{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T13:54:40Z","timestamp":1762955680579},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2016,12,23]],"date-time":"2016-12-23T00:00:00Z","timestamp":1482451200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1007\/s11277-016-3928-y","type":"journal-article","created":{"date-parts":[[2016,12,24]],"date-time":"2016-12-24T14:52:00Z","timestamp":1482591120000},"page":"2719-2738","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["An Optimized Replica Allocation Algorithm Amidst of Selfish Nodes in MANET"],"prefix":"10.1007","volume":"94","author":[{"given":"P. J.","family":"Kumar","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"P.","family":"Ilango","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2016,12,23]]},"reference":[{"key":"3928_CR1","doi-asserted-by":"crossref","unstructured":"Ding, G., & Bhargava, B. (2004). Peer to peer file sharing over mobile ad hoc networks. In Proceedings of IEEE annual conference on pervasive computing and communication workshops (pp. 104\u2013108).","DOI":"10.1109\/PERCOMW.2004.1276914"},{"key":"3928_CR2","unstructured":"Li, M., Lee, W.-C., & Sivasubramaniam, A. (2004). Efficient peer-to-peer information sharing over mobile ad hoc networks. In Proceedings of World Wide Web (WWW) workshop emerging applications for wireless and mobile access (pp. 2\u20136)."},{"issue":"5","key":"3928_CR3","doi-asserted-by":"crossref","first-page":"1143","DOI":"10.1007\/s00778-007-0055-0","volume":"17","author":"P Padmanabhan","year":"2008","unstructured":"Padmanabhan, P., Grunewald, L., Vallur, A., & Atiquzzaman, M. (2008). A survey of data replication techniques for mobile ad hoc network databases. The International Journal of Very Large Data Bases, 17(5), 1143\u20131164.","journal-title":"The International Journal of Very Large Data Bases"},{"key":"3928_CR4","doi-asserted-by":"crossref","unstructured":"Hara, T. (2001). Effective replica allocation in ad hoc networks for improving data accessibility. In Proceedings of IEEE INFOCOM (pp. 1568\u20131576).","DOI":"10.1109\/INFCOM.2001.916653"},{"issue":"7","key":"3928_CR5","doi-asserted-by":"crossref","first-page":"950","DOI":"10.1109\/TMC.2008.150","volume":"8","author":"T Hara","year":"2009","unstructured":"Hara, T., & Madria, S. K. (2009). Data replication for improving data accessibility in ad hoc networks. IEEE Transactions on Mobile Computing, 8(7), 950\u2013967.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"3928_CR6","unstructured":"Yin, L., & Cao, G. (2004). Balancing the tradeoffs between data accessibility and query delay in ad hoc networks. In Proceedings of IEEE international symposium reliable distributed systems (pp. 289\u2013298)."},{"issue":"2","key":"3928_CR7","doi-asserted-by":"crossref","first-page":"278","DOI":"10.1109\/TMC.2011.57","volume":"11","author":"JH Choi","year":"2012","unstructured":"Choi, J. H., Shim, K., Lee, S., & Kun-Lung, W. V. (2012). Handling selfishness in replica allocation over a mobile ad hoc network. IEEE Transaction on Mobile Computing, 11(2), 278\u2013290.","journal-title":"IEEE Transaction on Mobile Computing"},{"issue":"10","key":"3928_CR8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.5210\/fm.v5i10.792","volume":"5","author":"E Adar","year":"2000","unstructured":"Adar, E., & Huberman, B. A. (2000). Free riding on Gnutella. First Monday, 5(10), 1\u201322.","journal-title":"First Monday"},{"key":"3928_CR9","unstructured":"Pei, G., Gerla, M., & Chen, T.-W. (2000). Fisheye state routing: A routing scheme for ad hoc wireless networks. In 2000 IEEE international conference communications, ICC 2000 (Vol. 1)."},{"key":"3928_CR10","unstructured":"Paul, K., & Westhoff, D. (2002). Context aware detection of selfish nodes in DSR based ad-hoc networks. In Proceedings of IEEE global telecommunications conference (pp. 178\u2013182)."},{"key":"3928_CR11","unstructured":"Liu, Y., & Yang, Y. (2003). Reputation propagation and agreement in mobile ad-hoc networks. In Proceedings of IEEE wireless communications and networking conference (pp. 1510\u20131515)."},{"key":"3928_CR12","unstructured":"An efficient utilization of spectrum in wireless mobility by retransmission mechanism. In Central Government NISCAIR, Journal of Scientific & Industrial Research (JSIR), New Delhi, India, September 2015 issue."},{"key":"3928_CR19","unstructured":"Bal, K., Deng, J., & Arshney, P. K. V. (2005). Two ack: Preventing selfishness in mobile ad hoc networks. In Proceedings of IEEE wireless communication and network (pp. 2137\u20132142)."},{"issue":"7","key":"3928_CR20","doi-asserted-by":"crossref","first-page":"950","DOI":"10.1109\/TMC.2008.150","volume":"8","author":"T Hara","year":"2009","unstructured":"Hara, T., & Madria, S. K. (2009). Consistency management strategies for data replication in mobile ad hoc networks. IEEE Transactions on Mobile Computing, 8(7), 950\u2013967.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"3928_CR13","doi-asserted-by":"crossref","unstructured":"Zhai, J., Li, Q., & Li, X. (2005). Data caching in selfish MANETs. In Proceedings of international conference on computer network and mobile computing (pp. 208\u2013217).","DOI":"10.1007\/11534310_24"},{"key":"3928_CR14","unstructured":"Sivaram Murthy, C., & Manoj, B. S. (2011). Ad hoc wireless networks architectures and protocols. Prentice Hall Communications, Ninth impression."},{"key":"3928_CR15","doi-asserted-by":"crossref","unstructured":"Perkins, E., Belding-Royer, E., & Das, S. R. (2003). Ad hoc on-demand distance vector (AODV) routing. In IETF RFC 3561.","DOI":"10.17487\/rfc3561"},{"key":"3928_CR16","doi-asserted-by":"crossref","unstructured":"Johnson, D. B., & Maltz, D. A. (1996). Dynamic source routing in ad hoc wireless networks. In T. Imielinski, & H. Korth (Eds.), Proceedings mobile computing, chapter 5 (pp. 153\u2013181).","DOI":"10.1007\/978-0-585-29603-6_5"},{"issue":"1","key":"3928_CR17","first-page":"5","volume":"6","author":"AJ Devi","year":"2014","unstructured":"Devi, A. J., & Nawaz, G. M. K. (2014). Minimum utilization of electromagnetic (2\u00a0g, 3\u00a0g, 4\u00a0g) spectrum in seamless mobility based on various estimation methods. Journal of Applied Computer Science Methods, 6(1), 5\u201326.","journal-title":"Journal of Applied Computer Science Methods"},{"key":"3928_CR18","doi-asserted-by":"crossref","unstructured":"Gerla, M., Hong, X. & Pei, G. (2000). Landmark routing for large ad hoc wireless networks. In Proceedings of global telecommunications conference (Vol. 3, pp. 1702\u20131706).","DOI":"10.1109\/GLOCOM.2000.891927"},{"key":"3928_CR21","unstructured":"Chiu, T.-H., & Hwang, S.-I. (2006). Efficient fisheye state routing protocol using virtual grid in high-density ad-hoc networks. In The 8th international conference on advanced communication technology."},{"key":"3928_CR22","doi-asserted-by":"crossref","unstructured":"Dimitriadis, G., & Pavlidou, F.-N. (2002). Clustered fisheye state routing for ad hoc wireless networks. 0-7803-7605-6\/02\/2002 IEEE.","DOI":"10.1109\/MWCN.2002.1045723"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-016-3928-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-016-3928-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-016-3928-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,5,23]],"date-time":"2017-05-23T09:41:54Z","timestamp":1495532514000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-016-3928-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12,23]]},"references-count":22,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,6]]}},"alternative-id":["3928"],"URL":"https:\/\/doi.org\/10.1007\/s11277-016-3928-y","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,12,23]]}}}