{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:19:39Z","timestamp":1750306779229,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,8,17]],"date-time":"2013-08-17T00:00:00Z","timestamp":1376697600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61172087"],"award-info":[{"award-number":["61172087"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,8,17]]},"DOI":"10.1145\/2499788.2499796","type":"proceedings-article","created":{"date-parts":[[2013,8,27]],"date-time":"2013-08-27T12:58:57Z","timestamp":1377608337000},"page":"243-247","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Cache management method for transmitting real-time streaming media in opportunistic networks based on community networks"],"prefix":"10.1145","author":[{"given":"Daru","family":"Pan","sequence":"first","affiliation":[{"name":"South China Normal University, Guangzhou, China"}]},{"given":"Xiong","family":"Liu","sequence":"additional","affiliation":[{"name":"South China Normal University, Guangzhou, China"}]},{"given":"Xin","family":"Zou","sequence":"additional","affiliation":[{"name":"South China Normal University, Guangzhou, China"}]},{"given":"Jiajia","family":"Sun","sequence":"additional","affiliation":[{"name":"South China Normal University, Guangzhou, China"}]},{"given":"Hui","family":"Zhang","sequence":"additional","affiliation":[{"name":"South China Normal University, Guangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2013,8,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2006.248176"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080139.1080142"},{"key":"e_1_3_2_1_3_1","volume-title":"N-Drop: congestion control strategy under epidemic routing in DTN{C}\/\/IEEE.2010 ICFN10 Second International Conference on Future Networks","author":"Li Y","year":"2010","unstructured":"Li Y , Zhao L , Liu Z , N-Drop: congestion control strategy under epidemic routing in DTN{C}\/\/IEEE.2010 ICFN10 Second International Conference on Future Networks . China : IEEE , 2010 : 233--236. Li Y, Zhao L, Liu Z, et al. N-Drop: congestion control strategy under epidemic routing in DTN{C}\/\/IEEE.2010 ICFN10 Second International Conference on Future Networks. China: IEEE, 2010: 233--236."},{"issue":"5","key":"e_1_3_2_1_4_1","first-page":"98","article-title":"cache replacement policy for opportunistic networks {J}.","volume":"31","author":"Ye Hui","year":"2010","unstructured":"Ye Hui , Chen Zhigang, Zhao Ming . ON-CRP : cache replacement policy for opportunistic networks {J}. Journal on Communications , 2010 , 31 ( 5 ): 98 -- 107 . Ye Hui, Chen Zhigang, Zhao Ming. ON-CRP: cache replacement policy for opportunistic networks {J}.Journal on Communications, 2010, 31(5): 98--107.","journal-title":"Journal on Communications"},{"issue":"4","key":"e_1_3_2_1_5_1","first-page":"88","article-title":"Congestion Control Strategy Based on Copy Rate in DIN {J}","volume":"33","author":"Liu Qilie","year":"2010","unstructured":"Liu Qilie , Pan Yingjun, Li Yun et al . Congestion Control Strategy Based on Copy Rate in DIN {J} . Journal of Beijing University of Posts and Telecommunications , 2010 , 33 ( 4 ): 88 -- 92 . Liu Qilie, Pan Yingjun, Li Yun et al. Congestion Control Strategy Based on Copy Rate in DIN {J}. Journal of Beijing University of Posts and Telecommunications, 2010, 33(4):88--92.","journal-title":"Journal of Beijing University of Posts and Telecommunications"},{"volume-title":"The 5thAnnual IEEE Communications Society Conference on Sensor, Mesh and Ad hoc Communications and Networks, SanFrancisco, CA","author":"Krifa A","key":"e_1_3_2_1_6_1","unstructured":"Krifa A , Barakat C , and Spyropoulos T . Optimal buffer management policies for delay tolerant networks {C} . The 5thAnnual IEEE Communications Society Conference on Sensor, Mesh and Ad hoc Communications and Networks, SanFrancisco, CA , 2008: 260--268. Krifa A, Barakat C, and Spyropoulos T. Optimal buffer management policies for delay tolerant networks {C}. The 5thAnnual IEEE Communications Society Conference on Sensor, Mesh and Ad hoc Communications and Networks, SanFrancisco, CA, 2008: 260--268."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2012.05.003"},{"key":"e_1_3_2_1_8_1","first-page":"76","article-title":"The Survey of Researches of Social Supporting Networks Abroad {J}","volume":"1","author":"He Zhaiping","year":"2001","unstructured":"He Zhaiping . The Survey of Researches of Social Supporting Networks Abroad {J} . Social Sciences Abroad , 2001 , 1 : 76 -- 82 . He Zhaiping. The Survey of Researches of Social Supporting Networks Abroad {J}. Social Sciences Abroad, 2001,1:76--82.","journal-title":"Social Sciences Abroad"},{"key":"e_1_3_2_1_9_1","volume-title":"Complexity statistical characteristics for Ad hoc network based on random waypoint model {J}. Journal of Beijing university of Aeronautics and Astronautics","author":"Tong Chao","year":"2008","unstructured":"Tong Chao , Long Xiang, Gao Xiaopeng . Complexity statistical characteristics for Ad hoc network based on random waypoint model {J}. Journal of Beijing university of Aeronautics and Astronautics , 2008 , 34(10): 1236--1242 Tong Chao, Long Xiang, Gao Xiaopeng. Complexity statistical characteristics for Ad hoc network based on random waypoint model {J}. Journal of Beijing university of Aeronautics and Astronautics, 2008, 34(10): 1236--1242"},{"issue":"2","key":"e_1_3_2_1_10_1","first-page":"117","article-title":"Adding Redundancy to Replication Window-aware Delay-tolerant Routing {J}","volume":"5","author":"Sanduleseu G","year":"2010","unstructured":"Sanduleseu G , Nadjm-Tehrani S . Adding Redundancy to Replication Window-aware Delay-tolerant Routing {J} . Journal of Communication , 2010 , 5 ( 2 ): 117 -- 124 . Sanduleseu G, Nadjm-Tehrani S. Adding Redundancy to Replication Window-aware Delay-tolerant Routing {J}. Journal of Communication, 2010, 5 (2): 117--124.","journal-title":"Journal of Communication"}],"event":{"name":"ICIMCS '13: International Conference on Internet Multimedia Computing and Service","sponsor":["NSF of China National Natural Science Foundation of China","University of Sciences & Technology, Hefei University of Sciences & Technology, Hefei","Beijing ACM SIGMM Chapter"],"location":"Huangshan China","acronym":"ICIMCS '13"},"container-title":["Proceedings of the Fifth International Conference on Internet Multimedia Computing and Service"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2499788.2499796","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2499788.2499796","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:33:58Z","timestamp":1750232038000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2499788.2499796"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8,17]]},"references-count":10,"alternative-id":["10.1145\/2499788.2499796","10.1145\/2499788"],"URL":"https:\/\/doi.org\/10.1145\/2499788.2499796","relation":{},"subject":[],"published":{"date-parts":[[2013,8,17]]},"assertion":[{"value":"2013-08-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}