{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T10:06:17Z","timestamp":1725789977835},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1109\/glocom.2011.6134328","type":"proceedings-article","created":{"date-parts":[[2012,1,30]],"date-time":"2012-01-30T16:45:17Z","timestamp":1327941917000},"page":"1-5","source":"Crossref","is-referenced-by-count":3,"title":["Optimal Control of Epidemic Information Dissemination in Mobile Ad Hoc Networks"],"prefix":"10.1109","author":[{"family":"Pin-Yu Chen","sequence":"first","affiliation":[]},{"family":"Kwang-Cheng Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2007.1001"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2007.70230"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2010.01.100830"},{"key":"ref13","article-title":"Epidemic routing for partially-connected ad hoc networks","author":"vahdat","year":"2000","journal-title":"Duke Univ Tech Rep CS&#x2013;2000&#x2013;06"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2006.323440"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2009.02.004"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2002.801403"},{"journal-title":"Optimal Control Theory An Introduction","year":"2004","author":"kirk","key":"ref17"},{"journal-title":"The mathematical theory of optimal processes (In-ternational series of monographs in pure and applied mathematics)","year":"1962","author":"pontryagin","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2011.2120618"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.11.028"},{"journal-title":"Epidemic Modelling An Introduction","year":"2001","author":"daley","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0811973106"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2005.863461"},{"key":"ref8","first-page":"149","article-title":"How to own the Internet in your spare time","author":"staniford","year":"2002","journal-title":"Proceedings of the 11th USENIX Security Symposium"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2008.115"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5684235"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2004.1297243"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2005.857113"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2009.124"}],"event":{"name":"2011 IEEE Global Communications Conference (GLOBECOM 2011)","start":{"date-parts":[[2011,12,5]]},"location":"Houston, TX, USA","end":{"date-parts":[[2011,12,9]]}},"container-title":["2011 IEEE Global Telecommunications Conference - GLOBECOM 2011"],"original-title":[],"link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/xplorestaging.ieee.org\/ielx5\/6132211\/6133457\/06134328.pdf?arnumber=6134328","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T10:20:51Z","timestamp":1490091651000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/ieeexplore.ieee.org\/document\/6134328\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12]]},"references-count":20,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/glocom.2011.6134328","relation":{},"subject":[],"published":{"date-parts":[[2011,12]]}}}