{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T12:23:51Z","timestamp":1762431831983,"version":"3.40.3"},"publisher-location":"Cham","reference-count":123,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030457778"},{"type":"electronic","value":"9783030457785"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-45778-5_32","type":"book-chapter","created":{"date-parts":[[2020,4,19]],"date-time":"2020-04-19T17:02:34Z","timestamp":1587315754000},"page":"461-484","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Socially and Biologically Inspired Computing for Self-organizing Communications Networks"],"prefix":"10.1007","author":[{"given":"Juan P.","family":"Ospina","sequence":"first","affiliation":[]},{"given":"Joaqu\u00edn F.","family":"S\u00e1nchez","sequence":"additional","affiliation":[]},{"given":"Jorge E.","family":"Ortiz","sequence":"additional","affiliation":[]},{"given":"Carlos","family":"Collazos-Morales","sequence":"additional","affiliation":[]},{"given":"Paola","family":"Ariza-Colpas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,4,20]]},"reference":[{"issue":"2","key":"32_CR1","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1109\/MC.2012.33","volume":"45","author":"D Abadi","year":"2012","unstructured":"Abadi, D.: Consistency tradeoffs in modern distributed database system design: CAP is only part of the story. Computer 45(2), 37\u201342 (2012)","journal-title":"Computer"},{"issue":"10","key":"32_CR2","doi-asserted-by":"publisher","first-page":"351047","DOI":"10.1155\/2013\/351047","volume":"9","author":"NA Alrajeh","year":"2013","unstructured":"Alrajeh, N.A., Lloret, J.: Intrusion detection systems based on artificial intelligence techniques in wireless sensor networks. Int. J. Distrib. Sens. Netw. 9(10), 351047 (2013)","journal-title":"Int. J. Distrib. Sens. Netw."},{"issue":"2","key":"32_CR3","first-page":"6","volume":"6","author":"M Alzate","year":"2001","unstructured":"Alzate, M., Monroy, A.: Introducci\u00f3n al tr\u00e1fico autosimilar en redes de comunicaciones. Rev. Ing. 6(2), 6\u201317 (2001)","journal-title":"Rev. Ing."},{"issue":"2","key":"32_CR4","first-page":"110","volume":"2","author":"M Amoozadeh","year":"2015","unstructured":"Amoozadeh, M., Deng, H., Chuah, C.N., Zhang, H.M., Ghosal, D.: Platoon management with cooperative adaptive cruise control enabled by vanet. Veh. Commun. 2(2), 110\u2013123 (2015)","journal-title":"Veh. Commun."},{"issue":"1","key":"32_CR5","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/s10458-010-9137-2","volume":"23","author":"B An","year":"2011","unstructured":"An, B., Lesser, V., Sim, K.M.: Strategic agents for multi-resource negotiation. Auton. Agent. Multi-Agent Syst. 23(1), 114\u2013153 (2011)","journal-title":"Auton. Agent. Multi-Agent Syst."},{"key":"32_CR6","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/11493402_13","volume-title":"Declarative Agent Languages and Technologies II","author":"A Artikis","year":"2005","unstructured":"Artikis, A., Kamara, L., Pitt, J., Sergot, M.: A protocol for resource sharing in norm-governed ad hoc networks. In: Leite, J., Omicini, A., Torroni, P., Yolum, I. (eds.) DALT 2004. LNCS (LNAI), vol. 3476, pp. 221\u2013238. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11493402_13"},{"key":"32_CR7","doi-asserted-by":"publisher","unstructured":"Artikis, A., Pitt, J.: A formal model of open agent societies. In: Proceedings of the Fifth International Conference on Autonomous Agents, AGENTS 2001, pp. 192\u2013193. ACM, New York (2001). https:\/\/doi.org\/10.1145\/375735.376108. http:\/\/doi.acm.org\/10.1145\/375735.376108","DOI":"10.1145\/375735.376108"},{"issue":"4489","key":"32_CR8","doi-asserted-by":"publisher","first-page":"1390","DOI":"10.1126\/science.7466396","volume":"211","author":"R Axelrod","year":"1981","unstructured":"Axelrod, R., Hamilton, W.D.: The evolution of cooperation. Science 211(4489), 1390\u20131396 (1981)","journal-title":"Science"},{"key":"32_CR9","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1016\/j.artint.2012.09.004","volume":"198","author":"T Baarslag","year":"2013","unstructured":"Baarslag, T., et al.: Evaluating practical negotiating agents: results and analysis of the 2011 international competition. Artif. Intell. 198, 73\u2013103 (2013)","journal-title":"Artif. Intell."},{"key":"32_CR10","unstructured":"Baarslag, T., Hindriks, K.V.: Accepting optimally in automated negotiation with incomplete information. In: Proceedings of the 2013 International Conference on Autonomous Agents and Multi-Agent Systems, pp. 715\u2013722. International Foundation for Autonomous Agents and Multiagent Systems (2013)"},{"issue":"5","key":"32_CR11","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1038\/scientificamerican0503-60","volume":"288","author":"AL Barab\u00e1si","year":"2003","unstructured":"Barab\u00e1si, A.L., Bonabeau, E.: Scale-free networks. Sci. Am. 288(5), 60\u201369 (2003)","journal-title":"Sci. Am."},{"key":"32_CR12","doi-asserted-by":"publisher","DOI":"10.1002\/9780470058411","volume-title":"Developing Multi-Agent Systems with JADE","author":"FL Bellifemine","year":"2007","unstructured":"Bellifemine, F.L., Caire, G., Greenwood, D.: Developing Multi-Agent Systems with JADE, vol. 7. Wiley, Hoboken (2007)"},{"key":"32_CR13","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.comnet.2016.01.001","volume":"97","author":"G Brandner","year":"2016","unstructured":"Brandner, G., Schilcher, U., Bettstetter, C.: Firefly synchronization with phase rate equalization and its experimental analysis in wireless systems. Comput. Netw. 97, 74\u201387 (2016)","journal-title":"Comput. Netw."},{"issue":"1","key":"32_CR14","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1109\/SURV.2013.050113.00191","volume":"16","author":"I Butun","year":"2014","unstructured":"Butun, I., Morgera, S.D., Sankar, R.: A survey of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv. Tutor. 16(1), 266\u2013282 (2014)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"32_CR15","volume-title":"Bio-inspired Networking","author":"D C\u00e2mara","year":"2015","unstructured":"C\u00e2mara, D.: Bio-inspired Networking. Elsevier, Amsterdam (2015)"},{"issue":"5","key":"32_CR16","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1002\/wcm.72","volume":"2","author":"T Camp","year":"2002","unstructured":"Camp, T., Boleng, J., Davies, V.: A survey of mobility models for ad hoc network research. Wirel. Commun. Mob. Comput. 2(5), 483\u2013502 (2002)","journal-title":"Wirel. Commun. Mob. Comput."},{"issue":"1","key":"32_CR17","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/s10816-012-9147-2","volume":"21","author":"DM Carballo","year":"2014","unstructured":"Carballo, D.M., Roscoe, P., Feinman, G.M.: Cooperation and collective action in the cultural evolution of complex societies. J. Archaeol. Method Theory 21(1), 98\u2013133 (2014)","journal-title":"J. Archaeol. Method Theory"},{"issue":"12","key":"32_CR18","doi-asserted-by":"publisher","first-page":"e0190100","DOI":"10.1371\/journal.pone.0190100","volume":"12","author":"G Carre\u00f3n","year":"2017","unstructured":"Carre\u00f3n, G., Gershenson, C., Pineda, L.: Improving public transportation systems with self-organization: a headway-based model and regulation of passenger alighting and boarding. PLoS ONE 12(12), e0190100 (2017)","journal-title":"PLoS ONE"},{"key":"32_CR19","doi-asserted-by":"crossref","unstructured":"Chitra, M., Sathya, S.S.: Bidirectional data dissemination in vehicular ad hoc networks using epidemic spreading model. In: Proceedings of the International Conference on Informatics and Analytics, p. 57. ACM (2016)","DOI":"10.1145\/2980258.2980382"},{"key":"32_CR20","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/978-3-319-44354-6_5","volume-title":"Advances in Network Systems","author":"M Chovanec","year":"2017","unstructured":"Chovanec, M., Milanov\u00e1, J., \u010cechovi\u010d, L., \u0160araf\u00edn, P., H\u00fadik, M., Kochl\u00e1\u0148, M.: Firefly-based universal synchronization algorithm in wireless sensor network. In: Grzenda, M., Awad, A.I., Furtak, J., Legierski, J. (eds.) Advances in Network Systems. AISC, vol. 461, pp. 71\u201386. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-44354-6_5"},{"issue":"12","key":"32_CR21","doi-asserted-by":"publisher","first-page":"1334","DOI":"10.1109\/PROC.1983.12775","volume":"71","author":"JD Day","year":"1983","unstructured":"Day, J.D., Zimmermann, H.: The OSI reference model. Proc. IEEE 71(12), 1334\u20131340 (1983). https:\/\/doi.org\/10.1109\/PROC.1983.12775","journal-title":"Proc. IEEE"},{"issue":"1","key":"32_CR22","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1111\/j.1545-5300.1982.00021.x","volume":"21","author":"PF Dell","year":"1982","unstructured":"Dell, P.F.: Beyond homeostasis: toward a concept of coherence. Fam. Process 21(1), 21\u201341 (1982)","journal-title":"Fam. Process"},{"issue":"5","key":"32_CR23","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1002\/ett.1062","volume":"16","author":"G Di Caro","year":"2005","unstructured":"Di Caro, G., Ducatelle, F., Gambardella, L.M.: AntHocNet: an adaptive nature-inspired algorithm for routing in mobile ad hoc networks. Trans. Emerg. Telecommun. Technol. 16(5), 443\u2013455 (2005)","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"32_CR24","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/978-0-387-30164-8","volume-title":"Encyclopedia of Machine Learning","author":"M Dorigo","year":"2011","unstructured":"Dorigo, M., Birattari, M.: Ant colony optimization. In: Sammut, C., Webb, G.I. (eds.) Encyclopedia of Machine Learning, pp. 36\u201339. Springer, Boston (2011). https:\/\/doi.org\/10.1007\/978-0-387-30164-8"},{"key":"32_CR25","volume-title":"Self-Organization in Sensor and Actor Networks","author":"F Dressler","year":"2008","unstructured":"Dressler, F.: Self-Organization in Sensor and Actor Networks. Wiley, Hoboken (2008)"},{"issue":"11","key":"32_CR26","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1109\/MCOM.2010.5621985","volume":"48","author":"F Dressler","year":"2010","unstructured":"Dressler, F., Akan, O.B.: Bio-inspired networking: from theory to practice. IEEE Commun. Mag. 48(11), 176\u2013183 (2010)","journal-title":"IEEE Commun. Mag."},{"issue":"6","key":"32_CR27","doi-asserted-by":"publisher","first-page":"881","DOI":"10.1016\/j.comnet.2009.10.024","volume":"54","author":"F Dressler","year":"2010","unstructured":"Dressler, F., Akan, O.B.: A survey on bio-inspired networking. Comput. Netw. 54(6), 881\u2013900 (2010)","journal-title":"Comput. Netw."},{"issue":"1","key":"32_CR28","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1109\/TNET.2017.2763185","volume":"26","author":"F Dressler","year":"2018","unstructured":"Dressler, F., Klingler, F., Sommer, C., Cohen, R.: Not all vanet broadcasts are the same: context-aware class based broadcast. IEEE\/ACM Trans. Netw. 26(1), 17\u201330 (2018)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"32_CR29","unstructured":"Dressler, F., et al.: Self-organization in ad hoc networks: overview and classification. University of Erlangen, Department of Computer Science, vol. 7, pp. 1\u201312 (2006)"},{"key":"32_CR30","doi-asserted-by":"crossref","unstructured":"Dunphy, P., Petitcolas, F.A.: A first look at identity management schemes on the blockchain. arXiv preprint arXiv:1801.03294 (2018)","DOI":"10.1109\/MSP.2018.3111247"},{"key":"32_CR31","volume-title":"The Hypercycle: A Principle of Natural Self-Organization","author":"M Eigen","year":"2012","unstructured":"Eigen, M., Schuster, P.: The Hypercycle: A Principle of Natural Self-Organization. Springer, Heidelberg (2012)"},{"key":"32_CR32","doi-asserted-by":"publisher","first-page":"853","DOI":"10.1016\/j.compeleceng.2018.01.002","volume":"70","author":"M Fahad","year":"2018","unstructured":"Fahad, M., et al.: Grey wolf optimization based clustering algorithm for vehicular ad-hoc networks. Comput. Electr. Eng. 70, 853\u2013870 (2018)","journal-title":"Comput. Electr. Eng."},{"issue":"3","key":"32_CR33","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1016\/S0921-8890(98)00029-3","volume":"24","author":"P Faratin","year":"1998","unstructured":"Faratin, P., Sierra, C., Jennings, N.R.: Negotiation decision functions for autonomous agents. Robot. Auton. Syst. 24(3), 159\u2013182 (1998)","journal-title":"Robot. Auton. Syst."},{"key":"32_CR34","volume-title":"Mobile Clouds: Exploiting Distributed Resources in Wireless, Mobile and Social Networks","author":"FH Fitzek","year":"2013","unstructured":"Fitzek, F.H., Katz, M.D.: Mobile Clouds: Exploiting Distributed Resources in Wireless, Mobile and Social Networks. Wiley, Hoboken (2013)"},{"key":"32_CR35","unstructured":"Galati, A.: Delay tolerant network (2010)"},{"issue":"8","key":"32_CR36","doi-asserted-by":"publisher","first-page":"2785","DOI":"10.1016\/j.cnsns.2013.12.026","volume":"19","author":"C Gan","year":"2014","unstructured":"Gan, C., Yang, X., Liu, W., Zhu, Q., Jin, J., He, L.: Propagation of computer virus both across the internet and external computers: a complex-network approach. Commun. Nonlinear Sci. Numer. Simul. 19(8), 2785\u20132792 (2014)","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"key":"32_CR37","doi-asserted-by":"crossref","unstructured":"Garbiso, J.P., Diaconescu, A., Coupechoux, M., Pitt, J., Leroy, B.: Distributive justice for fair auto-adaptive clusters of connected vehicles. In: 2017 IEEE 2nd International Workshops on Foundations and Applications of Self* Systems (FAS* W), pp. 79\u201384. IEEE (2017)","DOI":"10.1109\/FAS-W.2017.124"},{"key":"32_CR38","unstructured":"Gershenson, C.: Design and control of self-organizing systems. CopIt ArXives (2007)"},{"key":"32_CR39","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"606","DOI":"10.1007\/978-3-540-39432-7_65","volume-title":"Advances in Artificial Life","author":"C Gershenson","year":"2003","unstructured":"Gershenson, C., Heylighen, F.: When can we call a system self-organizing? In: Banzhaf, W., Ziegler, J., Christaller, T., Dittrich, P., Kim, J.T. (eds.) ECAL 2003. LNCS (LNAI), vol. 2801, pp. 606\u2013614. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-39432-7_65"},{"key":"32_CR40","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.ins.2013.12.038","volume":"265","author":"A Giagkos","year":"2014","unstructured":"Giagkos, A., Wilson, M.S.: BeeIP-a swarm intelligence based routing for wireless ad hoc networks. Inf. Sci. 265, 23\u201335 (2014)","journal-title":"Inf. Sci."},{"key":"32_CR41","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.comcom.2014.07.013","volume":"54","author":"LA Grieco","year":"2014","unstructured":"Grieco, L.A., et al.: IoT-aided robotics applications: technological implications, target domains and open issues. Comput. Commun. 54, 32\u201347 (2014)","journal-title":"Comput. Commun."},{"key":"32_CR42","doi-asserted-by":"crossref","unstructured":"Grippa, P., Behrens, D.A., Bettstetter, C., Wall, F.: Job selection in a network of autonomous UAVs for delivery of goods. arXiv preprint arXiv:1604.04180 (2016)","DOI":"10.15607\/RSS.2017.XIII.018"},{"key":"32_CR43","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.inffus.2013.02.005","volume":"22","author":"M Hammoudeh","year":"2015","unstructured":"Hammoudeh, M., Newman, R.: Adaptive routing in wireless sensor networks: QoS optimisation for enhanced application performance. Inf. Fusion 22, 3\u201315 (2015)","journal-title":"Inf. Fusion"},{"key":"32_CR44","unstructured":"Hatfield, U.: Socially inspired computing (2005)"},{"issue":"3","key":"32_CR45","doi-asserted-by":"publisher","first-page":"660","DOI":"10.1109\/TAC.2013.2286893","volume":"59","author":"J He","year":"2014","unstructured":"He, J., Cheng, P., Shi, L., Chen, J., Sun, Y.: Time synchronization in WSNs: a maximum-value-based consensus approach. IEEE Trans. Autom. Control 59(3), 660\u2013675 (2014)","journal-title":"IEEE Trans. Autom. Control"},{"issue":"2","key":"32_CR46","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1016\/j.isatra.2013.11.001","volume":"53","author":"J He","year":"2014","unstructured":"He, J., Li, H., Chen, J., Cheng, P.: Study of consensus-based time synchronization in wireless sensor networks. ISA Trans. 53(2), 347\u2013357 (2014)","journal-title":"ISA Trans."},{"issue":"4","key":"32_CR47","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/MIS.2003.1217631","volume":"18","author":"F Heylighen","year":"2003","unstructured":"Heylighen, F., Gershenson, C.: The meaning of self-organization in computing. IEEE Intell. Syst. 18(4), 72\u201375 (2003)","journal-title":"IEEE Intell. Syst."},{"key":"32_CR48","unstructured":"Iversen, V.B.: Teletraffic engineering and network planning. Technical University of Denmark, p. 270 (2010)"},{"issue":"2","key":"32_CR49","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1080\/13614576.2016.1247741","volume":"21","author":"S Jamali","year":"2016","unstructured":"Jamali, S., Fotohi, R.: Defending against wormhole attack in MANET using an artificial immune system. New Rev. Inf. Netw. 21(2), 79\u2013100 (2016)","journal-title":"New Rev. Inf. Netw."},{"issue":"1","key":"32_CR50","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s10462-012-9387-2","volume":"39","author":"AJ Jones","year":"2013","unstructured":"Jones, A.J., Artikis, A., Pitt, J.: The design of intelligent socio-technical systems. Artif. Intell. Rev. 39(1), 5\u201320 (2013)","journal-title":"Artif. Intell. Rev."},{"issue":"1","key":"32_CR51","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1109\/MCOM.2017.1500740","volume":"56","author":"JY Jung","year":"2018","unstructured":"Jung, J.Y., Choi, H.H., Lee, J.R.: Survey of bio-inspired resource allocation algorithms and MAC protocol design based on a bio-inspired algorithm for mobile ad hoc networks. IEEE Commun. Mag. 56(1), 119\u2013127 (2018)","journal-title":"IEEE Commun. Mag."},{"issue":"1\u20134","key":"32_CR52","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/s10462-009-9127-4","volume":"31","author":"D Karaboga","year":"2009","unstructured":"Karaboga, D., Akay, B.: A survey: algorithms simulating bee swarm intelligence. Artif. Intell. Rev. 31(1\u20134), 61 (2009)","journal-title":"Artif. Intell. Rev."},{"key":"32_CR53","doi-asserted-by":"publisher","DOI":"10.1007\/b94627","volume-title":"Complex Dynamics in Communication Networks","author":"L Kocarev","year":"2005","unstructured":"Kocarev, L.: Complex Dynamics in Communication Networks. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/b94627"},{"issue":"1","key":"32_CR54","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1146\/annurev.soc.24.1.183","volume":"24","author":"P Kollock","year":"1998","unstructured":"Kollock, P.: Social dilemmas: the anatomy of cooperation. Ann. Rev. Sociol. 24(1), 183\u2013214 (1998)","journal-title":"Ann. Rev. Sociol."},{"issue":"2","key":"32_CR55","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/s11277-017-5070-x","volume":"100","author":"VH Kshirsagar","year":"2018","unstructured":"Kshirsagar, V.H., Kanthe, A.M., Simunic, D.: Trust based detection and elimination of packet drop attack in the mobile ad-hoc networks. Wireless Pers. Commun. 100(2), 311\u2013320 (2018)","journal-title":"Wireless Pers. Commun."},{"key":"32_CR56","volume-title":"Simulation Modeling and Analysis","author":"AM Law","year":"2007","unstructured":"Law, A.M.: Simulation Modeling and Analysis, vol. 3. McGraw-Hill, New York (2007)"},{"key":"32_CR57","doi-asserted-by":"crossref","unstructured":"Leibnitz, K., Wakamiya, N., Murata, M.: Biologically inspired networking. In: Cognitive Networks: Towards Self-Aware Networks, pp. 1\u201321 (2007)","DOI":"10.1002\/9780470515143.ch1"},{"key":"32_CR58","doi-asserted-by":"crossref","unstructured":"Li, L., Alderson, D., Willinger, W., Doyle, J.: A first-principles approach to understanding the internet\u2019s router-level topology. In: ACM SIGCOMM Computer Communication Review, vol. 34, pp. 3\u201314. ACM (2004)","DOI":"10.1145\/1030194.1015470"},{"key":"32_CR59","first-page":"1","volume":"10","author":"S Li","year":"2018","unstructured":"Li, S., Da Xu, L., Zhao, S.: 5G internet of things: a survey. J. Ind. Inf. Integr. 10, 1\u20139 (2018)","journal-title":"J. Ind. Inf. Integr."},{"key":"32_CR60","doi-asserted-by":"crossref","unstructured":"Li, W., Yi, P., Wu, Y., Pan, L., Li, J.: A new intrusion detection system based on KNN classification algorithm in wireless sensor network. J. Electr. Comput. Eng. 2014 (2014)","DOI":"10.1155\/2014\/240217"},{"issue":"2","key":"32_CR61","doi-asserted-by":"publisher","first-page":"818903","DOI":"10.1155\/2015\/818903","volume":"11","author":"Y Li","year":"2015","unstructured":"Li, Y., Xu, H., Cao, Q., Li, Z., Shen, S.: Evolutionary game-based trust strategy adjustment among nodes in wireless sensor networks. Int. J. Distrib. Sens. Netw. 11(2), 818903 (2015)","journal-title":"Int. J. Distrib. Sens. Netw."},{"issue":"1","key":"32_CR62","doi-asserted-by":"publisher","first-page":"e2857","DOI":"10.1002\/dac.2857","volume":"30","author":"HB Liaqat","year":"2017","unstructured":"Liaqat, H.B., Xia, F., Yang, Q., Xu, Z., Ahmed, A.M., Rahim, A.: Bio-inspired packet dropping for ad-hoc social networks. Int. J. Commun. Syst. 30(1), e2857 (2017)","journal-title":"Int. J. Commun. Syst."},{"issue":"6","key":"32_CR63","doi-asserted-by":"publisher","first-page":"1016","DOI":"10.1109\/TDSC.2016.2642191","volume":"15","author":"B Liu","year":"2016","unstructured":"Liu, B., Zhou, W., Gao, L., Zhou, H., Luan, T.H., Wen, S.: Malware propagations in dwireless add hoc networks. IEEE Trans. Dependable Secure Comput. 15(6), 1016\u20131026 (2016)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"32_CR64","doi-asserted-by":"publisher","DOI":"10.1201\/b11447","volume-title":"Mobile Ad Hoc Networks: Current Status and Future Trends","author":"J Loo","year":"2016","unstructured":"Loo, J., Mauri, J.L., Ortiz, J.H.: Mobile Ad Hoc Networks: Current Status and Future Trends. CRC Press, Boca Raton (2016)"},{"key":"32_CR65","unstructured":"Maldonado, C.E.: Complejidad: ciencia, pensamiento y aplicaciones, vol. 1 (2007)"},{"key":"32_CR66","series-title":"Lecture Notes in Electrical Engineering","doi-asserted-by":"publisher","first-page":"665","DOI":"10.1007\/978-981-10-4280-5_70","volume-title":"Proceedings of 2nd International Conference on Micro-Electronics, Electromagnetics and Telecommunications","author":"SK Nagula Meera","year":"2018","unstructured":"Nagula Meera, S.K., Kumar, D.S., Rao, S.: Ad hoc networks: route discovery channel for mobile network with low power consumption. In: Satapathy, S.C., Bhateja, V., Chowdary, P.S.R., Chakravarthy, V.V.S.S.S., Anguera, J. (eds.) Proceedings of 2nd International Conference on Micro-Electronics, Electromagnetics and Telecommunications. LNEE, vol. 434, pp. 665\u2013671. Springer, Singapore (2018). https:\/\/doi.org\/10.1007\/978-981-10-4280-5_70"},{"issue":"1","key":"32_CR67","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1108\/10662240910927849","volume":"19","author":"M Mejia","year":"2009","unstructured":"Mejia, M., Pena, N., Munoz, J.L., Esparza, O.: A review of trust modeling in ad hoc networks. Internet Res. 19(1), 88\u2013104 (2009)","journal-title":"Internet Res."},{"issue":"1","key":"32_CR68","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/j.jnca.2010.09.007","volume":"34","author":"M Mejia","year":"2011","unstructured":"Mejia, M., Pe\u00f1a, N., Mu\u00f1oz, J.L., Esparza, O., Alzate, M.A.: A game theoretic trust model for on-line distributed evolution of cooperation inmanets. J. Netw. Comput. Appl. 34(1), 39\u201351 (2011)","journal-title":"J. Netw. Comput. Appl."},{"issue":"2","key":"32_CR69","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1016\/j.jcss.2005.06.009","volume":"72","author":"M Mihail","year":"2006","unstructured":"Mihail, M., Papadimitriou, C., Saberi, A.: On certain connectivity properties of the internet topology. J. Comput. Syst. Sci. 72(2), 239\u2013251 (2006). https:\/\/doi.org\/10.1016\/j.jcss.2005.06.009. jCSS FOCS 2003 Special Issue","journal-title":"J. Comput. Syst. Sci."},{"key":"32_CR70","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.chaos.2017.01.005","volume":"96","author":"S Mukherjee","year":"2017","unstructured":"Mukherjee, S., Ray, R., Samanta, R., Khondekar, M.H., Sanyal, G.: Nonlinearity and chaos in wireless network traffic. Chaos Solitons Fractals 96, 23\u201329 (2017)","journal-title":"Chaos Solitons Fractals"},{"key":"32_CR71","unstructured":"Neuman, B.C.: Scale in distributed systems. ISI\/USC (1994)"},{"issue":"5805","key":"32_CR72","doi-asserted-by":"publisher","first-page":"1560","DOI":"10.1126\/science.1133755","volume":"314","author":"MA Nowak","year":"2006","unstructured":"Nowak, M.A.: Five rules for the evolution of cooperation. Science 314(5805), 1560\u20131563 (2006)","journal-title":"Science"},{"issue":"1","key":"32_CR73","first-page":"49","volume":"21","author":"JP Ospina","year":"2017","unstructured":"Ospina, J.P., Ortiz, J.E.: Estimation of a growth factor to achieve scalable ad hoc networks. Ing. Univ. 21(1), 49\u201370 (2017)","journal-title":"Ing. Univ."},{"key":"32_CR74","doi-asserted-by":"publisher","DOI":"10.1201\/EBK1439819197","volume-title":"Security of Self-organizing Networks: MANET, WSN, WMN, VANET","author":"ASK Pathan","year":"2016","unstructured":"Pathan, A.S.K.: Security of Self-organizing Networks: MANET, WSN, WMN, VANET. CRC Press, Boca Raton (2016)"},{"key":"32_CR75","doi-asserted-by":"crossref","unstructured":"Pazhaniraja, N., Paul, P.V., Roja, G., Shanmugapriya, K., Sonali, B.: A study on recent bio-inspired optimization algorithms. In: 2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN), pp. 1\u20136. IEEE (2017)","DOI":"10.1109\/ICSCN.2017.8085674"},{"issue":"3","key":"32_CR76","first-page":"13","volume":"12","author":"PE Petruzzi","year":"2017","unstructured":"Petruzzi, P.E., Pitt, J., Busquets, D.: Electronic social capital for self-organising multi-agent systems. ACM Trans. Auton. Adapt. Syst. (TAAS) 12(3), 13 (2017)","journal-title":"ACM Trans. Auton. Adapt. Syst. (TAAS)"},{"key":"32_CR77","doi-asserted-by":"publisher","unstructured":"Pitt, J., Diaconescu, A., Bourazeri, A.: Democratisation of the smartgrid and the active participation of prosumers. In: 2017 IEEE 26th International Symposium on Industrial Electronics (ISIE), pp. 1707\u20131714, June 2017. https:\/\/doi.org\/10.1109\/ISIE.2017.8001505","DOI":"10.1109\/ISIE.2017.8001505"},{"key":"32_CR78","series-title":"Autonomic Systems","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/978-3-319-29201-4_7","volume-title":"Trustworthy Open Self-Organising Systems","author":"J Pitt","year":"2016","unstructured":"Pitt, J.: From trust and forgiveness to social capital and justice: formal models of social processes in open distributed systems. In: Reif, W., et al. (eds.) Trustworthy Open Self-Organising Systems. AS, pp. 185\u2013208. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-29201-4_7"},{"issue":"3","key":"32_CR79","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1007\/s00146-013-0531-6","volume":"30","author":"J Pitt","year":"2015","unstructured":"Pitt, J., Busquets, D., Riveret, R.: The pursuit of computational justice in open systems. AI Soc. 30(3), 359\u2013378 (2015)","journal-title":"AI Soc."},{"key":"32_CR80","doi-asserted-by":"crossref","unstructured":"Pitt, J., Diaconescu, A., Bourazeri, A.: Democratisation of the smartgrid and the active participation of prosumers. In: 2017 IEEE 26th International Symposium on Industrial Electronics (ISIE), pp. 1707\u20131714. IEEE (2017)","DOI":"10.1109\/ISIE.2017.8001505"},{"key":"32_CR81","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/978-3-642-32729-2_14","volume-title":"PRIMA 2012: Principles and Practice of Multi-Agent Systems","author":"J Pitt","year":"2012","unstructured":"Pitt, J., Schaumeier, J.: Provision and appropriation of common-pool resources without full disclosure. In: Rahwan, I., Wobcke, W., Sen, S., Sugawara, T. (eds.) PRIMA 2012. LNCS (LNAI), vol. 7455, pp. 199\u2013213. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-32729-2_14"},{"key":"32_CR82","doi-asserted-by":"crossref","unstructured":"Pitt, J., Schaumeier, J., Artikis, A.: The axiomatisation of socio-economic principles for self-organising systems. In: 2011 Fifth IEEE International Conference on Self-Adaptive and Self-Organizing Systems (SASO), pp. 138\u2013147. IEEE (2011)","DOI":"10.1109\/SASO.2011.25"},{"issue":"4","key":"32_CR83","doi-asserted-by":"publisher","first-page":"39:1","DOI":"10.1145\/2382570.2382575","volume":"7","author":"J Pitt","year":"2012","unstructured":"Pitt, J., Schaumeier, J., Artikis, A.: Axiomatization of socio-economic principles for self-organizing institutions: concepts, experiments and challenges. ACM Trans. Auton. Adapt. Syst. 7(4), 39:1\u201339:39 (2012). https:\/\/doi.org\/10.1145\/2382570.2382575. http:\/\/doi.acm.org\/10.1145\/2382570.2382575","journal-title":"ACM Trans. Auton. Adapt. Syst."},{"key":"32_CR84","doi-asserted-by":"crossref","unstructured":"Pitt, J., Schaumeier, J., Busquets, D., Macbeth, S.: Self-organising common-pool resource allocation and canons of distributive justice. In: 2012 IEEE Sixth International Conference on Self-Adaptive and Self-Organizing Systems (SASO), pp. 119\u2013128. IEEE (2012)","DOI":"10.1109\/SASO.2012.31"},{"key":"32_CR85","unstructured":"Pureswaran, V., Brody, P.: Device democracy: saving the future of the internet of things. IBM Corporation (2015)"},{"key":"32_CR86","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/j.adhoc.2016.11.001","volume":"55","author":"T Qiu","year":"2017","unstructured":"Qiu, T., Chen, N., Li, K., Qiao, D., Fu, Z.: Heterogeneous ad hoc networks: architectures, advances and challenges. Ad Hoc Netw. 55, 143\u2013152 (2017)","journal-title":"Ad Hoc Netw."},{"key":"32_CR87","doi-asserted-by":"publisher","DOI":"10.1002\/9781119954224","volume-title":"Self-Organizing Networks (SON): Self-Planning, Self-Optimization and Self-Healing for GSM","author":"J Ramiro","year":"2011","unstructured":"Ramiro, J., Hamied, K.: Self-Organizing Networks (SON): Self-Planning, Self-Optimization and Self-Healing for GSM. UMTS and LTE. Wiley, Hoboken (2011)"},{"issue":"6","key":"32_CR88","doi-asserted-by":"publisher","first-page":"1079","DOI":"10.1109\/TNET.2004.838600","volume":"12","author":"P Ranjan","year":"2004","unstructured":"Ranjan, P., Abed, E.H., La, R.J.: Nonlinear instabilities in TCP-RED. IEEE\/ACM Trans. Netw. 12(6), 1079\u20131092 (2004)","journal-title":"IEEE\/ACM Trans. Netw."},{"issue":"2","key":"32_CR89","doi-asserted-by":"publisher","first-page":"2082496","DOI":"10.1155\/2016\/2082496","volume":"12","author":"DG Reina","year":"2016","unstructured":"Reina, D.G., Ruiz, P., Ciobanu, R., Toral, S., Dorronsoro, B., Dobre, C.: A survey on the application of evolutionary algorithms for mobile multihop ad hoc network optimization problems. Int. J. Distrib. Sens. Netw. 12(2), 2082496 (2016)","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"32_CR90","volume-title":"Computer Networks and Systems: Queueing Theory and Performance Evaluation","author":"TG Robertazzi","year":"2012","unstructured":"Robertazzi, T.G.: Computer Networks and Systems: Queueing Theory and Performance Evaluation. Springer, New York (2012)"},{"key":"32_CR91","doi-asserted-by":"crossref","unstructured":"Roh, B., Han, M.H., Hoh, M., Park, H.S., Kim, K., Roh, B.H.: Distributed call admission control for DESYNC-TDMA in mobile ad hoc networks. In: Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS), pp. 411\u2013413. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering) (2016)","DOI":"10.4108\/eai.3-12-2015.2262443"},{"issue":"12","key":"32_CR92","doi-asserted-by":"publisher","first-page":"1184","DOI":"10.1002\/ett.2679","volume":"25","author":"S Saleh","year":"2014","unstructured":"Saleh, S., Ahmed, M., Ali, B.M., Rasid, M.F.A., Ismail, A.: A survey on energy awareness mechanisms in routing protocols for wireless sensor networks using optimization methods. Trans. Emerg. Telecommun. Technol. 25(12), 1184\u20131207 (2014)","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"32_CR93","doi-asserted-by":"crossref","unstructured":"San-Um, W., Ketthong, P., Noymanee, J.: A deterministic node mobility model for mobile ad hoc wireless network using signum-based discrete-time chaotic map. In: 2015 International Telecommunication Networks and Applications Conference (ITNAC), pp. 114\u2013119. IEEE (2015)","DOI":"10.1109\/ATNAC.2015.7366798"},{"issue":"3","key":"32_CR94","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1109\/MSP.2012.2231991","volume":"30","author":"AH Sayed","year":"2013","unstructured":"Sayed, A.H., Tu, S.Y., Chen, J., Zhao, X., Towfic, Z.J.: Diffusion strategies for adaptation and learning over networks: an examination of distributed strategies and network behavior. IEEE Signal Process. Mag. 30(3), 155\u2013171 (2013)","journal-title":"IEEE Signal Process. Mag."},{"key":"32_CR95","unstructured":"Shalizi, C.R., et al.: Causal architecture, complexity and self-organization in the time series and cellular automata. Ph.D. thesis, University of Wisconsin-Madison (2001)"},{"issue":"1","key":"32_CR96","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/SURV.2013.050113.00015","volume":"16","author":"H Shi","year":"2014","unstructured":"Shi, H., Prasad, R.V., Onur, E., Niemegeers, I.: Fairness in wireless networks: issues, measures and challenges. IEEE Commun. Surv. Tutor. 16(1), 5\u201324 (2014)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"1","key":"32_CR97","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1109\/4235.585894","volume":"1","author":"M Sipper","year":"1997","unstructured":"Sipper, M., Sanchez, E., Mange, D., Tomassini, M., P\u00e9rez-Uribe, A., Stauffer, A.: A phylogenetic, ontogenetic, and epigenetic view of bio-inspired hardware systems. IEEE Trans. Evol. Comput. 1(1), 83\u201397 (1997)","journal-title":"IEEE Trans. Evol. Comput."},{"key":"32_CR98","volume-title":"Docker Orchestration","author":"R Smith","year":"2017","unstructured":"Smith, R.: Docker Orchestration. Packt Publishing Ltd., Birmingham (2017)"},{"key":"32_CR99","volume-title":"Theories of Democratic Network Governance","author":"E S\u00f8rensen","year":"2016","unstructured":"S\u00f8rensen, E., Torfing, J.: Theories of Democratic Network Governance. Springer, Heidelberg (2016)"},{"key":"32_CR100","series-title":"Lecture Notes on Data Engineering and Communications Technologies","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1007\/978-3-319-65521-5_70","volume-title":"Advances in Network-Based Information Systems","author":"K Sugihara","year":"2018","unstructured":"Sugihara, K., Hayashibara, N.: Collecting data in sensor networks using homesick L\u00e9vy Walk. In: Barolli, L., Enokido, T., Takizawa, M. (eds.) NBiS 2017. LNDECT, vol. 7, pp. 779\u2013786. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-65521-5_70"},{"issue":"2","key":"32_CR101","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1007\/s11276-016-1336-6","volume":"24","author":"R Sugumar","year":"2018","unstructured":"Sugumar, R., Rengarajan, A., Jayakumar, C.: Trust based authentication technique for cluster based vehicular ad hoc networks (VANET). Wireless Netw. 24(2), 373\u2013382 (2018). https:\/\/doi.org\/10.1007\/s11276-016-1336-6","journal-title":"Wireless Netw."},{"key":"32_CR102","volume-title":"Distributed Systems: Principles and Paradigms","author":"AS Tanenbaum","year":"2007","unstructured":"Tanenbaum, A.S., Van Steen, M.: Distributed Systems: Principles and Paradigms. Prentice-Hall, Upper Saddle River (2007)"},{"issue":"2","key":"32_CR103","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/263876.263879","volume":"27","author":"MS Taqqu","year":"1997","unstructured":"Taqqu, M.S., Willinger, W., Sherman, R.: Proof of a fundamental result in self-similar traffic modeling. ACM SIGCOMM Comput. Commun. Rev. 27(2), 5\u201323 (1997)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"32_CR104","series-title":"Lecture Notes in Electrical Engineering","doi-asserted-by":"publisher","first-page":"707","DOI":"10.1007\/978-3-319-24584-3_60","volume-title":"Advanced Computer and Communication Engineering Technology","author":"S Tiwari","year":"2016","unstructured":"Tiwari, S., Mishra, K.K., Saxena, N., Singh, N., Misra, A.K.: Artificial immune system based MAC layer misbehavior detection in MANET. In: Sulaiman, H.A., Othman, M.A., Othman, M.F.I., Rahim, Y.A., Pee, N.C. (eds.) Advanced Computer and Communication Engineering Technology. LNEE, vol. 362, pp. 707\u2013722. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-24584-3_60"},{"key":"32_CR105","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1007\/978-3-540-27835-1_23","volume-title":"Biologically Inspired Approaches to Advanced Information Technology","author":"T Tsuchiya","year":"2004","unstructured":"Tsuchiya, T., Kikuno, T.: An adaptive mechanism for epidemic communication. In: Ijspeert, A.J., Murata, M., Wakamiya, N. (eds.) BioADIT 2004. LNCS, vol. 3141, pp. 306\u2013316. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-27835-1_23"},{"issue":"3","key":"32_CR106","doi-asserted-by":"publisher","first-page":"1689","DOI":"10.1007\/s11071-017-3543-9","volume":"89","author":"B Vaseghi","year":"2017","unstructured":"Vaseghi, B., Pourmina, M.A., Mobayen, S.: Secure communication in wireless sensor networks based on chaos synchronization using adaptive sliding mode control. Nonlinear Dyn. 89(3), 1689\u20131704 (2017)","journal-title":"Nonlinear Dyn."},{"issue":"10","key":"32_CR107","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1145\/3106625","volume":"60","author":"A Videla","year":"2017","unstructured":"Videla, A.: Metaphors we compute by. Commun. ACM 60(10), 42\u201345 (2017)","journal-title":"Commun. ACM"},{"key":"32_CR108","volume-title":"Complexity: The Emerging Science at the Edge of Order and Chaos","author":"MM Waldrop","year":"1993","unstructured":"Waldrop, M.M.: Complexity: The Emerging Science at the Edge of Order and Chaos. Simon and Schuster, New York (1993)"},{"key":"32_CR109","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1016\/j.pmcj.2013.06.004","volume":"13","author":"B Wang","year":"2014","unstructured":"Wang, B., Chen, X., Chang, W.: A light-weight trust-based QoS routing algorithm for ad hoc networks. Pervasive Mob. Comput. 13, 164\u2013180 (2014)","journal-title":"Pervasive Mob. Comput."},{"key":"32_CR110","doi-asserted-by":"crossref","unstructured":"Wang, S., Chen, Y., Tian, H.: An intrusion detection algorithm based on chaos theory for selecting the detection window size. In: 2016 8th IEEE International Conference on Communication Software and Networks (ICCSN), pp. 556\u2013560. IEEE (2016)","DOI":"10.1109\/ICCSN.2016.7586584"},{"issue":"2","key":"32_CR111","doi-asserted-by":"publisher","first-page":"942","DOI":"10.1109\/SURV.2013.100913.00195","volume":"16","author":"Y Wang","year":"2014","unstructured":"Wang, Y., Wen, S., Xiang, Y., Zhou, W.: Modeling the propagation of worms in networks: a survey. IEEE Commun. Surv. Tutor. 16(2), 942\u2013960 (2014)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"3","key":"32_CR112","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/s12599-015-0383-3","volume":"57","author":"F Wortmann","year":"2015","unstructured":"Wortmann, F., Fl\u00fcchter, K.: Internet of things. Bus. Inf. Syst. Eng. 57(3), 221\u2013224 (2015)","journal-title":"Bus. Inf. Syst. Eng."},{"key":"32_CR113","doi-asserted-by":"crossref","unstructured":"Yang, K.: Wireless Sensor Networks. Principles, Design and Applications (2014)","DOI":"10.1007\/978-1-4471-5505-8"},{"issue":"16","key":"32_CR114","doi-asserted-by":"crossref","first-page":"8705","DOI":"10.1016\/j.amc.2013.02.031","volume":"219","author":"LX Yang","year":"2013","unstructured":"Yang, L.X., Yang, X., Liu, J., Zhu, Q., Gan, C.: Epidemics of computer viruses: a complex-network approach. Appl. Math. Comput. 219(16), 8705\u20138717 (2013)","journal-title":"Appl. Math. Comput."},{"key":"32_CR115","doi-asserted-by":"crossref","unstructured":"Yang, X., Mishra, B.K., Liu, Y.: Computer virus: theory, model, and methods. Discrete Dyn. Nat. Soc. 2012 (2012)","DOI":"10.1155\/2012\/473508"},{"key":"32_CR116","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.adhoc.2017.09.001","volume":"68","author":"E Yanmaz","year":"2018","unstructured":"Yanmaz, E., Yahyanejad, S., Rinner, B., Hellwagner, H., Bettstetter, C.: Drone networks: communications, coordination, and sensing. Ad Hoc Netw. 68, 1\u201315 (2018)","journal-title":"Ad Hoc Netw."},{"key":"32_CR117","unstructured":"Yu, C., Zhang, M., Ren, F., Luo, X.: Emergence of social norms through collective learning in networked agent societies. In: Proceedings of the 2013 International Conference on Autonomous Agents and Multi-Agent Systems, pp. 475\u2013482. International Foundation for Autonomous Agents and Multiagent Systems (2013)"},{"issue":"10","key":"32_CR118","doi-asserted-by":"publisher","first-page":"2515","DOI":"10.1016\/j.automatica.2014.08.033","volume":"50","author":"F Zhang","year":"2014","unstructured":"Zhang, F., Trentelman, H.L., Scherpen, J.M.: Fully distributed robust synchronization of networked lur\u2019e systems with incremental nonlinearities. Automatica 50(10), 2515\u20132526 (2014)","journal-title":"Automatica"},{"key":"32_CR119","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1016\/j.adhoc.2016.06.009","volume":"58","author":"X Zhang","year":"2017","unstructured":"Zhang, X., Zhang, X., Gu, C.: A micro-artificial bee colony based multicast routing in vehicular ad hoc networks. Ad Hoc Netw. 58, 213\u2013221 (2017)","journal-title":"Ad Hoc Netw."},{"key":"32_CR120","doi-asserted-by":"publisher","DOI":"10.1201\/EBK1420077759","volume-title":"Cognitive Radio Networks: Architectures, Protocols, and Standards","author":"Y Zhang","year":"2016","unstructured":"Zhang, Y., Zheng, J., Chen, H.H.: Cognitive Radio Networks: Architectures, Protocols, and Standards. CRC Press, Boca Raton (2016)"},{"issue":"7","key":"32_CR121","first-page":"1","volume":"56","author":"Z Zhang","year":"2013","unstructured":"Zhang, Z., Huangfu, W., Long, K., Zhang, X., Liu, X., Zhong, B.: On the designing principles and optimization approaches of bio-inspired self-organized network: a survey. Sci. China Inf. Sci. 56(7), 1\u201328 (2013)","journal-title":"Sci. China Inf. Sci."},{"issue":"2","key":"32_CR122","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MWC.2013.6507392","volume":"20","author":"Z Zhang","year":"2013","unstructured":"Zhang, Z., Long, K., Wang, J.: Self-organization paradigms and optimization approaches for cognitive radio technologies: a survey. IEEE Wirel. Commun. 20(2), 36\u201342 (2013)","journal-title":"IEEE Wirel. Commun."},{"issue":"1","key":"32_CR123","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1109\/SURV.2013.062613.00014","volume":"16","author":"Z Zhang","year":"2014","unstructured":"Zhang, Z., Long, K., Wang, J., Dressler, F.: On swarm intelligence inspired self-organized networking: its bionic mechanisms, designing principles and optimization approaches. IEEE Commun. Surv. Tutor. 16(1), 513\u2013537 (2014)","journal-title":"IEEE Commun. Surv. Tutor."}],"container-title":["Lecture Notes in Computer Science","Machine Learning for Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-45778-5_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,3]],"date-time":"2024-03-03T01:06:43Z","timestamp":1709428003000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-45778-5_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030457778","9783030457785"],"references-count":123,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-45778-5_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"20 April 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MLN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Machine Learning for Networking","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Paris","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mln2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.adda-association.org\/mln\/Home.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"75","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}