{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:33:42Z","timestamp":1750307622554,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,4,1]],"date-time":"2008-04-01T00:00:00Z","timestamp":1207008000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"FEDER","award":["POSC\/EIA\/60941\/2004"],"award-info":[{"award-number":["POSC\/EIA\/60941\/2004"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,4]]},"DOI":"10.1145\/1435467.1435472","type":"proceedings-article","created":{"date-parts":[[2008,10,14]],"date-time":"2008-10-14T17:49:52Z","timestamp":1224006592000},"page":"18-20","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Tailoring a broadcast algorithm to particular network conditions"],"prefix":"10.1145","author":[{"given":"Carl","family":"Ellis","sequence":"first","affiliation":[{"name":"Lancaster University, UK"}]},{"given":"Hugo","family":"Miranda","sequence":"additional","affiliation":[{"name":"University of Lisbon, Portugal"}]},{"given":"Fran\u00e7ois","family":"Ta\u00efani","sequence":"additional","affiliation":[{"name":"Lancaster University, UK"}]}],"member":"320","published-online":{"date-parts":[[2008,4]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"1548","volume-title":"Societies (INFOCOM 2001","author":"Feeney L. M.","year":"2001","unstructured":"L. M. Feeney and M. Nilsson . Investigating the energy consumption of a wireless network interface in an ad hoc networking environment. In Procs. of the 20th An'l Joint Conf. of the IEEE Computer and Comm . Societies (INFOCOM 2001 ), pages 1548 -- 1557 , 2001 . L. M. Feeney and M. Nilsson. Investigating the energy consumption of a wireless network interface in an ad hoc networking environment. In Procs. of the 20th An'l Joint Conf. of the IEEE Computer and Comm. Societies (INFOCOM 2001), pages 1548--1557, 2001."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2002.1019424"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2006.254169"},{"key":"e_1_3_2_1_4_1","volume-title":"Wireless LAN medium access control (mac) and physical layer (phy) specifications","author":"IEEE Computer Society LAN MAN Standards Committee.","year":"1999","unstructured":"IEEE Computer Society LAN MAN Standards Committee. Wireless LAN medium access control (mac) and physical layer (phy) specifications . ANSI\/IEEE Std 802.11, IEEE , 1999 . IEEE Computer Society LAN MAN Standards Committee. Wireless LAN medium access control (mac) and physical layer (phy) specifications. ANSI\/IEEE Std 802.11, IEEE, 1999."},{"key":"e_1_3_2_1_5_1","first-page":"139","volume-title":"Ad Hoc Networking","author":"Johnson D. B.","year":"2001","unstructured":"D. B. Johnson , D. A. Maltz , and J. Broch . Ad Hoc Networking , chapter DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks, pages 139 -- 172 . Addison-Wesley , 2001 . D. B. Johnson, D. A. Maltz, and J. Broch. Ad Hoc Networking, chapter DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks, pages 139--172. Addison-Wesley, 2001."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1023663.1023679"},{"key":"e_1_3_2_1_7_1","volume-title":"Procs. of the 1st USENIX\/ACM Symp. on Networked Systems Design and Implementation (NSDI 2004)","author":"Levis P.","year":"2004","unstructured":"P. Levis , N. Patel , D. Culler , and S. Shenker . Trickle: A self-regulating algorithm for code propagation and maintenance in wireless sensor networks . In Procs. of the 1st USENIX\/ACM Symp. on Networked Systems Design and Implementation (NSDI 2004) , 2004 . P. Levis, N. Patel, D. Culler, and S. Shenker. Trickle: A self-regulating algorithm for code propagation and maintenance in wireless sensor networks. In Procs. of the 1st USENIX\/ACM Symp. on Networked Systems Design and Implementation (NSDI 2004), 2004."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2006.254191"},{"key":"e_1_3_2_1_9_1","first-page":"326","volume-title":"Procs. of the 1st Annual Int'l Conf. on Mobile and Ubiquitous Systems: Networking and Services (MOBIQUITOUS","author":"Perich F.","year":"2004","unstructured":"F. Perich , J. Undercoffer , L. Kagal , A. Joshi , T. Finin , and Y. Yesha . In reputation we believe: query processing in mobile ad-hoc networks . In Procs. of the 1st Annual Int'l Conf. on Mobile and Ubiquitous Systems: Networking and Services (MOBIQUITOUS 2004 ), pages 326 -- 334 , 2004. F. Perich, J. Undercoffer, L. Kagal, A. Joshi, T. Finin, and Y. Yesha. In reputation we believe: query processing in mobile ad-hoc networks. In Procs. of the 1st Annual Int'l Conf. on Mobile and Ubiquitous Systems: Networking and Services (MOBIQUITOUS 2004), pages 326--334, 2004."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/520551.837511"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143549.1143721"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013763825347"}],"event":{"name":"Eurosys '08: Eurosys 2008 Conference","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Glasgow Scotland","acronym":"Eurosys '08"},"container-title":["Proceedings of the 6th workshop on Middleware for network eccentric and mobile applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1435467.1435472","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1435467.1435472","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:45:51Z","timestamp":1750250751000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1435467.1435472"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,4]]},"references-count":12,"alternative-id":["10.1145\/1435467.1435472","10.1145\/1435467"],"URL":"https:\/\/doi.org\/10.1145\/1435467.1435472","relation":{},"subject":[],"published":{"date-parts":[[2008,4]]},"assertion":[{"value":"2008-04-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}