{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T20:37:49Z","timestamp":1725655069617},"reference-count":56,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,1]]},"DOI":"10.1109\/iccnc.2012.6167492","type":"proceedings-article","created":{"date-parts":[[2012,8,15]],"date-time":"2012-08-15T20:14:52Z","timestamp":1345061692000},"page":"593-598","source":"Crossref","is-referenced-by-count":10,"title":["Research on wireless multi-hop networks: Current state and challenges"],"prefix":"10.1109","author":[{"given":"Guoqiang","family":"Mao","sequence":"first","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"35","DOI":"10.1145\/635506.605408"},{"key":"36","first-page":"10","article-title":"Glacial environment monitoring using sensor networks","author":"padhy","year":"0","journal-title":"Proc 1st REALWSN"},{"doi-asserted-by":"publisher","key":"33","DOI":"10.1109\/TMC.2006.139"},{"key":"34","first-page":"503","article-title":"The design and evaluation of a hybrid sensor network for cane-toad monitoring","author":"hu","year":"0","journal-title":"Proc 4th Int Symp Inf Process Sens Netw"},{"doi-asserted-by":"publisher","key":"39","DOI":"10.1109\/TVT.2009.2026480"},{"doi-asserted-by":"publisher","key":"37","DOI":"10.1007\/11502593_36"},{"key":"38","first-page":"2101","article-title":"Delay-tolerant collaborations among campus wide wireless users","author":"yu","year":"0","journal-title":"IEEE INFOCOM"},{"doi-asserted-by":"publisher","key":"43","DOI":"10.1109\/INFCOM.2010.5462072"},{"doi-asserted-by":"publisher","key":"42","DOI":"10.1109\/TIT.2006.890791"},{"doi-asserted-by":"publisher","key":"41","DOI":"10.1109\/INFCOM.2003.1208989"},{"doi-asserted-by":"publisher","key":"40","DOI":"10.1109\/INFCOM.2009.5062186"},{"year":"2002","author":"rappaport","journal-title":"Wireless Communications Principles and Practice","key":"22"},{"doi-asserted-by":"publisher","key":"23","DOI":"10.1109\/TNET.2005.845546"},{"doi-asserted-by":"publisher","key":"24","DOI":"10.1109\/JSAC.2009.090918"},{"doi-asserted-by":"publisher","key":"25","DOI":"10.1109\/TNET.2008.2006224"},{"doi-asserted-by":"publisher","key":"26","DOI":"10.1109\/INFOCOM.2008.11"},{"key":"27","article-title":"Connectivity of large scale networks: Distribution of isolated nodes","author":"mao","year":"2011","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"28","article-title":"Connectivity of large scale networks: Emergence of unique unbounded component","author":"mao","year":"2011","journal-title":"IEEE Transactions on Mobile Computing"},{"doi-asserted-by":"publisher","key":"29","DOI":"10.1109\/TNET.2011.2160650"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1093\/acprof:oso\/9780198506263.001.0001"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1109\/JSAC.2009.090902"},{"key":"1","first-page":"547","author":"gupta","year":"1998","journal-title":"Critical Power for Asymptotic Connectivity in Wireless Networks"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1109\/TMC.2004.23"},{"year":"2007","author":"franceschetti","journal-title":"Random Networks for Communication","key":"30"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1109\/18.42219"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1023\/B:WINE.0000013081.09837.c0"},{"doi-asserted-by":"publisher","key":"32","DOI":"10.1109\/18.825799"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1002\/(SICI)1098-2418(199909)15:2<145::AID-RSA2>3.0.CO;2-G"},{"key":"31","first-page":"1","article-title":"Connectivity of wireless csma multihop networks","author":"yang","year":"0","journal-title":"IEEE International Conference on Communications"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1239\/aap\/1240319574"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1239\/aap\/1113402397"},{"doi-asserted-by":"publisher","key":"56","DOI":"10.1109\/WCNC.2009.4917738"},{"doi-asserted-by":"publisher","key":"19","DOI":"10.1109\/TWC.2007.060842"},{"doi-asserted-by":"publisher","key":"55","DOI":"10.1109\/INFCOM.2004.1354532"},{"doi-asserted-by":"publisher","key":"17","DOI":"10.1109\/TCOMM.2003.810833"},{"doi-asserted-by":"publisher","key":"18","DOI":"10.1109\/INFCOM.2005.1497917"},{"doi-asserted-by":"publisher","key":"15","DOI":"10.1017\/CBO9780511895357"},{"doi-asserted-by":"publisher","key":"16","DOI":"10.1007\/s11036-006-5188-7"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1214\/aoap\/1034625335"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1214\/aop\/1022677261"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1145\/513800.513811"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1109\/AERO.2003.1235249"},{"doi-asserted-by":"publisher","key":"21","DOI":"10.1007\/s11276-005-3513-x"},{"key":"20","article-title":"Failure-resilient ad hoc and sensor networks in a shadow fading environment","author":"bettstetter","year":"0","journal-title":"The International Conference on Dependable Systems and Networks"},{"doi-asserted-by":"publisher","key":"49","DOI":"10.1109\/INFCOM.2002.1019356"},{"doi-asserted-by":"publisher","key":"48","DOI":"10.1109\/GLOCOM.2007.246"},{"doi-asserted-by":"publisher","key":"45","DOI":"10.1145\/1614320.1614334"},{"doi-asserted-by":"publisher","key":"44","DOI":"10.1109\/IDC.2007.374554"},{"doi-asserted-by":"publisher","key":"47","DOI":"10.1109\/JSAC.2011.110114"},{"doi-asserted-by":"publisher","key":"46","DOI":"10.1109\/LCOMM.2010.092310.101298"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1093\/comjnl\/47.4.432"},{"doi-asserted-by":"publisher","key":"51","DOI":"10.1109\/TNET.2002.801403"},{"doi-asserted-by":"publisher","key":"52","DOI":"10.1109\/TNET.2007.905154"},{"doi-asserted-by":"publisher","key":"53","DOI":"10.1109\/TIT.2005.847717"},{"doi-asserted-by":"publisher","key":"54","DOI":"10.1109\/INFCOM.2004.1354518"},{"doi-asserted-by":"publisher","key":"50","DOI":"10.1109\/MCOM.2009.5273815"}],"event":{"name":"2012 International Conference on Computing, Networking and Communications (ICNC)","start":{"date-parts":[[2012,1,30]]},"location":"Maui, HI, USA","end":{"date-parts":[[2012,2,2]]}},"container-title":["2012 International Conference on Computing, Networking and Communications (ICNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6163567\/6167355\/06167492.pdf?arnumber=6167492","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T15:01:03Z","timestamp":1490108463000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6167492\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,1]]},"references-count":56,"URL":"https:\/\/doi.org\/10.1109\/iccnc.2012.6167492","relation":{},"subject":[],"published":{"date-parts":[[2012,1]]}}}