{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T12:30:46Z","timestamp":1759667446100},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,5]]},"DOI":"10.1109\/ntms.2012.6208761","type":"proceedings-article","created":{"date-parts":[[2012,6,6]],"date-time":"2012-06-06T21:14:34Z","timestamp":1339017274000},"page":"1-5","source":"Crossref","is-referenced-by-count":23,"title":["Performance Evaluation of CoAP Using RPL and LPL in TinyOS"],"prefix":"10.1109","author":[{"given":"Thomas","family":"Potsch","sequence":"first","affiliation":[]},{"given":"Koojana","family":"Kuladinithi","sequence":"additional","affiliation":[]},{"given":"Markus","family":"Becker","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Trenkamp","sequence":"additional","affiliation":[]},{"given":"Carmelita","family":"Goerg","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2009","author":"dawson-haggerty","journal-title":"Design Implementation and Evaluation of An Embedded IPv6 Stack","key":"19"},{"year":"2011","journal-title":"CoAPy Constrained Application Protocol in Python","key":"17"},{"year":"2011","journal-title":"jCoAP Java Library Implementing the Constrained Application Protocol (CoAP)","key":"18"},{"doi-asserted-by":"publisher","key":"15","DOI":"10.1109\/MASS.2011.100"},{"year":"2011","journal-title":"Libcoap C Implementation of the Constrained Application Protocol (CoAP) for Contiki","key":"16"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1109\/ICMECH.2011.5971218"},{"key":"14","article-title":"Beyond Interoperability: Pushing the Performance of Sensornet IP Stacks","author":"ko","year":"0","journal-title":"Proceedings of the ACM Conference on Networked Embedded Sensor Systems ACM SenSys 2011 Seattle USA Nov 2011"},{"key":"11","article-title":"ContikiRPL and TinyRPL: Happy Together","author":"ko","year":"0","journal-title":"Proceedings of the Workshop on Extending the Internet to Low Power and Lossy Networks (IP+SN 2011) Chicago USA Apr 2011"},{"key":"12","article-title":"BoX-MACs: Exploiting Physical and Link Layer Boundaries in Low-Power Networking","author":"moss","year":"2008","journal-title":"Stanford Information Networks Group Technical Report"},{"key":"3","article-title":"Deployment of CoAP in Transport Logistics","author":"becker","year":"2011","journal-title":"Proceedings of the 36th IEEE Conference on Local Computer Networks (LCN) Oct"},{"key":"2","article-title":"Implementation of CoAP and its Application in Transport Logistics","author":"kuladinithi","year":"0","journal-title":"Proceedings of the of Extending the Internet to Low Power and Lossy Networks (IP+SN 2011) Apr 2011"},{"year":"2006","journal-title":"IEEE Standard for Information Technology- Telecommunications and Information Exchange between Systems - Local and Metropolitan Area Networks - Specific Requirements","article-title":"Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (WPANs)","key":"1"},{"year":"2011","author":"gnawali","journal-title":"The Minimum Rank Objective Function with Hysteresis","key":"10"},{"year":"2000","author":"fielding","journal-title":"Architectural Styles and the Design of Network-Based Software Architectures","key":"7"},{"year":"2011","author":"shelby","journal-title":"Constrained Application Protocol (CoAP)","key":"6"},{"year":"2011","author":"lang","journal-title":"Intelligent Container","key":"5"},{"year":"2011","author":"winter","journal-title":"IPv6 Routing Protocol for Low Power and Lossy Networks","key":"4"},{"year":"2012","author":"thubert","journal-title":"RPL Objective Function 0","key":"9"},{"year":"0","author":"bergmann","journal-title":"Libcoap C-Implementation of CoAP","key":"8"}],"event":{"name":"2012 5th International Conference on New Technologies, Mobility and Security (NTMS)","start":{"date-parts":[[2012,5,7]]},"location":"Istanbul, Turkey","end":{"date-parts":[[2012,5,10]]}},"container-title":["2012 5th International Conference on New Technologies, Mobility and Security (NTMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6203453\/6203739\/06208761.pdf?arnumber=6208761","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T14:37:28Z","timestamp":1490107048000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6208761\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,5]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/ntms.2012.6208761","relation":{},"subject":[],"published":{"date-parts":[[2012,5]]}}}