{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T23:10:03Z","timestamp":1745968203173,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642370144"},{"type":"electronic","value":"9783642370151"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-37015-1_65","type":"book-chapter","created":{"date-parts":[[2013,3,5]],"date-time":"2013-03-05T04:34:18Z","timestamp":1362458058000},"page":"743-756","source":"Crossref","is-referenced-by-count":3,"title":["The Effect of Critical Transmission Range in Epidemic Data Propagation for Mobile Ad-hoc Social Network"],"prefix":"10.1007","author":[{"given":"Hong","family":"Yao","sequence":"first","affiliation":[]},{"given":"Huawei","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Qingzhong","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Chengyu","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Xuesong","family":"Yan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"65_CR1","doi-asserted-by":"crossref","unstructured":"Daly, E.M., Haahr, M.: Social network analysis for routing in disconnected delay-tolerant MANETs. In: MobiHoc, pp. 32\u201340 (2007)","DOI":"10.1145\/1288107.1288113"},{"key":"65_CR2","doi-asserted-by":"crossref","unstructured":"Zeng, D.Z., Cong, L., Huang, H., Guo, S., Yao, H.: Deadline Constrained Content Distribu-tion in Vehicular Delay Tolerant Networks. In: IEEE International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 994\u2013999 (2012)","DOI":"10.1109\/IWCMC.2012.6314341"},{"key":"65_CR3","doi-asserted-by":"crossref","unstructured":"Zeng, D.Z., Guo, S., Jin, H., Leung, V.C.: Dynamic Segmented Network Coding for Reliable Data Dissemination in Delay Tolerant Networks. In: IEEE International Communications Conference (ICC), pp. 1\u20135 (2012)","DOI":"10.1109\/ICC.2012.6364530"},{"key":"65_CR4","doi-asserted-by":"crossref","unstructured":"Zeng, D.Z., Guo, S., Jin, H., Leung, V.C.: Segmented Network Coding for Stream-like Applications in Delay Tolerant Networks. In: IEEE GLOBECOM, pp. 1\u20135 (2011)","DOI":"10.1109\/ICC.2012.6364530"},{"key":"65_CR5","unstructured":"Stauffer, D., Aharony, A.: Introduction To Percolation Theory, 2nd edn. CRC Press (1994)"},{"key":"65_CR6","doi-asserted-by":"crossref","unstructured":"Williams, B., Camp, T.: Comparison of broadcasting techniques for mobile ad hoc networks. In: MobiHoc, pp. 194\u2013205 (2002)","DOI":"10.1145\/513824.513825"},{"key":"65_CR7","doi-asserted-by":"crossref","unstructured":"Tonguz, O.K., Wisitpongphan, N., Parikh, J.S., Bai, F., Mudalige, P., Sadekar, V.K.: On the Broadcast Storm Problem in Ad hoc Wireless Networks. In: BROADNETS, pp. 1\u201311 (2006)","DOI":"10.1109\/BROADNETS.2006.4374403"},{"key":"65_CR8","unstructured":"Vahdat, A., Becker, D.: Epidemic routing for partially connected ad hoc networks. In: Technical Report CS-200006, Duke University (2000)"},{"key":"65_CR9","doi-asserted-by":"crossref","unstructured":"Zhang, X., Neglia, G., Kurose, J.F., Towsley, D.F.: Performance modeling of epidemic routing. Computer Networks, 2867\u20132891 (2007)","DOI":"10.1016\/j.comnet.2006.11.028"},{"key":"65_CR10","doi-asserted-by":"crossref","unstructured":"Abdulla, M., Simon, R.: Controlled Epidemic Routing for Multicasting in Delay Tolerant Networks. In: IEEE International Symposium on Modeling, Analysis and Simulation of Computers and Telecommunication Systems (MASCOTS), pp. 1\u201310 (2008)","DOI":"10.1109\/MASCOT.2008.4770551"},{"key":"65_CR11","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Mao, G., Anderson, B.D.O.: On the Information Propagation in Mobile Ad-Hoc Networks Using Epidemic Routing. In: GLOBECOM, pp. 1\u20136 (2011)","DOI":"10.1109\/GLOCOM.2011.6133784"},{"key":"65_CR12","doi-asserted-by":"crossref","unstructured":"Khouzani, M., Eshghi, S., Sarkar, S., Shroff, N., Venkatesh, S.: Potimal energy-aware epi-demic routing in DTNs. In: 13th ACM International Symposium on Mobile Ad Hoc Networking and Computing (Mobihoc), pp. 175\u2013182 (2012)","DOI":"10.1145\/2248371.2248397"},{"key":"65_CR13","doi-asserted-by":"crossref","unstructured":"Lin, Y., Li, B., Liang, B.: Stochastic analysis of network coding in epidemic routing. IEEE Journal on Selected Areas in Communications, 794\u2013808 (2008)","DOI":"10.1109\/JSAC.2008.080606"},{"key":"65_CR14","doi-asserted-by":"crossref","unstructured":"Camp, T., Boleng, J., Davies, V.: A survey of mobility models for ad hoc network research. Wireless Communications and Mobile Computing, 483\u2013502 (2002)","DOI":"10.1002\/wcm.72"},{"key":"65_CR15","doi-asserted-by":"crossref","unstructured":"Wang, Q., Wang, X., Lin, X.: Mobility increases the connectivity of K-hop clustered wireless networks. In: MOBICOM, pp. 121\u2013132 (2009)","DOI":"10.1145\/1614320.1614334"},{"key":"65_CR16","doi-asserted-by":"crossref","unstructured":"Keung, G.Y., Li, B., Zhang, Q., Yang, H.: The Target Tracking in Mobile Sensor Networks. In: GLOBECOM, pp. 1\u20135 (2011)","DOI":"10.1109\/GLOCOM.2011.6134188"},{"key":"65_CR17","doi-asserted-by":"crossref","unstructured":"Islam, M.T., Akon, M.M., Abdrabou, A.L., Shen, X.: Modeling Epidemic Data Diffusion for Wireless Mobile Networks. In: GLOBECOM, pp. 1\u20135 (2011)","DOI":"10.1109\/GLOCOM.2011.6134272"},{"key":"65_CR18","doi-asserted-by":"crossref","unstructured":"Groenevelt, R., Nain, P., Koole, G.: The message delay in mobile ad hoc networks. In: Perform. Eval., pp. 210\u2013228 (2005)","DOI":"10.1016\/j.peva.2005.07.018"},{"key":"65_CR19","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Mao, G., Anderson, B.D.O.: On information dissemination in infrastructure-based mobile ad-hoc networks. In: IEEE Wireless Communications and Networking Conference (WCNC), pp. 1743\u20131748 (2012)","DOI":"10.1109\/WCNC.2012.6214066"}],"container-title":["Lecture Notes in Computer Science","Pervasive Computing and the Networked World"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-37015-1_65","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T22:56:49Z","timestamp":1745967409000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-37015-1_65"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642370144","9783642370151"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-37015-1_65","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}