Y., Li, L.: Gossip-based ad hoc routing. In: IEEE Infocom, June 2002","DOI":"10.1109\/INFCOM.2002.1019424"},{"key":"9092_CR15","volume-title":"Ad Hoc Networking","author":"D. Johnson","year":"2001","unstructured":"Johnson, D., Maltz, D., Broch, J.: DSR: The dynamic source routing protocol for multi-hop wireless ad hoc networks. In: Perkins, C. (ed.) Ad Hoc Networking. Addison-Wesley, Reading (2001)"},{"key":"9092_CR16","doi-asserted-by":"crossref","unstructured":"Kermarrec, A.-M., Massouli\u00e9, L., Ganesh, A.J.: Probabilistic reliable dissemination in large-scale systems. IEEE Trans. Parallel Distrib. Syst. 14(3) (March 2003)","DOI":"10.1109\/TPDS.2003.1189583"},{"key":"9092_CR17","doi-asserted-by":"crossref","unstructured":"Ko, Y.B., Vaidya, N.H.: Location-aided routing (LAR) in mobile ad-hoc networks. In: ACM\/IEEE Intl. Conference on Mobile Computing and Networking (MobiCom), 1998","DOI":"10.1145\/288235.288252"},{"key":"9092_CR18","doi-asserted-by":"crossref","unstructured":"Li, X., Stojmenovic, I.: Partial Delaunay triangulation and degree limited localized bluetooth scatternet formation. In: Proc. of AD-HOC Networks and Wireless (ADHOC-NOW), Fields Institute, Toronto, CA, September 20\u201321, 2002, pp. 17\u201332","DOI":"10.1109\/TPDS.2004.1271184"},{"key":"9092_CR19","doi-asserted-by":"crossref","unstructured":"Lim, H., Kim, C.: Multicast tree construction and flooding in wireless ad hoc networks. In: Proc. of the ACM International Workshop on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWIM), Boston, MA, August 11, 2000, pp. 61\u201368","DOI":"10.1145\/346855.346865"},{"key":"9092_CR20","volume-title":"Lectures on the Coupling Method","author":"T. Lindvall","year":"1992","unstructured":"Lindvall, T.: Lectures on the Coupling Method. Wiley, New York (1992)"},{"key":"9092_CR21","doi-asserted-by":"crossref","unstructured":"Ni, S.Y., Tseng, Y.C., Chen, Y.S., Sheu, J.P.: The broadcast storm problem in a mobile ad hoc network. In: Proc. of the 5th annual ACM\/IEEE International Conference on Mobile Computing and networking (MobiCOM \u201999), Seattle, Washington, August 15\u201320, 1999, pp. 151\u2013162","DOI":"10.1145\/313451.313525"},{"key":"9092_CR22","unstructured":"Paruchuri, V., Durresi, A., Jain, R.: Optimal flooding protocol for routing in ad-hoc networks. Comput. Netw. (submitted)"},{"key":"9092_CR23","unstructured":"Peng, W., Lu, X.: On the reduction of broadcast redundancy in mobile ad hoc networks. In: Proc. of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2000), Boston, MA, August 11, 2000, pp. 129\u2013130"},{"key":"9092_CR24","doi-asserted-by":"crossref","unstructured":"Perkins, C.E., Roper, E.M.: Ad hoc on demand distance vector routing. In: IEEE Workshop on Mobile Systems and Applications, Feb. 1999","DOI":"10.1109\/MCSA.1999.749281"},{"key":"9092_CR25","unstructured":"Qayyum, A., Viennot, L., Laouiti, A.: Multipoint relaying: an efficient technique for flooding in mobile wireless networks. Technical Report 3898, INRIA, Rapport de recherche (2000)"},{"key":"9092_CR26","doi-asserted-by":"crossref","unstructured":"Schurgers, C., Tsiatsis, V., Ganeriwal, S., Srivastava, M.B.: Topology management for sensor networks: exploiting latency and density. In: Proc. of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc\u201902), Lausanne, Switzerland, June 9\u201311, 2002, pp. 135\u2013145","DOI":"10.1145\/513800.513817"},{"key":"9092_CR27","volume-title":"Ad Hoc Networking","author":"I. Stojmenovic","year":"2004","unstructured":"Stojmenovic, I., Wu, J.: Broadcasting and activity scheduling in ad hoc networks. In: Basagni, S., Conti, M., Giordano, S., Stojmenoviceds, I. (eds.) Ad Hoc Networking. IEEE Press, New York (2004)"},{"issue":"1","key":"9092_CR28","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/71.980024","volume":"13","author":"I. Stojmenovic","year":"2002","unstructured":"Stojmenovic, I., Seddigh, M., Zunic, J.: Dominating sets and neighbor elimination-based broadcasting algorithms in wireless networks. IEEE Trans. Parallel Distrib. Syst. 13(1), 14\u201325 (2002)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"9092_CR29","doi-asserted-by":"crossref","unstructured":"Vogels, W., van Renesse, R., Birman, K.: The power of epidemics: robust communication for large-scale distributed systems. ACM SIGCOMM Comput. Commun. Rev. 33(1) (January 2003)","DOI":"10.1145\/774763.774784"},{"key":"9092_CR30","doi-asserted-by":"crossref","unstructured":"Williams, B., Camp, T.: Comparison of broadcasting techniques for mobile ad hoc networks. In: Proc. of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2002), Lausanne, Switzerland, June 9\u201311, 2002, pp. 194\u2013205","DOI":"10.1145\/513800.513825"},{"key":"9092_CR31","unstructured":"Wu, J., Li, H.: On calculating connected dominating set for efficient routing in ad hoc wireless networks. In: Proc. of the 3rd ACM International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications (DIALM 1999), Seattle, Washington, August 20, 1999, pp.\u00a07\u201314"},{"key":"9092_CR32","doi-asserted-by":"crossref","unstructured":"Xu, Y., Heidemann, J., Estrin, D.: Geography-informed energy conservation for ad hoc routing. In: Proc. of the 7th Annual International Conference on Mobile Computing and Networking (Mobicom\u201901), Rome, Italy, July 16\u201321, 2001, pp. 70\u201384","DOI":"10.1145\/381677.381685"},{"issue":"2","key":"9092_CR33","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1023\/B:WINE.0000013081.09837.c0","volume":"10","author":"F. Xue","year":"2004","unstructured":"Xue, F., Kumar, P.R.: The number of neighbors needed for connectivity of wireless networks. Wirel. Netw. 10(2), 169\u2013181 (2004)","journal-title":"Wirel. Netw."},{"key":"9092_CR34","unstructured":"Yi, Y., Gerla, M., Kwon, T.J.: Efficient flooding in ad hoc networks: a comparative performance study. In: Proc. of the IEEE International Conference on Communications (ICC 2003), Anchorage, AK, May 11\u201315, 2003"}],"container-title":["Algorithmica"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00453-007-9092-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00453-007-9092-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00453-007-9092-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T13:45:00Z","timestamp":1559137500000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00453-007-9092-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,10,31]]},"references-count":34,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2007,12,6]]}},"alternative-id":["9092"],"URL":"https:\/\/doi.org\/10.1007\/s00453-007-9092-8","relation":{},"ISSN":["0178-4617","1432-0541"],"issn-type":[{"value":"0178-4617","type":"print"},{"value":"1432-0541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,10,31]]}}}