{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T18:05:35Z","timestamp":1774375535611,"version":"3.50.1"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1109\/ictc.2012.6386780","type":"proceedings-article","created":{"date-parts":[[2013,1,2]],"date-time":"2013-01-02T23:14:36Z","timestamp":1357168476000},"page":"61-65","source":"Crossref","is-referenced-by-count":1,"title":["Percolation theory aided data diffusion for mobile wireless networks"],"prefix":"10.1109","author":[{"given":"Guiping","family":"He","sequence":"first","affiliation":[]},{"given":"Qinghai","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Fenglin","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Kyung Sup","family":"Kwak","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-03981-6","author":"grimmett","year":"1999","journal-title":"Percolation Second Edition"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/0304-4149(88)90083-X"},{"key":"11","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1504\/IJAACS.2008.019198","article-title":"An analytical study of fundamental mobility properties for encounter-based protocols","volume":"1","author":"spyropoulos","year":"2007","journal-title":"International Journal of Autonomous and Adaptive Communications Systems"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2008.98"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.03.017"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2011.6134272"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2009.5425768"},{"key":"10","author":"trapman","year":"2010","journal-title":"Bounding Basic Characteristics of Spatial Epidemics with A New Percolation Model"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.tpb.2006.11.002"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.66.016128"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1239\/jap\/1214950363"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.76.036113"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498550"},{"key":"8","doi-asserted-by":"crossref","first-page":"722","DOI":"10.1214\/aoap\/1050689601","article-title":"Covering algorithms, continuum percolation and the geometry of wireless networks","volume":"13","author":"booth","year":"2003","journal-title":"Annals of Applied Probability"}],"event":{"name":"2012 International Conference on ICT Convergence (ICTC)","location":"Jeju, Korea (South)","start":{"date-parts":[[2012,10,15]]},"end":{"date-parts":[[2012,10,17]]}},"container-title":["2012 International Conference on ICT Convergence (ICTC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6375583\/6386757\/06386780.pdf?arnumber=6386780","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,7]],"date-time":"2019-07-07T17:10:13Z","timestamp":1562519413000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6386780\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/ictc.2012.6386780","relation":{},"subject":[],"published":{"date-parts":[[2012,10]]}}}