{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:30:17Z","timestamp":1725489017309},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1109\/dsn.2004.1311949","type":"proceedings-article","created":{"date-parts":[[2004,11,13]],"date-time":"2004-11-13T00:14:14Z","timestamp":1100304854000},"page":"785-794","source":"Crossref","is-referenced-by-count":4,"title":["Evaluating the impact of limited resource on the performance of flooding in wireless sensor networks"],"prefix":"10.1109","author":[{"given":"P.","family":"Downey","sequence":"first","affiliation":[]},{"given":"R.","family":"Cardell-Oliver","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1145\/958492.958494"},{"key":"ref11","article-title":"The behaviour of a flooding protocol in a wireless sensor network","author":"downey","year":"2003","journal-title":"School of Computer Science & Software Engineering"},{"year":"2003","author":"fall","journal-title":"The ns manual","key":"ref12"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/65.103807"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1145\/958503.958506"},{"year":"2003","author":"woo","article-title":"Connectivity experiment","key":"ref15"},{"year":"2003","author":"cardell-oliver","article-title":"Analysis of experimental transmission footprint data","key":"ref16"},{"key":"ref17","article-title":"Scale: A tool for simple connectivity assessment in lossy environments","author":"cerpa","year":"0","journal-title":"Draft paper from Alberto Cerpa"},{"year":"1996","author":"tanenbaum","journal-title":"Computer Networks","key":"ref18"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1145\/378993.379006"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/WSC.2002.1172947"},{"year":"0","author":"levis","article-title":"Nido system description","key":"ref3"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/AERO.2003.1235250"},{"key":"ref5","article-title":"Emstar: An environment for developing wireless embedded systems software","author":"elson","year":"2003","journal-title":"CENS Technical Report 0009"},{"year":"2003","author":"ganesan","article-title":"An empirical study of epidemic algorithms in large scale multihop wireless networks","key":"ref8"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1145\/584490.584499"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1145\/278009.278027"},{"year":"2003","journal-title":"Information Sciences Institute","article-title":"The Network Simulator - ns-2","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1145\/570738.570751"},{"year":"0","article-title":"Mica motes","key":"ref20"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/WCNC.2003.1200529"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1145\/313451.313525"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1145\/570758.570768"}],"event":{"name":"International Conference on Dependable Systems and Networks, 2004","start":{"date-parts":[[2004,7,1]]},"location":"Florence, Italy","end":{"date-parts":[[2004,7,1]]}},"container-title":["International Conference on Dependable Systems and Networks, 2004"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9172\/29105\/01311949.pdf?arnumber=1311949","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,13]],"date-time":"2017-03-13T17:09:28Z","timestamp":1489424968000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1311949\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/dsn.2004.1311949","relation":{},"subject":[],"published":{"date-parts":[[2004]]}}}