{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T16:06:16Z","timestamp":1730304376975,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,4]]},"DOI":"10.1109\/wcnc.2013.6554879","type":"proceedings-article","created":{"date-parts":[[2013,7,25]],"date-time":"2013-07-25T18:58:33Z","timestamp":1374778713000},"page":"2057-2062","source":"Crossref","is-referenced-by-count":0,"title":["Performance modeling of network coding based epidemic routing in DTNs"],"prefix":"10.1109","author":[{"family":"Shuang Qin","sequence":"first","affiliation":[]},{"given":"Gang","family":"Feng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","article-title":"Spray and wait: An efficient routing scheme for intermittently connected mobile networks","author":"spyropoulos","year":"2005","journal-title":"Proc ACM SIGCOMM Workshop Delay-Tolerant Networking"},{"journal-title":"Epidemic Routing for Partially Connected Ad Hoc Networks","year":"2000","author":"vahdat","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/584051.584056"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015484"},{"key":"7","article-title":"On the benefits of random linear coding for unicast application in disruption tolerant networks","author":"zhang","year":"2006","journal-title":"WiOpt"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2003.1228459"},{"key":"5","first-page":"1825","article-title":"How the contact probing mechanism affects the transmission capacity of Delay-Tolerant-Networks","volume":"60","author":"qin","year":"2011","journal-title":"IEEE Tans on VT"},{"key":"4","article-title":"Probabilistic routing in intermittently connected networks","author":"lindgren","year":"2004","journal-title":"SIGMOBILE Mobile Computing and Communication Review"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-585-29603-6_5"},{"key":"8","first-page":"794","article-title":"Stochastic analysis of network coding in epidemic routing","volume":"26","author":"li","year":"2008","journal-title":"IEEE JSAC"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1287853.1287875"},{"key":"12","article-title":"The opportunistic network environment simulator","author":"keranen","year":"2008","journal-title":"Special Assignment Report Helsink University of Technology Department of Communications and Networking"}],"event":{"name":"2013 IEEE Wireless Communications and Networking Conference (WCNC)","start":{"date-parts":[[2013,4,7]]},"location":"Shanghai, China","end":{"date-parts":[[2013,4,10]]}},"container-title":["2013 IEEE Wireless Communications and Networking Conference (WCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6548699\/6554525\/06554879.pdf?arnumber=6554879","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,12]],"date-time":"2022-02-12T01:00:27Z","timestamp":1644627627000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6554879\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/wcnc.2013.6554879","relation":{},"subject":[],"published":{"date-parts":[[2013,4]]}}}