{"id":"https://openalex.org/W2135365254","doi":"https://doi.org/10.1145/1287853.1287873","title":"Crossing over the bounded domain","display_name":"Crossing over the bounded domain","publication_year":2007,"publication_date":"2007-09-09","ids":{"openalex":"https://openalex.org/W2135365254","doi":"https://doi.org/10.1145/1287853.1287873","mag":"2135365254"},"language":"en","primary_location":{"id":"doi:10.1145/1287853.1287873","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1287853.1287873","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 13th annual ACM international conference on Mobile computing and networking","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5087929301","display_name":"Han Cai","orcid":"https://orcid.org/0000-0002-4906-1192"},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Han Cai","raw_affiliation_strings":["North Carolina State University","North Carolina State University,"],"affiliations":[{"raw_affiliation_string":"North Carolina State University","institution_ids":["https://openalex.org/I137902535"]},{"raw_affiliation_string":"North Carolina State University,","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5050655327","display_name":"Do Young Eun","orcid":"https://orcid.org/0000-0002-1743-7482"},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Do Young Eun","raw_affiliation_strings":["North Carolina State University","North Carolina State University,"],"affiliations":[{"raw_affiliation_string":"North Carolina State University","institution_ids":["https://openalex.org/I137902535"]},{"raw_affiliation_string":"North Carolina State University,","institution_ids":["https://openalex.org/I137902535"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5087929301"],"corresponding_institution_ids":["https://openalex.org/I137902535"],"apc_list":null,"apc_paid":null,"fwci":18.6109,"has_fulltext":false,"cited_by_count":146,"citation_normalized_percentile":{"value":0.99418949,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"159","last_page":"170"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7528737783432007},{"id":"https://openalex.org/keywords/bounded-function","display_name":"Bounded function","score":0.6036393642425537},{"id":"https://openalex.org/keywords/mobile-ad-hoc-network","display_name":"Mobile ad hoc network","score":0.5715961456298828},{"id":"https://openalex.org/keywords/boundary","display_name":"Boundary (topology)","score":0.5419905781745911},{"id":"https://openalex.org/keywords/mobility-model","display_name":"Mobility model","score":0.5351394414901733},{"id":"https://openalex.org/keywords/exponential-distribution","display_name":"Exponential distribution","score":0.4892995059490204},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.48450157046318054},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.461207777261734},{"id":"https://openalex.org/keywords/exponential-function","display_name":"Exponential function","score":0.44357994198799133},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4373510479927063},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.43557512760162354},{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.42970186471939087},{"id":"https://openalex.org/keywords/power-law","display_name":"Power law","score":0.41430145502090454},{"id":"https://openalex.org/keywords/random-walk","display_name":"Random walk","score":0.4104096293449402},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.39009684324264526},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.32934096455574036},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.17042449116706848},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.11862137913703918}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7528737783432007},{"id":"https://openalex.org/C34388435","wikidata":"https://www.wikidata.org/wiki/Q2267362","display_name":"Bounded function","level":2,"score":0.6036393642425537},{"id":"https://openalex.org/C91280400","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Mobile ad hoc network","level":3,"score":0.5715961456298828},{"id":"https://openalex.org/C62354387","wikidata":"https://www.wikidata.org/wiki/Q875399","display_name":"Boundary (topology)","level":2,"score":0.5419905781745911},{"id":"https://openalex.org/C191485582","wikidata":"https://www.wikidata.org/wiki/Q6887309","display_name":"Mobility model","level":2,"score":0.5351394414901733},{"id":"https://openalex.org/C55350006","wikidata":"https://www.wikidata.org/wiki/Q237193","display_name":"Exponential distribution","level":2,"score":0.4892995059490204},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.48450157046318054},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.461207777261734},{"id":"https://openalex.org/C151376022","wikidata":"https://www.wikidata.org/wiki/Q168698","display_name":"Exponential function","level":2,"score":0.44357994198799133},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4373510479927063},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.43557512760162354},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.42970186471939087},{"id":"https://openalex.org/C87040749","wikidata":"https://www.wikidata.org/wiki/Q428971","display_name":"Power law","level":2,"score":0.41430145502090454},{"id":"https://openalex.org/C121194460","wikidata":"https://www.wikidata.org/wiki/Q856741","display_name":"Random walk","level":2,"score":0.4104096293449402},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.39009684324264526},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.32934096455574036},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.17042449116706848},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.11862137913703918},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1287853.1287873","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1287853.1287873","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 13th annual ACM international conference on Mobile computing and networking","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7900000214576721,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W1497763074","https://openalex.org/W1631683393","https://openalex.org/W1661977598","https://openalex.org/W1975804880","https://openalex.org/W2002169759","https://openalex.org/W2007634297","https://openalex.org/W2018798792","https://openalex.org/W2060998991","https://openalex.org/W2069488474","https://openalex.org/W2086458537","https://openalex.org/W2088012076","https://openalex.org/W2095206774","https://openalex.org/W2103344667","https://openalex.org/W2112459052","https://openalex.org/W2112701160","https://openalex.org/W2114202040","https://openalex.org/W2122887675","https://openalex.org/W2130181548","https://openalex.org/W2132821960","https://openalex.org/W2132932625","https://openalex.org/W2135377440","https://openalex.org/W2137688035","https://openalex.org/W2139940941","https://openalex.org/W2143385503","https://openalex.org/W2148135143","https://openalex.org/W2149937472","https://openalex.org/W2149959815","https://openalex.org/W2157457404","https://openalex.org/W2161725792","https://openalex.org/W2162957210","https://openalex.org/W2164254123","https://openalex.org/W2200366263","https://openalex.org/W2264658725","https://openalex.org/W2738925194","https://openalex.org/W2947171186","https://openalex.org/W3148586553","https://openalex.org/W4248052515","https://openalex.org/W4299946267","https://openalex.org/W6605139453","https://openalex.org/W7009073941"],"related_works":["https://openalex.org/W2016172030","https://openalex.org/W2047490229","https://openalex.org/W2048735602","https://openalex.org/W1531688123","https://openalex.org/W2032395188","https://openalex.org/W763509043","https://openalex.org/W2749079590","https://openalex.org/W4385438236","https://openalex.org/W32111050","https://openalex.org/W2272092283"],"abstract_inverted_index":{"Inter-meeting":[0],"time":[1,63,101,189,212],"between":[2,180],"mobile":[3],"nodes":[4],"is":[5,27],"one":[6],"of":[7,38,77,124,140,171,183,191,205],"the":[8,20,53,61,78,85,98,125,137,141,151,166,172,178,181,184,187,192,203],"key":[9],"metrics":[10],"in":[11,34,52,65,81,135,153],"a":[12,68,118,154],"Mobile":[13],"Ad-hoc":[14],"Network":[15],"(MANET)":[16],"and":[17,23,91,108,186],"central":[18],"to":[19,30,43,164],"end-to-end":[21],"delay":[22],"forwarding":[24,218],"algorithms.":[25],"It":[26],"typically":[28],"assumed":[29],"be":[31,44],"exponentially":[32,45],"distributed":[33,46],"many":[35],"performance":[36,79,224],"studies":[37],"MANET":[39,82],"or":[40],"numerically":[41],"shown":[42],"under":[47,84,195],"most":[48,123],"existing":[49],"mobility":[50,106,127,207],"models":[51,128,208],"literature.":[54],"However,":[55],"recent":[56],"empirical":[57],"results":[58,198],"show":[59],"otherwise:":[60],"inter-meeting":[62,89,100,142,173,211],"distribution":[64,87],"fact":[66],"follows":[67],"power-law.":[69],"This":[70],"outright":[71],"discrepancy":[72],"potentially":[73],"undermines":[74],"our":[75],"understanding":[76],"tradeoffs":[80],"obtained":[83],"exponential":[86,138],"ofthe":[88],"time,":[90],"thus":[92,199],"calls":[93],"for":[94],"further":[95],"study":[96],"on":[97,121,202],"power-law":[99,169,210],"including":[102,216],"its":[103,109],"fundamental":[104],"cause,":[105],"modeling,":[107],"effect.":[110],"In":[111],"this":[112],"paper,":[113],"we":[114,161],"rigorously":[115],"prove":[116,146],"that":[117,147],"finite":[119],"domain,":[120],"which":[122],"current":[126],"are":[129,162],"defined,":[130],"plays":[131],"an":[132],"important":[133],"role":[134],"creating":[136],"tail":[139],"time.":[143,174],"We":[144,175],"also":[145],"by":[148],"simply":[149],"removing":[150],"boundary":[152,185],"simple":[155],"two-dimensional":[156],"isotropic":[157],"random":[158],"walk":[159],"model,":[160],"able":[163],"obtain":[165],"empirically":[167],"observed":[168],"decay":[170],"then":[176],"discuss":[177],"relationship":[179],"size":[182],"relevant":[188],"scale":[190],"network":[193],"scenario":[194],"consideration.":[196],"Our":[197],"provide":[200],"guidelines":[201],"design":[204],"new":[206,214],"with":[209],"distribution,":[213],"protocols":[215],"packet":[217],"algorithms,":[219],"as":[220,222],"well":[221],"their":[223],"analysis.":[225]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":6},{"year":2015,"cited_by_count":8},{"year":2014,"cited_by_count":17},{"year":2013,"cited_by_count":12},{"year":2012,"cited_by_count":11}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
