{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:24:39Z","timestamp":1750307079665,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,10,21]],"date-time":"2012-10-21T00:00:00Z","timestamp":1350777600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10,21]]},"DOI":"10.1145\/2387238.2387253","type":"proceedings-article","created":{"date-parts":[[2012,10,22]],"date-time":"2012-10-22T12:07:05Z","timestamp":1350907625000},"page":"69-78","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["CRISP"],"prefix":"10.1145","author":[{"given":"Umair","family":"Sadiq","sequence":"first","affiliation":[{"name":"University of Texas at Arlington, Arlington, TX, USA"}]},{"given":"Mohan","family":"Kumar","sequence":"additional","affiliation":[{"name":"University of Texas at Arlington, Arlington, TX, USA"}]},{"given":"Matthew","family":"Wright","sequence":"additional","affiliation":[{"name":"University of Texas at Arlington, Arlington, TX, USA"}]}],"member":"320","published-online":{"date-parts":[[2012,10,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/938985.939011"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2011.44"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1287\/opre.5.5.650"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/993483"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.228"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1025146013151"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1454503.1454541"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/986858.986862"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/1833515.1833659"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1833515.1833765"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/1831443.1831459"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.19"},{"key":"e_1_3_2_1_13_1","first-page":"878","article-title":"Generalized maximum flows over time","author":"Gro\u03b2 M.","year":"2012","unstructured":"M. Gro\u03b2 and M. Skutella . Generalized maximum flows over time . In Matheon Preprint 878 , 2012 . M. Gro\u03b2 and M. Skutella. Generalized maximum flows over time. In Matheon Preprint 878, 2012.","journal-title":"Matheon Preprint"},{"key":"e_1_3_2_1_14_1","volume-title":"Collaboration in Opportunistic Networks","author":"Heinemann A.","year":"2007","unstructured":"A. Heinemann . Collaboration in Opportunistic Networks . VDM Verlag , 2007 . A. Heinemann. Collaboration in Opportunistic Networks. VDM Verlag, 2007."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1374618.1374652"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.1998.683074"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062170"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755743.1755746"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-27767-5_24"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.04.090557"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/301250.301287"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MOBIQ.2007.4451069"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/2015553.2015772"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/WOWMOM.2010.5534944"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.145"},{"key":"e_1_3_2_1_26_1","unstructured":"I. Rhee M. Shin S. Hong K. Lee S. Kim and S. Chong. CRAWDAD trace. http:\/\/crawdad.cs.dartmouth.edu\/ncsu\/mobilitymodels\/GPS\/NC_State_Fair July 2009.  I. Rhee M. Shin S. Hong K. Lee S. Kim and S. Chong. CRAWDAD trace. http:\/\/crawdad.cs.dartmouth.edu\/ncsu\/mobilitymodels\/GPS\/NC_State_Fair July 2009."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2011.38"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10107-005-0608-1"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.897962"},{"key":"e_1_3_2_1_30_1","volume-title":"CoRR","author":"V\u00e9gh L. A.","year":"2011","unstructured":"L. A. V\u00e9gh . Concave generalized flows with applications to market equilibria . CoRR , 2011 . L. A. V\u00e9gh. Concave generalized flows with applications to market equilibria. CoRR, 2011."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1161089.1161134"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2006.66"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409979"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209220"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-006-9855-1"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287853.1287887"},{"issue":"8","key":"e_1_3_2_1_37_1","article-title":"Smart: A secure multilayer credit-based incentive scheme for delay-tolerant networks","volume":"58","author":"Zhu H.","year":"2009","unstructured":"H. Zhu , X. Lin , R. Lu , Y. Fan , and X. Shen . Smart: A secure multilayer credit-based incentive scheme for delay-tolerant networks . IEEE Trans. Veh. Technol. , 58 ( 8 ), 2009 . H. Zhu, X. Lin, R. Lu, Y. Fan, and X. Shen. Smart: A secure multilayer credit-based incentive scheme for delay-tolerant networks. IEEE Trans. Veh. Technol., 58(8), 2009.","journal-title":"IEEE Trans. Veh. Technol."}],"event":{"name":"MSWiM '12: The 15th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","sponsor":["SIGSIM ACM Special Interest Group on Simulation and Modeling"],"location":"Paphos Cyprus","acronym":"MSWiM '12"},"container-title":["Proceedings of the 15th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2387238.2387253","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2387238.2387253","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:34:08Z","timestamp":1750239248000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2387238.2387253"}},"subtitle":["collusion-resistant incentive-compatible routing and forwarding in opportunistic networks"],"short-title":[],"issued":{"date-parts":[[2012,10,21]]},"references-count":37,"alternative-id":["10.1145\/2387238.2387253","10.1145\/2387238"],"URL":"https:\/\/doi.org\/10.1145\/2387238.2387253","relation":{},"subject":[],"published":{"date-parts":[[2012,10,21]]},"assertion":[{"value":"2012-10-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}