{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T05:04:38Z","timestamp":1761973478629,"version":"build-2065373602"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2013,5,1]],"date-time":"2013-05-01T00:00:00Z","timestamp":1367366400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Comput. Sci. Technol."],"published-print":{"date-parts":[[2013,5]]},"DOI":"10.1007\/s11390-013-1357-x","type":"journal-article","created":{"date-parts":[[2013,5,2]],"date-time":"2013-05-02T02:35:38Z","timestamp":1367462138000},"page":"574-582","source":"Crossref","is-referenced-by-count":17,"title":["Impact of Strangers on Opportunistic Routing Performance"],"prefix":"10.1007","volume":"28","author":[{"given":"Pei-Yan","family":"Yuan","sequence":"first","affiliation":[]},{"given":"Hua-Dong","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Peng-Rui","family":"Duan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,5,1]]},"reference":[{"issue":"5","key":"1357_CR1","doi-asserted-by":"crossref","first-page":"828","DOI":"10.1109\/JSAC.2008.080609","volume":"26","author":"K Fall","year":"2008","unstructured":"Fall K, Farrell S. DTN: An architectural retrospective. IEEE Journal on Selected Areas in Communications, 2008, 26(5): 828-836.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"1","key":"1357_CR2","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/MC.2010.19","volume":"43","author":"M Conti","year":"2010","unstructured":"Conti M, Kumar M. Opportunities in opportunistic computing. Computer, 2010, 43(1): 42-50.","journal-title":"Computer"},{"key":"1357_CR3","unstructured":"Vahdat A, Becker D. Epidemic routing for partially connected ad hoc networks. Technical Report CS-200006, Duke University, 2000."},{"key":"1357_CR4","doi-asserted-by":"crossref","unstructured":"Burgess J, Gallagher B, Jensen D, Levine B N. MaxProp: Routing for vehicle-based disruption-tolerant networks. In Proc. the 25th INFOCOM, April 2006, pp.1-11.","DOI":"10.1109\/INFOCOM.2006.228"},{"issue":"3","key":"1357_CR5","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1145\/961268.961272","volume":"7","author":"A Lindgren","year":"2003","unstructured":"Lindgren A, Doria A, Schelen O. Probabilistic routing in intermittently connected networks. ACM SIGMOBILE Mobile Computing and Communications Review, 2003, 7(3): 19-20.","journal-title":"ACM SIGMOBILE Mobile Computing and Communications Review"},{"key":"1357_CR6","doi-asserted-by":"crossref","unstructured":"Leguay J, Friedman T, Conan V. Evaluating mobility pattern space routing for DTNs. In Proc. the 25th INFOCOM, April 2006, pp.1-10.","DOI":"10.1109\/INFOCOM.2006.299"},{"key":"1357_CR7","doi-asserted-by":"crossref","unstructured":"Yuan P, Ma H. Hug: Human gathering point based routing for opportunistic networks. In Proc. WCNC, March 2012, pp.3024-3029.","DOI":"10.1109\/WCNC.2012.6214323"},{"key":"1357_CR8","doi-asserted-by":"crossref","unstructured":"Nguyen N, Dinh T, Tokala S. Thai M. Overlapping communities in dynamic networks: Their detection and mobile applications. In Proc. the 17th MOBICOM, Sept. 2011, pp.85-96.","DOI":"10.1145\/2030613.2030624"},{"key":"1357_CR9","doi-asserted-by":"crossref","unstructured":"Hui P, Crowcroft J, Yoneki E. BUBBLE rap: Social-based forwarding in delay tolerant networks. In Proc. the 9th MobiHoc, May 2008, pp.241-250.","DOI":"10.1145\/1374618.1374652"},{"key":"1357_CR10","doi-asserted-by":"crossref","unstructured":"Mtibaa A, May M, Diot C, Ammar M. PeopleRank: Social opportunistic forwarding. In Proc. the 29th INFOCOM, March 2010, pp.111-115.","DOI":"10.1109\/INFCOM.2010.5462261"},{"key":"1357_CR11","doi-asserted-by":"crossref","unstructured":"Daly E, Haahr M. Social network analysis for routing in disconnected delay-tolerant MANETs. In Proc. the 8th MobiHoc, Sept. 2007, pp.32-40.","DOI":"10.1145\/1288107.1288113"},{"issue":"7043","key":"1357_CR12","doi-asserted-by":"crossref","first-page":"814","DOI":"10.1038\/nature03607","volume":"435","author":"G Palla","year":"2005","unstructured":"Palla G, Der\u00e9nyi I, Farkas I, Vicsek T. Uncovering the overlapping community structure of complex networks in nature and society. Nature, 2005, 435(7043): 814-818.","journal-title":"Nature"},{"issue":"2\/3","key":"1357_CR13","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1016\/S1570-8705(03)00003-9","volume":"1","author":"R Shah","year":"2003","unstructured":"Shah R, Roy S, Jain S et al. Data MULEs: Modeling and analysis of a three-tier architecture for sparse sensor networks. Ad Hoc Networks, 2003, 1(2\/3): 215-233.","journal-title":"Ad Hoc Networks"},{"key":"1357_CR14","doi-asserted-by":"crossref","unstructured":"Li Q, Rus D. Sending messages to mobile users in disconnected ad-hoc wireless networks. In Proc. the 6th MobiCom, Aug. 2000, pp.44-55.","DOI":"10.1145\/345910.345918"},{"key":"1357_CR15","doi-asserted-by":"crossref","unstructured":"Zhao W, Ammar M, Zegura E. A message ferrying approach for data delivery in sparse mobile ad hoc networks. In Proc. the 5th MobiHoc, Sept. 2004, pp.187-198.","DOI":"10.1145\/989459.989483"},{"key":"1357_CR16","unstructured":"Zhao W, Ammar M, Zegura E. Controlling the mobility of multiple data transport ferries in a delay-tolerant network. In Proc. the 24th INFOCOM, March 2005, pp.1407-1418."},{"key":"1357_CR17","doi-asserted-by":"crossref","unstructured":"He T, Lee K, Swami A. Flying in the dark: Controlling autonomous data ferries with partial observations. In Proc. the 11th MobiHoc, Sept. 2010, pp.141-150.","DOI":"10.1145\/1860093.1860113"},{"issue":"1","key":"1357_CR18","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1109\/TNET.2007.897964","volume":"16","author":"T Spyropoulos","year":"2008","unstructured":"Spyropoulos T, Psounis K, Raghavendra C. Efficient routing in intermittently connected mobile networks: The multiple-copy case. Transactions on Networking, 2008, 16(1): 77-90.","journal-title":"Transactions on Networking"},{"key":"1357_CR19","doi-asserted-by":"crossref","unstructured":"Qin R, Li Z, Wang Y et al. An integrated network of roadside sensors and vehicles for driving safety: Concept, design and experiments. In Proc. the 8th PerCom, March 29-April 2, 2010, pp.79-87.","DOI":"10.1109\/PERCOM.2010.5466988"},{"key":"1357_CR20","doi-asserted-by":"crossref","unstructured":"Ivancic W, Wood L, Hdiday P et al. Experience with delay-tolerant networking from orbit. In Proc. the 4th ASMS, Aug. 2008, pp.173-178.","DOI":"10.1109\/ASMS.2008.37"},{"key":"1357_CR21","unstructured":"Merugu S, Ammar M, Zegura E. Routing in space and time in networks with predictable mobility. Technical Report GIT-CC-04-7, Georgia Institute of Technology, 2004."},{"key":"1357_CR22","doi-asserted-by":"crossref","unstructured":"Jain S, Fall K, Patra S. Routing in a delay tolerant network. In Proc. the ACM SIGCOMM, Aug. 30-Sept. 3, 2004, pp.145-158.","DOI":"10.1145\/1030194.1015484"},{"key":"1357_CR23","doi-asserted-by":"crossref","unstructured":"Liu C, Wu J. Routing in a cyclic mobispace. In Proc. the 9th MobiHoc, May 2008, pp.351-360.","DOI":"10.1145\/1374618.1374665"},{"key":"1357_CR24","doi-asserted-by":"crossref","unstructured":"Musolesi M, Hailes S, Mascolo C. Adaptive routing for intermittently connected mobile ad hoc networks. In Proc. the 6th WoWMoM, June 2005, pp.183-189.","DOI":"10.1109\/WOWMOM.2005.17"},{"key":"1357_CR25","doi-asserted-by":"crossref","unstructured":"Yuan Q, Cardei I, Wu J. Predict and relay: An efficient routing in disruption-tolerant networks. In Proc. the 10th MobiHoc, May 2009, pp.95-104.","DOI":"10.1145\/1530748.1530762"},{"issue":"2","key":"1357_CR26","doi-asserted-by":"crossref","first-page":"374","DOI":"10.1016\/j.comnet.2010.10.006","volume":"55","author":"S Gaito","year":"2011","unstructured":"Gaito S, Pagani E, Rossi G. Strangers help friends to communicate in opportunistic networks. Computer Networks, 2011, 55(2): 374-385.","journal-title":"Computer Networks"},{"key":"1357_CR27","doi-asserted-by":"crossref","unstructured":"Yoneki E, Hui P, Crowcroft J. Visualizing community detection in opportunistic networks. In Proc. the 2nd CHANTS, Sept. 2007, pp.93-96.","DOI":"10.1145\/1287791.1287810"},{"key":"1357_CR28","unstructured":"Hui P. People are the network: Experimental design and evaluation of social-based forwarding algorithms. Technical Report UCAM-CL-TR-713, University of Cambridge, March 2008."},{"key":"1357_CR29","doi-asserted-by":"crossref","unstructured":"Rhee I, Shin M, Hong S et al. On the levy-walk nature of human mobility. In Proc. the 27th INFOCOM, April 2008, pp.924-932.","DOI":"10.1109\/INFOCOM.2008.145"},{"key":"1357_CR30","doi-asserted-by":"crossref","unstructured":"Lee K, Hong S, Kim S et al. SLAW: A mobility model for human walks. In Proc. the 28th INFOCOM, April 2009, pp.855-863.","DOI":"10.1109\/INFCOM.2009.5061995"},{"key":"1357_CR31","doi-asserted-by":"crossref","unstructured":"Zyba G, Voelker G, Ioannidis S et al. Dissemination in opportunistic mobile ad-hoc networks: The power of the crowd. In Proc. the 30th INFOCOM, April 2011, pp.1179-1187.","DOI":"10.1109\/INFCOM.2011.5934896"},{"key":"1357_CR32","doi-asserted-by":"crossref","unstructured":"Pietil\u00e4inen A, Diot C. Dissemination in opportunistic social networks: The role of temporal communities. In Proc. the 13th MobiHoc, June 2012, pp.165-174.","DOI":"10.1145\/2248371.2248396"},{"key":"1357_CR33","doi-asserted-by":"crossref","unstructured":"Sarwar B, Karypis G, Konstan J et al. Application of dimensionality reduction in recommender system \u2212 A case study. In Proc. WEBKDD, Aug. 2000, pp.1-12.","DOI":"10.21236\/ADA439541"},{"issue":"3","key":"1357_CR34","doi-asserted-by":"crossref","first-page":"492","DOI":"10.1007\/s11390-012-1238-8","volume":"27","author":"Y Zhang","year":"2012","unstructured":"Zhang Y, Yu T. Mining trust relationships from online social networks. Journal of Computer Science and Technology, 2012, 27(3): 492-505.","journal-title":"Journal of Computer Science and Technology"}],"container-title":["Journal of Computer Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-013-1357-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11390-013-1357-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-013-1357-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T07:54:01Z","timestamp":1745999641000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11390-013-1357-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5]]},"references-count":34,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2013,5]]}},"alternative-id":["1357"],"URL":"https:\/\/doi.org\/10.1007\/s11390-013-1357-x","relation":{},"ISSN":["1000-9000","1860-4749"],"issn-type":[{"type":"print","value":"1000-9000"},{"type":"electronic","value":"1860-4749"}],"subject":[],"published":{"date-parts":[[2013,5]]}}}