{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,8,30]],"date-time":"2023-08-30T15:44:11Z","timestamp":1693410251793},"reference-count":20,"publisher":"Wiley","issue":"4","license":[{"start":{"date-parts":[[2021,7,12]],"date-time":"2021-07-12T00:00:00Z","timestamp":1626048000000},"content-version":"vor","delay-in-days":11,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Internet Technology Letters"],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1002\/itl2.308","type":"journal-article","created":{"date-parts":[[2021,7,13]],"date-time":"2021-07-13T04:16:16Z","timestamp":1626149776000},"update-policy":"http:\/\/dx.doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Ad\u2010hoc<\/scp>, mobile, and wireless networks"],"prefix":"10.1002","volume":"4","author":[{"given":"Maria Rita","family":"Palattella","sequence":"first","affiliation":[{"name":"Luxembourg Institute of Science and Technology Esch\u2010sur\u2010Alzette Luxembourg"}]},{"given":"Stefano","family":"Scanzio","sequence":"additional","affiliation":[{"name":"CNR\u2010IEIIT Turin Italy"}]}],"member":"311","published-online":{"date-parts":[[2021,7,12]]},"reference":[{"key":"e_1_2_5_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2650979"},{"issue":"4","key":"e_1_2_5_3_1","doi-asserted-by":"crossref","first-page":"e206","DOI":"10.1002\/itl2.206","article-title":"Throughput maximization in discrete rate based full duplex wireless powered communication networks","volume":"4","author":"Iqbal MS","year":"2021","journal-title":"Internet Technol Lett"},{"key":"e_1_2_5_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2004.1368893"},{"issue":"4","key":"e_1_2_5_5_1","doi-asserted-by":"crossref","first-page":"e228","DOI":"10.1002\/itl2.228","article-title":"A geographical division clustering algorithm for multiple flying base stations","volume":"4","author":"Lee J","year":"2021","journal-title":"Internet Technol Lett"},{"issue":"4","key":"e_1_2_5_6_1","doi-asserted-by":"crossref","first-page":"e217","DOI":"10.1002\/itl2.217","article-title":"FFTHR: fitness function based two\u2010hop routing in WSN","volume":"4","author":"Panchal A","year":"2021","journal-title":"Internet Technol Lett"},{"key":"e_1_2_5_7_1","doi-asserted-by":"publisher","DOI":"10.1002\/itl2.194"},{"key":"e_1_2_5_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1641876.1641898"},{"key":"e_1_2_5_9_1","doi-asserted-by":"crossref","unstructured":"ZoppiS G\u00fcrsuHM VilgelmM KellererW.Reliable hopping sequence design for highly interfered wireless sensor networks. In: IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN 2017);2017:1\u20107.","DOI":"10.1109\/LANMAN.2017.7972164"},{"key":"e_1_2_5_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3004471"},{"key":"e_1_2_5_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2759788"},{"key":"e_1_2_5_12_1","doi-asserted-by":"publisher","DOI":"10.1002\/itl2.167"},{"key":"e_1_2_5_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2401597"},{"issue":"4","key":"e_1_2_5_14_1","doi-asserted-by":"crossref","first-page":"e227","DOI":"10.1002\/itl2.227","article-title":"Inference of a clear channel assessment based conflict graph","volume":"4","author":"Abdelwedoud L","year":"2021","journal-title":"Internet Technol Lett"},{"key":"e_1_2_5_15_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4402"},{"issue":"4","key":"e_1_2_5_16_1","doi-asserted-by":"crossref","first-page":"e207","DOI":"10.1002\/itl2.207","article-title":"Optimal spectrum and power allocation using evolutionary algorithms for cognitive radio networks","volume":"4","author":"Anumandla KK","year":"2021","journal-title":"Internet Technol Lett"},{"key":"e_1_2_5_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2989870"},{"key":"e_1_2_5_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2021.102505"},{"key":"e_1_2_5_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3059896"},{"key":"e_1_2_5_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.3005495"},{"key":"e_1_2_5_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-31831-4"}],"container-title":["Internet Technology Letters"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/itl2.308","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1002\/itl2.308","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/itl2.308","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T03:04:50Z","timestamp":1693278290000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/itl2.308"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7]]},"references-count":20,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,7]]}},"alternative-id":["10.1002\/itl2.308"],"URL":"https:\/\/doi.org\/10.1002\/itl2.308","archive":["Portico"],"relation":{},"ISSN":["2476-1508","2476-1508"],"issn-type":[{"value":"2476-1508","type":"print"},{"value":"2476-1508","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,7]]},"assertion":[{"value":"2021-07-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}