{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,31]],"date-time":"2024-05-31T12:38:48Z","timestamp":1717159128578},"reference-count":10,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2010,8,6]],"date-time":"2010-08-06T00:00:00Z","timestamp":1281052800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2011,3]]},"DOI":"10.1007\/s12083-010-0090-2","type":"journal-article","created":{"date-parts":[[2010,8,5]],"date-time":"2010-08-05T04:56:55Z","timestamp":1280984215000},"page":"37-49","source":"Crossref","is-referenced-by-count":3,"title":["Evaluation framework for adaptive context-aware routing in large scale mobile peer-to-peer systems"],"prefix":"10.1007","volume":"4","author":[{"given":"Ansar-Ul-Haque","family":"Yasar","sequence":"first","affiliation":[]},{"given":"Davy","family":"Preuveneers","sequence":"additional","affiliation":[]},{"given":"Yolande","family":"Berbers","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,8,6]]},"reference":[{"issue":"3","key":"90_CR1","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1145\/1031483.1031490","volume":"8","author":"C Lindemann","year":"2004","unstructured":"Lindemann C, Waldhorst OP (2004) Exploiting epidemic data dissemination for consistent lookup operations in mobile applications. SIGMOBILE Mobile Comput Commun Rev 8(3):44\u201356","journal-title":"SIGMOBILE Mobile Comput Commun Rev"},{"key":"90_CR2","first-page":"434","volume-title":"ICWN","author":"M Medidi","year":"2005","unstructured":"Medidi M, Ding J, Medidi S (2005) Data dissemination using limited flooding in wireless sensor networks. In: Yang LT, Arabnia HT, Wang L-C (eds) ICWN. CSREA, Las Vegas, pp 434\u2013440"},{"key":"90_CR3","doi-asserted-by":"crossref","unstructured":"Landsiedel O, Gotz S, Wehrle K (2006) A churn and mobility resistant approach for dhts. In MobiShare\u201906: proceedings of the 1st international workshop on decentralized resource sharing in mobile computing and networking. New York, USA, ACM, pp 42\u201347","DOI":"10.1145\/1161252.1161263"},{"key":"90_CR4","doi-asserted-by":"crossref","unstructured":"Roczniak A, Saddik AE (2009) Improving robustness of P2P applications in mobile environments. In Peer-to-Peer Networking Applications, Springer, pp 217\u2013229","DOI":"10.1007\/s12083-009-0032-z"},{"key":"90_CR5","doi-asserted-by":"crossref","unstructured":"Rowstron A, Druschel P (2001) Pastry: scalable, decentralized object location, and routing for large-scale peer-to-peer systems. In Lecture notes in computer science, vol. 2218, pp 329\u2013350","DOI":"10.1007\/3-540-45518-3_18"},{"key":"90_CR6","doi-asserted-by":"crossref","unstructured":"Yasar A, Preuveneers D, Berbers Y (2008) Adaptive context mediation in dynamic and large scale vehicular networks using relevance backpropagation. In Proceedings of Mobility conference, ACM, Taiwan","DOI":"10.1145\/1506270.1506370"},{"key":"90_CR7","doi-asserted-by":"crossref","unstructured":"Williamson G, Stevenson G, Neely S, Coyle L, Nixon P (2006) Scalable information dissemination for pervasive systems: implementation and evaluation. In Proceedings of the 4th international Workshop on Middleware For Pervasive and Ad-Hoc Computing (MPAC 2006). ACM, New York","DOI":"10.1145\/1169075.1169082"},{"key":"90_CR8","unstructured":"Bokareva T, Bulusu N, Jha S (2004) A performance comparison of data dissemination protocols for wireless sensor networks. Proceedings of IEEE Globecom Wireless Ad Hoc and Sensor Networks Workshop, IEEE, Dallas"},{"key":"90_CR9","doi-asserted-by":"crossref","unstructured":"Preuveneers D, Berbers Y (2007) Architectural backpropagation support for managing ambiguous context in smart environments. Proceedings of C. Stephanidis, editor, HCI, volume 4555 of Lecture Notes in Computer Science, pp 178\u2013187, Springer, Berlin","DOI":"10.1007\/978-3-540-73281-5_19"},{"issue":"17","key":"90_CR10","doi-asserted-by":"crossref","first-page":"3485","DOI":"10.1016\/j.comnet.2006.02.001","volume":"50","author":"J Risson","year":"2006","unstructured":"Risson J, Moors T (2006) Survey of research towards robust peer-to-peer networks: search methods. Comput Netw 50(17):3485\u20133521","journal-title":"Comput Netw"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-010-0090-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12083-010-0090-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-010-0090-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T03:44:47Z","timestamp":1559447087000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12083-010-0090-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,8,6]]},"references-count":10,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,3]]}},"alternative-id":["90"],"URL":"https:\/\/doi.org\/10.1007\/s12083-010-0090-2","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,8,6]]}}}