{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T04:13:05Z","timestamp":1748664785672,"version":"3.41.0"},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2015,10,19]],"date-time":"2015-10-19T00:00:00Z","timestamp":1445212800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Parallel Prog"],"published-print":{"date-parts":[[2017,2]]},"DOI":"10.1007\/s10766-015-0392-3","type":"journal-article","created":{"date-parts":[[2015,10,19]],"date-time":"2015-10-19T04:22:43Z","timestamp":1445228563000},"page":"157-171","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["An Opportunistic Network Coding Routing for Opportunistic Networks"],"prefix":"10.1007","volume":"45","author":[{"given":"Jiansheng","family":"Yao","sequence":"first","affiliation":[]},{"given":"Chunguang","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Gang","family":"Du","sequence":"additional","affiliation":[]},{"given":"Qi","family":"Yuan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,19]]},"reference":[{"key":"392_CR1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/MCOM.2006.248176","volume":"44","author":"L Pelusi","year":"2006","unstructured":"Pelusi, L., Passarella, A., Conti, M.: Opportunistic networking: data forwarding in disconnected mobile ad hoc networks. IEEE Commun. Mag. 44, 1\u20134 (2006)","journal-title":"IEEE Commun. Mag."},{"key":"392_CR2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.comcom.2014.04.007","volume":"48","author":"C Boldrini","year":"2014","unstructured":"Boldrini, C., Lee, K., Onen, M., et al.: Opportunistic networks. Comput. Commun. 48, 1\u20134 (2014)","journal-title":"Comput. Commun."},{"key":"392_CR3","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1016\/j.comcom.2014.03.019","volume":"48","author":"VFS Mota","year":"2014","unstructured":"Mota, V.F.S., et al.: Protocols, mobility models and tools in opportunistic networks: a survey. Comput. Commun. 48, 5\u201319 (2014)","journal-title":"Comput. Commun."},{"key":"392_CR4","doi-asserted-by":"crossref","first-page":"497","DOI":"10.1109\/TNET.2008.923722","volume":"16","author":"S Katti","year":"2008","unstructured":"Katti, S., Rahul, H., Hu, W.J., et al.: XORs in the air: practical wireless network coding. IEEE-ACM Trans. Netw. 16, 497\u2013510 (2008)","journal-title":"IEEE-ACM Trans. Netw."},{"key":"392_CR5","doi-asserted-by":"crossref","first-page":"1158","DOI":"10.1109\/TNET.2010.2042727","volume":"18","author":"S Sengupta","year":"2010","unstructured":"Sengupta, S., Rayanchu, S., Banerjee, S.: Network coding-aware routing in wireless networks. IEEE-ACM Trans. Netw. 18, 1158\u20131170 (2010)","journal-title":"IEEE-ACM Trans. Netw."},{"key":"392_CR6","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1145\/2248371.2248390","volume":"12","author":"A Khreishah","year":"2012","unstructured":"Khreishah, A., Khalil, I.M., Wu, J.: Distributed network coding-based opportunistic routing for multicast. MobiHoc 12, 115\u2013124 (2012)","journal-title":"MobiHoc"},{"key":"392_CR7","doi-asserted-by":"crossref","first-page":"2863","DOI":"10.1109\/TWC.2014.040914.121461","volume":"13","author":"MH Amerimehr","year":"2014","unstructured":"Amerimehr, M.H., Ashtiani, F.: Delay and throughput analysis of a two-way opportunistic network coding-based relay network. IEEE Trans. Wirel. Commun. 13, 2863\u20132873 (2014)","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"392_CR8","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1145\/1282427.1282400","volume":"37","author":"S Chachulski","year":"2007","unstructured":"Chachulski, S., et al.: Trading structure for randomness in wireless opportunistic routing. ACM SIGCOMM Comput. Commun. Rev. 37, 169\u2013180 (2007)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"392_CR9","doi-asserted-by":"crossref","first-page":"1956","DOI":"10.1016\/j.jnca.2011.07.012","volume":"34","author":"MA Iqbal","year":"2011","unstructured":"Iqbal, M.A., Dai, B., Huang, B., Hassan, A., Yu, S.: Survey of network coding-aware routing protocols in wireless networks. J. Netw. Comput. Appl. 34, 1956\u20131970 (2011)","journal-title":"J. Netw. Comput. Appl."},{"key":"392_CR10","doi-asserted-by":"crossref","unstructured":"Widmer, J., Le Boudec, J.Y.: Network coding for efficient communication in extreme networks. In: SIGCOMM\u201905 (WDTN). ACM, New York, pp. 284\u2013291 (2005)","DOI":"10.1145\/1080139.1080147"},{"key":"392_CR11","unstructured":"Yunfeng, L., Baochun, L., Ben, L. : Efficient network coded data transmissions in disruption tolerant networks. In: ICC\u201908, IEEE (2008)"},{"key":"392_CR12","doi-asserted-by":"crossref","unstructured":"Zeng, D.Z., Guo, S., Jin, H. et al.: Dynamic segmented network coding for reliable data dissemination in delay tolerant networks. In: ICC\u201912, New York, pp. 63\u201367 (2012)","DOI":"10.1109\/ICC.2012.6364530"},{"key":"392_CR13","doi-asserted-by":"crossref","first-page":"1407","DOI":"10.1109\/TNET.2012.2224369","volume":"21","author":"Z Xiaolan","year":"2013","unstructured":"Xiaolan, Z., Neglia, G., Kurose, J., et al.: Benefits of network coding for unicast application in disruption-tolerant networks. IEEE\/ACM Trans. Netw. 21, 1407\u20131420 (2013)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"392_CR14","doi-asserted-by":"crossref","first-page":"2567","DOI":"10.1016\/j.adhoc.2013.07.004","volume":"11","author":"A Ali","year":"2013","unstructured":"Ali, A., Panda, M., Chahed, T., Altman, E.: Improving the transport performance in delay tolerant networks by random linear network coding and global acknowledgments. Ad Hoc Netw. 11, 2567\u20132587 (2013)","journal-title":"Ad Hoc Netw."},{"key":"392_CR15","doi-asserted-by":"crossref","first-page":"1284","DOI":"10.1109\/TWC.2014.010214.122008","volume":"13","author":"B Hassanabadi","year":"2014","unstructured":"Hassanabadi, B., Valaee, S.: Reliable periodic safety message broadcasting in VANETs using network coding. IEEE Trans. Wirel. Commun. 13, 1284\u20131297 (2014)","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"392_CR16","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1007\/s00779-005-0046-3","volume":"10","author":"Nathan Eagle","year":"2006","unstructured":"Eagle, Nathan, Pentland, Alex S.: Reality mining: sensing complex social systems. Pers. Ubiquitous Comput. 10, 255\u2013268 (2006)","journal-title":"Pers. Ubiquitous Comput."},{"key":"392_CR17","doi-asserted-by":"crossref","unstructured":"Pan, H., Augustin, C., James, S. et al.: Pocket switched networks and human mobility in conference environments. In: SIGCOMM\u201905 (WDTN), pp. 244\u2013251 (2005)","DOI":"10.1145\/1080139.1080142"},{"key":"392_CR18","unstructured":"Vahdat, A., Becker, D.: Epidemic Routing for Partially Connected Ad Hoc Networks. Technical Report, CS-200006 (2000)"},{"key":"392_CR19","unstructured":"Mueller, K.: SimPy. https:\/\/simpy.readthedocs.org\/en\/latest\/index.html"}],"container-title":["International Journal of Parallel Programming"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10766-015-0392-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10766-015-0392-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10766-015-0392-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10766-015-0392-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T02:15:05Z","timestamp":1748657705000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10766-015-0392-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,19]]},"references-count":19,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,2]]}},"alternative-id":["392"],"URL":"https:\/\/doi.org\/10.1007\/s10766-015-0392-3","relation":{},"ISSN":["0885-7458","1573-7640"],"issn-type":[{"type":"print","value":"0885-7458"},{"type":"electronic","value":"1573-7640"}],"subject":[],"published":{"date-parts":[[2015,10,19]]}}}