{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:31:00Z","timestamp":1750221060730,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,25]],"date-time":"2018-10-25T00:00:00Z","timestamp":1540425600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Information and Communication Technology Fund (ICT Fund) at EBTIC\/Khalifa University Abu Dhabi UAE","award":["Project number 88434000029 - Grid-enabled Process management"],"award-info":[{"award-number":["Project number 88434000029 - Grid-enabled Process management"]}]},{"name":"Region Rhone-Alpes France","award":["CMIRA2014 AcceuilPro (grant no. 14.004390)","COOPERA (grant no.14.007051)"],"award-info":[{"award-number":["CMIRA2014 AcceuilPro (grant no. 14.004390)","COOPERA (grant no.14.007051)"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,25]]},"DOI":"10.1145\/3267129.3267144","type":"proceedings-article","created":{"date-parts":[[2018,10,26]],"date-time":"2018-10-26T19:34:05Z","timestamp":1540582445000},"page":"70-76","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Local Topology Aware Probabilistic Routing"],"prefix":"10.1145","author":[{"given":"Dawit","family":"Kifle","sequence":"first","affiliation":[{"name":"Addis Ababa University, Addis Ababa, Ethiopia"}]},{"given":"Gabriele","family":"Gianini","sequence":"additional","affiliation":[{"name":"Universita degli Studi di Milano &amp; University Abu Dhabi, Milano, Italy"}]},{"given":"Mulugeta","family":"Libsie","sequence":"additional","affiliation":[{"name":"Addis Ababa University, Addis Ababa, Ethiopia"}]}],"member":"320","published-online":{"date-parts":[[2018,10,25]]},"reference":[{"volume-title":"INFOCOM.","year":"2001","author":"Amis D. Huynh A.","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/41840.41841"},{"volume-title":"International Journal of Information Technology and Knowledge Management","year":"2010","author":"Ade S.","key":"e_1_3_2_1_3_1"},{"volume-title":"Apr- 2017","year":"2017","author":"Annu R.","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","volume-title":"International Conference on Information Security and Privacy (ICISP2015)","volume":"595","author":"Anubhava S.","year":"2015"},{"volume-title":"SICON","year":"1997","author":"Chiang W. Liu C.","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC3561"},{"key":"e_1_3_2_1_8_1","volume-title":"ICITCSA 2017","volume":"6","author":"Rangarajan V.","year":"2017"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/946243.946317"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-585-29603-6_5"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2857218.2857252"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPWC.2005.1431309"},{"volume-title":"USA","year":"1996","author":"Dommety G.","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25978-7_2"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/1719850.1719892"},{"key":"e_1_3_2_1_16_1","first-page":"108","article-title":"Neighbor-avoiding random walks for information dissemination","volume":"7","author":"Gianini Gabriele","year":"2009","journal-title":"Communications of SIWN"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/DEST.2013.6611321"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/DEST.2010.5610638"},{"key":"e_1_3_2_1_19_1","volume-title":"Asian Research Publishing Network (ARPN)","volume":"12","author":"Haider A.","year":"2017"},{"volume-title":"proceedings of IEEE INFOCOM 200, The 21st Annual Joint Conference of the IEEE Computer and Communications Societies","year":"2002","author":"Halpern Z. H. J.","key":"e_1_3_2_1_20_1"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2006.876186"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/288235.288256"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209243"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5121\/ijdps.2012.3210"},{"issue":"3","key":"e_1_3_2_1_25_1","article-title":"Review of various routing protocols for manets","volume":"1","author":"Gupta H. Sadawarti K.","year":"2011","journal-title":"International Journal of Information and Electronics Engineering"},{"key":"e_1_3_2_1_26_1","unstructured":"J. Kaur and G.Singh. Manet routing protocols: A review. JCSE-International Journal of Computer Sciences and Engineering Volume-5 Issue-3 2017.  J. Kaur and G.Singh. Manet routing protocols: A review. JCSE-International Journal of Computer Sciences and Engineering Volume-5 Issue-3 2017."},{"issue":"4","key":"e_1_3_2_1_27_1","first-page":"2016","article-title":"Anonymous routing protocols for mobile ad-hoc networks","volume":"10","author":"Tianbo Z. Lingling L.","year":"2016","journal-title":"International Journal of Security and Its Applications"},{"key":"e_1_3_2_1_28_1","first-page":"9","article-title":"Gossip based routing protocol design for ad hoc networks","author":"Toqeer A. Rehan Ashraf M.","year":"2012","journal-title":"IJCSI International Journal of Computer Science"},{"volume-title":"International Journal of Information Technology and Knowledge Management","year":"2009","author":"Suman P. T.","key":"e_1_3_2_1_29_1"},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings of the IEEE Workshop on Mobile Computing System and Applications","volume":"8","author":"Perkins C.","year":"1999"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/190314.190336"},{"volume-title":"IJCTE","year":"2010","author":"Rajeswari S.","key":"e_1_3_2_1_32_1"},{"key":"e_1_3_2_1_33_1","volume-title":"Jan. - Feb. 2016","volume":"5","author":"Ratul D.","year":"2016"},{"key":"e_1_3_2_1_34_1","first-page":"45","volume-title":"IEEE Personal Communication, 1999","author":"Royal E.M","year":"1999"},{"key":"e_1_3_2_1_35_1","unstructured":"K. Aditi S. Rajeshwar S. Tarun. A comparative review on routing protocols in manet.  K. Aditi S. Rajeshwar S. Tarun. A comparative review on routing protocols in manet."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013763825347"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2010.03.080554"},{"volume-title":"Third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2007)","year":"2007","author":"Xuan Y.","key":"e_1_3_2_1_38_1"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1019106118419"}],"event":{"name":"MSWIM '18: 21st ACM Int'l Conference on Modelling, Analysis and Simulation of Wireless and Mobile Systems","sponsor":["SIGSIM ACM Special Interest Group on Simulation and Modeling"],"location":"Montreal QC Canada","acronym":"MSWIM '18"},"container-title":["Proceedings of the 14th ACM International Symposium on QoS and Security for Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3267129.3267144","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3267129.3267144","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:44:41Z","timestamp":1750207481000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3267129.3267144"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,25]]},"references-count":39,"alternative-id":["10.1145\/3267129.3267144","10.1145\/3267129"],"URL":"https:\/\/doi.org\/10.1145\/3267129.3267144","relation":{},"subject":[],"published":{"date-parts":[[2018,10,25]]},"assertion":[{"value":"2018-10-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}