{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T23:48:00Z","timestamp":1729640880454,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/iwcmc.2013.6583640","type":"proceedings-article","created":{"date-parts":[[2013,8,29]],"date-time":"2013-08-29T15:31:30Z","timestamp":1377790290000},"page":"686-693","source":"Crossref","is-referenced-by-count":5,"title":["MADN - Multipath Ad-hoc Data Network prototype and experiments"],"prefix":"10.1109","author":[{"given":"Fabio","family":"Angius","sequence":"first","affiliation":[]},{"given":"Aditya","family":"Bhiday","sequence":"additional","affiliation":[]},{"given":"Mario","family":"Gerla","sequence":"additional","affiliation":[]},{"given":"Giovanni","family":"Pau","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.17"},{"key":"35","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1002\/sec.126","article-title":"Secure prophet address allocation for manets","volume":"3","author":"zhou","year":"2010","journal-title":"Security and Communication Networks"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2002.1188057"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1161252.1161254"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.3923\/jmcomm.2010.75.80"},{"key":"15","doi-asserted-by":"crossref","first-page":"2758","DOI":"10.1109\/VETECF.2003.1286080","article-title":"A special-purpose peerto-peer file sharing system for mobile ad hoc networks","volume":"4","author":"klemm","year":"2003","journal-title":"Vehicular Technology Conference 2003 VTC 2003-Fall 2003 IEEE 58th"},{"key":"34","first-page":"1059","article-title":"Efficient flooding in ad hoc networks: A comparative performance study","author":"yi","year":"2003","journal-title":"Proceedings of the IEEE International Conference on Communications"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282402"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2007.06.003"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307643"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1658978.1658980"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658941"},{"key":"21","first-page":"271","article-title":"Lt codes. Foundations of Computer Science","author":"luby","year":"2002","journal-title":"Annual IEEE Symposium on"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49543-6_14"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/1859983.1859986"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2006.248176"},{"key":"24","first-page":"78","author":"ratnasamy","year":"2002","journal-title":"GHT A Geographic Hash Table for Data-centric Storage"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/2089016.2089017"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1145\/774763.774785"},{"key":"27","first-page":"2551","volume":"14","author":"shokrollahi","year":"2006","journal-title":"Raptor Codes IEEE\/ACM Trans Netw"},{"journal-title":"Spray and Wait An Efficient Routing Scheme for Intermittently Connected Mobile Networks","year":"2005","author":"spyropoulos","key":"28"},{"journal-title":"Stream Control Transmission Protocol (SCTP)","year":"2001","author":"stewart","key":"29"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/SARNOF.2012.6222766"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/2248361.2248369"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1062689.1062733"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.172"},{"journal-title":"Haggle Seamless Networking for Mobile Applications","year":"0","author":"su","key":"30"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/S1570-8705(03)00013-1"},{"key":"6","first-page":"347","article-title":"Leveraging 1-hop neighborhood knowledge for efficient flooding in wireless ad hoc networks","author":"cai","year":"2005","journal-title":"Performance Computing and Communications Conference 2005 IPCCC 2005 24th IEEE International"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/WONS.2011.5720195"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1151659.1159954"},{"key":"31","first-page":"1300","article-title":"Atcp: Tcp for mobile ad hoc networks","volume":"19","author":"sun","year":"1999","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.228"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.WICON2008.4932"},{"volume":"4","journal-title":"The Internet Protocol Journal","year":"2001","key":"8"}],"event":{"name":"2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC 2013)","start":{"date-parts":[[2013,7,1]]},"location":"Sardinia, Italy","end":{"date-parts":[[2013,7,5]]}},"container-title":["2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6578011\/6583517\/06583640.pdf?arnumber=6583640","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,4]],"date-time":"2022-03-04T22:33:01Z","timestamp":1646433181000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6583640\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/iwcmc.2013.6583640","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}