{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:51:05Z","timestamp":1756000265172,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,10,21]],"date-time":"2012-10-21T00:00:00Z","timestamp":1350777600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10,21]]},"DOI":"10.1145\/2387238.2387288","type":"proceedings-article","created":{"date-parts":[[2012,10,22]],"date-time":"2012-10-22T12:07:05Z","timestamp":1350907625000},"page":"295-304","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Towards trustworthy simulation of wireless MAC\/PHY layers"],"prefix":"10.1145","author":[{"given":"Laura Marie","family":"Feeney","sequence":"first","affiliation":[{"name":"Swedish Institute of Computer Science, Kista, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2012,10,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1868589.1868611"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1322263.1322318"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.SIMUTOOLS2009.5585"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/584490.584499"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1298197.1298203"},{"key":"e_1_3_2_1_6_1","volume-title":"Dept. of Computer Science","author":"Di P.","year":"2008","unstructured":"P. Di , Y. Houri , K. Kutzner , and T. Fuhrmann . Towards comparable network simulations. Interner Bericht 2008-9 , Dept. of Computer Science , Universitat Karlsruhe (TH) , Aug 2008 . P. Di, Y. Houri, K. Kutzner, and T. Fuhrmann. Towards comparable network simulations. Interner Bericht 2008-9, Dept. of Computer Science, Universitat Karlsruhe (TH), Aug 2008."},{"key":"e_1_3_2_1_8_1","volume-title":"Proc. of the 4th Int'l Workshop on OMNeT++","author":"Feeney L. M.","year":"2011","unstructured":"L. M. Feeney . Poster abstract : Two simple tools for testing wireless communication modules in OMNeT++ . In Proc. of the 4th Int'l Workshop on OMNeT++ , 2011 . L. M. Feeney. Poster abstract: Two simple tools for testing wireless communication modules in OMNeT++. In Proc. of the 4th Int'l Workshop on OMNeT++, 2011."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1155\/2010\/601892"},{"key":"e_1_3_2_1_10_1","volume-title":"Proc. of the 4th Workshop on Mobile Ad-Hoc Networks, WMAN","author":"Ivanov S.","year":"2007","unstructured":"S. Ivanov , A. Herms , and G. Lukas . Experimental validation of the ns-2 wireless model using simulation, emulation, and real network . In Proc. of the 4th Workshop on Mobile Ad-Hoc Networks, WMAN , 2007 . S. Ivanov, A. Herms, and G. Lukas. Experimental validation of the ns-2 wireless model using simulation, emulation, and real network. In Proc. of the 4th Workshop on Mobile Ad-Hoc Networks, WMAN, 2007."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.SIMUTOOLS2008.3031"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICN.2008.97"},{"key":"e_1_3_2_1_13_1","unstructured":"The OMNeT++ homepage. http:\/\/www.omnetpp.org.  The OMNeT++ homepage. http:\/\/www.omnetpp.org."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2011.04.004"},{"key":"e_1_3_2_1_15_1","volume-title":"K","author":"Varga A.","year":"2010","unstructured":"A. Varga . OMNeT++. In K . Wehrle, M. G\u00fcnes, and J. Gross, editors, Modeling and Tools for Network Simulation. Springer-Verlag , 2010 . A. Varga. OMNeT++. In K. Wehrle, M. G\u00fcnes, and J. Gross, editors, Modeling and Tools for Network Simulation. Springer-Verlag, 2010."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.VALUETOOLS2009.7651"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.SIMUTOOLS2009.5555"}],"event":{"name":"MSWiM '12: The 15th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","sponsor":["SIGSIM ACM Special Interest Group on Simulation and Modeling"],"location":"Paphos Cyprus","acronym":"MSWiM '12"},"container-title":["Proceedings of the 15th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2387238.2387288","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2387238.2387288","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:00:55Z","timestamp":1750276855000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2387238.2387288"}},"subtitle":["a comparison framework"],"short-title":[],"issued":{"date-parts":[[2012,10,21]]},"references-count":16,"alternative-id":["10.1145\/2387238.2387288","10.1145\/2387238"],"URL":"https:\/\/doi.org\/10.1145\/2387238.2387288","relation":{},"subject":[],"published":{"date-parts":[[2012,10,21]]},"assertion":[{"value":"2012-10-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}