callback( { "result":{ "query":":facetid:toc:\"db/journals/adhoc/adhoc59.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"203.25" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"10", "@dc":"10", "@oc":"10", "@id":"43421086", "text":":facetid:toc:db/journals/adhoc/adhoc59.bht" } }, "hits":{ "@total":"10", "@computed":"10", "@sent":"10", "@first":"0", "hit":[{ "@score":"1", "@id":"2742080", "info":{"authors":{"author":[{"@pid":"160/1464","text":"Mohammad Khalily Dermany"},{"@pid":"31/9367","text":"Mostafa Shamsi"},{"@pid":"69/7671","text":"Mohammad J. Nadjafi-Arani"}]},"title":"A convex optimization model for topology control in network-coding-based-wireless-sensor networks.","venue":"Ad Hoc Networks","volume":"59","pages":"1-11","year":"2017","type":"Journal Articles","access":"closed","key":"journals/adhoc/DermanySN17","doi":"10.1016/J.ADHOC.2016.12.010","ee":"https://doi.org/10.1016/j.adhoc.2016.12.010","url":"https://dblp.org/rec/journals/adhoc/DermanySN17"}, "url":"URL#2742080" }, { "@score":"1", "@id":"2742088", "info":{"authors":{"author":[{"@pid":"115/4579","text":"Ruan Delgado Gomes"},{"@pid":"200/0467","text":"Diego V. Queiroz"},{"@pid":"145/4204","text":"Abel Cavalcante Lima-Filho"},{"@pid":"65/1836","text":"Iguatemi E. Fonseca"},{"@pid":"14/4312","text":"Marcelo S. Alencar"}]},"title":"Real-time link quality estimation for industrial wireless sensor networks using dedicated nodes.","venue":"Ad Hoc Networks","volume":"59","pages":"116-133","year":"2017","type":"Journal Articles","access":"closed","key":"journals/adhoc/GomesQLFA17","doi":"10.1016/J.ADHOC.2017.02.007","ee":"https://doi.org/10.1016/j.adhoc.2017.02.007","url":"https://dblp.org/rec/journals/adhoc/GomesQLFA17"}, "url":"URL#2742088" }, { "@score":"1", "@id":"2742098", "info":{"authors":{"author":[{"@pid":"196/4634","text":"Ghazaleh Jahandoust"},{"@pid":"44/4535","text":"Fatemeh Ghassemi"}]},"title":"An adaptive sinkhole aware algorithm in wireless sensor networks.","venue":"Ad Hoc Networks","volume":"59","pages":"24-34","year":"2017","type":"Journal Articles","access":"closed","key":"journals/adhoc/JahandoustG17","doi":"10.1016/J.ADHOC.2017.01.002","ee":"https://doi.org/10.1016/j.adhoc.2017.01.002","url":"https://dblp.org/rec/journals/adhoc/JahandoustG17"}, "url":"URL#2742098" }, { "@score":"1", "@id":"2742109", "info":{"authors":{"author":[{"@pid":"18/1239","text":"Marek Klonowski"},{"@pid":"118/1146","text":"Piotr Syga"}]},"title":"Enhancing privacy for ad hoc systems with predeployment key distribution.","venue":"Ad Hoc Networks","volume":"59","pages":"35-47","year":"2017","type":"Journal Articles","access":"closed","key":"journals/adhoc/KlonowskiS17","doi":"10.1016/J.ADHOC.2017.01.003","ee":"https://doi.org/10.1016/j.adhoc.2017.01.003","url":"https://dblp.org/rec/journals/adhoc/KlonowskiS17"}, "url":"URL#2742109" }, { "@score":"1", "@id":"2742112", "info":{"authors":{"author":[{"@pid":"195/6200","text":"Timo Kumberg"},{"@pid":"195/6235","text":"Marc Schink"},{"@pid":"20/7793","text":"Leonhard M. Reindl"},{"@pid":"s/ChristianSchindelhauer","text":"Christian Schindelhauer"}]},"title":"T-ROME: A simple and energy efficient tree routing protocol for low-power wake-up receivers.","venue":"Ad Hoc Networks","volume":"59","pages":"97-115","year":"2017","type":"Journal Articles","access":"closed","key":"journals/adhoc/KumbergSRS17","doi":"10.1016/J.ADHOC.2017.02.003","ee":"https://doi.org/10.1016/j.adhoc.2017.02.003","url":"https://dblp.org/rec/journals/adhoc/KumbergSRS17"}, "url":"URL#2742112" }, { "@score":"1", "@id":"2742118", "info":{"authors":{"author":[{"@pid":"62/5909-1","text":"Hongyan Li 0001"},{"@pid":"15/4777-41","text":"Tao Zhang 0041"},{"@pid":"37/6547","text":"Yangkun Zhang"},{"@pid":"47/910","text":"Kan Wang"},{"@pid":"65/7582-1","text":"Jiandong Li 0001"}]},"title":"A maximum flow algorithm based on storage time aggregated graph for delay-tolerant networks.","venue":"Ad Hoc Networks","volume":"59","pages":"63-70","year":"2017","type":"Journal Articles","access":"closed","key":"journals/adhoc/LiZZWL17","doi":"10.1016/J.ADHOC.2017.01.006","ee":"https://doi.org/10.1016/j.adhoc.2017.01.006","url":"https://dblp.org/rec/journals/adhoc/LiZZWL17"}, "url":"URL#2742118" }, { "@score":"1", "@id":"2742151", "info":{"authors":{"author":[{"@pid":"34/1837","text":"Eli De Poorter"},{"@pid":"152/5734","text":"Tom Van Haute"},{"@pid":"29/5606","text":"Eric Laermans"},{"@pid":"77/5355","text":"Ingrid Moerman"}]},"title":"Benchmarking of Localization Solutions: Guidelines for the Selection of Evaluation Points.","venue":"Ad Hoc Networks","volume":"59","pages":"86-96","year":"2017","type":"Journal Articles","access":"closed","key":"journals/adhoc/PoorterHLM17","doi":"10.1016/J.ADHOC.2017.02.002","ee":"https://doi.org/10.1016/j.adhoc.2017.02.002","url":"https://dblp.org/rec/journals/adhoc/PoorterHLM17"}, "url":"URL#2742151" }, { "@score":"1", "@id":"2742159", "info":{"authors":{"author":[{"@pid":"34/10726","text":"Shiva Razzaghzadeh"},{"@pid":"21/7725","text":"Ahmad Habibizad Navin"},{"@pid":"24/1563","text":"Amir Masoud Rahmani"},{"@pid":"66/10052-1","text":"Mehdi Hosseinzadeh 0001"}]},"title":"Probabilistic modeling to achieve load balancing in Expert Clouds.","venue":"Ad Hoc Networks","volume":"59","pages":"12-23","year":"2017","type":"Journal Articles","access":"closed","key":"journals/adhoc/RazzaghzadehNRH17","doi":"10.1016/J.ADHOC.2017.01.001","ee":"https://doi.org/10.1016/j.adhoc.2017.01.001","url":"https://dblp.org/rec/journals/adhoc/RazzaghzadehNRH17"}, "url":"URL#2742159" }, { "@score":"1", "@id":"2742173", "info":{"authors":{"author":[{"@pid":"143/0971","text":"Erald Troja"},{"@pid":"76/5890","text":"Spiridon Bakiras"}]},"title":"Optimizing privacy-preserving DSA for mobile clients.","venue":"Ad Hoc Networks","volume":"59","pages":"71-85","year":"2017","type":"Journal Articles","access":"closed","key":"journals/adhoc/TrojaB17","doi":"10.1016/J.ADHOC.2017.02.001","ee":"https://doi.org/10.1016/j.adhoc.2017.02.001","url":"https://dblp.org/rec/journals/adhoc/TrojaB17"}, "url":"URL#2742173" }, { "@score":"1", "@id":"2742196", "info":{"authors":{"author":[{"@pid":"07/4580-4","text":"Yang Zhou 0004"},{"@pid":"55/3503","text":"Zhengguo Sheng"},{"@pid":"124/8361","text":"Chinmaya Mahapatra"},{"@pid":"36/4847","text":"Victor C. M. Leung"},{"@pid":"168/4706","text":"Peyman Servati"}]},"title":"Topology design and cross-layer optimization for wireless body sensor networks.","venue":"Ad Hoc Networks","volume":"59","pages":"48-62","year":"2017","type":"Journal Articles","access":"closed","key":"journals/adhoc/ZhouSMLS17","doi":"10.1016/J.ADHOC.2017.01.005","ee":"https://doi.org/10.1016/j.adhoc.2017.01.005","url":"https://dblp.org/rec/journals/adhoc/ZhouSMLS17"}, "url":"URL#2742196" } ] } } } )