{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T14:38:58Z","timestamp":1726151938909},"reference-count":38,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,4]]},"DOI":"10.1109\/infocom.2014.6848224","type":"proceedings-article","created":{"date-parts":[[2014,7,29]],"date-time":"2014-07-29T11:18:13Z","timestamp":1406632693000},"page":"2751-2759","source":"Crossref","is-referenced-by-count":17,"title":["Competitive MAC under adversarial SINR"],"prefix":"10.1109","author":[{"given":"Adrian","family":"Ogierman","sequence":"first","affiliation":[]},{"given":"Andrea","family":"Richa","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Scheideler","sequence":"additional","affiliation":[]},{"given":"Stefan","family":"Schmid","sequence":"additional","affiliation":[]},{"given":"Jin","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539792233828"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1145\/1374618.1374632"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/355541.355567"},{"journal-title":"Spread Spectrum Communications Handbook","year":"2001","author":"simon","key":"36"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/18.825799"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1145\/2107502.2107522"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062150"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1145\/2332432.2332488"},{"key":"16","article-title":"Of malicious motes and suspicious sensors: On the efficiency of malicious interference in wireless networks","author":"gilbert","year":"2006","journal-title":"Proc OPODIS"},{"key":"13","first-page":"208","article-title":"Gossiping in a multi-channel radio network","author":"dolev","year":"2007","journal-title":"Proc 21st International Symposium on Distributed Computing (DISC)"},{"key":"14","article-title":"Interferenceresilient information exchange","author":"gilbert","year":"2009","journal-title":"Proc of the 28th Conference on Computer Communications IEEE INFOCOM"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2007.4292818"},{"key":"11","article-title":"Gossiping in a multichannel radio network: An oblivious approach to coping with malicious interference","author":"dolev","year":"2007","journal-title":"Proc of the Symposium on Distributed Computing (DISC)"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1145\/1023646.1023661"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1400751.1400767"},{"key":"21","article-title":"Reliable broadcast in radio networks: The bounded collision case","author":"koo","year":"2006","journal-title":"Proc ACM PODC"},{"journal-title":"IEEE Medium Access Control (MAC) and Physical Specifications","year":"1999","key":"20"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30140-0_42"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2005.845533"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.155"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.316"},{"key":"26","article-title":"Speed dating despite jammers","author":"meier","year":"2009","journal-title":"Proc DCOSS"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.314"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1145\/1073814.1073879"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539795285333"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.183"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1400751.1400759"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1582716.1582749"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1298239.1298257"},{"journal-title":"Wireless Communications","year":"2002","author":"rappaport","key":"30"},{"key":"7","article-title":"Adversarial queuing on the multiple-access channel","author":"chlebus","year":"2006","journal-title":"Proc ACM PODC"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1287853.1287901"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2011.8"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1132905.1132919"},{"key":"31","article-title":"A Jamming-resistant MAC protocol for multi-Hop wireless networks","author":"richa","year":"2010","journal-title":"Proc DISCEX"},{"key":"4","article-title":"Adversarial contention resolution for simple channels","author":"bender","year":"2005","journal-title":"Proc ACM SPAA"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1540358.1540360"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgor.2004.08.001"}],"event":{"name":"IEEE INFOCOM 2014 - IEEE Conference on Computer Communications","start":{"date-parts":[[2014,4,27]]},"location":"Toronto, ON, Canada","end":{"date-parts":[[2014,5,2]]}},"container-title":["IEEE INFOCOM 2014 - IEEE Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6839150\/6847911\/06848224.pdf?arnumber=6848224","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T14:04:26Z","timestamp":1490277866000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6848224\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/infocom.2014.6848224","relation":{},"subject":[],"published":{"date-parts":[[2014,4]]}}}