{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:55:26Z","timestamp":1750308926724,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2005,10,10]],"date-time":"2005-10-10T00:00:00Z","timestamp":1128902400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,10,10]]},"DOI":"10.1145\/1089444.1089453","type":"proceedings-article","created":{"date-parts":[[2005,11,7]],"date-time":"2005-11-07T17:34:39Z","timestamp":1131384879000},"page":"40-44","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Performance analysis of fault-tolerant beacon vector routing for wireless sensor networks"],"prefix":"10.1145","author":[{"given":"Luke","family":"Demoracski","sequence":"first","affiliation":[{"name":"Northeastern University, Boston, MA"}]},{"given":"Dimiter R.","family":"Avresky","sequence":"additional","affiliation":[{"name":"Northeastern University, Boston, MA"}]}],"member":"320","published-online":{"date-parts":[[2005,10,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-4549-1","volume-title":"Dependable Network Computing, edited by D. R. Avresky: Adaptive Minimal-Path Routing in 2-Dimensional Torus Servernet","author":"Avresky D. R.","year":"2000","unstructured":"D. R. Avresky , J. R. Acosta , V. Shurbanov , and Z. Mcaffrey . Dependable Network Computing, edited by D. R. Avresky: Adaptive Minimal-Path Routing in 2-Dimensional Torus Servernet . Kluwer Academic Publisher , 2000 . D. R. Avresky, J. R. Acosta, V. Shurbanov, and Z. Mcaffrey. Dependable Network Computing, edited by D. R. Avresky: Adaptive Minimal-Path Routing in 2-Dimensional Torus Servernet. Kluwer Academic Publisher, 2000."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.391749"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2005.225"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIMOB.2005.1512930"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2003.1214335"},{"key":"e_1_3_2_1_6_1","volume-title":"IRB-TR-04-012","author":"Fonseca R.","year":"2004","unstructured":"R. Fonseca , S. Ratnasamy , D. Culler , S. Shenker , and I. Stoica . Beacon vector routing: Scalable point-to-point in wireless sensornets. Intel Research , IRB-TR-04-012 , May 2004 . R. Fonseca, S. Ratnasamy, D. Culler, S. Shenker, and I. Stoica. Beacon vector routing: Scalable point-to-point in wireless sensornets. Intel Research, IRB-TR-04-012, May 2004."},{"key":"e_1_3_2_1_7_1","volume-title":"The art of computer systems performance analysis","author":"Jain R.","year":"1991","unstructured":"R. Jain . The art of computer systems performance analysis . John Wiley and Sons, Inc , 1991 . R. Jain. The art of computer systems performance analysis. John Wiley and Sons, Inc, 1991."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/872035.872044"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/958491.958501"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/938985.938996"}],"event":{"name":"MSWiM05: 8th International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems 2005","sponsor":["ACM Association for Computing Machinery","SIGSIM ACM Special Interest Group on Simulation and Modeling"],"location":"Montr\u00e9al Quebec Canada","acronym":"MSWiM05"},"container-title":["Proceedings of the 8th ACM international symposium on Modeling, analysis and simulation of wireless and mobile systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1089444.1089453","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1089444.1089453","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T21:36:45Z","timestamp":1750282605000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1089444.1089453"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,10,10]]},"references-count":10,"alternative-id":["10.1145\/1089444.1089453","10.1145\/1089444"],"URL":"https:\/\/doi.org\/10.1145\/1089444.1089453","relation":{},"subject":[],"published":{"date-parts":[[2005,10,10]]},"assertion":[{"value":"2005-10-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}