{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:16:10Z","timestamp":1761401770329},"reference-count":32,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE J. Select. Areas Commun."],"published-print":{"date-parts":[[2016,1]]},"DOI":"10.1109\/jsac.2015.2452472","type":"journal-article","created":{"date-parts":[[2015,7,7]],"date-time":"2015-07-07T21:20:29Z","timestamp":1436304029000},"page":"122-137","source":"Crossref","is-referenced-by-count":49,"title":["Offloading Cellular Traffic Through Opportunistic Communications: Analysis and Optimization"],"prefix":"10.1109","volume":"34","author":[{"given":"Vincenzo","family":"Sciancalepore","sequence":"first","affiliation":[]},{"given":"Domenico","family":"Giustiniano","sequence":"additional","affiliation":[]},{"given":"Albert","family":"Banchs","sequence":"additional","affiliation":[]},{"given":"Andreea","family":"Hossmann-Picu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2007.374424"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1814433.1814456"},{"key":"ref30","author":"chaintreau","year":"2005","journal-title":"Pocket switched networks Real-world mobility and its consequences for opportunistic forwarding"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658977"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SECON.2012.6275786"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2030652.2030665"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/EW.2010.5483523"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462163"},{"key":"ref15","author":"sermpezis","year":"2012","journal-title":"Delay analysis of epidemic schemes in sparse and dense heterogeneous contact environments"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644927"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.AUTONOMICS2007.2131"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.2011734"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.99"},{"key":"ref28","author":"franklin","year":"1990","journal-title":"Digital Control of Dynamic Systems"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062058"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2001.916647"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2006.248176"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1859934.1859943"},{"key":"ref29","author":"piorkowski","year":"2009","journal-title":"CRAWDAD data set epfl\/mobility (v 2009-02-24)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2011.5986466"},{"key":"ref8","author":"daley","year":"2005","journal-title":"Epidemic Modelling An Introduction"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307643"},{"key":"ref2","year":"2012","journal-title":"Cisco Visual Networking Index Global mobile data traffic forecast update 2011&#x2013;2016"},{"key":"ref9","first-page":"26","article-title":"Mobile data offloading: How much can WiFi deliver?","author":"lee","year":"0","journal-title":"Proc ACM CoNEXT"},{"key":"ref1","year":"2012","journal-title":"Gartner Says Worldwide Smartphone Sales Soared in Fourth Quarter of 2011 with 47 Percent Growth"},{"key":"ref20","first-page":"301","article-title":"Characterising aggregate inter-contact times in heterogeneous opportunistic networks","author":"passarella","year":"0","journal-title":"10th International IFIP TC 6 Conference on Networking"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1162654.1162661"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2005.07.018"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2007.1060"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SECON.2012.6275828"},{"key":"ref26","author":"kalman","year":"1969","journal-title":"Topics in Mathematical System Theory"},{"key":"ref25","author":"\u00e5str\u00f6m","year":"1990","journal-title":"Computer Controlled Systems Theory and Design"}],"container-title":["IEEE Journal on Selected Areas in Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/49\/5594698\/07147782.pdf?arnumber=7147782","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:47:24Z","timestamp":1642006044000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7147782\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1]]},"references-count":32,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/jsac.2015.2452472","relation":{},"ISSN":["0733-8716"],"issn-type":[{"value":"0733-8716","type":"print"}],"subject":[],"published":{"date-parts":[[2016,1]]}}}