{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:16:02Z","timestamp":1750220162714,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,9,23]],"date-time":"2022-09-23T00:00:00Z","timestamp":1663891200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,9,23]]},"DOI":"10.1145\/3558819.3558834","type":"proceedings-article","created":{"date-parts":[[2022,10,27]],"date-time":"2022-10-27T01:37:33Z","timestamp":1666834653000},"page":"84-88","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Performance Research of ALOHA Protocol"],"prefix":"10.1145","author":[{"given":"Lina","family":"Yuan","sequence":"first","affiliation":[{"name":"College of Data Science, Tongren University, China"}]},{"given":"Tongcai","family":"Wu","sequence":"additional","affiliation":[{"name":"College of Data Science, Tongren University, China"}]},{"given":"Anran","family":"Zhou","sequence":"additional","affiliation":[{"name":"College of Computer Science, Chengdu University, China"}]}],"member":"320","published-online":{"date-parts":[[2022,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3132006"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2920161"},{"volume-title":"ICC 2021-IEEE International Conference on Communications","author":"Silva C. V.","key":"e_1_3_2_1_3_1","unstructured":"C. V. Silva , M. M. Carvalho , \u201cSlotted ALOHA for wireless powered resource-constrained networks ,\u201d ICC 2021-IEEE International Conference on Communications , 2021: 1-6. C. V. Silva, M. M. Carvalho, \u201cSlotted ALOHA for wireless powered resource-constrained networks,\u201d ICC 2021-IEEE International Conference on Communications, 2021: 1-6."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2018.2870158"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7081084"},{"issue":"2","key":"e_1_3_2_1_6_1","first-page":"1536","article-title":"Wireless powered communication networks: an overview","volume":"23","author":"Bi S.","year":"2016","unstructured":"S. Bi , Y. Zeng , R. Zhang , \u201c Wireless powered communication networks: an overview ,\u201d IEEE Communications Magzine , 2016 , 23 ( 2 ): 1536 - 1284 . S. Bi, Y. Zeng, R. Zhang, \u201cWireless powered communication networks: an overview,\u201d IEEE Communications Magzine, 2016, 23(2): 1536-1284.","journal-title":"IEEE Communications Magzine"},{"volume-title":"2019 International Conference on Electronics, Information, and Communication (ICEIC) IEEE","author":"Choi H. H.","key":"e_1_3_2_1_7_1","unstructured":"H. H. Choi , W. Shin , \u201cHarvest-until-access protocol based on slotted ALOHA for wireless powered dense networks ,\u201d 2019 International Conference on Electronics, Information, and Communication (ICEIC) IEEE , 2019: 1-6. H. H. Choi, W. Shin, \u201cHarvest-until-access protocol based on slotted ALOHA for wireless powered dense networks,\u201d 2019 International Conference on Electronics, Information, and Communication (ICEIC) IEEE, 2019: 1-6."},{"key":"e_1_3_2_1_8_1","volume-title":"Stability analysis of drame slotted aloha protocol, tag counting and monitoring in large-scale RFID systems","author":"Yu J.","year":"2019","unstructured":"J. Yu , L. Chen , \u201c Stability analysis of drame slotted aloha protocol, tag counting and monitoring in large-scale RFID systems ,\u201d Springer , Cham , 2019 : 7-42. J. Yu, L. Chen, \u201cStability analysis of drame slotted aloha protocol, tag counting and monitoring in large-scale RFID systems,\u201d Springer, Cham, 2019: 7-42."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.02.067"}],"event":{"name":"ICCSIE2022: 7th International Conference on Cyber Security and Information Engineering","acronym":"ICCSIE2022","location":"Brisbane QLD Australia"},"container-title":["Proceedings of the 7th International Conference on Cyber Security and Information Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3558819.3558834","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3558819.3558834","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:00:28Z","timestamp":1750186828000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3558819.3558834"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,23]]},"references-count":9,"alternative-id":["10.1145\/3558819.3558834","10.1145\/3558819"],"URL":"https:\/\/doi.org\/10.1145\/3558819.3558834","relation":{},"subject":[],"published":{"date-parts":[[2022,9,23]]},"assertion":[{"value":"2022-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}