{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T20:59:35Z","timestamp":1725483575797},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/icccn.2013.6614197","type":"proceedings-article","created":{"date-parts":[[2013,10,31]],"date-time":"2013-10-31T00:14:00Z","timestamp":1383178440000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Steady Status Study of Distributed Data Caching in Ad Hoc Networks"],"prefix":"10.1109","author":[{"given":"Julinda","family":"Taylor","sequence":"first","affiliation":[]},{"given":"Bin","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Mehmet Bayram","family":"Yildirim","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2007.70770"},{"journal-title":"Human Behavior and the Principle of Least Effort An Introduction to Human Ecology","year":"1949","author":"zipf","key":"22"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/190314.190336"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/S0166-5316(01)00045-1"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/514191.514206"},{"key":"16","article-title":"Using failure models for controlling data availability in wireless sensor networks","author":"montanari","year":"0","journal-title":"Proc of IEEE Infocom Minisymposium 2009"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2006.165"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1089444.1089460"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5061926"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/0166-218X(92)90177-C"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2006.15"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1999.749260"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2009.30"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1137\/080715421"},{"key":"1","article-title":"Approximation algorithms for data placement in arbitrary networks","author":"baev","year":"0","journal-title":"Proc of ACM-SIAM SODA 2001"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/NAS.2012.32"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2008.07.007"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2009.08.001"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/98457.98525"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633043"},{"key":"9","first-page":"1","article-title":"Contention-aware data caching in wireless multihop ad hoc networks","author":"fan","year":"2009","journal-title":"Proc of IEEE 6th International Conference on Mobile Adhoc and Sensor Systems (MASS '09)"},{"journal-title":"The ns manual","year":"0","author":"fall","key":"8"}],"event":{"name":"2013 22nd International Conference on Computer Communication and Networks (ICCCN 2013)","start":{"date-parts":[[2013,7,30]]},"location":"Nassau, Bahamas","end":{"date-parts":[[2013,8,2]]}},"container-title":["2013 22nd International Conference on Computer Communication and Networks (ICCCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6603810\/6614072\/06614197.pdf?arnumber=6614197","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T23:01:01Z","timestamp":1490223661000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6614197\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/icccn.2013.6614197","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}