{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:17:05Z","timestamp":1750220225923,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":7,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,3,18]],"date-time":"2022-03-18T00:00:00Z","timestamp":1647561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,3,18]]},"DOI":"10.1145\/3532213.3532334","type":"proceedings-article","created":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T13:29:18Z","timestamp":1657718958000},"page":"793-797","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Design and Implementation of Wireless Multi-hop Ad Hoc Network Protocol"],"prefix":"10.1145","author":[{"given":"Lixing","family":"Peng","sequence":"first","affiliation":[{"name":"Information science department, Beijing University of Technology, China"}]},{"given":"Qiang","family":"Wu","sequence":"additional","affiliation":[{"name":"Information science department, Beijing University of Technology, China"}]},{"given":"Jinling","family":"Cui","sequence":"additional","affiliation":[{"name":"Information science department, Beijing University of Technology, China"}]},{"given":"Jie","family":"Liu","sequence":"additional","affiliation":[{"name":"Information science department, Beijing University of Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2022,7,13]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"1144","volume-title":"Broadcast file distribution in a four-node packet radio network with network coding and code-modulation adaptation,\" MILCOM 2015 - 2015 IEEE Military Communications Conference","author":"Borkotoky S. S.","year":"2015","unstructured":"S. S. Borkotoky and M. B. Pursley , \" Broadcast file distribution in a four-node packet radio network with network coding and code-modulation adaptation,\" MILCOM 2015 - 2015 IEEE Military Communications Conference , 2015 , pp. 1144 - 1149 , doi: 10.1109\/MILCOM.2015.7357600. 10.1109\/MILCOM.2015.7357600 S. S. Borkotoky and M. B. Pursley, \"Broadcast file distribution in a four-node packet radio network with network coding and code-modulation adaptation,\" MILCOM 2015 - 2015 IEEE Military Communications Conference, 2015, pp. 1144-1149, doi: 10.1109\/MILCOM.2015.7357600."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2882303"},{"key":"e_1_3_2_1_3_1","first-page":"429","volume-title":"System Design of High Speed Ad Hoc Networking with Directional Antenna,\" 2016 12th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN)","author":"Ren B.","year":"2016","unstructured":"B. Ren , X. Zhang and X. Gou , \" System Design of High Speed Ad Hoc Networking with Directional Antenna,\" 2016 12th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN) , 2016 , pp. 429 - 433 , doi: 10.1109\/MSN.2016.079. 10.1109\/MSN.2016.079 B. Ren, X. Zhang and X. Gou, \"System Design of High Speed Ad Hoc Networking with Directional Antenna,\" 2016 12th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN), 2016, pp. 429-433, doi: 10.1109\/MSN.2016.079."},{"key":"e_1_3_2_1_4_1","first-page":"1","volume-title":"A novel intrusion detection system for ad hoc flooding attack using fuzzy logic in mobile ad hoc networks,\" International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014)","author":"Chaudhary A.","year":"2014","unstructured":"A. Chaudhary , V. Tiwari and A. Kumar , \" A novel intrusion detection system for ad hoc flooding attack using fuzzy logic in mobile ad hoc networks,\" International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014) , 2014 , pp. 1 - 4 , doi: 10.1109\/ICRAIE.2014.6909148. 10.1109\/ICRAIE.2014.6909148 A. Chaudhary, V. Tiwari and A. Kumar, \"A novel intrusion detection system for ad hoc flooding attack using fuzzy logic in mobile ad hoc networks,\" International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014), 2014, pp. 1-4, doi: 10.1109\/ICRAIE.2014.6909148."},{"key":"e_1_3_2_1_5_1","first-page":"2011","volume-title":"Signal Processing and Networking (WiSPNET)","author":"Dash D.","year":"2016","unstructured":"D. Dash , D. K. Sanyal , A. Sarkar and D. Guha , \" A comparative study of two classical topology-transparent scheduling algorithms for multi-hop packet radio networks,\" 2016 International Conference on Wireless Communications , Signal Processing and Networking (WiSPNET) , 2016 , pp. 2011 - 2016 , doi: 10.1109\/WiSPNET.2016.7566495. 10.1109\/WiSPNET.2016.7566495 D. Dash, D. K. Sanyal, A. Sarkar and D. Guha, \"A comparative study of two classical topology-transparent scheduling algorithms for multi-hop packet radio networks,\" 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), 2016, pp. 2011-2016, doi: 10.1109\/WiSPNET.2016.7566495."},{"key":"e_1_3_2_1_6_1","first-page":"1216","volume-title":"On the network clock reference variation compensation for satellite TDMA network,\" 2017 International Conference on Information and Communication Technology Convergence (ICTC)","author":"Shin M.","year":"2017","unstructured":"M. Shin , J. Ryu and D. Oh , \" On the network clock reference variation compensation for satellite TDMA network,\" 2017 International Conference on Information and Communication Technology Convergence (ICTC) , 2017 , pp. 1216 - 1218 , doi: 10.1109\/ICTC.2017.8190902. 10.1109\/ICTC.2017.8190902 M. Shin, J. Ryu and D. Oh, \"On the network clock reference variation compensation for satellite TDMA network,\" 2017 International Conference on Information and Communication Technology Convergence (ICTC), 2017, pp. 1216-1218, doi: 10.1109\/ICTC.2017.8190902."},{"key":"e_1_3_2_1_7_1","first-page":"856","volume-title":"Data collection in WSNs with a mobile sink for a supervision application,\" 2013 Science and Information Conference","author":"Derdour Y.","year":"2013","unstructured":"Y. Derdour , B. Kechar and F. Khelfi , \" Data collection in WSNs with a mobile sink for a supervision application,\" 2013 Science and Information Conference , 2013 , pp. 856 - 863 . Y. Derdour, B. Kechar and F. Khelfi, \"Data collection in WSNs with a mobile sink for a supervision application,\" 2013 Science and Information Conference, 2013, pp. 856-863."}],"event":{"name":"ICCAI '22: 2022 8th International Conference on Computing and Artificial Intelligence","acronym":"ICCAI '22","location":"Tianjin China"},"container-title":["Proceedings of the 8th International Conference on Computing and Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3532213.3532334","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3532213.3532334","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:09Z","timestamp":1750188609000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3532213.3532334"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,18]]},"references-count":7,"alternative-id":["10.1145\/3532213.3532334","10.1145\/3532213"],"URL":"https:\/\/doi.org\/10.1145\/3532213.3532334","relation":{},"subject":[],"published":{"date-parts":[[2022,3,18]]},"assertion":[{"value":"2022-07-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}