{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T18:08:21Z","timestamp":1730225301306,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/hpcsim.2013.6641499","type":"proceedings-article","created":{"date-parts":[[2013,10,29]],"date-time":"2013-10-29T23:23:43Z","timestamp":1383089023000},"page":"705-707","source":"Crossref","is-referenced-by-count":7,"title":["Broadcasting approaches for Mobile Ad hoc Networks"],"prefix":"10.1109","author":[{"given":"Mohamed","family":"Bakhouya","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2011.6093247"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2007.07.011"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2009.4784894"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1002\/0471791571"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2007.907072"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2004.01.011"},{"key":"14","article-title":"Radio-resource management and access-control mechanism based on a novel economic model in heterogeneous wireless networks","volume":"59","author":"pei","year":"2010","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2011.5706315"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2004.01.011"},{"journal-title":"Standard for Safety Levels with Respect to Human Exposure to Radio Frequency Electromagnetic Fields","year":"2005","key":"21"},{"key":"20","first-page":"12","article-title":"Conclusions on mobile phones and radio frequency fields","year":"2008","journal-title":"European Commission Scientific Committee on Emerging and Newly Identified Health Risks (SCENIHR) Retrieved"},{"journal-title":"Federal Office for Radiation Protection","article-title":"Precaution regarding electromagnetic fields","year":"0","key":"22"},{"key":"23","first-page":"272","article-title":"Certificate-based encryption and the certificate revocation problem","author":"gentry","year":"2003","journal-title":"Proceedings of Theory and Application of Cryptographic Techniques -EUROCRYPT"},{"key":"24","first-page":"1916","article-title":"ARSA: An attack-resilient security architecture for multihop wireless mesh networks","volume":"24","author":"zhang","year":"2006","journal-title":"IEEE JSAC"},{"key":"25","article-title":"Lessons learned from an extensive spectrum occupancy measurement campaign and a stochastic duty cycle model","author":"wellens","year":"2009","journal-title":"Springer Mobile Networks and Applications"},{"key":"26","article-title":"Statistical spectrum occupancy modeling and validation against real-time measurements","volume":"9","author":"ghosh","year":"2010","journal-title":"IEEE Trans Wireless Commun"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2007.4292877"},{"key":"28","article-title":"Chicago spectrum occupancy measurements &analysis and a longterm studies proposal","author":"mchenry","year":"0","journal-title":"Proc ACM TAPAS'06"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2011.6093247"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2008.080102"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2004.1336724"},{"journal-title":"New Network Paradigms for Future Multihop Cellular Systems","year":"0","author":"lorenzo","key":"10"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2010.5675777"},{"journal-title":"Fundamentals of Queuing Theory","year":"1985","author":"gross","key":"30"},{"key":"7","first-page":"499","article-title":"Joint optimization of cooperative diversity and spatial reuse in multi-hop hybrid cellular\/ad hoc networks","author":"lorenzo","year":"2010","journal-title":"Proc IEEE MILCOM 2010"},{"key":"6","article-title":"Context-aware nanoscale modeling of multicast multihop cellular networks","volume":"21","author":"lorenzo","year":"2012","journal-title":"IEEE\/ACM Trans on Networking"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511814068"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.893680"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1002\/0471791571"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409964"},{"key":"9","first-page":"209","article-title":"Augmenting mobile 3g using wifi: Measurement, design, and implementation","author":"balasubramanian","year":"2010","journal-title":"Proc ACM MobiSys'10"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.05913"}],"event":{"name":"2013 International Conference on High Performance Computing & Simulation (HPCS)","start":{"date-parts":[[2013,7,1]]},"location":"Helsinki, Finland","end":{"date-parts":[[2013,7,5]]}},"container-title":["2013 International Conference on High Performance Computing &amp; Simulation (HPCS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6619547\/6641375\/06641499.pdf?arnumber=6641499","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T15:10:09Z","timestamp":1602688209000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6641499"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/hpcsim.2013.6641499","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}