{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:40:24Z","timestamp":1738777224950,"version":"3.37.0"},"reference-count":12,"publisher":"Academy Publisher","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JNW"],"DOI":"10.4304\/jnw.10.3.125-133","type":"journal-article","created":{"date-parts":[[2015,4,14]],"date-time":"2015-04-14T04:52:23Z","timestamp":1428987143000},"source":"Crossref","is-referenced-by-count":5,"title":["NCA: New Cooperative Algorithm for Reducing Topology Control Packets in OLSR"],"prefix":"10.4304","volume":"10","author":[{"given":"Adil","family":"Benabbou","sequence":"first","affiliation":[]},{"given":"Abdelali","family":"Boushaba","sequence":"additional","affiliation":[]},{"given":"Azeddine","family":"Zahi","sequence":"additional","affiliation":[]},{"given":"Rachid","family":"Benabbou","sequence":"additional","affiliation":[]},{"given":"Mohammed","family":"Oumsis","sequence":"additional","affiliation":[]},{"given":"Said El Alaoui","family":"Ouatik","sequence":"additional","affiliation":[]}],"member":"2838","published-online":{"date-parts":[[2015,4,13]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MCSA.1999.749281"},{"key":"ref2","first-page":"153","volume-title":"\"Dynamic Source Routing in Ad Hoc Wireless Networks \" in Mobile Computing","volume":"353","author":"Johnson","unstructured":"[2] D. B. Johnson and D. A. Maltz, \"Dynamic Source Routing in Ad Hoc Wireless Networks,\" in Mobile Computing, vol. 353, T. Imielinski and H. F. Korth, Eds. Boston, MA: Springer US, pp. 153\u2013181."},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/190314.190336"},{"key":"ref4","volume-title":"\"Optimized Link State Routing Protocol (OLSR) \" Internet Request For Comments RFC 3626","author":"Clausen","year":"2003","unstructured":"[4] T. Clausen and P. Jacquet, \"Optimized Link State Routing Protocol (OLSR),\" Internet Request For Comments RFC 3626, Internet Engineering Task Force (2003)."},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2002.994521"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/WiCom.2008.652"},{"key":"ref7","volume-title":"Multipoint relaying","author":"Laouiti","year":"2000","unstructured":"[12] A. Laouiti, A. Qayyum, and L. Viennot, \"Multipoint relaying: An efficient technique for flooding in mobile wireless networks,\" TechnicalReport RR-3898, 2000."},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2004.1400537"},{"key":"ref9","volume-title":"Ingelrest F and Simplot-Ryl \"Maximizing the Probability of Delivery of Multipoint Relay Broadcast Protocol in Wireless Ad Hoc Networks with a Realistic Physical Layer \" LNCS","volume":"4325","year":"2006","unstructured":"[14] Ingelrest, F. and Simplot-Ryl, \"Maximizing the Probability of Delivery of Multipoint Relay Broadcast Protocol in Wireless Ad Hoc Networks with a Realistic Physical Layer,\" LNCS Vol.4325, Springer-verlag, Berlin (2006)."},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-31173-4_42"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICMCS.2012.6320282"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2014.01.007"}],"container-title":["Journal of Networks"],"original-title":[],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:09:05Z","timestamp":1738775345000},"score":1,"resource":{"primary":{"URL":"https:\/\/dblp.org\/db\/journals\/jnw\/index.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4,13]]},"references-count":12,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2015,4,13]]}},"URL":"https:\/\/doi.org\/10.4304\/jnw.10.3.125-133","relation":{},"ISSN":["1796-2056"],"issn-type":[{"type":"print","value":"1796-2056"}],"subject":[],"published":{"date-parts":[[2015,4,13]]}}}