{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T11:47:35Z","timestamp":1774439255462,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540748526","type":"print"},{"value":"9783540748533","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-74853-3_24","type":"book-chapter","created":{"date-parts":[[2007,9,13]],"date-time":"2007-09-13T13:10:31Z","timestamp":1189689031000},"page":"409-428","source":"Crossref","is-referenced-by-count":55,"title":["Exploiting Social Interactions in Mobile Systems"],"prefix":"10.1007","author":[{"given":"Andrew G.","family":"Miklas","sequence":"first","affiliation":[]},{"given":"Kiran K.","family":"Gollu","sequence":"additional","affiliation":[]},{"given":"Kelvin K. W.","family":"Chan","sequence":"additional","affiliation":[]},{"given":"Stefan","family":"Saroiu","sequence":"additional","affiliation":[]},{"given":"Krishna P.","family":"Gummadi","sequence":"additional","affiliation":[]},{"given":"Eyal","family":"de Lara","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"24_CR1","doi-asserted-by":"crossref","unstructured":"Adar, E., Huberman, B.: Free riding on Gnutella. First Monday\u00a05(10) (October 2000)","DOI":"10.5210\/fm.v5i10.792"},{"issue":"1","key":"24_CR2","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1103\/RevModPhys.74.47","volume":"74","author":"R. Albert","year":"2002","unstructured":"Albert, R., Barabasi, A.-L.: Statistical mechanics of complex networks. Reviews of Modern Physics\u00a074(1), 47\u201397 (2002)","journal-title":"Reviews of Modern Physics"},{"issue":"5439","key":"24_CR3","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1126\/science.286.5439.509","volume":"286","author":"A.-L. Barabasi","year":"1999","unstructured":"Barabasi, A.-L., Albert, R.: Emergence of scaling in random networks. Science\u00a0286(5439), 509\u2013512 (1999)","journal-title":"Science"},{"key":"24_CR4","unstructured":"CNET News.com. Mobile browsing becomes mainstream\u00a0 (2006), http:\/\/news.com.com\/Mobile+browsing+becoming+mainstream\/2100-1039_3-6062365.html"},{"key":"24_CR5","unstructured":"Cole, R.G.: Initial Studies on Worm Propagation in MANETS for Future Army Combat Systems (2004), http:\/\/stinet.dtic.mil\/"},{"key":"24_CR6","doi-asserted-by":"crossref","unstructured":"Cole, R.G., Phamdo, N., Rajab, M.A., Terzis, A.: Requirements of Worm Mitigation Technologies in MANETS. In: Principles of Advanced and Distribution Simulation (2005)","DOI":"10.1109\/PADS.2005.21"},{"key":"24_CR7","unstructured":"ComputerWorld. Cabir Worm Wriggles into U.S. Mobile Phones (2005), http:\/\/www.computerworld.com\/securitytopics\/security\/virus\/story\/0,10801,99935,00.html"},{"issue":"2","key":"24_CR8","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1002\/cplx.10066","volume":"8","author":"H. Ebel","year":"2002","unstructured":"Ebel, H., Davidsen, J., Bornholdt, S.: Dynamics of social networks. Complexity\u00a08(2), 24\u201327 (2002)","journal-title":"Complexity"},{"issue":"6","key":"24_CR9","doi-asserted-by":"publisher","first-page":"1360","DOI":"10.1086\/225469","volume":"78","author":"M.S. Granovetter","year":"1973","unstructured":"Granovetter, M.S.: The strength of weak ties. The American Journal of Sociology\u00a078(6), 1360\u20131380 (1973)","journal-title":"The American Journal of Sociology"},{"key":"24_CR10","volume-title":"19th ACM Symposium on Operating Systems Principles (SOSP)","author":"K.P. Gummadi","year":"2003","unstructured":"Gummadi, K.P., Dunn, R.J., Saroiu, S., Gribble, S.D., Levy, H.M., Zahorjan, J.: Measurement, modeling, and analysis of a peer-to-peer file-sharing workload. In: 19th ACM Symposium on Operating Systems Principles (SOSP), Bolton Landing, NY, USA, October 2003, ACM Press, New York (2003)"},{"issue":"026107","key":"24_CR11","first-page":"1","volume":"65","author":"P. Holme","year":"2002","unstructured":"Holme, P., Kim, B.J.: Growing scale-free networks with tunable clustering. Physical Review E\u00a065(026107), 1\u20134 (2002)","journal-title":"Physical Review E"},{"key":"24_CR12","unstructured":"InfoSyncWorld. First Symbian OS Virus to Replicate over MMS Appears\u00a0(2005), http:\/\/www.infosyncworld.com\/news\/n\/5835.html"},{"key":"24_CR13","unstructured":"InfoWorld: More mobile Internet users than wired in Japan (July 2006), http:\/\/www.infoworld.com\/article\/06\/07\/05\/HNjapannetusers_1.html"},{"key":"24_CR14","doi-asserted-by":"crossref","unstructured":"Jain, S., Fall, K., Patra, R.: Routing in a delay tolerant network. In: Proceedings of ACM Sigcomm, Portland, OR, USA (2004)","DOI":"10.1145\/1015467.1015484"},{"issue":"046132","key":"24_CR15","first-page":"1","volume":"64","author":"E.M. Jin","year":"2001","unstructured":"Jin, E.M., Girvan, M., Newman, M.E.J.: The structure of growing social networks. Physical Review E\u00a064(046132), 1\u20138 (2001)","journal-title":"Physical Review E"},{"key":"24_CR16","doi-asserted-by":"crossref","unstructured":"Jones, E.P., Li, L., Ward, P.A.S.: Practical routing in delay-tolerant networks. In: Proc. of ACM Sigcomm Workshop on Delay-Tolerant Networking, Philadelphia, PA, USA (2005)","DOI":"10.1145\/1080139.1080141"},{"key":"24_CR17","unstructured":"JuiceCaster. Share your mobile life with juicecaster (2007), http:\/\/www.juicecaster.com"},{"key":"24_CR18","unstructured":"Kangourouge:Proxidating, the first ever Bluetooth dating software for mobile phones (2007), http:\/\/www.proxidating.com"},{"key":"24_CR19","unstructured":"Lindgren, A., Doria, A., Shelen, O.: Probabilistic routing in intermittenly connected networks. In: Proceedings of ACM Mobihoc, Annapolis, MD, USA (2003)"},{"key":"24_CR20","unstructured":"Liogkas, N., Nelson, R., Kohler, E., Zhang, L.: Exploiting bittorrent for fun (but not profit). In: Proceedings of Proceedings of 5th International Workshop on Peer-to-Peer Systems (IPTPS), Santa Barbara, CA, USA (2006)"},{"key":"24_CR21","unstructured":"Locher, T., Moor, P., Schmid, S., Wattenhofer, R.: Free riding in bittorrent is cheap. In: Proceedings of HotNets, Irvine, CA, USA (2006)"},{"key":"24_CR22","volume-title":"The Familiar Stranger: An Aspect of Urban Anonymity","author":"S. Milgram","year":"1977","unstructured":"Milgram, S.: The Familiar Stranger: An Aspect of Urban Anonymity. Addison-Wesley, Reading (1977)"},{"key":"24_CR23","unstructured":"MIT Media Lab: Reality Mining. http:\/\/reality.media.mit.edu\/"},{"key":"24_CR24","unstructured":"Moore, D., Paxson, V., Savage, S., Shannon, C., Staniford, S., Weaver, N.: The Spread of the Sapphire\/Slammer Worm. Technical Report CAIDA, ICSI, Sillicon Defense, UC Berkeley EECS and UC San Diego (January 2003)"},{"key":"24_CR25","doi-asserted-by":"crossref","unstructured":"Moore, D., Shannon, C., Brown, J.: Code-red: a case study on the spread and victims of an internet worm. In: 2002 Internet Measurement Workshop (November 2002)","DOI":"10.1145\/637201.637244"},{"key":"24_CR26","doi-asserted-by":"crossref","unstructured":"Niculescu, D., Nath, B.: Trajectory based forwarding and its applications. In: Proceedings of Mobicom, San Diego, CA, USA (2003)","DOI":"10.1145\/938985.939012"},{"key":"24_CR27","unstructured":"Piatek, M., Isdal, T., Anderson, T., Krishnamurthy, A.: Do incentives build robustness in bittorrent. In: Proceedings of 4th Usenix Symposium on Networked Systems Design and Implementation (NSDI), Cambridge, MA, USA (2007)"},{"key":"24_CR28","unstructured":"Pogo. Pogo browser (2007), http:\/\/www.pogo42030.co.za"},{"key":"24_CR29","doi-asserted-by":"crossref","unstructured":"Su, J., Chan, K.K.W., Miklas, A.G., Po, K., Akhavan, A., Saroiu, S., de Lara, E., Goel, A.: A preliminary investigation of worm infections in a bluetooth environment. In: 4th Workshop of Recurring Malcode (WORM), Fairfax, VA, USA (2006)","DOI":"10.1145\/1179542.1179545"},{"key":"24_CR30","doi-asserted-by":"crossref","unstructured":"Su, J., Goel, A., de Lara, E.: An empirical evaluation of the student-net delay tolerant network. In: 3rd International Conference on Mobile and Ubiquitous Systems: Networks and Services (MOBIQUITOUS), San Jose, CA, USA (2006)","DOI":"10.1109\/MOBIQW.2006.361735"},{"key":"24_CR31","unstructured":"Vahdat, A., Becker, D.: Epidemic routing for partially-connected ad hoc networks. Technical Report CS-200006, Department of Computer Science, Duke University (April 2000)"},{"key":"24_CR32","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1145\/1080139.1080140","volume-title":"WDTN 2005: Proceeding of the 2005 ACM SIGCOMM workshop on Delay-tolerant networking","author":"Y. Wang","year":"2005","unstructured":"Wang, Y., Jain, S., Martonosi, M., Fall, K.: Erasure-coding based routing for opportunistic networks. In: WDTN 2005: Proceeding of the 2005 ACM SIGCOMM workshop on Delay-tolerant networking, pp. 229\u2013236. ACM Press, New York (2005)"},{"issue":"6684","key":"24_CR33","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1038\/30918","volume":"393","author":"D.J. Watts","year":"1998","unstructured":"Watts, D.J., Strogatz, S.H.: Collective dynamics of \u2019small-world\u2019 networks. Nature\u00a0393(6684), 440\u2013442 (1998)","journal-title":"Nature"},{"key":"24_CR34","doi-asserted-by":"crossref","unstructured":"Yan, G., Eidenbenz, S.: Bluetooth worms: Models, dynamics, and defense implications. In: 22nd Annual Computer Security Applications Conference, Miami Beach, FL, USA (2006)","DOI":"10.1109\/ACSAC.2006.18"}],"container-title":["Lecture Notes in Computer Science","UbiComp 2007: Ubiquitous Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74853-3_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T21:48:52Z","timestamp":1556833732000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74853-3_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540748526","9783540748533"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74853-3_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007]]}}}