{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:51:08Z","timestamp":1729637468269,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,4]]},"DOI":"10.1109\/infcom.2013.6567046","type":"proceedings-article","created":{"date-parts":[[2013,8,1]],"date-time":"2013-08-01T20:12:57Z","timestamp":1375387977000},"page":"1409-1417","source":"Crossref","is-referenced-by-count":7,"title":["Compact conformal map for greedy routing in wireless mobile sensor networks"],"prefix":"10.1109","author":[{"given":"Siming","family":"Li","sequence":"first","affiliation":[]},{"given":"Wei","family":"Zeng","sequence":"additional","affiliation":[]},{"given":"Dengpan","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"David Xianfeng","family":"Gu","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Gao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Greedy Embeddings Trees and Euclidean Vs Lobachevsky Geometry","year":"2006","author":"maymounkov","key":"19"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/938994.938996"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.221"},{"key":"23","first-page":"97","article-title":"Greedy routing with guaranteed delivery using ricci flows","author":"sarkar","year":"2009","journal-title":"Proc of the 8th International Symposium on Information Processing in Sensor Networks (IPSN'09)"},{"key":"18","first-page":"337","article-title":"Some results on greedy embeddings in metric spaces","author":"leighton","year":"2008","journal-title":"Proc of the 49th IEEE Annual Symposium on Foundations of Computer Science"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/984622.984633"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345953"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1080810.1080818"},{"key":"13","doi-asserted-by":"crossref","first-page":"255","DOI":"10.4310\/jdg\/1214436922","article-title":"Three manifolds with positive ricci curvature","volume":"17","author":"hamilton","year":"1982","journal-title":"Journal of Differential Geometry"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611973082.115"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062093"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2002.801403"},{"key":"21","article-title":"The entropy formula for the ricci flow and its geometric applications","author":"perelman","year":"2002","journal-title":"Technical Report ArXiv org"},{"key":"3","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1145\/288235.288256","article-title":"A performance comparison of multi-hop wireless ad hoc network routing protocols","author":"broch","year":"1998","journal-title":"Proc of the ACM\/IEEE Mobile Computing and Networking (MobiCom"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2005.06.022"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1023\/A:1012319418150"},{"key":"1","first-page":"26","article-title":"an algorithm to construct greedy drawings of triangulations","author":"angelini","year":"2008","journal-title":"Proc of the 16th International Symposium on Graph Drawing"},{"key":"10","first-page":"14","article-title":"Succinct greedy graph drawing in the hyperbolic plane","author":"eppstein","year":"2008","journal-title":"Proc of the 16th International Symposium on Graph Drawing"},{"key":"7","doi-asserted-by":"crossref","first-page":"1369","DOI":"10.1137\/100816912","article-title":"Numerical computation of the schwarzchristoffel transformation for multiply connected domains","volume":"33","author":"delillo","year":"2011","journal-title":"SIAM J on Scientific Computing"},{"key":"6","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-03427-9","author":"de berg","year":"1997","journal-title":"Computational Geometry Algorithms and Applications"},{"key":"5","doi-asserted-by":"crossref","first-page":"325","DOI":"10.4310\/jdg\/1214446319","article-title":"The ricci flow on the 2-sphere","volume":"33","author":"chow","year":"1991","journal-title":"J Differential Geom"},{"journal-title":"Numerical Methods for Ordinary Differential Equations","year":"2002","author":"butcher","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511546808"},{"key":"8","first-page":"102","article-title":"Greedy drawings of triangulations","author":"dhandapani","year":"2008","journal-title":"SODA '08 Proceedings of the Nineteenth Annual ACM SIAM Symposium on Discrete Algorithms"}],"event":{"name":"IEEE INFOCOM 2013 - IEEE Conference on Computer Communications","start":{"date-parts":[[2013,4,14]]},"location":"Turin, Italy","end":{"date-parts":[[2013,4,19]]}},"container-title":["2013 Proceedings IEEE INFOCOM"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6556116\/6566708\/06567046.pdf?arnumber=6567046","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T08:51:02Z","timestamp":1596271862000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6567046\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/infcom.2013.6567046","relation":{},"subject":[],"published":{"date-parts":[[2013,4]]}}}