{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T08:18:04Z","timestamp":1742804284604},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T00:00:00Z","timestamp":1551398400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T00:00:00Z","timestamp":1551398400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T00:00:00Z","timestamp":1551398400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,3]]},"DOI":"10.1109\/netsys.2019.8854517","type":"proceedings-article","created":{"date-parts":[[2019,10,4]],"date-time":"2019-10-04T00:26:41Z","timestamp":1570148801000},"page":"1-8","source":"Crossref","is-referenced-by-count":6,"title":["Understanding the Impact of Message Prioritization in Post-Disaster Ad Hoc Networks"],"prefix":"10.1109","author":[{"given":"Patrick","family":"Lieser","sequence":"first","affiliation":[]},{"given":"Nils","family":"Richerzhagen","sequence":"additional","affiliation":[]},{"given":"Simon","family":"Luser","sequence":"additional","affiliation":[]},{"given":"Bjorn","family":"Richerzhagen","sequence":"additional","affiliation":[]},{"given":"Ralf","family":"Steinmetz","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC.2015.7354496"},{"key":"ref11","article-title":"The Role of Twitter during a Natural Disaster: Case Study of 2011 Thai Flood","author":"kongthon","year":"0","journal-title":"Proceedings of PICMET Technology Management for Emerging Technologies"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1056\/NEJMra1109877"},{"key":"ref13","article-title":"Situation detection based on activity recognition in disaster scenarios","author":"lieser","year":"0","journal-title":"ISCRAM"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/GHTC.2017.8239239"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2011.5766923"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2185216.2185244"},{"journal-title":"Major Power Outages in the US and Around the World","year":"2009","author":"mclinn","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6815917"},{"key":"ref19","article-title":"Applications of online deep learning for crisis response using social media information","author":"nguyen","year":"0","journal-title":"Proceedings of the International Workshop on Social Web for Disaster Management (SWDM)"},{"key":"ref4","article-title":"Tweet4act: Using incident-specific profiles for classifying crisis-related messages","author":"chowdhury","year":"0","journal-title":"Proc of ISCRAM"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.228"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICMU.2014.6799086"},{"key":"ref5","article-title":"Twitter earthquake detection: earthquake monitoring in a social world","author":"earle","year":"2012","journal-title":"Annals of Geophysics"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1190455.1190468"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/IEMBS.2006.260881"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS.2016.7439936"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INTLEC.2008.4664066"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3264844.3264845"},{"key":"ref20","article-title":"Crisislex: A lexicon for collecting and filtering microblogged communications in crises","author":"olteanu","year":"0","journal-title":"Proceedings of the International AAAI Conference on Web and Social Media (ICWSM)"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1596\/978-1-4648-0153-2"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1958824.1958830"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/NetSys.2017.7903955"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.4108\/eai.24-8-2015.2261064"},{"journal-title":"Epidemic routing for partially-connected ad hoc networks","year":"2000","author":"vahdat","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1080139.1080143"}],"event":{"name":"2019 International Conference on Networked Systems (NetSys)","start":{"date-parts":[[2019,3,18]]},"location":"Munich, Germany","end":{"date-parts":[[2019,3,21]]}},"container-title":["2019 International Conference on Networked Systems (NetSys)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8847242\/8854488\/08854517.pdf?arnumber=8854517","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,19]],"date-time":"2022-07-19T20:19:59Z","timestamp":1658261999000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8854517\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/netsys.2019.8854517","relation":{},"subject":[],"published":{"date-parts":[[2019,3]]}}}