{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T06:58:45Z","timestamp":1761807525564},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2009,9,4]],"date-time":"2009-09-04T00:00:00Z","timestamp":1252022400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2011,3]]},"DOI":"10.1007\/s11227-009-0329-y","type":"journal-article","created":{"date-parts":[[2009,9,3]],"date-time":"2009-09-03T07:33:50Z","timestamp":1251963230000},"page":"321-366","source":"Crossref","is-referenced-by-count":8,"title":["Mosaic-Net: a game theoretical method for selection and allocation of replicas in ad hoc networks"],"prefix":"10.1007","volume":"55","author":[{"given":"Samee Ullah","family":"Khan","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,9,4]]},"reference":[{"issue":"3","key":"329_CR1","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1145\/44498.45063","volume":"13","author":"P Apers","year":"1988","unstructured":"Apers P (1988) Data allocation in distributed database systems. ACM Trans Database Syst 13(3):263\u2013304","journal-title":"ACM Trans Database Syst"},{"key":"329_CR2","doi-asserted-by":"crossref","unstructured":"Archer A, Tardos E (2001) Truthful mechanisms for one-parameter agents. In: Proc of 42nd IEEE annual symposium on foundations of computer science, 2001, pp\u00a0482\u2013491","DOI":"10.1109\/SFCS.2001.959924"},{"issue":"4","key":"329_CR3","doi-asserted-by":"crossref","first-page":"328","DOI":"10.1086\/256963","volume":"58","author":"K Arrow","year":"1950","unstructured":"Arrow K (1950) A difficulty in the concept of social welfare. J\u00a0Political Econ 58(4):328\u2013346","journal-title":"J\u00a0Political Econ"},{"key":"329_CR4","doi-asserted-by":"crossref","unstructured":"Barbara D, Imielinski T (1994) Sleepers and workaholics: caching strategies in mobile environments. In: Proc of ACM SIGMOD, 1994, pp\u00a01\u201312","DOI":"10.1145\/191839.191844"},{"key":"329_CR5","doi-asserted-by":"crossref","unstructured":"Bayati A, Ghodsnia P, Basseda R, Rahgozar M (2006) A novel way of determining the optimal location of a fragment in a DDBS: BGBR. In: Proc of international conference on systems and networks communication (ICSNC), 2006","DOI":"10.1109\/ICSNC.2006.12"},{"key":"329_CR6","unstructured":"Casey R (1972) Allocation of copies of a file in an information network. In: Proc spring joint computer conf, IFIPS, 1972, pp\u00a0617\u2013625"},{"key":"329_CR7","unstructured":"Cay J, Tan KL, Ooi BC (1997) On incremental cache coherency schemes in mobile computing environments. In: Proc of IEEE ICDE, 1997, pp\u00a0114\u2013123"},{"issue":"10","key":"329_CR8","doi-asserted-by":"crossref","first-page":"885","DOI":"10.1109\/T-C.1969.222542","volume":"C-18","author":"W Chu","year":"1969","unstructured":"Chu W (1969) Optimal file allocation in a multiple computer system. IEEE Trans Comput C-18(10):885\u2013889","journal-title":"IEEE Trans Comput"},{"issue":"6","key":"329_CR9","doi-asserted-by":"crossref","first-page":"835","DOI":"10.1109\/90.650143","volume":"5","author":"M Crovella","year":"1997","unstructured":"Crovella M, Bestavros A (1997) Self-similarity in world wide web traffic: evidence and possible causes. IEEE\/ACM Trans Netw 5(6):835\u2013846","journal-title":"IEEE\/ACM Trans Netw"},{"key":"329_CR10","unstructured":"Eswaran K (1974) Placement of records in a file and file allocation in a computer network. Inf Process Lett 304\u2013307"},{"key":"329_CR11","volume-title":"Computers and intractability","author":"M Garey","year":"1979","unstructured":"Garey M, Johnson D (1979) Computers and intractability. W.H. Freeman, New York"},{"key":"329_CR12","unstructured":"Gerbia HA, Cenan C (2005) Distributed database replication\u2014a game theory? In: Proc of 7th international symposium on symbolic and numeric algorithms for scientific computing, 2005"},{"key":"329_CR13","doi-asserted-by":"crossref","unstructured":"Grassi V (2000) Prefetching policies for energy saving and latency reduction in a wireless broadcast data delivery system. In: Proc of ACM international workshop on modeling, 2000, pp\u00a077\u201384","DOI":"10.1145\/346855.346867"},{"key":"329_CR14","doi-asserted-by":"crossref","unstructured":"Hara T (2001) Effective replica allocation in ad hoc networks for improving data accessibility. In: Proc of IEEE INFOCOM, 2001, pp\u00a01568\u20131576","DOI":"10.1109\/INFCOM.2001.916653"},{"key":"329_CR15","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1023\/A:1024523411884","volume":"8","author":"T Hara","year":"2003","unstructured":"Hara T (2003) Replica allocation in ad hoc networks with data update. Mobile Netw Appl 8:343\u2013354","journal-title":"Mobile Netw Appl"},{"key":"329_CR16","unstructured":"Hara T, Madria SK (2004) Dynamic data replication using aperiodic updates in mobile ad hoc networks. In: Proc of 9th international conference on database systems for advance applications, 2004, pp\u00a0869\u2013881"},{"key":"329_CR17","doi-asserted-by":"crossref","unstructured":"Huang Y, Sistla P, Wolfson O (1994) Data replication for mobile computer. In: Proc of ACM SIGMOD, 1994, pp\u00a013\u201324","DOI":"10.1145\/191839.191845"},{"issue":"2","key":"329_CR18","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1023\/A:1013616213333","volume":"2","author":"J Jing","year":"1997","unstructured":"Jing J, Elmagarmid A, Helal A, Alonso R (1997) Bit-sequences: an adaptive cache invalidation method in mobile client\/server environments. Mobile Netw Appl 2(2):115\u2013127","journal-title":"Mobile Netw Appl"},{"key":"329_CR19","doi-asserted-by":"crossref","unstructured":"Johnson DB (1994) Routing in ad hoc networks of mobile hosts. In: Proc of IEEE workshop on mobile computing systems and applications, 1994, pp\u00a0158\u2013163","DOI":"10.1109\/WMCSA.1994.33"},{"key":"329_CR20","unstructured":"Khan SU, Ahmad I (2004) Heuristic-based replication schemas for fast information retrieval over the Internet. In: Proc of 17th international conference on parallel and distributed computing systems, 2004, pp\u00a0278\u2013283"},{"key":"329_CR21","unstructured":"Khan SU, Ahmad I (2005) A powerful direct mechanism for optimal WWW content replication. In: Proc of 19th IEEE International parallel and distributed processing symposium, 2005"},{"key":"329_CR22","unstructured":"Khan SU, Ahmad I (2005) RAMM: a game theoretical replica allocation and management mechanism. In: 8th International symposium on parallel architectures, algorithms, and networks (I-SPAN), Las Vegas, NV, USA, December 2005, pp\u00a0160\u2013165"},{"key":"329_CR23","unstructured":"Khan SU, Ahmad I (2006) A pure nash equilibrium guaranteeing game theoretical replica allocation method for reducing web access time. In: 12th international conference on parallel and distributed systems (ICPADS), Minneapolis, MN, USA, July 2006, pp\u00a0169\u2013176"},{"issue":"1","key":"329_CR24","first-page":"14","volume":"3","author":"SU Khan","year":"2006","unstructured":"Khan SU, Ahmad I (2006) Replicating data objects in large-scale distributed computing systems using extended Vickery auction. Int J Comput Intell 3(1):14\u201322","journal-title":"Int J Comput Intell"},{"issue":"1","key":"329_CR25","first-page":"105","volume":"31","author":"SU Khan","year":"2007","unstructured":"Khan SU, Ahmad I (2007) Discriminatory algorithmic mechanism design based WWW content replication. Informatica 31(1):105\u2013119","journal-title":"Informatica"},{"issue":"3","key":"329_CR26","first-page":"346","volume":"20","author":"SU Khan","year":"2009","unstructured":"Khan SU, Ahmad I (2009) A pure Nash equilibrium-based game theoretical method for data replication across multiple servers. IEEE Trans Knowl Data Eng 20(3):346\u2013360","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"329_CR27","doi-asserted-by":"crossref","unstructured":"Loukopoulos T, Ahmad I, Papadias D (2002) An overview of data replication on the Internet. In: Proc of ISPAN, 2002, pp\u00a031\u201336","DOI":"10.1109\/ISPAN.2002.1004257"},{"issue":"1","key":"329_CR28","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1145\/320434.320449","volume":"1","author":"S Mahmoud","year":"1976","unstructured":"Mahmoud S, Riordon J (1976) Optimal allocation of resources in distributed information networks. ACM Trans Database Syst 1(1):66\u201378","journal-title":"ACM Trans Database Syst"},{"key":"329_CR29","unstructured":"Nisan N, Ronen A (1999) Algorithmic mechanism design. In: Proc 31st annual ACM symposium on theory of computing (STOC \u201999), 1999, pp\u00a0129\u2013140"},{"key":"329_CR30","volume-title":"A course in game theory","author":"M Osborne","year":"1994","unstructured":"Osborne M, Rubinstein A (1994) A course in game theory. MIT Press, Cambridge"},{"issue":"8","key":"329_CR31","doi-asserted-by":"crossref","first-page":"1395","DOI":"10.1109\/49.779922","volume":"17","author":"MR Pearlman","year":"1999","unstructured":"Pearlman MR, Haas ZJ (1999) Determining the optimal configuration for the zone routing protocol. IEEE J Select Areas Commun 17(8):1395\u20131414","journal-title":"IEEE J Select Areas Commun"},{"key":"329_CR32","unstructured":"Perkins CE, Bhagwat P (1994) Highly dynamic destination-sequenced distance-vector routing for mobile computers. In: Proc of ACM SIGCOMM, 1994, pp\u00a0234\u2013244"},{"key":"329_CR33","unstructured":"Perkins CE, Royer EM (1999) Ad hoc on demand distance vector routing. In: Proc of IEEE workshop on mobile computing systems and applications, 1999, pp\u00a090\u2013100"},{"key":"329_CR34","doi-asserted-by":"crossref","unstructured":"Pitoura E, Bhargava B (1995) Maintaining consistency of data in mobile distributed environments. In: Proc of IEEE ICDCS, 1995, pp\u00a0404\u2013413","DOI":"10.1109\/ICDCS.1995.500045"},{"key":"329_CR35","volume-title":"Wireless communications: principles and practices","author":"TS Rappaport","year":"1996","unstructured":"Rappaport TS (1996) Wireless communications: principles and practices. Prentice Hall, New York"},{"key":"329_CR36","unstructured":"Saurabh S, Parkes D (2004) Hard-to-manipulate VCG-based auctions. Technical Report, Harvard University"},{"key":"329_CR37","volume-title":"The mathematical theory of information","author":"CE Shannon","year":"1949","unstructured":"Shannon CE (1949) The mathematical theory of information. University of Illinois Press, Urbana, 1949"},{"key":"329_CR38","doi-asserted-by":"crossref","unstructured":"Vickrey W (1961) Counterspeculation, auctions and competitive sealed tenders, J Finance 8\u201337","DOI":"10.1111\/j.1540-6261.1961.tb02789.x"},{"key":"329_CR39","unstructured":"Wu KL, Yu PS, Chen MS (1996) Energy-efficient caching for wireless mobile computing. In: Proc of IEEE ICDE, 1996, pp\u00a0336\u2013343"},{"key":"329_CR40","volume-title":"Human behavior and the principle of least-effort","author":"G Zipf","year":"1949","unstructured":"Zipf G (1949) Human behavior and the principle of least-effort. Addison-Wesley, Cambridge"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-009-0329-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-009-0329-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-009-0329-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T06:23:59Z","timestamp":1559370239000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-009-0329-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,9,4]]},"references-count":40,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2011,3]]}},"alternative-id":["329"],"URL":"https:\/\/doi.org\/10.1007\/s11227-009-0329-y","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,9,4]]}}}