{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T13:23:00Z","timestamp":1730208180215,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,7]]},"DOI":"10.1109\/cits.2014.6878958","type":"proceedings-article","created":{"date-parts":[[2014,8,20]],"date-time":"2014-08-20T20:22:40Z","timestamp":1408566160000},"page":"1-5","source":"Crossref","is-referenced-by-count":3,"title":["A novel approach for throughput analysis of multi-hop multi-rate WLANs"],"prefix":"10.1109","author":[{"given":"Bader","family":"Alkandari","sequence":"first","affiliation":[]},{"given":"Kaveh","family":"Pahlavan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Linear Programming","year":"1962","author":"hadley","key":"15"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2008.570"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/WIRELESSVITAE.2009.5172474"},{"key":"11","first-page":"151","article-title":"Relay station placement strategy","volume":"59","author":"lu","year":"2011","journal-title":"IEEE 802 16j WiMAX Networks IEEE Transactions on Communications"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2012.092712.100868"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/MCSA.1999.749276"},{"key":"2","first-page":"3336","article-title":"Experiences and measurements with multihop wireless network using aodv routing protocol","author":"suliman","year":"2003","journal-title":"URSI\/IEEE XXVIII Convention on Radio Science & IV Finnish Wireless Communications Workshop (FWCW03"},{"key":"1","article-title":"Hop of no return: Practical limitations of wireless multihop networking","author":"petrova","year":"2005","journal-title":"IEEE ICPS Workshop on Multi-hop Ad Hoc Networks From Theory to Reality REAL-MAN Santorini"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2013.6666102"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2013.2271721"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2006.286478"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2006.05043"},{"journal-title":"Priciples of Wireless Networks","year":"2002","author":"pahlavan","key":"4"},{"key":"9","article-title":"Throughput optimization using adaptive techniques, standford university","author":"yoo","year":"2006","journal-title":"Tech Rep"},{"key":"8","article-title":"Analysis of the effects of handoff on the performance of tactical communication systems using wlans","author":"makela","year":"2006","journal-title":"Proceedings of Military Communications Conference (MILCOM"}],"event":{"name":"2014 International Conference on Computer, Information and Telecommunication Systems (CITS)","start":{"date-parts":[[2014,7,7]]},"location":"Jeju, South Korea","end":{"date-parts":[[2014,7,9]]}},"container-title":["2014 International Conference on Computer, Information and Telecommunication Systems (CITS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6872769\/6878950\/06878958.pdf?arnumber=6878958","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T17:16:49Z","timestamp":1490289409000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6878958\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/cits.2014.6878958","relation":{},"subject":[],"published":{"date-parts":[[2014,7]]}}}