{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:52:46Z","timestamp":1750308766234,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,7,13]],"date-time":"2009-07-13T00:00:00Z","timestamp":1247443200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,7,13]]},"DOI":"10.1145\/1568173.1568175","type":"proceedings-article","created":{"date-parts":[[2009,9,25]],"date-time":"2009-09-25T19:37:20Z","timestamp":1253907440000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Design of dependable personal networks"],"prefix":"10.1145","author":[{"given":"Javad","family":"Vazifehdan","sequence":"first","affiliation":[{"name":"Delft University of Technology, Delft, Netherlands"}]},{"given":"Mohamed Gamal","family":"Hawas","sequence":"additional","affiliation":[{"name":"Delft University of Technology, Delft, Netherlands"}]},{"given":"Ramin","family":"Hekmat","sequence":"additional","affiliation":[{"name":"Delft University of Technology, Delft, Netherlands"}]},{"given":"Ignas","family":"Niemegeers","sequence":"additional","affiliation":[{"name":"Delft University of Technology, Delft, Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2009,7,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1025522402484"},{"volume-title":"Delft University of Technology","year":"2008","author":"Jacobsson M.","key":"e_1_3_2_1_2_1"},{"volume-title":"Springer-Verlag","year":"1991","author":"Laprie J.C.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.2"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2005.64"},{"key":"e_1_3_2_1_6_1","unstructured":"M. Jacobsson and etal \"A network architecture for personal networks \" in Proceedings of the 14th IST Mobile and Wireless Communications Summit June 2005. M. Jacobsson and et al. \"A network architecture for personal networks \" in Proceedings of the 14th IST Mobile and Wireless Communications Summit June 2005."},{"key":"e_1_3_2_1_7_1","unstructured":"M. Jacobsson and etal \"Magnet beyond deliverable 2.3.1: Specification of pn networking an security components \" 2007. (http:\/\/www.ist-magnet.org). M. Jacobsson and et al. \"Magnet beyond deliverable 2.3.1: Specification of pn networking an security components \" 2007. (http:\/\/www.ist-magnet.org)."},{"key":"e_1_3_2_1_8_1","unstructured":"C. Liu and J. Kaiser \"A survey of mobile ad hoc network routing protocols \" tech. rep. 2005. (http:\/\/www.minema.di.fc.ul.pt\/reports). C. Liu and J. Kaiser \"A survey of mobile ad hoc network routing protocols \" tech. rep. 2005. (http:\/\/www.minema.di.fc.ul.pt\/reports)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/938985.938999"},{"key":"e_1_3_2_1_10_1","unstructured":"R. Krishnan and J. Silvester \"Choice of allocation granularity in multipath source routing schemes \" in Proceeding of INFOCOM '93 1993. R. Krishnan and J. Silvester \"Choice of allocation granularity in multipath source routing schemes \" in Proceeding of INFOCOM '93 1993."},{"key":"e_1_3_2_1_11_1","article-title":"Performance comparison of wireless mobile ad-hoc network routing protocols","volume":"8","author":"Kumar A.","year":"2008","journal-title":"International Journal of Computer Science and Network Security"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/288235.288256"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"C. Perkins E. Royer S. Das and M. Marina \"Performance comparison of two on-demand routing protocols for ad hoc networks \" IEEE Personal Communications vol. 8 Feb. 2001. C. Perkins E. Royer S. Das and M. Marina \"Performance comparison of two on-demand routing protocols for ad hoc networks \" IEEE Personal Communications vol. 8 Feb. 2001.","DOI":"10.1109\/98.904895"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"M. Abomasan T. Wysoeki and J. Lipman \"Performance investigation on three--classes of manet routing protocols \" in Proceedings of 2005 Asia-Pacific Conference on Communications Oct. 2005. M. Abomasan T. Wysoeki and J. Lipman \"Performance investigation on three--classes of manet routing protocols \" in Proceedings of 2005 Asia-Pacific Conference on Communications Oct. 2005.","DOI":"10.1109\/APCC.2005.1554167"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/IMSCCS.2008.21"},{"key":"e_1_3_2_1_16_1","unstructured":"N.F. Maxemchuk \"Dispersity routing: Past and present \" in Proceedings of IEEE Military Communications Conference (MILCOM '07). N.F. Maxemchuk \"Dispersity routing: Past and present \" in Proceedings of IEEE Military Communications Conference (MILCOM '07)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"P.P. Pham and S. Perreau \"Increasing the network performance using multipath routing mechanism with load balancing \" Ad Hoc Networks vol. 2 2004. P.P. Pham and S. Perreau \"Increasing the network performance using multipath routing mechanism with load balancing \" Ad Hoc Networks vol. 2 2004.","DOI":"10.1016\/j.adhoc.2003.09.003"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"A. Valera W. Seah and S. Rao \"Cooperative packet caching and shortest multipath routing in mobile ad hoc networks \" in Proceeding of INFOCOM '03 vol. 1 March 2003. A. Valera W. Seah and S. Rao \"Cooperative packet caching and shortest multipath routing in mobile ad hoc networks \" in Proceeding of INFOCOM '03 vol. 1 March 2003.","DOI":"10.1109\/INFCOM.2003.1208678"},{"key":"e_1_3_2_1_19_1","volume-title":"Networking and Mobile Computing","volume":"2","author":"Wang H.","year":"2005"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"R. Leung J. Liu E. Poon A.-L. Chan and B. Li \"Mp-dsr: a qos-aware multi-path dynamic source routing protocol for wireless ad-hoc networks \" in Proceeding of 26th IEEE Annual Conference on Local Computer Networks (LCN '01) pp. 132--141 2001. R. Leung J. Liu E. Poon A.-L. Chan and B. Li \"Mp-dsr: a qos-aware multi-path dynamic source routing protocol for wireless ad-hoc networks \" in Proceeding of 26th IEEE Annual Conference on Local Computer Networks (LCN '01) pp. 132--141 2001.","DOI":"10.1109\/LCN.2001.990778"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"S.-J. Lee and M. Gerla \"Split multipath routing with maximally disjoint paths in ad hoc networks \" in Proceeding of IEEE International Conference on Communications (ICC '01) vol. 10 2001. S.-J. Lee and M. Gerla \"Split multipath routing with maximally disjoint paths in ad hoc networks \" in Proceeding of IEEE International Conference on Communications (ICC '01) vol. 10 2001.","DOI":"10.1109\/ICC.2001.937262"},{"key":"e_1_3_2_1_22_1","unstructured":"A. Nasipuri and S. Das \"On-demand multipath routing for mobile ad hoc networks \" in Proceeding of 8th International Conference on Computer Communications and Networks 1999. A. Nasipuri and S. Das \"On-demand multipath routing for mobile ad hoc networks \" in Proceeding of 8th International Conference on Computer Communications and Networks 1999."}],"event":{"name":"ICPS '09: International Conference on Pervasive Services","sponsor":["ACM Association for Computing Machinery"],"location":"London United Kingdom","acronym":"ICPS '09"},"container-title":["Proceedings of the 3rd international workshop on Adaptive and dependable mobile ubiquitous systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1568173.1568175","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1568173.1568175","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:22:32Z","timestamp":1750278152000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1568173.1568175"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,7,13]]},"references-count":22,"alternative-id":["10.1145\/1568173.1568175","10.1145\/1568173"],"URL":"https:\/\/doi.org\/10.1145\/1568173.1568175","relation":{},"subject":[],"published":{"date-parts":[[2009,7,13]]},"assertion":[{"value":"2009-07-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}