{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T19:58:18Z","timestamp":1730231898919,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1109\/icc.2012.6364962","type":"proceedings-article","created":{"date-parts":[[2012,12,4]],"date-time":"2012-12-04T00:17:44Z","timestamp":1354580264000},"page":"6029-6034","source":"Crossref","is-referenced-by-count":0,"title":["Performance of two way opportunistic MAC protocol in non-saturated ad hoc networks"],"prefix":"10.1109","author":[{"given":"Rizwan","family":"Ahmad","sequence":"first","affiliation":[]},{"given":"Mazen O.","family":"Hasna","sequence":"additional","affiliation":[]},{"given":"Adnan","family":"Abu-Dayya","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/49.840210"},{"journal-title":"Performance Analysis of Relay Based Mac Protocols","year":"2010","author":"ahmad","key":"14"},{"key":"11","article-title":"RDCF: A relay-enabled medium access control protocol for wireless ad hoc networks","volume":"5","author":"zhu","year":"2006","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"12","article-title":"Performance of reliable transport protocol over IEEE 802.11 wireless LAN: Analysis and enhancement","author":"wu","year":"2002","journal-title":"Proc IEEE InfoCom"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/972374.972387"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/18.850663"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1561\/1300000004"},{"journal-title":"Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Spec High Speed Physical Layer Extension in the 2 4GHz Band","year":"1999","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2007.4454988"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2006.262068"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.901080"},{"key":"4","article-title":"Secure network coding","author":"cai","year":"2002","journal-title":"Proc ISIT"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2006.890136"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2011.6162499"}],"event":{"name":"ICC 2012 - 2012 IEEE International Conference on Communications","start":{"date-parts":[[2012,6,10]]},"location":"Ottawa, ON, Canada","end":{"date-parts":[[2012,6,15]]}},"container-title":["2012 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6350935\/6363631\/06364962.pdf?arnumber=6364962","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T17:34:45Z","timestamp":1490117685000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6364962\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/icc.2012.6364962","relation":{},"subject":[],"published":{"date-parts":[[2012,6]]}}}