{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:28:17Z","timestamp":1750307297653,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,2,21]],"date-time":"2011-02-21T00:00:00Z","timestamp":1298246400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,2,21]]},"DOI":"10.1145\/1968613.1968714","type":"proceedings-article","created":{"date-parts":[[2011,4,19]],"date-time":"2011-04-19T12:45:23Z","timestamp":1303217123000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Broadcast analysis of spanning tree flooding algorithm for mobile ad hoc networks"],"prefix":"10.1145","author":[{"given":"Haklin","family":"Kimm","sequence":"first","affiliation":[{"name":"East Stroudsburg University, East Stroudsburg, PA"}]},{"given":"Adam","family":"Engle","sequence":"additional","affiliation":[{"name":"East Stroudsburg University, East Stroudsburg, PA"}]},{"given":"Fenglien","family":"Lee","sequence":"additional","affiliation":[{"name":"University of Guam, Mangilao, GU"}]}],"member":"320","published-online":{"date-parts":[[2011,2,21]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Barcelo \"MANET and Wireless Sensor Networks\" http:\/\/www.ac.upc.es\/CompNet."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/1201832"},{"key":"e_1_3_2_1_3_1","unstructured":"Blaupunkt DX-V TravelPilot Navigation System; http:\/\/www.ecrater.com\/product.php?pid=52385"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/820264.820487"},{"key":"e_1_3_2_1_5_1","unstructured":"Cavin Sasson and Schiper \"On the Accuracy of MANET Simulations\" http:\/\/citeseer.ist.psu.edu\/ cavin02accuracy.html."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1019108612308"},{"key":"e_1_3_2_1_7_1","unstructured":"Global Positioning System Overview; http:\/\/www.colorado.edu\/geography\/gcraft\/notes\/gps\/gps_f.html."},{"key":"e_1_3_2_1_8_1","volume-title":"ConTel","author":"Aggelou George","year":"2003","unstructured":"George Aggelou, \"Anytime, Anywhere, Anyhow Multimedia Wireless Access: The Vision of Mobile Ad Hoc Networking\", ConTel 2003, 6\/2003."},{"volume-title":"Workshop, Bulgaria, 10\/2002","author":"Spaniol Gunes","key":"e_1_3_2_1_9_1","unstructured":"Gunes and Spaniol, \"Routing Algorithms for Mobile Multi-Hop Ah-Hoc Networks\", NGNT Int'l Workshop, Bulgaria, 10\/2002."},{"key":"e_1_3_2_1_10_1","first-page":"261","volume-title":"A Global On-demand Routing Protocol for Mobile Ad hoc Networks,\" Proceedings of the 6th IEEE International Symposium on Network Computing and Applications","author":"Lee F.","year":"2007","unstructured":"F. Lee, C. Reinhart and H. Kimm, \"A Global On-demand Routing Protocol for Mobile Ad hoc Networks,\" Proceedings of the 6th IEEE International Symposium on Network Computing and Applications, Cambridge, MA, July 12--14, 2007, pp. 261--264."},{"key":"e_1_3_2_1_11_1","unstructured":"Humayun Bakht \"Routing protocols for mobile ad-hoc networks \" http:\/\/www.computingunplugged.com\/issues\/issue200407\/00001326001.html"},{"key":"e_1_3_2_1_12_1","volume-title":"Proc. 2003 Workshop on the Internet, Telecomm, and Signal Proc. (WITSP'03)","author":"Lipman J.","year":"2003","unstructured":"J. Lipman, P. Boustead, J. Chicharo, J. Judge, \"Optimized Flooding Algorithms For Ad Hoc Networks\" Proc. 2003 Workshop on the Internet, Telecomm, and Signal Proc. (WITSP'03), Coolangatta, Australia, December 2003."},{"key":"e_1_3_2_1_13_1","unstructured":"Jun-Zhao Sun \"Mobile Ad Hoc Networking: An Essential Technology for Pervasive Computing\" ICII01 10\/2001."},{"volume-title":"WD '08","author":"N. Al","key":"e_1_3_2_1_14_1","unstructured":"Kadi, N. Al agha, K, \"Optimized MPR-based flooding in wireless ad hoc network using network coding,\" Wireless Days, 2008. WD '08. 1st IFIP."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/501431.501432"},{"key":"e_1_3_2_1_16_1","unstructured":"Network Simulator: NS2; http:\/\/nsnam.isi.edu\/nsnam\/index.php\/Main_Page"},{"key":"e_1_3_2_1_17_1","unstructured":"Overview of Ad Hoc Routing Protocols; http:\/\/www.comp.brad.ac.uk\/~sburuha1\/routingprot.htm"},{"key":"e_1_3_2_1_18_1","unstructured":"Padmini Misra \"Routing Protocols for Ah Hoc Mobile Wireless Networks\" http:\/\/www.cs.wustl.edu\/~jain\/cis788-99\/ftp\/adhoc_routing\/index.html"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1006968"},{"volume-title":"IEEE WCNC2000","author":"Perkins Royer","key":"e_1_3_2_1_20_1","unstructured":"Royer and Perkins, \"An Implementation Study of the AODV Routing Protocol\", IEEE WCNC2000."},{"key":"e_1_3_2_1_21_1","volume-title":"IASTED WNET2004","author":"Lee Huang","year":"2004","unstructured":"Su, Huang and Lee, \"An Adaptive Location-Aware Path Finding Approach for Ad Hoc Networks\", IASTED WNET2004, 7\/2004."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/313451.313525"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/1206793"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/1785246.1785310"}],"event":{"name":"ICUIMC '11: The 5th International Conference on Ubiquitous Information Management and Communication","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","SKKU SUNGKYUNKWAN UNIVERSITY"],"location":"Seoul Korea","acronym":"ICUIMC '11"},"container-title":["Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1968613.1968714","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1968613.1968714","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:59:49Z","timestamp":1750244389000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1968613.1968714"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,2,21]]},"references-count":24,"alternative-id":["10.1145\/1968613.1968714","10.1145\/1968613"],"URL":"https:\/\/doi.org\/10.1145\/1968613.1968714","relation":{},"subject":[],"published":{"date-parts":[[2011,2,21]]},"assertion":[{"value":"2011-02-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}