{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:27:51Z","timestamp":1750220871410,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,12,20]],"date-time":"2019-12-20T00:00:00Z","timestamp":1576800000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,12,20]]},"DOI":"10.1145\/3377713.3377727","type":"proceedings-article","created":{"date-parts":[[2020,2,7]],"date-time":"2020-02-07T10:07:26Z","timestamp":1581070046000},"page":"56-62","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["CNDTR"],"prefix":"10.1145","author":[{"given":"Lin","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Mathematics and Information Engineering, Chongqing University of Education, Chongqing, China"}]}],"member":"320","published-online":{"date-parts":[[2020,2,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Nidhi Hegdea Laurent Massouli\u00e9b1 Laurent Viennot -c2.Self-organizing flows in social networks[J].Theoretical Computer Science (2015) Vol.584: 3--18.  Nidhi Hegdea Laurent Massouli\u00e9b1 Laurent Viennot -c2.Self-organizing flows in social networks[J].Theoretical Computer Science (2015) Vol.584:3--18.","DOI":"10.1016\/j.tcs.2015.02.018"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Tomotaka KIMURA;Takahiro MATSUDA; Tetsuya TAKINE Location-Aware Store-Carry-Forward Routing Based on Node Density Estimation [J].IEICE TRANSACTIONS on Communications (2015) Vol.E98-B No.1 P99--106.  Tomotaka KIMURA;Takahiro MATSUDA; Tetsuya TAKINE Location-Aware Store-Carry-Forward Routing Based on Node Density Estimation [J].IEICE TRANSACTIONS on Communications (2015) Vol.E98-B No.1 P99--106.","DOI":"10.1587\/transcom.E98.B.99"},{"volume-title":"Enabling wireless cooperation in delay tolerant networks[J]. Information Sciences (2015)","author":"Vitor G.","key":"e_1_3_2_1_3_1","unstructured":"Vitor G. Rolla , Author Vitae;Marilia Curado Author Vitae , Enabling wireless cooperation in delay tolerant networks[J]. Information Sciences (2015) Vol. 290 P120--133. Vitor G. Rolla, Author Vitae;Marilia Curado Author Vitae, Enabling wireless cooperation in delay tolerant networks[J]. Information Sciences (2015) Vol.290 P120--133."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Nehra Vibha A. K. Sharma and R. K. Tripathi. \"NMR inspired energy efficient protocol for heterogeneous wireless sensor network.\" Wireless Networks 25.6(2019): 3689--3700.  Nehra Vibha A. K. Sharma and R. K. Tripathi. \"NMR inspired energy efficient protocol for heterogeneous wireless sensor network.\" Wireless Networks 25.6(2019): 3689--3700.","DOI":"10.1007\/s11276-019-01963-2"},{"volume-title":"Performance modeling and analysis of the ADHOC MAC protocol for vehicular networks[J].Wireless Networks (2016)","author":"Qiong Wu","key":"e_1_3_2_1_5_1","unstructured":"Qiong Wu ;Jun Zheng , Performance modeling and analysis of the ADHOC MAC protocol for vehicular networks[J].Wireless Networks (2016) Vol. 22 No.3 P799--812. Qiong Wu;Jun Zheng, Performance modeling and analysis of the ADHOC MAC protocol for vehicular networks[J].Wireless Networks (2016) Vol.22 No.3 P799--812."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Niculescu G Ganguly S Kim K Izmailov R.Performance of VoIP in a 802.11 Wireless Mesh Network[J] ProceeDings - IEEE INFOCOM (2006): 1--11.  Niculescu G Ganguly S Kim K Izmailov R.Performance of VoIP in a 802.11 Wireless Mesh Network[J] ProceeDings - IEEE INFOCOM (2006):1--11.","DOI":"10.1109\/INFOCOM.2006.243"},{"key":"e_1_3_2_1_7_1","volume-title":"Navigating a mobile social network[J]. Wireless Communications","author":"Sagduyu Y.E.","year":"2015","unstructured":"Sagduyu , Y.E. ; Shi , Y , Navigating a mobile social network[J]. Wireless Communications , IEEE ( 2015 ) Vol. 22 No.5 P122--128. Sagduyu, Y.E.; Shi, Y, Navigating a mobile social network[J]. Wireless Communications, IEEE (2015) Vol. 22 No.5 P122--128."},{"key":"e_1_3_2_1_8_1","volume-title":"Link state opportunistic routing for multihop wireless networks.\" Wireless Networks","author":"Gueguen","year":"2019","unstructured":"Gueguen , C\u00e9dric, P. Fabian , and X. Lagrange . \" Link state opportunistic routing for multihop wireless networks.\" Wireless Networks ( 2019 ). Gueguen, C\u00e9dric, P. Fabian, and X. Lagrange. \"Link state opportunistic routing for multihop wireless networks.\" Wireless Networks (2019)."},{"key":"e_1_3_2_1_9_1","unstructured":"Harwood Laurence M.;Ishikawa Tsutomu Cluster[J].Syn -lett (2013) Vol.24 No.19 P1.  Harwood Laurence M.;Ishikawa Tsutomu Cluster[J].Syn -lett (2013) Vol.24 No.19 P1."},{"key":"e_1_3_2_1_10_1","volume-title":"Master Thesis","author":"Vahdat A","year":"2000","unstructured":"Vahdat A , Becker D. Epidemic Routing for Partially Conne-cted Ad Hoc Networks[J] , Master Thesis , ( 2000 ). Vahdat A, Becker D. Epidemic Routing for Partially Conne-cted Ad Hoc Networks[J], Master Thesis, (2000)."},{"key":"e_1_3_2_1_11_1","volume-title":"Internet Engineering Task Force (IETF)","author":"Lindgren A","year":"2007","unstructured":"Lindgren A , Doria A , Davies E , Grasic S. Probabilistic routing protocol for intermit- tently connected networks[J] , Internet Engineering Task Force (IETF) , ( 2007 ). Lindgren A, Doria A, Davies E, Grasic S. Probabilistic routing protocol for intermit- tently connected networks[J], Internet Engineering Task Force (IETF), (2007)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Ren Zhi Huang Yong Chen Qianbin et al. Opportunistic network routing protocol [J]. Computer application research (2010) 30(3):723--728  Ren Zhi Huang Yong Chen Qianbin et al. Opportunistic network routing protocol [J]. Computer application research (2010) 30(3):723--728","DOI":"10.3724\/SP.J.1087.2010.00723"},{"key":"e_1_3_2_1_13_1","first-page":"P2337","author":"Baek S.","year":"2015","unstructured":"Baek , S. ; Lee , H.G. ; Nicopoulos , C. ; Lee , J. ; Kim , J , Size-Aware Cache Management for Compressed Cache Architectures[J]. Computers , IEEE Transactions on ( 2015 ) Vol.64 No.8 P2337 -- P2352 . Baek, S.;Lee, H.G.;Nicopoulos, C.;Lee, J.;Kim, J, Size-Aware Cache Management for Compressed Cache Architectures[J]. Computers, IEEE Transactions on (2015) Vol.64 No.8 P2337--2352.","journal-title":"IEEE Transactions on ("},{"key":"e_1_3_2_1_14_1","volume-title":"Routing protocols for underwater wireless sensor networks[J]. Communicati- ons Magazine","author":"Han G.","year":"2015","unstructured":"Han , G. ; Jiang , J. ; Bao , N. ; Wan , L. ; Guizani , M , Routing protocols for underwater wireless sensor networks[J]. Communicati- ons Magazine , IEEE ( 2015 ) Vol. 53 No.11 P72--78. Han, G.;Jiang, J.;Bao, N.;Wan, L.;Guizani, M, Routing protocols for underwater wireless sensor networks[J]. Communicati- ons Magazine, IEEE (2015) Vol.53 No.11 P72--78."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2323967"}],"event":{"name":"ACAI 2019: 2019 2nd International Conference on Algorithms, Computing and Artificial Intelligence","sponsor":["Chinese Univ. of Hong Kong Chinese University of Hong Kong"],"location":"Sanya China","acronym":"ACAI 2019"},"container-title":["Proceedings of the 2019 2nd International Conference on Algorithms, Computing and Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377713.3377727","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3377713.3377727","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:55Z","timestamp":1750202635000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377713.3377727"}},"subtitle":["An Opportunistic Routing Protocol for Cluster Head Nodes Data Transmission"],"short-title":[],"issued":{"date-parts":[[2019,12,20]]},"references-count":15,"alternative-id":["10.1145\/3377713.3377727","10.1145\/3377713"],"URL":"https:\/\/doi.org\/10.1145\/3377713.3377727","relation":{},"subject":[],"published":{"date-parts":[[2019,12,20]]},"assertion":[{"value":"2020-02-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}