{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:27:43Z","timestamp":1750307263324,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,12,21]],"date-time":"2010-12-21T00:00:00Z","timestamp":1292889600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,12,21]]},"DOI":"10.1145\/1943628.1943670","type":"proceedings-article","created":{"date-parts":[[2011,2,15]],"date-time":"2011-02-15T18:31:03Z","timestamp":1297794663000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Dynamic load balancing through backup relay in Bluetooth scatternet"],"prefix":"10.1145","author":[{"given":"Sheikh Tahir","family":"Bakhsh","sequence":"first","affiliation":[{"name":"Universiti Teknologi PETRONAS, Tronoh, Perak, Malaysia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Halabi","family":"Hasbullah","sequence":"additional","affiliation":[{"name":"Universiti Teknologi PETRONAS, Tronoh, Perak, Malaysia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sabeen","family":"Tahir","sequence":"additional","affiliation":[{"name":"Universiti Teknologi PETRONAS, Tronoh, Perak, Malaysia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Fazli","family":"Subhan","sequence":"additional","affiliation":[{"name":"Universiti Teknologi PETRONAS, Tronoh, Perak, Malaysia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Aamir","family":"Saeed","sequence":"additional","affiliation":[{"name":"Universiti Teknologi PETRONAS, Tronoh, Perak, Malaysia"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2010,12,21]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"IEEE standard 802.15","author":"Wireless PAN","year":"2002","unstructured":"Wireless PAN medium access control MAC and physical layer PHY specification. IEEE standard 802.15 , IEEE , New York, NY , 2002 . Wireless PAN medium access control MAC and physical layer PHY specification. IEEE standard 802.15, IEEE, New York, NY, 2002."},{"key":"e_1_3_2_1_2_1","volume-title":"Bluetooth Specification v2.0","author":"Bluetooth","year":"2004","unstructured":"Bluetooth SIG , Bluetooth Specification v2.0 . 2004 . Bluetooth SIG, Bluetooth Specification v2.0. 2004."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2006.12.007"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2005.12.001"},{"key":"e_1_3_2_1_5_1","volume-title":"Misic and Jelena Misic1., \"Polling and Bridge Scheduling Algorithms in Bluetooth\" technical report TR 03\/04 Department of Computer Science","author":"Vojislav","year":"2003","unstructured":"Vojislav B. Misic and Jelena Misic1., \"Polling and Bridge Scheduling Algorithms in Bluetooth\" technical report TR 03\/04 Department of Computer Science , University of Manitoba Winnipeg , Manitoba, Canada R3T 2N2 September 2003 . Vojislav B. Misic and Jelena Misic1., \"Polling and Bridge Scheduling Algorithms in Bluetooth\" technical report TR 03\/04 Department of Computer Science, University of Manitoba Winnipeg, Manitoba, Canada R3T 2N2 September 2003."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2005.11.001"},{"key":"e_1_3_2_1_7_1","first-page":"375","volume-title":"proc. of IEEE International Workshop","author":"Bhagwat P.","year":"1999","unstructured":"P. Bhagwat , A. Segall ., \" A Routing Vector Method (RVM) for routing in Bluetooth scatternets\", Mobile Multimedia Communications , in proc. of IEEE International Workshop , pp. 375 -- 379 , 1999 . P. Bhagwat, A. Segall., \"A Routing Vector Method (RVM) for routing in Bluetooth scatternets\", Mobile Multimedia Communications, in proc. of IEEE International Workshop, pp. 375--379, 1999."},{"key":"e_1_3_2_1_8_1","first-page":"56","volume-title":"Second IFIP International Conference on","author":"Chang Chih-Yung","year":"2005","unstructured":"Chih-Yung Chang , Prasan Kumar Sahoo , Shih-Chieh Le ., e., \"LARP : A Novel Routing Protocol for the Bluetooth Scatternet\", in: Wireless and Optical Communications Networks , Second IFIP International Conference on , pp. 56 -- 60 , 2005 . Chih-Yung Chang, Prasan Kumar Sahoo, Shih-Chieh Le., e., \"LARP: A Novel Routing Protocol for the Bluetooth Scatternet\", in: Wireless and Optical Communications Networks, Second IFIP International Conference on, pp. 56--60, 2005."},{"key":"e_1_3_2_1_9_1","first-page":"1014","volume-title":"Proc. of IEEE ICC, Vol 2","author":"Gonzalez-Castano F. J.","year":"2003","unstructured":"F. J. Gonzalez-Castano , J. Garcia-Reinoso , \" Survivable Bluetooth Location Networks\" , in Proc. of IEEE ICC, Vol 2 , pp. 1014 -- 1018 , 15 May 2003 . F. J. Gonzalez-Castano, J. Garcia-Reinoso, \"Survivable Bluetooth Location Networks\", in Proc. of IEEE ICC, Vol 2, pp. 1014--1018, 15 May 2003."},{"key":"e_1_3_2_1_10_1","first-page":"34","volume-title":"Telecommunication Internationa","author":"Waiting A. Darling","year":"2001","unstructured":"A. Darling \" Waiting for the m-commerce explosion \", in Telecommunication Internationa , pp. 34 -- 39 , 2001 . A. Darling \"Waiting for the m-commerce explosion\", in Telecommunication Internationa, pp. 34--39, 2001."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2004.842567"},{"key":"e_1_3_2_1_12_1","volume-title":"proc. of IEEE Global Telecommunications","author":"Gonzalez-Castano F. J.","year":"2005","unstructured":"F. J. Gonzalez-Castano , J. Garcia-Reinoso ., \" Bluetooth location networks\" , in: proc. of IEEE Global Telecommunications , 2005 . F. J. Gonzalez-Castano, J. Garcia-Reinoso., \"Bluetooth location networks\", in: proc. of IEEE Global Telecommunications, 2005."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2007.12.001"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/190314.190336"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/520551.837511"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2005.266"},{"key":"e_1_3_2_1_17_1","first-page":"262","volume-title":"ICNP","author":"Chiang C. C.","year":"1998","unstructured":"C. C. Chiang , M. Gerla ., \"On-demand multicast in mobile wireless networks\" in: proc. of the 6th International Conference on Network Protocols , ICNP , pp. 262 -- 270 , 1998 . C. C. Chiang, M. Gerla., \"On-demand multicast in mobile wireless networks\" in: proc. of the 6th International Conference on Network Protocols, ICNP, pp. 262--270, 1998."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.807340"},{"key":"e_1_3_2_1_19_1","volume-title":"June","author":"University of Cinicinnati Bluetooth simulator (UCBT)","year":"2010","unstructured":"University of Cinicinnati Bluetooth simulator (UCBT) , http:\/\/www.ececs.uc.edu\/_cdmc\/ucbt\/ , June 2010 . University of Cinicinnati Bluetooth simulator (UCBT), http:\/\/www.ececs.uc.edu\/_cdmc\/ucbt\/, June 2010."},{"key":"e_1_3_2_1_20_1","volume-title":"June","author":"The Network","year":"2010","unstructured":"The Network Simulator ns-2 , http:\/\/www.isi.edu\/nsnam\/ns\/ns-build.html , June 2010 . The Network Simulator ns-2, http:\/\/www.isi.edu\/nsnam\/ns\/ns-build.html, June 2010."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2008.10.001"}],"event":{"name":"FIT '10: 8th International Conference on Frontiers of Information Technology","sponsor":["HEC Higher Education Commission, Pakistan","COMSATS Institute of Information Technology","SIGAI ACM Special Interest Group on Artificial Intelligence"],"location":"Islamabad Pakistan","acronym":"FIT '10"},"container-title":["Proceedings of the 8th International Conference on Frontiers of Information Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1943628.1943670","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1943628.1943670","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:52:40Z","timestamp":1750243960000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1943628.1943670"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,12,21]]},"references-count":21,"alternative-id":["10.1145\/1943628.1943670","10.1145\/1943628"],"URL":"https:\/\/doi.org\/10.1145\/1943628.1943670","relation":{},"subject":[],"published":{"date-parts":[[2010,12,21]]},"assertion":[{"value":"2010-12-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}