{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T10:23:27Z","timestamp":1725704607822},"reference-count":61,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,10,13]],"date-time":"2020-10-13T00:00:00Z","timestamp":1602547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,10,13]],"date-time":"2020-10-13T00:00:00Z","timestamp":1602547200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,10,13]],"date-time":"2020-10-13T00:00:00Z","timestamp":1602547200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,10,13]]},"DOI":"10.1109\/icnp49622.2020.9259370","type":"proceedings-article","created":{"date-parts":[[2020,11,20]],"date-time":"2020-11-20T20:56:20Z","timestamp":1605905780000},"page":"1-12","source":"Crossref","is-referenced-by-count":2,"title":["CoNICE: Consensus in Intermittently-Connected Environments by Exploiting Naming with Application to Emergency Response"],"prefix":"10.1109","author":[{"given":"Mohammad","family":"Jahanian","sequence":"first","affiliation":[]},{"given":"K. K.","family":"Ramakrishnan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"56","article-title":"Timestamps in message-passing systems that preserve the partial ordering","author":"fidge","year":"1988","journal-title":"Proc 11th Australian Computer Science Conf"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3364697"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/6462826"},{"key":"ref32","first-page":"100","article-title":"Social-aware opportunistic routing protocol based on user&#x2019;s interactions and interests","author":"moreira","year":"2013","journal-title":"Proceedings of the International Conference on Ad Hoc Networks"},{"key":"ref31","first-page":"1","article-title":"Opportunistic routing based on daily routines","author":"moreira","year":"2012","journal-title":"2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.246"},{"key":"ref37","article-title":"Network time with a consensus on clock","author":"alper","year":"2019","journal-title":"Cryptology ePrint Archive Report"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2008.4753512"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046719"},{"key":"ref34","first-page":"262","article-title":"Global causal ordering with minimal latency","author":"koch","year":"1998","journal-title":"International Conference on Parallel and Distributed Computing and Networking"},{"year":"0","key":"ref60","article-title":"Subdivisions of helsinki"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.SIMUTOOLS2009.5674"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-27767-5_24"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2010.2043113"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.9790\/0661-0823236"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/863956.863960"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/LANMAN.2018.8475116"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2019.8888047"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3290387"},{"key":"ref21","first-page":"1","article-title":"Introduction to azure cosmos db","author":"paz","year":"2018","journal-title":"Microsoft Azure Cosmos DB Revealed"},{"article-title":"Epidemic routing for partially connected ad hoc networks","year":"2000","author":"vahdat","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3844\/jcssp.2016.141.152"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1080139.1080143"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2006.876186"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30145-5_8"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2019.00057"},{"key":"ref59","first-page":"135","article-title":"Consensus with unknown partici- pants or fundamental self-organization","author":"cavin","year":"2004","journal-title":"International Conference on Ad-Hoc Networks and Wireless"},{"key":"ref58","article-title":"Conice: Consensus in intermittently-connected environments by exploiting naming with application to emergency response","author":"jahanian","year":"2020","journal-title":"University of California Riverside USA Tech Rep"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2749508"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/CIC.2018.00034"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/358790.358797"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC\/SmartCity\/DSS.2018.00163"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3357150.3357396"},{"journal-title":"Blockchain Blueprint for a New Economy","year":"2015","author":"swan","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2008.21"},{"key":"ref40","first-page":"215","article-title":"Virtual time and global states of distributed systems","author":"mattern","year":"1989","journal-title":"Parallel and Distributed Algorithms"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2684464.2684479"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s00446-009-0084-6"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658941"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656887"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ANCS.2011.27"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2014.6849271"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/LANMAN.2016.7548856"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2019.2901487"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2375934"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.04.007"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/359545.359563"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15260-3"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/279227.279229"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/168619.168623"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/2810156.2810162"},{"key":"ref9","first-page":"305","article-title":"In search of an understandable consensus algorithm","author":"ongaro","year":"2014","journal-title":"2014 USENIX Annual Technical Conference (USENIX ATC&#x2019;14)"},{"key":"ref46","first-page":"143152","article-title":"Round-by-round fault detectors (extended abstract) unifying synchrony and asynchrony","author":"gafni","year":"1998","journal-title":"Proceedings of the Seventh Annual ACM Symposium on Principles of Distributed Computing"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/226643.226647"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3357150.3357406"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44743-1_4"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2391229.2391251"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(92)90028-T"},{"key":"ref44","article-title":"Paxos made simple","author":"lamport","year":"2001","journal-title":"ACM SIGACT News"},{"key":"ref43","article-title":"Causal order protocols for group communication","author":"de ara\u00fajo mac\u00eado","year":"1995","journal-title":"Proc of Brazilian Symp nn Computer Networks (SBRC)"}],"event":{"name":"2020 IEEE 28th International Conference on Network Protocols (ICNP)","start":{"date-parts":[[2020,10,13]]},"location":"Madrid, Spain","end":{"date-parts":[[2020,10,16]]}},"container-title":["2020 IEEE 28th International Conference on Network Protocols (ICNP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9259328\/9259327\/09259370.pdf?arnumber=9259370","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T00:23:24Z","timestamp":1656375804000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9259370\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,13]]},"references-count":61,"URL":"https:\/\/doi.org\/10.1109\/icnp49622.2020.9259370","relation":{},"subject":[],"published":{"date-parts":[[2020,10,13]]}}}