{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T13:11:17Z","timestamp":1725455477312},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1109\/wiopt.2015.7151058","type":"proceedings-article","created":{"date-parts":[[2015,7,17]],"date-time":"2015-07-17T16:18:08Z","timestamp":1437149888000},"page":"90-95","source":"Crossref","is-referenced-by-count":0,"title":["Are smartphones suited for DTN networking? A methodological teardown of smartphones' WiFi performance"],"prefix":"10.1109","author":[{"given":"Bernhard","family":"Distl","sequence":"first","affiliation":[]},{"given":"Franck","family":"Legendre","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/TMTT.2004.832001"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/TAP.2009.2025786"},{"key":"ref12","article-title":"Validation of NS-3 802.11b PHY model","author":"peu","year":"2009","journal-title":"New York USA Boeing Research and Technology"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1145\/1859995.1860021"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/WIOPT.2009.5291643"},{"key":"ref15","article-title":"A report on technology independent methodology for the modeling, simulation and empirical verification of wireless communications system performance in noise and interference limited systems operating on frequencies between 30 and 1500 mhz","author":"hata","year":"1997","journal-title":"Working Group"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/SURV.2012.022412.00172"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/ICC.2002.997466"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1145\/2505469.2505480"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1145\/2079360.2079367"},{"key":"ref3","article-title":"Cellular traffic off loading through opportunistic communications: a case study","author":"han","year":"0","journal-title":"CHANTS 2010"},{"year":"0","journal-title":"Eu fp7 n4c project-networking for communications challenged communities","key":"ref6"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1145\/1290168.1290181"},{"year":"0","article-title":"Uepaa!-alpine safety app","key":"ref8"},{"year":"0","article-title":"Twimight: Twitter client with disaster mode","key":"ref7"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/TBC.2006.889208"},{"key":"ref1","article-title":"Pocket switched networks: real-world mobility and its consequences for opportunistic forwarding","author":"chaintreau","year":"2005","journal-title":"University of Cam-bridge Tech Rep"},{"year":"0","journal-title":"Opengarden's firechat app","key":"ref9"}],"event":{"name":"2015 13th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)","start":{"date-parts":[[2015,5,25]]},"location":"Mumbai, India","end":{"date-parts":[[2015,5,29]]}},"container-title":["2015 13th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7132529\/7151020\/07151058.pdf?arnumber=7151058","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T16:24:35Z","timestamp":1490372675000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7151058\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/wiopt.2015.7151058","relation":{},"subject":[],"published":{"date-parts":[[2015,5]]}}}