{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T13:16:52Z","timestamp":1775308612760,"version":"3.50.1"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2005,1,1]],"date-time":"2005-01-01T00:00:00Z","timestamp":1104537600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2005,1,1]],"date-time":"2005-01-01T00:00:00Z","timestamp":1104537600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1109\/wcnc.2005.1424787","type":"proceedings-article","created":{"date-parts":[[2005,4,25]],"date-time":"2005-04-25T14:49:51Z","timestamp":1114440591000},"page":"1812-1817 Vol. 3","source":"Crossref","is-referenced-by-count":6,"title":["A cross-layer approach for efficient flooding in wireless sensor networks"],"prefix":"10.1109","author":[{"family":"Xiaodong Wang","sequence":"first","affiliation":[{"name":"OBR Center for Distributed & Mobile Comput., Cincinnati Univ., OH, USA"}]},{"family":"Jun Yin","sequence":"additional","affiliation":[{"name":"OBR Center for Distributed & Mobile Comput., Cincinnati Univ., OH, USA"}]},{"family":"Qi Zhang","sequence":"additional","affiliation":[{"name":"OBR Center for Distributed & Mobile Comput., Cincinnati Univ., OH, USA"}]},{"given":"D.P.","family":"Agrawal","sequence":"additional","affiliation":[{"name":"OBR Center for Distributed & Mobile Comput., Cincinnati Univ., OH, USA"}]}],"member":"263","reference":[{"key":"19","year":"1999","journal-title":"IEEE 802 11 Part 11 Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2001.916651"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2003.1255648"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-6268-6"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2002.1038347"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1984.1096061"},{"key":"13","article-title":"Location aided broadcast in wireless ad hoc networks","author":"sun","year":"0","journal-title":"Proc of Globecom 2001"},{"key":"14","article-title":"A reachability-guaranteed approach for reducing broadcast storms in mobile ad hoc networks","author":"yang","year":"2002","journal-title":"Proc of IEEE VTC"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2003.1200529"},{"key":"12","article-title":"Rumor routing algorthim for sensor networks","author":"braginsky","year":"2001","journal-title":"Proc of the 1st ACM International Workshop on Wireless Sensor Networks and Applications"},{"key":"21","year":"0"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345920"},{"key":"20","article-title":"Performance study of MAC for service differentiation in IEEE 802.11","author":"zhao","year":"0","journal-title":"Proc GLOBECOM 2002"},{"key":"2","author":"agrawal","year":"2003","journal-title":"Introduction to Wireless and Mobile Systems"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1024422"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2002.1019424"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/381677.381685"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/510726.510736"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2002.1019408"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2002.1011060"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/313451.313525"},{"key":"8","year":"0"}],"event":{"name":"2005 IEEE Wireless Communications and Networking Conference","location":"New Orleans, LA, USA","start":{"date-parts":[[2005,3,13]]},"end":{"date-parts":[[2005,3,17]]}},"container-title":["IEEE Wireless Communications and Networking Conference, 2005"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9744\/30730\/01424787.pdf?arnumber=1424787","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,8]],"date-time":"2024-03-08T13:46:38Z","timestamp":1709905598000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/1424787\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/wcnc.2005.1424787","relation":{},"subject":[],"published":{"date-parts":[[2005]]}}}