{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:37:12Z","timestamp":1750307832224,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,5,26]],"date-time":"2008-05-26T00:00:00Z","timestamp":1211760000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,5,26]]},"DOI":"10.1145\/1374688.1374692","type":"proceedings-article","created":{"date-parts":[[2008,5,28]],"date-time":"2008-05-28T16:50:20Z","timestamp":1211993420000},"page":"17-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Infection spread in wireless networks with random and adversarial node mobilities"],"prefix":"10.1145","author":[{"given":"Yi","family":"Wang","sequence":"first","affiliation":[{"name":"University of Southern California, Los Angeles, CA, USA"}]},{"given":"Shyam","family":"Kapadia","sequence":"additional","affiliation":[{"name":"University of Southern California, Los Angeles, CA, USA"}]},{"given":"Bhaskar","family":"Krishnamachari","sequence":"additional","affiliation":[{"name":"University of Southern California, Los Angeles, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2008,5,26]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"D. Aldous and J. Fill. Reversible markov chains and random walks on graphs. manuscript available at http:\/\/www.stat.berkeley.edu\/aldous\/RWG\/book.html.  D. Aldous and J. Fill. Reversible markov chains and random walks on graphs. manuscript available at http:\/\/www.stat.berkeley.edu\/aldous\/RWG\/book.html."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1994.337685"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.841785"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/288235.288256"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.228"},{"key":"e_1_3_2_1_6_1","first-page":"483","volume-title":"Wireless Communications &amp","author":"Camp T.","year":"2001"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2000.832168"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/1760548.1760549"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dam.2006.04.026"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863960"},{"volume-title":"Garcia-Luna-Aceves and E. L. Madrga. A Multicast Routing Protocol for Ad-Hoc Networks. In Proceedings of the Joint Conference of the IEEE Computer and Communications Societies(INFOCOM)","year":"1999","author":"J.","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143549.1143657"},{"key":"e_1_3_2_1_13_1","first-page":"153","volume-title":"Mobile Computing, T. Imelinsky and H. Korth, eds","author":"Johnson D.","year":"1996"},{"volume-title":"Proceedings of the third international conference on Simulation of adaptive behavior : from animals to animats 3","year":"1994","author":"Miller G. F.","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","unstructured":"moteiv. Telosb motes datasheet. http:\/\/www.moteiv.com\/products\/docs\/telos-revb-datasheet.pdf.  moteiv. Telosb motes datasheet. http:\/\/www.moteiv.com\/products\/docs\/telos-revb-datasheet.pdf."},{"volume-title":"5th Workshop on Network and System Support for Games (NetGames)","year":"2006","author":"Mottola L.","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1107548.1107607"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ROBOT.2005.1570487"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1570-8705(03)00003-9"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2004.1381922"},{"volume-title":"Department of Computer Science","year":"2000","author":"Vahdat A.","key":"e_1_3_2_1_21_1"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ccnc08.2007.186"}],"event":{"name":"MobiHoc08: The Ninth ACM International Symposium on Mobile Ad Hoc Networking and Computing","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","ACM Association for Computing Machinery"],"location":"Hong Kong Hong Kong, China","acronym":"MobiHoc08"},"container-title":["Proceedings of the 1st ACM SIGMOBILE workshop on Mobility models"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1374688.1374692","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1374688.1374692","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:57:56Z","timestamp":1750255076000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1374688.1374692"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,5,26]]},"references-count":22,"alternative-id":["10.1145\/1374688.1374692","10.1145\/1374688"],"URL":"https:\/\/doi.org\/10.1145\/1374688.1374692","relation":{},"subject":[],"published":{"date-parts":[[2008,5,26]]},"assertion":[{"value":"2008-05-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}