{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:38:13Z","timestamp":1750307893367,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,8,18]],"date-time":"2008-08-18T00:00:00Z","timestamp":1219017600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,8,18]]},"DOI":"10.1145\/1400751.1400783","type":"proceedings-article","created":{"date-parts":[[2008,8,19]],"date-time":"2008-08-19T12:38:39Z","timestamp":1219149519000},"page":"233-242","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Virtual infrastructure for collision-prone wireless networks"],"prefix":"10.1145","author":[{"given":"Gregory","family":"Chockler","sequence":"first","affiliation":[{"name":"IBM Research, Haifa, Israel"}]},{"given":"Seth","family":"Gilbert","sequence":"additional","affiliation":[{"name":"EPFL, Lausanne, Switzerland"}]},{"given":"Nancy","family":"Lynch","sequence":"additional","affiliation":[{"name":"MIT, Cambridge, MA, USA"}]}],"member":"320","published-online":{"date-parts":[[2008,8,18]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1281100.1281107"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/381448.381451"},{"key":"e_1_3_2_1_3_1","volume-title":"MIT","author":"Brown M. D.","year":"2007","unstructured":"M. D. Brown . Air traffic control using virtual stationary automata. Master's thesis , MIT , Sept. 2007 . M. D. Brown. Air traffic control using virtual stationary automata. Master's thesis, MIT, Sept. 2007."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1317103.1317105"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30186-8_18"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571640"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2005.120"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1073814.1073850"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00446-008-0056-2"},{"key":"e_1_3_2_1_10_1","volume-title":"Communication Networks and Distributed Systems Modeling and Simulation","author":"Deng J.","year":"2004","unstructured":"J. Deng , P. K. Varshney , and Z. J. Haas . A new backoff algorithm for the IEEE 802.11 distributed coordination function . In Communication Networks and Distributed Systems Modeling and Simulation , Jan. 2004 . J. Deng, P. K. Varshney, and Z. J. Haas. A new backoff algorithm for the IEEE 802.11 distributed coordination function. In Communication Networks and Distributed Systems Modeling and Simulation, Jan. 2004."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA467098"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30186-8_17"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39989-6_22"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00446-005-0140-9"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1073970.1074004"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/11577327_7"},{"key":"e_1_3_2_1_17_1","volume-title":"Manuscript","author":"Droms R.","year":"2007","unstructured":"R. Droms and C. Newport . Virtual infrastructure routing for mobile ad hoc networks . Manuscript , 2007 . R. Droms and C. Newport. Virtual infrastructure routing for mobile ad hoc networks. Manuscript, 2007."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057022"},{"key":"e_1_3_2_1_19_1","volume-title":"MIT","author":"Gilbert S.","year":"2007","unstructured":"S. Gilbert . Virtual Infrastructure for Wireless Ad Hoc Networks. PhD thesis , MIT , 2007 . S. Gilbert. Virtual Infrastructure for Wireless Ad Hoc Networks. PhD thesis, MIT, 2007."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/872035.872048"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-27820-7_6"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/212433.212468"},{"key":"e_1_3_2_1_23_1","volume-title":"Broadcast in the face of network partitions: Exploiting group communication for replication in partitionable networks","author":"Keidar I.","year":"2000","unstructured":"I. Keidar and D. Dolev . Broadcast in the face of network partitions: Exploiting group communication for replication in partitionable networks . D. Avresky, ed., Dependable Network Computing, chapter 3. Kluwer Academic Publications , 2000 . I. Keidar and D. Dolev. Broadcast in the face of network partitions: Exploiting group communication for replication in partitionable networks. D. Avresky, ed., Dependable Network Computing, chapter 3. Kluwer Academic Publications, 2000."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/359545.359563"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/279227.279229"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/645953.675640"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA467032"},{"key":"e_1_3_2_1_28_1","volume-title":"TARK '05","author":"Mizrahi Tal","year":"2005","unstructured":"Tal Mizrahi and Yoram Moses . Continuous consensus via common knowledge . In TARK '05 , 2005 . Tal Mizrahi and Yoram Moses. Continuous consensus via common knowledge. In TARK '05, 2005."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/2393794.2393837"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/1785854.1785863"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/645535.656989"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISPAN.2002.1004263"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/1147685.1147694"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/1785110.1785140"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2007.82"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031508"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345917"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/98163.98167"},{"key":"e_1_3_2_1_40_1","volume-title":"MIT","author":"Spindel M.","year":"2008","unstructured":"M. Spindel . Simulation and evaluation of the virtual node layer. Master's thesis , MIT , June 2008 . M. Spindel. Simulation and evaluation of the virtual node layer. Master's thesis, MIT, June 2008."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/582318.582339"},{"key":"e_1_3_2_1_42_1","volume-title":"Berkeley Workshop","author":"Skeen D.","year":"1982","unstructured":"D. Skeen . A quorum-based commit protocol . In Berkeley Workshop , 1982 . D. Skeen. A quorum-based commit protocol. In Berkeley Workshop, 1982."},{"key":"e_1_3_2_1_43_1","volume-title":"NSDI","author":"Welsh M.","year":"2004","unstructured":"M. Welsh and G. Mainland . Programming sensor networks using abstract regions . In NSDI , 2004 . M. Welsh and G. Mainland. Programming sensor networks using abstract regions. In NSDI, 2004."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/990064.990079"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1137\/0215032"}],"event":{"name":"PODC '08: ACM Symposium on Principles of Distributed Computing","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems","ACM Association for Computing Machinery","SIGACT ACM Special Interest Group on Algorithms and Computation Theory"],"location":"Toronto Canada","acronym":"PODC '08"},"container-title":["Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1400751.1400783","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1400751.1400783","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:47:23Z","timestamp":1750258043000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1400751.1400783"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,8,18]]},"references-count":44,"alternative-id":["10.1145\/1400751.1400783","10.1145\/1400751"],"URL":"https:\/\/doi.org\/10.1145\/1400751.1400783","relation":{},"subject":[],"published":{"date-parts":[[2008,8,18]]},"assertion":[{"value":"2008-08-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}