{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T14:25:57Z","timestamp":1651847157050},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2015,3,10]],"date-time":"2015-03-10T00:00:00Z","timestamp":1425945600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1007\/s11277-015-2498-8","type":"journal-article","created":{"date-parts":[[2015,3,9]],"date-time":"2015-03-09T14:31:31Z","timestamp":1425911491000},"page":"1971-1993","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Movement-Based Checkpointing and Message Logging for Recovery in MANETs"],"prefix":"10.1007","volume":"83","author":[{"given":"Parmeet Kaur","family":"Jaggi","sequence":"first","affiliation":[]},{"given":"Awadhesh Kumar","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,10]]},"reference":[{"issue":"2","key":"2498_CR1","doi-asserted-by":"crossref","first-page":"220","DOI":"10.1109\/TSE.1975.6312842","volume":"1","author":"B Randell","year":"1975","unstructured":"Randell, B. (1975). System structure for software fault tolerance. IEEE Transactions on Software Engineering, 1(2), 220\u2013232.","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"3","key":"2498_CR2","doi-asserted-by":"crossref","first-page":"375","DOI":"10.1145\/568522.568525","volume":"34","author":"EN Elnozahy","year":"2002","unstructured":"Elnozahy, E. N., Alvisi, L., Wang, Y., & Johnson, D. B. (2002). A survey of rollback-recovery protocols in message-passing systems. ACM Computing Surveys, 34(3), 375\u2013408.","journal-title":"ACM Computing Surveys"},{"issue":"8","key":"2498_CR3","doi-asserted-by":"crossref","first-page":"1173","DOI":"10.1109\/TMC.2010.80","volume":"9","author":"PJ Darby III","year":"2010","unstructured":"Darby, P. J, I. I. I., & Tzeng, N. (2010). Decentralized QoS-aware checkpointing arrangement in mobile grid computing. IEEE Transactions on Mobile Computing, 9(8), 1173\u20131186.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"2498_CR4","doi-asserted-by":"crossref","unstructured":"Wang, Z., Chen, Q., & Gao, C. (2006). Implementing grid computing over mobile ad-hoc networks based on mobile agent. In Proceedings of the fifth international conference on grid and cooperative computing workshops (pp. 321\u2013326).","DOI":"10.1109\/GCCW.2006.56"},{"key":"2498_CR5","doi-asserted-by":"crossref","unstructured":"Rao, I., Imran, N., Woo Lee, P., Huh, E., & Chung, T. (2006). A proxy based efficient checkpointing scheme for fault recovery in mobile grid system. In Proceedings of the 13th international conference on high performance computing, Lecture notes in computer science (Vol. 4297, pp 448\u2013459).","DOI":"10.1007\/11945918_44"},{"issue":"2","key":"2498_CR6","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1109\/32.666828","volume":"24","author":"L Alvisi","year":"1998","unstructured":"Alvisi, L., & Marzullo, K. (1998). Message logging: pessimistic, optimistic, causal, and optimal. IEEE Transactions on Software Engineering, 24(2), 149\u2013159.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"2498_CR7","doi-asserted-by":"crossref","unstructured":"Acharya, A., & Badrinath, B. R. (1994). Checkpointing distributed applications on mobile computers. In Proceedings of the third international conference on parallel and distributed information systems (pp. 73\u201380). September 1994.","DOI":"10.1109\/PDIS.1994.331730"},{"issue":"10","key":"2498_CR8","doi-asserted-by":"crossref","first-page":"1035","DOI":"10.1109\/71.539735","volume":"7","author":"R Prakash","year":"1996","unstructured":"Prakash, R., & Singhal, M. (1996). Low-cost checkpointing and failure recovery in mobile computing systems. IEEE Transactions on Parallel and Distributed Systems, 7(10), 1035\u20131048.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"2498_CR9","doi-asserted-by":"crossref","unstructured":"Higaki, H., & Takizawa, M. (1998). Checkpoint-recovery protocol for reliable mobile systems. In Proceedings of the seventeenth IEEE symposium on reliable distributed systems (pp. 93\u201399). October 1998.","DOI":"10.1109\/RELDIS.1998.740479"},{"key":"2498_CR10","doi-asserted-by":"crossref","unstructured":"Tantikul, T. & Manivannan, D. (2005). A communication-induced checkpointing and asynchronous recovery protocol for mobile computing systems. In Sixth international conference on parallel and distributed computing, applications and technologies (pp. 70\u201374), December 2005.","DOI":"10.1109\/PDCAT.2005.5"},{"issue":"3","key":"2498_CR11","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1145\/3959.3962","volume":"3","author":"R Strom","year":"1985","unstructured":"Strom, R., & Yemini, S. (1985). Optimistic recovery in distributed systems. ACM Transactions on Computer Systems, 3(3), 204\u2013226.","journal-title":"ACM Transactions on Computer Systems"},{"issue":"4","key":"2498_CR12","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1109\/TMC.2002.1175540","volume":"1","author":"T Park","year":"2002","unstructured":"Park, T., Woo, N., & Yeom, H. Y. (2002). An efficient optimistic message logging scheme for the recoverable mobile computing systems. IEEE Transactions on Mobile Computing, 1(4), 265\u2013277.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"2498_CR13","doi-asserted-by":"crossref","unstructured":"George, S. E., Chen, I., & Jin, Y. (2006). Movement based checkpointing and logging for recovery in mobile computing systems. In Proceedings of the 5th ACM international workshop on data engineering for wireless and mobile access (MobiDE \u201806) (pp. 51\u201358).","DOI":"10.1145\/1140104.1140115"},{"key":"2498_CR14","doi-asserted-by":"crossref","unstructured":"Men, C., Xu, Z., & Li, X. (2008). An efficient checkpointing and rollback recovery scheme for cluster-based multi-channel ad hoc wireless networks. In International symposium on parallel and distributed processing with applications (pp. 371\u2013378).","DOI":"10.1109\/ISPA.2008.35"},{"key":"2498_CR15","unstructured":"Ono, M., & Higaki., H, (2007). Consistent checkpoint protocol for wireless ad hoc networks. In The 2007 international conference on parallel and distributed processing techniques and applications, USA, (pp. 1041\u20131046)."},{"issue":"2","key":"2498_CR16","first-page":"147","volume":"3","author":"TT Juang","year":"2002","unstructured":"Juang, T. T., & Liu, M. C. (2002). An efficient asynchronous recovery algorithm in wireless mobile ad hoc networks. Journal of Internet Technology Special Issue on Wireless Internet: Applications and Systems, 3(2), 147\u2013155.","journal-title":"Journal of Internet Technology Special Issue on Wireless Internet: Applications and Systems"},{"key":"2498_CR17","volume-title":"Fundamentals of domination in graphs","author":"TW Haynes","year":"1998","unstructured":"Haynes, T. W., Hedetniemi, S. T., & Slater, P. J. (1998). Fundamentals of domination in graphs. New York: Marcel Dekker."},{"key":"2498_CR18","doi-asserted-by":"crossref","unstructured":"Wu, J. & Li, H. (1999). On calculating connected dominating set for efficient routing in ad hoc wireless networks. In Proceedings of the 3rd international workshop on discrete algorithms and methods for mobile computing and communications (pp. 7\u201314).","DOI":"10.1145\/313239.313261"},{"key":"2498_CR19","doi-asserted-by":"crossref","unstructured":"Blum, J., Ding, M., Thaeler, A. & Cheng, X. (2005). Connected dominating set in sensor networks and MANETs. In D.-Z. Du. & P. Pardalos (Eds.), Handbook of combinatorial optimization (pp. 329\u2013369). Springer: US.","DOI":"10.1007\/0-387-23830-1_8"},{"issue":"2","key":"2498_CR20","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1016\/j.comcom.2012.10.005","volume":"36","author":"J Yu","year":"2013","unstructured":"Yu, J., Wang, N., Wang, G., & Yu, D. (2013). Review: Connected dominating sets in wireless ad hoc and sensor networks\u2014A comprehensive survey. Computer Communications, 36(2), 121\u2013134.","journal-title":"Computer Communications"},{"issue":"4","key":"2498_CR21","doi-asserted-by":"crossref","first-page":"374","DOI":"10.1007\/PL00009201","volume":"20","author":"S Guha","year":"1998","unstructured":"Guha, S., & Khuller, S. (1998). Approximation algorithms for connected dominating sets. Algorithmica, 20(4), 374\u2013387.","journal-title":"Algorithmica"},{"key":"2498_CR22","unstructured":"Bharghavan, V. & Das, B. (1997). Routing in ad hoc networks using minimum connected dominating sets. In Proceedings of the international conference on communications (pp. 376\u2013380), June 1997."},{"issue":"1","key":"2498_CR23","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1016\/j.jpdc.2010.05.008","volume":"71","author":"B Yin","year":"2011","unstructured":"Yin, B., Shi, H., & Shang, Y. (2011). An efficient algorithm for constructing a connected dominating set in mobile ad hoc networks. Journal of Parallel and Distributed Computing, 71(1), 27\u201339.","journal-title":"Journal of Parallel and Distributed Computing"},{"issue":"1","key":"2498_CR24","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/JCN.2002.6596929","volume":"4","author":"KM Alzoubi","year":"2002","unstructured":"Alzoubi, K. M., Wan, P.-J., & Frieder, O. (2002). Distributed heuristics for connected dominating sets in wireless ad hoc networks. Journal of Communications and Networks, 4(1), 22\u201329.","journal-title":"Journal of Communications and Networks"},{"issue":"5","key":"2498_CR25","doi-asserted-by":"crossref","first-page":"481","DOI":"10.1023\/A:1016542229220","volume":"8","author":"B Chen","year":"2002","unstructured":"Chen, B., Jamieson, K., Balakrishnan, H., & Morris, R. (2002). Span: an energy-efficient coordination algorithm for topology maintenance in ad hoc wireless networks. Wireless Networks, 8(5), 481\u2013494.","journal-title":"Wireless Networks"},{"key":"2498_CR26","doi-asserted-by":"crossref","unstructured":"Jaggi, P. K. & Singh, A. K. (2012). Preventing useless checkpoints in MANETs. In 2012 2nd IEEE international conference on parallel distributed and grid computing (PDGC) (pp. 533\u2013538).","DOI":"10.1109\/PDGC.2012.6449877"},{"issue":"10","key":"2498_CR27","doi-asserted-by":"crossref","first-page":"972","DOI":"10.1109\/71.730527","volume":"9","author":"JS Plank","year":"1998","unstructured":"Plank, J. S., Li, K., & Puening, M. A. (1998). Diskless checkpointing. IEEE Transactions on Parallel and Distributed Systems, 9(10), 972\u2013986.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-015-2498-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-015-2498-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-015-2498-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T13:16:24Z","timestamp":1559394984000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-015-2498-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,3,10]]},"references-count":27,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,8]]}},"alternative-id":["2498"],"URL":"https:\/\/doi.org\/10.1007\/s11277-015-2498-8","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,3,10]]}}}