{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T21:28:17Z","timestamp":1767994097175,"version":"3.49.0"},"reference-count":202,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]},{"name":"NSERC DIVA Strategic Network"},{"name":"TELUS"},{"name":"Department of Computing in The Hong Kong Polytechnic University"},{"DOI":"10.13039\/501100001728","name":"STINT","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100001728","id-type":"DOI","asserted-by":"crossref"}]},{"name":"SSF Profun"},{"name":"Vinnova Innovation Grant","award":["2014-00655"],"award-info":[{"award-number":["2014-00655"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2015]]},"DOI":"10.1109\/comst.2014.2371813","type":"journal-article","created":{"date-parts":[[2014,11,20]],"date-time":"2014-11-20T20:34:56Z","timestamp":1416515696000},"page":"1557-1581","source":"Crossref","is-referenced-by-count":143,"title":["A Survey on Mobile Social Networks: Applications, Platforms, System Architectures, and Future Research Directions"],"prefix":"10.1109","volume":"17","author":[{"given":"Xiping","family":"Hu","sequence":"first","affiliation":[]},{"given":"Terry H. S.","family":"Chu","sequence":"additional","affiliation":[]},{"given":"Victor C. M.","family":"Leung","sequence":"additional","affiliation":[]},{"given":"Edith C.-H.","family":"Ngai","sequence":"additional","affiliation":[]},{"given":"Philippe","family":"Kruchten","sequence":"additional","affiliation":[]},{"given":"Henry C. B.","family":"Chan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1145\/1367497.1367606"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187900"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1109\/GreenCom-iThings-CPSCom.2013.138"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2013.2273359"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2010.5470662"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511761942"},{"key":"ref175","author":"howe","year":"2006","journal-title":"The Rise of Crowdsourcing"},{"key":"ref178","first-page":"447","article-title":"Txteagle: Mobile crowdsourcing, internationalization","volume":"5623","author":"eagle","year":"2009","journal-title":"Int Des Global Develop"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1145\/1851322.1851334"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2011.308"},{"key":"ref169","author":"richardson","year":"2007","journal-title":"RESTful Web Services"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2030112.2030194"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSACW.2010.58"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/SCCC.2007.12"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1435497.1435505"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-011-0330-6"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772751"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2069000.2069015"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/EW.2010.5483495"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/WOWMOM.2008.4594893"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-008-0114-9"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1109\/EW.2009.5357972"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2009.125"},{"key":"ref185","first-page":"1040","article-title":"The simulation platform for mobile social networking","author":"wei","year":"0","journal-title":"Proc 3rd IEEE IC-BNMT"},{"key":"ref184","first-page":"57","article-title":"A middleware architecture for mobile social networking with intelligent energy saving","author":"santos","year":"0","journal-title":"Proc FedCSIS"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2005.29"},{"key":"ref182","author":"banerjee","year":"2010","journal-title":"Virtual compass Relative positioning to sense mobile social interactions"},{"key":"ref189","first-page":"1","article-title":"Wireless power transfer system design for implanted and worn devices","author":"liu","year":"0","journal-title":"Proc of the IEEE Annual Northeast Bioeng Conf"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1109\/CEFC.2010.5481512"},{"key":"ref187","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1126\/science.1143254","article-title":"Wireless power transfer via strongly coupled magnetic resonances","volume":"317","author":"kurs","year":"2007","journal-title":"Science"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2010.5663960"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2007.00367.x"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2333112.2333119"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1109\/ISORC.2008.25"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1180875.1180901"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2012.429"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1508285.1508292"},{"key":"ref21","author":"monn\u00e9","year":"2009","journal-title":"A survey of mobile social networking current internet trent"},{"key":"ref24","first-page":"283","article-title":"Mobile social networks and services, 2010","volume":"1","author":"humphreys","year":"0","journal-title":"Proc Social Comput Concepts Methodol Tools Appl"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2013.03.001"},{"key":"ref26","author":"nguyen","year":"2010","journal-title":"Mobile social network and its open research problems"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1002\/dac.1380"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.websem.2005.05.006"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6588663"},{"key":"ref154","first-page":"2137","article-title":"Twoack: Preventing selfishness in mobile ad hoc networks","author":"balakrishnan","year":"0","journal-title":"Proc IEEE WCNC"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1145\/1113361.1113367"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1145\/1386790.1386816"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462138"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2011.5984940"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2009.02.005"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209220"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2011.2116816"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1038\/nature01474"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1038\/nature02043"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/MOBHOC.2000.869216"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/CICSYN.2009.73"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/1497185.1497221"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2008.4579771"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/1734583.1734599"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.03.067"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835935"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/1578002.1578006"},{"key":"ref52","first-page":"1","article-title":"Multi-layered friendship modeling for location-based mobile social networks","author":"li","year":"0","journal-title":"6th Annual International MobiQuitous"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/52.469759"},{"key":"ref167","author":"erl","year":"2005","journal-title":"Service-Oriented Architecture Concepts Technology and Design"},{"key":"ref166","first-page":"224","article-title":"Exploring social networks for optimized user association in wireless small cell networks with device-to-device communications","author":"ashraf","year":"0","journal-title":"Proc IEEE WCNC"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1145\/2491288.2491302"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567035"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2010.5634439"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2007.909930"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1145\/1460412.1460445"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2011.2155663"},{"key":"ref4","first-page":"153","article-title":"From chatter to headlines: Harnessing the real-time web for personalized news recommendation","author":"morales","year":"0","journal-title":"Proc ACM WSDM"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.83"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1592665.1592678"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-012-0628-9"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.101"},{"key":"ref159","first-page":"275","article-title":"Challenges for mobile social networking applications, communications infrastructure, systems and applications in Europe","volume":"16","author":"rana","year":"2009","journal-title":"Social Informatics and Telecomm Eng"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2428556.2428573"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/1989656.1989659"},{"key":"ref157","first-page":"1","article-title":"Selshness, altruism and message spreading in mobile social networks","author":"hui","year":"0","journal-title":"Proc IEEE InfoCom"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/PerCom.2013.6526718"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1126\/science.1165821"},{"key":"ref46","first-page":"647","article-title":"Seer: A secure and efficient service review system for service-oriented mobile social networks","author":"liang","year":"0","journal-title":"Proc 32nd IEEE ICDCS"},{"key":"ref45","first-page":"1","article-title":"Mobile social software: Definition, scope and applications","author":"lugano","year":"0","journal-title":"Proc eChallenges Conf"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom.2010.68"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2011.2113335"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.1203"},{"key":"ref41","year":"2011"},{"key":"ref44","author":"tong","year":"2008","journal-title":"Analysis of Some Popular Mobile Social Network System"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062028"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/1080139.1080143"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.19"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/2377677.2377775"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/52324.52336"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/1288107.1288113"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1145\/1462735.1462760"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2010.5560124"},{"key":"ref75","first-page":"19","article-title":"Probabilistic routing in intermittently connected networks","author":"lindgren","year":"0","journal-title":"Proceedings of ACM SIGMOBILE Mobile Computing and Communications Review"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/1374618.1374652"},{"key":"ref79","first-page":"794","article-title":"Cooperative user centric information dissemination in human contact-based networks","author":"chuah","year":"0","journal-title":"Proc IEEE 16th ICPADS"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6829948"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2009.03.006"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1504\/IJAHUC.2007.014070"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1108\/13522751211191973"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020579"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2007.00399.x"},{"key":"ref66","first-page":"70","article-title":"An empirical study of geographic user activity patterns in foursquare","author":"noulas","year":"0","journal-title":"Proc 5th ICWSM"},{"key":"ref67","first-page":"329","article-title":"Socio-spatial properties of online location-based social networks","author":"scellato","year":"0","journal-title":"Proc 5th ICWSM"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2012.6"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2006.248176"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2006.109"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.92"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195684"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2007.35"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2006.2"},{"key":"ref195","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/MIC.2009.120","article-title":"Perci: Pervasive service interaction with the Internet of things","volume":"13","author":"gregor","year":"2009","journal-title":"IEEE Internet Comput"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1109\/SNPA.2003.1203354"},{"key":"ref95","first-page":"41","article-title":"User mobility for opportunistic ad-hoc networking","author":"su","year":"0","journal-title":"Proc 6th IEEE WMCSA"},{"key":"ref94","first-page":"391","article-title":"Haggle: Seamless networking for mobile applications","author":"su","year":"0","journal-title":"Proc UbiComp"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1145\/2070562.2070563"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-005-0046-3"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.SIMUTOOLS2009.5674"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-1674-7"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/ANSS.2007.24"},{"key":"ref90","first-page":"295","article-title":"Dynamic social grouping based routing in a mobile ad-hoc network","author":"cabaniss","year":"0","journal-title":"Proc 11th Int Conf MDM"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/WiMob.2008.48"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1145\/1755743.1755754"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2013.09.010"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.276"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1145\/1298126.1298166"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1145\/1454503.1454541"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-585-29603-6_5"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.1998.723747"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2011.5986145"},{"key":"ref89","author":"vahdat","year":"2000","journal-title":"Epidemic Routing for Partially Connected Ad Hoc Networks"},{"key":"ref85","author":"keranen","year":"2007","journal-title":"Increasing Reality for Dtn Protocol Simulations"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1145\/1317425.1317433"},{"key":"ref87","doi-asserted-by":"crossref","first-page":"1056","DOI":"10.1016\/j.comcom.2010.01.013","article-title":"HCMM: Modeling spatial and temporal properties of human mobility driven by users' social relationships","volume":"33","author":"boldrini","year":"2010","journal-title":"Comput Commun"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5061995"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1109\/DCOSS.2012.65"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2005.37"},{"key":"ref100","first-page":"243","article-title":"Peoplenet: Engineering a wire-less virtual social network","author":"motani","year":"0","journal-title":"Proc ACM MobiCom"},{"key":"ref201","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.03.017"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1109\/WONS.2009.4801864"},{"key":"ref127","first-page":"1","article-title":"Security challenges and approaches in online social networks: A survey","volume":"11","author":"ajami","year":"2011","journal-title":"Int J Comput Sci Netw Security"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1145\/1397735.1397746"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2006.1705981"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1145\/1516533.1516536"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2005.1593277"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-33112-6_7"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.06.073"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.22"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/EUC.2008.156"},{"key":"ref131","first-page":"357","article-title":"Over-exposed?: Privacy patterns and considerations in online and mobile photo sharing","author":"ahern","year":"0","journal-title":"Proc ACM SIGchi"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935065"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1145\/1734583.1734585"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2011.045230"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1145\/2501654.2501661"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.042711.00083"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.243"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1145\/1247660.1247688"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.30"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-010-0467-2"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2011.05.027"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-4371(02)00736-7"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1145\/1514411.1514412"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2007.00393.x"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2012.77"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/SBSC.2008.14"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2011.6069707"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2010.5560598"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1145\/1594139.1594155"},{"key":"ref105","first-page":"1","article-title":"Mobilehealthnet: A middleware for mobile social networks in m-health","volume":"12","author":"teles","year":"0","journal-title":"Proceedings of MobiHealth"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1145\/1531674.1531686"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.171"},{"key":"ref102","year":"2010","journal-title":"SOCIALNETS workshop wireless market report and exploitation assessment"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1145\/2512921.2512924"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2011.5928891"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1145\/1182807.1182821"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062058"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.251"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1378600.1378620"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2008.34"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2008.11.002"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2491288.2491319"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2013.59"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2007.906873"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2169033"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2010.83"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.060912.00108"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICIII.2008.206"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2012.42"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2009.12.010"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2007.912927"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1145\/2386958.2386964"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2010.0799"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.11.010"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1145\/1922649.1922656"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04383-3_31"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.306"}],"container-title":["IEEE Communications Surveys &amp; Tutorials"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9739\/7214344\/06960871.pdf?arnumber=6960871","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T15:59:12Z","timestamp":1642003152000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6960871\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"references-count":202,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/comst.2014.2371813","relation":{},"ISSN":["1553-877X","2373-745X"],"issn-type":[{"value":"1553-877X","type":"electronic"},{"value":"2373-745X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]}}}