{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:04:10Z","timestamp":1758845050157,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,10,26]],"date-time":"2011-10-26T00:00:00Z","timestamp":1319587200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100004963","name":"Seventh Framework Programme","doi-asserted-by":"publisher","award":["ICT-224282"],"award-info":[{"award-number":["ICT-224282"]}],"id":[{"id":"10.13039\/501100004963","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,10,26]]},"DOI":"10.1145\/2093698.2093776","type":"proceedings-article","created":{"date-parts":[[2012,1,17]],"date-time":"2012-01-17T17:20:41Z","timestamp":1326820841000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Applying swarm intelligence to a novel congestion control approach for wireless sensor networks"],"prefix":"10.1145","author":[{"given":"Pavlos","family":"Antoniou","sequence":"first","affiliation":[{"name":"University of Cyprus, Nicosia, Cyprus"}]},{"given":"Andreas","family":"Pitsillides","sequence":"additional","affiliation":[{"name":"University of Cyprus, Nicosia, Cyprus"}]},{"given":"Andries","family":"Engelbrecht","sequence":"additional","affiliation":[{"name":"University of Pretoria, Pretoria, South Africa"}]},{"given":"Tim","family":"Blackwell","sequence":"additional","affiliation":[{"name":"University of London, UK"}]},{"given":"Loizos","family":"Michael","sequence":"additional","affiliation":[{"name":"Open University of Cyprus, Nicosia, Cyprus"}]}],"member":"320","published-online":{"date-parts":[[2011,10,26]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1016\/S1389-1286(01)00302-4"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1109\/MWC.2004.1368893"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1016\/j.adhoc.2008.06.003"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.5555\/1689599.1689830"},{"key":"e_1_3_2_1_5_1","volume-title":"3rd Inter. Symposium on Applied Sciences in Biomedical and Communication Technologies","author":"Antoniou P.","year":"2010","unstructured":"P. Antoniou , A. Pitsillides , A. P. Engelbrecht , and T. Blackwell . Mimicking the bird flocking behavior for controlling congestion in sensor networks (invited paper) . In 3rd Inter. Symposium on Applied Sciences in Biomedical and Communication Technologies , November 2010 . P. Antoniou, A. Pitsillides, A. P. Engelbrecht, and T. Blackwell. Mimicking the bird flocking behavior for controlling congestion in sensor networks (invited paper). In 3rd Inter. Symposium on Applied Sciences in Biomedical and Communication Technologies, November 2010."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1007\/978-3-642-10865-5_21"},{"issue":"1","key":"e_1_3_2_1_7_1","article-title":"Swarm intelligence: From natural to artificial systems","volume":"4","author":"Bonabeau E.","year":"2001","unstructured":"E. Bonabeau , M. Dorigo , and G. Theraulaz . Swarm intelligence: From natural to artificial systems . J. Artificial Societies and Social Simulation , 4 ( 1 ), 2001 . E. Bonabeau, M. Dorigo, and G. Theraulaz. Swarm intelligence: From natural to artificial systems. J. Artificial Societies and Social Simulation, 4(1), 2001.","journal-title":"J. Artificial Societies and Social Simulation"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1002\/ett.1062"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1016\/j.comnet.2010.05.014"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1006\/jtbi.2002.3065"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1109\/MCOM.2006.1632658"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1109\/ICSCN.2008.4447231"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.5555\/1251990.1253406"},{"key":"e_1_3_2_1_14_1","volume-title":"Department of Computer Science","author":"Loizou M.","year":"2010","unstructured":"M. Loizou . Mimicking nature in designing robust congestion control mechanism in sensor networks (in greek). Master's thesis , Department of Computer Science , University of Cyprus , 2010 . M. Loizou. Mimicking nature in designing robust congestion control mechanism in sensor networks (in greek). Master's thesis, Department of Computer Science, University of Cyprus, 2010."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1109\/ICNP.2006.320202"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1145\/1159913.1159922"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1109\/MCOM.2009.5181887"},{"unstructured":"The Network Simulator NS-2. http:\/\/www.isi.edu\/nsnam\/ns.  The Network Simulator NS-2. http:\/\/www.isi.edu\/nsnam\/ns.","key":"e_1_3_2_1_18_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1145\/958491.958523"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1145\/1098918.1098931"}],"event":{"sponsor":["Universitat Pompeu Fabra","IEEE","Technical University of Catalonia Spain Technical University of Catalonia (UPC), Spain","River Publishers River Publishers","CTTC Technological Center for Telecommunications of Catalonia","CTIF Kyranova Ltd, Center for TeleInFrastruktur"],"acronym":"ISABEL '11","name":"ISABEL '11: International Symposium on Applied Sciences in Biomedical and Communication Technologies","location":"Barcelona Spain"},"container-title":["Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2093698.2093776","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2093698.2093776","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:54:49Z","timestamp":1750240489000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2093698.2093776"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10,26]]},"references-count":20,"alternative-id":["10.1145\/2093698.2093776","10.1145\/2093698"],"URL":"https:\/\/doi.org\/10.1145\/2093698.2093776","relation":{},"subject":[],"published":{"date-parts":[[2011,10,26]]},"assertion":[{"value":"2011-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}