{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T15:47:06Z","timestamp":1648828026219},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2015,2,24]],"date-time":"2015-02-24T00:00:00Z","timestamp":1424736000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1007\/s11227-015-1393-0","type":"journal-article","created":{"date-parts":[[2015,2,23]],"date-time":"2015-02-23T14:50:46Z","timestamp":1424703046000},"page":"2177-2189","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A trust value-based scheme for efficient contents sharing over mobile P2P networks"],"prefix":"10.1007","volume":"71","author":[{"given":"Sejin","family":"Kim","sequence":"first","affiliation":[]},{"given":"Hyerim","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Sung Jo","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,2,24]]},"reference":[{"key":"1393_CR1","doi-asserted-by":"crossref","unstructured":"Chang S-Y, Lai C-F, Huang Y-M (2012) Dynamic adjustable multimedia streaming service architecture over cloud computing. Comput Commun 35:1798\u20131808","DOI":"10.1016\/j.comcom.2012.06.001"},{"key":"1393_CR2","unstructured":"Ham K-G, Kim K-Y, Choi S-G (2011) A functional architecture for user-centric multimedia service on mobile station. In: Proceedings of advanced communication technology (ICACT), vol 15. IEEE, Seoul"},{"key":"1393_CR3","unstructured":"Benevenuto F, Pereira A, Rodrigues T, Almeida V, Almeida J, Gon\u00e7alves M (2010) Characterization and analysis of user profiles in online video sharing systems. J Inf Data Manag 1(2):261\u2013275"},{"key":"1393_CR4","doi-asserted-by":"crossref","unstructured":"Chang B, Dai L, Cui Y, Xue Y (2008) On feasibility of P2P on-demand streaming via empirical VoD user behavior analysis. In: Proceedings of distributed computing systems workshops, pp 7\u201311","DOI":"10.1109\/ICDCS.Workshops.2008.94"},{"key":"1393_CR5","doi-asserted-by":"crossref","unstructured":"Djatmiko M, Boreli R, Seneviratne A, Ries S (2011) Trust-based content distribution for mobile Ad Hoc networks. In: Proceedings of MASCOTS, pp 433\u2013436","DOI":"10.1109\/MASCOTS.2011.48"},{"key":"1393_CR6","doi-asserted-by":"crossref","unstructured":"Yoon H, Kim JW, Tan F, Hsieh R (2008) On-demand video streaming in mobile opportunistic networks. In: Proceedings of pervasive computing and communications, PerCom 2008, sixth annual IEEE international conference on IEEE, pp 80\u201389","DOI":"10.1109\/PERCOM.2008.18"},{"key":"1393_CR7","unstructured":"Iyer T, Hsieh R, Rizvandi NB, Varghese B, Boreli R (2012) Mobile P2P trusted on-demand video streaming. In: Proceedings of local computer network conference (LCN 2011), pp 45\u201347"},{"key":"1393_CR8","doi-asserted-by":"crossref","unstructured":"Jia J, Meng C (2009) A cluster-based peer-to-peer file sharing protocol for mobile Ad Hoc networks. In: Proceedings of international symposium on computer network and multimedia technology, p 18\u201320","DOI":"10.1109\/CNMT.2009.5374744"},{"key":"1393_CR9","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1109\/TMC.2012.239","volume":"13","author":"K Chen","year":"2014","unstructured":"Chen K, Shen H, Zhang H (2014) Leveraging social networks for P2P content-based file sharing in disconnected MANETs. Mobile Comput 13:235\u2013249","journal-title":"Mobile Comput"},{"key":"1393_CR10","unstructured":"Liu L, Jing Y, Zhang Y, Xia B (2013) A survey on P2P file sharing algorithms over MANETs. In: Proceedings of consumer electronics times, pp 109\u2013115"},{"key":"1393_CR11","unstructured":"Karthikeyan V, Vinod A, Jeyakumar P (2014) An energy efficient neighbor node discovery method for wireless sensor networks. http:\/\/arxiv.org\/abs\/1402.3655"},{"key":"1393_CR12","doi-asserted-by":"crossref","first-page":"478","DOI":"10.1007\/978-3-540-69170-9_33","volume":"5067","author":"V Dyo","year":"2008","unstructured":"Dyo V, Mascolo C (2008) Efficient node discovery in mobile wireless sensor networks. Lect Notes Comput Sci 5067:478\u2013485","journal-title":"Lect Notes Comput Sci"},{"key":"1393_CR13","unstructured":"Humayun B (2011) Survey of routing protocols for mobile Ad-Hoc network. Int J Inf Commun Technol Res 1(6):258\u2013269"},{"key":"1393_CR14","doi-asserted-by":"crossref","unstructured":"Boukerche Turgut B, Aydin N, Ahmad MZ, Boloni L, Turgut D (2011) Routing protocols in Ad Hoc networks: a survey. Comput Netw 55:3032\u20133080","DOI":"10.1016\/j.comnet.2011.05.010"},{"key":"1393_CR15","doi-asserted-by":"crossref","first-page":"745","DOI":"10.1007\/s10586-013-0257-8","volume":"16","author":"HS Lee","year":"2013","unstructured":"Lee HS, Lim KH, Kim SJ (2013) A configuration scheme for connectivity-aware mobile P2P networks for efficient mobile cloud-based video streaming services. Clust Comput 16:745\u2013756","journal-title":"Clust Comput"},{"key":"1393_CR16","doi-asserted-by":"crossref","unstructured":"Li F, Wu J (2009) MOPS: providing content-based service in disruption-tolerant networks. In: Proceedings of 29th IEEE international conference on ICDCS \u201909, pp 526\u2013533","DOI":"10.1109\/ICDCS.2009.28"},{"key":"1393_CR17","doi-asserted-by":"crossref","unstructured":"Qureshi B, Min G, Kouvatsos D, Ilyas M (2010) An adaptive content sharing protocol for P2P mobile social networks. In: Proceedings of advanced information networking and applications workshops (WAINA), pp 413\u2013418","DOI":"10.1109\/WAINA.2010.12"},{"key":"1393_CR18","unstructured":"Euler\u2013Mascheroni constant. http:\/\/mathworld.wolfram.com\/Euler-MascheroniConstant.html"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-015-1393-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-015-1393-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-015-1393-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T06:40:39Z","timestamp":1559371239000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-015-1393-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,2,24]]},"references-count":18,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2015,6]]}},"alternative-id":["1393"],"URL":"https:\/\/doi.org\/10.1007\/s11227-015-1393-0","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,2,24]]}}}