{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T13:01:01Z","timestamp":1725627661060},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,6]]},"DOI":"10.1109\/wowmom.2010.5534897","type":"proceedings-article","created":{"date-parts":[[2010,8,9]],"date-time":"2010-08-09T22:19:00Z","timestamp":1281392340000},"page":"1-8","source":"Crossref","is-referenced-by-count":9,"title":["On the maximum performance in opportunistic routing"],"prefix":"10.1109","author":[{"given":"Lloreng","family":"Cerda-Alabern","sequence":"first","affiliation":[]},{"given":"Amir","family":"Darehshoorzadeh","sequence":"additional","affiliation":[]},{"given":"Vicent","family":"Pla","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2008.90"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2007.4292856"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-005-1766-z"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.222"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062164"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/WIOPT.2008.4586083"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/WIOPT.2005.30"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2005.90"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2008.542"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062252"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1755743.1755747"},{"year":"0","key":"ref3","article-title":"The Network Simulator ns-2"},{"key":"ref6","article-title":"ROMER: Resilient opportunistic mesh routing for wireless mesh networks","author":"yuan","year":"2005","journal-title":"IEEE Workshop on Wireless Mesh Networks (WiMesh)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1090191.1080108"},{"key":"ref8","article-title":"Multi-channel opportunistic routing","author":"zubow","year":"2007","journal-title":"European Wireless Conference (EW)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/WIMESH.2006.288602"},{"article-title":"Valuable detours: Least-cost anypath routing","year":"2009","author":"dubois-ferriere","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1215976.1215978"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.188"}],"event":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","start":{"date-parts":[[2010,6,14]]},"location":"Montreal, QC, Canada","end":{"date-parts":[[2010,6,17]]}},"container-title":["2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5513765\/5534887\/05534897.pdf?arnumber=5534897","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,18]],"date-time":"2017-03-18T22:00:57Z","timestamp":1489874457000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5534897\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/wowmom.2010.5534897","relation":{},"subject":[],"published":{"date-parts":[[2010,6]]}}}