{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T05:10:47Z","timestamp":1725513047185},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,8]]},"DOI":"10.1109\/chinacom.2012.6417465","type":"proceedings-article","created":{"date-parts":[[2013,1,30]],"date-time":"2013-01-30T17:52:09Z","timestamp":1359568329000},"page":"144-149","source":"Crossref","is-referenced-by-count":0,"title":["Message delivery probability of two-hop relay with erasure coding in MANETs"],"prefix":"10.1109","author":[{"family":"Jiajia Liu","sequence":"first","affiliation":[]},{"family":"Xiaohong Jiang","sequence":"additional","affiliation":[]},{"given":"H.","family":"Nishiyama","sequence":"additional","affiliation":[]},{"given":"N.","family":"Kato","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Simulator for the General Two-hop Relay Algorithm with Erasure Coding","year":"0","key":"17"},{"journal-title":"The Network Simulator ns-2","year":"0","key":"18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.828055"},{"journal-title":"Introduction to Probability Second Revised Edition","year":"1997","author":"grinstead","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1080139.1080140"},{"key":"14","article-title":"Simple models for the performance evaluation of a class of two-hop relay protocols","author":"hanbali","year":"2007","journal-title":"Proc IFIP Networking"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2011.020811.090163"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/18.825799"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.874379"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2001.916631"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2011.5762818"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/WIOPT.2007.4480026"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2187923"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.847717"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2011.062111.101976"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.890720"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195580"},{"key":"8","article-title":"End-to-end delay in mobile ad hoc networks with generalized transmission range and limited packet redundancy","author":"liu","year":"2012","journal-title":"WCNC"}],"event":{"name":"2012 7th International ICST Conference on Communications and Networking in China (CHINACOM 2012)","start":{"date-parts":[[2012,8,8]]},"location":"Kun Ming","end":{"date-parts":[[2012,8,10]]}},"container-title":["7th International Conference on Communications and Networking in China"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6410218\/6417432\/06417465.pdf?arnumber=6417465","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T16:08:19Z","timestamp":1490112499000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6417465\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,8]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/chinacom.2012.6417465","relation":{},"subject":[],"published":{"date-parts":[[2012,8]]}}}