{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T16:43:12Z","timestamp":1743007392218,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319115689"},{"type":"electronic","value":"9783319115696"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11569-6_44","type":"book-chapter","created":{"date-parts":[[2014,9,27]],"date-time":"2014-09-27T05:00:33Z","timestamp":1411794033000},"page":"564-575","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Elastic Ring Search for Ad Hoc Networks"],"prefix":"10.1007","author":[{"given":"Simon","family":"Shamoun","sequence":"first","affiliation":[]},{"given":"David","family":"Sarne","sequence":"additional","affiliation":[]},{"given":"Steven","family":"Goldfeder","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,9,28]]},"reference":[{"issue":"3","key":"44_CR1","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/j.orl.2003.08.007","volume":"32","author":"YM Baryshnikov","year":"2004","unstructured":"Baryshnikov, Y.M., Coffman Jr, E.G., Jelenkovic, P.R., Momcilovic, P., Rubenstein, D.: Flood search under the california split rule. Oper. Res. Lett. 32(3), 199\u2013206 (2004)","journal-title":"Oper. Res. Lett."},{"issue":"5","key":"44_CR2","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1023\/B:WINE.0000036458.88990.e5","volume":"10","author":"C Bettstetter","year":"2004","unstructured":"Bettstetter, C., Hartenstein, H., Costa, X.P.: Stochastic properties of the random waypoint mobility model. Wireless Netw. 10(5), 555\u2013567 (2004)","journal-title":"Wireless Netw."},{"issue":"3","key":"44_CR3","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1109\/TMC.2003.1233531","volume":"2","author":"C Bettstetter","year":"2003","unstructured":"Bettstetter, C., Resta, G., Santi, P.: The node distribution of the random waypoint mobility model for wireless ad hoc networks. IEEE Trans. Mob. Comput. 2(3), 257\u2013269 (2003)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"44_CR4","doi-asserted-by":"crossref","unstructured":"Chang, N.B., Liu, M.: Revisiting the TTL-based controlled flooding search: optimality and randomization. In: Haas, Z.J., Das, S.R., Jain, R. (eds.) Proceedings of the 10th Annual International Conference on Mobile Computing and Networking (MobiCom \u201904), pp. 85\u201399. ACM, New York (2004)","DOI":"10.1145\/1023720.1023730"},{"issue":"2","key":"44_CR5","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1109\/TNET.2007.892880","volume":"15","author":"NB Chang","year":"2007","unstructured":"Chang, N.B., Liu, M.: Controlled flooding search in a large network. IEEE\/ACM Trans. Netw. 15(2), 436\u2013449 (2007)","journal-title":"IEEE\/ACM Trans. Netw."},{"issue":"4","key":"44_CR6","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1016\/j.adhoc.2006.01.002","volume":"5","author":"Z Cheng","year":"2007","unstructured":"Cheng, Z., Heinzelman, W.B.: Searching strategies for target discovery in wireless networks. Ad Hoc Netw. 5(4), 413\u2013428 (2007)","journal-title":"Ad Hoc Netw."},{"issue":"7","key":"44_CR7","doi-asserted-by":"publisher","first-page":"1168","DOI":"10.1016\/j.adhoc.2007.11.003","volume":"6","author":"J Deng","year":"2008","unstructured":"Deng, J., Zuyev, S.A.: On search sets of expanding ring search in wireless networks. Ad Hoc Netw. 6(7), 1168\u20131181 (2008)","journal-title":"Ad Hoc Netw."},{"key":"44_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1007\/978-3-540-30536-1_53","volume-title":"Distributed Computing - IWDC 2004","author":"J Hassan","year":"2004","unstructured":"Hassan, J., Jha, S.K.: On the optimization trade-offs of expanding ring search. In: Sen, A., Das, N., Das, S.K., Sinha, B.P. (eds.) IWDC 2004. LNCS, vol. 3326, pp. 489\u2013494. Springer, Heidelberg (2004)"},{"issue":"2","key":"44_CR9","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1002\/nem.463","volume":"13","author":"S-J Lee","year":"2003","unstructured":"Lee, S.-J., Belding-Royer, E.M., Perkins, C.E.: Scalability study of the ad hoc on-demand distance vector routing protocol. Int. J. Netw. Manag. 13(2), 97\u2013114 (2003)","journal-title":"Int. J. Netw. Manag."},{"key":"44_CR10","unstructured":"Mukherjee, S., Avidor, D.: On the probability distribution of the minimal number of hops between any pair of nodes in a bounded wireless ad-hoc network subject to fading. In: IWWAN (2005)"},{"key":"44_CR11","doi-asserted-by":"crossref","unstructured":"Park, I., Pu, I.: Energy efficient expanding ring search. In: Asia International Conference on Modelling and Simulation, pp. 198\u2013199. IEEE Computer Society (2007)","DOI":"10.1109\/AMS.2007.35"},{"key":"44_CR12","doi-asserted-by":"crossref","unstructured":"Pu, I., Shen, Y.: Enhanced blocking expanding ring search in mobile ad hoc networks. In: 2009 3rd International Conference on New Technologies, Mobility and Security (NTMS), 20\u201323 December 2009. pp. 1\u20135 (2009)","DOI":"10.1109\/NTMS.2009.5384676"},{"key":"44_CR13","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1007\/s11786-010-0038-1","volume":"3","author":"I Pu","year":"2010","unstructured":"Pu, I., Shen, Y.: Analytical studies of energy-time efficiency of blocking expanding ring search. Math. Comput. Sci. 3, 443\u2013456 (2010)","journal-title":"Math. Comput. Sci."},{"key":"44_CR14","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/98.760423","volume":"6","author":"EM Royer","year":"1999","unstructured":"Royer, E.M., Toh, C.-K.: A review of current routing protocols for ad hoc mobile wireless networks. IEEE Pers. Commun. 6, 46\u201355 (1999)","journal-title":"IEEE Pers. Commun."},{"key":"44_CR15","doi-asserted-by":"crossref","unstructured":"Yoon, J., Liu, M., Noble, B.: Sound mobility models. In: Proceedings of the 9th Annual International Conference on Mobile computing and networking (MOBICOM \u201903), pp. 205\u2013216. ACM, New York (2003)","DOI":"10.1145\/938985.939007"},{"key":"44_CR16","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/j.entcs.2011.09.010","volume":"275","author":"O Younes","year":"2011","unstructured":"Younes, O., Thomas, N.: Analysis of the expected number of hops in mobile ad hoc networks with random waypoint mobility. Electr. Notes Theor. Comput. Sci. 275, 143\u2013158 (2011)","journal-title":"Electr. Notes Theor. Comput. Sci."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Mobile and Ubiquitous Systems: Computing, Networking, and Services"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11569-6_44","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T11:55:10Z","timestamp":1676894110000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-11569-6_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319115689","9783319115696"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11569-6_44","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"28 September 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}