{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T13:09:50Z","timestamp":1773148190368,"version":"3.50.1"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2006,3,23]],"date-time":"2006-03-23T00:00:00Z","timestamp":1143072000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int J Wireless Inf Networks"],"published-print":{"date-parts":[[2006,4]]},"DOI":"10.1007\/s10776-006-0027-0","type":"journal-article","created":{"date-parts":[[2006,3,22]],"date-time":"2006-03-22T15:11:29Z","timestamp":1143040289000},"page":"127-140","source":"Crossref","is-referenced-by-count":48,"title":["Performance Analysis of Adjusted Probabilistic Broadcasting in Mobile Ad Hoc Networks"],"prefix":"10.1007","volume":"13","author":[{"given":"M.","family":"Bani-Yassein","sequence":"first","affiliation":[]},{"given":"M.","family":"Ould-Khaoua","sequence":"additional","affiliation":[]},{"given":"L. M.","family":"Mackenzie","sequence":"additional","affiliation":[]},{"given":"S.","family":"Papanastasiou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,3,23]]},"reference":[{"key":"27_CR1","volume-title":"Ad hoc Mobile Wireless Networks: Protocols and Systems","author":"C.-K. Toh","year":"2002","unstructured":"Toh C-K. (2002). Ad hoc Mobile Wireless Networks: Protocols and Systems. Prentice-Hall, New York"},{"key":"27_CR2","unstructured":"W. Peng and X.C. Lu, On the reduction of broadcast redundancy in mobile ad hoc networks, In Proc. Workshop on Mobile and Ad Hoc Networking and Computing (MobiHoc\u20192000), Boston, Massachusetts, USA, pp. 129\u2013130, 2000"},{"key":"27_CR3","volume-title":"Handbook of Wireless Networks and Mobile Computing","year":"2002","unstructured":"Stojmenovic I. (ed) (2002). Handbook of Wireless Networks and Mobile Computing. Wiley, New York"},{"key":"27_CR4","doi-asserted-by":"crossref","unstructured":"B. Williams and T. Camp, Comparison of broadcasting techniques for mobile ad hoc networks. In Proc. ACM Symposium on Mobile Ad Hoc Networking & Computing (MOBIHOC 2002), pp. 194\u2013205, 2002","DOI":"10.1145\/513800.513825"},{"issue":"2","key":"27_CR5","first-page":"153","volume":"8","author":"S.-Y. Ni","year":"2002","unstructured":"Ni S.-Y., Tseng Y.-C., Chen Y.-S., Sheu J.-P. (2002). The broadcast storm problem in a mobile ad hoc network. Wireless Networks 8(2):153\u2013167","journal-title":"Wireless Networks"},{"key":"27_CR6","unstructured":"S.-Y. Ni, Y.-C. Tseng, Y.-S. Chen, and J.-P. Sheu, The broadcast storm problem in a mobile ad hoc network, Proc. Mobicom\u201999, 1999"},{"issue":"4","key":"27_CR7","doi-asserted-by":"crossref","first-page":"374","DOI":"10.1007\/PL00009201","volume":"20","author":"S. Guha","year":"1998","unstructured":"Guha S., Khuller S. (1998). Approximation algorithms for connected dominating sets. Algorithmics 20(4):374\u2013387","journal-title":"Algorithmics"},{"key":"27_CR8","doi-asserted-by":"crossref","unstructured":"C. Perkins and E. M. Royer, Ad-hoc on-demand distance vector routing. In Proc. 2nd IEEE Workshop on Mobile Computing Systems and Applications (WMCSA\u2019 99), pp. 90\u2013100, 1999","DOI":"10.1109\/MCSA.1999.749281"},{"key":"27_CR9","unstructured":"V. D. Park and M. S. Corson, Temporally-ordered routing algorithm (TORA) version 1: Functional specification. Internet Draft, 1997"},{"issue":"8","key":"27_CR10","doi-asserted-by":"crossref","first-page":"1395","DOI":"10.1109\/49.779922","volume":"17","author":"M. R. Pearlman","year":"1999","unstructured":"Pearlman M. R., Haas Z. J. (1999). Determining the optimal configuration of the zone routing protocol. IEEE Journal on Selected Areas in Communications 17(8):1395\u20131414","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"27_CR11","doi-asserted-by":"crossref","unstructured":"C. Ho, K. Obraczka, G. Tsudik, and K. Viswanath, Flooding for reliable multicast in multihop ad hoc networks, In Proc. ACM DIALM\u201999, pp. 64\u201371, 1999","DOI":"10.1145\/313239.313291"},{"key":"27_CR12","doi-asserted-by":"crossref","unstructured":"Y. Sasson, D. Cavin, and A. Schiper, Probabilistic broadcast for flooding in wireless mobile ad hoc networks, In Proc. IEEE Wireless Communications & Networking Conference (WCNC 2003), pp. 1124\u20131130, March 2003","DOI":"10.1109\/WCNC.2003.1200529"},{"issue":"5","key":"27_CR13","doi-asserted-by":"crossref","first-page":"545","DOI":"10.1109\/TC.2003.1197122","volume":"52","author":"Y.-C. Tseng","year":"2003","unstructured":"Y.-C. Tseng, S.-Y. Ni, and E.-Y. Shih, Adaptive approaches to relieving broadcast storm in a wireless multihop mobile ad hoc network, IEEE Transactions Computers, Vol. 52, No. 5, 2003, pp. 545\u2013557","journal-title":"IEEE Transactions Computers"},{"issue":"1\u20134","key":"27_CR14","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1023\/A:1023495021643","volume":"22","author":"J. Cartigny","year":"2003","unstructured":"Cartigny J., Simplot D. (2003). Border node retransmission based probabilistic broadcast protocols in ad-hoc networks. Telecommunication Systems 22(1\u20134):189\u2013204","journal-title":"Telecommunication Systems"},{"key":"27_CR15","doi-asserted-by":"crossref","unstructured":"T. Camp, J. Boleng, and V. Davies, A survey of mobility models for ad hoc network research, Wireless Communication & Mobile Computing, Special issue on Mobile Ad Hoc Networking: Research, Trends and Applications, Vol. 2, No. 5, pp. 483\u2013502, 2002","DOI":"10.1002\/wcm.72"},{"issue":"1","key":"27_CR16","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1109\/TMC.2004.1261820","volume":"3","author":"W. Navidi","year":"2004","unstructured":"Navidi W. and Camp T. (2004). Stationary distributions for the random waypoint mobility model. IEEE Transactions on Mobile Computing 3(1): 99\u2013108","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"2","key":"27_CR17","first-page":"155","volume":"3","author":"J. Wu","year":"2003","unstructured":"Wu J., Lou W. (2003). Forward-node-set-based broadcast in clustered mobile ad hoc networks, special issue on Algorithmic, Geometric, Graph, Combinatorial, and Vectors, Wireless. Networks and Mobile Computing 3(2):155\u2013173","journal-title":"Networks and Mobile Computing"},{"key":"27_CR18","doi-asserted-by":"crossref","unstructured":"A. Qayyum, L. Viennot, and A. Laouiti, Multipoint relaying: an efficient technique for flooding in mobile wireless networks, Proc. Hawaii Int. Conf. System Sciences, 2002","DOI":"10.1109\/HICSS.2002.994521"},{"issue":"2","key":"27_CR19","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1109\/TMC.2002.1038347","volume":"1","author":"W. Lou","year":"2002","unstructured":"Lou W., Wu J. (2002). On reducing broadcast redundancy in mobile ad hoc networks. IEEE Transactions Mobile Computing 1(2):111\u2013123","journal-title":"IEEE Transactions Mobile Computing"},{"key":"27_CR20","doi-asserted-by":"crossref","unstructured":"J. Wu and F. Dai, Broadcasting in ad hoc networks based on self-pruning, In Proc. Annual Joint Conference IEEE Computer and Communications Societies (INFOCOM\u2019 2003), Vol. 3, pp. 2240\u20132250, 2003","DOI":"10.1109\/INFCOM.2003.1209244"},{"key":"27_CR21","unstructured":"The Network Simulator ns-2, http:\/\/www.isi.edu\/nsnam\/ns\/ns-man.html"}],"container-title":["International Journal of Wireless Information Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10776-006-0027-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10776-006-0027-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10776-006-0027-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,8]],"date-time":"2025-01-08T03:21:15Z","timestamp":1736306475000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10776-006-0027-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,3,23]]},"references-count":21,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2006,4]]}},"alternative-id":["27"],"URL":"https:\/\/doi.org\/10.1007\/s10776-006-0027-0","relation":{},"ISSN":["1068-9605","1572-8129"],"issn-type":[{"value":"1068-9605","type":"print"},{"value":"1572-8129","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,3,23]]}}}