{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,24]],"date-time":"2024-01-24T01:39:56Z","timestamp":1706060396951},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,9,25]],"date-time":"2013-09-25T00:00:00Z","timestamp":1380067200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/2.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1186\/1687-1499-2013-237","type":"journal-article","created":{"date-parts":[[2013,9,25]],"date-time":"2013-09-25T20:05:25Z","timestamp":1380139525000},"source":"Crossref","is-referenced-by-count":7,"title":["TOAR: transmission-aware opportunistic ad hoc routing protocol"],"prefix":"10.1186","volume":"2013","author":[{"given":"Arka Prokash","family":"Mazumdar","sequence":"first","affiliation":[]},{"given":"Ashok Singh","family":"Sairam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,9,25]]},"reference":[{"issue":"5","key":"806_CR1","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/978-0-585-29603-6_5","volume":"353","author":"DB Johnson","year":"1996","unstructured":"Johnson DB, Maltzand DA: Dynamic source routing in ad hoc wireless networks. Mobile Comput 1996, 353(5):153-181.","journal-title":"Mobile Comput"},{"issue":"4","key":"806_CR2","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1145\/190809.190336","volume":"24","author":"CE Perkins","year":"1994","unstructured":"Perkins CE, Bhagwat P: Highly dynamic destination-sequenced distance-vector routing DSDV for mobile computers. SIGCOMM Comput. Commun. Rev 1994, 24(4):234-244.","journal-title":"SIGCOMM Comput. Commun. Rev"},{"key":"806_CR3","unstructured":"Perkins CE, Belding-Royer E: Ad hoc on-demand distance vector (AODV) routing. IETF Netw. Working Group, RFC 3561 1994. . Accessed 10 Dec 2012 \n                    http:\/\/www.ietf.org\/rfc\/rfc3561.txt\n                    \n                   RFC 3561 1994. . Accessed 10 Dec 2012"},{"key":"806_CR4","unstructured":"T Clausen P, Jacquet P: Optimized link state routing protocol (OLSR). IETF Netw. Working Group, RFC 3626 2003. . Accessed 10 Dec 2012 \n                    http:\/\/www.ietf.org\/rfc\/rfc3626.txt\n                    \n                   RFC 3626 2003. . Accessed 10 Dec 2012"},{"key":"806_CR5","first-page":"191","volume-title":"Proceedings of the International Conference on Network, Communication and Computing","author":"AP Mazumdar","year":"2011","unstructured":"Mazumdar AP, Sairam AS: Opportunistic routing: opportunities and challenges. In Proceedings of the International Conference on Network, Communication and Computing. New Delhi; 19\u201320 March 2011:191-195."},{"issue":"4","key":"806_CR6","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1145\/1090191.1080108","volume":"35","author":"S Biswas","year":"2005","unstructured":"Biswas S, Morris R: ExOR: opportunistic multi-hop routing for wireless networks. SIGCOMM Comput. Commun. Rev 2005, 35(4):133-144.","journal-title":"SIGCOMM Comput. Commun. Rev"},{"key":"806_CR7","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1145\/938985.939000","volume-title":"Proceedings of the ACM 9th Annual International Conference on Mobile Computing and Networking (MobiCom '03)","author":"DD Couto","year":"2003","unstructured":"Couto DD, Aguayo D, Bicket J, Morris R: A high-throughput path metric for multi-hop wireless routing. In Proceedings of the ACM 9th Annual International Conference on Mobile Computing and Networking (MobiCom '03). San Diego; 14\u201319 Sept 2003:134-146."},{"issue":"4","key":"806_CR8","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1145\/1282427.1282400","volume":"37","author":"S Chachulski","year":"2007","unstructured":"Chachulski S, Jennings M, Katti S, Katabi D: Trading structure for randomness in wireless opportunistic routing. SIGCOMM Comput. Commun. Rev 2007, 37(4):169-180.","journal-title":"SIGCOMM Comput. Commun. Rev"},{"issue":"11","key":"806_CR9","doi-asserted-by":"publisher","first-page":"1934","DOI":"10.1109\/TPDS.2011.70","volume":"22","author":"X Mao","year":"2011","unstructured":"Mao X, Tang S, Xu X, Li XY, Ma H: Energy-efficient opportunistic routing in wireless sensor networks. IEEE Trans. Parallel Distributed Syst 2011, 22(11):1934-1942.","journal-title":"IEEE Trans. Parallel Distributed Syst"},{"key":"806_CR10","first-page":"470","volume-title":"Proceedings of the IEEE Computer Society 1st International Conference Simulation Tools and Techniques for Communications, Networks and Systems","author":"J Wu","year":"2008","unstructured":"Wu J, Lu M, Li F: Utility-based opportunistic routing in multi-hop wireless networks. In Proceedings of the IEEE Computer Society 1st International Conference Simulation Tools and Techniques for Communications, Networks and Systems. Marseille; 03\u201307 March 2008:470-477."},{"issue":"4","key":"806_CR11","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1109\/TMC.2003.1255648","volume":"2","author":"M Zorzi","year":"2003","unstructured":"Zorzi M, Rao RR: Geographic random forwarding (GeRaF) for ad hoc and sensor networks: multi-hop performance. IEEE Trans. Mobile Comput 2003, 2(4):337-348.","journal-title":"IEEE Trans. Mobile Comput"},{"key":"806_CR12","doi-asserted-by":"publisher","first-page":"2197","DOI":"10.1145\/1529282.1529766","volume-title":"Proceedings of the ACM Symposium on Applied Computing 2009 (SAC \u201909)","author":"J Kim","year":"2009","unstructured":"Kim J, Ravindran B: Opportunistic real-time routing in multi-hop wireless sensor networks. In Proceedings of the ACM Symposium on Applied Computing 2009 (SAC \u201909). Honolulu; 9\u201312 March 2009:2197-2201."},{"key":"806_CR13","volume-title":"Proceedings of the IEEE WiMesh 2005","author":"Y Yuan","year":"2005","unstructured":"Yuan Y, Yang H, Wong S, Lu S, Arbaugh W: ROMER: Resilient opportunistic mesh routing for wireless mesh networks. In Proceedings of the IEEE WiMesh 2005. Santa Clara; 26 Sept 2005."},{"issue":"12","key":"806_CR14","doi-asserted-by":"publisher","first-page":"1622","DOI":"10.1109\/TMC.2009.82","volume":"8","author":"E Rozner","year":"2009","unstructured":"Rozner E, Seshadri J, Mehta Y, Qiu L: SOAR: simple opportunistic adaptive routing protocol for wireless mesh networks. IEEE Trans. Mobile Comput 2009, 8(12):1622-1635.","journal-title":"IEEE Trans. Mobile Comput"},{"issue":"2","key":"806_CR15","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1109\/TNET.2010.2070844","volume":"19","author":"H Dubois-Ferriere","year":"2011","unstructured":"Dubois-Ferriere H, Grossglauser M, Vetterli M: Valuable detours: least-cost anypath routing. IEEE\/ACM Trans. Netw 2011, 19(2):333-346.","journal-title":"IEEE\/ACM Trans. Netw"},{"key":"806_CR16","volume-title":"Algorithmic Aspects of Combinatorics","author":"BR Alspach","year":"1978","unstructured":"Alspach BR, Hell P, Miller DJ: Algorithmic Aspects of Combinatorics. Amsterdam: North-Holland; 1978."},{"issue":"13","key":"806_CR17","doi-asserted-by":"publisher","first-page":"2886","DOI":"10.1016\/j.comnet.2011.06.009","volume":"55","author":"A Darehshoorzadeh","year":"2011","unstructured":"Darehshoorzadeh A, Cerda-Alabern L, Pla V: Modeling and comparison of candidate selection algorithms in opportunistic routing. Comput. Netw 2011, 55(13):2886-2898.","journal-title":"Comput. Netw"},{"key":"806_CR18","unstructured":"Biswas SZ: Opportunistic routing in multi-hop wireless networks. PhD thesis. Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science 2005"},{"key":"806_CR19","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/978-1-4614-3514-3_9","volume-title":"Routing in Opportunistic Networks","author":"AP Mazumdar","year":"2013","unstructured":"Mazumdar AP, Sairam AS: On performance modeling of ad hoc opportunistic routing protocols. In Routing in Opportunistic Networks. Edited by: Woungang I, Dhurandher SK, Anpalagan A, Vasilakos AV. New York: Springer; 2013:223-250."},{"key":"806_CR20","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1145\/972374.972387","volume":"34","author":"S Biswas","year":"2004","unstructured":"Biswas S, Morris R: Opportunistic routing in multi-hop wireless networks. SIGCOMM Comput. Commun. Rev 2004, 34: 69-74.","journal-title":"SIGCOMM Comput. Commun. Rev"},{"key":"806_CR21","volume-title":"An Introduction to Probability Theory and its Applications","author":"W Feller","year":"1968","unstructured":"Feller W: An Introduction to Probability Theory and its Applications. Hoboken: John Wiley & Sons, Inc.; 1968."},{"key":"806_CR22","unstructured":"EXata + Cyber SCALABLE Network Technologies . Accessed 25 Sept 2013 \n                    http:\/\/www.scalable-networks.com\/content\/exatacyber"},{"issue":"4","key":"806_CR23","doi-asserted-by":"publisher","first-page":"494","DOI":"10.1109\/26.664305","volume":"46","author":"AJ Coulson","year":"1998","unstructured":"Coulson AJ, Williamson AG, Vaughan RG: A statistical basis for lognormal shadowing effects in multipath fading channels. IEEE Trans. Commun 1998, 46(4):494-502.","journal-title":"IEEE Trans. Commun"},{"key":"806_CR24","first-page":"337","volume-title":"Proceedings of the 2nd international conference on Communication systems and Networks (COMSNETS\u201910)","author":"PPC Lee","year":"2010","unstructured":"Lee PPC, Misra V, Rubenstein D: On the robustness of wireless opportunistic routing toward inaccurate link-level measurements. In Proceedings of the 2nd international conference on Communication systems and Networks (COMSNETS\u201910). Bangalore; 5\u20139 Jan 2010:337-346."},{"key":"806_CR25","doi-asserted-by":"crossref","first-page":"415","DOI":"10.1007\/11499107_33","volume-title":"Proceedings of the 8th International Conference on Theory and Applications of Satisfiability Testing (SAT 2005)","author":"V Durairaj","year":"2005","unstructured":"Durairaj V, Kalla P: Enhanced interior gateway routing protocol, Cisco white paper. In Proceedings of the 8th International Conference on Theory and Applications of Satisfiability Testing (SAT 2005). St. Andrews; 19\u201323 June 2005:415-422."},{"key":"806_CR26","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1109\/TENCON.2011.6129081","volume-title":"Proceedings of the TENCON 2011 - 2011 IEEE Region 10 Conference","author":"AP Mazumdar","year":"2011","unstructured":"Mazumdar AP, Sairam AS: PBFS: a technique to select forwarders in Opportunistic Routing. In Proceedings of the TENCON 2011 - 2011 IEEE Region 10 Conference. Bali; 21\u201324 Nov 2011:149-153."}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1186\/1687-1499-2013-237\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2013-237.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2013-237.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,22]],"date-time":"2019-01-22T12:23:54Z","timestamp":1548159834000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/1687-1499-2013-237"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9,25]]},"references-count":26,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,12]]}},"alternative-id":["806"],"URL":"https:\/\/doi.org\/10.1186\/1687-1499-2013-237","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,9,25]]},"article-number":"237"}}