{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T08:54:20Z","timestamp":1729673660278,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/glocom.2014.7417024","type":"proceedings-article","created":{"date-parts":[[2016,3,28]],"date-time":"2016-03-28T15:11:24Z","timestamp":1459177884000},"page":"1-7","source":"Crossref","is-referenced-by-count":0,"title":["MDPF: An NDN Probabilistic Forwarding Strategy Based on Maximizing Deviation Method"],"prefix":"10.1109","author":[{"given":"Kai","family":"Lei","sequence":"first","affiliation":[]},{"given":"Jie","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Jiawei","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.fss.2007.01.013"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-92814-0_14"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6363829"},{"key":"ref13","first-page":"1094","article-title":"Probability-based adaptive forwarding strategy in named data networking","author":"haiyang qian","year":"2013","journal-title":"2013 IFIP\/IEEE International Symposium on Integrated Network Management (IM 2013) IM"},{"key":"ref14","first-page":"38","article-title":"Ccn interest forwarding strategy as multi-armed bandit model with delays","author":"avrachenkov","year":"2012","journal-title":"Proceedings of 2012 6th International Conference on Network Games Control and Optimization (NetGCooP)"},{"journal-title":"NdnSIM NDN Simulator for NS-3 NDN Technical Report NDN-0005","year":"2012","author":"afanasyev","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2014.6785356"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2013.6733576"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848148"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2248361.2248365"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658941"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656887"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.1201\/b11032","author":"tzeng","year":"2011","journal-title":"Multiple attribute decision making methods and applications"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2013.01.005"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/iFuzzy.2013.6825478"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/IMIS.2013.75"},{"journal-title":"Named data networking (ndn) project Tech report ndn-0001","year":"2010","author":"zhang","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.070813.00063"},{"key":"ref9","first-page":"24","article-title":"Using the method of maximizing deviations to make decision for multi-indices","volume":"7","author":"wang","year":"1998","journal-title":"Systems Engineering and Electronics"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2014.6849267"},{"journal-title":"Genetic Algorithms in Search Optimization and Machine Learning","year":"1989","author":"goldberg","key":"ref22"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1016\/j.jnca.2014.06.007","article-title":"Forwarding strategies in named data wireless ad hoc networks: design and evaluation","volume":"50","author":"amadeo","year":"2014","journal-title":"Journal of Network and Computer Applications"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2003.822655"},{"journal-title":"Nfd developers guide Technical Report NDN-0021 NDN","year":"2014","author":"afanasyev","key":"ref23"}],"event":{"name":"GLOBECOM 2015 - 2015 IEEE Global Communications Conference","start":{"date-parts":[[2015,12,6]]},"location":"San Diego, CA, USA","end":{"date-parts":[[2015,12,10]]}},"container-title":["2015 IEEE Global Communications Conference (GLOBECOM)"],"original-title":[],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T11:40:45Z","timestamp":1602675645000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7417024"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/glocom.2014.7417024","relation":{},"subject":[],"published":{"date-parts":[[2014,12]]}}}