{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T10:14:11Z","timestamp":1740132851313,"version":"3.37.3"},"reference-count":75,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2018,2,1]],"date-time":"2018-02-01T00:00:00Z","timestamp":1517443200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100008982","name":"Qatar National Research Fund","doi-asserted-by":"publisher","award":["NPRP8-519-1-108"],"award-info":[{"award-number":["NPRP8-519-1-108"]}],"id":[{"id":"10.13039\/100008982","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004663","name":"Ministry of Science and Technology, Taiwan","doi-asserted-by":"publisher","award":["105-2221-E-007-088","106-2221-E-007-101"],"award-info":[{"award-number":["105-2221-E-007-088","106-2221-E-007-101"]}],"id":[{"id":"10.13039\/501100004663","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Multimedia"],"published-print":{"date-parts":[[2018,2]]},"DOI":"10.1109\/tmm.2017.2744183","type":"journal-article","created":{"date-parts":[[2017,8,24]],"date-time":"2017-08-24T18:12:35Z","timestamp":1503598355000},"page":"345-360","source":"Crossref","is-referenced-by-count":8,"title":["Disseminating Multilayer Multimedia Content Over Challenged Networks"],"prefix":"10.1109","volume":"20","author":[{"given":"Hua-Jun","family":"Hong","sequence":"first","affiliation":[]},{"given":"Tarek","family":"El-Ganainy","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8116-2591","authenticated-orcid":false,"given":"Cheng-Hsin","family":"Hsu","sequence":"additional","affiliation":[]},{"given":"Khaled A.","family":"Harras","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Hefeeda","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/1143844.1143892"},{"year":"2009","key":"ref72","article-title":"LETOR 4.0 dataset"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2012.117"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2015.7179455"},{"year":"0","key":"ref74","article-title":"Best-selling smartphones in South Africa"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307643"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/2733373.2807970"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2014.2383617"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2003.822819"},{"key":"ref32","first-page":"197","article-title":"Efficient mobile access to internet data via a wireless peer-to-peer network","author":"kang","year":"2004","journal-title":"Proc IEEE Annu Conf Pervasive Comput Commun"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2393347.2393389"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2014.07.005"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.2655"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2015.2430816"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2886776"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2012.2225042"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2007.905532"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486019"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2015.2461951"},{"year":"0","key":"ref63","article-title":"Bountry workers (in Chinese)"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.7437024"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2492967"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.228"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2016.2547395"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.7462484"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2011.06.004"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/1409635.1409677"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS.2009.4808865"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/1592665.1592678"},{"year":"2015","key":"ref2","article-title":"ITU ICT facts and figures the world in 2015"},{"year":"2016","key":"ref1","article-title":"Cisco visual networking index: Forecast and methodology"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2011.6005907"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2508222.2508223"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.653"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1497909"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-009-0181-6"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2013.20"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2030652.2030660"},{"key":"ref50","first-page":"1","article-title":"Cooperative caching based on file popularity\n ranking in delay tolerant networks","author":"wang","year":"2012","journal-title":"Proc Extreme Conf Commun"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/1963192.1963361"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1038\/nature06958"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835942"},{"key":"ref57","first-page":"1082","article-title":"Friendship and mobility:\n User movement in location-based social networks","author":"cho","year":"2011","journal-title":"Proc ACM Int l Conf Knowledge Discovery & Data Mining"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557091"},{"article-title":"From Ranknet to LambdaRank to LambdaMART: An overview","year":"2010","author":"burges","key":"ref55"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775067"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/1719970.1719976"},{"year":"2015","key":"ref52","article-title":"Topia's term extractor"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2015.2436821"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2015.2451951"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2009.4912787"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2414393.2414407"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2013.33"},{"year":"2012","key":"ref14","article-title":"DTN2"},{"year":"2012","key":"ref15","article-title":"IBR-DTN"},{"article-title":"Epidemic routing for partially connected ad hoc networks","year":"2000","author":"vahdat","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/989459.989483"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.246"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2012.08.019"},{"year":"2014","key":"ref4","article-title":"Social digital and mobile in India"},{"year":"2013","key":"ref3","article-title":"How do we accelerate Internet access in Africa?"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.03.019"},{"year":"2014","key":"ref5","article-title":"It's time to take a closer look at China's mobile industry"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2015.2405343"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/863956.863960"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/2493432.2493484"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2016.2538721"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2015.2476662"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2006.886253"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/2150976.2150978"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307649"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2012.36"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2012.246"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/6046.748175"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2010.2052024"}],"container-title":["IEEE Transactions on Multimedia"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6046\/8260915\/08016388.pdf?arnumber=8016388","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:24:16Z","timestamp":1642004656000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8016388\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2]]},"references-count":75,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tmm.2017.2744183","relation":{},"ISSN":["1520-9210","1941-0077"],"issn-type":[{"type":"print","value":"1520-9210"},{"type":"electronic","value":"1941-0077"}],"subject":[],"published":{"date-parts":[[2018,2]]}}}