{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T23:58:58Z","timestamp":1775087938799,"version":"3.50.1"},"reference-count":298,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[2003,7,1]],"date-time":"2003-07-01T00:00:00Z","timestamp":1057017600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Ad Hoc Networks"],"published-print":{"date-parts":[[2003,7]]},"DOI":"10.1016\/s1570-8705(03)00013-1","type":"journal-article","created":{"date-parts":[[2003,8,7]],"date-time":"2003-08-07T21:49:34Z","timestamp":1060292974000},"page":"13-64","source":"Crossref","is-referenced-by-count":774,"title":["Mobile ad hoc networking: imperatives and challenges"],"prefix":"10.1016","volume":"1","author":[{"given":"Imrich","family":"Chlamtac","sequence":"first","affiliation":[]},{"given":"Marco","family":"Conti","sequence":"additional","affiliation":[]},{"given":"Jennifer J.-N.","family":"Liu","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S1570-8705(03)00013-1_BIB1","unstructured":"J. Ahola, Ambient Intelligence, ERCIM (European Research Consortium for Information and Mathematics) NEWS, N. 47, October 2001"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB2","doi-asserted-by":"crossref","unstructured":"A. Ahuja et al., Performance of TCP over different routing protocols in mobile ad-hoc networks, in: Proceedings of IEEE Vehicular Technology Conference (VTC 2000), Tokyo, Japan, May 2000","DOI":"10.1109\/VETECS.2000.851686"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB3","doi-asserted-by":"crossref","unstructured":"G. Anastasi, E. Borgia, M. Conti, E. Gregori, IEEE 802.11 ad hoc networks: performance measurements, in: Proceedings of the Workshop on Mobile and Wireless Networks (MWN 2003) in conjunction with ICDCS 2003, May 19, 2003","DOI":"10.1109\/ICDCSW.2003.1203643"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB4","series-title":"Ad hoc Networking","article-title":"IEEE 802.11 ad hoc networks: protocols, performance and open issues","author":"Anastasi","year":"2003"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB5","doi-asserted-by":"crossref","unstructured":"G. Anastasi, M. Conti, E. Gregori, A. Passarella, A power saving architecture for web access from mobile computers, in: Proceedings of the Networking 2002, Lecture Notes in Computer Science, vol. 2345, Springer, Berlin, 2002, pp. 240\u2013251","DOI":"10.1007\/3-540-47906-6_19"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB6","doi-asserted-by":"crossref","unstructured":"G. Anastasi, M. Conti, E. Gregori, A. Passarella, Balancing energy saving and QoS in the mobile internet: an application-independent approach, in: Proceedings of the 36th Hawaii International Conference on System Sciences, HICSS-36, 2003, pp. 305\u2013314","DOI":"10.1109\/HICSS.2003.1174855"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB7","unstructured":"G.-S. Ahn, A.T. Campbell, S.-B. Lee, X. Zhang, \u201cINSIGNIA,\u201d Internet Draft, draft-ietf-manet-insignia-01.txt, October 1999"},{"issue":"1","key":"10.1016\/S1570-8705(03)00013-1_BIB8","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1093\/comjnl\/46.1.3","article-title":"A power saving network architecture for accessing the internet from mobile computers: design, implementation and measurements","volume":"46","author":"Anastasi","year":"2003","journal-title":"The Computer Journal"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB9","doi-asserted-by":"crossref","unstructured":"E. Anceaume, A.K. Datta, M. Gradinariu, G. Simon, Publish\/subscribe scheme for mobile networks, in: Proceedings of the ACM Workshop on Principles of Mobile Computing 2002, pp. 74\u201381","DOI":"10.1145\/584490.584505"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB10","doi-asserted-by":"crossref","unstructured":"A. Acharya, A. Misra, S. Bensal, A label-switching packet forwarding architecture for multi-hop wireless LANs, in: M. Conti, D. Raychaudhuri (Eds.), Proceedings of the ACM Workshop on Mobile Multimedia (WoWMoM 2002), Atlanta, GA, September 28, 2002","DOI":"10.1145\/570790.570797"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB11","unstructured":"APE: Ad hoc Protocol Evaluation testbed, Department of Computer Systems at Uppsala, Sweden. Available from <http:\/\/apetestbed.sourceforge.net\/>"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB12","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1016\/S1389-1286(01)00302-4","article-title":"Wireless sensor networks: a survey","volume":"38","author":"Akyildiz","year":"2002","journal-title":"Computer Networks"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB13","doi-asserted-by":"crossref","unstructured":"S. Basagni, Distributed and mobility-adaptive clustering for multimedia support in multi-hop wireless networks, in: Proceedings of the IEEE Vehicular Technology Conference (VTC) 1999, Amsterdam, The Netherlands, September 19\u201322, 1999","DOI":"10.1109\/VETECF.1999.798457"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB14","doi-asserted-by":"crossref","unstructured":"C. Bettstetter, Smooth is better than sharp: a random mobility model for simulation of wireless networks, in: Proceedings of the ACM Workshop on Modeling, Analysis and Simulation of Wireless and Mobile Systems, 2001, pp. 19\u201327","DOI":"10.1145\/381591.381600"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB15","doi-asserted-by":"crossref","unstructured":"C. Bisdikian, An overview of the Bluetooth wireless technology, IEEE Communication Magazine, December 2001","DOI":"10.1109\/35.968817"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB16","doi-asserted-by":"crossref","unstructured":"S. Buchegger, J.Y. Le Boudec, Performance analysis of the CONFIDANT protocol, in: Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), June 2002, pp. 226\u2013236","DOI":"10.1145\/513800.513828"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB17","unstructured":"S. Buchegger, J.Y. Le Boudec, The effect of rumor spreading in reputation systems for mobile ad-hoc networks, in: Proceedings of the First Workshop on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt \u201903), Sophie-Antipolis, March 2003, pp. 131\u2013140"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB18","series-title":"Handbook of Ad Hoc Networks","article-title":"Unicast routing techniques for mobile ad hoc networks","author":"Beraldi","year":"2003"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB19","series-title":"Ad Hoc Networking","article-title":"Simulation and modeling of wireless, mobile and ad hoc networks","author":"Boukerche","year":"2003"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB20","doi-asserted-by":"crossref","DOI":"10.1109\/12.580423","article-title":"Implementation and performance evaluation of indirect TCP","volume":"46","author":"Bakre","year":"1997","journal-title":"IEEE Transactions on Computers"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB21","doi-asserted-by":"crossref","unstructured":"L. Blazevic, L. Buttyan, S. Capkun, S. Giordano, J.-P. Hubaux, J.-Y. Le Boudec, Self-organization in mobile ad hoc networks: the approach of terminodes, IEEE Communication Magazine, June 2001, pp. 166\u2013175","DOI":"10.1109\/35.925685"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB22","series-title":"Ad Hoc Networking","article-title":"Scatternet formation in Bluetooth networks","author":"Basagni","year":"2003"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB23","doi-asserted-by":"crossref","unstructured":"S. Basagni, R. Bruno, C. Petrioli, A performance comparison of scatternet formation protocols for networks of Bluetooth devices, in: Proceedings of the IEEE International Conference on Pervasive Computing and Communications (PerCom 2003), Forth Worth, TX, March 23\u201326, 2003","DOI":"10.1109\/PERCOM.2003.1192758"},{"issue":"3","key":"10.1016\/S1570-8705(03)00013-1_BIB24","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1023\/A:1011418531276","article-title":"A distributed mechanism for power saving in IEEE 802.11 wireless LANs","volume":"6","author":"Bononi","year":"2001","journal-title":"ACM\/Kluwer Mobile Networks and Applications Journal"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB25","doi-asserted-by":"crossref","unstructured":"R. Bruno, M. Conti, E. Gregori, Wireless access to internet via Bluetooth: performance evaluation of the EDC scheduling algorithm, in: Proceedings First ACM Wireless Mobile Internet Workshop, July 2001","DOI":"10.1145\/381472.381568"},{"issue":"1","key":"10.1016\/S1570-8705(03)00013-1_BIB26","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1109\/TMC.2002.1011056","article-title":"Optimization of efficiency and energy consumption in p-persistent CSMA-based wireless LANs","volume":"1","author":"Bruno","year":"2002","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"2","key":"10.1016\/S1570-8705(03)00013-1_BIB27","doi-asserted-by":"crossref","DOI":"10.1023\/A:1013989524865","article-title":"Bluetooth: architecture, protocols and scheduling algorithms","volume":"5","author":"Bruno","year":"2002","journal-title":"Cluster Computing Journal"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB28","doi-asserted-by":"crossref","unstructured":"J. Li, C. Blake, D. De Couto, H. Lee, R. Morris, Capacity of wireless ad hoc wireless networks, in: Proceedings of the Seventh ACM International Conference on Mobile Computing and Networking (MOBICOM 2001), Rome, Italy, July 16\u201321, 2001, pp. 61\u201369","DOI":"10.1145\/381677.381684"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB29","doi-asserted-by":"crossref","unstructured":"S. Basagni, I. Chlamtac, A.V.R. Syrotiuk, Location aware one-to-many communication in mobile multi-hop wireless networks, in: Proceedings of the IEEE Vehicular Technology (VTC), Tokyo, Japan, May 2000","DOI":"10.1109\/VETECS.2000.851464"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB30","doi-asserted-by":"crossref","unstructured":"S. Basagni, I. Chlamtac, V. Syrotiuk, B. Woodward, A distance routing effect algorithm for mobility (DREAM), in: Proceedings of The Fourth Annual ACM\/IEEE International Conference on Mobile Computing and Networking (MOBICOM \u201998), Dallas, TX, USA, October 25\u201330, 1998","DOI":"10.1145\/288235.288254"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB31","doi-asserted-by":"crossref","unstructured":"V. Bharghavan, A. Demers, S. Shenker, L. Zhang, MACAW: a medium access protocol for wireless LANs, in: Proceedings of SIGCOMM \u201994, 1994, pp. 212\u2013225","DOI":"10.1145\/190809.190334"},{"issue":"1","key":"10.1016\/S1570-8705(03)00013-1_BIB32","doi-asserted-by":"crossref","DOI":"10.1109\/JSAC.1984.1146043","article-title":"The design and simulation of a mobile radio network with distributed control","volume":"2","author":"Baker","year":"1984","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB33","doi-asserted-by":"crossref","unstructured":"G. Bianchi, L. Fratta, M. Oliveri, Performance evaluation and enhancement of the CSMA\/CA MAC protocol for 802.11 wireless LANs, in: Proceedings of PIMRC 1996, Taipei, Taiwan, October 1996, pp. 392\u2013396","DOI":"10.1109\/PIMRC.1996.567423"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB34","doi-asserted-by":"crossref","unstructured":"Lichun Bao, J.J. Garcia-Luna-Aceves, Transmission scheduling in ad hoc networks with directional antennas, in: Proceedings of the Eighth ACM International Conference on Mobile Computing and Networking (MOBICOM 2002), Atlanta, GA, September 23\u201328, 2002","DOI":"10.1145\/570645.570652"},{"issue":"4","key":"10.1016\/S1570-8705(03)00013-1_BIB35","article-title":"Report on a working session on security in wireless ad hoc networks","volume":"6","author":"Buttyan","year":"2002","journal-title":"Mobile Computing and Communications Review"},{"issue":"5","key":"10.1016\/S1570-8705(03)00013-1_BIB36","article-title":"Stimulating cooperation in self-organizing mobile ad hoc networks","volume":"8","author":"Buttyan","year":"2003","journal-title":"ACM\/Kluwer (MONET), Special Issue on Mobile Ad Hoc Networks"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB37","unstructured":"C. Bettstetter, O. Krause, On border effects in modeling and simulation of wireless ad hoc networks, in: Proceedings of the 3rd IEEE International Conference on Mobile and Wireless Communication Networks (MWCMN), 2001"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB38","doi-asserted-by":"crossref","unstructured":"B. Li, QoS-aware adaptive services in mobile ad-hoc networks, in: Proceedings of the Ninth IEEE International Workshop on Quality of Service (IWQoS 2001), Lecture Notes in Computer Science, vol. 2092, Springer, Berlin, 2001, pp. 251\u2013268","DOI":"10.1007\/3-540-45512-4_18"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB39","unstructured":"Web site of the Bluetooth Special Interest Group: http:\/\/www.bluetooth.com\/"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB40","unstructured":"Specification of the Bluetooth System, Version 1.1, February 2001"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB41","unstructured":"J. Broch, D.A. Maltz, D.B. Johnson, Quantitative lessons from a full-scale multi-hop wireless ad hoc network testbed, in: Proceedings of the IEEE Wireless Communications and Network Conference 2000 (WCNC 2000)"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB42","doi-asserted-by":"crossref","unstructured":"J. Broch, D.A. Maltz, D.B. Johnson, Y.-C. Hu, J. Jetcheva, A performance comparison of multi-hop wireless ad hoc network routing protocols, in: Proceedings of the Fourth Annual ACM\/IEEE International Conference on Mobile Computing and Networking (MOBICOM \u201998), Dallas, TX, October 25\u201330, 1998","DOI":"10.1145\/288235.288256"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB43","unstructured":"B. Bellur, R.G. Ogier, F.L. Templin, Topology broadcast based on reverse-path forwarding (TBRPF), IETF Internet Draft, draft-ietf-manet-tbrpf-01.txt, March 2001"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB44","doi-asserted-by":"crossref","unstructured":"H. Balakrishnan, V. Padmanabhan, S. Seshan, R. Katz, A comparison of mechanisms for improving TCP performance over wireless links, in: Proceedings of the ACM SIGCOMM, Stanford, CA, August 1996","DOI":"10.1145\/248156.248179"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB45","doi-asserted-by":"crossref","unstructured":"D.M. Blough, G. Resta, P. Santi, A statistical analysis of the long-run node spatial distribution in mobile ad hoc networks, in: Proceedings of the ACM MSWiM 02, Atlanta, GA, September 2002","DOI":"10.1145\/570758.570765"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB46","doi-asserted-by":"crossref","unstructured":"K. Brown, S. Singh, M-TCP: TCP for Mobile cellular Networks, in: Proceedings of the ACM SIGCOMM Computer Communication Review, 1997, pp. 19\u201343","DOI":"10.1145\/269790.269794"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB47","doi-asserted-by":"crossref","unstructured":"H. Balakrishnan, S. Seshan, E. Amir, R. Katz, Improving TCP\/IP performance over wireless networks, in: Proceedings of the First Annual International Conference on Mobile Computing and Networking (MOBICOM \u201995), Berkeley, CA, November 13\u201315, 1995","DOI":"10.1145\/215530.215544"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB48","series-title":"Handbook of Ad Hoc Networks","article-title":"Body, personal, and local wireless ad hoc networks","author":"Conti","year":"2003"},{"issue":"1","key":"10.1016\/S1570-8705(03)00013-1_BIB49","doi-asserted-by":"crossref","DOI":"10.1109\/TMC.2003.1195151","article-title":"Self-organized public-key management for mobile ad hoc networks","volume":"2","author":"Capkun","year":"2003","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"6","key":"10.1016\/S1570-8705(03)00013-1_BIB50","doi-asserted-by":"crossref","first-page":"785","DOI":"10.1109\/90.893874","article-title":"Dynamic tuning of the IEEE 802.11 protocol to achieve a theoretical throughput limit","volume":"8","author":"Cal\u0131\u0300","year":"2000","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"9","key":"10.1016\/S1570-8705(03)00013-1_BIB51","doi-asserted-by":"crossref","first-page":"1774","DOI":"10.1109\/49.872963","article-title":"Dynamic IEEE 802.11: design, modeling and performance evaluation","volume":"18","author":"Cal\u0131\u0300","year":"2000","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"5","key":"10.1016\/S1570-8705(03)00013-1_BIB52","article-title":"Special issue on mobile ad hoc network","volume":"8","author":"Campbell","year":"2003","journal-title":"ACM\/Kluwer MONET"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB53","doi-asserted-by":"crossref","unstructured":"C.F. Chiasserini, I. Chlamtac, P. Monti, A. Nucci, Optimal energy design of wireless ad hoc networks, in: E. Gregori, M. Conti, A.T. Campbell, G. Omidyar, M. Zukerman (Eds.), Lecture Notes in Computer Science, vol. 2345, Springer, Berlin, 2002","DOI":"10.1007\/3-540-47906-6_30"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB54","doi-asserted-by":"crossref","unstructured":"Special issue \u201cSpecial feature on middleware for mobile & pervasive\u201d, ACM Mobile Computing and Communications Review 6 (4) (October 2002)","DOI":"10.1145\/643550.643565"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB55","series-title":"Network Systems Design","first-page":"117","article-title":"Simulation modeling of local and metropolitan area networks","author":"Conti","year":"1999"},{"issue":"2","key":"10.1016\/S1570-8705(03)00013-1_BIB56","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1023\/A:1013941929408","article-title":"WCA: a weighted clustering algorithm for mobile ad hoc networks","volume":"5","author":"Chatterjee","year":"2002","journal-title":"Cluster Computing"},{"issue":"1","key":"10.1016\/S1570-8705(03)00013-1_BIB57","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1109\/90.282605","article-title":"Making transmission schedules immune to topology changes in multi-hop packet radio networks","volume":"2","author":"Chlamtac","year":"1994","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"2","key":"10.1016\/S1570-8705(03)00013-1_BIB58","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1023\/A:1013989524865","article-title":"Special issue on mobile ad hoc networking","volume":"5","author":"Conti","year":"2002","journal-title":"Cluster Computing"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB59","doi-asserted-by":"crossref","unstructured":"M. Conti, E. Gregori, G. Maselli, Towards reliable forwarding for ad hoc networks, in: Proceedings of the PWC2003, Venice, Italy, September 23\u201325, 2003","DOI":"10.1007\/978-3-540-39867-7_71"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB60","unstructured":"Special issue on mobile ad hoc networking, Cluster Computing Journal 5 (2) (April 2002)"},{"issue":"5","key":"10.1016\/S1570-8705(03)00013-1_BIB61","doi-asserted-by":"crossref","first-page":"481","DOI":"10.1023\/A:1016542229220","article-title":"Span: an energy-efficient coordination algorithm for topology maintenance in ad hoc wireless networks","volume":"8","author":"Benjie Chen","year":"2002","journal-title":"ACM\/Kluwer Wireless Networks Journal"},{"issue":"12","key":"10.1016\/S1570-8705(03)00013-1_BIB62","doi-asserted-by":"crossref","DOI":"10.1109\/TCOM.1985.1096245","article-title":"On broadcasting in radio networks\u2013\u2013problem analysis and protocol design","volume":"COM-33","author":"Chlamtac","year":"1985","journal-title":"IEEE Transactions on Communications"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB63","unstructured":"I. Chlamtac, A. Lerner, Link allocation in mobile radio networks with noisy channel, in: IEEE INFOCOM, Bar Harbour, FL, April 1986"},{"issue":"7","key":"10.1016\/S1570-8705(03)00013-1_BIB64","doi-asserted-by":"crossref","DOI":"10.1109\/TCOM.1987.1096847","article-title":"Fair algorithms for maximal link activiation in multi-hop radio networks","volume":"COM-35","author":"Chlamtac","year":"1987","journal-title":"IEEE Transactions on Communications"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB65","doi-asserted-by":"crossref","unstructured":"M.S. Corson, J. Macker, Mobile ad hoc networking (MANET): routing protocol performance issues and evaluation considerations, RFC 2501, IETF, January 1999","DOI":"10.17487\/rfc2501"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB66","series-title":"Handbook of Ad Hoc Networks","article-title":"Quality of service in mobile ad hoc networks","author":"Chakrabarti","year":"2003"},{"issue":"4","key":"10.1016\/S1570-8705(03)00013-1_BIB67","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1109\/4236.780962","article-title":"Internet-based mobile ad hoc networking","volume":"3","author":"Corson","year":"1999","journal-title":"IEEE Internet Computing"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB68","unstructured":"S. Chen, K. Nahrstedt, An overview of quality-of-service routing for the next generation high-speed networks: problems and solutions, IEEE Network, Special Issue on Transmission and Distribution of Digital Video, November\/December 1998"},{"issue":"1","key":"10.1016\/S1570-8705(03)00013-1_BIB69","doi-asserted-by":"crossref","DOI":"10.1109\/90.759318","article-title":"Energy-conserving access protocols for identification networks","volume":"7","author":"Chlamtac","year":"1999","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB70","doi-asserted-by":"crossref","unstructured":"C.-F. Chiasserini, R.R. Rao, Pulsed battery discharge in communication devices, in: Proceedings of The Fifth Annual ACM\/IEEE International Conference on Mobile Computing and Networking (MOBICOM \u201999), August 15\u201319, 1999, Seattle, WA, pp. 88\u201395","DOI":"10.1145\/313451.313488"},{"issue":"1","key":"10.1016\/S1570-8705(03)00013-1_BIB71","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/98.904897","article-title":"A feedback based scheme for improving TCP performance in ad hoc wireless networks","volume":"8","author":"Chandran","year":"2001","journal-title":"IEEE Personal Communication Magazine, Special Issue on Ad Hoc Networks"},{"issue":"10","key":"10.1016\/S1570-8705(03)00013-1_BIB72","doi-asserted-by":"crossref","first-page":"739","DOI":"10.1109\/12.35830","article-title":"Distributed assignment algorithms for multihop packet radio networks","volume":"38","author":"Cidon","year":"1989","journal-title":"IEEE Transactions on Computers"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB73","unstructured":"Jun-Cheng Chen, Krishna M. Sivalingam, Prathima Agrawal, Shali-nee Kishore, A comparison of MAC protocols for wireless local networks based on battery power consumption, in: Proceedings of IEEE INFOCOM 1998, San Francisco, CA, March 1998"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB74","doi-asserted-by":"crossref","unstructured":"David Cavin, Yoav Sasson, Andr\u00e8 Schiper, On the accuracy of MANET Simulators, in: Proceedings of ACM POMC\u201902, Toulouse, France, October 2002","DOI":"10.1145\/584490.584499"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB75","unstructured":"Jae-Hwan Chang, Leandros Tassiulas, Energy conserving routing in wireless ad-hoc networks, in: Proceedings of IEEE INFOCOM, March 2000, pp. 22\u201331"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB76","unstructured":"I. Chlamtac, O. Weinstein, The wave expansion approach to broadcasting in multi-hop radio networks, in: Proceedings of IEEE INFOCOM, San Francisco, CA, April 1987"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB77","unstructured":"C.-C. Chiang, H.K. Wu, W. Liu, M. Gerla, Routing in clustered multihop, mobile wireless networks with fading channel, in: Proceedings of IEEE SICON\u201997, April 1997, pp. 197\u2013211"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB78","doi-asserted-by":"crossref","unstructured":"Romit Roy Choudhury, Xue Yang, Nitin H. Vaidya, Ram Ramanathan, Using directional antennas for medium access control in ad hoc networks, in: Proceedings of the Eighth ACM International Conference on Mobile Computing and Networking (MOBICOM 2002), Atlanta, GA, September 23\u201328, 2002","DOI":"10.1145\/570645.570653"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB79","doi-asserted-by":"crossref","unstructured":"R. Dube, C. Rais, K.-Y. Wang, S. Tripathi, Signal stability based adaptive routing for ad hoc mobile networks, IEEE Personal Communications, February 1997, pp. 36\u201345","DOI":"10.1109\/98.575990"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB80","doi-asserted-by":"crossref","unstructured":"T.D. Dyer, R.V. Boppana, A comparison of TCP performance over three routing protocols for mobile ad hoc networks, in: Proceedings of ACM Symposium on Mobile Ad Hoc Networking & Computing (MobiHoc), October 2001","DOI":"10.1145\/501416.501425"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB81","doi-asserted-by":"crossref","unstructured":"B. Das, V. Bharghavan, Routing in ad-hoc networks using minimum connected dominating sets, in: Proceedings of the IEEE International Conference on Communications (ICC\u201997), June 1997","DOI":"10.1109\/ICC.1997.605303"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB82","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1023\/A:1019108612308","article-title":"Simulation based performance evaluation of mobile, ad hoc network routing protocols","author":"Das","year":"2000","journal-title":"ACM\/Baltzer Mobile Networks and Applications (MONET) Journal"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB83","doi-asserted-by":"crossref","unstructured":"H. Deng, W. Li, D.P. Agrawal, Routing security in wireless ad hoc networks, IEEE Communications Magazine (October 2002) 70\u201375","DOI":"10.1109\/MCOM.2002.1039859"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB84","doi-asserted-by":"crossref","unstructured":"Samir R. Das, Charles E. Perkins, Elizabeth M. Royer, Performance comparison of two on-demand routing protocols for ad hoc networks, in: Proceedings INFOCOM 2000, Tel Aviv, Israel, March 2000","DOI":"10.1109\/INFCOM.2000.832168"},{"issue":"4","key":"10.1016\/S1570-8705(03)00013-1_BIB85","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/MWC.2002.1028877","article-title":"Energy concerns in wireless networks","volume":"9","author":"Ephremides","year":"2002","journal-title":"IEEE Wireless Communications"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB86","unstructured":"Jean-Pierre Ebert, Brian Burns, Adam Wolisz, A trace-based approach for determining the energy consumption of a WLAN network interface, in: Proceedings of European Wireless, February 2002, pp. 230\u2013236"},{"issue":"2","key":"10.1016\/S1570-8705(03)00013-1_BIB87","doi-asserted-by":"crossref","DOI":"10.1023\/A:1013981509844","article-title":"QoS support by the HiperLAN\/2 MAC protocol: a performance evaluation","volume":"5","author":"Mingozzi","year":"2002","journal-title":"Cluster Computing Journal"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB88","doi-asserted-by":"crossref","unstructured":"Elizabeth Belding-Royer, Routing approaches in mobile ad hoc networks, in: S. Basagni, M. Conti, S. Giordano, I. Stojmenovic (Eds.), Ad Hoc Networking, IEEE Press Wiley, New York, 2003","DOI":"10.1002\/0471656895.ch10"},{"issue":"3","key":"10.1016\/S1570-8705(03)00013-1_BIB89","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1109\/JCN.2000.6596709","article-title":"An energy-efficient power control approach for WLANs","volume":"2","author":"Ebert","year":"2000","journal-title":"Journal of Communications and Networks"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB90","unstructured":"ETSI Technical Report 101 683, V1.1.1, Broadband Radio Access Networks (BRAN): HIgh PErformance Local Area Network (HiperLAN) Type 2; System Overview"},{"issue":"3","key":"10.1016\/S1570-8705(03)00013-1_BIB91","doi-asserted-by":"crossref","DOI":"10.1023\/A:1011474616255","article-title":"An energy-consumption model for performance analysis of routing protocols for mobile ad hoc networks","volume":"6","author":"Feeney","year":"2001","journal-title":"ACM\/Kluwer Mobile Networks and Applications (MONET)"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB92","series-title":"Ad Hoc Networking","article-title":"Energy efficient communication in ad hoc wireless networks","author":"Feeney","year":"2003"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB93","doi-asserted-by":"crossref","DOI":"10.1109\/35.925687","article-title":"Spontaneous networking: an application-oriented approach to ad hoc networking","author":"Feeney","year":"2001","journal-title":"IEEE Communications Magazine"},{"issue":"1","key":"10.1016\/S1570-8705(03)00013-1_BIB94","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1109\/PROC.1987.13703","article-title":"The low-cost packet radio","volume":"75","author":"Fifer","year":"1987","journal-title":"Proceedings of the IEEE"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB95","doi-asserted-by":"crossref","unstructured":"C.L. Fullmer, J. Garcia-Luna-Aceves, Floor acquisition multiple access (FAMA) for packet-radio networks, in: Proceedings of SIGCOMM\u201995, November 1995","DOI":"10.1145\/217382.217458"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB96","doi-asserted-by":"crossref","unstructured":"Chane L. Fullmer, J.J. Garcia-Luna-Aceves, Solutions to hidden terminal problems in wireless networks, in: Proceedings of ACM SIGCOMM 97, Cannes, France, September 14\u201318, 1997","DOI":"10.1145\/263105.263137"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB97","series-title":"Ad Hoc Networking","first-page":"29","article-title":"A DoD perspective on mobile ad hoc networks","author":"Freebersyser","year":"2001"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB98","doi-asserted-by":"crossref","unstructured":"L.M. Feeney, M. Nilsson, Investigating the energy consumption of a wireless network interface in an ad hoc networking environment, in: Proceedings of INFOCOM 2001","DOI":"10.1109\/INFCOM.2001.916651"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB99","unstructured":"Andras Farago, Violet Syrotiuk, MERIT: a scalable approach for protocol assessment, in: A.T. Campbell, M. Conti, S. Giordano (Eds.), ACM\/Kluwer MONET 8 (5) (October 2003), Special issue on Mobile Ad Hoc Network"},{"issue":"4","key":"10.1016\/S1570-8705(03)00013-1_BIB100","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.274999","article-title":"The challenges of mobile computing","volume":"27","author":"Forman","year":"1994","journal-title":"IEEE Computer"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB101","doi-asserted-by":"crossref","unstructured":"Zhenghua Fu, Petros Zerfos, Kaixin Xu, Haiyun Luo, Songwu Lu, Lixia Zhang, Mario Gerla, The impact of multihop wireless channel on tcp throughput and loss, in: Proceedings of INFOCOM 2003, San Francisco, April 2003","DOI":"10.1109\/INFCOM.2003.1209197"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB102","series-title":"Handbook of Wireless Networks and Mobile Computing","article-title":"Mobile ad-hoc networks","author":"Giordano","year":"2002"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB103","unstructured":"J. Gomez, A. Campbell, M. Naghshineh, C. Bisdikian, PARO: supporting dynamic power controlled routing in wireless ad hoc networks, ACM\/Kluwer Wireless Networks Journal, in press"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB104","unstructured":"Piyush Gupta, Robert Gray, P.R. Kumar, An Experimental Scaling Law for Ad Hoc Networks, 2001. Available from <http:\/\/black.csl.uiuc.edu\/~prkumar\/postscript_files.html>"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB105","doi-asserted-by":"crossref","unstructured":"R. Garc\u00e9s, J.J. Garcia-Luna-Aceves, Floor acquisition multiple access with collision resolution, in: Proceedings of the Second Annual International Conference on Mobile Computing and Networking (MOBICOM \u201996), Rye, New York, November 10\u201312, 1996, pp. 187\u2013197","DOI":"10.1145\/236387.236446"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB106","doi-asserted-by":"crossref","unstructured":"S. Giordano, M. Hamdi, Mobility management: the virtual home region, Technical Report No. SSC\/1999\/037, EPFL, October 1999. Available from <http:\/\/www.terminodes.org>","DOI":"10.1590\/S0102-05361999000100001"},{"issue":"2","key":"10.1016\/S1570-8705(03)00013-1_BIB107","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1109\/18.825799","article-title":"The capacity of wireless networks","volume":"IT 46","author":"Gupta","year":"2000","journal-title":"IEEE Transactions on Information Theory"},{"issue":"3","key":"10.1016\/S1570-8705(03)00013-1_BIB108","article-title":"Floor acquisition multiple access (FAMA) in single-channel packet-radio networks","volume":"4","author":"Garcia-Luna-Aceves","year":"1999","journal-title":"ACM\/Baltzer MONET"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB109","unstructured":"GloMoSim, Global Mobile Information Systems Simulation Library. Availabe from <http:\/\/pcl.cs.ucla.edu\/projects\/glomosim\/>"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB110","series-title":"The Handbook of Ad Hoc Wireless Networks","article-title":"Position based ad hoc routes in ad hoc networks","author":"Giordano","year":"2003"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB111","series-title":"Ad Hoc Wireless Networking","article-title":"Position based routing algorithms for ad hoc networks: a taxonomy","author":"Giordano","year":"2003"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB112","unstructured":"G. Turi, A survey on node location services for mobile ad hoc networks, MobileMAN Technical Report 01-03. Available from <http:\/\/cnd.iit.cnr.it\/MobileMAN\/reports>"},{"issue":"3","key":"10.1016\/S1570-8705(03)00013-1_BIB113","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1007\/BF01200845","article-title":"Multicluster, mobile, multimedia radio network","volume":"1","author":"Gerla","year":"1995","journal-title":"ACM\/Baltzer Journal of Wireless Networks"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB114","series-title":"Ad Hoc Networking","article-title":"Self-organized and cooperative ad hoc networking","author":"Giordano","year":"2003"},{"issue":"4","key":"10.1016\/S1570-8705(03)00013-1_BIB115","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1109\/MWC.2002.1028874","article-title":"Design challenges for energy-constrained ad hoc wireless networks","volume":"9","author":"Goldsmith","year":"2002","journal-title":"IEEE Wireless Communications"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB116","unstructured":"Klaus Hermann, MESHMdl\u2013\u2013a middleware for self-organization in ad hoc networks, in: Proceedings of the IEEE Workshop on Mobile and Distributed Computing (MDC 2003) in conjunction with ICDCS 2003, May 19, 2003"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB117","doi-asserted-by":"crossref","unstructured":"J.P. Hubaux, L. Buttyan, S. Capkun, The quest for security in mobile ad hoc networks, in: Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), October 2001","DOI":"10.1145\/501416.501437"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB118","series-title":"Handbook of Ad Hoc Networks","article-title":"Quality of service models for ad hoc wireless networks","author":"Hannan","year":"2003"},{"issue":"3","key":"10.1016\/S1570-8705(03)00013-1_BIB119","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1145\/568522.568524","article-title":"Improving TCP performance over mobile networks","volume":"34","author":"Elaarag","year":"2002","journal-title":"ACM Computing Surveys"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB120","unstructured":"Yih-Chun Hu, David B. Johnson, Adrian Perrig, SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks, in: Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications (WMCSA \u201902), New York, June 2002"},{"issue":"1","key":"10.1016\/S1570-8705(03)00013-1_BIB121","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/TCOM.1986.1096436","article-title":"Transmission range control in multihop packet radio networks","volume":"34","author":"Hou","year":"1986","journal-title":"IEEE Transactions on Communications"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB122","doi-asserted-by":"crossref","unstructured":"D.P. Helmbold, D.E. Long, B. Sherrod, A dynamic disk spin-down technique for mobile computing, in: Proceedings of the Second Annual ACM International Conference on Mobile Computing and Networking, New York, 1996, pp. 130\u2013142","DOI":"10.1145\/236387.236423"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB123","series-title":"Performance Analysis of Local Computer Networks","author":"Hammond","year":"1988"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB124","unstructured":"Z.J. Haas, M.R. Pearlman, The zone routing protocol (ZRP) for ad hoc networks, Internet Draft \u3008draft-haas-zone-routing-protocol-00.txt\u3009 November 1997"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB125","doi-asserted-by":"crossref","unstructured":"Y.-C. Hu, A. Perrig, D.B. Johnson, Ariadne: a secure on-demand routing protocol for ad hoc networks, in: Proceedings of the Eighth ACM International Conference on Mobile Computing and Networking (MOBICOM 2002), Atlanta, GA, September 23\u201328, 2002","DOI":"10.1145\/570645.570648"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB126","unstructured":"Y.-C. Hu, A. Perrig, D.B. Johnson, Wormhole detection in wireless ad hoc networks, Technical Report TR01-384, Rice University Department of Computer Science, June 2002"},{"issue":"2\u20133","key":"10.1016\/S1570-8705(03)00013-1_BIB127","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1023\/A:1013798127590","article-title":"Analysis of TCP performance over mobile ad hoc networks","volume":"8","author":"Holland","year":"2002","journal-title":"ACM\/Kluwer Journal of Wireless Networks"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB128","doi-asserted-by":"crossref","unstructured":"G. Holland, N.H. Vaidya, Analysis of TCP performance over mobile ad hoc networks, in: Proceedings of the Fifth Annual ACM\/IEEE International Conference on Mobile Computing and Networking (MOBICOM \u201999), August 15\u201319, 1999, Seattle, WA, pp. 219\u2013230","DOI":"10.1145\/313451.313540"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB129","series-title":"Handbook of Ad Hoc Networks","author":"Ilyas","year":"2003"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB130","unstructured":"IBM Zurich Research Laboratory web site: http:\/\/www.zurich.ibm.com\/cs\/wireless\/bluetooth.html"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB131","unstructured":"IEEE standard for Wireless LAN- Medium Access Control and Physical Layer Specification, P802.11, November 1997. See also"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB132","doi-asserted-by":"crossref","unstructured":"IEEE P802.11\/D10, January 14, 1999","DOI":"10.1109\/62.793447"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB133","unstructured":"Web site of the IEEE 802.11 WLAN: http:\/\/grouper.ieee.org\/grups\/802\/11\/main.html"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB134","unstructured":"Web site of the IEEE 802.15 WPA.N Task Group 1: http:\/\/www.ieee802.org\/15\/pub\/TG1.html"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB135","doi-asserted-by":"crossref","unstructured":"Ivan Stojmenovic, Dominating set based Bluetooth scatternet formation with localized maintenance, in: Proceedings of IPDPS2002, Fort Lauderdale, April 2002","DOI":"10.1109\/IPDPS.2002.1016541"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB136","unstructured":"Ivan Stojmenovic, Home agent based location update and destination search schemes in ad hoc wireless networks, Technical Report TR99-10, Computer Science, SITE, University of Ottawa, Canada, September 1999"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB137","doi-asserted-by":"crossref","unstructured":"Special issue on Energy-Aware Ad Hoc Wireless Networks, IEEE Wireless Communications 9 (4) (2002)","DOI":"10.1109\/MWC.2002.1028873"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB138","doi-asserted-by":"crossref","unstructured":"Lusheng Ji, Scott M. Corson, Explicit Multicasting for Mobile Ad hoc Networks, Special Issue on Mobile Ad Hoc Network, ACM\/Kluwer MONET 8 (5) (2003)","DOI":"10.1201\/9781420040401.ch2"},{"issue":"3","key":"10.1016\/S1570-8705(03)00013-1_BIB139","doi-asserted-by":"crossref","first-page":"298","DOI":"10.1109\/90.700893","article-title":"An optimal topology-transparent scheduling method in multihop packet radio networks","volume":"6","author":"Ju","year":"1998","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB140","unstructured":"P. Johansson, T. Larsson, N. Hedman, B. Mielczarek, Routing protocols for mobile ad-hoc networks\u2013\u2013a comparative performance analysis, in: Proceedings of the Fifth Annual ACM\/IEEE International Conference on Mobile Computing and Networking (MOBICOM \u201999), August 15\u201319, 1999, Seattle, WA, pp. 195\u2013206"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB141","series-title":"Mobile Computing","first-page":"153","article-title":"Dynamic source routing in ad-hoc wireless networks","author":"Johnson","year":"1996"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB142","unstructured":"P. Jacquet, P. Muhlethaler, A. Qayyum, Optimized Link State Routing Protocol, Internet Draft, draft-ietf-manet-olsr-00.txt, November 1998"},{"issue":"4","key":"10.1016\/S1570-8705(03)00013-1_BIB143","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1023\/A:1016627727877","article-title":"A survey of energy efficient network protocols for wireless and mobile networks","volume":"7","author":"Jones","year":"2001","journal-title":"ACM\/Kluwer Wireless Networks"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB144","doi-asserted-by":"crossref","unstructured":"Eun-Sun Jung, Nitin H. Vaidya, A power control MAC protocol for ad hoc networks, in: Proceedings of the Eighth ACM International Conference on Mobile Computing and Networking (MOBICOM 2002), Atlanta, GA, September 23\u201328, 2002","DOI":"10.1145\/570645.570651"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB145","unstructured":"V. Karpijoki, Security in Ad Hoc Networks, 2000. Available from <http:\/\/citeseer.nj.nec.com\/karpijoki01security.html>"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB146","unstructured":"P. Karn, MACA\u2013\u2013A new channel access method for packet radio, in: ARRL\/CRRL Amateur Radio 9th Computer Networking Conference, 1990, pp. 134\u2013140"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB147","series-title":"Understanding GPS: Principles and Applications","year":"1996"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB148","doi-asserted-by":"crossref","unstructured":"K. Xu, S. Bae, S. Lee, M. Gerla, TCP behavior across multihop wireless networks and the wired networks, in: Proceedings of the ACM Workshop on Mobile Multimedia (WoWMoM 2002), Atlanta, GA, September 28, 2002, pp. 41\u201348","DOI":"10.1145\/570790.570798"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB149","doi-asserted-by":"crossref","unstructured":"R. Kravets, P. Krishnan, Power management techniques for mobile communication, in: Proceedings of the Fourth Annual ACM\/IEEE International Conference on Mobile Computing and Networking (MOBICOM \u201998), Dallas, TX, October 25\u201330, 1998, pp. 157\u2013168","DOI":"10.1145\/288235.288276"},{"issue":"1","key":"10.1016\/S1570-8705(03)00013-1_BIB150","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1109\/49.192737","article-title":"Computer-aided modeling of computer communication networks","volume":"6","author":"Kurose","year":"1988","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB151","unstructured":"L. Kleinrock, K. Stevens, Fisheye: a lenslike computer display transformation, Technical Report, UCLA, Computer Science Department, 1971"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB152","unstructured":"E. Kranakis, H. Singh, J. Urrutia, Compass routing on geometric networks, in: Proceedings of the 11th Canadian Conference on Computational Geometry, Vancouver, August, 1999"},{"issue":"4","key":"10.1016\/S1570-8705(03)00013-1_BIB153","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1023\/A:1019106118419","article-title":"Location-aided routing (LAR) in mobile ad hoc networks","volume":"6","author":"Ko","year":"2000","journal-title":"ACM\/Kluwer Wireless Networks"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB154","doi-asserted-by":"crossref","DOI":"10.1145\/263876.263885","article-title":"A cluster-based approach for routing in dynamic networks","author":"Krishna","year":"1997","journal-title":"ACM Computer Communications Review (CCR)"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB155","unstructured":"J. Lundberg, Routing Security in Ad Hoc Networks, 2000. Availabe from <http:\/\/citeseer.nj.nec.com\/400961.html>"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB156","series-title":"Computer Performance Handbook","author":"Lavenberg","year":"1983"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB157","doi-asserted-by":"crossref","unstructured":"Qun Li, Javed Aslam, Daniela Rus, Online power-aware routing in wireless ad-hoc networks, in: Proceedings of the Seventh ACM International Conference on Mobile Computing and Networking (MOBICOM 2001), Rome, Italy, July 16\u201321, 2001","DOI":"10.1145\/381677.381687"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB158","series-title":"Wireless and Mobile Network Architectures","author":"Bing Lin","year":"2000"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB159","unstructured":"S.-B. Lee, A.T. Campbell, INSIGNIA: in-band signaling support for QoS in mobile ad hoc networks, in: Proceedings of the 5th International Workshop on Mobile Multimedia Communications (MoMuC, 98), Berlin, Germany, October 1998"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB160","doi-asserted-by":"crossref","unstructured":"C.R. Lin, M. Gerla, MACA\/PR: an asynchronous multimedia multihop wireless network, in: Proceedings of IEEE INFOCOM \u201897, April 1997","DOI":"10.1109\/INFCOM.1997.635121"},{"issue":"7","key":"10.1016\/S1570-8705(03)00013-1_BIB161","article-title":"Adaptive clustering for mobile wireless networks","volume":"15","author":"Richard Lin","year":"1997","journal-title":"IEEE Journal of Selected Areas in Communications"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB162","doi-asserted-by":"crossref","unstructured":"Li Li, Joseph Y. Halpern, Minimum-energy mobile wireless networks revisited, in: Proceedings of the IEEE International Conference on Communications (ICC01) 2001, pp. 278\u2013283","DOI":"10.1109\/ICC.2001.936317"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB163","doi-asserted-by":"crossref","unstructured":"Y. Bing Lin, Y.R. Huang, A. Pang, I. Chlamtac, All-IP approach for third generation mobile networks, IEEE Network Magazine, in press","DOI":"10.1109\/MNET.2002.1035112"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB164","doi-asserted-by":"crossref","unstructured":"Jinyang Li, John Jannotti, Douglas S.J. De Couto, David R. Karger, Robert Morris, A scalable location service for geographic ad hoc routing, in: Proceedings of the Sixth ACM International Conference on Mobile Computing and Networking (MOBICOM 2000), Boston, MA, August 6\u201311, 2000","DOI":"10.1145\/345910.345931"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB165","series-title":"Simulation Modeling and Analysis","author":"Law","year":"2000"},{"issue":"8","key":"10.1016\/S1570-8705(03)00013-1_BIB166","first-page":"1415","article-title":"QoS routing in ad hoc wireless networks","volume":"17","author":"Lin","year":"1999","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB167","doi-asserted-by":"crossref","unstructured":"E.L. Lloyd, R. Liu, M.V. Marathe, R. Ramanathan, S.S. Ravi, Algorithmic aspects of topology control problems for ad hoc networks, in: Proceedings of the Third ACM International Symposium on Mobile Ad Hoc Networking & Computing 2002, Lausanne, Switzerland","DOI":"10.1145\/513800.513816"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB168","unstructured":"X. Luo, B. Li, I. Thng, Yi-Bing Lin, I. Chlamtac, An adaptive measured-based pre-assignment scheme with connection-level QoS support for mobile networks, IEEE Transactions on Wireless Communications, in press"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB169","unstructured":"Ching Law, Amar K. Mehta, Kai-Yeung Siu, A new Bluetooth scatternet formation protocol, in: A.T. Campbell, M. Conti, S. Giordano (Eds.), ACM\/Kluver Mobile Networks and Applications Journal, Special Issue on Ad Hoc Networks 8 (5) (2003)"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB170","doi-asserted-by":"crossref","unstructured":"H. Lundgren, E. Nordstron, C. Tschudin, Coping with communication gray zones in IEEE 802.11 based ad hoc networks, in: Proceedings of the ACM Workshop on Mobile Multimedia (WoWMoM 2002), Atlanta, GA, September 28, 2002, pp. 49\u201355","DOI":"10.1145\/570790.570799"},{"issue":"6","key":"10.1016\/S1570-8705(03)00013-1_BIB171","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/98.556477","article-title":"Goals and challenges of the DARPA GloMo program","volume":"3","author":"Leiner","year":"1996","journal-title":"IEEE Personal Communications"},{"issue":"7","key":"10.1016\/S1570-8705(03)00013-1_BIB172","doi-asserted-by":"crossref","first-page":"1300","DOI":"10.1109\/49.932698","article-title":"ATCP: TCP for mobile ad hoc networks","volume":"19","author":"Liu","year":"2001","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB173","unstructured":"Xiang-Yang Li, Ivan Stojmenovic, Parial delaunay triangulation and degree limited localized Bluetooth scatternet formation, in: Proceedings of ADHOC-NOW 2002, Toronto, Canada, September 2002"},{"issue":"5","key":"10.1016\/S1570-8705(03)00013-1_BIB174","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1023\/A:1019177822227","article-title":"Scheduling techniques for reducing processor energy use in MacOS","volume":"3","author":"Lorch","year":"1997","journal-title":"ACM\/Baltzer Wireless Networks"},{"issue":"3","key":"10.1016\/S1570-8705(03)00013-1_BIB175","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1109\/98.683740","article-title":"Software strategies for portable computer energy management","volume":"5","author":"Lorch","year":"1998","journal-title":"IEEE Personal Comunications"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB176","series-title":"The Handbook of Ad Hoc Wireless Networks","article-title":"Resource discovery in mobile ad hoc netwoks","author":"Liu","year":"2003"},{"issue":"1\u20133","key":"10.1016\/S1570-8705(03)00013-1_BIB177","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1023\/A:1016735301732","article-title":"GRID: a fully location-aware routing protocols for mobile ad hoc networks","volume":"18","author":"Liao","year":"2001","journal-title":"Telecommunication Systems"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB178","unstructured":"MANET Meeting Report at 55th IETF Meeting in Altanta, GA. Available from <http:\/\/www.ietf.org\/proceedings\/02nov\/177.htm>"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB179","series-title":"Bluetooth Revealed","author":"Miller","year":"2000"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB180","doi-asserted-by":"crossref","unstructured":"Ren\u00e8 Meier, Vinny Cahill, STEAM: event-based middleware for wireless ad hoc networks, in: Proceedings of the 22nd International Conference on Distributed Computing Systems Workshops (ICDCSW\u201902)","DOI":"10.1109\/ICDCSW.2002.1030841"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB181","series-title":"Ad Hoc Networking","article-title":"Mobile ad hoc networks (MANET): routing technology for dynamic, wireless networking","author":"Macker","year":"2003"},{"issue":"1","key":"10.1016\/S1570-8705(03)00013-1_BIB182","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1145\/584007.584015","article-title":"Mobile ad hoc networking and the IETF","volume":"2","author":"Macker","year":"1998","journal-title":"Mobile Computing and Communications Review"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB183","doi-asserted-by":"crossref","unstructured":"Cecilia Mascolo, Licia Capra, Wolfgang Emmerich, Middleware for mobile computing (a survey), in: Enrico Gregori, Giuseppe Anastasi, Stefano Basagni (Eds.), Advanced Lectures on Networking, Lecture Notes in Computer Science, vol. 2497, Springer, Berlin, 2002","DOI":"10.1007\/3-540-36162-6_2"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB184","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1023\/A:1015584805733","article-title":"XMIDDLE: a data-sharing middleware for mobile computing","volume":"21","author":"Mascolo","year":"2002","journal-title":"Wireless Personal Communications"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB185","doi-asserted-by":"crossref","unstructured":"Marco Ajmone Marsan, Carla-Fabiana Chiasserini, Antonio Nucci, Giuliana, Carello, Luigi De Giovanni, Optimizing the topology of Bluetooth wireless personal area networks, in: Proceedings of INFOCOM 2002, New York, June 23\u201327, 2002","DOI":"10.1109\/INFCOM.2002.1019302"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB186","doi-asserted-by":"crossref","unstructured":"S. Murthy, J.J. Garcia-Luna-Aceves, An efficient routing protocol for wireless networks, ACM Mobile Networks and Applications (MONET) Journal, Special Issue on Routing in Mobile Communication Networks, October 1996, pp. 183\u2013197","DOI":"10.1007\/BF01193336"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB187","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1023\/A:1011400407314","article-title":"Scalable multicasting: the core assisted mesh protocol","volume":"6","author":"Madruga","year":"2001","journal-title":"ACM\/Kluwer Mobile Networks and Applications Journal"},{"issue":"2","key":"10.1016\/S1570-8705(03)00013-1_BIB188","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1023\/A:1019176816001","article-title":"An efficient packet-sensing MAC protocol for wireless networks","volume":"3","author":"Muir","year":"1998","journal-title":"ACM\/Baltzer Mobile Networks and Applications (MONET)"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB189","doi-asserted-by":"crossref","unstructured":"S. Marti, T. Giuli, K. Lai, M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, in: Proceedings of the Sixth annual ACM\/IEEE International Conference on Mobile Computing and Networking, 2000, pp. 255\u2013265","DOI":"10.1145\/345910.345955"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB190","unstructured":"European Commission, FET-IST Programme, MobileMAN project (IST-2001-38113). Available from <http:\/\/cnd.iit.cnr.it\/mobileMAN\/>"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB191","unstructured":"P. Michiardi, R. Molva, Simulation-based analysis of security exposures in mobile ad hoc networks, in: Proceedings of European Wireless Conference, 2002"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB192","doi-asserted-by":"crossref","unstructured":"P. Michiardi, R. Molva, CORE: a COllaborative REputation mechanism to enforce node cooperation in mobile ad hoc networks, in: Proceedings of the Communication and Multimedia Security 2002 Conference, September 2002","DOI":"10.1007\/978-0-387-35612-9_9"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB193","series-title":"Ad Hoc Networking","article-title":"Ad hoc networks security","author":"Michiardi","year":"2003"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB194","unstructured":"P. Michiardi, R. Molva, A game theoretical approach to evaluate cooperation enforcement mechanisms in mobile ad hoc networks, in: Proceedings of WiOpt 2003, Sophie-Antipolis, March 2003"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB195","doi-asserted-by":"crossref","unstructured":"A.L. Murphy, G.P. Picco, G.-C. Roman, Lime: a middleware for physical and logical mobility, in: Proceedings of the 21st International Conference on Distributed Computing Systems (ICDCS-21), Phoenix, AZ, April 16\u201319, 2001, pp. 233\u2013524","DOI":"10.1109\/ICDSC.2001.918983"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB196","unstructured":"J.P. Monks, P. Sinha, V. Bharghavan, Limitations of TCP-ELFN for ad hoc networks, in: Proceedings of MoMuc 2000, Tokyo, Japan, October 2000"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB197","doi-asserted-by":"crossref","unstructured":"M. Mirhakkak, N. Schult, D. Thomson, Dynamic quality-of-service for mobile ad hoc networks, Technical Report April 2002, The MITRE Corporation, 2000. Available from <http:\/\/www.mitre.org\/support\/papers>","DOI":"10.1109\/MOBHOC.2000.869225"},{"issue":"6","key":"10.1016\/S1570-8705(03)00013-1_BIB198","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/65.967595","article-title":"A survey on position-based routing in mobile ad-hoc networks","volume":"15","author":"Mauve","year":"2001","journal-title":"IEEE Network"},{"issue":"8","key":"10.1016\/S1570-8705(03)00013-1_BIB199","doi-asserted-by":"crossref","DOI":"10.1109\/49.780353","article-title":"A mobility-based framework for adaptive clustering in wireless ad-hoc networks","volume":"17","author":"McDonald","year":"1999","journal-title":"IEEE Journal on Selected Areas in Communication"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB200","unstructured":"The Network Simulator\u2013\u2013ns-2, http:\/\/www.isi.edu\/nsnam\/ns\/index.html"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB201","unstructured":"Navid Nikaein, Christian Bonnet, A glance at quality of service models in mobile ad hoc networks, in: Proceedings of DNAC 2002: 16th Conference of New Architectures for Communications, Paris, France, 2002"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB202","unstructured":"Swetha Narayanaswamy, Vikas Kawadia, R.S. Sreenivas, P.R. Kumar, Power control in ad-hoc networks: theory, architecture, algorithm and implementation of the COMPOW protocol, in: Proceedings of European Wireless 2002, February 2002, pp. 156\u2013162"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB203","doi-asserted-by":"crossref","unstructured":"Sze-Yao Ni, Yu-Chee Tseng, Yuh-Shyan Chen, Jang-Ping Sheu, The broadcast storm problem in a mobile ad hoc network, in: Proceedings of the Fifth Annual ACM\/IEEE International Conference on Mobile Computing and Networking (MOBICOM \u201999), Seattle, WA, August 15\u201319, 1999, pp. 151\u2013162","DOI":"10.1145\/313451.313525"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB204","unstructured":"OPNET Modeler, http:\/\/www.opnet.com\/products\/modeler\/home.html"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB205","series-title":"Ad Hoc Networking","author":"Perkins","year":"2000"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB206","doi-asserted-by":"crossref","unstructured":"C.E. Perkins, P. Bhagwat, Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers, Computer Communications Review (October 1994) 234\u2013244","DOI":"10.1145\/190809.190336"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB207","unstructured":"C. Petrioli, S. Basagni, I. Chlamtac, BlueMesh: degree-constrained multihop scatternet formation for Bluetooth networks, in: G. Zaruba, P. Johansson (Eds.), ACM\/Kluwer Journal on Mobile Networking and Applications (MONET), Special Issue on Advances in Research of Wireless Personal Area Networking and Bluetooth Enabled Networks"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB208","doi-asserted-by":"crossref","unstructured":"C. Petrioli, S. Basagni, I. Chlamtac, Configuring BlueStars: multihop scatternet formation for Bluetooth networks, in: Y.-B. Lin, Y.-C. Tseng (Eds.), IEEE Transactions on Computers, Special issue on Wireless Internet, in press","DOI":"10.1109\/TC.2003.1204833"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB209","doi-asserted-by":"crossref","unstructured":"V.D. Park, M.S. Corson, A highly adaptive distributed routing algorithm for mobile wireless networks, in: Proceedings of INFOCOM \u201997, April 1997","DOI":"10.1109\/INFCOM.1997.631180"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB210","doi-asserted-by":"crossref","unstructured":"A. Perrig, R. Canetti, J.D. Tygar, D. Song, Efficient authentication and signing of multicast streams over lossy channels, in: Proceedings of IEEE Symposium on Security and Privacy, 2000","DOI":"10.1109\/SECPRI.2000.848446"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB211","unstructured":"G. Pei, M. Gerla, T.-W. Chen, Fisheye state routing in mobile ad hoc networks, in: Proceedings of the 2000 ICDCS Workshops, Taipei, Taiwan, April 2000, pp. D71\u2013D78"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB212","unstructured":"G. Pei, M. Gerla, X. Hong, LANMAR: landmark routing for large scale wireless ad hoc networks with group mobility, in: Proceedings of IEEE\/ACM MobiHOC 2000, Boston, MA, August 2000, pp. 11\u201318"},{"issue":"4","key":"10.1016\/S1570-8705(03)00013-1_BIB213","doi-asserted-by":"crossref","DOI":"10.1145\/509506.509515","article-title":"Geographical region summary service for geographical routing","volume":"5","author":"Hsiao","year":"2001","journal-title":"Mobile Computing and Communications Review"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB214","unstructured":"Dmitri D. Perkins, Herman D. Hughes, A survey on quality of service support in wireless ad hoc networks, Journal of Wireless Communication & Mobile Computing (WCMC), Special Issue on Mobile Ad Hoc Networking: Research, Trends, and Application 2 (5) (2002) 503\u2013513"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB215","doi-asserted-by":"crossref","unstructured":"P. Papadimitratos, Z. Haas, Secure routing for mobile ad hoc networks, in: Proceedings of CNDS, 2002","DOI":"10.1201\/9781420040401.ch31"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB216","unstructured":"A. Perrig, Y.-C. Hu, D.B. Johnson, Wormhole protection in wireless ad hoc networks, Technical Report TR01-384, Department of Computer Science, Rice University"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB217","unstructured":"Petteri Kuosmanen, Classification of ad hoc routing protocols, Finnish Defence Forces, Naval Academy, Finland. Available from <http:\/\/keskus.hut.fi\/opetus\/s38030\/k02\/Papers\/12-Petteri.pdf>"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB218","doi-asserted-by":"crossref","unstructured":"C.E. Perkins, E.M. Royer, Ad-hoc on-demand distance vector routing, in: Proceedings of 2nd IEEE Workshop on Mobile Computing Systems and Applications, February 1999","DOI":"10.1109\/MCSA.1999.749281"},{"issue":"3","key":"10.1016\/S1570-8705(03)00013-1_BIB219","article-title":"Special Issue on Energy Conserving Protocols","volume":"6","author":"Petrioli","year":"2001","journal-title":"ACM\/Kluwer MONET"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB220","unstructured":"Qualnet simulator, http:\/\/www.qualnet.com\/"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB221","doi-asserted-by":"crossref","unstructured":"R. Ramanathan, On the performance of ad hoc networks with beamforming antennas, in: Proceedings of ACM MobiHoc, October 2001","DOI":"10.1145\/501416.501430"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB222","series-title":"Ad Hoc Networking","article-title":"Antenna beamforming and power control for ad hoc networks","author":"Ramanathan","year":"2003"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB223","doi-asserted-by":"crossref","unstructured":"R. Ramanujan, A. Ahamad, J. Bonney, R. Hagelstrom, K. Thurber, Techniques for intrusion-resistant ad hoc routing algorithms (TIARA), in: Proceedings of MILCOM, October 2000","DOI":"10.1109\/MILCOM.2000.904011"},{"issue":"1","key":"10.1016\/S1570-8705(03)00013-1_BIB224","doi-asserted-by":"crossref","DOI":"10.1023\/A:1019168125436","article-title":"Mobile power management for wireless communication networks","volume":"3","author":"Rulnick","year":"1997","journal-title":"ACM\/Baltzer Wireless Networks"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB225","doi-asserted-by":"crossref","unstructured":"Robin Kravets, Ken Calvert, Karsten Schwan, Power-aware communication for mobile computers, in: Proceedings of Sixth International Workshop on Mobile Multimedia Communications (MoMuc-6), 1999","DOI":"10.1109\/MOMUC.1999.819474"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB226","doi-asserted-by":"crossref","unstructured":"R. Rozovsky, P.R. Kumar, SEEDEX: a MAC protocol for ad hoc networks, in: Proceedings of the 2001 ACM International Symposium on Mobile Ad Hoc Networking & Computing","DOI":"10.1145\/501416.501427"},{"issue":"8","key":"10.1016\/S1570-8705(03)00013-1_BIB227","doi-asserted-by":"crossref","first-page":"1333","DOI":"10.1109\/49.779917","article-title":"Minimum energy mobile wireless networks","volume":"17","author":"Rodoplu","year":"1999","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB228","doi-asserted-by":"crossref","unstructured":"Andr\u00e1s R\u00e1cz, Gy\u00f6rgy Mikl\u00f3s, Ferenc Kubinszky, Andr\u00e9s Valk\u00f3, Bluetooth: a pseudo-random coordinated scheduling algorithm for Bluetooth scatternets, in: Proceedings of 2001 ACM International Symposium on Mobile Ad Hoc Networking & Computing (MobiHoc 2001), October 2001","DOI":"10.1145\/501416.501443"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB229","doi-asserted-by":"crossref","unstructured":"E.M. Royer, C.E. Perkins, Multicast operation of the ad-hoc on-demand distance vector routing protocol, in: Proceedings of The Fifth Annual ACM\/IEEE International Conference on Mobile Computing and Networking (MOBICOM \u201999), Seattle, WA, August 15\u201319, 1999, pp. 207\u2013218","DOI":"10.1145\/313451.313538"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB230","unstructured":"R. Ramanathan, R. Rosales-Hain, Topology control of multi-hop wireless networks using transmit power adjustment, in: Proceedings of IEEE INFOCOM, Tel Aviv, Israel, March 2000"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB231","doi-asserted-by":"crossref","unstructured":"C. Raghavendra, S. Singh, PAMAS: power aware multi-access protocol with signaling for ad hoc networks, ACM Computer Communication Review (July 1998) 5\u201326","DOI":"10.1145\/293927.293928"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB232","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1023\/A:1019148009641","article-title":"Hierarchically-organized, multihop mobile wireless networks for quality-of-service support","volume":"3","author":"Ramanathan","year":"1998","journal-title":"Mobile Networks and Applications"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB233","doi-asserted-by":"crossref","unstructured":"E.M. Belding-Royer, C.-K. Toh, A review of current routing protocols for ad-hoc mobile wireless networks, IEEE Personal Communications Magazine (April 1999) 46\u201355","DOI":"10.1109\/98.760423"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB234","series-title":"TCP\/IP Illustrated, Vol. 1, The Protocol","author":"Stevens","year":"1994"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB235","series-title":"Local & Metropolitan Area Networks","author":"Stallings","year":"1996"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB236","doi-asserted-by":"crossref","unstructured":"F. Stajano, R. Anderson, The resurrecting duckling: security issues for ad-hoc wireless networks, in: Proceedings of the 7th International Workshop on Security Protocols, 1999","DOI":"10.1007\/10720107_24"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB237","doi-asserted-by":"crossref","unstructured":"T. Salonidis, P. Bhagwat, L. Tassiulas, R. LaMaire, Distributed topology construction of Bluetooth personal area networks, in: Proceedings of INFOCOM 2001, Anchorage, April 2001, pp. 1577\u20131586","DOI":"10.1109\/INFCOM.2001.916654"},{"issue":"12R.W.","key":"10.1016\/S1570-8705(03)00013-1_BIB238","article-title":"A portable multimedia terminal","volume":"30","author":"Sheng","year":"1992","journal-title":"IEEE Communications Magazine"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB239","doi-asserted-by":"crossref","unstructured":"Shigang Chen, Klara Nahrstedt, An overview of quality-of-service routing for the next generation high-speed networks: problems and solutions, IEEE Network, Special Issue on Transmission and Distribution of Digital Video, November\/December 1998","DOI":"10.1109\/65.752646"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB240","doi-asserted-by":"crossref","unstructured":"K. Sanzgiri, B. Dahill, B.N. Levine, E.M. Belding-Royer, A secure routing protocol for ad hoc networks, in: Proceedings of the 10th IEEE International Conference on Network Protocols (ICNP), Paris, France, November 2002","DOI":"10.1109\/ICNP.2002.1181388"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB241","unstructured":"S. Sajama, Zygmunt Haas, Independent tree ad hoc multicast routing (ITAMAR), Special Issue on Mobile Ad Hoc Network, ACM\/Kluwer MONET 8 (5) (2003)"},{"issue":"4","key":"10.1016\/S1570-8705(03)00013-1_BIB242","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1023\/A:1011478628358","article-title":"Wireless ad hoc multicast routing with mobility prediction","volume":"6","author":"Lee","year":"2001","journal-title":"ACM\/Kluwer Mobile Networks and Applications"},{"issue":"8","key":"10.1016\/S1570-8705(03)00013-1_BIB243","first-page":"1125","article-title":"Measuring and reducing energy consumption of network interfaces in handheld devices","volume":"80","author":"Stemm","year":"1997","journal-title":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science, Special Issue on Mobile Computing"},{"issue":"8","key":"10.1016\/S1570-8705(03)00013-1_BIB244","article-title":"Quality-of-service in ad hoc carrier sense multiple access wireless networks","volume":"17","author":"Sobrinho","year":"1999","journal-title":"IEEE Journal on Special Areas in Communications"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB245","doi-asserted-by":"crossref","unstructured":"I. Stojmenovic, X. Lin, Power-aware localized routing in wireless networks, in: Proceedings of IEEE Symposium on Parallel and Distributed Systems, May 2000","DOI":"10.1109\/IPDPS.2000.846008"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB246","doi-asserted-by":"crossref","unstructured":"Ivan Stojmenovic, Xu Lin, Loop-free hybrid single-path\/flooding routing algorithms with guaranteed delivery for wireless networks, IEEE Transactions on Parallel and Distributed Systems, in press","DOI":"10.1109\/71.963415"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB247","doi-asserted-by":"crossref","unstructured":"Cesar A. Santivanez, Bruce McDonald, Ioannis Stavrakakis, Ram Ramanathan, On the scalability of ad hoc routing protocols, in: Proceedings of INFOCOM2002, New York, June 23\u201327, 2002","DOI":"10.1109\/INFCOM.2002.1019422"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB248","series-title":"Ad Hoc Networking","article-title":"Location discovery","author":"Savvides","year":"2003"},{"issue":"8","key":"10.1016\/S1570-8705(03)00013-1_BIB249","doi-asserted-by":"crossref","DOI":"10.1109\/49.779926","article-title":"CEDAR: a core-extraction distributed ad hoc routing algorithm","volume":"17","author":"Sivakumar","year":"1999","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB250","doi-asserted-by":"crossref","unstructured":"Samarth H. Shah, Klara Nahrstedt, Predictive location-based QoS routing in mobile ad hoc networks, in: Proceedings of IEEE International Conference on Communications (ICC 2002), New York, 2002","DOI":"10.1109\/ICC.2002.997009"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB251","doi-asserted-by":"crossref","unstructured":"Cesar A. Santivanez, Ioannis Stavrakakis, Ram Ramanathan, Making linkstate routing scale for ad hoc networks, in: Proceedings of MobiHoc 2001, Long Beach, October, 2001","DOI":"10.1145\/501416.501420"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB252","doi-asserted-by":"crossref","unstructured":"I. Stojmenovic, J. Wu, Broadcasting and activity-scheduling in ad hoc networks, in: S. Basagni, M. Conti, S. Giordano, I. Stojmenovic (Eds.), Ad Hoc Networking, IEEE Press Wiley, New York, 2003","DOI":"10.1002\/0471656895.ch7"},{"issue":"1","key":"10.1016\/S1570-8705(03)00013-1_BIB253","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1109\/PROC.1987.13707","article-title":"Future directions in packet radio architectures and protocols","volume":"75","author":"Shacham","year":"1987","journal-title":"Proceedings of the IEEE"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB254","unstructured":"J. Strater, B. Wollman, OSPF Modeling and Test Results and Recommendations, Mitre Technical Report 96W0000017, Xerox Office Products Division, March 1996"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB255","doi-asserted-by":"crossref","unstructured":"S. Singh, M. Woo, C.S. Raghavendra, Poweraware routing in mobile ad hoc networks, in: Proceedings of the Fourth Annual ACM\/IEEE International Conference on Mobile Computing and Networking (MOBICOM \u201998), Dallas, TX, October 25\u201330, 1998, pp. 181\u2013190","DOI":"10.1145\/288235.288286"},{"issue":"6","key":"10.1016\/S1570-8705(03)00013-1_BIB256","doi-asserted-by":"crossref","DOI":"10.1109\/35.925682","article-title":"Maximum battery life routing to support ubiquitous mobile computing in wireless ad hoc networks","volume":"39","author":"Toh","year":"2001","journal-title":"IEEE Communications Magazine"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB257","series-title":"Ad Hoc Mobile Wireless Networks: Protocols and Systems","author":"Toh","year":"2002"},{"issue":"4","key":"10.1016\/S1570-8705(03)00013-1_BIB258","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1145\/52325.52329","article-title":"The Landmark Hierarchy: a new hierarchy for routing in very large networks","volume":"18","author":"Tsuchiya","year":"1988","journal-title":"Computer Communications Review"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB259","unstructured":"C. Tschudin, R. Gold, LUNAR: Lightway Underlay Network Ad Hoc Routing. Available from <http:\/\/www.docs.uu.se\/docs\/research\/projects\/selnet\/lunar\/lunar.pdf>"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB260","doi-asserted-by":"crossref","unstructured":"F. Talucci, M. Gerla, MACA-BI (MACA By Invitation) A wireless MAC protocol for high speed ad hoc networking, in: Proceedings of ICUPC\u201997, November 1997","DOI":"10.1109\/ICUPC.1997.627296"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB261","doi-asserted-by":"crossref","unstructured":"K. Tang, M. Gerla, Fair sharing of MAC under TCP in wireless ad hoc networks, in: Proceedings of IEEE MMT\u201999, Venice (I), October 1999","DOI":"10.1007\/978-1-4757-5920-4_24"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB262","series-title":"The Handbook of Ad Hoc Wireless Networks","article-title":"Location-aware routing and applications of mobile ad hoc networks","author":"Tseng","year":"2003"},{"issue":"12","key":"10.1016\/S1570-8705(03)00013-1_BIB263","doi-asserted-by":"crossref","first-page":"1417","DOI":"10.1109\/TCOM.1975.1092767","article-title":"Packet switching in radio channels: Part II\u2013\u2013the hidden terminal problem in carrier sense multiple access modes and the busy tone solution","volume":"23","author":"Tobagi","year":"1975","journal-title":"IEEE Transactions on Communications"},{"issue":"3","key":"10.1016\/S1570-8705(03)00013-1_BIB264","doi-asserted-by":"crossref","first-page":"246","DOI":"10.1109\/TCOM.1984.1096061","article-title":"Optimal transmission ranges for randomly distributed packet radio terminals","volume":"32","author":"Takagi","year":"1984","journal-title":"IEEE Transactions on Communications"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB265","doi-asserted-by":"crossref","unstructured":"M. Takai, J. Martin, R. Bagrodia, A. Ren, Directional virtual carrier sensing for directional antennas in mobile ad hoc networks, in: Proceedings of ACM MobiHoc, June 2002","DOI":"10.1145\/513800.513823"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB266","unstructured":"A. Urpi, M.A. Bonuccelli, S. Giordano, Modeling cooperation in mobile ad hoc networks: a formal description of selfishness, in: Proceedings of WiOpt 2003, Sophie-Antipolis, March 2003"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB267","doi-asserted-by":"crossref","DOI":"10.1080\/13658810110061162","article-title":"Nearness relations in environmental space","author":"Worboys","year":"2001","journal-title":"International Journal of Geographical Information Systems"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB268","series-title":"The Computer for the Twenty-First Century","author":"Weiser","year":"1991"},{"issue":"1","key":"10.1016\/S1570-8705(03)00013-1_BIB269","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1109\/JCN.2002.6596934","article-title":"On calculating poweraware connected dominating sets for efficient routing in ad hoc wireless networks","volume":"4","author":"Wu","year":"2002","journal-title":"IEEE\/KICS Journal of Communications and Networks"},{"issue":"3","key":"10.1016\/S1570-8705(03)00013-1_BIB270","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/98.683738","article-title":"Power-saving mechanisms in emerging standards for wireless LAN\u2019s: the MAC-Level perspective","volume":"5","author":"Woesner","year":"1998","journal-title":"IEEE Personal Communications (Special Edition on Power Saving)"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB271","unstructured":"Kui Wu, Janelle Harms, QoS support in mobile ad hoc networks, Crossing Boundaries, 1 (1) (2001). Available from <http:\/\/www.ualberta.ca\/~gsa\/ejournal\/vol01n01\/vol01n01.htm>"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB272","doi-asserted-by":"crossref","unstructured":"J. Wu, H. Li, On calculating connected dominating set for efficient routing in ad hoc wireless networks, in: Proceedings of the Third International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications, Seattle, WA, August 1999","DOI":"10.1145\/313239.313261"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB273","unstructured":"Roger Wattenhofer, Li Li, Paramvir Bahl, Yi-Min Wang, Distributed topology control for wireless multihop ad-hoc networks, Proceedings of IEEE INFOCOM, April 2001, pp. 1388\u20131397"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB274","series-title":"The Handbook of Ad Hoc Wireless Networks","article-title":"Position-based routing in ad-hoc wireless networks","author":"Widmer","year":"2003"},{"issue":"6","key":"10.1016\/S1570-8705(03)00013-1_BIB275","doi-asserted-by":"crossref","DOI":"10.1023\/A:1020716919751","article-title":"Anthony Ephremides, Energy-efficient broadcast and multicast trees in wireless networks","volume":"7","author":"Wieselthier","year":"2002","journal-title":"ACM\/Kluwer Mobile Networks and Applications"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB276","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1023\/A:1013255927445","article-title":"Performance study of access control in wireless LANs-IEEE 802.11 DFWMAC and ETSI RES 10 HIPERLAN","volume":"2","author":"Weinmiller","year":"1997","journal-title":"ACM\/Baltzer Mobile Networks and Applications"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB277","doi-asserted-by":"crossref","unstructured":"C.W. Wu, Y.C. Tay, AMRIS: a multicast protocol for ad hoc wireless networks, in: Proceedings of IEEE MILCOM \u201999, Atlantic City, 1999","DOI":"10.1109\/MILCOM.1999.822636"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB278","unstructured":"Zhifang Wang, Robert J. Thomas, Zygmunt Haas, Bluenet\u2013\u2013a new scatternet formation scheme, in: Proceedings of HICSS-35, Big Island, Hawaii, January 2002"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB279","unstructured":"M. Weiser, B. Welch, A. Demers, S. Shenker, Scheduling for reducing cpu energy, in: Proceedings of the USENIX First Symposium on Operating System Design and Implementation, Monterey, CA, 1994, pp. 13\u201323"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB280","unstructured":"Wireless World Research Forum (WWRF): http:\/\/www.ist-wsi.org"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB281","doi-asserted-by":"crossref","unstructured":"Feng Wang, Yongguang Zhang, Improving TCP performance over mobile ad-hoc networks with out-of-order detection and response, in: Proceedings of the Third ACM International Symposium on Mobile Ad Hoc Networking & Computing (MobiHoc 2002), Lausanne, Switzerland, 2002","DOI":"10.1145\/513800.513827"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB282","unstructured":"K. Xu, M. Gerla, TCP over an IEEE 802.11 ad hoc network: unfairness problems and solutions, UCLA Computer Science Department Technical Report\u2013\u2013020019, May 2002"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB283","unstructured":"Ya Xu, John Heidemann, Deborah Estrin, Adaptive energy conserving routing for multihop ad hoc networks, Technical Report 527, USC\/Information Sciences Institute, October 2000"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB284","doi-asserted-by":"crossref","unstructured":"Ya Xu, John Heidemann, Deborah Estrin, Geography-informed energy conservation for ad hoc routing, in: Proceedings of 7th Annual International Conference on Mobile Computing and Networking, July 2001, pp. 70\u201384","DOI":"10.1145\/381677.381685"},{"issue":"6","key":"10.1016\/S1570-8705(03)00013-1_BIB285","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1109\/35.925681","article-title":"Does the IEEE 802.11 MAC protocol work well in multihop wireless ad hoc networks?","volume":"39","author":"Xu","year":"2001","journal-title":"IEEE Communication Magazine"},{"issue":"4","key":"10.1016\/S1570-8705(03)00013-1_BIB286","doi-asserted-by":"crossref","DOI":"10.1016\/S1389-1286(01)00273-0","article-title":"Revealing the problems with 802.11 MAC protocol in multi-hop wireless networks","volume":"38","author":"Xu","year":"2002","journal-title":"Computer Networks"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB287","unstructured":"H. Xiao, W.K.G. Seah, A. Lo, K.C. Chua, A flexible quality of service model for mobile ad-hoc networks, IEEE VTC2000-spring, Tokyo, Japan, May 2000"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB288","doi-asserted-by":"crossref","unstructured":"Jungkeun Yoon, Mingyan Liu, Brian Noble, Random waypoint considered harmful, in: Proceedings of INFOCOM 2003, San Francisco, April 2003","DOI":"10.1109\/INFCOM.2003.1208967"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB289","unstructured":"Xin Yuan, Arif Saifee, Path selection methods for localized quality of service routing, in: Proceedings of IEEE ICCCN2001, Scottsdale, AZ, October, 2001"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB290","doi-asserted-by":"crossref","unstructured":"M.G. Zapata, N. Asokan, Securing ad hoc routing protocols, in: Proceedings of ACM Workshop on Wireless Security (WiSe), Atlanta, September 2002","DOI":"10.1145\/570681.570682"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB291","unstructured":"G. Z\u00e1ruba, S. Basagni, I. Chlamtac, BlueTrees-scatternet formation to enable Bluetooth-based personal area networks, in: Proceedings of the IEEE International Conference on Communications, ICC 2001, Helsinki, Finland, June 11\u201314, 2001"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB292","unstructured":"Chenxi Zhu, M. Scott Corson, A five-phase reervation protocol (FPRP) for mobile ad hoc networks, in: Proceedings of INFOCOM 1998, pp. 322\u2013331"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB293","series-title":"Ad Hoc Networking","article-title":"Off-the-shelf enablers of ad hoc networks","author":"Zaruba","year":"2003"},{"issue":"6","key":"10.1016\/S1570-8705(03)00013-1_BIB294","article-title":"Securing ad hoc networks","volume":"13","author":"Zhou","year":"1999","journal-title":"IEEE Network Magazine"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB295","doi-asserted-by":"crossref","unstructured":"Y. Zhang, W. Lee, Intrusion detection in wireless ad-hoc networks, in: Proceedings of the Sixth ACM International Conference on Mobile Computing and Networking (MOBICOM 2000), Boston, MA, USA, August 6\u201311, 2000","DOI":"10.1145\/345910.345958"},{"issue":"5","key":"10.1016\/S1570-8705(03)00013-1_BIB296","article-title":"Intrusion detection techniques for mobile wireless networks","volume":"9","author":"Zhang","year":"2003","journal-title":"ACM\/Kluwer Mobile Networks and Applications (MONET)"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB297","doi-asserted-by":"crossref","unstructured":"M. Zorzi, R.R. Rao, Energy constrained error control for wireless channels, in: Proceeding of IEEE GLOBECOM \u201996, London, UK, November 1996, pp. 1411\u20131416","DOI":"10.1109\/GLOCOM.1996.587678"},{"key":"10.1016\/S1570-8705(03)00013-1_BIB298","doi-asserted-by":"crossref","unstructured":"Gil Zussman, Adrian Segall, Capacity assignment in Bluetooth scatternets\u2013\u2013analysis and algorithms, in: Proceedings of Networking 2002, Lecture Notes in Computer Science, vol. 2345, Springer, Berlin, 2002","DOI":"10.1007\/3-540-47906-6_33"}],"container-title":["Ad Hoc Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1570870503000131?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1570870503000131?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T13:41:31Z","timestamp":1704894091000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1570870503000131"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,7]]},"references-count":298,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2003,7]]}},"alternative-id":["S1570870503000131"],"URL":"https:\/\/doi.org\/10.1016\/s1570-8705(03)00013-1","relation":{},"ISSN":["1570-8705"],"issn-type":[{"value":"1570-8705","type":"print"}],"subject":[],"published":{"date-parts":[[2003,7]]}}}