{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T14:57:40Z","timestamp":1729609060619,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/lcn.2015.7366367","type":"proceedings-article","created":{"date-parts":[[2016,1,7]],"date-time":"2016-01-07T17:15:34Z","timestamp":1452186934000},"page":"526-534","source":"Crossref","is-referenced-by-count":0,"title":["COSC: Paths with Combined Optimal Stability and Capacity in opportunistic networks"],"prefix":"10.1109","author":[{"given":"Shiraz","family":"Qayyum","sequence":"first","affiliation":[]},{"given":"Peizhao","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Mohan","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.11.028"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2006.15"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/90.993304"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1080139.1080142"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307643"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/62266.62267"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5061995"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1132983.1132990"},{"journal-title":"CRAWDAD data set uiuc\/uim (v 2012&#x2013;01-24) Downloaded from","year":"2012","author":"nahrstedt","key":"ref16"},{"key":"ref17","article-title":"Global mobile data traffic forecast update, 20122017","author":"networking","year":"0","journal-title":"Cisco white paper"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1007\/978-3-642-20798-3_23","article-title":"Characterising aggregate inter-contact times in heterogeneous opportunistic networks","author":"passarella","year":"2011","journal-title":"NETWORKING 2011"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2006.248176"},{"key":"ref28","first-page":"cs-200006","article-title":"Epidemic routing for partially connected ad hoc networks","author":"vahdat","year":"0","journal-title":"Technical Report"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22450-8_27"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2012.6263695"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15240-5_9"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.19"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1142\/S0129054103001728"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2007.1060"},{"key":"ref8","volume":"45","author":"gibson","year":"2012","journal-title":"Mobile Communications Handbook"},{"key":"ref7","article-title":"A semantic-based algorithm for data dissemination in opportunistic networks","author":"conti","year":"2013","journal-title":"International Workshop on Self-Organizing Systems (IWSOS)"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"1056","DOI":"10.1016\/j.comcom.2010.01.013","article-title":"Hcmm: Modelling spatial and temporal properties of human mobility driven by users' social relationships","volume":"33","author":"boldrini","year":"2010","journal-title":"Computer Communications"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1038\/nature06958"},{"journal-title":"Wi-FiDirect","year":"2014","key":"ref1"},{"key":"ref20","first-page":"165","article-title":"Dissemination imvs opportunistic social networks: the role of temporal communities","author":"pietilanen","year":"2012"},{"journal-title":"CRAW-DAD data set ncsu\/mobilitymodels (v 2009&#x2013;07-23)","year":"2009","author":"rhee","key":"ref22"},{"key":"ref21","first-page":"801","article-title":"Pcy: Predicting contact volume for reliable and efficient data transfers in opportunistic networks","author":"qayyum","year":"2013","journal-title":"LCN 2013"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"1018","DOI":"10.1126\/science.1177170","article-title":"Limits of predictability in human mobility","volume":"327","author":"song","year":"2010","journal-title":"Science"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2011.38"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.897962"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2004.1381922"}],"event":{"name":"2015 IEEE 40th Conference on Local Computer Networks (LCN)","start":{"date-parts":[[2015,10,26]]},"location":"Clearwater Beach, FL","end":{"date-parts":[[2015,10,29]]}},"container-title":["2015 IEEE 40th Conference on Local Computer Networks (LCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7360816\/7366232\/07366367.pdf?arnumber=7366367","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T23:15:26Z","timestamp":1498259726000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7366367\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/lcn.2015.7366367","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}