{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:42:24Z","timestamp":1740123744746,"version":"3.37.3"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2016,9,29]],"date-time":"2016-09-29T00:00:00Z","timestamp":1475107200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61571396"],"award-info":[{"award-number":["61571396"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Agence Nationale de la Recherche (FR)","award":["ANR-12-IS03"],"award-info":[{"award-number":["ANR-12-IS03"]}]},{"name":"National Key Basic Research Program (973 Project) in China","award":["2012CB316104"],"award-info":[{"award-number":["2012CB316104"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1007\/s11036-016-0767-8","type":"journal-article","created":{"date-parts":[[2016,9,29]],"date-time":"2016-09-29T07:10:07Z","timestamp":1475133007000},"page":"577-588","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Moderate Incentive Design for Delay-Constrained Device-to-Device Relaying"],"prefix":"10.1007","volume":"22","author":[{"given":"Xuying","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Wei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yitu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Lin","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Zhaoyang","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,29]]},"reference":[{"issue":"10","key":"767_CR1","doi-asserted-by":"crossref","first-page":"5417","DOI":"10.1109\/TWC.2015.2438292","volume":"14","author":"D Wu","year":"2015","unstructured":"Wu D, Cai YM, Hu RQY, Qian Y (2015) Dynamic distributed resource sharing for mobile D2D communications. IEEE Trans Wirel Commun 14(10):5417\u20135429","journal-title":"IEEE Trans Wirel Commun"},{"issue":"4","key":"767_CR2","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1109\/MWC.2006.1678169","volume":"13","author":"P Liu","year":"2006","unstructured":"Liu P, Tao ZF, Lin ZN, Erkip E, Panwar S (2006) Cooperative wireless communications : A cross-layer approach. IEEE Wirel Commun Mag 13(4):84\u201392","journal-title":"IEEE Wirel Commun Mag"},{"key":"767_CR3","doi-asserted-by":"crossref","unstructured":"Hakola S, Chen T, Lehtomaki J, Koskela T (2010) Device-to-device (D2D) communication in cellular network-performance analysis of optimum and practical communication mode selection","DOI":"10.1109\/WCNC.2010.5506133"},{"key":"767_CR4","volume-title":"The Theory of Incentives I: The Principal-agent Model","author":"J Laffont","year":"2001","unstructured":"Laffont J, Martimort D (2001) The Theory of Incentives I: The Principal-agent Model. Princeton University Press, Princeton NJ, U.S."},{"key":"767_CR5","unstructured":"Bolton P, Dewatripont M (2004) Contract Theory. MIT Press"},{"issue":"5","key":"767_CR6","first-page":"821","volume":"11","author":"H Bo","year":"2011","unstructured":"Bo H, Pan H, Anil Kumar VS, Marathe MV, Shao JH, Aravind S (2011) Mobile Data Offloading through Opportunistic Communications and Social Participation. IEEE Trans Mob Comput 11(5):821\u2013834","journal-title":"IEEE Trans Mob Comput"},{"key":"767_CR7","unstructured":"Apostolaras A, Iosifidis G, Chounos K, Korakis T (2015) C2M: Mobile data offloading to mesh networks. Proc IEEE GLOBECOM:4877\u20134883"},{"key":"767_CR8","doi-asserted-by":"crossref","unstructured":"Mehmeti F, Spyropoulos T Performance Analysis of Mobile Data Offloading in Heterogeneous Networks. IEEE Trans Mob Comput. to appear","DOI":"10.1109\/TMC.2016.2557799"},{"key":"767_CR9","doi-asserted-by":"crossref","unstructured":"Si P, He Y, Yao H, Yang R (2016) DaVe: Offloading Delay-Tolerant Data Traffic to Connected Vehicle Networks. IEEE Trans Veh Technol 65(6):3941\u20133953","DOI":"10.1109\/TVT.2016.2550105"},{"key":"767_CR10","doi-asserted-by":"crossref","unstructured":"Wang L, Peng T, Yang Y, Wang W (2012) Interference constrained relay selection of D2D communication for relay purpose underlaying cellular networks. Proc IEEE WiCOM","DOI":"10.1109\/WiCOM.2012.6478550"},{"key":"767_CR11","doi-asserted-by":"crossref","unstructured":"Vanganuru K, Ferrante S, Sternberg G (2012) System capacity and coverage of a cellular network with D2D mobile relays. Proc of IEEE MILCOM","DOI":"10.1109\/MILCOM.2012.6415659"},{"issue":"5","key":"767_CR12","doi-asserted-by":"crossref","first-page":"2315","DOI":"10.1109\/TVT.2012.2237557","volume":"62","author":"B Zhou","year":"2013","unstructured":"Zhou B, Hu H, Huang S, Chen H (2013) Intracluster device-to-device relay algorithm with optimal resource utilization. IEEE Trans Veh Technol 62(5):2315\u20132326","journal-title":"IEEE Trans Veh Technol"},{"issue":"1","key":"767_CR13","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.adhoc.2009.02.005","volume":"8","author":"L Buttyn","year":"2010","unstructured":"Buttyn L, Dra L, Flegyhzi M, Vajda I (2010) Barter trade improves message delivery in opportunistic networks. Ad Hoc Netw 8(1):1\u201314","journal-title":"Ad Hoc Netw"},{"key":"767_CR14","doi-asserted-by":"crossref","unstructured":"Li N, Das SK (2010) RADON: reputation-assisted data forwarding in opportunistic networks. Proc ACM International Workshop on Mobile Opportunistic Networking:8\u201314","DOI":"10.1145\/1755743.1755746"},{"key":"767_CR15","doi-asserted-by":"crossref","unstructured":"Wang W, Chen L, Shin KG, Duan L (2014) Secure cooperative spectrum sensing and access against intelligent malicious behaviors. Proc IEEE INFOCOM","DOI":"10.1109\/INFOCOM.2014.6848059"},{"issue":"11","key":"767_CR16","doi-asserted-by":"crossref","first-page":"2392","DOI":"10.1109\/TMC.2015.2398446","volume":"14","author":"W Wang","year":"2015","unstructured":"Wang W, Chen L, Shin KG, Duan L (2015) Thwarting intelligent malicious behaviors in cooperative spectrum sensing. IEEE Trans Mob Comput 14(11):2392\u20132405","journal-title":"IEEE Trans Mob Comput"},{"key":"767_CR17","doi-asserted-by":"crossref","unstructured":"Wen D, Cai Y, Li Z (2013) An incentive compatible two-hop multi-copy routing protocol in DTNs. Proc IEEE MSN:140\u2013146","DOI":"10.1109\/MSN.2013.53"},{"key":"767_CR18","doi-asserted-by":"crossref","unstructured":"Shevade U, Song H, Qiu L, Zhang Y (2008) Incentive-aware routing in DTNs. Proc ICNP:238\u2013247","DOI":"10.1109\/ICNP.2008.4697042"},{"key":"767_CR19","doi-asserted-by":"crossref","unstructured":"Brun O, El-Azouzi R, Prabhu B, Seregina T (2014) Modeling rewards and incentive mechanisms for Delay Tolerant Networks. International Symposium on Modeling and Optimization in Mobile Ad Hoc, and Wireless Networks:233\u2013240","DOI":"10.1109\/WIOPT.2014.6850304"},{"issue":"4","key":"767_CR20","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1109\/MNET.2015.7166194","volume":"29","author":"P Li","year":"2015","unstructured":"Li P, Guo S (2015) Incentive mechanisms for device-to-device communications. IEEE Netw 29(4):75\u201379","journal-title":"IEEE Netw"},{"issue":"10","key":"767_CR21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/JSAC.2015.2435356","volume":"33","author":"Y Zhang","year":"2015","unstructured":"Zhang Y, Song L, Saad W, Dawy Z, Han Z (2015) Contract-Based Incentive Mechanisms for Device-to-Device Communications in Cellular Networks. IEEE J Sel Areas Commun 33(10):1\u20131","journal-title":"IEEE J Sel Areas Commun"},{"key":"767_CR22","doi-asserted-by":"crossref","unstructured":"Mastronarde N, Patel V, Xu J, Van DSM (2013) Learning relaying strategies in cellular D2D networks with token-based incentives. IEEE Globecom Workshops:163\u2013169","DOI":"10.1109\/GLOCOMW.2013.6824980"},{"key":"767_CR23","doi-asserted-by":"crossref","unstructured":"Sun Q, Tian L, et al. (2015) Energy efficient incentive resource allocation in D2D cooperative communications. Proc IEEE ICC:2632\u20132637","DOI":"10.1109\/ICC.2015.7248722"},{"issue":"5","key":"767_CR24","doi-asserted-by":"crossref","first-page":"483","DOI":"10.1002\/wcm.72","volume":"2","author":"T Camp","year":"2002","unstructured":"Camp T, Boleng J, Davies V (2002) A survey of mobility models for ad hoc network research. Wirel Commun Mob Comput 2(5):483\u2013502","journal-title":"Wirel Commun Mob Comput"},{"key":"767_CR25","doi-asserted-by":"crossref","unstructured":"Lu Y, Wang W, Chen L, Zhang Z, Huang A (2014) Distance-based energy-efficient opportunistic forwarding in mobile delay tolerant networks. Proc IEEE ICC:3564\u20133569","DOI":"10.1109\/ICC.2014.6883874"},{"issue":"1-4","key":"767_CR26","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1016\/j.peva.2005.07.018","volume":"62","author":"R Groenevelt","year":"2005","unstructured":"Groenevelt R, Nain P, Koole G (2005) The message delay in mobile ad hoc networks. Perform Eval 62 (1-4):210\u2013228","journal-title":"Perform Eval"},{"key":"767_CR27","doi-asserted-by":"crossref","first-page":"268","DOI":"10.1016\/j.sepro.2011.11.029","volume":"3","author":"YH Qin","year":"2012","unstructured":"Qin YH (2012) A stackelberg-game model in a two-stage supply chain. Syst Eng Procedia 3:268\u2013274","journal-title":"Syst Eng Procedia"},{"key":"767_CR28","doi-asserted-by":"crossref","unstructured":"Li S, Zheng ZZ, Ekici E, Shroff NB (2013) Maximizing social welfare in operator-based Cognitive Radio Networks under spectrum uncertainty and sensing inaccuracy. Proc of IEEE INFOCOM","DOI":"10.1109\/INFCOM.2013.6566884"},{"issue":"6","key":"767_CR29","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1109\/MCOM.2014.6829955","volume":"52","author":"W Wang","year":"2014","unstructured":"Wang W, Lau VKN (2014) Delay-aware cross-layer design for device-to-device communications in future cellular systems. IEEE Commun Mag 52(6):133\u2013139","journal-title":"IEEE Commun Mag"},{"key":"767_CR30","unstructured":"TAPASCologne project. http:\/\/sourceforge.net\/apps\/mediawiki\/sumo\/index.php? title=TAPASCologn"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11036-016-0767-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-016-0767-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-016-0767-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,13]],"date-time":"2019-09-13T23:23:13Z","timestamp":1568416993000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11036-016-0767-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,29]]},"references-count":30,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,6]]}},"alternative-id":["767"],"URL":"https:\/\/doi.org\/10.1007\/s11036-016-0767-8","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"type":"print","value":"1383-469X"},{"type":"electronic","value":"1572-8153"}],"subject":[],"published":{"date-parts":[[2016,9,29]]}}}