{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:10:34Z","timestamp":1759133434165},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2014,7,21]],"date-time":"2014-07-21T00:00:00Z","timestamp":1405900800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1007\/s11277-014-1933-6","type":"journal-article","created":{"date-parts":[[2014,7,19]],"date-time":"2014-07-19T20:50:53Z","timestamp":1405803053000},"page":"1343-1368","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Socially-Aware Multi-phase Opportunistic Routing for Distributed Mobile Social Networks"],"prefix":"10.1007","volume":"79","author":[{"given":"Nikolaos","family":"Vastardis","sequence":"first","affiliation":[]},{"given":"Kun","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Supeng","family":"Leng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,7,21]]},"reference":[{"key":"1933_CR1","unstructured":"Boldrini, C., Conti, M., & Passarella, A. (2007). Users mobility models for opportunistic networks: The role of physical locations. In Proceedings of IEEE WRECOM."},{"key":"1933_CR2","doi-asserted-by":"crossref","unstructured":"Boldrini, C., Conti, M., Delmastro, F., & Passarella, A. (2010). Context- and social-aware middleware for opportunistic networks. Journal of Network and Computer Applications, 33(5), 525\u2013541. ISSN:1084-8045. doi: 10.1016\/j.jnca.2010.03.017 .","DOI":"10.1016\/j.jnca.2010.03.017"},{"key":"1933_CR3","doi-asserted-by":"crossref","unstructured":"Brin, S., & Page, L. (1998). The anatomy of a large-scale hypertextual web search engine. Computer Networks and ISDN Systems, 30(1\u20137), 107\u2013117. ISSN:0169-7552. doi: 10.1016\/S0169-7552(98)00110-X .","DOI":"10.1016\/S0169-7552(98)00110-X"},{"key":"1933_CR4","unstructured":"Chaintreau, A., & Hui, P. (2005). Pocket switched networks: Real-world mobility and its consequences for opportunistic forwarding. Technical report no 617. Computer Laboratory, University of Cambridge."},{"key":"1933_CR5","doi-asserted-by":"crossref","unstructured":"Conti, M., Giordano, S., May, M., & Passarella, A. (2010). From opportunistic networks to opportunistic computing. Communications Magazine, 48(9):126\u2013139. ISSN:0163-6804. doi: 10.1109\/MCOM.2010.5560597 .","DOI":"10.1109\/MCOM.2010.5560597"},{"key":"1933_CR6","doi-asserted-by":"crossref","unstructured":"Conti, M., Das, S. K., Bisdikian, C., Kumar, M., Ni, L. M., Passarella, A., et al. (2012). Fast track article: Looking ahead in pervasive computing: Challenges and opportunities in the era of cyber-physical convergence. Pervasive Mobile Computing, 8(1), 2\u201321. ISSN:1574-1192. doi: 10.1016\/j.pmcj.2011.10.001 .","DOI":"10.1016\/j.pmcj.2011.10.001"},{"key":"1933_CR7","doi-asserted-by":"crossref","unstructured":"Daly, E. M., & Haahr, M. (2009). Social network analysis for information flow in disconnected delay-tolerant manets. IEEE Transactions on Mobile Computing, 8, 606\u2013621, ISSN:1536-1233. doi: 10.1109\/TMC.2008.161 .","DOI":"10.1109\/TMC.2008.161"},{"key":"1933_CR8","doi-asserted-by":"crossref","unstructured":"Everett, M., & Borgatti, S. P. (2005). Ego network betweenness. Social Networks, 27(1), 31\u201338. ISSN:03788733.","DOI":"10.1016\/j.socnet.2004.11.007"},{"key":"1933_CR9","unstructured":"Granovetter, M. S. (1973). The strength of weak ties. The American Journal of Sociology, 78(6), 1360\u20131380. ISSN:00029602. doi: 10.2307\/2776392 ."},{"key":"1933_CR10","doi-asserted-by":"crossref","unstructured":"Hossmann, T., Spyropoulos, T., & Legendre, F. (2010). Know thy neighbor: Towards optimal mapping of contacts to social graphs for DTN routing. In INFOCOM, 2010 Proceedings IEEE. doi: 10.1109\/INFCOM.2010.5462135 .","DOI":"10.1109\/INFCOM.2010.5462135"},{"key":"1933_CR11","doi-asserted-by":"crossref","unstructured":"Hui, P., Chaintreau, A., Scott, J., Gass, R., Crowcroft, J., & Diot, C. (2005). Pocket switched networks and human mobility in conference environments. In Proceedings of the 2005 ACM SIGCOMM workshop on delay-tolerant networking, WDTN \u201905 (pp. 244\u2013251), New York, NY, USA. ACM. ISBN:1-59593-026-4. doi: 10.1145\/1080139.1080142 .","DOI":"10.1145\/1080139.1080142"},{"key":"1933_CR12","doi-asserted-by":"crossref","unstructured":"Hui, P., Crowcroft, J., & Yoneki, E. (2011). Bubble rap: Social-based forwarding in delay-tolerant networks. IEEE Transactions on Mobile Computing, 10(11), 1576\u20131589. ISSN:1536-1233. doi: 10.1109\/TMC.2010.246 .","DOI":"10.1109\/TMC.2010.246"},{"key":"1933_CR13","doi-asserted-by":"crossref","unstructured":"Ioannidis, S., & Chaintreau, A. (2009). On the strength of weak ties in mobile social networks. In SNS \u201909: Proceedings of the second ACM EuroSys workshop on social network systems (pp. 19\u201325), New York, NY, USA, ACM. ISBN:978-1-60558-463-8. doi: 10.1145\/1578002.1578006 .","DOI":"10.1145\/1578002.1578006"},{"key":"1933_CR14","unstructured":"Kretschmer, C., Rhrup, S., & Schindelhauer, C. (2008). Delay-tolerant on-demand routing for mobile ad hoc networks. Technical report no. 224, University of Freiburg, Germany."},{"key":"1933_CR15","doi-asserted-by":"crossref","unstructured":"Li, M., Gao, L., & Zhou, W. (2011). Mar: Message-aware routing for opportunistic wireless ad hoc networks. In Australasian telecommunication networks and applications conference (ATNAC) (pp. 1\u20136). doi: 10.1109\/ATNAC.2011.6096662 .","DOI":"10.1109\/ATNAC.2011.6096662"},{"key":"1933_CR16","doi-asserted-by":"crossref","unstructured":"Lindgren, A., Doria, A., & Schel\u00e9n, O. (2003). Probabilistic routing in intermittently connected networks. SIGMOBILE Mobile Computing and Communications Review, 7, 19\u201320. ISSN:1559-1662. doi: 10.1145\/961268.961272 .","DOI":"10.1145\/961268.961272"},{"key":"1933_CR17","doi-asserted-by":"crossref","unstructured":"Moreira, W., Mendes, P., & Sargento, S. (2012). Opportunistic routing based on daily routines. In Proceedings of the 6th IEEE WoWMoM workshop on autonomic and opportunistic communications (AOC 2012). doi: 10.1109\/WoWMoM.2012.6263749 .","DOI":"10.1109\/WoWMoM.2012.6263749"},{"key":"1933_CR18","doi-asserted-by":"crossref","unstructured":"Motani, M., & Srinivasan, V. (2005). Peoplenet: Engineering a wireless virtual social network. In in Proceedings of ACM MobiCom (pp. 243\u2013257).","DOI":"10.1145\/1080829.1080855"},{"key":"1933_CR19","unstructured":"Mtibaa, A., May, M., Diot, C., & Ammar, M. (2010). Peoplerank: Social opportunistic forwarding. In Proceedings of the 29th conference on information communications, INFOCOM\u201910 (pp. 111\u2013115), Piscataway, NJ, USA. IEEE Press. ISBN:978-1-4244-5836-3."},{"key":"1933_CR20","doi-asserted-by":"crossref","unstructured":"Musolesi, M., Hailes, S., & Mascolo, C. (2004). An ad hoc mobility model founded on social network theory. In MSWiM \u201904: Proceedings of the 7th ACM international symposium on modeling, analysis and simulation of wireless and mobile systems (pp. 20\u201324), New York, NY, USA. ACM. ISBN:1-58113-953-5. doi: 10.1145\/1023663.1023669 .","DOI":"10.1145\/1023663.1023669"},{"key":"1933_CR21","doi-asserted-by":"crossref","first-page":"026113","DOI":"10.1103\/PhysRevE.69.026113","volume":"69","author":"MEJ Newman","year":"2004","unstructured":"Newman, M. E. J., & Girvan, M. (2004). Finding and evaluating community structure in networks. Physical Review E, 69, 026113.","journal-title":"Physical Review E"},{"key":"1933_CR22","doi-asserted-by":"crossref","unstructured":"Niu, J., Guo, J., Cai, Q., Sadeh, N., & Guo, S. (2011). Predict and spread: An efficient routing algorithm for opportunistic networking. In 2011 IEEE wireless communications and networking conference (WCNC) (pp. 498\u2013503). IEEE. ISBN:978-1-61284-255-4. doi: 10.1109\/WCNC.2011.5779183 .","DOI":"10.1109\/WCNC.2011.5779183"},{"key":"1933_CR23","doi-asserted-by":"crossref","unstructured":"Pelusi, L., Passarella, A., & Conti, M. (2006). Opportunistic networking: Data forwarding in disconnected mobile ad hoc networks. Communications Magazine, IEEE, 44(11), 134\u2013141. ISSN:0163-6804. doi: 10.1109\/MCOM.2006.248176 .","DOI":"10.1109\/MCOM.2006.248176"},{"key":"1933_CR24","unstructured":"Schurgot, M. R., Comaniciu, C., & Jaffr\u00e8s-Runser, K. (2011). Beyond traditional dtn routing: Social networks for opportunistic communication. CoRR. abs\/1110.2480."},{"key":"1933_CR25","unstructured":"Vahdat A., & Becker D. (2000). Epidemic Routing for Partially Connected Ad Hoc Networks. Technical Report CS-200006, Duke University."},{"key":"1933_CR26","doi-asserted-by":"crossref","unstructured":"Vastardis, N., & Yang, K. (2012). An enhanced community-based mobility model for distributed mobile social networks. Journal of Ambient Intelligence and Humanized Computing. ISSN:1868-5137. doi: 10.1007\/s12652-012-0118-y .","DOI":"10.1007\/s12652-012-0118-y"},{"key":"1933_CR27","doi-asserted-by":"crossref","unstructured":"Vastardis, N., & Yang, K. (2013). Multi-phase socially-aware routing in distributed mobile social networks. In Wireless communications and mobile computing conference (IWCMC), 2013 9th international (pp. 1353\u20131358). IEEE.","DOI":"10.1109\/IWCMC.2013.6583753"},{"key":"1933_CR28","doi-asserted-by":"crossref","unstructured":"Zhu, H., Dong, M., Chang, S., Zhu, Y., Li, M., & Shen, S. (2013) Zoom: Scaling the mobility for fast opportunistic forwarding in vehicular networks. In INFOCOM, 2013 Proceedings IEEE.","DOI":"10.1109\/INFCOM.2013.6567093"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-014-1933-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-014-1933-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-014-1933-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,12]],"date-time":"2019-08-12T21:09:43Z","timestamp":1565644183000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-014-1933-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7,21]]},"references-count":28,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2014,11]]}},"alternative-id":["1933"],"URL":"https:\/\/doi.org\/10.1007\/s11277-014-1933-6","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,7,21]]}}}