{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T01:17:10Z","timestamp":1725671830268},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1109\/ictc.2014.6983105","type":"proceedings-article","created":{"date-parts":[[2014,12,30]],"date-time":"2014-12-30T18:52:42Z","timestamp":1419965562000},"page":"151-156","source":"Crossref","is-referenced-by-count":4,"title":["TMAC &amp;#x2014; Token based MAC protocol for cognitive radio wireless mesh network"],"prefix":"10.1109","author":[{"given":"Ramesh Babu","family":"Battula","sequence":"first","affiliation":[]},{"given":"Dinesh","family":"Gopalani","sequence":"additional","affiliation":[]},{"given":"Manoj Singh","family":"Gaur","sequence":"additional","affiliation":[]},{"given":"Jagadeesh","family":"Kakarla","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Vulnerabilities of Cognitive Radio MAC Protocols and Countermeasures","year":"0","author":"zhang","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1186\/1687-6180-2013-69"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2010.2091941"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2009.5235370"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2010.12.004"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.8.11.2478-2490"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2007.70758"},{"journal-title":"Cognitive Radio Network Architecture Part I-General Structure","year":"0","author":"chen","key":"2"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.929286"},{"journal-title":"On the Spectrum Handoff for Cognitive Radio Ad Hoc Networks Without Common Control Channel","year":"0","author":"song","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.111510.00108"},{"key":"6","first-page":"245","article-title":"dynamic spectrum access in cognitive radio","author":"tabakovic","year":"2009","journal-title":"2009 International Symposium ELMAR elmar"},{"journal-title":"A Survey on MAC Protocols for Cognitive Radio Networks","year":"2009","author":"cormio","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/s11633-013-0695-z"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2007.25"},{"key":"8","article-title":"Cognitive radio mac protocol for wlan","author":"zhang","year":"0","journal-title":"Department of Communication Optics & Materials"}],"event":{"name":"2014 International Conference on Information and Communication Technology Convergence (ICTC)","start":{"date-parts":[[2014,10,22]]},"location":"Busan, South Korea","end":{"date-parts":[[2014,10,24]]}},"container-title":["2014 International Conference on Information and Communication Technology Convergence (ICTC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6966882\/6983064\/06983105.pdf?arnumber=6983105","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T00:24:47Z","timestamp":1490315087000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6983105\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/ictc.2014.6983105","relation":{},"subject":[],"published":{"date-parts":[[2014,10]]}}}