{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,2]],"date-time":"2023-09-02T23:44:29Z","timestamp":1693698269538},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2014,12,19]],"date-time":"2014-12-19T00:00:00Z","timestamp":1418947200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2015,7]]},"DOI":"10.1007\/s11276-014-0876-x","type":"journal-article","created":{"date-parts":[[2014,12,19]],"date-time":"2014-12-19T06:58:08Z","timestamp":1418972288000},"page":"1699-1711","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["HCS: hierarchical cluster-based forwarding scheme for mobile social networks"],"prefix":"10.1007","volume":"21","author":[{"given":"Sun-Kyum","family":"Kim","sequence":"first","affiliation":[]},{"given":"Ji-Hyeun","family":"Yoon","sequence":"additional","affiliation":[]},{"given":"Junyeop","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Sung-Bong","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,12,19]]},"reference":[{"issue":"9","key":"876_CR1","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1109\/MCOM.2010.5560597","volume":"48","author":"M Conti","year":"2010","unstructured":"Conti, M., Giordano, S., May, M., & Passarella, A. (2010). From opportunistic networks to opportunistic computing networks. IEEE Communications Magazine, 48(9), 126\u2013139.","journal-title":"IEEE Communications Magazine"},{"key":"876_CR2","doi-asserted-by":"crossref","unstructured":"Hui, P., Chaintreau, A., Scott, J., Gass, R., Crowcroft, J., & Diot, C. (2005). Pocket switched networks and human mobility in conference environments. In Proceedings of ACM SIGCOMM Workshop on Delay-Tolerant Networking (WDTN 2005) (pp. 244\u2013251).","DOI":"10.1145\/1080139.1080142"},{"key":"876_CR3","unstructured":"Lindgren, A., & Doria, A. (2007). Experiences from deploying a reallife dtn system. In Proceedings of IEEE Consumer Communications and Networking Conference (CCNC) (pp. 217\u2013221)."},{"key":"876_CR4","doi-asserted-by":"crossref","unstructured":"Juang, P., Oki, H., Wang, Y., Maronosi, M., Peh, L., & Rubenstein, D. (2002). Energy-efficient computing for wildlife tracking: Design tradeoffs and early experiences with zebraNet. In Proceedings of Architectural Support for Programming Languages and Operating Systems (ASPLOS) (pp. 96\u2013107).","DOI":"10.1145\/605397.605408"},{"key":"876_CR5","doi-asserted-by":"crossref","unstructured":"Small, T., & Haas, Z. J. (2003). The shared wireless infestation model: A new ad hoc networking paradigm (or where there is a whale, there is a way). In Proceedings of MobiHoc (pp. 234\u2013244).","DOI":"10.1145\/778415.778443"},{"issue":"2","key":"876_CR6","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/s11276-012-0457-9","volume":"19","author":"Y Zeng","year":"2013","unstructured":"Zeng, Y., Xiang, K., Li, D., & Vaslakos, A. V. (2013). Directional routing and scheduling for green vehicular delay tolerant networks. Wireless Networks, 19(2), 161\u2013173.","journal-title":"Wireless Networks"},{"issue":"3","key":"876_CR7","first-page":"193","volume":"3","author":"H Zafar","year":"2011","unstructured":"Zafar, H., Alhamahmy, N., Harle, D., & Andonovic, I. (2011). Survey of reactive and hybrid routing protocols for mobile ad hoc networks. Communication Networks and Information Security, 3(3), 193\u2013202.","journal-title":"Communication Networks and Information Security"},{"issue":"8","key":"876_CR8","doi-asserted-by":"crossref","first-page":"2349","DOI":"10.1007\/s11276-010-0276-9","volume":"16","author":"T Spyropoulos","year":"2010","unstructured":"Spyropoulos, T., Rais, R. N., Turletti, T., Obraczka, K., & Vasilakos, A. (2010). Routing for disruption tolerant networks: Taxonomy and design. Wireless Networks, 16(8), 2349\u20132370.","journal-title":"Wireless Networks"},{"key":"876_CR9","doi-asserted-by":"crossref","unstructured":"Hui, P., Xu, K., Li, V., Crowcroft, J., Latora, V., & Lio, P. (2009). Selfishness, altruism and message spreading in mobile social networks. In Proceedings of IEEE INFOCOM Workshop (pp. 1\u20136).","DOI":"10.1109\/INFCOMW.2009.5072186"},{"issue":"1","key":"876_CR10","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/MC.2010.19","volume":"43","author":"M Conti","year":"2010","unstructured":"Conti, M., & Kumar, M. (2010). Opportunities in opportunistic computing. IEEE Computer, 43(1), 42\u201350.","journal-title":"IEEE Computer"},{"key":"876_CR11","unstructured":"C. Bordrini, M. Conti, and A. Passarella (2011). Modeling social-aware forwarding in opportunistic networks. Performance Evaluation of Computer and Communication Systems, 6821 (LNCS), 141\u2013152."},{"issue":"6","key":"876_CR12","doi-asserted-by":"crossref","first-page":"1874","DOI":"10.1109\/TWC.2010.06.081216","volume":"9","author":"H Dang","year":"2010","unstructured":"Dang, H., & Wu, H. (2010). Clustering and cluster-based routing protocol for delay-tolerant mobile networks. IEEE Transactions on Wireless Communications, 9(6), 1874\u20131881.","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"876_CR13","unstructured":"Liu, C., & Wu, J. (2009). Scalable routing in delay tolerant networks. In Proceedings of MobiHoc (pp. 51\u201360)."},{"key":"876_CR14","unstructured":"Cambridge University (2009). Online edition (c), chapter hierarchical clustering, pp. 377\u2013401."},{"issue":"9","key":"876_CR15","doi-asserted-by":"crossref","first-page":"1056","DOI":"10.1016\/j.comcom.2010.01.013","volume":"33","author":"C Boldrini","year":"2010","unstructured":"Boldrini, C., & Passarella, A. (2010). HCMM: Modelling spatial and temporal properties of human mobility driven by users\u2019 social relationships. Computer Communications, 33(9), 1056\u20131074.","journal-title":"Computer Communications"},{"key":"876_CR16","doi-asserted-by":"crossref","unstructured":"Wu, J., Xiao, M., & Huang, L. (2013). Homing spread: Community home-based multi-copy routing in mobile social networks. In Proceedings of IEEE INFOCOM (pp. 138\u2013146).","DOI":"10.1109\/INFCOM.2013.6567036"},{"issue":"1","key":"876_CR17","doi-asserted-by":"crossref","first-page":"19","DOI":"10.5626\/JCSE.2011.5.1.019","volume":"5","author":"JH Kim","year":"2011","unstructured":"Kim, J. H., Lee, K. J., Kim, T. H., & Yang, S. B. (2011). Effective routing schemes for double-layered peer-to-peer systems in manet. Journal of Computing Science Engineering, 5(1), 19\u201331.","journal-title":"Journal of Computing Science Engineering"},{"key":"876_CR18","unstructured":"Vahdat, A., & Becker, D. (2000). Epidemic routing for partially-connected ad hoc networks. Technical Report CS-2000-06."},{"key":"876_CR19","doi-asserted-by":"crossref","unstructured":"Spyropoulos, T., Psounis, K., & Raghavendra, C. (2005). Spray and wait: An efficient routing scheme for intermittently connected mobile networks. In Proceedings of ACM SIGCOMM (pp. 252\u2013259).","DOI":"10.1145\/1080139.1080143"},{"key":"876_CR20","doi-asserted-by":"crossref","unstructured":"Hua, D., Du, X., Qian, Y., & Yan, S. (2009). A DTN routing protocol based on hierarchy forwarding and cluster control. In Proceedings of IEEE Computational Intelligence and Security (pp. 397\u2013401).","DOI":"10.1109\/CIS.2009.150"},{"key":"876_CR21","unstructured":"Alresaini, M., Sathiamoorthy, M., Krishnamachari, B., & Neely, M. J. (2012). Backpressure with adaptive redundancy. In Proceedings of IEEE INFOCOM (pp. 2300\u20132308)."},{"key":"876_CR22","doi-asserted-by":"crossref","unstructured":"Dvir, A., & Vasilakous, A. V. (2010). Backpressure-based routing protocol for DTNs. In Proceedings of ACM SIGCOMM (pp. 405\u2013406).","DOI":"10.1145\/1851182.1851233"},{"key":"876_CR23","unstructured":"Kim,S. K., Choi, J. H., & Yang, S. B. (in press). Hotspot: Location-based forwarding scheme in an opportunistic network. Ad hoc & Sensor Wireless Networks."},{"key":"876_CR24","doi-asserted-by":"crossref","unstructured":"Daly,E. H., & Haahr, M. (2007). Social network analysis for routing in disconnected delay-tolerant manets. In Proceedings of ACM MobiHoc (pp. 32\u201340).","DOI":"10.1145\/1288107.1288113"},{"issue":"11","key":"876_CR25","doi-asserted-by":"crossref","first-page":"1576","DOI":"10.1109\/TMC.2010.246","volume":"10","author":"P Hui","year":"2011","unstructured":"Hui, P., Crowcroft, J., & Yoneki, E. (2011). Bubble rap: Social-based forwarding in delay tolerant networks. IEEE Transactions on Mobile Computing, 10(11), 1576\u20131589.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"876_CR26","doi-asserted-by":"crossref","unstructured":"Mei, A., Morabitto, G., Santi, P., & Stefa, J. (2011). Social-aware stateless forwarding in pocket switched networks. In Proceedings of IEEE INFOCOM (pp. 251\u2013255).","DOI":"10.1109\/INFCOM.2011.5935076"},{"key":"876_CR27","doi-asserted-by":"crossref","unstructured":"Hui, P., & Crowcroft, J. (2007). How small labels create big improvements. In Proceedings of Pervasive Computing and Communications Workshop (pp. 65\u201370).","DOI":"10.1109\/PERCOMW.2007.55"},{"issue":"5","key":"876_CR28","doi-asserted-by":"crossref","first-page":"633","DOI":"10.1016\/j.pmcj.2008.04.003","volume":"4","author":"C Boldrini","year":"2008","unstructured":"Boldrini, C., Conti, M., & Passarella, A. (2008). Exploiting users\u2019 social relations to forward data in opportunistic networks: The HiBop solution. Pervasive and Mobile Computing, 4(5), 633\u2013657.","journal-title":"Pervasive and Mobile Computing"},{"key":"876_CR29","doi-asserted-by":"crossref","unstructured":"Lindgren, A., Doria, A., & Schelen, O. (2004). Probabilistic routing in intermittently connected networks. Service Assurance with Partial and Intermittent Resources, 3126 (LNCS), 239\u2013254.","DOI":"10.1007\/978-3-540-27767-5_24"},{"key":"876_CR30","doi-asserted-by":"crossref","unstructured":"Mtibaa, A., May, M., Diot, C., & Ammar, M. (2010). PeopleRank: Social opportunistic forwarding. In Proceedings of IEEE INFOCOM (pp. 1\u20135).","DOI":"10.1109\/INFCOM.2010.5462261"},{"issue":"10","key":"876_CR31","doi-asserted-by":"crossref","first-page":"1171","DOI":"10.1002\/wcm.520","volume":"7","author":"J Leguay","year":"2007","unstructured":"Leguay, J., Friedman, T., & Conan, V. (2007). Evaluating MobySpace based routing strategies in delay tolerant networks. Wireless Communications and Mobile Computing, 7(10), 1171\u20131182.","journal-title":"Wireless Communications and Mobile Computing"},{"key":"876_CR32","doi-asserted-by":"crossref","first-page":"025102","DOI":"10.1103\/PhysRevE.64.025102","volume":"64","author":"MEJ Newman","year":"2001","unstructured":"Newman, M. E. J. (2001). Clustering and preferential attachment in growing networks. Physical Review Letters, E 64, 025102.","journal-title":"Physical Review Letters, E"},{"key":"876_CR33","unstructured":"Network simulator-2. http:\/\/www.isi.edu\/nsnam\/ns\/"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-014-0876-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11276-014-0876-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-014-0876-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,30]],"date-time":"2023-07-30T19:50:06Z","timestamp":1690746606000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11276-014-0876-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12,19]]},"references-count":33,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2015,7]]}},"alternative-id":["876"],"URL":"https:\/\/doi.org\/10.1007\/s11276-014-0876-x","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,12,19]]}}}