{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:20:07Z","timestamp":1750306807262,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,1,9]],"date-time":"2014-01-09T00:00:00Z","timestamp":1389225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,1,9]]},"DOI":"10.1145\/2557977.2558024","type":"proceedings-article","created":{"date-parts":[[2014,4,1]],"date-time":"2014-04-01T13:07:05Z","timestamp":1396357625000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["PRoPHET routing based on distance mechanism in disruption-tolerant network"],"prefix":"10.1145","author":[{"given":"Phearin","family":"Sok","sequence":"first","affiliation":[{"name":"Konkuk University, Seoul, Republic of Korea"}]},{"given":"Keecheon","family":"Kim","sequence":"additional","affiliation":[{"name":"Konkuk University, Seoul, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2014,1,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC4838"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863960"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSN.2009.44"},{"key":"e_1_3_2_1_4_1","unstructured":"King S. W. Phang K. K. Ling T. C. and Fong A. T. Intelligent IEEE 802.11 B Wireless Networks Mac Layer Diagnostic Controller in Mobile Ad Hoc Network. Malaysian Journal of Computer Science 20(2).  King S. W. Phang K. K. Ling T. C. and Fong A. T. Intelligent IEEE 802.11 B Wireless Networks Mac Layer Diagnostic Controller in Mobile Ad Hoc Network . Malaysian Journal of Computer Science 20(2)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1868521.1868539"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC6693"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/961268.961272"},{"key":"e_1_3_2_1_8_1","first-page":"210","volume-title":"2010 IEEE International Conference on.","author":"Mangrulkar R. S.","year":"2010","unstructured":"Mangrulkar , R. S. and Atique , M . Routing protocol for Delay Tolerant Network: A survey and comparison. Communication Control and Computing Technologies (ICCCCT) . 2010 IEEE International Conference on. pp. 210 -- 215 , 7--9 Oct. 2010 . Mangrulkar, R. S. and Atique, M. Routing protocol for Delay Tolerant Network: A survey and comparison. Communication Control and Computing Technologies (ICCCCT). 2010 IEEE International Conference on. pp.210--215, 7--9 Oct. 2010."},{"key":"e_1_3_2_1_9_1","first-page":"248","volume-title":"2010 Second International Workshop on","volume":"1","author":"Peng Wang","year":"2010","unstructured":"Peng Wang and Fuke Shen. Method to Improve the Performance of PROPHET Routing Protocol. Education Technology and Computer Science (ETCS) . 2010 Second International Workshop on vol. 1 . pp. 248 -- 251 . 6--7 March 2010 . Peng Wang and Fuke Shen. Method to Improve the Performance of PROPHET Routing Protocol. Education Technology and Computer Science (ETCS). 2010 Second International Workshop on vol.1. pp.248--251. 6--7 March 2010."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2005.1605726"},{"key":"e_1_3_2_1_11_1","unstructured":"The Manual -- NS-2. http:\/\/www.isi.edu\/nsnam\/ns\/doc\/index.html  The Manual -- NS-2. http:\/\/www.isi.edu\/nsnam\/ns\/doc\/index.html"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2010.162"},{"key":"e_1_3_2_1_13_1","volume-title":"May","author":"Warthman F.","year":"2003","unstructured":"Warthman , F. Delay Tolerant Network -- A Tutorial. version 1.1 , May 2003 . Warthman, F. Delay Tolerant Network -- A Tutorial. version 1.1, May 2003."}],"event":{"name":"ICUIMC '14: The 8th International Conference on Ubiquitous Information Management and Communication","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing","SKKU SUNGKYUNKWAN UNIVERSITY"],"location":"Siem Reap Cambodia","acronym":"ICUIMC '14"},"container-title":["Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2557977.2558024","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2557977.2558024","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:34:59Z","timestamp":1750232099000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2557977.2558024"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,1,9]]},"references-count":13,"alternative-id":["10.1145\/2557977.2558024","10.1145\/2557977"],"URL":"https:\/\/doi.org\/10.1145\/2557977.2558024","relation":{},"subject":[],"published":{"date-parts":[[2014,1,9]]},"assertion":[{"value":"2014-01-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}