{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T08:50:04Z","timestamp":1725612604029},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1109\/iccve.2014.7297668","type":"proceedings-article","created":{"date-parts":[[2015,10,15]],"date-time":"2015-10-15T22:44:18Z","timestamp":1444949058000},"page":"829-835","source":"Crossref","is-referenced-by-count":2,"title":["Making inter-flow network coding possible for unicast routing in VANETs"],"prefix":"10.1109","author":[{"given":"Celimuge","family":"Wu","sequence":"first","affiliation":[]},{"given":"Satoshi","family":"Ohzahata","sequence":"additional","affiliation":[]},{"given":"Yusheng","family":"Ji","sequence":"additional","affiliation":[]},{"given":"Toshihiko","family":"Kato","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2012.2198837"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2013.6666648"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.110121"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/WCL.2012.053112.120176"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2012.120511"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2013.6554763"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2013.6583703"},{"journal-title":"Fuzzy Set Theory Foundations and Applications","year":"1997","author":"klir","key":"ref17"},{"journal-title":"The Network Simulator-ns-2","year":"2012","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1208920"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2010.06.003"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2009.2025652"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1049\/iet-its:20070052"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-009-0169-2"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2013.120413.132285"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2010.2070844"},{"key":"ref2","article-title":"Ad hoc On-Demand Distance Vector (AODV) Routing","author":"perkins","year":"2003","journal-title":"rFC 3561"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2012.2188552"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2008.2008094"},{"journal-title":"Tiger Data","year":"2012","key":"ref20"},{"key":"ref22","first-page":"1","article-title":"A comparative analysis of DSRC and 802.11 over Vehicular Ad hoc Networks","author":"khan","year":"2009","journal-title":"Project Report University of Californai"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1023875.1023892"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/938998.939000"}],"event":{"name":"2014 International Conference on Connected Vehicles and Expo (ICCVE)","start":{"date-parts":[[2014,11,3]]},"location":"Vienna, Austria","end":{"date-parts":[[2014,11,7]]}},"container-title":["2014 International Conference on Connected Vehicles and Expo (ICCVE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7284675\/7297490\/07297668.pdf?arnumber=7297668","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T21:27:44Z","timestamp":1490390864000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7297668\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/iccve.2014.7297668","relation":{},"subject":[],"published":{"date-parts":[[2014,11]]}}}