{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:19:44Z","timestamp":1750306784841,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,11,3]],"date-time":"2013-11-03T00:00:00Z","timestamp":1383436800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,11,3]]},"DOI":"10.1145\/2508222.2508224","type":"proceedings-article","created":{"date-parts":[[2013,11,6]],"date-time":"2013-11-06T19:30:29Z","timestamp":1383766229000},"page":"9-16","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["On the number of candidates in opportunistic routing for multi-hop wireless networks"],"prefix":"10.1145","author":[{"given":"Amir","family":"Darehshoorzadeh","sequence":"first","affiliation":[{"name":"University of Ottawa, Ottawa, ON, Canada"}]},{"given":"Mohammed","family":"Almulla","sequence":"additional","affiliation":[{"name":"Kuwait University, Kuwait, Kuwait"}]},{"given":"Azzedine","family":"Boukerche","sequence":"additional","affiliation":[{"name":"University of Ottawa, Ottawa, ON, Canada"}]},{"given":"Sonny","family":"Chaiwala","sequence":"additional","affiliation":[{"name":"Bitfence Inc., Ottawa, ON, Canada"}]}],"member":"320","published-online":{"date-parts":[[2013,11,3]]},"reference":[{"unstructured":"The Network Simulator ns-2.  The Network Simulator ns-2.","key":"e_1_3_2_1_1_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1145\/972374.972387"},{"key":"e_1_3_2_1_3_1","volume-title":"Mobile Ad Hoc Networks","author":"Boukerche A.","year":"2008","unstructured":"A. Boukerche . Algorithms and Protocols for Wireless , Mobile Ad Hoc Networks . Wiley-IEEE Press , 2008 . A. Boukerche. Algorithms and Protocols for Wireless, Mobile Ad Hoc Networks. Wiley-IEEE Press, 2008."},{"key":"e_1_3_2_1_4_1","first-page":"373","volume-title":"Simulation and Modeling of Wireless, Mobile, and AD HOC Networks","author":"Boukerche A.","year":"2005","unstructured":"A. Boukerche and L. Bononi . Simulation and Modeling of Wireless, Mobile, and AD HOC Networks , pages 373 -- 409 . John Wiley & Sons, Inc. , 2005 . A. Boukerche and L. Bononi. Simulation and Modeling of Wireless, Mobile, and AD HOC Networks, pages 373--409. John Wiley & Sons, Inc., 2005."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1016\/j.comnet.2011.05.010"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1109\/GLOCOM.2010.5683490"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1145\/1755743.1755747"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1145\/1868612.1868621"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1109\/IWCMC.2012.6314199"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1016\/j.comnet.2011.06.009"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1007\/s11276-005-1766-z"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1109\/TNET.2010.2070844"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1109\/INFCOM.2012.6195683"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1109\/MOBHOC.2009.5336939"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1109\/TMC.2009.82"},{"key":"e_1_3_2_1_16_1","volume-title":"R: A Language and Environment for Statistical Computing","author":"Team R. D. C.","year":"2008","unstructured":"R. D. C. Team . R: A Language and Environment for Statistical Computing . R Foundation for Statistical Computing, Vienna, Austria , 2008 . ISBN 3-900051-07-0. R. D. C. Team. R: A Language and Environment for Statistical Computing. R Foundation for Statistical Computing, Vienna, Austria, 2008. ISBN 3-900051-07-0."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1145\/1215976.1215978"}],"event":{"sponsor":["SIGSIM ACM Special Interest Group on Simulation and Modeling"],"acronym":"MSWiM '13","name":"MSWiM '13: 16th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","location":"Barcelona Spain"},"container-title":["Proceedings of the 11th ACM international symposium on Mobility management and wireless access"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2508222.2508224","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2508222.2508224","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:34:11Z","timestamp":1750232051000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2508222.2508224"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11,3]]},"references-count":17,"alternative-id":["10.1145\/2508222.2508224","10.1145\/2508222"],"URL":"https:\/\/doi.org\/10.1145\/2508222.2508224","relation":{},"subject":[],"published":{"date-parts":[[2013,11,3]]},"assertion":[{"value":"2013-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}