{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T13:39:26Z","timestamp":1742391566724},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/sahcn.2005.1557078","type":"proceedings-article","created":{"date-parts":[[2005,12,13]],"date-time":"2005-12-13T15:55:52Z","timestamp":1134489352000},"page":"229-239","source":"Crossref","is-referenced-by-count":4,"title":["A local metric for geographic routing with power control in wireless networks"],"prefix":"10.1109","author":[{"family":"Chih-ping Li","sequence":"first","affiliation":[]},{"family":"Wei-jen Hsu","sequence":"additional","affiliation":[]},{"given":"B.","family":"Krishnamachari","sequence":"additional","affiliation":[]},{"given":"A.","family":"Helmy","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","author":"proakis","journal-title":"Ditigal Communications","key":"19"},{"doi-asserted-by":"publisher","key":"22","DOI":"10.1109\/TCOM.1986.1096436"},{"doi-asserted-by":"publisher","key":"17","DOI":"10.1145\/1015467.1015482"},{"doi-asserted-by":"publisher","key":"23","DOI":"10.1109\/INFCOM.2000.832213"},{"year":"0","author":"rappapport","journal-title":"Wireless Communications Principles and Practice","key":"18"},{"doi-asserted-by":"publisher","key":"24","DOI":"10.1109\/INFCOM.2002.1019408"},{"key":"15","doi-asserted-by":"crossref","DOI":"10.1145\/288235.288286","article-title":"Power-aware routing in mobile ad hoc networks","author":"singh","year":"1998","journal-title":"ACM MOBICOM"},{"key":"16","article-title":"Energy conserving routing in wireless adhoc networks","author":"chang","year":"2000","journal-title":"IEEE INFOCOM"},{"key":"13","article-title":"Power control and clustering in ad hoc networks","author":"kawadia","year":"0","journal-title":"IEEE INFOCOM 2003"},{"key":"14","article-title":"Experimental study of the effects of transmission power control and blacklisting in wireless sensor networks","author":"son","year":"2004","journal-title":"IEEE SECON"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1109\/INFCOM.2001.916634"},{"key":"12","article-title":"Power control in ad hoc networks: Theory, architecture, algorithm and implementation of the COMPOW protocol","author":"narayanaswamy","year":"2002","journal-title":"European Wireless Conference"},{"doi-asserted-by":"publisher","key":"21","DOI":"10.1109\/TCOM.1984.1096061"},{"key":"3","article-title":"Complex behavior at scale: An experimental study of low-power wireless sensor networks","author":"ganesan","year":"2002","journal-title":"UCLA CS Technical Report UCLA\/CSD-TR 02-0013"},{"key":"20","article-title":"Optimum transmission radii for packet radio networks or why six is a magic number","author":"kleinrock","year":"1978","journal-title":"Conference Record National Telecommunications Conference"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1145\/1031495.1031509"},{"year":"2003","author":"kotz","journal-title":"The mistaken axioms of wireless-network research","key":"1"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1109\/49.779917"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1109\/SAHCN.2004.1381954"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1145\/938998.939000"},{"key":"5","doi-asserted-by":"crossref","DOI":"10.1145\/958491.958494","article-title":"Taming the underlying issues for reliable multhop routing in sensor networks","author":"woo","year":"2003","journal-title":"ACM SenSys"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1145\/958492.958493"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1109\/65.967595"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1145\/345910.345953"}],"event":{"name":"2005 Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005. IEEE SECON 2005.","location":"Santa Clara, CA, USA"},"container-title":["2005 Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005. IEEE SECON 2005."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10405\/33064\/01557078.pdf?arnumber=1557078","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,10]],"date-time":"2019-04-10T15:06:18Z","timestamp":1554908778000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1557078\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/sahcn.2005.1557078","relation":{},"subject":[]}}