{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,21]],"date-time":"2025-04-21T04:10:08Z","timestamp":1745208608609,"version":"3.40.4"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2012,11,20]],"date-time":"2012-11-20T00:00:00Z","timestamp":1353369600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2014,3]]},"DOI":"10.1007\/s12083-012-0184-0","type":"journal-article","created":{"date-parts":[[2012,11,19]],"date-time":"2012-11-19T07:44:03Z","timestamp":1353311043000},"page":"66-85","source":"Crossref","is-referenced-by-count":5,"title":["The impact of mobility models on the performance of P2P content discovery protocols over mobile ad hoc networks"],"prefix":"10.1007","volume":"7","author":[{"given":"Hamideh","family":"Babaei","sequence":"first","affiliation":[]},{"given":"Mahmood","family":"Fathy","sequence":"additional","affiliation":[]},{"given":"Reza","family":"Berangi","sequence":"additional","affiliation":[]},{"given":"Morteza","family":"Romoozi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,11,20]]},"reference":[{"key":"184_CR1","doi-asserted-by":"crossref","unstructured":"Haas ZJ, Deng J, Liang B, Papadimitratos P, Sajama S (2002) Wireless ad hoc networks. Wiley Encyclopedia of Telecommunications","DOI":"10.1002\/0471219282.eot185"},{"key":"184_CR2","unstructured":"Schollmeier R (2001) A definition of peer to peer networking for classification of peer-to-peer architecture and applications. In Proceedings of the First International Conference on Peer-to-Peer Computing (P2P '01). IEEE Computer Society, inkoping, Sweden, August 27\u201329, 2001"},{"issue":"4","key":"184_CR3","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1145\/1041680.1041681","volume":"36","author":"S Androutsellis-Theotokis","year":"2004","unstructured":"Androutsellis-Theotokis S, Spinellis D (2004) A survey of peer-to-peer content distribution technologies. ACM Comput Surv 36(4):335\u2013371. doi: 10.1145\/1041680.1041681","journal-title":"ACM Comput Surv"},{"issue":"11","key":"184_CR4","doi-asserted-by":"crossref","first-page":"1337","DOI":"10.1016\/j.jpdc.2005.05.023","volume":"65","author":"LB Oliveira","year":"2005","unstructured":"Oliveira LB, Siqueira IG, Loureiro AAF (2005) On the performance of ad hoc routing protocols under a peer-to-peer application. J Parallel Distr Comput 65(11):1337\u20131347. doi: 10.1016\/j.jpdc.2005.05.023","journal-title":"J Parallel Distr Comput"},{"issue":"2","key":"184_CR5","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1016\/j.jpdc.2004.09.007","volume":"65","author":"FP Franciscani","year":"2005","unstructured":"Franciscani FP, Vasconcelos MA, Couto RP, Loureiro AAF (2005) (re)configuration algorithms for peer-to-peer over ad hoc networks. J Parallel Distr Comput 65(2):234\u2013245. doi: 10.1016\/j.jpdc.2004.09.007","journal-title":"J Parallel Distr Comput"},{"key":"184_CR6","unstructured":"Hu YC, Das SM, Pucha H (2003) Exploiting the synergy between peer-to-peer and mobile ad hoc networks. In HotOS-IX: Ninth Workshop on Hot Topics in Operating Systems, pp 37\u201342"},{"key":"184_CR7","doi-asserted-by":"crossref","unstructured":"Ding G, Bhargava B (2004) Peer-to-peer file-sharing over mobile ad hoc networks. In 2th IEEE Annual Conference on Pervasive Computing and Communications Workshops, pp 104\u2013108","DOI":"10.1109\/PERCOMW.2004.1276914"},{"issue":"5","key":"184_CR8","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1109\/2.841785","volume":"33","author":"L Breslau","year":"2000","unstructured":"Breslau L, Estrin D, Fall K, Floyd S, Heidemann J, Helmy A, Huang P, McCanne S, Varadhan K, Xu Y, Yu H (2000) Advances in network simulation. IEEE Comput 33(5):59\u201367. doi: 10.1109\/2.841785","journal-title":"IEEE Comput"},{"issue":"3","key":"184_CR9","doi-asserted-by":"crossref","first-page":"622","DOI":"10.1109\/JSAC.2004.842561","volume":"23","author":"AP Jardosh","year":"2005","unstructured":"Jardosh AP, Belding-Royer EM, Almeroth KC, Suri S (2005) Real-world environment models for mobile network evaluation. IEEE Journal on Special Areas Commun 23(3):622\u2013632. doi: 10.1109\/JSAC.2004.842561","journal-title":"IEEE Journal on Special Areas Commun"},{"issue":"4","key":"184_CR10","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1016\/S1570-8705(03)00040-4","volume":"1","author":"F Bai","year":"2003","unstructured":"Bai F, Sadagopan N, Helmy A (2003) The IMPORTANT framework for analyzing the Impact of mobility on performance of rouTing protocols for Adhoc NeTworks, Elsevier. Ad Hoc Network 1(4):383\u2013403. doi: 10.1016\/S1570-8705(03)00040-4","journal-title":"Ad Hoc Network"},{"key":"184_CR11","doi-asserted-by":"crossref","unstructured":"Hong X, Gerla M, Pei G, Chiang CC (1999) A group mobility model for ad hoc wireless networks. In Proceedings of the 2nd ACM international workshop on Modeling, analysis and simulation of wireless and mobile systems (MSWiM '99). ACM, New York, NY, USA, 53\u201360. doi: 10.1145\/313237.313248","DOI":"10.1145\/313237.313248"},{"issue":"1","key":"184_CR12","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1109\/TNET.2002.808407","volume":"11","author":"I Stoica","year":"2003","unstructured":"Stoica I, Morris R, Liben-Nowell D, Karger DR, Kaashoek MF, Dabek F, Balakrishnan H (2003) Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE\/ACM Trans Networking 11(1):17\u201332. doi: 10.1109\/TNET.2002.808407","journal-title":"IEEE\/ACM Trans Networking"},{"issue":"3","key":"184_CR13","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1016\/j.peva.2005.01.002","volume":"63","author":"C Gkantsidis","year":"2006","unstructured":"Gkantsidis C, Mihail M, Saberi A (2006) Random walks in peer-to-peer networks: algorithms and evaluation. Perform Eval 63(3):241\u2013263. doi: 10.1016\/j.peva.2005.01.002","journal-title":"Perform Eval"},{"key":"184_CR14","doi-asserted-by":"crossref","unstructured":"Boukerche A, Zarrad A, Araujo R (2006) Smart Gnutella overlay formation for collaborative virtual environments over mobile ad-hoc networks. In Proceedings of the 10th IEEE international symposium on Distributed Simulation and Real-Time Applications (DS-RT '06). IEEE Computer Society, Washington, DC, USA, 143\u2013156. doi: 10.1109\/DS-RT.2006.6","DOI":"10.1109\/DS-RT.2006.6"},{"key":"184_CR15","doi-asserted-by":"crossref","unstructured":"Zheng Q, Hong X, Ray S, (2004) Recent advances in mobility modeling for mobile ad Hoc Network Research. In Proceedings of the 42nd annual Southeast regional conference (ACM-SE 42). ACM, New York, NY, USA, 70\u201375. doi: 10.1145\/986537.986554","DOI":"10.1145\/986537.986554"},{"key":"184_CR16","doi-asserted-by":"crossref","first-page":"026118","DOI":"10.1103\/PhysRevE.64.026118","volume":"64","author":"MEJ Newman","year":"2001","unstructured":"Newman MEJ, Strogatz SH, Watts DJ (2001) Random graphs with arbitrary degree distributions and their applications. Phys Rev E 64:026118. doi: 10.1103\/PhysRevE.64.026118","journal-title":"Phys Rev E"},{"key":"184_CR17","unstructured":"Johnson DB, Maltz DA, Broch J (2001) DSR: the dynamic source routing protocol for multi-hop wireless ad hoc networks. In Ad Hoc Networking, Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA 139\u2013172"},{"key":"184_CR18","doi-asserted-by":"crossref","unstructured":"Perkins CE, Bhagwat P (1994) Highly dynamic destination sequenced distance vector routing (DSDV) for mobile computers, In Proceedings of the conference on Communications architectures, protocols and applications (SIGCOMM '94). ACM, New York, NY, USA, 234\u2013244. doi: 10.1145\/190314.190336","DOI":"10.1145\/190314.190336"},{"key":"184_CR19","unstructured":"Perkins C E, Royer E M (1999) Ad hoc on-demand distance vector routing. In: 2nd IEEE Workshop on Mobile Computing System and Applications, 90\u2013100"},{"key":"184_CR20","doi-asserted-by":"crossref","unstructured":"Broch J, Maltz DA, Johnson DB, Hu YC, Jetcheva J (1998) A performance comparison of multi-hop wireless ad hoc network routing protocols. In Proceedings of the Fourth Annual ACM\/IEEE International Conference on Mobile Computing and Networking, ACM, October 1998","DOI":"10.1145\/288235.288256"},{"key":"184_CR21","doi-asserted-by":"crossref","unstructured":"Hong X, Kwon T, Gerla M, Gu D, Pei G (2001) A mobility framework for ad hoc wireless networks. In Proceedings of the Second International Conference on Mobile Data Management (MDM '01), Springer-Verlag, London, UK, 185\u2013196.","DOI":"10.1007\/3-540-44498-X_15"},{"key":"184_CR22","unstructured":"da Hora DN, Macedo DF, Nogueira JMS, Pujolle G (2007) Optimizing peer-to-peer content discovery over wireless mobile ad hoc networks. In: The Ninth IFIP\/IEEE International Conference on Mobile and Wireless Communications Networks (MWCN), 6\u201310"},{"key":"184_CR23","unstructured":"Borg J (2003) A comparative study of ad hoc & peer to peer networks, Master\u2019s thesis, University College London"},{"key":"184_CR24","doi-asserted-by":"crossref","unstructured":"Gerla M, Lindemann C, Rowstron A (eds.) (2005) Peer-to-Peer Mobile Ad Hoc Networks \u2013 New Research Issues, no. 05152 in Dagstuhl Seminar Proceedings","DOI":"10.1007\/0-387-22690-7_1"},{"key":"184_CR25","doi-asserted-by":"crossref","unstructured":"Schollmeier R, Gruber Niethammer F (2003) Protocol for peer-to-peer networking in mobile environments. In 12th International Conference on Computer Communications and Networks (ICCCN 2003), 121\u2013127","DOI":"10.1109\/ICCCN.2003.1284159"},{"key":"184_CR26","doi-asserted-by":"crossref","unstructured":"Lee U, Park JS, Yeh J, Pau G, Gerla M (2006) Code torrent: content distribution using network coding in vanet. In Proceedings of the 1st international workshop on Decentralized resource sharing in mobile computing and networking (MobiShare '06). ACM, New York, NY, USA, 1\u20135. doi: 10.1145\/1161252.1161254","DOI":"10.1145\/1161252.1161254"},{"key":"184_CR27","doi-asserted-by":"crossref","unstructured":"Mecella M, Angelaccio M, Krek A, Catarci T, Buttarazzi B, Dustdar S (2006) Workpad: an adaptive peer-to-peer software infrastructure for supporting collaborative work of human operators in emergency\/disaster scenarios. In CTS\u201906: Proceedings of the International Symposium on Collaborative Technologies and Systems, IEEE Computer Society, Washington, DC, USA, 173\u2013180","DOI":"10.1109\/CTS.2006.72"},{"key":"184_CR28","doi-asserted-by":"crossref","unstructured":"Oliveira LB, Siqueira I, Macedo DF, Loureiro AA, Nogueira JM (2005) Evaluation of peer-to-peer network content discovery techniques over mobile ad hoc networks. In IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), 51\u201356","DOI":"10.1109\/WOWMOM.2005.40"},{"key":"184_CR29","doi-asserted-by":"crossref","first-page":"1445","DOI":"10.1016\/j.comcom.2009.04.005","volume":"32","author":"DN Hora da","year":"2009","unstructured":"da Hora DN, Macedo DF, Oliveira LB, Siqueira IG, Loureiro AAF, Nogueira JM, Pujolle G (2009) Enhancing peer-to-peer content discovery techniques over mobile ad hoc networks. Comput Commun 32:1445\u20131459. doi: 10.1016\/j.comcom.2009.04.005","journal-title":"Comput Commun"},{"key":"184_CR30","doi-asserted-by":"crossref","unstructured":"Romoozi M, Babaei H, Fathi M (2009) A cluster-based mobility model for intelligent nodes in Ad hoc Networks, ICCSA, LNCS 5592, Springer-Verlag Berlin Heidelberg, 804\u2013817","DOI":"10.1007\/978-3-642-02454-2_41"},{"key":"184_CR31","doi-asserted-by":"crossref","unstructured":"de Berg M, van Kreveld M, Overmars M, Schwarzkopf O (2000) Computational geometry: algorithms and applications. Springer Verlag","DOI":"10.1007\/978-3-662-04245-8"},{"key":"184_CR32","unstructured":"Eichler S, Schroth C, Ebersp\u00e4cher J (2006) Car-to-car communication. In Proceedings of the VDE-Kongress - Innovations for Europe, 2006Aachen, Germany"},{"issue":"1","key":"184_CR33","first-page":"59","volume":"42","author":"JL Rodgeers","year":"1988","unstructured":"Rodgeers JL, Nicewander AW (1988) Thirteen ways to look at the correlation coefficient. American Statistician 42(1):59\u201366. doi: 10.2307\/2685263","journal-title":"American Statistician"},{"issue":"7","key":"184_CR34","doi-asserted-by":"crossref","first-page":"999","DOI":"10.1002\/cpe.1089","volume":"19","author":"H Rostami","year":"2007","unstructured":"Rostami H, Habibi J (2007) Topology awareness of P2P overlay networks. J Concurrency Comput Pract Ex 19(7):999\u20131021. doi: 10.1002\/cpe.v19:7","journal-title":"J Concurrency Comput Pract Ex"},{"key":"184_CR35","doi-asserted-by":"crossref","unstructured":"Aschenbruck N, Ernst R, Gerhards-Padilla E, Schwamborn M (2010) BonnMotion: a mobility scenario generation and analysis tool. In Proceedings of the 3rd International ICST Conference on Simulation Tools and Techniques (SIMUTools '10). ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), ICST, Brussels, Belgium, article51,10 pages. doi: 10.4108\/ICST.SIMUTOOLS2010.8684","DOI":"10.4108\/ICST.SIMUTOOLS2010.8684"},{"issue":"1","key":"184_CR36","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1002\/nem.487","volume":"14","author":"G Held","year":"2004","unstructured":"Held G (2004) Focus on the Cisco Aironet 350 wireless access point. Int J Netw Manag 14(1):3\u20137. doi: 10.1002\/nem.487","journal-title":"Int J Netw Manag"},{"issue":"4","key":"184_CR37","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1504\/IJAHUC.2008.018911","volume":"3","author":"B Wu","year":"2008","unstructured":"Wu B, Kshemkalyani AD (2008) Analysis models for unguided search in unstructured P2P networks. Int J Ad Hoc Ubiquit Comput 3(4):255\u2013263. doi: 10.1504\/IJAHUC.2008.018911","journal-title":"Int J Ad Hoc Ubiquit Comput"},{"issue":"12","key":"184_CR38","doi-asserted-by":"crossref","first-page":"1683","DOI":"10.1109\/TPDS.2008.44","volume":"19","author":"X Tang","year":"2008","unstructured":"Tang X, Xu J, Lee WC (2008) Analysis of TTL-based consistency in unstructured peer-to-peer networks. IEEE Trans Parallel Distributed Systems 19(12):1683\u20131694. doi: 10.1109\/TPDS.2008.44v","journal-title":"IEEE Trans Parallel Distributed Systems"},{"issue":"12","key":"184_CR39","doi-asserted-by":"crossref","first-page":"2055","DOI":"10.1109\/TPDS.2011.82","volume":"22","author":"R Gaeta","year":"2011","unstructured":"Gaeta R, Sereno M (2011) Generalized probabilistic flooding in unstructured peer-to-peer networks. IEEE Trans Parallel Distr Syst 22(12):2055\u20132062. doi: 10.1109\/TPDS.2011.82","journal-title":"IEEE Trans Parallel Distr Syst"},{"key":"184_CR40","unstructured":"Leontiadis E, Dimakopoulos VV, Pitoura E (2004) Cache updates in a peer-to-peer network of mobile agents. In: Proceedings of the Fourth International Conference on Peer-to-Peer Computing (P2P '04), IEEE Computer Society, Washington, DC, USA, 10\u201317. doi: 10.1109\/P2P.2004.12"},{"key":"184_CR41","doi-asserted-by":"crossref","unstructured":"Kant K (2003) An analytic model for peer to peer file sharing networks. In Proceedings of the International Communications Conference, Anchorage, AL, USA, May, 2003","DOI":"10.1109\/ICC.2003.1203910"},{"key":"184_CR42","doi-asserted-by":"crossref","first-page":"46135","DOI":"10.1103\/PhysRevE.64.046135","volume":"64","author":"LA Adamic","year":"2001","unstructured":"Adamic LA, Lukose RM, Puniyani AR, Huberman BA (2001) Search in power-law networks. Phys Rev E 64:46135\u201346143","journal-title":"Phys Rev E"},{"issue":"1","key":"184_CR43","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.peva.2005.07.023","volume":"62","author":"R Gaeta","year":"2005","unstructured":"Gaeta R, Balbo G, Bruell S, Gribaudo M, Sereno M (2005) A simple analytical framework to analyze search strategies in large-scale peer-to-peer networks. Perform Eval 62(1):1\u201316. doi: 10.1016\/j.peva.2005.07.023","journal-title":"Perform Eval"},{"key":"184_CR44","unstructured":"Pozar DM (1998) Microwave engineering, 2nd edn. Wiley"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-012-0184-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12083-012-0184-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-012-0184-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,21]],"date-time":"2025-04-21T03:44:29Z","timestamp":1745207069000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12083-012-0184-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,11,20]]},"references-count":44,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,3]]}},"alternative-id":["184"],"URL":"https:\/\/doi.org\/10.1007\/s12083-012-0184-0","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2012,11,20]]}}}