{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:39:03Z","timestamp":1740123543322,"version":"3.37.3"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2020,4,10]],"date-time":"2020-04-10T00:00:00Z","timestamp":1586476800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,4,10]],"date-time":"2020-04-10T00:00:00Z","timestamp":1586476800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100012456","name":"National Social Science Foundation of China","doi-asserted-by":"crossref","award":["18BXW118"],"award-info":[{"award-number":["18BXW118"]}],"id":[{"id":"10.13039\/501100012456","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2020,10]]},"DOI":"10.1007\/s11227-020-03230-0","type":"journal-article","created":{"date-parts":[[2020,4,10]],"date-time":"2020-04-10T10:03:02Z","timestamp":1586512982000},"page":"8343-8356","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Predator\u2013prey approach in modeling users\u2019 data packets forwarding"],"prefix":"10.1007","volume":"76","author":[{"given":"Yaming","family":"Zhang","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0456-3826","authenticated-orcid":false,"given":"Yaya H.","family":"Koura","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yanyuan","family":"Su","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2020,4,10]]},"reference":[{"unstructured":"Takashi M, Takashi K, Michihiro A (2003) Enhancing the network scalability of link-state routing protocols by reducing their flooding overhead. In: Proceedings of IEEE Workshop on High Performance Switching and Routing (HPSR), pp. 263\u2013268","key":"3230_CR1"},{"issue":"2","key":"3230_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5121\/ijngn.2014.6201","volume":"6","author":"BE Youssef","year":"2014","unstructured":"Youssef BE (2014) Online social network internetworking analysis. Int J Next Gener Netw 6(2):1","journal-title":"Int J Next Gener Netw"},{"key":"3230_CR3","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1126\/science.286.5439.509","volume":"286","author":"A-L Barab\u00e1si","year":"1999","unstructured":"Barab\u00e1si A-L, Albert R (1999) Emergence of scaling in random networks. Science 286:509\u2013512","journal-title":"Science"},{"key":"3230_CR4","doi-asserted-by":"publisher","first-page":"046103","DOI":"10.1103\/PhysRevE.75.046103","volume":"75","author":"F Sorrentino","year":"2007","unstructured":"Sorrentino F, di Bernardo M, Garofalo F, Chen G (2007) Controllability of complex networks via pinning. Phys Rev E 75:046103","journal-title":"Phys Rev E"},{"key":"3230_CR5","volume-title":"The structure and dynamics of networks","author":"M Newman","year":"2006","unstructured":"Newman M, Barab\u00e1si A-L, Watts DJ (2006) The structure and dynamics of networks. Princeton Univ. Press, Princeton"},{"key":"3230_CR6","volume-title":"Modern operating system","author":"AS Tanenbaum","year":"2009","unstructured":"Tanenbaum AS (2009) Modern operating system, 3rd edn. Vrije Universiteity Amsterdam, Pearson Education Inc., Amsterdam","edition":"3"},{"key":"3230_CR7","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199211517.001.0001","volume-title":"Scale-free networks: complex websin nature and technology","author":"G Caldarelli","year":"2007","unstructured":"Caldarelli G (2007) Scale-free networks: complex websin nature and technology. Oxford Univ. Press, Oxford"},{"issue":"4","key":"3230_CR8","doi-asserted-by":"publisher","first-page":"043106","DOI":"10.1063\/1.4896333","volume":"24","author":"HF Zhang","year":"2014","unstructured":"Zhang HF, Xie JR, Tang M, Lai YC (2014) Suppression of epidemic spreading in complex networks by local information based behavioral responses. Chaos 24(4):043106","journal-title":"Chaos"},{"issue":"6","key":"3230_CR9","doi-asserted-by":"publisher","first-page":"1817","DOI":"10.1073\/pnas.0608099104","volume":"104","author":"D Gfeller","year":"2017","unstructured":"Gfeller D, De Los RP, Caflisch A, Rao F (2017) Complex network analysis of free-energy landscapes. Proc Natl Acad Sci USA 104(6):1817\u20131822","journal-title":"Proc Natl Acad Sci USA"},{"key":"3230_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/0169-7552(89)90019-6","volume":"17","author":"D-M Chiu","year":"1989","unstructured":"Chiu D-M, Jain R (1989) Analysis of increase and decrease algorithms for congestion avoidance in computer networks. Comput Netw ISDN Syst 17:1\u201314","journal-title":"Comput Netw ISDN Syst"},{"issue":"3","key":"3230_CR11","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1109\/SURV.2010.042710.00114","volume":"12","author":"A Afanasyev","year":"2010","unstructured":"Afanasyev A, Tilley N, Reiher P, Kleinrock L (2010) Host-to-host congestion control for TCP. IEEE Commun Surv Tutor 12(3):301\u2013342","journal-title":"IEEE Commun Surv Tutor"},{"issue":"4","key":"3230_CR12","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1145\/309746.309756","volume":"26","author":"L Dowdy","year":"1999","unstructured":"Dowdy L, Rosti E, Smirni E (1999) Scheduling issues in high performance computing. ACM SIGMETRICS Perform Eval Rev 26(4):60\u201369. https:\/\/doi.org\/10.1145\/309746.309756","journal-title":"ACM SIGMETRICS Perform Eval Rev"},{"unstructured":"ITU-T (2004) Traffic control and congestion control in B ISDN. Recommendation I.371. International Telecommunication Union, p 17","key":"3230_CR13"},{"issue":"2","key":"3230_CR14","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1109\/90.842137","volume":"8","author":"J Padhye","year":"2000","unstructured":"Padhye J, Firoiu V, Towsley D, Kurose J (2000) Modeling TCP Reno performance: a simple model and its empirical validation. IEEE\/ACM Trans Netw 8(2):133\u2013145","journal-title":"IEEE\/ACM Trans Netw"},{"issue":"9","key":"3230_CR15","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1109\/MCOM.2013.6588663","volume":"51","author":"L Jin","year":"2013","unstructured":"Jin L, Chen Y, Wang T, Hui P, Vasilakos AV (2013) Understanding user behavior in online social networks: a survey. IEEE Commun Mag 51(9):144\u2013150","journal-title":"IEEE Commun Mag"},{"unstructured":"Iyengar J, Thomson M (2016) QUIC: a UDP-based multiplexed and secure transport. Draft-Cheng-ICCRG-Delivery-Rate-Estimation","key":"3230_CR16"},{"key":"3230_CR17","volume-title":"Spatiotemporal analysis of user-generated data on the social web","author":"SAEA Mohamed","year":"2012","unstructured":"Mohamed SAEA, Abdelmoty AI (2012) Spatiotemporal analysis of user-generated data on the social web. Cardiff University, Cardiff"},{"doi-asserted-by":"crossref","unstructured":"Bui L, Eryilmaz A, Srikant R, Wu X (2006) Joint asynchronous congestion control and distributed scheduling for wireless networks. In: Proceedings of IEEE Infocom","key":"3230_CR18","DOI":"10.1109\/INFOCOM.2006.210"},{"doi-asserted-by":"crossref","unstructured":"Neely MJ, Modiano E, Li C (2005) Fairness and optimal stochastic control for heterogeneous networks. In: Proceedings of IEEE Infocom, Miami, FL, pp 1723\u20131734","key":"3230_CR19","DOI":"10.1109\/INFCOM.2005.1498453"},{"issue":"1","key":"3230_CR20","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1109\/JSAC.2004.837362","volume":"23","author":"Y Wu","year":"2005","unstructured":"Wu Y, Chou PA, Zhang Q, Jain K, Zhu W, Kung S-Y (2005) Network planning in wireless ad-hoc networks: a cross-layer approach. IEEE J Sel Areas Commun 23(1):136\u2013150","journal-title":"IEEE J Sel Areas Commun"},{"key":"3230_CR21","doi-asserted-by":"publisher","first-page":"543","DOI":"10.1006\/jmaa.2001.7633","volume":"263","author":"S Walcher","year":"2001","unstructured":"Walcher S (2001) On cooperative systems with respect to arbitrary orderings. J Math Anal Appl 263:543\u2013554","journal-title":"J Math Anal Appl"},{"key":"3230_CR22","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1016\/j.inffus.2019.06.003","volume":"53","author":"L Xiao","year":"2020","unstructured":"Xiao L, Ming Z, Anfeng L, Wong KKL (2020) Adjusting forwarder nodes and duty cycle using packet aggregation routing for body sensor networks. Inf Fusion 53:183\u2013195","journal-title":"Inf Fusion"},{"issue":"2","key":"3230_CR23","doi-asserted-by":"publisher","first-page":"1950","DOI":"10.1109\/COMST.2018.2880444","volume":"21","author":"L Zhuo","year":"2019","unstructured":"Zhuo L, Xu Y, Zhang B, Liu Y, Liu K (2019) Packet forwarding in named data networking requirements and survey of solutions. IEEE Commun Surv Tutor 21(2):1950\u20131987","journal-title":"IEEE Commun Surv Tutor"},{"issue":"6","key":"3230_CR24","doi-asserted-by":"publisher","first-page":"3317","DOI":"10.1007\/s11227-018-2517-0","volume":"75","author":"R Sun","year":"2019","unstructured":"Sun R, Shi L, Chunyong Y, Wang J (2019) An improved method in deep packet inspection based on regular expression. J Supercomput 75(6):3317\u20133333","journal-title":"J Supercomput"},{"issue":"10","key":"3230_CR25","doi-asserted-by":"publisher","first-page":"243","DOI":"10.3390\/info9100243","volume":"9","author":"MM Dalbert","year":"2018","unstructured":"Dalbert MM, Moraes IM (2018) PIF and ReCiF: efficient interest-packet forwarding mechanisms for named-data wireless mesh networks. Information 9(10):243","journal-title":"Information"},{"key":"3230_CR26","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/j.comcom.2017.11.011","volume":"116","author":"I Takeru","year":"2018","unstructured":"Takeru I, Toru M, Mizutania K, Shin-ichi M, Akashi O (2018) Fast packet classification algorithm for network-wide forwarding behaviors. Comput Commun 116:101\u2013117","journal-title":"Comput Commun"},{"issue":"2","key":"3230_CR27","doi-asserted-by":"publisher","first-page":"1135","DOI":"10.1007\/s10586-017-0763-1","volume":"20","author":"J Kim","year":"2017","unstructured":"Kim J, Lee W, Song J, Lee S-B (2017) Optimized combinatorial clustering for stochastic processes. Clust Comput 20(2):1135\u20131148","journal-title":"Clust Comput"},{"issue":"1","key":"3230_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TNET.2009.2020799","volume":"18","author":"G Lu","year":"2010","unstructured":"Lu G, Chen Y, Birrer S, Bustamante FE (2010) POPI: a user-level tool for inferring router packet forwarding priority. IEEE\/ACM Trans Netw 18(1):1\u201314","journal-title":"IEEE\/ACM Trans Netw"},{"key":"3230_CR29","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/j.aml.2018.07.030","volume":"87","author":"W Zheng","year":"2019","unstructured":"Zheng W, Sugie J (2019) Uniform global asymptotic stability of time-varying Lotka\u2013Volterra predator\u2013prey systems. Appl Math Lett 87:125\u2013133","journal-title":"Appl Math Lett"},{"key":"3230_CR30","doi-asserted-by":"publisher","first-page":"2619","DOI":"10.1080\/00036811.2018.1469007","volume":"98","author":"X Wang","year":"2019","unstructured":"Wang X, Lin G (2019) Traveling waves for a periodic Lotka\u2013Volterra predator\u2013prey system. Appl Anal 98:2619\u20132638","journal-title":"Appl Anal"},{"key":"3230_CR31","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/BFb0092378","volume":"1714","author":"HL Smith","year":"1999","unstructured":"Smith HL (1999) Dynamics of competition, in mathematics inspired by biology. Math Inspired Biol 1714:191\u2013240","journal-title":"Math Inspired Biol"},{"key":"3230_CR32","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/0022-0396(86)90086-0","volume":"64","author":"HL Smith","year":"1986","unstructured":"Smith HL (1986) Periodic competitive differential equations and the discrete dynamics of competitive maps. J Differ Equ 64:165\u2013194","journal-title":"J Differ Equ"},{"issue":"1982","key":"3230_CR33","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1137\/0513013","volume":"13","author":"MW Hirsch","year":"1982","unstructured":"Hirsch MW (1982) Systems of differential equations which are competitive or cooperative 1: limit sets. SIAM J Appl Math 13(1982):167\u2013179","journal-title":"SIAM J Appl Math"},{"key":"3230_CR34","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1137\/0148008","volume":"48","author":"J Hainzl","year":"1988","unstructured":"Hainzl J (1988) Stability and Hopf bifurcation in a predator\u2013prey system with several parameters. SIAM J Appl Math 48:170\u2013190","journal-title":"SIAM J Appl Math"},{"key":"3230_CR35","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/s10255-004-0159-x","volume":"20","author":"J Huang","year":"2004","unstructured":"Huang J, Xiao D (2004) Analyses of bifurcations and stability in a predator\u2013prey system with Holling type-IV functional response. Acta Math Appl Sin Engl Ser 20:167\u2013178","journal-title":"Acta Math Appl Sin Engl Ser"},{"key":"3230_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/S0304-3800(00)00442-7","volume":"142","author":"M Hesaaraki","year":"2001","unstructured":"Hesaaraki M, Moghadas SM (2001) Existence of limit cycles for predator\u2013prey systems with a class of functional responses. Ecol Model 142:1\u20139","journal-title":"Ecol Model"},{"key":"3230_CR37","doi-asserted-by":"publisher","first-page":"1094","DOI":"10.2307\/1936149","volume":"56","author":"WW Murdoch","year":"1975","unstructured":"Murdoch WW, Avery S, Smyth MEB (1975) Switching in predatory fish. Ecology 56:1094\u20131105","journal-title":"Ecology"},{"key":"3230_CR38","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1890\/0012-9658(2002)083[0028:MIBPCG]2.0.CO;2","volume":"83","author":"D Alonso","year":"2002","unstructured":"Alonso D, Bartumeus F, Catalan J (2002) Mutual interference between predators can give rise to Turing spatial patterns. Ecology 83:28\u201334","journal-title":"Ecology"},{"key":"3230_CR39","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1016\/S0022-5193(89)80211-5","volume":"139","author":"R Arditi","year":"1989","unstructured":"Arditi R, Ginzburg LR (1989) Coupling in predator\u2013prey dynamics: ratio-dependence. J Theor Biol 139:311\u2013326","journal-title":"J Theor Biol"},{"key":"3230_CR40","first-page":"3","volume":"45","author":"CS Holling","year":"1965","unstructured":"Holling CS (1965) The functional response of predators to prey density and its rule in mimicry and population regulation. Mem Entomol Soc Can 45:3\u201360","journal-title":"Mem Entomol Soc Can"},{"key":"3230_CR41","doi-asserted-by":"publisher","first-page":"105104","DOI":"10.1016\/j.cnsns.2019.105104","volume":"83","author":"Y Zhang","year":"2020","unstructured":"Zhang Y, Koura YH, Su Y (2020) Competitive interaction model with Holling type and application to IP network data packets forwarding. Commun Nonlinear Sci Numer Simul 83:105104","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"3230_CR42","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2017\/3971803","volume":"2017","author":"YH Koura","year":"2017","unstructured":"Koura YH, Zhang Y, Liu H (2017) Competitive interaction model for online social networks\u2019 users\u2019 data forwarding at a subnet. Math Probl Eng 2017:1\u20139","journal-title":"Math Probl Eng"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-020-03230-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-020-03230-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-020-03230-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,9]],"date-time":"2021-04-09T23:58:19Z","timestamp":1618012699000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-020-03230-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,10]]},"references-count":42,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2020,10]]}},"alternative-id":["3230"],"URL":"https:\/\/doi.org\/10.1007\/s11227-020-03230-0","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"type":"print","value":"0920-8542"},{"type":"electronic","value":"1573-0484"}],"subject":[],"published":{"date-parts":[[2020,4,10]]},"assertion":[{"value":"10 April 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that there is no conflict of interests regarding the publication of this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interests"}}]}}