{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,12,20]],"date-time":"2023-12-20T00:27:40Z","timestamp":1703032060457},"reference-count":34,"publisher":"Engineering and Technology Publishing","issue":"7","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JCM"],"published-print":{"date-parts":[[2014]]},"DOI":"10.12720\/jcm.9.7.521-534","type":"journal-article","created":{"date-parts":[[2014,8,18]],"date-time":"2014-08-18T01:40:12Z","timestamp":1408326012000},"page":"521-534","source":"Crossref","is-referenced-by-count":1,"title":["A New Routing Scheme Based on Adaptive Selection of Geographic Directions"],"prefix":"10.12720","volume":"9","author":[{"given":"Zimu","family":"Yuan","sequence":"first","affiliation":[]},{"given":"Wei","family":"Li","sequence":"additional","affiliation":[]},{"given":"Shuhui","family":"Yang","sequence":"additional","affiliation":[]}],"member":"4977","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/isorc.2008.25"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345953"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.08.007"},{"key":"ref4","volume-title":"\"On delivery guarantees of face and combined greedy-face routing algorithms in ad hoc and sensor networks \" in Proc","author":"Frey","year":"2006","unstructured":"[4] H. Frey and I. Stojmenovic, \"On delivery guarantees of face and combined greedy-face routing algorithms in ad hoc and sensor networks,\" in Proc. MobiCom, 2006."},{"key":"ref5","volume-title":"\"Worst-case optimal average-case efficient geometric ad-hoc routing \" in Proc","author":"Kuhn","year":"2003","unstructured":"[5] F. Kuhn, R. Wattenhofer, and A. Zollinger, \"Worst-case optimal average-case efficient geometric ad-hoc routing,\" in Proc. MobiHoc, 2003."},{"key":"ref6","volume-title":"\"Geographic routing without location information \" in Proc","author":"Rao","year":"2003","unstructured":"[6] A. Rao, S. Ratnasamy, C. Papadimitriou, S. Shenker, and I. Stoica, \"Geographic routing without location information,\" in Proc. MobiCom, 2003."},{"key":"ref7","article-title":"An algorithmic approach to geographic routing in ad hoc and sensor networks","volume-title":"Proc SIGMETRICS","volume":"16","author":"Kuhn","year":"2011","unstructured":"[7] F. Kuhn, R. Wattenhofer, and A. Zollinger, \"An algorithmic approach to geographic routing in ad hoc and sensor networks,\" IEEE\/ACM Trans. on Networking, vol. 16, 2008. [8] S. Lam and C. Qian, \"Geographic routing in d-dimensional spaces with guaranteed delivery and low stretch,\" in Proc. SIGMETRICS, 2011."},{"key":"ref8","volume-title":"\"Routing metric designs for greedy face and combined-greedy-face routing \" in Proc","author":"Li","year":"2009","unstructured":"[9] Y. Li, Y. Yang, and X. Lu, \"Routing metric designs for greedy, face and combined-greedy-face routing,\" in Proc. Infocom, 2009."},{"key":"ref9","volume-title":"Messageefficient beaconless georouting with guaranteed delivery in wireless sensor ad hoc and actuator networks","author":"Ruhrup","year":"2010","unstructured":"[10] S. Ruhrup, H. Kalosha, A. Nayak, and I. Stojmenovic, \"Messageefficient beaconless georouting with guaranteed delivery in wireless sensor, ad hoc, and actuator networks,\" ACM \/IEEE Trans. on Networking, vol. 18, 2010."},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2107502.2107504"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s13119-013-0013-7"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015471"},{"key":"ref13","volume-title":"Succinct greedy geometric routing using hyperbolic geometry","author":"Eppstein","year":"2010","unstructured":"[14] D. Eppstein and M. Goodrich, \"Succinct greedy geometric routing using hyperbolic geometry,\" IEEE Trans. on Computers, vol. 99, 2010."},{"key":"ref14","article-title":"Exploration of path space using sensor network geometry","author":"Jiang","year":"2011","unstructured":"[15] R. Jiang, X. Ban, M. Goswami, W. Zeng, J. Gao, and X. Gu, \"Exploration of path space using sensor network geometry,\" in ACM\/IEEE Proc. of IPSN, 2011."},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2014.04.007"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/infcom.2007.221"},{"key":"ref17","article-title":"Greedy routing with guaranteed delivery using ricci flows","author":"Sarkar","year":"2009","unstructured":"[18] R. Sarkar, X. Yin, J. Gao, F. Luo, and X. Gu, \"Greedy routing with guaranteed delivery using ricci flows,\" in Proc. ACM\/IEEE IPSN, 2009."},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/icdcs.2011.39"},{"key":"ref19","volume-title":"\"Location proxies and intermediate node forwarding for practical geographic forwarding \" MIT-LCS-TR-824","author":"Douglas","year":"2001","unstructured":"[20] S. Douglas, J. De Couto, and R. Morris, \"Location proxies and intermediate node forwarding for practical geographic forwarding,\" MIT-LCS-TR-824, MIT Laboratory for Computer Science, 2001."},{"key":"ref20","volume-title":"\"On optimal geographic routing for networks with holes and non-uniform traffic \" in Proc","author":"Subramanian","year":"2007","unstructured":"[21] S. Subramanian, S. Shakkottai, and P. Gupta, \"On optimal geographic routing for networks with holes and non-uniform traffic,\" in Proc. IEEE Infocom, 2007."},{"key":"ref21","volume-title":"\"Optimal geographic routing for wireless networks with near-arbitrary holes and traffic \" in Proc","author":"Subramanian","year":"2008","unstructured":"[22] S. Subramanian, S. Shakkottai, and P. Gupta, \"Optimal geographic routing for wireless networks with near-arbitrary holes and traffic,\" in Proc. IEEE Infocom, 2008."},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/800076.802479"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/288235.288252"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1161089.1161104"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1530748.1530767"},{"key":"ref26","volume-title":"\"A robust boundary detection algorithm based on connectivity only for 3D wireless sensor networks \" in Proc","author":"Zhou","year":"2012","unstructured":"[27] H. Zhou, H. Wu, and M. Jin, \"A robust boundary detection algorithm based on connectivity only for 3D wireless sensor networks,\" in Proc. IEEE Infocom, 2012."},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/18.21215"},{"key":"ref28","volume-title":"Critical power for asymptotic connectivity in wireless networks","author":"Gupta","year":"1998","unstructured":"[30] P. Gupta and P. R. Kumar, \"Critical power for asymptotic connectivity in wireless networks,\" Stochastic Analysis, Control, Optimization and Applications: A Volume in Honor of W. H. Fleming, pp. 547\u2013566, 1998."},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511814075"},{"key":"ref30","volume-title":"Data Networks","author":"Bertsekas","year":"1987","unstructured":"[32] D. Bertsekas and R. Gallager, Data Networks, U.K. Prentice Hall, 1987, ch.\u200b4."},{"key":"ref31","volume-title":"Stability properties of constrained queuing systems and scheduling for maximum throughput in multihop radio networks","author":"Tassiulas","year":"1992","unstructured":"[33] L. Tassiulas and A. Ephremide, \"Stability properties of constrained queuing systems and scheduling for maximum throughput in multihop radio networks,\" IEEE Trans. on Automatic Control, pp. 1936\u20131949, 1992."},{"key":"ref32","article-title":"Joint rate control and scheduling in multihop wireless networks","volume-title":"Proc IEEE CDC","author":"Lin","year":"2004","unstructured":"[34] X. Lin and N. B. Shroff, \"Joint rate control and scheduling in multihop wireless networks,\" in Proc. IEEE CDC, 2004."},{"key":"ref33","volume-title":"\"The impact of imperfect scheduling on crosslayer control in multihop wireless networks \" in Proc","author":"Lin","year":"2005","unstructured":"[35] X. Lin and N. B. Shroff, \"The impact of imperfect scheduling on crosslayer control in multihop wireless networks,\" in Proc. IEEE Infocom, 2005."},{"key":"ref34","volume-title":"Nonlinear Systems","author":"Sastry","year":"1996","unstructured":"[36] S. Sastry, Nonlinear Systems: Analysis, Stability and Control, U.K.: Addison Wesley, 1996."}],"container-title":["Journal of Communications"],"original-title":[],"deposited":{"date-parts":[[2017,1,4]],"date-time":"2017-01-04T01:52:07Z","timestamp":1483494727000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.jocm.us\/index.php?m=content&c=index&a=show&catid=134&id=689"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"references-count":34,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2014]]}},"URL":"https:\/\/doi.org\/10.12720\/jcm.9.7.521-534","relation":{},"ISSN":["1796-2021"],"issn-type":[{"value":"1796-2021","type":"print"}],"subject":[],"published":{"date-parts":[[2014]]}}}