{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T12:20:00Z","timestamp":1764332400807},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2016,3,19]],"date-time":"2016-03-19T00:00:00Z","timestamp":1458345600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1007\/s12083-016-0450-7","type":"journal-article","created":{"date-parts":[[2016,3,19]],"date-time":"2016-03-19T04:35:41Z","timestamp":1458362141000},"page":"910-924","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["MobiStore: A system for efficient mobile P2P data sharing"],"prefix":"10.1007","volume":"10","author":[{"given":"Mohammad A","family":"Khan","sequence":"first","affiliation":[]},{"given":"Laurent","family":"Yeh","sequence":"additional","affiliation":[]},{"given":"Karine","family":"Zeitouni","sequence":"additional","affiliation":[]},{"given":"Cristian","family":"Borcea","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,19]]},"reference":[{"key":"450_CR1","unstructured":"A mobility scenario generation and analysis tool (2016). http:\/\/sys.cs.uos.de\/bonnmotion\/"},{"key":"450_CR2","doi-asserted-by":"publisher","unstructured":"Araujo F, Rodrigues L, Kaiser J, Liu C, Mitidieri C (2005) Chr: a distributed hash table for wireless ad hoc networks. In: 25th IEEE international conference on distributed computing systems workshops, 2005. IEEE, pp 407\u2013413","DOI":"10.1109\/ICDCSW.2005.48"},{"key":"450_CR3","doi-asserted-by":"publisher","unstructured":"Binzenhofer A, Staehle D, Henjes R (2005) On the stability of chord-based p2p systems. In: Global telecommunications conference, 2005. GLOBECOM\u201905, vol 2. IEEE, pp 5\u2013pp","DOI":"10.1109\/GLOCOM.2005.1577765"},{"key":"450_CR4","doi-asserted-by":"publisher","unstructured":"Caesar M, Castro M, Nightingale EB, O\u2019Shea G, Rowstron A (2006) Virtual ring routing: network routing inspired by dhts. In: ACM SIGCOMM computer communication review, vol 36. ACM, pp 351\u2013362","DOI":"10.1145\/1159913.1159954"},{"issue":"3","key":"450_CR5","first-page":"11","volume":"28","author":"H Cao","year":"2005","unstructured":"Cao H, Wolfson O, Xu B, Yin H (2005) Mobi-dic: Mobile discovery of local resources in peer-to-peer wireless network. IEEE Data Eng Bull 28(3):11\u201318","journal-title":"IEEE Data Eng Bull"},{"key":"450_CR6","doi-asserted-by":"publisher","unstructured":"Cao Q, Fujita S (2010) Load balancing schemes for a hierarchical peer-to-peer file search system. In: International conference on P2P, parallel, grid, cloud and internet computing (3PGCIC), 2010. IEEE, pp 63\u201370","DOI":"10.1109\/3PGCIC.2010.15"},{"key":"450_CR7","doi-asserted-by":"publisher","unstructured":"Chakravorty R, Agarwal S, Banerjee S, Pratt I (2005) Mob: a mobile bazaar for wide-area wireless services. In: Proceedings of the 11th annual international conference on mobile computing and networking. ACM, pp 228\u2013242","DOI":"10.1145\/1080829.1080854"},{"key":"450_CR8","doi-asserted-by":"publisher","unstructured":"Druschel P, Rowstron A (2001) Past: a large-scale, persistent peer-to-peer storage utility. In: Proceedings of the 8th workshop on hot topics in operating systems, 2001. IEEE, pp 75\u2013 80","DOI":"10.1109\/HOTOS.2001.990064"},{"key":"450_CR9","unstructured":"Erd6s P, R\u00e9nyi A (1960) On the evolution of random graphs. Publ Math Inst Hungar Acad Sci 5:17\u201361"},{"key":"450_CR10","unstructured":"Fitchard K (2012) Can cell phone data cure society\u2019s ills? http:\/\/gigaom.com\/2012\/03\/11\/10-ways-big-data-is-changing-everything\/8\/"},{"key":"450_CR11","doi-asserted-by":"publisher","unstructured":"Gupta I, Birman K, Linga P, Demers A, Van Renesse R (2003) Kelips: Building an efficient and stable p2p dht through increased memory and background overhead. In: Peer-to-peer systems II. Springer, pp 160\u2013169","DOI":"10.1007\/978-3-540-45172-3_15"},{"key":"450_CR12","doi-asserted-by":"publisher","unstructured":"Hofstatter Q, Zols S, Michel M, Despotovic Z, Kellerer W (2008) Chordella-a hierarchical peer-to-peer overlay implementation for heterogeneous, mobile environments. In: 8th international conference on peer-to-peer computing, 2008. P2P\u201908. IEEE, pp 75\u2013 76","DOI":"10.1109\/P2P.2008.42"},{"key":"450_CR13","doi-asserted-by":"publisher","unstructured":"Horozov T, Grama A, Vasudevan V, Landis S (2002) Moby-a mobile peer-to-peer service and data network. In: Proceedings of international conference on parallel processing, 2002. IEEE, pp 437\u2013444","DOI":"10.1109\/ICPP.2002.1040900"},{"key":"450_CR14","unstructured":"Jiang W, Xu C, Huang M, Lai J, Xu S (2011) Improved chord algorithm in mobile peer-to-peer network"},{"key":"450_CR15","unstructured":"Karthik BG, Lakshminarayanan K, Surana S, Karp R, Stoica I (2004) Load balancing in dynamic structured p2p systems. In: Proceedings of IEEE INFOCOM. Citeseer, Hong Kong"},{"issue":"11","key":"450_CR16","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1145\/356989.357007","volume":"35","author":"J Kubiatowicz","year":"2000","unstructured":"Kubiatowicz J, Bindel D, Chen Y, Czerwinski S, Eaton P, Geels D, Gummadi R, Rhea S, Weatherspoon H, Weimer W, et al. (2000) Oceanstore: an architecture for global-scale persistent storage. ACM Sigplan Notices 35(11):190\u2013 201","journal-title":"ACM Sigplan Notices"},{"key":"450_CR17","doi-asserted-by":"publisher","unstructured":"Landsiedel O, Lehmann KA, Wehrle K (2005) T-dht: topology-based distributed hash tables. In: 5th IEEE international conference on peer-to-peer computing, 2005. P2P 2005. IEEE, pp 143\u2013144","DOI":"10.1109\/P2P.2005.36"},{"key":"450_CR18","doi-asserted-by":"publisher","unstructured":"Lee JW, Schulzrinne H, Kellerer W, Despotovic Z (2009) mdht: multicast-augmented dht architecture for high availability and immunity to churn. In: 6th IEEE consumer communications and networking conference, 2009. CCNC 2009 . IEEE, pp 1\u20135","DOI":"10.1109\/CCNC.2009.4784714"},{"issue":"1","key":"450_CR19","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1109\/TVT.2009.2030892","volume":"59","author":"U Lee","year":"2010","unstructured":"Lee U, Lee J, Park JS, Gerla M (2010) Fleanet: a virtual market place on vehicular networks. IEEE Trans Veh Technol 59(1):344\u2013355","journal-title":"IEEE Trans Veh Technol"},{"key":"450_CR20","doi-asserted-by":"publisher","unstructured":"Liquori L, Tedeschi C, Vanni L, Bongiovanni F, Ciancaglini V, Marinkovi\u0107 B (2010) Synapse: a scalable protocol for interconnecting heterogeneous overlay networks. In: NETWORKING 2010. Springer, pp 67\u201382","DOI":"10.1007\/978-3-642-12963-6_6"},{"issue":"3","key":"450_CR21","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1504\/IJAHUC.2010.034968","volume":"6","author":"CL Liu","year":"2010","unstructured":"Liu CL, Wang CY, Wei HY (2010) Cross-layer mobile chord p2p protocol design for vanet. Int J Ad Hoc Ubiquitous Comput 6(3):150\u2013163","journal-title":"Int J Ad Hoc Ubiquitous Comput"},{"key":"450_CR22","doi-asserted-by":"crossref","unstructured":"Montresor A, Jelasity M (2009) PeerSim: a scalable P2P simulator. In: Proceedings of the 9th international conference on peer-to-peer (P2P\u201909), Seattle, pp 99\u2013100","DOI":"10.1109\/P2P.2009.5284506"},{"key":"450_CR23","doi-asserted-by":"publisher","unstructured":"Mordacchini M, Ricci L, Ferrucci L, Albano M, Baraglia R (2010) Hivory: Range queries on hierarchical voronoi overlays. In: IEEE 10th international conference on peer-to-peer computing (P2P), 2010. IEEE, pp 1\u201310","DOI":"10.1109\/P2P.2010.5569973"},{"key":"450_CR24","unstructured":"Orf D. (2014) So whatever happened to post-pc? http:\/\/www.gizmodo.in\/gadgets\/So-Whatever-Happened-to-Post-PC\/articleshow\/40069551.cms"},{"key":"450_CR25","doi-asserted-by":"publisher","unstructured":"P\u00e1sztor B, Musolesi M, Mascolo C (2007) Opportunistic mobile sensor data collection with scar. In: IEEE international conference on mobile Adhoc and sensor systems, 2007. MASS 2007. IEEE, pp 1\u201312","DOI":"10.1109\/MOBHOC.2007.4428679"},{"key":"450_CR26","doi-asserted-by":"publisher","unstructured":"Rao A, Lakshminarayanan K, Surana S, Karp R, Stoica I (2003) Load balancing in structured p2p systems. In: Peer-to-peer systems II. Springer, pp 68\u201379","DOI":"10.1007\/978-3-540-45172-3_6"},{"key":"450_CR27","doi-asserted-by":"publisher","unstructured":"Ratnasamy S, Francis P, Handley M, Karp R, Shenker S (2001) A scalable content-addressable network. In: Proceedings of the 2001 conference on applications, technologies, architectures, and protocols for computer communications, SIGCOMM \u201901. ACM, New YOrk, pp 161\u2013172","DOI":"10.1145\/383059.383072"},{"key":"450_CR28","doi-asserted-by":"publisher","unstructured":"Ratnasamy S, Karp B, Yin L, Yu F, Estrin D, Govindan R, Shenker S (2002) Ght: a geographic hash table for data-centric storage. In: Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications. ACM, pp 78\u2013 87","DOI":"10.1145\/570738.570750"},{"key":"450_CR29","unstructured":"Rhea S, Geels D, Roscoe T, Kubiatowicz J (2004) Handling churn in a dht, Boston, pp 127\u2013140"},{"key":"450_CR30","doi-asserted-by":"publisher","unstructured":"Rowstron A, Druschel P (2001) Pastry: scalable, decentralized object location, and routing for large-scale peer-to-peer systems. In: Middleware 2001. Springer, pp 329\u2013350","DOI":"10.1007\/3-540-45518-3_18"},{"key":"450_CR31","doi-asserted-by":"publisher","unstructured":"Rybicki J, Scheuermann B, Koegel M, Mauve M (2009) Peertis: a peer-to-peer traffic information system. In: Proceedings of the 6th ACM international workshop on vehiculAr InterNETworking. ACM, pp 23\u201332","DOI":"10.1145\/1614269.1614275"},{"key":"450_CR32","doi-asserted-by":"publisher","unstructured":"Shaker A, Reeves DS (2005) Self-stabilizing structured ring topology p2p systems. In: 5th IEEE international conference on peer-to-peer computing, 2005. P2P 2005. IEEE, pp 39\u2013 46","DOI":"10.1109\/P2P.2005.34"},{"issue":"1","key":"450_CR33","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1109\/TNET.2002.808407","volume":"11","author":"I Stoica","year":"2003","unstructured":"Stoica I, Morris R, Liben-Nowell D, Karger DR, Kaashoek MF, Dabek F, Balakrishnan H (2003) Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE\/ACM Trans on Netw 11(1):17\u201332","journal-title":"IEEE\/ACM Trans on Netw"},{"key":"450_CR34","unstructured":"Waal M (2010) Mobile phones, social networks and location data: recognizing the nuances of privacy. http:\/\/www.themobilecity.nl\/2010\/06\/10\/mobile-phones-social-networks-and-location-data-recognizing-the-nuances-of-privacy\/"},{"key":"450_CR35","doi-asserted-by":"crossref","unstructured":"Woungang I, Tseng FH, Lin YH, Chou LD, Chao HC, Obaidat MS (2014) Mr-chord: Improved chord lookup performance in structured mobile p2p networks (99):1\u20139","DOI":"10.1109\/JSYST.2014.2306147"},{"issue":"1","key":"450_CR36","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/JSAC.2003.818784","volume":"22","author":"BY Zhao","year":"2004","unstructured":"Zhao BY, Huang L, Stribling J, Rhea SC, Joseph AD, Kubiatowicz JD (2004) Tapestry: a resilient global-scale overlay for service deployment. IEEE J Sel Areas Commun 22(1):41\u2013 53","journal-title":"IEEE J Sel Areas Commun"},{"issue":"2","key":"450_CR37","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/s12083-011-0109-3","volume":"5","author":"M Zulhasnine","year":"2012","unstructured":"Zulhasnine M, Huang C, Srinivasan A (2012) Towards an effective integration of cellular users to the structured peer-to-peer network. Peer-to-Peer Netw Appl 5(2):178\u2013192","journal-title":"Peer-to-Peer Netw Appl"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-016-0450-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12083-016-0450-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-016-0450-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-016-0450-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,5]],"date-time":"2019-09-05T19:05:26Z","timestamp":1567710326000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12083-016-0450-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,19]]},"references-count":37,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,7]]}},"alternative-id":["450"],"URL":"https:\/\/doi.org\/10.1007\/s12083-016-0450-7","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,3,19]]}}}