{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:31:00Z","timestamp":1759332660301,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,6,22]],"date-time":"2015-06-22T00:00:00Z","timestamp":1434931200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Singapore MOE AcRF Tier 1","award":["MOE2013-T1-002-005"],"award-info":[{"award-number":["MOE2013-T1-002-005"]}]},{"name":"NSF","award":["CNS-1116970"],"award-info":[{"award-number":["CNS-1116970"]}]},{"name":"Singapore MOE AcRF Tier 2","award":["MOE2012-T2-1-070"],"award-info":[{"award-number":["MOE2012-T2-1-070"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,6,22]]},"DOI":"10.1145\/2746285.2746308","type":"proceedings-article","created":{"date-parts":[[2015,6,12]],"date-time":"2015-06-12T18:43:54Z","timestamp":1434134634000},"page":"107-116","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["From Rateless to Hopless"],"prefix":"10.1145","author":[{"given":"Zhenjiang","family":"Li","sequence":"first","affiliation":[{"name":"Nanyang Technological University, Singapore, Singapore"}]},{"given":"Wan","family":"Du","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore, Singapore"}]},{"given":"Yuanqing","family":"Zheng","sequence":"additional","affiliation":[{"name":"Hong Kong Polytechnic University, Hong Kong, Hong Kong"}]},{"given":"Mo","family":"Li","sequence":"additional","affiliation":[{"name":"Hong Kong Polytechnic University, Singapore, Singapore"}]},{"given":"Dapeng","family":"Wu","sequence":"additional","affiliation":[{"name":"University of Florida, Florida, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,6,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080829.1080833"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080091.1080108"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282400"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1979.1056084"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/938985.939000"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567076"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2158477"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2668332.2668335"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1098918.1098930"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018455"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851203"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6847970"},{"key":"e_1_3_2_1_13_1","author":"Han J.","year":"2015","unstructured":"J. Han , C. Qian , P. Yang , D. Ma , Z. Jiang , W. Xi , and J. Zhao . Geneprint: Generic and accurate physical-layer identification for UHF RFID tags. IEEE Trans. on Networking , 2015 . J. Han, C. Qian, P. Yang, D. Ma, Z. Jiang, W. Xi, and J. Zhao. Geneprint: Generic and accurate physical-layer identification for UHF RFID tags. IEEE Trans. on Networking, 2015.","journal-title":"IEEE Trans. on Networking"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2107502.2107505"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2632951.2632970"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2632951.2632965"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2006.1611050"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282426"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345953"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1403004"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.838089"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1403005"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/645413.652135"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567077"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342356.2342363"},{"key":"e_1_3_2_1_27_1","volume-title":"User cooperation diversity - part ii: Implementation aspects and performance analysis","author":"Sendonaris A.","year":"2003","unstructured":"A. Sendonaris , E. Erkip , and B. Aazhang . User cooperation diversity - part ii: Implementation aspects and performance analysis . IEEE Trans. on Communications , 2003 . A. Sendonaris, E. Erkip, and B. Aazhang. User cooperation diversity - part ii: Implementation aspects and performance analysis. IEEE Trans. on Communications, 2003."},{"key":"e_1_3_2_1_28_1","author":"Sendonaris A.","year":"2003","unstructured":"A. Sendonaris , E. Erkip , and B. Aazhang . User cooperation diversity: System description. IEEE Trans. on Communications , 2003 . A. Sendonaris, E. Erkip, and B. Aazhang. User cooperation diversity: System description. IEEE Trans. on Communications, 2003.","journal-title":"User cooperation diversity: System description. IEEE Trans. on Communications"},{"key":"e_1_3_2_1_29_1","volume-title":"USENIX NSDI","author":"Shangguan L.","year":"2015","unstructured":"L. Shangguan , Z. Yang , L. Alex , and Y. Liu . Relative localization of rfid tags using spatial-temporal phase profiling . In USENIX NSDI , 2015 . L. Shangguan, Z. Yang, L. Alex, and Y. Liu. Relative localization of rfid tags using spatial-temporal phase profiling. In USENIX NSDI, 2015."},{"key":"e_1_3_2_1_30_1","author":"Shokrollahi A.","year":"2006","unstructured":"A. Shokrollahi . Raptor codes. IEEE Trans. on Information Theory , 2006 . A. Shokrollahi. Raptor codes. IEEE Trans. on Information Theory, 2006.","journal-title":"Trans. on Information Theory"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS.2012.84"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2011.2170584"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2011.2109042"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218588"}],"event":{"name":"MobiHoc'15: The Sixteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Hangzhou China","acronym":"MobiHoc'15"},"container-title":["Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2746285.2746308","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2746285.2746308","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:16:57Z","timestamp":1750227417000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2746285.2746308"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6,22]]},"references-count":33,"alternative-id":["10.1145\/2746285.2746308","10.1145\/2746285"],"URL":"https:\/\/doi.org\/10.1145\/2746285.2746308","relation":{},"subject":[],"published":{"date-parts":[[2015,6,22]]},"assertion":[{"value":"2015-06-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}