{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:17:18Z","timestamp":1763468238652,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,10,27]],"date-time":"2014-10-27T00:00:00Z","timestamp":1414368000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,10,27]]},"DOI":"10.1145\/2670518.2673862","type":"proceedings-article","created":{"date-parts":[[2014,11,11]],"date-time":"2014-11-11T13:40:05Z","timestamp":1415713205000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Infrastructure Mobility"],"prefix":"10.1145","author":[{"given":"Mahanth","family":"Gowda","sequence":"first","affiliation":[{"name":"University of Illinois (UIUC)"}]},{"given":"Nirupam","family":"Roy","sequence":"additional","affiliation":[{"name":"University of Illinois (UIUC)"}]},{"given":"Romit Roy","family":"Choudhury","sequence":"additional","affiliation":[{"name":"University of Illinois (UIUC)"}]}],"member":"320","published-online":{"date-parts":[[2014,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Designing high performance enterprise wi-fi networks.,\" in NSDI","author":"Murty R.","year":"2008","unstructured":"R. Murty , J. Padhye , R. Chandra , A. Wolman , and B. Zill , \" Designing high performance enterprise wi-fi networks.,\" in NSDI , 2008 . R. Murty, J. Padhye, R. Chandra, A. Wolman, and B. Zill, \"Designing high performance enterprise wi-fi networks.,\" in NSDI, 2008."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2412096.2412098"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2030613.2030647"},{"key":"e_1_3_2_1_4_1","volume-title":"Topology control of multihop wireless networks using transmit power adjustment,\" in Infocom","author":"Ramanathan R.","year":"2000","unstructured":"R. Ramanathan , \" Topology control of multihop wireless networks using transmit power adjustment,\" in Infocom , 2000 . R. Ramanathan et al., \"Topology control of multihop wireless networks using transmit power adjustment,\" in Infocom, 2000."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2348543.2348552"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2500423.2500449"},{"key":"e_1_3_2_1_7_1","unstructured":"\"irobot roomba.\" http:\/\/www.irobot.com\/us\/learn\/home\/roomba.aspx.  \"irobot roomba.\" http:\/\/www.irobot.com\/us\/learn\/home\/roomba.aspx."},{"key":"e_1_3_2_1_8_1","unstructured":"\"Quadcopters.\" http:\/\/www.ted.com\/talks\/raffaello_d_andrea_the_astounding_athletic_power_of_quadcopters.html.  \"Quadcopters.\" http:\/\/www.ted.com\/talks\/raffaello_d_andrea_the_astounding_athletic_power_of_quadcopters.html."},{"key":"e_1_3_2_1_9_1","unstructured":"\"Robots are becoming ready to work among us.\" https:\/\/openslam.org\/.  \"Robots are becoming ready to work among us.\" https:\/\/openslam.org\/."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837274.1837461"},{"key":"e_1_3_2_1_11_1","unstructured":"\"Amazon prime air.\" http:\/\/www.amazon.com\/b?node=8037720011.  \"Amazon prime air.\" http:\/\/www.amazon.com\/b?node=8037720011."},{"key":"e_1_3_2_1_12_1","unstructured":"\"Robots are becoming ready to work among us.\" http:\/\/www.technologyreview.com\/view\/522646\/robots-are-becoming-ready-to-work-among-us\/.  \"Robots are becoming ready to work among us.\" http:\/\/www.technologyreview.com\/view\/522646\/robots-are-becoming-ready-to-work-among-us\/."},{"key":"e_1_3_2_1_13_1","unstructured":"\"Advance in robotic technology.\" http:\/\/www.everything-robotic.com\/.  \"Advance in robotic technology.\" http:\/\/www.everything-robotic.com\/."},{"key":"e_1_3_2_1_14_1","unstructured":"\"USRPN210 - Software Radio.\" https:\/\/www.ettus.com\/product\/details\/UN210-KIT.  \"USRPN210 - Software Radio.\" https:\/\/www.ettus.com\/product\/details\/UN210-KIT."},{"key":"e_1_3_2_1_15_1","unstructured":"\"Top 1 percent of mobile users consume half of worlds bandwidth and gap is growing.\" http:\/\/www.nytimes.com\/2012\/01\/06\/technology\/top-1-of-mobile-users-use-half-of-worlds-wireless-bandwidth.html.  \"Top 1 percent of mobile users consume half of worlds bandwidth and gap is growing.\" http:\/\/www.nytimes.com\/2012\/01\/06\/technology\/top-1-of-mobile-users-use-half-of-worlds-wireless-bandwidth.html."},{"key":"e_1_3_2_1_16_1","unstructured":"\"The law of vital few - 80-20 rule.\" http:\/\/en.wikipedia.org\/wiki\/Pareto_principle.  \"The law of vital few - 80-20 rule.\" http:\/\/en.wikipedia.org\/wiki\/Pareto_principle."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307654"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/990064.990090"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1403006"},{"key":"e_1_3_2_1_20_1","unstructured":"\"Google project loon.\" http:\/\/www.google.com\/loon\/.  \"Google project loon.\" http:\/\/www.google.com\/loon\/."},{"key":"e_1_3_2_1_21_1","volume":"201","author":"Zavlanos M.","unstructured":"M. Zavlanos , \"Network integrity in mobile robotic networks,\" in IEEE Transactions on Automatic Control , 201 3. M. Zavlanos et al., \"Network integrity in mobile robotic networks,\" in IEEE Transactions on Automatic Control, 2013.","journal-title":"\"Network integrity in mobile robotic networks,\" in IEEE Transactions on Automatic Control"},{"key":"e_1_3_2_1_22_1","volume-title":"Controlling groups of mobile beamformers,\" in IEEE CDC","author":"Chatzipanagiotis N.","year":"2012","unstructured":"N. Chatzipanagiotis , \" Controlling groups of mobile beamformers,\" in IEEE CDC , 2012 . N. Chatzipanagiotis et al., \"Controlling groups of mobile beamformers,\" in IEEE CDC, 2012."},{"key":"e_1_3_2_1_23_1","volume-title":"2007 IEEE Conference on, IEEE","author":"Huang Y.","year":"2007","unstructured":"Y. Huang , W. He , K. Nahrstedt , and W. C. Lee , \" Requirements and system architecture design consideration for first responder systems,\" in Technologies for Homeland Security , 2007 IEEE Conference on, IEEE , 2007 . Y. Huang, W. He, K. Nahrstedt, and W. C. Lee, \"Requirements and system architecture design consideration for first responder systems,\" in Technologies for Homeland Security, 2007 IEEE Conference on, IEEE, 2007."},{"key":"e_1_3_2_1_24_1","unstructured":"\"Robotic camera on balls.\" http:\/\/www.gosphero.com\/.  \"Robotic camera on balls.\" http:\/\/www.gosphero.com\/."}],"event":{"name":"HotNets-XIII: The 13th ACM Workshop on Hot Topics in Networks","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","CISCO"],"location":"Los Angeles CA USA","acronym":"HotNets-XIII"},"container-title":["Proceedings of the 13th ACM Workshop on Hot Topics in Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2670518.2673862","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2670518.2673862","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:12:17Z","timestamp":1750227137000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2670518.2673862"}},"subtitle":["A What-if Analysis"],"short-title":[],"issued":{"date-parts":[[2014,10,27]]},"references-count":24,"alternative-id":["10.1145\/2670518.2673862","10.1145\/2670518"],"URL":"https:\/\/doi.org\/10.1145\/2670518.2673862","relation":{},"subject":[],"published":{"date-parts":[[2014,10,27]]},"assertion":[{"value":"2014-10-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}