{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:11:47Z","timestamp":1759133507830,"version":"3.37.3"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2015,6,21]],"date-time":"2015-06-21T00:00:00Z","timestamp":1434844800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"FN:National Natural Science Fund, China","award":["GN:ID0EJWAE222"],"award-info":[{"award-number":["GN:ID0EJWAE222"]}]},{"name":"FN:National Natural Science Fund, China","award":["GN:ID0EJZAE223"],"award-info":[{"award-number":["GN:ID0EJZAE223"]}]},{"name":"FN:Guangdong Province Natural Science Foundation","award":["GN:ID0EH3AE224"],"award-info":[{"award-number":["GN:ID0EH3AE224"]}]},{"name":"FN:Guangdong University Scientific Innovation Project","award":["GN:ID0EH6AE225"],"award-info":[{"award-number":["GN:ID0EH6AE225"]}]},{"name":"FN:Guangdong University Scientific Innovation Project","award":["GN:ID0EICAG226"],"award-info":[{"award-number":["GN:ID0EICAG226"]}]},{"name":"FN:Fundamental Research Funds for the Central Universities","award":["GN:ID0EIFAG227"],"award-info":[{"award-number":["GN:ID0EIFAG227"]}]},{"DOI":"10.13039\/501100002858","name":"FN:China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["GN:ID0EIIAG228"],"award-info":[{"award-number":["GN:ID0EIIAG228"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1007\/s00500-015-1747-9","type":"journal-article","created":{"date-parts":[[2015,6,20]],"date-time":"2015-06-20T03:31:21Z","timestamp":1434771081000},"page":"4121-4130","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["SmartHO: mobility pattern recognition assisted intelligent handoff in wireless overlay networks"],"prefix":"10.1007","volume":"20","author":[{"given":"Ming","family":"Tao","sequence":"first","affiliation":[]},{"given":"Huaqiang","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Xiaoyu","family":"Hong","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,6,21]]},"reference":[{"issue":"4","key":"1747_CR1","doi-asserted-by":"crossref","first-page":"647","DOI":"10.1007\/s11277-010-0210-6","volume":"64","author":"A \u00c7alhan","year":"2012","unstructured":"\u00c7alhan A, \u00c7eken C (2012) An optimum vertical handoff decision algorithm based on adaptive fuzzy logic and genetic algorithm. Wirel Pers Commun 64(4):647\u2013664","journal-title":"Wirel Pers Commun"},{"issue":"5","key":"1747_CR2","doi-asserted-by":"crossref","first-page":"726","DOI":"10.1016\/j.comnet.2009.09.018","volume":"54","author":"C \u00c7eken","year":"2010","unstructured":"\u00c7eken C, Yarkan S, Arslan H (2010) Interference aware vertical handoff decision algorithm for quality of service support in wireless heterogeneous networks. Comput Netw 54(5):726\u2013740","journal-title":"Comput Netw"},{"issue":"4","key":"1747_CR3","doi-asserted-by":"crossref","first-page":"3734","DOI":"10.1016\/j.asoc.2011.02.003","volume":"11","author":"I Chamodrakas","year":"2011","unstructured":"Chamodrakas I, Martakos D (2011) A utility-based fuzzy topsis method for energy efficient network selection in heterogeneous wireless networks. Appl Soft Comput 11(4):3734\u20133743","journal-title":"Appl Soft Comput"},{"issue":"4","key":"1747_CR4","doi-asserted-by":"crossref","first-page":"887","DOI":"10.1007\/s10586-013-0261-z","volume":"16","author":"C Esposito","year":"2013","unstructured":"Esposito C, Ficco M, Palmieri F, Castiglione A (2013) Interconnecting federated clouds by using publish-subscribe service. Clust Comput 16(4):887\u2013903","journal-title":"Clust Comput"},{"key":"1747_CR5","doi-asserted-by":"publisher","unstructured":"Esposito C, Ficco M, Palmieri F, Castiglione A (2015) Smart cloud storage service selection based on fuzzy logic, theory of evidence and game theory. IEEE Trans Comput. doi: 10.1109\/TC.2015.2389952","DOI":"10.1109\/TC.2015.2389952"},{"issue":"4","key":"1747_CR6","doi-asserted-by":"crossref","first-page":"849","DOI":"10.1016\/j.comcom.2006.10.010","volume":"30","author":"S Haseeb","year":"2007","unstructured":"Haseeb S, Ismail AF (2007) Handoff latency analysis of mobile ipv6 protocol variations. Comput Commun 30(4):849\u2013855","journal-title":"Comput Commun"},{"key":"1747_CR7","doi-asserted-by":"crossref","unstructured":"Hern\u00e1ndez JL, Moreno MV, Jara AJ, Skarmeta AF (2014) A soft computing based location-aware access control for smart buildings. Soft Comput 18(9):1659\u20131674","DOI":"10.1007\/s00500-014-1278-9"},{"key":"1747_CR8","doi-asserted-by":"crossref","unstructured":"Lee D, Kim YH, Lee H (2014) Route prediction based vehicular mobility management scheme for vanet. Int J Distrib Sens Netw 2014","DOI":"10.1155\/2014\/679780"},{"issue":"9","key":"1747_CR9","doi-asserted-by":"crossref","first-page":"1681","DOI":"10.1016\/j.ins.2010.01.008","volume":"180","author":"J Li","year":"2010","unstructured":"Li J, Kim K (2010) Hidden attribute-based signatures without anonymity revocation. Inf Sci 180(9):1681\u20131689","journal-title":"Inf Sci"},{"key":"1747_CR10","doi-asserted-by":"crossref","unstructured":"Li J, Wang Q, Wang C, Cao N, Ren K, Lou W (2010) Fuzzy keyword search over encrypted data in cloud computing. In: 29th IEEE international conference on computer communications, IEEE, pp 441\u2013445","DOI":"10.1109\/INFCOM.2010.5462196"},{"key":"1747_CR11","doi-asserted-by":"crossref","unstructured":"Liu F, Sf Zhu, Zy Chai, Yt Qi, Js Wu (2013) Immune optimization algorithm for solving vertical handoff decision problem in heterogeneous wireless network. Wirel Netw 19(4):507\u2013516","DOI":"10.1007\/s11276-012-0481-9"},{"issue":"3","key":"1747_CR12","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1007\/s00500-011-0728-x","volume":"16","author":"S Misra","year":"2012","unstructured":"Misra S, Agarwal P (2012) Bio-inspired group mobility model for mobile ad hoc networks based on bird-flocking behavior. Soft Comput 16(3):437\u2013450","journal-title":"Soft Comput"},{"key":"1747_CR13","doi-asserted-by":"crossref","unstructured":"Perkins C, Johnson D (2011) Mobility support in ipv6. Tech. rep., IETF RFC 6275, July","DOI":"10.17487\/rfc6275"},{"key":"1747_CR14","doi-asserted-by":"crossref","unstructured":"Rahimi MR, Venkatasubramanian N, Vasilakos AV (2013) Music: Mobility-aware optimal service allocation in mobile cloud computing. In: 2013 IEEE sixth international conference on cloud computing, IEEE, pp 75\u201382","DOI":"10.1109\/CLOUD.2013.100"},{"issue":"5","key":"1747_CR15","doi-asserted-by":"crossref","first-page":"741","DOI":"10.1007\/s11276-012-0498-0","volume":"19","author":"NW Sung","year":"2013","unstructured":"Sung NW, Pham NT, Yoon H, Lee S, Hwang WJ (2013) Base station association schemes to reduce unnecessary handovers using location awareness in femtocell networks. Wirel Netw 19(5):741\u2013753","journal-title":"Wirel Netw"},{"issue":"10","key":"1747_CR16","doi-asserted-by":"crossref","first-page":"1272","DOI":"10.1016\/j.comcom.2012.03.015","volume":"35","author":"M Tao","year":"2012","unstructured":"Tao M, Yuan H, Dong S, Yu H (2012) Initiative movement prediction assisted adaptive handover trigger scheme in fast mipv6. Comput Commun 35(10):1272\u20131282","journal-title":"Comput Commun"},{"issue":"2","key":"1747_CR17","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1007\/s11276-013-0603-z","volume":"20","author":"M Tao","year":"2014","unstructured":"Tao M, Yuan H, Wei W (2014) Active overload prevention based adaptive map selection in hmipv6 networks. Wirel Netw 20(2):197\u2013208","journal-title":"Wirel Netw"},{"issue":"1","key":"1747_CR18","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/TMC.2006.13","volume":"5","author":"S Thajchayapong","year":"2006","unstructured":"Thajchayapong S, Peha JM (2006) Mobility patterns in microcellular wireless networks. IEEE Trans Mobile Comput 5(1):52\u201363","journal-title":"IEEE Trans Mobile Comput"},{"issue":"3","key":"1747_CR19","doi-asserted-by":"crossref","first-page":"645","DOI":"10.1007\/s11276-010-0303-x","volume":"17","author":"W Wanalertlak","year":"2011","unstructured":"Wanalertlak W, Lee B, Yu C, Kim M, Park SM, Kim WT (2011) Behavior-based mobility prediction for seamless handoffs in mobile wireless networks. Wirel Netw 17(3):645\u2013658","journal-title":"Wirel Netw"},{"issue":"11","key":"1747_CR20","doi-asserted-by":"crossref","first-page":"1848","DOI":"10.1016\/j.comnet.2010.02.006","volume":"54","author":"X Yan","year":"2010","unstructured":"Yan X, Sekercioglu YA, Narayanan S (2010) A survey of vertical handover decision algorithms in fourth generation heterogeneous wireless networks. Comput Netw 54(11):1848\u20131863","journal-title":"Comput Netw"},{"issue":"2","key":"1747_CR21","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1002\/dac.1066","volume":"23","author":"WH Yang","year":"2010","unstructured":"Yang WH, Wang YC, Tseng YC, Lin BSP (2010) Energy-efficient network selection with mobility pattern awareness in an integrated wimax and wifi network. Int J Commun Syst 23(2):213\u2013230","journal-title":"Int J Commun Syst"},{"issue":"1","key":"1747_CR22","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/MWC.2014.6757894","volume":"21","author":"D Zhang","year":"2014","unstructured":"Zhang D, Chen M, Guizani M, Xiong H (2014) Mobility prediction in telecom cloud using mobile calls. IEEE Wirel Commun 21(1):26\u201332","journal-title":"IEEE Wirel Commun"},{"issue":"10","key":"1747_CR23","doi-asserted-by":"crossref","first-page":"1877","DOI":"10.1109\/LCOMM.2013.090213.130924","volume":"17","author":"X Zhou","year":"2013","unstructured":"Zhou X, Zhao Z, Li R, Zhou Y, Palicot J, Zhang H (2013) Human mobility patterns in cellular networks. IEEE Commun Lett 17(10):1877\u20131880","journal-title":"IEEE Commun Lett"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-015-1747-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-015-1747-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-015-1747-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-015-1747-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,27]],"date-time":"2019-08-27T08:35:03Z","timestamp":1566894903000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-015-1747-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6,21]]},"references-count":23,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2016,10]]}},"alternative-id":["1747"],"URL":"https:\/\/doi.org\/10.1007\/s00500-015-1747-9","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"type":"print","value":"1432-7643"},{"type":"electronic","value":"1433-7479"}],"subject":[],"published":{"date-parts":[[2015,6,21]]}}}