{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:05:17Z","timestamp":1758845117503,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,25]],"date-time":"2018-10-25T00:00:00Z","timestamp":1540425600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,25]]},"DOI":"10.1145\/3242102.3242116","type":"proceedings-article","created":{"date-parts":[[2018,10,26]],"date-time":"2018-10-26T19:34:05Z","timestamp":1540582445000},"page":"207-215","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["On the Optimality of Opportunistic Routing Protocols for Underwater Sensor Networks"],"prefix":"10.1145","author":[{"given":"Mohsin","family":"Jafri","sequence":"first","affiliation":[{"name":"Universit\u00e0 Ca' Foscari Venezia, Venice, Italy"}]},{"given":"Andrea","family":"Marin","sequence":"additional","affiliation":[{"name":"Universit\u00e0 Ca' Foscari Venezia, Venice, Italy"}]},{"given":"Andrea","family":"Torsello","sequence":"additional","affiliation":[{"name":"Universit\u00e0 Ca' Foscari Venezia, Venice, Italy"}]},{"given":"Majid","family":"Ghaderi","sequence":"additional","affiliation":[{"name":"University of Calgary, Calgary, Canada"}]}],"member":"320","published-online":{"date-parts":[[2018,10,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS.2010.14"},{"volume-title":"Proc. of the Int. Symp. on Communications and Information Technologies, ISCIT. 894--899","author":"Ariyakhajorn J.","key":"e_1_3_2_1_2_1","unstructured":"J. Ariyakhajorn , P. Wannawilai , and C. Sathitwiriyawong . 2006. A comparative study of random waypoint and Gauss-Markov mobility models in the performance evaluation of manet . In Proc. of the Int. Symp. on Communications and Information Technologies, ISCIT. 894--899 . J. Ariyakhajorn, P. Wannawilai, and C. Sathitwiriyawong. 2006. A comparative study of random waypoint and Gauss-Markov mobility models in the performance evaluation of manet. In Proc. of the Int. Symp. on Communications and Information Technologies, ISCIT. 894--899."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2011.06.009"},{"volume-title":"Proc. of the 7th Workshop on New Frontiers in Quantitative Methods in Informatics (InfQ). 18--31","author":"Balsamo S.","key":"e_1_3_2_1_4_1","unstructured":"S. Balsamo , D. Fiems , M. Jafri , and A. Marin . 2017. Analysis of Performance in Depth Based Routing for Underwater Wireless Sensor Networks . In Proc. of the 7th Workshop on New Frontiers in Quantitative Methods in Informatics (InfQ). 18--31 . S. Balsamo, D. Fiems, M. Jafri, and A. Marin. 2017. Analysis of Performance in Depth Based Routing for Underwater Wireless Sensor Networks. In Proc. of the 7th Workshop on New Frontiers in Quantitative Methods in Informatics (InfQ). 18--31."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"L. Brekhovskikh and Y. P. Lysanov. 2003. Fundamentals of Ocean Acoustic 3rd ed.). Springer. L. Brekhovskikh and Y. P. Lysanov. 2003. Fundamentals of Ocean Acoustic 3rd ed.). Springer.","DOI":"10.1121\/1.1792644"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2013.11.003"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/QEST.2012.15"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.08.016"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3154834"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7402259"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2016.2532384"},{"volume-title":"Stochastic geometry for wireless networks","author":"Haenggi M.","key":"e_1_3_2_1_12_1","unstructured":"M. Haenggi . 2013. Stochastic geometry for wireless networks . Cambridge press . M. Haenggi. 2013. Stochastic geometry for wireless networks .Cambridge press."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS.2015.10"},{"volume-title":"Proc. of the 2nd Int. Conf. on Performance evaluation methodologies and tools, Valuetools. 18","author":"Zorzi A. F.","key":"e_1_3_2_1_14_1","unstructured":"A. F. Harris III and M. Zorzi . 2007. Modeling the underwater acoustic channel in ns2 . In Proc. of the 2nd Int. Conf. on Performance evaluation methodologies and tools, Valuetools. 18 . A. F. Harris III and M. Zorzi. 2007. Modeling the underwater acoustic channel in ns2. In Proc. of the 2nd Int. Conf. on Performance evaluation methodologies and tools, Valuetools. 18."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3714"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"R. Lyons and Y. Peres. 2016. Probability on Trees and Networks .Cambridge Series in Statistical and Probabilistic Mathematics. R. Lyons and Y. Peres. 2016. Probability on Trees and Networks .Cambridge Series in Statistical and Probabilistic Mathematics.","DOI":"10.1017\/9781316672815"},{"key":"e_1_3_2_1_17_1","volume-title":"NS3 based simulator for underwater networks. https:\/\/github.com\/rmartin5\/aqua-sim-ng\/. {online","author":"Martin Robert","year":"2018","unstructured":"Robert Martin and Mohsin Jafri . 2016. Aqua Sim-Next Generation : Libraries , NS3 based simulator for underwater networks. https:\/\/github.com\/rmartin5\/aqua-sim-ng\/. {online ; accessed: 05\/05\/ 2018 }. Robert Martin and Mohsin Jafri. 2016. AquaSim-Next Generation : Libraries, NS3 based simulator for underwater networks. https:\/\/github.com\/rmartin5\/aqua-sim-ng\/. {online; accessed: 05\/05\/2018}."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2831296.2831341"},{"volume-title":"Proc. of the 4th Int. Conf. on Underwater Networks & Systems (WUWNet) .","author":"Mirza D.","key":"e_1_3_2_1_19_1","unstructured":"D. Mirza , F. Lu , and C. Schurgers . 2009. Efficient broadcast MAC for underwater networks . In Proc. of the 4th Int. Conf. on Underwater Networks & Systems (WUWNet) . D. Mirza, F. Lu, and C. Schurgers. 2009. Efficient broadcast MAC for underwater networks. In Proc. of the 4th Int. Conf. on Underwater Networks & Systems (WUWNet) ."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2395434"},{"volume-title":"Proc. of the 2nd IEEE Workshop on Mobile Computing Systems and Applications (WMCSA). 90--100","author":"Perkins C. E.","key":"e_1_3_2_1_21_1","unstructured":"C. E. Perkins and E. M. Royer . 1999. Ad-Hoc On Demand Distance Vector Routing . In Proc. of the 2nd IEEE Workshop on Mobile Computing Systems and Applications (WMCSA). 90--100 . C. E. Perkins and E. M. Royer. 1999. Ad-Hoc On Demand Distance Vector Routing. In Proc. of the 2nd IEEE Workshop on Mobile Computing Systems and Applications (WMCSA). 90--100."},{"key":"e_1_3_2_1_22_1","volume-title":"Wireless communications: Principles and Practice","author":"Rappaport T.","unstructured":"T. Rappaport . 2002. Wireless communications: Principles and Practice 2 nd ed.). Prentice Hall . T. Rappaport. 2002. Wireless communications: Principles and Practice 2nd ed.). Prentice Hall.","edition":"2"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"G. F. Riley and T. R. Henderson. 2010. The ns-3 network simulator. In Modeling and tools for network simulation. Springer 15--34. G. F. Riley and T. R. Henderson. 2010. The ns-3 network simulator. In Modeling and tools for network simulation. Springer 15--34.","DOI":"10.1007\/978-3-642-12331-3_2"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1347364.1347373"},{"key":"e_1_3_2_1_25_1","volume-title":"Eedbr: Energy-efficient depth-based routing protocol for underwater wireless sensor networks. In Proc. of the 3rd Int. Conf. on Advanced Computer Science and Information Technology","author":"Wahid A.","year":"2011","unstructured":"A. Wahid , S. Lee , H.-J. Jeong , and D. Kim . 2011 . Eedbr: Energy-efficient depth-based routing protocol for underwater wireless sensor networks. In Proc. of the 3rd Int. Conf. on Advanced Computer Science and Information Technology . Springer , 223--234. A. Wahid, S. Lee, H.-J. Jeong, and D. Kim. 2011. Eedbr: Energy-efficient depth-based routing protocol for underwater wireless sensor networks. In Proc. of the 3rd Int. Conf. on Advanced Computer Science and Information Technology. Springer, 223--234."},{"key":"e_1_3_2_1_26_1","first-page":"72","article-title":"DBR: Depth-Based Routing for underwater sensor networks. In Proc. of the","volume":"4982","author":"Yan H.","year":"2008","unstructured":"H. Yan , Z. J. Shi , and J. Cui . 2008 . DBR: Depth-Based Routing for underwater sensor networks. In Proc. of the Int. Conf. on Research in Networking, NETWORKING Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet , Vol. 4982. 72 -- 86 . H. Yan, Z. J. Shi, and J. Cui. 2008. DBR: Depth-Based Routing for underwater sensor networks. In Proc. of the Int. Conf. on Research in Networking, NETWORKING Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet, Vol. 4982. 72--86.","journal-title":"Int. Conf. on Research in Networking, NETWORKING Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2010.2055886"}],"event":{"name":"MSWIM '18: 21st ACM Int'l Conference on Modelling, Analysis and Simulation of Wireless and Mobile Systems","sponsor":["SIGSIM ACM Special Interest Group on Simulation and Modeling"],"location":"Montreal QC Canada","acronym":"MSWIM '18"},"container-title":["Proceedings of the 21st ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3242102.3242116","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3242102.3242116","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:43:36Z","timestamp":1750207416000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3242102.3242116"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,25]]},"references-count":27,"alternative-id":["10.1145\/3242102.3242116","10.1145\/3242102"],"URL":"https:\/\/doi.org\/10.1145\/3242102.3242116","relation":{},"subject":[],"published":{"date-parts":[[2018,10,25]]},"assertion":[{"value":"2018-10-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}