{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:18:00Z","timestamp":1750306680426,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,8,11]],"date-time":"2014-08-11T00:00:00Z","timestamp":1407715200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,8,11]]},"DOI":"10.1145\/2632951.2632985","type":"proceedings-article","created":{"date-parts":[[2014,8,1]],"date-time":"2014-08-01T20:13:39Z","timestamp":1406924019000},"page":"135-144","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Capacity of wireless networks with multiple types of multicast sessions"],"prefix":"10.1145","author":[{"given":"Xu","family":"Zheng","sequence":"first","affiliation":[{"name":"Harbin Institute of Technology, Harbin, China"}]},{"given":"Jianzhong","family":"Li","sequence":"additional","affiliation":[{"name":"Harbin Institute of Technology, Harbin, China"}]},{"given":"Hong","family":"Gao","sequence":"additional","affiliation":[{"name":"Harbin Institute of Technology, Harbin, China"}]},{"given":"Zhipeng","family":"Cai","sequence":"additional","affiliation":[{"name":"Georgia State University, Atlanta, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,8,11]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1109\/18.825799"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1109\/TNET.2008.927256"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1109\/TNET.2010.2050901"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1145\/1374618.1374645"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1109\/TIT.2006.890791"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1145\/1161089.1161117"},{"key":"e_1_3_2_1_7_1","first-page":"1701","volume-title":"Proc.IEEE","author":"Wang C.","year":"2011","unstructured":"C. Wang , C. Jiang , Y. Liu , X.-Y. Li , S. Tang , and H. Ma , \" Aggregation capacity of wireless sensor networks: extended network case,\" in INFOCOM , In Proc.IEEE , pp. 1701 -- 1709 , IEEE, 2011 . C. Wang, C. Jiang, Y. Liu, X.-Y. Li, S. Tang, and H. Ma, \"Aggregation capacity of wireless sensor networks: extended network case,\" in INFOCOM, In Proc.IEEE, pp. 1701--1709, IEEE, 2011."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1109\/TNET.2012.2221165"},{"key":"e_1_3_2_1_9_1","first-page":"703","volume-title":"Proc","author":"Peng Q.","year":"2011","unstructured":"Q. Peng , X. Wang , and H. Tang , \" Heterogeneity increases multicast capacity in clustered network,\" in INFOCOM , In Proc . IEEE, pp. 703 -- 711 , IEEE , 2011 . Q. Peng, X. Wang, and H. Tang, \"Heterogeneity increases multicast capacity in clustered network,\" in INFOCOM, In Proc. IEEE, pp. 703--711, IEEE, 2011."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1145\/2248371.2248392"},{"key":"e_1_3_2_1_11_1","first-page":"1","volume-title":"IN Proc.IEEE","author":"Hu C.","year":"2010","unstructured":"C. Hu , X. Wang , D. Nie , and J. Zhao , \" Multicast scaling laws with hierarchical cooperation,\" in INFOCOM , IN Proc.IEEE , pp. 1 -- 9 , IEEE, 2010 . C. Hu, X. Wang, D. Nie, and J. Zhao, \"Multicast scaling laws with hierarchical cooperation,\" in INFOCOM, IN Proc.IEEE, pp. 1--9, IEEE, 2010."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1109\/TIT.2004.826631"},{"key":"e_1_3_2_1_13_1","first-page":"1360","volume-title":"Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies. Proc.. IEEE","volume":"3","author":"Grossglauser M.","year":"2001","unstructured":"M. Grossglauser and D. Tse , \" Mobility increases the capacity of ad-hoc wireless networks,\" in INFOCOM 2001 . Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies. Proc.. IEEE , vol. 3 , pp. 1360 -- 1369 , IEEE, 2001 . M. Grossglauser and D. Tse, \"Mobility increases the capacity of ad-hoc wireless networks,\" in INFOCOM 2001. Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies. Proc.. IEEE, vol. 3, pp. 1360--1369, IEEE, 2001."},{"key":"e_1_3_2_1_14_1","first-page":"520","volume-title":"The 27th Conference on Computer Communications. IEEE","author":"Kozat U. C.","year":"2008","unstructured":"U. C. Kozat , \"On the throughput capacity of opportunistic multicasting with erasure codes,\" in INFOCOM 2008 . The 27th Conference on Computer Communications. IEEE , pp. 520 -- 528 , IEEE, 2008 . U. C. Kozat, \"On the throughput capacity of opportunistic multicasting with erasure codes,\" in INFOCOM 2008. The 27th Conference on Computer Communications. IEEE, pp. 520--528, IEEE, 2008."},{"key":"e_1_3_2_1_15_1","first-page":"1606","volume-title":"The 27th Conference on Computer Communications. IEEE","author":"Law L. K.","year":"2008","unstructured":"L. K. Law , S. V. Krishnamurthy , and M. Faloutsos , \" Capacity of hybrid cellular-ad hoc data networks,\" in INFOCOM 2008 . The 27th Conference on Computer Communications. IEEE , pp. 1606 -- 1614 , IEEE, 2008 . L. K. Law, S. V. Krishnamurthy, and M. Faloutsos, \"Capacity of hybrid cellular-ad hoc data networks,\" in INFOCOM 2008. The 27th Conference on Computer Communications. IEEE, pp. 1606--1614, IEEE, 2008."},{"key":"e_1_3_2_1_16_1","first-page":"1","volume-title":"Proc","author":"Ji M.","year":"2010","unstructured":"M. Ji , Z. Wang , H. R. Sadjadpour , and J. Garcia-Luna-Aceves , \"The capacity of ad hoc networks with heterogeneous traffic using cooperation,\" in INFOCOM , In Proc . IEEE, pp. 1 -- 9 , IEEE , 2010 . M. Ji, Z. Wang, H. R. Sadjadpour, and J. Garcia-Luna-Aceves, \"The capacity of ad hoc networks with heterogeneous traffic using cooperation,\" in INFOCOM, In Proc. IEEE, pp. 1--9, IEEE, 2010."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1145\/2342356.2342401"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1145\/1161089.1161119"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.5555\/1076315"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1007\/s00453-011-9508-3"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1214\/aop\/1176991596"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1007\/0-387-23830-1_8","volume-title":"Connected dominating set in sensor networks and manets,\" in Handbook of combinatorial optimization","author":"Blum J.","year":"2005","unstructured":"J. Blum , M. Ding , A. Thaeler , and X. Cheng , \" Connected dominating set in sensor networks and manets,\" in Handbook of combinatorial optimization , pp. 329 -- 369 , Springer , 2005 . J. Blum, M. Ding, A. Thaeler, and X. Cheng, \"Connected dominating set in sensor networks and manets,\" in Handbook of combinatorial optimization, pp. 329--369, Springer, 2005."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1002\/net.10097"},{"unstructured":"M. Cardei M. X. Cheng X. Cheng and D.-Z. Du \"Connected domination in multihop ad hoc wireless networks \" in JCIS pp. 251--255 2002.  M. Cardei M. X. Cheng X. Cheng and D.-Z. Du \"Connected domination in multihop ad hoc wireless networks \" in JCIS pp. 251--255 2002.","key":"e_1_3_2_1_24_1"},{"key":"e_1_3_2_1_25_1","first-page":"1737","volume-title":"Proc","author":"Du H.","year":"2011","unstructured":"H. Du , Q. Ye , W. Wu , W. Lee , D. Li , D. Du , and S. Howard , \" Constant approximation for virtual backbone construction with guaranteed routing cost in wireless sensor networks,\" in INFOCOM , In Proc . IEEE, pp. 1737 -- 1744 , IEEE , 2011 . H. Du, Q. Ye, W. Wu, W. Lee, D. Li, D. Du, and S. Howard, \"Constant approximation for virtual backbone construction with guaranteed routing cost in wireless sensor networks,\" in INFOCOM, In Proc. IEEE, pp. 1737--1744, IEEE, 2011."}],"event":{"sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"acronym":"MobiHoc'14","name":"MobiHoc'14: The Fifteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing","location":"Philadelphia Pennsylvania USA"},"container-title":["Proceedings of the 15th ACM international symposium on Mobile ad hoc networking and computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2632951.2632985","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2632951.2632985","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:01:09Z","timestamp":1750230069000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2632951.2632985"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8,11]]},"references-count":25,"alternative-id":["10.1145\/2632951.2632985","10.1145\/2632951"],"URL":"https:\/\/doi.org\/10.1145\/2632951.2632985","relation":{},"subject":[],"published":{"date-parts":[[2014,8,11]]},"assertion":[{"value":"2014-08-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}