{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,12]],"date-time":"2023-09-12T05:08:08Z","timestamp":1694495288490},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2011,8,31]],"date-time":"2011-08-31T00:00:00Z","timestamp":1314748800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2011,11]]},"DOI":"10.1007\/s11276-011-0380-5","type":"journal-article","created":{"date-parts":[[2011,8,30]],"date-time":"2011-08-30T14:44:56Z","timestamp":1314715496000},"page":"1821-1832","source":"Crossref","is-referenced-by-count":4,"title":["Proxy-assisted routing for efficient data transmission in mobile ad hoc networks"],"prefix":"10.1007","volume":"17","author":[{"given":"May Zin","family":"Oo","sequence":"first","affiliation":[]},{"given":"Mazliza","family":"Othman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,8,31]]},"reference":[{"key":"380_CR1","doi-asserted-by":"crossref","unstructured":"Perkins, C. E., & Watson, T. J. (1994). Highly dynamic destination sequenced distance vector routing (DSDV) for mobile computers. In Proceedings of ACM communications, architectures, protocols and applications (Vol. 24, pp. 234\u2013244).","DOI":"10.1145\/190314.190336"},{"key":"380_CR2","doi-asserted-by":"crossref","unstructured":"Perkins, C., & Das., D. (2003). Ad hoc on-demand distance vector routing (AODV). Request for Comments 3561.","DOI":"10.17487\/rfc3561"},{"key":"380_CR3","doi-asserted-by":"crossref","unstructured":"Johnson, D., Hu, Y., & Maltz, D. (2007). The dynamic source routing protocol (DSR) for mobile ad hoc networks for IPv4. Request for comment 4728.","DOI":"10.17487\/rfc4728"},{"key":"380_CR4","doi-asserted-by":"crossref","unstructured":"Clausen, T., & Jacquet, P. (2003). Optimized link state routing protocol (OLSR). Request for Comments 3626.","DOI":"10.17487\/rfc3626"},{"issue":"7","key":"380_CR5","doi-asserted-by":"crossref","first-page":"969","DOI":"10.1002\/wcm.432","volume":"6","author":"MK Marina","year":"2006","unstructured":"Marina, M. K., & Das, S. R. (2006). Ad hoc on-demand multipath distance vector routing. Wireless Communications and Mobile Computing, 6(7), 969\u2013988.","journal-title":"Wireless Communications and Mobile Computing"},{"key":"380_CR6","unstructured":"Dimitri, P. G., & Robert, G. G. (1987). Distributed asynchronous bellman-ford algorithm. In Data networks (pp. 325\u2013333)."},{"key":"380_CR7","doi-asserted-by":"crossref","unstructured":"Royer, E. M., & Perkins., C. E. (1999). Multicast operation of the ad hoc on-demand distance vector routing protocol. In The 5th ACM\/IEEE International Conference on Mobile Computing and Networking (MobiCom) (pp. 207\u2013218).","DOI":"10.1145\/313451.313538"},{"key":"380_CR8","unstructured":"Lee, S. J., Gerla, M., & Chiang, C. C. (1999). On-demand multicast routing protocol. In Wireless communications and networking (pp. 1298\u20131302)."},{"key":"380_CR9","doi-asserted-by":"crossref","first-page":"1409","DOI":"10.1016\/j.comnet.2009.01.007","volume":"53","author":"O Ozkasap","year":"2009","unstructured":"Ozkasap, O., Genc, Z., & Atsan, E. (2009). Epidemic-based Reliable and Adaptive Multicast for MANETs. Computer Networks, 53, 1409\u20131430.","journal-title":"Computer Networks"},{"key":"380_CR10","unstructured":"Detti, A., & Blefari-Melazzi, N. Overlay (2008). Boruvka-based, ad-hoc multicast protocol: Description and performance analysis In Wireless communications and mobile computing (Vol. 8, pp. 5545\u20135552)."},{"key":"380_CR11","doi-asserted-by":"crossref","first-page":"1454","DOI":"10.1109\/TMC.2009.77","volume":"8","author":"PC Hsiu","year":"2009","unstructured":"Hsiu, P. C., & Kuo, T. W. (2009). A maximum-residual multicast protocol for large-scale mobile ad hoc networks. IEEE Transactions on Mobile Computing, 8, 1454\u20131468.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"380_CR12","unstructured":"Chiang, C.-C. (1997). Routing in clustered multihop mobile wireless networks with fading channel. In IEEE SICON (pp. 197\u2013211)."},{"key":"380_CR13","unstructured":"Jiang, M., Li, J., & Tay, Y. C. (1999). Cluster based routing protocol (CBRP) functional specification. http:\/\/tools.ietf.org\/html\/draft-ietf-manet-cbrp-spec ."},{"key":"380_CR14","unstructured":"Choi, W., & Das, S. K. (2002). A proxy based indirect routing scheme for ad hoc wireless networks In 21st Annual Joint Conference of the IEEE Computer and Communications Societies (pp. 1395\u20131404)."},{"key":"380_CR15","volume-title":"proxy-AODV: Extension of AODV for partially connected ad hoc networks","author":"A Tiwari","year":"2006","unstructured":"Tiwari, A. (2006). proxy-AODV: Extension of AODV for partially connected ad hoc networks. Bombay: Indian Institute of Technology Bombay."},{"key":"380_CR16","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1016\/j.adhoc.2008.02.003","volume":"7","author":"J Boice","year":"2009","unstructured":"Boice, J., Garcia-Luna-Aceves, J. J., & Obraczka, K. (2009). Combining on-demand and opportunistic routing for intermittently connected networks. Journal of Ad Hoc Networks, 7, 201\u2013218.","journal-title":"Journal of Ad Hoc Networks"},{"key":"380_CR17","unstructured":"NS-2 new trace format explanation. http:\/\/www.isi.edu\/nsnam\/ns\/doc\/node187.html ."},{"key":"380_CR18","unstructured":"McCanne, S., & Floyd, S. VINT Group, Network Simulator Ns-2. Source code: http:\/\/www.isi.edu\/nsnam\/ns ."}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-011-0380-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11276-011-0380-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-011-0380-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,14]],"date-time":"2019-06-14T16:11:36Z","timestamp":1560528696000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11276-011-0380-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,8,31]]},"references-count":18,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2011,11]]}},"alternative-id":["380"],"URL":"https:\/\/doi.org\/10.1007\/s11276-011-0380-5","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,8,31]]}}}