{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:25:37Z","timestamp":1740122737448,"version":"3.37.3"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T00:00:00Z","timestamp":1559174400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T00:00:00Z","timestamp":1559174400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Wireless Inf Networks"],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1007\/s10776-019-00433-y","type":"journal-article","created":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T09:03:41Z","timestamp":1559207021000},"page":"230-242","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Connectedness-Aware Copy-Adaptive Routing Protocol in Intermittently Connected Networks"],"prefix":"10.1007","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3310-3164","authenticated-orcid":false,"given":"Ying","family":"Li","sequence":"first","affiliation":[]},{"given":"Radim","family":"Bartos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,5,30]]},"reference":[{"key":"433_CR1","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1016\/j.jnca.2013.10.003","volume":"41","author":"Y Li","year":"2014","unstructured":"Y. Li and R. Bartos, A survey of protocols for intermittently connected delay-tolerant wireless sensor networks, Journal of Network and Computer Applications, Vol. 41, pp. 411\u2013423, 2014.","journal-title":"Journal of Network and Computer Applications"},{"issue":"1","key":"433_CR2","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/TNET.2002.808417","volume":"11","author":"C Intanagonwiwat","year":"2003","unstructured":"C. Intanagonwiwat, R. Govindan, D. Estrin, J. Heidemann, and F. Silva, Directed diffusion for wireless sensor networking, IEEE\/ACM Transactions on Networking, Vol. 11, No. 1, pp. 2\u201316, 2003.","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"4","key":"433_CR3","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1145\/509506.509514","volume":"5","author":"D Ganesan","year":"2001","unstructured":"D. Ganesan, R. Govindan, S. Shenker, and D. Estrin, Highly-resilient, energy-efficient multipath routing in wireless sensor networks, SIGMOBILE Mobile Computing and Communications Review, Vol. 5, No. 4, pp. 11\u201325, 2001.","journal-title":"SIGMOBILE Mobile Computing and Communications Review"},{"key":"433_CR4","unstructured":"A. Bagula and K. Mazandu, Energy constrained multipath routing in wireless sensor networks. In Ubiquitous Intelligence and Computing, Series Lecture Notes in Computer Science, Vol. 5061, pp. 453\u2013467, Springer, Berlin Heidelberg, 2008."},{"key":"433_CR5","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1109\/TNET.2007.897964","volume":"16","author":"T Spyropoulos","year":"2008","unstructured":"T. Spyropoulos, K. Psounis, and C. S. Raghavendra, Efficient routing in intermittently connected mobile networks: the multiple-copy case, IEEE\/ACM Transactions on Networking, Vol. 16, pp. 77\u201390, 2008.","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"1","key":"433_CR6","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1109\/TNET.2007.897962","volume":"16","author":"T Spyropoulos","year":"2008","unstructured":"T. Spyropoulos, K. Psounis, and C. Raghavendra, Efficient routing in intermittently connected mobile networks: the single-copy case, IEEE\/ACM Transactions on Networking, Vol. 16, No. 1, pp. 63\u201376, 2008.","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"433_CR7","doi-asserted-by":"crossref","unstructured":"O. Gnawali, R. Fonseca, K. Jamieson, D. Moss, and P. Levis, Collection tree protocol. In Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems, ser. SenSys \u201909 ACM, pp. 1\u201314, 2009.","DOI":"10.1145\/1644038.1644040"},{"key":"433_CR8","unstructured":"M. Xiao, J. Wu, C. Liu, and L. Huang, Tour: time-sensitive opportunistic utility-based routing in delay tolerant networks. In Proceedings of 2013 IEEE INFOCOM 2013, pp. 2085\u20132091, 2013."},{"key":"433_CR9","unstructured":"A. Vahdat and D. Becker, Epidemic routing for partially connected ad hoc networks, Department of Computer Science, Duke University, Tech. Rep. Technical Report CS-2000-06, 2000."},{"key":"433_CR10","doi-asserted-by":"crossref","unstructured":"A. Lindgren, A. Doria, and O. Schel\u00e9n, Probabilistic routing in intermittently connected networks, SIGMOBILE Mobile Computing and Communications Review, Vol. 7, No. 3, pp. 19\u201320, 2003.","DOI":"10.1145\/961268.961272"},{"key":"433_CR11","doi-asserted-by":"crossref","unstructured":"S. Grasic, E. Davies, A. Lindgren, and A. Doria, The evolution of a DTN routing protocol - PRoPHETv2. In Proceedings of the 6th ACM Workshop on Challenged Networks, ser. CHANTS \u201911 ACM, pp. 27\u201330, 2011.","DOI":"10.1145\/2030652.2030661"},{"key":"433_CR12","doi-asserted-by":"crossref","unstructured":"T. Spyropoulos, K. Psounis, and C. S. Raghavendra, Spray and Focus: efficient mobility-assisted routing for heterogeneous and correlated mobility. In Proceedings of the 5th Annual IEEE International Conference on PerCom Workshops \u201907, pp. 79\u201385, 2007.","DOI":"10.1109\/PERCOMW.2007.108"},{"key":"433_CR13","doi-asserted-by":"publisher","first-page":"1660","DOI":"10.1016\/j.jnca.2011.05.005","volume":"34","author":"AT Prodhan","year":"2011","unstructured":"A. T. Prodhan, R. Das, H. Kabir, and G. C. Shoja, TTL based routing in opportunistic networks, Journal of Network and Computer Applications, Vol. 34, pp. 1660\u20131670, 2011.","journal-title":"Journal of Network and Computer Applications"},{"key":"433_CR14","doi-asserted-by":"crossref","unstructured":"T. Spyropoulos, K. Psounis, and C. S. Raghavendra, Spray and wait: an efficient routing scheme for intermittently connected mobile networks. In Proceedings of the 2005 ACM SIGCOMM Workshop on Delay-tolerant Networking, ser. WDTN\u201905, pp. 252\u2013259, 2005.","DOI":"10.1145\/1080139.1080143"},{"issue":"4","key":"433_CR15","doi-asserted-by":"publisher","first-page":"3406","DOI":"10.1109\/TVT.2016.2593051","volume":"66","author":"Z Ning","year":"2017","unstructured":"Z. Ning, L. Liu, F. Xia, B. Jedari, I. Lee, and W. Zhang, CAIS: a copy adjustable incentive scheme in community-based socially aware networking, IEEE Transactions on Vehicular Technology, Vol. 66, No. 4, pp. 3406\u20133419, 2017.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"5","key":"433_CR16","doi-asserted-by":"publisher","first-page":"1238","DOI":"10.1109\/TPDS.2014.2319211","volume":"26","author":"M Xiao","year":"2015","unstructured":"M. Xiao, J. Wu, and L. Huang, Home-based zero-knowledge multi-copy routing in mobile social networks, IEEE Transactions on Parallel and Distributed Systems, Vol. 26, No. 5, pp. 1238\u20131250, 2015.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"1","key":"433_CR17","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1007\/s12083-016-0472-1","volume":"11","author":"P Yuan","year":"2018","unstructured":"P. Yuan and C. Wang, OPPO: an optimal copy allocation scheme in mobile opportunistic networks, Peer-to-Peer Networking and Applications, Vol. 11, No. 1, pp. 102\u2013109, 2018.","journal-title":"Peer-to-Peer Networking and Applications"},{"issue":"1","key":"433_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1687-1499-2012-76","volume":"2012","author":"X Guan","year":"2012","unstructured":"X. Guan, M. Chen, and T. Ohtsuki, Epidemic theory based H + 1 hop forwarding for intermittently connected mobile ad hoc networks, EURASIP Journal on Wireless Communications and Networking, Vol. 2012, No. 1, pp. 1\u201310, 2012.","journal-title":"EURASIP Journal on Wireless Communications and Networking"},{"key":"433_CR19","unstructured":"M. Musolesi, S. Hailes, and C. Mascolo, Adaptive routing for intermittently connected mobile ad hoc networks. In Proceedings of the Sixth IEEE International Symposium on World of Wireless Mobile and Multimedia Networks, ser. WOWMOM\u201905, pp. 183\u2013189, 2005."},{"key":"433_CR20","doi-asserted-by":"publisher","first-page":"6:1","DOI":"10.1155\/2011\/401802","volume":"2011","author":"JM Soares","year":"2011","unstructured":"J. M. Soares, M. Franceschinis, R. M. Rocha, W. Zhang, and M. A. Spirito, Opportunistic data collection in sparse wireless sensor networks, EURASIP Journal on Wireless Communications Networking, Vol. 2011, pp. 6:1\u20136:20, 2011.","journal-title":"EURASIP Journal on Wireless Communications Networking"},{"key":"433_CR21","unstructured":"T. Hu and Y. Fei, An adaptive routing protocol based on connectivity prediction for underwater disruption tolerant networks. In 2013 IEEE Global Communications Conference (GLOBECOM), pp. 65\u201371, 2013."},{"key":"433_CR22","doi-asserted-by":"crossref","unstructured":"Y. Li and R. Bartos, Interaction based routing algorithm for opportunistic mobile social networks. In 2017 14th IEEE Annual Consumer Communications and Networking Conference (CCNC), pp. 492\u2013497, 2017.","DOI":"10.1109\/CCNC.2017.7983157"},{"key":"433_CR23","unstructured":"M. Li, D. Agrawal, D. Ganesan, and A. Venkataramani, Block-switched networks: a new paradigm for wireless transport. In Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation, pp. 423\u2013436, 2009."},{"key":"433_CR24","unstructured":"Y. Li, R. Bartos, and J. Swan, Transport protocol with acknowledgement-assisted storage management for intermittently connected wireless sensor networks, Distributed Computing and Networking, ser. Lecture Notes in Computer Science, Vol. 7730, pp. 57\u201371. Springer, Berlin Heidelberg, 2013."},{"issue":"0","key":"433_CR25","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1016\/j.pmcj.2014.03.003","volume":"13","author":"Y Li","year":"2014","unstructured":"Y. Li, R. Bartos, and J. Swan, Dacksis: an efficient transport protocol with acknowledgement-assisted storage management for intermittently connected wireless sensor networks, Pervasive and Mobile Computing, Vol. 13, No. 0, pp. 272\u2013285, 2014.","journal-title":"Pervasive and Mobile Computing"},{"key":"433_CR26","unstructured":"Y. Li and R. Bartos, Energy efficient reactive store-and-forward protocol for intermittently connected networks. In 2013 IEEE Global Communications Conference (GLOBECOM), pp. 563\u2013568, 2013."},{"key":"433_CR27","unstructured":"V. Naumov and T. Gross, Connectivity-aware routing (CAR) in vehicular ad-hoc networks. In 26th IEEE International Conference on Computer Communications (INFOCOM \u201907), pp. 1919\u20131927, 2007."},{"issue":"1","key":"433_CR28","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/s11036-009-0169-2","volume":"15","author":"Q Yang","year":"2010","unstructured":"Q. Yang, A. Lim, S. Li, J. Fang, and P. Agrawal, ACAR: adaptive connectivity aware routing for vehicular ad hoc networks in city scenarios, Mobile Networks and Applications, Vol. 15, No. 1, pp. 36\u201360, 2010.","journal-title":"Mobile Networks and Applications"},{"key":"433_CR29","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.adhoc.2017.08.005","volume":"66","author":"H Guo","year":"2017","unstructured":"H. Guo, X. Wang, H. Cheng, and M. Huang, A location aided controlled spraying routing algorithm for Delay Tolerant Networks, Ad Hoc Networks, Vol. 66, pp. 16\u201325, 2017.","journal-title":"Ad Hoc Networks"},{"issue":"5","key":"433_CR30","first-page":"4374","volume":"67","author":"B Wu","year":"2018","unstructured":"B. Wu, H. Shen, and K. Chen, Exploiting active subareas for multicopy routing in VDTNs, IEEE Transactions on Vehicular Technology, Vol. 67, No. 5, pp. 4374\u20134388, 2018.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"433_CR31","unstructured":"O. Gnawali, R. Fonseca, K. Jamieson, M. Kazandjieva, D. Moss, and P. Levis, CTP: an efficient, robust, and reliable collection tree protocol for wireless sensor networks, ACM Transactions on Sensor Network, Vol. 10, No. 1, pp. 16:1\u201316:49, 2013."},{"key":"433_CR32","unstructured":"P. Levis, N. Patel, D. Culler, and S. Shenker, Trickle: a self-regulating algorithm for code propagation and maintenance in wireless sensor networks. In Proceedings of the 1st Conference on Symposium on Networked Systems Design and Implementation vol. 1, ser. NSDI\u201904 (USENIX Association), pp. 2\u20132, 2004."},{"key":"433_CR33","unstructured":"Contiki, Contiki Operating System, \n                    http:\/\/www.contiki-os.org\n                    \n                  , 2012."},{"key":"433_CR34","unstructured":"F. \u00d6sterlind, A sensor network simulator for the Contiki OS, Swedish Institute of Computer Science, SICS Report, 2009."},{"key":"433_CR35","unstructured":"BonnMotion, \n                    http:\/\/net.cs.uni-bonn.de\/wg\/cs\/applications\/bonnmotion\n                    \n                  , 2016."}],"container-title":["International Journal of Wireless Information Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10776-019-00433-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10776-019-00433-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10776-019-00433-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,28]],"date-time":"2020-05-28T19:10:09Z","timestamp":1590693009000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10776-019-00433-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,30]]},"references-count":35,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,9]]}},"alternative-id":["433"],"URL":"https:\/\/doi.org\/10.1007\/s10776-019-00433-y","relation":{},"ISSN":["1068-9605","1572-8129"],"issn-type":[{"type":"print","value":"1068-9605"},{"type":"electronic","value":"1572-8129"}],"subject":[],"published":{"date-parts":[[2019,5,30]]},"assertion":[{"value":"25 July 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 April 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 May 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 May 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}