{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,6]],"date-time":"2023-10-06T05:08:11Z","timestamp":1696568891919},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2012,6,3]],"date-time":"2012-06-03T00:00:00Z","timestamp":1338681600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2012,8]]},"DOI":"10.1007\/s11036-012-0379-x","type":"journal-article","created":{"date-parts":[[2012,6,2]],"date-time":"2012-06-02T07:28:01Z","timestamp":1338622081000},"page":"463-478","source":"Crossref","is-referenced-by-count":1,"title":["Scheme for Expanding the Capacity of Wireless Access Infrastructures through the Exploitation of Opportunistic Networks"],"prefix":"10.1007","volume":"17","author":[{"given":"Andreas","family":"Georgakopoulos","sequence":"first","affiliation":[]},{"given":"Dimitrios","family":"Karvounas","sequence":"additional","affiliation":[]},{"given":"Vera","family":"Stavroulaki","sequence":"additional","affiliation":[]},{"given":"Kostas","family":"Tsagkaris","sequence":"additional","affiliation":[]},{"given":"Milenko","family":"Tosic","sequence":"additional","affiliation":[]},{"given":"Dragan","family":"Boskovic","sequence":"additional","affiliation":[]},{"given":"Panagiotis","family":"Demestichas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,6,3]]},"reference":[{"key":"379_CR1","unstructured":"OneFIT (Opportunistic networks and cognitive management systems for efficient application provision in the future internet) project, www.ict-onefit.eu , accessed November 2011"},{"issue":"6","key":"379_CR2","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/MVT.2011.941892","volume":"3","author":"V Stavroulaki","year":"2011","unstructured":"Stavroulaki V, Tsagkaris K, Logothetis M, Georgakopoulos A, Demestichas P, Gebert J, Filo M (2011) Operator governed opportunistic networks: an approach for exploiting cognitive radio networking technologies in the future internet. IEEE Vehicular Technology Mag 3(6):52\u201359","journal-title":"IEEE Vehicular Technology Mag"},{"key":"379_CR3","doi-asserted-by":"crossref","unstructured":"Georgakopoulos A, Tsagkaris K, Stavroulaki V, Demestichas P (2011) Efficient opportunistic network creation in the context of Future Internet. The Future Internet: Achievements and Technological Promises, vol.6656, pp.293-306, 2011, Springer\/Verlag","DOI":"10.1007\/978-3-642-20898-0_21"},{"issue":"44","key":"379_CR4","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1109\/MCOM.2006.273099","volume":"12","author":"R Thomas","year":"2006","unstructured":"Thomas R, Friend D, DaSilva L, McKenzie A (2006) Cognitive networks: adaptation and learning to achieve end-to-end performance objectives. IEEE Commun Mag 12(44):51\u201357","journal-title":"IEEE Commun Mag"},{"key":"379_CR5","unstructured":"ETSI TR 102.683, v1.1.1 Reconfigurable Radio Systems (RRS); Cognitive Pilot Channel (CPC) (2009)"},{"key":"379_CR6","unstructured":"ETSI TR 102.802, v1.1.1 Reconfigurable Radio Systems (RRS); Cognitive Radio System Concepts (2010)"},{"key":"379_CR7","unstructured":"E3 (End-to-End Efficiency) project, https:\/\/ict-e3.eu\/ , accessed November 2011"},{"issue":"44","key":"379_CR8","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1109\/MCOM.2006.1668430","volume":"6","author":"P Demestichas","year":"2006","unstructured":"Demestichas P, Boscovic D, Stavroulaki V, Lee A, Strassner J (2006) m@ANGEL: autonomic management platform for seamless wireless cognitive connectivity to the mobile internet. IEEE Commun Mag 6(44):118\u2013127","journal-title":"IEEE Commun Mag"},{"issue":"48","key":"379_CR9","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1109\/MCOM.2010.5560591","volume":"9","author":"M Mueck","year":"2010","unstructured":"Mueck M, Piipponen A, Dimitrakopoulos G, Tsagkaris K, Casadevall F, Demestichas P, P\u00e9rez-Romero J, Sallent O, Baldini G, Filin S, Harada H, Debbah M, Haustein T, Gebert J, Deschamps B, Bender P, Street M, Kallioj\u00e4rvi K, Kandeepan S, Lota J, Hayar A (2010) ETSI reconfigurable radio systems \u2013 status and future directions on software defined radio and cognitive radio standards. IEEE Commun Mag 9(48):78\u201386","journal-title":"IEEE Commun Mag"},{"issue":"18","key":"379_CR10","first-page":"8","volume":"3","author":"RQ Hu","year":"2011","unstructured":"Hu RQ, Qian Y, Kota S, Giambene G (2011) HetNets \u2013 A new paradigm for increasing cellular capacity and coverage. IEEE Wireless Commun Mag 3(18):8\u20139","journal-title":"IEEE Wireless Commun Mag"},{"issue":"44","key":"379_CR11","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1109\/MCOM.2006.248176","volume":"11","author":"L Pelusi","year":"2006","unstructured":"Pelusi L, Passarella A, Conti M (2006) Opportunistic networking: data forwarding in disconnected mobile ad-hoc networks. IEEE Commun Mag 11(44):134\u2013141","journal-title":"IEEE Commun Mag"},{"key":"379_CR12","doi-asserted-by":"crossref","unstructured":"Lilien, L, Gupta A, Yang Z (2007) Opportunistic networks for emergency applications and their standard implementation framework. In: IEEE international performance, computing and communications conference, 2007. IPCCC 2007","DOI":"10.1109\/PCCC.2007.358946"},{"key":"379_CR13","doi-asserted-by":"crossref","unstructured":"Huang CM, Lan KC, Tsai CZ (2008) A survey of opportunistic networks. In: International conference on advanced information networking and applications-workshops, 2008. AINAW 2008","DOI":"10.1109\/WAINA.2008.292"},{"key":"379_CR14","unstructured":"Hui P, Lindgren A, Crowcroft J (2009) Empirical evaluation of hybrid opportunistic networks. In: communication systems and networks and workshops, 2009. COMSNETS 2009"},{"key":"379_CR15","doi-asserted-by":"crossref","unstructured":"Dousse O, Thiran P, Hasler M (2002) Connectivity in ad-hoc and hybrid networks. In: IEEE international conference on computer communications, 2002. INFOCOM 2002","DOI":"10.1109\/INFCOM.2002.1019356"},{"issue":"18","key":"379_CR16","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1109\/MWC.2011.5876496","volume":"3","author":"A Damnjanovic","year":"2011","unstructured":"Damnjanovic A, Montojo J, Yongbin W, Tingfang J, Tao L, Vajapeyam M, Taesang Y, Osok S, Malladi D (2011) A survey on 3GPP heterogeneous networks. IEEE Wireless Commun Mag 3(18):10\u201321","journal-title":"IEEE Wireless Commun Mag"},{"key":"379_CR17","unstructured":"3GPP TR 32.835, v0.0.2 Technical Specification Group Services and System Aspects; Telecommunication management; Study of Heterogeneous Networks Management (Release 11) (2011)"},{"issue":"18","key":"379_CR18","first-page":"32","volume":"3","author":"Y Shu-Ping","year":"2011","unstructured":"Shu-Ping Y, Talwar S, Geng W, Himayat N, Johnsson K (2011) Capacity and coverage enhancement in heterogeneous networks. IEEE Wireless Commun Mag 3(18):32\u201338","journal-title":"IEEE Wireless Commun Mag"},{"issue":"54","key":"379_CR19","doi-asserted-by":"crossref","first-page":"2147","DOI":"10.1016\/j.comnet.2010.01.010","volume":"13","author":"Y Ge","year":"2010","unstructured":"Ge Y, Tham C, Kong PY, Ang YH (2010) Dynamic end-to-end capacity in IEEE 802.16 wireless mesh networks. Comput Netw 13(54):2147\u20132165","journal-title":"Comput Netw"},{"issue":"34","key":"379_CR20","doi-asserted-by":"crossref","first-page":"1645","DOI":"10.1016\/j.comcom.2011.03.002","volume":"13","author":"C Caillouet","year":"2011","unstructured":"Caillouet C, Perennes S, Rivano H (2011) Framework for optimizing the capacity of wireless mesh networks. Comput Commun 13(34):1645\u20131659","journal-title":"Comput Commun"},{"issue":"52","key":"379_CR21","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1016\/j.comnet.2007.09.014","volume":"1","author":"P Stuedi","year":"2008","unstructured":"Stuedi P, Alonso G (2008) Modeling and computing throughput capacity of wireless multihop networks. Comput Netw 1(52):116\u2013129","journal-title":"Comput Netw"},{"issue":"55","key":"379_CR22","doi-asserted-by":"crossref","first-page":"2241","DOI":"10.1016\/j.comnet.2011.03.007","volume":"9","author":"V Ramamurthi","year":"2011","unstructured":"Ramamurthi V, Reaz A, Ghosal D, Dixit S (2011) Channel, capacity, and flow assignment in wireless mesh networks. Comput Netw 9(55):2241\u20132258","journal-title":"Comput Netw"},{"key":"379_CR23","doi-asserted-by":"crossref","unstructured":"Aguero R, Choque J, Munoz L (2008) On the outage probability for multi-hop communications over array network deployments. In: IEEE wireless communications and networking conference, 2008. WCNC 2008","DOI":"10.1109\/WCNC.2008.514"},{"issue":"16","key":"379_CR24","doi-asserted-by":"crossref","first-page":"412","DOI":"10.1007\/s11036-011-0318-2","volume":"4","author":"J Choque","year":"2011","unstructured":"Choque J, Aguero R, Munoz L, Choque J, Aguero R, Munoz L (2011) Optimum selection of access networks within heterogeneous wireless environments based on linear programming techniques. Mobile Netw Appl J 4(16):412\u2013423","journal-title":"Mobile Netw Appl J"},{"key":"379_CR25","unstructured":"Pentikousis K, Aguero R, Gebert J, Galache JA, Blume O, Paakkonen P (2007) The ambient networks heterogeneous access selection architecture, In: First international conference on first ambient networks workshop on mobility, multiaccess, and network management, 2007. M2NM 2007"},{"key":"379_CR26","doi-asserted-by":"crossref","unstructured":"Matos R, Marques C, Sargento S (2011) Context-based connectivity in wireless mesh networks: analytical vs simulation studies, In: IEEE international conference on computer as a tool, 2011. EUROCON 2011","DOI":"10.1109\/EUROCON.2011.5929319"},{"issue":"47","key":"379_CR27","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1016\/j.comnet.2004.12.001","volume":"4","author":"I Akyildiz","year":"2005","unstructured":"Akyildiz I, Wang X, Wang W (2005) Wireless mesh networks: a survey. Comput Netw 4(47):445\u2013487","journal-title":"Comput Netw"},{"issue":"7","key":"379_CR28","doi-asserted-by":"crossref","first-page":"810","DOI":"10.1016\/j.adhoc.2009.01.001","volume":"5","author":"I Akyildiz","year":"2009","unstructured":"Akyildiz I, Lee W, Chowdhury K (2009) CRAHNs: Cognitive radio ad-hoc networks. Ad Hoc Netw 5(7):810\u2013836","journal-title":"Ad Hoc Netw"},{"key":"379_CR29","doi-asserted-by":"crossref","first-page":"399","DOI":"10.4153\/CJM-1956-045-5","volume":"8","author":"LR Ford","year":"1956","unstructured":"Ford LR, Fulkerson DR (1956) Maximal flow through a network. Can J Math 8:399\u2013404","journal-title":"Can J Math"},{"key":"379_CR30","unstructured":"Cormen T, Leiserson C, Rivest R, Stein C (2009), Introduction to Algorithms (3rd edition). MIT Press, 2009"},{"key":"379_CR31","unstructured":"Java Agent DEvelopment Platform (JADE), http:\/\/jade.tilab.com , accessed November 2011"},{"key":"379_CR32","doi-asserted-by":"crossref","unstructured":"Ker\u00e4nen A, Ott J, Teemu K (2009) The ONE Simulator for DTN Protocol Evaluation, In: SIMUTools\u201909: 2nd International Conference on Simulation Tools and Techniques, 2009","DOI":"10.4108\/ICST.SIMUTOOLS2009.5674"},{"key":"379_CR33","unstructured":"Quang Hien C, Conrat J, Cousin J (2011) Propagation path loss models for LTE-advanced urban relaying systems, In: IEEE International Symposium on Antennas and Propagation, 2011. APSURSI 2011"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-012-0379-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11036-012-0379-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-012-0379-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,29]],"date-time":"2019-06-29T09:40:08Z","timestamp":1561801208000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11036-012-0379-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6,3]]},"references-count":33,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2012,8]]}},"alternative-id":["379"],"URL":"https:\/\/doi.org\/10.1007\/s11036-012-0379-x","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,6,3]]}}}