{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T18:07:02Z","timestamp":1729620422562,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,9]]},"DOI":"10.1109\/mahss.2008.4660034","type":"proceedings-article","created":{"date-parts":[[2008,10,28]],"date-time":"2008-10-28T13:32:56Z","timestamp":1225200776000},"page":"193-202","source":"Crossref","is-referenced-by-count":3,"title":["Minimizing multi-hop wireless routing state under application-based accuracy constraints"],"prefix":"10.1109","author":[{"given":"Mustafa Omer","family":"Kilavuz","sequence":"first","affiliation":[]},{"given":"Murat","family":"Yuksel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"fisheye state routing in mobile ad hoc networks","author":"pei","year":"2000","journal-title":"Proceedings of Workshop on Wireless Networks and Mobile Computing"},{"journal-title":"How to Solve It Modern Heuristics","year":"1999","author":"michalewicz","key":"17"},{"key":"18","article-title":"landmark selection and greedy landmark-descent routing for sensor networks","author":"milosavljevic","year":"2007","journal-title":"Proceedings of IEEE Infocom"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1288107.1288131"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2004.1311672"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345953"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345931"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-585-29603-6_5"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016627727877"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/190314.190336"},{"key":"20","article-title":"ad hoc on demand distance vector (aodv) routing","author":"perkins","year":"1997","journal-title":"IETF Internet Drafts draft-ietf- manet-aodvqos-00 txt"},{"journal-title":"A compendium of NP optimization problems","year":"0","author":"crescenzi","key":"22"},{"key":"23","article-title":"hazy sighted link state (hsls) routing: a scalable link state algorithm","author":"santivanez","year":"2001","journal-title":"Technical Report BBN-TM-1301 BBN Technologies Cambridge MA"},{"key":"24","doi-asserted-by":"crossref","first-page":"1329","DOI":"10.1109\/WCNC.2000.904825","article-title":"scalable unidirectional routing with zone routing protocol","author":"sinha","year":"2000","journal-title":"Proc IEEE Wireless Communications and Networking Conf (WCNC)"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/964723.383071"},{"journal-title":"Proceedings of ACM SIGCOMM","year":"2005","author":"griffin","key":"26"},{"key":"27","article-title":"effects of routing computations in content-based routing networks with mobile data sources","author":"muthusamy","year":"2005","journal-title":"Proceedings of ACM MOBICOM"},{"journal-title":"Numerical Recipes in C The Art of Scientific Computing","year":"2002","author":"press","key":"28"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.893888"},{"key":"3","first-page":"76","article-title":"a distance routing effect algorithm for mobility (dream)","volume":"98","author":"basagni","year":"1998","journal-title":"Proceedings of ACM\/IEEE MobiCom"},{"key":"2","doi-asserted-by":"crossref","DOI":"10.1145\/1090191.1080126","article-title":"declarative routing: extensible routing with declarative queries","author":"loo","year":"2005","journal-title":"Proceedings of ACM SIGCOMM"},{"journal-title":"Genetic Algorithms in Search Optimization &Machine Learning","year":"1989","author":"goldberg david","key":"10"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2006.9"},{"key":"30","article-title":"free-space-optical mobile ad hoc networks: autoconfigurable building","author":"yuksel","year":"2006","journal-title":"Submitted to Wireless Networks (after Major Revisions)"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/938985.939012"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1322263.1322281"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2004.04.010"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1023\/A:1019136102972"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.4544624"},{"key":"4","article-title":"virtual patrol: a new power conservation design for surveillance using sensor networks","author":"gui","year":"2005","journal-title":"Proceedings of IEEE International Symposium on Information Processing in Sensor Networks (IPSN)"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/958491.958497"},{"key":"8","article-title":"application-driven networking: concepts and architecture for policy-based systems","author":"follows","year":"1999","journal-title":"IBM Red Book"}],"event":{"name":"2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS)","start":{"date-parts":[[2008,9,29]]},"location":"Atlanta, GA, USA","end":{"date-parts":[[2008,10,2]]}},"container-title":["2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4653771\/4660007\/04660034.pdf?arnumber=4660034","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T08:57:02Z","timestamp":1497776222000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4660034\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,9]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/mahss.2008.4660034","relation":{},"subject":[],"published":{"date-parts":[[2008,9]]}}}