{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T10:45:14Z","timestamp":1742381114969,"version":"3.40.1"},"reference-count":41,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2005,9,1]],"date-time":"2005-09-01T00:00:00Z","timestamp":1125532800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Mobile Comput."],"published-print":{"date-parts":[[2005,9]]},"DOI":"10.1109\/tmc.2005.67","type":"journal-article","created":{"date-parts":[[2005,8,10]],"date-time":"2005-08-10T14:46:24Z","timestamp":1123685184000},"page":"443-457","source":"Crossref","is-referenced-by-count":37,"title":["Improving protocol robustness in ad hoc networks through cooperative packet caching and shortest multipath routing"],"prefix":"10.1109","volume":"4","author":[{"given":"A.C.","family":"Valera","sequence":"first","affiliation":[]},{"given":"W.K.G.","family":"Seah","sequence":"additional","affiliation":[]},{"given":"S.V.","family":"Rao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/190809.190336"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/BF01196259"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/BF01193336"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/98.575990"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-585-29603-6_5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/icupc.1997.627227"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MCSA.1999.749281"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2000.853066"},{"journal-title":"draft-ietf-manet-olsr-04.txt, Work in Progress.","article-title":"Optimized Link State Routing Protocol","author":"Jacquet","key":"ref9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/288235.288256"},{"key":"ref11","first-page":"297","article-title":"Performance Evaluation of Table-Driven and On-Demand Ad Hoc Routing Protocols","volume-title":"Proc. IEEE Symp. Personal, Indoor and Mobile Radio Comm.","author":"Lee"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/313451.313535"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/PGEC.1965.264263"},{"volume-title":"Computer Architecture, A Quantitative Approach","year":"1996","author":"Patterson","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/313451.313534"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2000.832168"},{"year":"2001","key":"ref18","article-title":"The Network Simulator-ns-2"},{"year":"2001","key":"ref19","article-title":"Rice Monarch Project: Mobile Networking Architectures"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/IPCCC.2001.918650"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2001.916673"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1993.tb00548.x"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MOBHOC.2000.869207"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.1998.998772"},{"key":"ref25","article-title":"Ad Hoc On-Demand Distance Vector (AODV) Routing","author":"Perkins","year":"2002","journal-title":"draft-ietf-manet-aodv-12.txt, Work in Progress"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2000.865887"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1208678"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1981.1094876"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.1989.103927"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2001.916780"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2000.904822"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2001.992756"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/501416.501452"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.1999.805497"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/313451.313540"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1977.1093711"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.21236\/ADA461850"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1993.253345"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/4234.757208"},{"key":"ref40","doi-asserted-by":"crossref","DOI":"10.1109\/ICC.1999.765530","article-title":"Supporting Applications in a Mobile Multihop Radio Environment Using Route Diversity","volume-title":"Proc. IEEE Int\u2019l Workshop Implicit Computational Complexity","author":"Gogate"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/510726.510728"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2003.1203469"}],"container-title":["IEEE Transactions on Mobile Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/7755\/32073\/01492358.pdf?arnumber=1492358","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,17]],"date-time":"2025-03-17T05:10:53Z","timestamp":1742188253000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1492358\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,9]]},"references-count":41,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tmc.2005.67","relation":{},"ISSN":["1536-1233"],"issn-type":[{"type":"print","value":"1536-1233"}],"subject":[],"published":{"date-parts":[[2005,9]]}}}