{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:29:24Z","timestamp":1761611364387},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2015,1,31]],"date-time":"2015-01-31T00:00:00Z","timestamp":1422662400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1007\/s11277-015-2330-5","type":"journal-article","created":{"date-parts":[[2015,1,30]],"date-time":"2015-01-30T13:54:36Z","timestamp":1422626076000},"page":"2033-2049","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["DTN Routing with Fixed Stations Based on the Geographic Grid Approach in an Urban Environment"],"prefix":"10.1007","volume":"82","author":[{"given":"Wen-Zao","family":"Li","sequence":"first","affiliation":[]},{"given":"Feng","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Ji-Liu","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,1,31]]},"reference":[{"key":"2330_CR1","unstructured":"Voyiatzis, A. (2012). A survey of delay-and disruption-tolerant networking applications. Journal of Internet Engineering, 5(1), 331\u2013344."},{"issue":"3","key":"2330_CR2","doi-asserted-by":"crossref","first-page":"1819","DOI":"10.1007\/s11277-012-0912-z","volume":"71","author":"X-W Zhou","year":"2013","unstructured":"Zhou, X.-W., Cheng, Z.-M., Ding, Y., Lim, J.-G., & Liu, Q. (2013). Dynamic DTN routing strategies based on knowledge. Wireless Personal Communications, 71(3), 1819\u20131836.","journal-title":"Wireless Personal Communications"},{"key":"2330_CR3","unstructured":"Oh, S.-H., Park, I.-K., Ko, S.-K., Lee, B.-T., & Kim, Y.-S. (2011). Transitional approaches in DTN routing algorithm. In 2011 14th international symposium on wireless personal multimedia communications (WPMC)."},{"key":"2330_CR4","doi-asserted-by":"crossref","unstructured":"Zhang, Y., & Zhao, J. (2009). Social network analysis on data diffusion in delay tolerant networks. In Proceedings of the tenth ACM international symposium on mobile ad hoc networking and computing ACM.","DOI":"10.1145\/1530748.1530806"},{"key":"2330_CR5","doi-asserted-by":"crossref","unstructured":"Doering, M., P\u00f6gel, T., & Wolf, L. (2010). DTN routing in urban public transport systems. In Proceedings of the 5th ACM workshop on challenged networks, ACM.","DOI":"10.1145\/1859934.1859947"},{"issue":"2","key":"2330_CR6","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1016\/j.adhoc.2009.08.003","volume":"8","author":"EM Daly","year":"2010","unstructured":"Daly, E. M., & Haahr, M. (2010). The challenges of disconnected delay-tolerant MANETs. Ad Hoc Networks, 8(2), 241\u2013250.","journal-title":"Ad Hoc Networks"},{"key":"2330_CR7","doi-asserted-by":"crossref","unstructured":"Ayaki, R., Shimada, H., & Sato, K. (2012). A proposal of sensor data collection system using mobile relay nodes. Wireless Sensor Network, 4(1), 1\u20137.","DOI":"10.4236\/wsn.2012.41001"},{"issue":"9","key":"2330_CR8","doi-asserted-by":"crossref","first-page":"e12948","DOI":"10.1371\/journal.pone.0012948","volume":"5","author":"NA Christakis","year":"2010","unstructured":"Christakis, N. A., & Fowler, J. H. (2010). Social network sensors for early detection of contagious outbreaks. PloS one, 5(9), e12948.","journal-title":"PloS one"},{"key":"2330_CR9","unstructured":"Vahdat, A., & Becker, D. (2000). Epidemic routing for partially connected ad hoc networks. Technical Report CS-200006, Duke University."},{"issue":"3","key":"2330_CR10","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1145\/961268.961272","volume":"7","author":"A Lindgren","year":"2003","unstructured":"Lindgren, A., Doria, A., & Schel\u00e9n, O. (2003). Probabilistic routing in intermittently connected networks. ACM SIGMOBILE Mobile Computing and Communications Review, 7(3), 19\u201320.","journal-title":"ACM SIGMOBILE Mobile Computing and Communications Review"},{"key":"2330_CR11","doi-asserted-by":"crossref","unstructured":"Yang, Q., Qin, F., Bi, J., & Xu, Q. (2013). Adaptive parameter estimation based congestion avoidance strategy for DTN. In Proceedings of the 2nd international conference on computer science and electronics engineering. Atlantis Press.","DOI":"10.2991\/iccsee.2013.53"},{"issue":"11","key":"2330_CR12","doi-asserted-by":"crossref","first-page":"1576","DOI":"10.1109\/TMC.2010.246","volume":"10","author":"P Hui","year":"2011","unstructured":"Hui, P., Crowcroft, J., & Yoneki, E. (2011). Bubble rap: Social-based forwarding in delay-tolerant networks. IEEE Transactions on Mobile Computing, 10(11), 1576\u20131589.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"2330_CR13","doi-asserted-by":"crossref","unstructured":"Ekman, F., Ker\u00e4nen, A., Karvo, J., & Ott, J. (2008). Working day movement model. In Proceedings of the 1st ACM SIGMOBILE workshop on mobility models, ACM.","DOI":"10.1145\/1374688.1374695"},{"issue":"10","key":"2330_CR14","doi-asserted-by":"crossref","first-page":"1377","DOI":"10.1109\/TMC.2010.99","volume":"9","author":"T Karagiannis","year":"2010","unstructured":"Karagiannis, T., Le Boudec, J.-Y., & Vojnovic, M. (2010). Power law and exponential decay of intercontact times between mobile devices. IEEE Transactions on Mobile Computing, 9(10), 1377\u20131390.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"2330_CR15","unstructured":"Liu, J., & Zhang, X. G. (2002). The coordinate transformation based on longitude\u2013latitude and its application in air-defense C3I system. Journal of Air Force Engineering University (Natural Science Edition), 3(1), 26\u201329."},{"issue":"1","key":"2330_CR16","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1007\/BF02520228","volume":"63","author":"K Borkowski","year":"1989","unstructured":"Borkowski, K. (1989). Accurate algorithms to transform geocentric to geodetic coordinates. Bulletin g\u00e9od\u00e9sique, 63(1), 50\u201356.","journal-title":"Bulletin g\u00e9od\u00e9sique"},{"key":"2330_CR17","doi-asserted-by":"crossref","unstructured":"Ker\u00e4nen, A., Ott, J., & K\u00e4rkk\u00e4inen, T. (2009). The ONE simulator for DTN protocol evaluation. In Proceedings of the 2nd international conference on simulation tools and techniques. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering).","DOI":"10.4108\/ICST.SIMUTOOLS2009.5674"},{"key":"2330_CR18","unstructured":"Ker\u00e4nen, A., & Ott, J. (2007). Increasing reality for dtn protocol simulations. Helsinki University of Technology, Technical Report 2007."},{"key":"2330_CR19","doi-asserted-by":"crossref","unstructured":"Bulut, E., & Szymanski, B. K. (2010). Friendship based routing in delay tolerant mobile social networks. In 2010 IEEE global telecommunications conference (GLOBECOM 2010).","DOI":"10.1109\/GLOCOM.2010.5683082"},{"key":"2330_CR20","unstructured":"Mehto, A., & Chawla, M. (2013). Comparing delay tolerant network routing protocols for optimizing L-copies in spray and wait routing for minimum delay. In Proceedings of the conference on advances in communication and control systems-2013. Atlantis Press."},{"key":"2330_CR21","doi-asserted-by":"crossref","unstructured":"Ip, Y. K., Lau, W. C., & Yue, O. C. (2007). Forwarding and replication strategies for DTN with resource constraints. In IEEE vehicular technology conference, 2007 (pp. 1260\u20131264).","DOI":"10.1109\/VETECS.2007.265"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-015-2330-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-015-2330-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-015-2330-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T09:16:22Z","timestamp":1559380582000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-015-2330-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,1,31]]},"references-count":21,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2015,6]]}},"alternative-id":["2330"],"URL":"https:\/\/doi.org\/10.1007\/s11277-015-2330-5","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,1,31]]}}}