{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T13:35:36Z","timestamp":1752672936716,"version":"3.41.0"},"reference-count":38,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2004,10,1]],"date-time":"2004-10-01T00:00:00Z","timestamp":1096588800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGMOBILE Mob. Comput. Commun. Rev."],"published-print":{"date-parts":[[2004,10]]},"abstract":"<jats:p>\n            Ad-Hoc networks are useful where infrastructure networks cannot be deployed or are not cost effective, like temporary deployment in a conference or in case of emergency. However, the nature of ad-hoc networks and especially the mobility of nodes make it difficult to achieve a certain minimum connectivity, which is an indispensable property for many applications. The question we are interested in is: How can connectivity in ad-hoc networks be improved? In this paper, we suggest to introduce dedicated mobile nodes whose only purpose is to maintain the network. These \"\n            <jats:bold>M<\/jats:bold>\n            obile\n            <jats:bold>I<\/jats:bold>\n            nfrastructure\n            <jats:bold>N<\/jats:bold>\n            od\n            <jats:bold>E<\/jats:bold>\n            s\" (MINEs) move to positions where they are useful to (re-)create links between normal nodes. We introduce into the MINE concept and then present and analyze several information exploitation and movement strategies these infrastructure nodes could follow in order to efficiently complete their job. These strategies are based on a location exchange protocol which we call\n            <jats:bold>M<\/jats:bold>\n            obile\n            <jats:bold>I<\/jats:bold>\n            nfrastructure\n            <jats:bold>L<\/jats:bold>\n            ocation\n            <jats:bold>E<\/jats:bold>\n            xchange (MILE). Simulations compare the different strategies and show the usefulness of the approach, and they argue for the efficiency of the MILE protocol.\n          <\/jats:p>","DOI":"10.1145\/1052871.1052873","type":"journal-article","created":{"date-parts":[[2007,1,17]],"date-time":"2007-01-17T18:32:02Z","timestamp":1169058722000},"page":"19-36","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["MINE and MILE"],"prefix":"10.1145","volume":"8","author":[{"given":"Horst","family":"Hellbr\u00fcck","sequence":"first","affiliation":[{"name":"International University in Germany, Bruchsal, Germany"}]},{"given":"Stefan","family":"Fischer","sequence":"additional","affiliation":[{"name":"IBR, TU Braunschweig, Braunschweig, Germany"}]}],"member":"320","published-online":{"date-parts":[[2004,10]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"http:\/\/www.darpa.mil\/ato\/programs\/SHM\/","author":"Self-Healing","year":"2002","unstructured":"Self-Healing Minefield (SHM) - program of the advanced technology office ato\/darpa. http:\/\/www.darpa.mil\/ato\/programs\/SHM\/ , 2002 -2003.]] Self-Healing Minefield (SHM) - program of the advanced technology office ato\/darpa. http:\/\/www.darpa.mil\/ato\/programs\/SHM\/, 2002-2003.]]"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/288235.288254"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0166-218X(00)00357-7"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2002.1040507"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWCN.2002.1045708"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/288235.288256"},{"issue":"5","key":"e_1_2_1_7_1","first-page":"483","article-title":"A survey of mobility models for ad hoc network research. Wireless Communications & Mobile Computing (WCMC): Special issue on Mobile Ad Hoc Networking: Research","volume":"2","author":"Camp T.","year":"2002","unstructured":"T. Camp , J. Boleng , and V. Davies . A survey of mobility models for ad hoc network research. Wireless Communications & Mobile Computing (WCMC): Special issue on Mobile Ad Hoc Networking: Research , Trends and Applications , 2 ( 5 ): 483 -- 502 , 2002 .]] T. Camp, J. Boleng, and V. Davies. A survey of mobility models for ad hoc network research. Wireless Communications & Mobile Computing (WCMC): Special issue on Mobile Ad Hoc Networking: Research, Trends and Applications, 2(5):483--502, 2002.]]","journal-title":"Trends and Applications"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2002.1019356"},{"key":"e_1_2_1_9_1","volume-title":"The ns Manual. The VINT Project - a collaboration between researchers","author":"Fall Kevin","year":"1989","unstructured":"Kevin Fall and Kannan Varadhan . The ns Manual. The VINT Project - a collaboration between researchers , 1989 -2001. http:\/\/www.isi.edu\/nsnam\/ns\/doc\/.]] Kevin Fall and Kannan Varadhan. The ns Manual. The VINT Project - a collaboration between researchers, 1989-2001. http:\/\/www.isi.edu\/nsnam\/ns\/doc\/.]]"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1015626820950"},{"key":"e_1_2_1_13_1","volume-title":"Capacity of wireless networks. Technical report","author":"Gupta P.","year":"1999","unstructured":"P. Gupta and P. Kumar . Capacity of wireless networks. Technical report , University of Illinois , Urbana-Champaign, 1999 .]] P. Gupta and P. Kumar. Capacity of wireless networks. Technical report, University of Illinois, Urbana-Champaign, 1999.]]"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.769770"},{"key":"e_1_2_1_16_1","first-page":"69","volume-title":"Proceedings of the 2002 International Conference on Wireless Networks (ICWN02)","author":"Hellbr\u00fcck Horst","year":"2002","unstructured":"Horst Hellbr\u00fcck and Stefan Fischer . Towards analysis and simulation of ad-hoc networks . In Proceedings of the 2002 International Conference on Wireless Networks (ICWN02) , pages 69 -- 75 , Las Vegas, Nevada, USA , June 2002 .]] Horst Hellbr\u00fcck and Stefan Fischer. Towards analysis and simulation of ad-hoc networks. In Proceedings of the 2002 International Conference on Wireless Networks (ICWN02), pages 69--75, Las Vegas, Nevada, USA, June 2002.]]"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/313237.313248"},{"key":"e_1_2_1_18_1","volume-title":"The Art of Computer Systems Performance Analysis","author":"Jain Raj","year":"1991","unstructured":"Raj Jain . The Art of Computer Systems Performance Analysis . John Wiley & Sons , USA , 1 edition, 1991 .]] Raj Jain. The Art of Computer Systems Performance Analysis. John Wiley & Sons, USA, 1 edition, 1991.]]"},{"key":"e_1_2_1_19_1","doi-asserted-by":"crossref","unstructured":"David B\n      Johnson\n     and \n      David A\n      Maltz\n    .\n  Dynamic Source Routing in Ad Hoc Wireless Networks volume \n  353\n   of \n  Kluwer International Series in Engineering and Computer Science (Mobile Computing) pages \n  153\n  --\n  181\n  . \n  Kluwer Academic Publishers February \n  1996\n  . editors: Imielinski and Korth.]]  David B Johnson and David A Maltz. Dynamic Source Routing in Ad Hoc Wireless Networks volume 353 of Kluwer International Series in Engineering and Computer Science (Mobile Computing) pages 153--181. Kluwer Academic Publishers February 1996. editors: Imielinski and Korth.]]","DOI":"10.1007\/978-0-585-29603-6_5"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2001.965963"},{"key":"e_1_2_1_21_1","series-title":"Kluwer International Series in Engineering and Computer Science (Communications","volume-title":"Critical Density Thresholds in Distributed Wireless Networks","author":"Krishnamachari Bhaskar","year":"2002","unstructured":"Bhaskar Krishnamachari , Stephen Wicker , Ramon Bejar , and Marc Pearlman . Critical Density Thresholds in Distributed Wireless Networks volume 712 of Kluwer International Series in Engineering and Computer Science (Communications , Information and Network Security), chapter 14. Kluwer Academic Publishers , December 2002 . editors: Bhargava, Poor, Tarokh and Yoon.]] Bhaskar Krishnamachari, Stephen Wicker, Ramon Bejar, and Marc Pearlman. Critical Density Thresholds in Distributed Wireless Networks volume 712 of Kluwer International Series in Engineering and Computer Science (Communications, Information and Network Security), chapter 14. Kluwer Academic Publishers, December 2002. editors: Bhargava, Poor, Tarokh and Yoon.]]"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345931"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/381677.381684"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1999.752157"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/65.967595"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2001.916633"},{"key":"e_1_2_1_27_1","volume-title":"Ad Hoc Networking","author":"Perkins Charles E.","year":"2000","unstructured":"Charles E. Perkins . Ad Hoc Networking . Addison Wesley Professional , 1 edition, December 2000 .]] Charles E. Perkins. Ad Hoc Networking. Addison Wesley Professional, 1 edition, December 2000.]]"},{"key":"e_1_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Charles E. Perkins Elizabeth M. Belding-Royer and S. Das. RFC3561: Ad hoc On-Demand Distance Vector (AODV) routing. http:\/\/www.ietf.org\/rfc\/rfc3561.txt July 2003.]]   Charles E. Perkins Elizabeth M. Belding-Royer and S. Das. RFC3561: Ad hoc On-Demand Distance Vector (AODV) routing. http:\/\/www.ietf.org\/rfc\/rfc3561.txt July 2003.]]","DOI":"10.17487\/rfc3561"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.42219"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.133276"},{"key":"e_1_2_1_31_1","first-page":"488","volume-title":"Proceedings of the 8th International Conference on Software Engineering and Knowledge Engineering (SEKE'96)","author":"Prakash R.","year":"1996","unstructured":"R. Prakash and M. Singhal . A dynamic approach to location management in mobile computing systems . In Proceedings of the 8th International Conference on Software Engineering and Knowledge Engineering (SEKE'96) , pages 488 -- 495 , Lake Tahoe, Nevada , June 1996 .]] R. Prakash and M. Singhal. A dynamic approach to location management in mobile computing systems. In Proceedings of the 8th International Conference on Software Engineering and Knowledge Engineering (SEKE'96), pages 488--495, Lake Tahoe, Nevada, June 1996.]]"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2001.937360"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2003.1195149"},{"key":"e_1_2_1_34_1","unstructured":"Scalable Network Technologies Inc. QualNet Simulator. http:\/\/www.scalable-networks.com.]]  Scalable Network Technologies Inc. QualNet Simulator. http:\/\/www.scalable-networks.com.]]"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/332833.332841"},{"key":"e_1_2_1_37_1","first-page":"337","volume-title":"Proceedings of the 35th Annual Simulation Symposium","author":"Tian J.","year":"2002","unstructured":"J. Tian , J. H\u00e4hner , C. Becker , I. Stepanov , and Kurt Rothermel . Graph-based mobility model for mobile ad hoc network simulation . In Proceedings of the 35th Annual Simulation Symposium , pages 337 -- 344 , San Diego, USA , April 2002 .]] J. Tian, J. H\u00e4hner, C. Becker, I. Stepanov, and Kurt Rothermel. Graph-based mobility model for mobile ad hoc network simulation. In Proceedings of the 35th Annual Simulation Symposium, pages 337--344, San Diego, USA, April 2002.]]"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2003.814342"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2002.1038346"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:WINE.0000013081.09837.c0"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1208967"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/278008.278027"}],"container-title":["ACM SIGMOBILE Mobile Computing and Communications Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1052871.1052873","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1052871.1052873","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:07:43Z","timestamp":1750262863000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1052871.1052873"}},"subtitle":["improving connectivity in mobile ad-hoc networks"],"short-title":[],"issued":{"date-parts":[[2004,10]]},"references-count":38,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2004,10]]}},"alternative-id":["10.1145\/1052871.1052873"],"URL":"https:\/\/doi.org\/10.1145\/1052871.1052873","relation":{},"ISSN":["1559-1662","1931-1222"],"issn-type":[{"type":"print","value":"1559-1662"},{"type":"electronic","value":"1931-1222"}],"subject":[],"published":{"date-parts":[[2004,10]]},"assertion":[{"value":"2004-10-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}