{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:49:13Z","timestamp":1750308553346,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,11,1]],"date-time":"2015-11-01T00:00:00Z","timestamp":1446336000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-0845994, CNS-1444021"],"award-info":[{"award-number":["CNS-0845994, CNS-1444021"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,11]]},"DOI":"10.1145\/2809695.2809704","type":"proceedings-article","created":{"date-parts":[[2015,11,2]],"date-time":"2015-11-02T18:33:30Z","timestamp":1446489210000},"page":"323-336","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["cETX"],"prefix":"10.1145","author":[{"given":"Song Min","family":"Kim","sequence":"first","affiliation":[{"name":"University of Minnesota, Minneapolis, USA"}]},{"given":"Shuai","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Minnesota, Minneapolis, USA"}]},{"given":"Tian","family":"He","sequence":"additional","affiliation":[{"name":"University of Minnesota, Minneapolis, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,11]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Hostapd. http:\/\/hostap.epitest.fi\/hostapd\/.  Hostapd. http:\/\/hostap.epitest.fi\/hostapd\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Lorcon wireless packet injection lib. https:\/\/code.google.com\/p\/lorcon\/.  Lorcon wireless packet injection lib. https:\/\/code.google.com\/p\/lorcon\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Mit roofnet. http:\/\/pdos.csail.mit.edu\/roofnet\/doku.php?id=publications#sigcomm_traces\/.  Mit roofnet. http:\/\/pdos.csail.mit.edu\/roofnet\/doku.php?id=publications#sigcomm_traces\/."},{"key":"e_1_3_2_1_4_1","volume-title":"MIT","author":"Aguayo D.","year":"2004","unstructured":"D. Aguayo , J. Bicket , and R. Morris . Srcrr: A high throughput routing protocol for 802.11 mesh networks. In Ph.D. Diss , MIT , 2004 . D. Aguayo, J. Bicket, and R. Morris. Srcrr: A high throughput routing protocol for 802.11 mesh networks. In Ph.D. Diss, MIT, 2004."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECON.2012.6275833"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1644038.1644046"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/820747.821305"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6847954"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1182807.1182838"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062689.1062741"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/938985.939000"},{"key":"e_1_3_2_1_12_1","volume-title":"Splash: Fast data dissemination with constructive interference in wireless sensor networks. In nsdi","author":"Doddavenkatappa M.","year":"2013","unstructured":"M. Doddavenkatappa , M. C. Chan , and B. Leong . Splash: Fast data dissemination with constructive interference in wireless sensor networks. In nsdi , 2013 . M. Doddavenkatappa, M. C. Chan, and B. Leong. Splash: Fast data dissemination with constructive interference in wireless sensor networks. In nsdi, 2013."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1023720.1023732"},{"key":"e_1_3_2_1_14_1","volume-title":"HotNets","author":"Fonseca R.","year":"2007","unstructured":"R. Fonseca , O. Gnawali , K. Jamieson , and P. Levis . Four-bit wireless link estimation . In HotNets , 2007 . R. Fonseca, O. Gnawali, K. Jamieson, and P. Levis. Four-bit wireless link estimation. In HotNets, 2007."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1960.tb01603.x"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848236"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/INMIC.2001.995315"},{"key":"e_1_3_2_1_18_1","author":"Cartigny J.","year":"2003","unstructured":"J. Cartigny , F. Ingelrest , and D. Simplot . Rng relay subset flooding protocols in mobile ad hoc networks. International Journal of Foundations of Computer Science , 2003 . J.Cartigny, F. Ingelrest, and D. Simplot. Rng relay subset flooding protocols in mobile ad hoc networks. International Journal of Foundations of Computer Science, 2003.","journal-title":"International Journal of Foundations of Computer Science"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195459"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-585-29603-6_5"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2248371.2248390"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2006.881637"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.203"},{"key":"e_1_3_2_1_24_1","author":"Lim H.","year":"2001","unstructured":"H. Lim and C. Kim . Flooding in wireless ad hoc networks. In Computer Communications Journal , 2001 . H. Lim and C. Kim. Flooding in wireless ad hoc networks. In Computer Communications Journal, 2001.","journal-title":"Flooding in wireless ad hoc networks. In Computer Communications Journal"},{"key":"e_1_3_2_1_25_1","volume-title":"IPSN","author":"Liu T.","year":"2011","unstructured":"T. Liu and A. Cerpa . Foresee (4c): Wireless link prediction using link features . In IPSN , 2011 . T. Liu and A. Cerpa. Foresee (4c): Wireless link prediction using link features. In IPSN, 2011."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2426656.2426682"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2002.1038347"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1387663.1387670"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031508"},{"key":"e_1_3_2_1_30_1","volume-title":"HICSS","author":"Qayyum A.","year":"2002","unstructured":"A. Qayyum , L. Viennot , and A. Laouiti . Multipoint relaying for flooding broadcast messages in mobile wireless networks . In HICSS , 2002 . A. Qayyum, L. Viennot, and A. Laouiti. Multipoint relaying for flooding broadcast messages in mobile wireless networks. In HICSS, 2002."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1098918.1098929"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1689239.1689246"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1859995.1860032"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1460412.1460416"},{"key":"e_1_3_2_1_35_1","volume-title":"INFOCOM","author":"Tang J.","year":"2005","unstructured":"J. Tang , G. Xue , C. Chandler , and W. Zhang . Interference-aware routing in multihop wireless networks using directional antennas . In INFOCOM , 2005 . J. Tang, G. Xue, C. Chandler, and W. Zhang. Interference-aware routing in multihop wireless networks using directional antennas. In INFOCOM, 2005."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/1833515.1833807"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2500423.2500425"},{"key":"e_1_3_2_1_38_1","first-page":"1","volume-title":"Ieee standard part 11: Wireless lan medium access control (mac) and physical layer (phy) specifications","author":"Wireless LAN Working Group","year":"2012","unstructured":"Wireless LAN Working Group . Ieee standard part 11: Wireless lan medium access control (mac) and physical layer (phy) specifications . IEEE Std 802.11-- 2012 (Revision of IEEE Std 802.11--2007), pages 1 -- 2793 , March 2012. Wireless LAN Working Group. Ieee standard part 11: Wireless lan medium access control (mac) and physical layer (phy) specifications. IEEE Std 802.11--2012 (Revision of IEEE Std 802.11--2007), pages 1--2793, March 2012."},{"key":"e_1_3_2_1_39_1","first-page":"1","volume-title":"Ieee standard part 15.4: Low-rate wireless personal area networks (lr-wpans)","author":"Wireless Personal Area Network (WPAN) Working Group","year":"2011","unstructured":"Wireless Personal Area Network (WPAN) Working Group . Ieee standard part 15.4: Low-rate wireless personal area networks (lr-wpans) . IEEE Std 802.15.4- 2011 (Revision of IEEE Std 802.15.4-2006), pages 1 -- 314 , Sept 2011. Wireless Personal Area Network (WPAN) Working Group. Ieee standard part 15.4: Low-rate wireless personal area networks (lr-wpans). IEEE Std 802.15.4-2011 (Revision of IEEE Std 802.15.4-2006), pages 1--314, Sept 2011."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.109"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2008.90"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2009.17"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2004.828953"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1182807.1182839"},{"key":"e_1_3_2_1_45_1","volume-title":"INFOCOM","author":"Zhiwei Zhao G. G. J. B. T. G.","year":"2015","unstructured":"G. G. J. B. T. G. Zhiwei Zhao , Wei Dong and C. Chen . Modeling link correlation in low-power wireless networks . In INFOCOM , 2015 . G. G. J. B. T. G. Zhiwei Zhao, Wei Dong and C. Chen. Modeling link correlation in low-power wireless networks. In INFOCOM, 2015."}],"event":{"name":"SenSys '15: The 13th ACM Conference on Embedded Network Sensor Systems","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems","SIGBED ACM Special Interest Group on Embedded Systems","SIGARCH ACM Special Interest Group on Computer Architecture"],"location":"Seoul South Korea","acronym":"SenSys '15"},"container-title":["Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2809695.2809704","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2809695.2809704","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:03:51Z","timestamp":1750273431000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2809695.2809704"}},"subtitle":["Incorporating Spatiotemporal Correlation for Better Wireless Networking"],"short-title":[],"issued":{"date-parts":[[2015,11]]},"references-count":45,"alternative-id":["10.1145\/2809695.2809704","10.1145\/2809695"],"URL":"https:\/\/doi.org\/10.1145\/2809695.2809704","relation":{},"subject":[],"published":{"date-parts":[[2015,11]]},"assertion":[{"value":"2015-11-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}