{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T02:10:08Z","timestamp":1750471808112,"version":"3.41.0"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319615653"},{"type":"electronic","value":"9783319615660"}],"license":[{"start":{"date-parts":[[2017,7,5]],"date-time":"2017-07-05T00:00:00Z","timestamp":1499212800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-61566-0_64","type":"book-chapter","created":{"date-parts":[[2017,7,4]],"date-time":"2017-07-04T02:36:53Z","timestamp":1499135813000},"page":"689-698","source":"Crossref","is-referenced-by-count":0,"title":["A Hot Area Mobility Model for Ad Hoc Networks Based on Mining Real Traces of Human"],"prefix":"10.1007","author":[{"given":"Lingyun","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Fan","family":"He","sequence":"additional","affiliation":[]},{"given":"Zhiqiang","family":"Zou","sequence":"additional","affiliation":[]},{"given":"Zhengyuan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Lijuan","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,5]]},"reference":[{"issue":"5","key":"64_CR1","first-page":"32","volume":"35","author":"LY Jiang","year":"2015","unstructured":"Jiang, L.Y., Feng, Y., Sun, L.J.: Impact analysis of movement model on opportunistic network routing protocols. J. Nanjing Univ. Posts Telecommun. (Nat. Sci. Ed.) 35(5), 32\u201340 (2015)","journal-title":"J. Nanjing Univ. Posts Telecommun. (Nat. Sci. Ed.)"},{"issue":"5","key":"64_CR2","doi-asserted-by":"crossref","first-page":"483","DOI":"10.1002\/wcm.72","volume":"2","author":"T Camp","year":"2002","unstructured":"Camp, T., Boleng, J., Davies, V.: A survey of mobility models for ad hoc network research. Wirel. Commun. Mob. Comput. 2(5), 483\u2013502 (2002)","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"64_CR3","first-page":"2","volume-title":"Investigations on the theory of the Brownian Movement","author":"A Einstein","year":"1926","unstructured":"Einstein, A.: Investigations on the theory of the Brownian Movement, pp. 2\u201318. Dover Publications, New York (1926)"},{"key":"64_CR4","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1007\/978-0-585-29603-6_5","volume":"353","author":"DB Johnson","year":"1996","unstructured":"Johnson, D.B., Maltz, D.A.: Dynamic source routing in ad hoc wireless networks. Mob. Comput. 353, 153\u2013181 (1996)","journal-title":"Mob. Comput."},{"key":"64_CR5","doi-asserted-by":"crossref","unstructured":"Royer, E.M., Melliarsmith, P.M., Moser, L.E.: An analysis of the optimum node density for ad hoc mobile networks. In: IEEE International Conference on Communications, pp. 857\u2013861. IEEE (2001)","DOI":"10.1109\/ICC.2001.937360"},{"key":"64_CR6","doi-asserted-by":"crossref","unstructured":"Liang, B., Haas, Z.J.: Predictive distance-based mobility management for PCS networks. In: Eighteenth Joint Conference of the IEEE Computer and Communications Societies, INFOCOM 1999, Proceedings, vol. 3, pp. 1377\u20131384. IEEE (1999)","DOI":"10.1109\/INFCOM.1999.752157"},{"key":"64_CR7","doi-asserted-by":"crossref","unstructured":"Yoon, J., Liu, M., Noble, B.: Random waypoint considered harmful. In: Joint Conference of the IEEE Computer and Communications. IEEE Societies, vol. 2, pp. 1312\u20131321 (2003)","DOI":"10.1109\/INFCOM.2003.1208967"},{"key":"64_CR8","doi-asserted-by":"crossref","unstructured":"Hong, X., Gerla, M., Pei, G., Chiang, C.C.: A group mobility model for ad hoc wireless networks. In: ACM International Workshop on Modeling, pp. 53\u201360 (1970)","DOI":"10.1145\/313237.313248"},{"issue":"5","key":"64_CR9","doi-asserted-by":"crossref","first-page":"573","DOI":"10.1016\/S0167-739X(00)00040-6","volume":"17","author":"M Nchez","year":"2001","unstructured":"Nchez, M., Manzoni, P.: ANEJOS: a java based simulator for ad hoc networks. Future Gener. Comput. Syst. 17(5), 573\u2013583 (2001)","journal-title":"Future Gener. Comput. Syst."},{"key":"64_CR10","doi-asserted-by":"crossref","unstructured":"Ekman, F., Ker\u00e4nen, A., Karvo, J., Ott, J.: Working day movement model. In: ACM Sigmobile Workshop on Mobility Models, Mobilitymodels, DBLP 2008, pp. 33\u201340 Hong Kong, China, May 2008","DOI":"10.1145\/1374688.1374695"},{"issue":"3","key":"64_CR11","doi-asserted-by":"crossref","first-page":"630","DOI":"10.1109\/TNET.2011.2120618","volume":"19","author":"I Rhee","year":"2011","unstructured":"Rhee, I., Shin, M., Hong, S., Lee, K.: On the levy-walk nature of human mobility. IEEE\/ACM Trans. Netw. 19(3), 630\u2013643 (2011)","journal-title":"IEEE\/ACM Trans. Netw."},{"issue":"4","key":"64_CR12","doi-asserted-by":"crossref","first-page":"322","DOI":"10.12720\/jcm.9.4.322-331","volume":"9","author":"A Munjal","year":"2014","unstructured":"Munjal, A., Navidi, W.C., Camp, T.: Steady-state of the slaw mobility model. J. Commun. 9(4), 322\u2013331 (2014)","journal-title":"J. Commun."},{"issue":"2","key":"64_CR13","doi-asserted-by":"crossref","first-page":"1","DOI":"10.2200\/S00630ED1V01Y201502DMK011","volume":"7","author":"H Gao","year":"2015","unstructured":"Gao, H., Liu, H.: Mining human mobility in location-based social networks. Synth. Lect. Data Mining Knowl. Discov. 7(2), 1\u2013115 (2015)","journal-title":"Synth. Lect. Data Mining Knowl. Discov."},{"key":"64_CR14","unstructured":"Gowalla. http:\/\/snap.stanford.edu\/data\/loc-gowalla.html"},{"key":"64_CR15","unstructured":"Brightkite. http:\/\/snap.stanford.edu\/data\/loc-brightkite.html"},{"key":"64_CR16","doi-asserted-by":"crossref","unstructured":"Ker\u00e4nen, A., Ott, J., K\u00e4rkk\u00e4inen, T.: The ONE simulator for DTN protocol evaluation. In: International Conference on Simulation TOOLS and Techniques (p. 55). ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering) (2009)","DOI":"10.4108\/ICST.SIMUTOOLS2009.5674"},{"key":"64_CR17","doi-asserted-by":"crossref","unstructured":"Karagiannis, T., Boudec, J.Y.L., Vojnovi\u0107, M.: Power law and exponential decay of inter contact times between mobile devices. In: ACM International Conference on Mobile Computing and Networking, vol. 9, pp. 183\u2013194. ACM (2007)","DOI":"10.1145\/1287853.1287875"},{"issue":"2","key":"64_CR18","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1504\/IJSSC.2012.047465","volume":"2","author":"H Masahiro","year":"2012","unstructured":"Masahiro, H., Elis, K., Makoto, I., Leonard, B.: Evaluation of MANET protocols for different indoor environments: results from a real MANET testbed. Int. J. Space-Based Situated Comput. 2(2), 71\u201382 (2012)","journal-title":"Int. J. Space-Based Situated Comput."}],"container-title":["Advances in Intelligent Systems and Computing","Complex, Intelligent, and Software Intensive Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-61566-0_64","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T01:35:15Z","timestamp":1750469715000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-61566-0_64"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,5]]},"ISBN":["9783319615653","9783319615660"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-61566-0_64","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017,7,5]]}}}