{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:39:18Z","timestamp":1750307958461,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,8,12]],"date-time":"2007-08-12T00:00:00Z","timestamp":1186876800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,8,12]]},"DOI":"10.1145\/1280940.1281056","type":"proceedings-article","created":{"date-parts":[[2012,10,11]],"date-time":"2012-10-11T15:35:23Z","timestamp":1349969723000},"page":"541-546","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Empirical analysis of the single-radio mesh architecture"],"prefix":"10.1145","author":[{"given":"Andres","family":"Arjona","sequence":"first","affiliation":[{"name":"Nokia Siemens Networks, Espoo, Finland"}]},{"given":"Cedric","family":"Westphal","sequence":"additional","affiliation":[{"name":"Nokia Siemens Networks, Mountain View, CA"}]},{"given":"Sami","family":"Takala","sequence":"additional","affiliation":[{"name":"Nokia Siemens Networks, Espoo, Finland"}]}],"member":"320","published-online":{"date-parts":[[2007,8,12]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Alvarion http:\/\/www.alvarion.com  Alvarion http:\/\/www.alvarion.com"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/AICT.2007.41"},{"key":"e_1_3_2_1_3_1","unstructured":"BelAir Networks http:\/\/www.belairnetworks.com  BelAir Networks http:\/\/www.belairnetworks.com"},{"key":"e_1_3_2_1_4_1","unstructured":"BelAir Networks \"Capacity of Wireless Mesh Networks -- Understanding Single Radio Dual Radio and Multi Radio Wireless Mesh Networks\" BelAir Networks 2006.  BelAir Networks \"Capacity of Wireless Mesh Networks -- Understanding Single Radio Dual Radio and Multi Radio Wireless Mesh Networks\" BelAir Networks 2006."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/QSHINE.2005.64"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/505666.505669"},{"key":"e_1_3_2_1_7_1","unstructured":"Comptek Aqua \"Comparative Analysis of Different Media Access Methods in Metropolitan Area Networking\" Available at http:\/\/aqua.comptek.ru\/test\/HiddenNode\/hidden_node_en.html  Comptek Aqua \"Comparative Analysis of Different Media Access Methods in Metropolitan Area Networking\" Available at http:\/\/aqua.comptek.ru\/test\/HiddenNode\/hidden_node_en.html"},{"key":"e_1_3_2_1_8_1","unstructured":"Google \"Google WiFi Mountain View\" Google 2007. Available at https:\/\/wifi.google.com\/support\/  Google \"Google WiFi Mountain View\" Google 2007. Available at https:\/\/wifi.google.com\/support\/"},{"key":"e_1_3_2_1_9_1","unstructured":"ITU-T \"Rec. G.107 -- A Computational Model for Use in Transmission Planning\" ITU-T 2003.  ITU-T \"Rec. G.107 -- A Computational Model for Use in Transmission Planning\" ITU-T 2003."},{"key":"e_1_3_2_1_10_1","unstructured":"Ixia \"IxChariot\" Product Specification. Available at http:\/\/www.ixiacom.com\/products\/display?skey=ixchariot  Ixia \"IxChariot\" Product Specification. Available at http:\/\/www.ixiacom.com\/products\/display?skey=ixchariot"},{"key":"e_1_3_2_1_11_1","unstructured":"B. Mandeville C. Mandeville and A. Bouard \"Wireless Mesh: Ready!\" Light Reading June 20 2006. Available at http:\/\/www.lightreading.com\/document.asp?doc_id=96200  B. Mandeville C. Mandeville and A. Bouard \"Wireless Mesh: Ready!\" Light Reading June 20 2006. Available at http:\/\/www.lightreading.com\/document.asp?doc_id=96200"},{"key":"e_1_3_2_1_12_1","unstructured":"Meraki http:\/\/www.meraki.net  Meraki http:\/\/www.meraki.net"},{"key":"e_1_3_2_1_13_1","unstructured":"Motorola Canopy http:\/\/motorola.canopy.com  Motorola Canopy http:\/\/motorola.canopy.com"},{"first-page":"608","volume-title":"Aug. 2006","author":"Kim Y.","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","unstructured":"RoofNet http:\/\/ pdos.csail.mit.edu\/roofnet\/doku.php  RoofNet http:\/\/ pdos.csail.mit.edu\/roofnet\/doku.php"},{"key":"e_1_3_2_1_16_1","unstructured":"SkyPilot http:\/\/www.skypilot.com  SkyPilot http:\/\/www.skypilot.com"},{"key":"e_1_3_2_1_17_1","unstructured":"Strix Systems http:\/\/www.strixsystems.com  Strix Systems http:\/\/www.strixsystems.com"},{"volume-title":"Burton Group","year":"2005","author":"Terrill W.","key":"e_1_3_2_1_18_1"},{"volume-title":"Proceedings of ICN'05","author":"Ting K.","key":"e_1_3_2_1_19_1"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"F. A. Tobagi and L. Kleinrock \"Packet switching in radio channels: Part II -- the hidden terminal problem in carrier sense multiple-access modes and the busy-tone solution \" IEEE Trans. Commun. vol. COM-23 no. 12 pp. 1417--1433 1975.  F. A. Tobagi and L. Kleinrock \"Packet switching in radio channels: Part II -- the hidden terminal problem in carrier sense multiple-access modes and the busy-tone solution \" IEEE Trans. Commun. vol. COM-23 no. 12 pp. 1417--1433 1975.","DOI":"10.1109\/TCOM.1975.1092767"},{"key":"e_1_3_2_1_21_1","unstructured":"Tropos Networks http:\/\/www.tropos.com  Tropos Networks http:\/\/www.tropos.com"}],"event":{"name":"IWCMC07: International Wireless Communications and Mobile Computing Conference","sponsor":["SIGDOC ACM Special Interest Group on Systems Documentation","ACM Association for Computing Machinery","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGAPP ACM Special Interest Group on Applied Computing","SIGDOC ACM Special Interest Group for Design of Communications"],"location":"Honolulu Hawaii USA","acronym":"IWCMC07"},"container-title":["Proceedings of the 2007 international conference on Wireless communications and mobile computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1280940.1281056","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1280940.1281056","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:58:00Z","timestamp":1750258680000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1280940.1281056"}},"subtitle":["performance limitations and challenges"],"short-title":[],"issued":{"date-parts":[[2007,8,12]]},"references-count":21,"alternative-id":["10.1145\/1280940.1281056","10.1145\/1280940"],"URL":"https:\/\/doi.org\/10.1145\/1280940.1281056","relation":{},"subject":[],"published":{"date-parts":[[2007,8,12]]},"assertion":[{"value":"2007-08-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}