{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T09:20:46Z","timestamp":1758273646296},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,4,17]],"date-time":"2013-04-17T00:00:00Z","timestamp":1366156800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/2.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1186\/1687-1499-2013-103","type":"journal-article","created":{"date-parts":[[2013,4,17]],"date-time":"2013-04-17T13:56:53Z","timestamp":1366207013000},"source":"Crossref","is-referenced-by-count":23,"title":["A comprehensive-integrated buffer management strategy for opportunistic networks"],"prefix":"10.1186","volume":"2013","author":[{"given":"Daru","family":"Pan","sequence":"first","affiliation":[]},{"given":"Zhaohua","family":"Ruan","sequence":"additional","affiliation":[]},{"given":"Nian","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Xiong","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Zhaohui","family":"Song","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,4,17]]},"reference":[{"key":"688_CR1","first-page":"24","volume-title":"Proceeding of ACM SIGCOMM 2003, Karlsruhe, Germany, August 25\u201329","author":"K Fall","year":"2003","unstructured":"Fall K: A delay-tolerant network architecture for challenged internet. Proceeding of ACM SIGCOMM 2003, Karlsruhe, Germany, August 25\u201329 2003, 24-27."},{"key":"688_CR2","volume-title":"Epidemic routing for partially-connected ad hoc networks, Technical Report CS-2000-06","author":"A Vahdat","year":"2000","unstructured":"Vahdat A, Becker D: Epidemic routing for partially-connected ad hoc networks, Technical Report CS-2000-06. USA: Duke University Durham; 2000."},{"key":"688_CR3","first-page":"252","volume-title":"Proceedings of ACM SIGCOMM Workshop on Delay Tolerant Networking (WDTN), Philadelphia, USA","author":"T Spyropoulos","year":"2005","unstructured":"Spyropoulos T, Psounis K, Raghavendra CS: Spray and wait: an efficient routing in intermittently connected mobile networks. Proceedings of ACM SIGCOMM Workshop on Delay Tolerant Networking (WDTN), Philadelphia, USA 2005, 252-259."},{"key":"688_CR4","first-page":"1","volume-title":"Proceedings of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, Espoo, Finland","author":"HA Nguyen","year":"2007","unstructured":"Nguyen HA, Giordano S, Puiatti A: Probabilistic routing protocol for intermittently connected mobile ad hoc network. Proceedings of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, Espoo, Finland 2007, 1-6."},{"key":"688_CR5","first-page":"13","volume-title":"Proceedings of CHANTS\u201908, San Francisco, California, USA","author":"K Jouni","year":"2008","unstructured":"Jouni K, J\u00f6rg O: Time scales and delay-tolerant routing protocols. Proceedings of CHANTS\u201908, San Francisco, California, USA 2008, 13-19."},{"issue":"3","key":"688_CR6","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1145\/961268.961272","volume":"7","author":"A Lindgren","year":"2003","unstructured":"Lindgren A, Doria A, Schelen O: Probabilistic routing in intermittently connected networks. ACM SIGMOBILE Mob. Comput. Commun. Rev. 2003, 7(3):19-20. 10.1145\/961268.961272","journal-title":"ACM SIGMOBILE Mob. Comput. Commun. Rev"},{"issue":"3","key":"688_CR7","doi-asserted-by":"publisher","first-page":"2011","DOI":"10.1145\/2038617.2038626","volume":"8","author":"RM Santos","year":"2011","unstructured":"Santos RM, Orozco J, Ochoa S: A real-time analysis approach in opportunistic networks. ACM SIGBED Rev. 2011, 8(3):2011.","journal-title":"ACM SIGBED Rev"},{"key":"688_CR8","first-page":"201","volume-title":"Proceedings of MobiOpp \u201910, Pisa, Italy","author":"B Chiara","year":"2010","unstructured":"Chiara B: Design and analysis of context-aware forwarding protocols for opportunistic networks. Proceedings of MobiOpp \u201910, Pisa, Italy 2010, 201-202."},{"issue":"5","key":"688_CR9","doi-asserted-by":"publisher","first-page":"633","DOI":"10.1016\/j.pmcj.2008.04.003","volume":"4","author":"C Boldrini","year":"2008","unstructured":"Boldrini C, Conti M, Passarella A: Exploiting users\u2019 social relations to forward data in opportunistic networks: the HiBOp solution. Elsevier Pervasive Mob. Comput. 2008, 4(5):633-657. 10.1016\/j.pmcj.2008.04.003","journal-title":"Elsevier Pervasive Mob. Comput"},{"key":"688_CR10","first-page":"1","volume-title":"Proceeding of ACM MobiOpp, Puerto Rico, USA","author":"A Jindal","year":"2007","unstructured":"Jindal A, Psounis K: Contention-aware analysis of routing schemes for mobile opportunistic networks. Proceeding of ACM MobiOpp, Puerto Rico, USA 2007, 1-8."},{"key":"688_CR11","volume-title":"Proceedings of the 2nd International Conference on Simulation Tools and Techniques (SIMUTools, 2009), Rome, Italy","author":"A Keranen","year":"2009","unstructured":"Keranen A, Ott L: The ONE simulator for DTN protocol evaluation. Proceedings of the 2nd International Conference on Simulation Tools and Techniques (SIMUTools, 2009), Rome, Italy 2009."},{"key":"688_CR12","unstructured":"The One \n                    http:\/\/www.netlab.tkk.fi\/tutkimus\/dtn\/theone\/"},{"key":"688_CR13","doi-asserted-by":"publisher","first-page":"3378","DOI":"10.1016\/j.camwa.2011.08.052","volume":"62","author":"Z Chen","year":"2011","unstructured":"Chen Z, Qiu Y, Liu J, Xu L: Incentive mechanism for selfish nodes in wireless sensor networks based on evolutionary game. Comput. Math. Appl. 2011, 62: 3378-3388. 10.1016\/j.camwa.2011.08.052","journal-title":"Comput. Math. Appl"},{"key":"688_CR14","volume-title":"Free riding on Gnutella. Technical Report, SSL-00-63","author":"E Adar","year":"2002","unstructured":"Adar E, Huberman BA: Free riding on Gnutella. Technical Report, SSL-00-63. Ecologies Area Xerox Palo Alto Research Center: Palo Alto; 2002."},{"key":"688_CR15","first-page":"1","volume-title":"Proceedings of the IEEE INFOCOM 2010, San Diego, CA, USA","author":"Q Li","year":"2010","unstructured":"Li Q, Zhu S, Cao G: Routing in socially selfish delay tolerant networks. Proceedings of the IEEE INFOCOM 2010, San Diego, CA, USA 2010, 1-9."},{"key":"688_CR16","first-page":"1","volume-title":"Proceedings of the Second International Conference on System Software and Middleware (COMSWARE), Bangalore, India","author":"A Panagakis","year":"2007","unstructured":"Panagakis A, Vaios A, Stavrakakis I: On the effects of cooperation in DTNs. Proceedings of the Second International Conference on System Software and Middleware (COMSWARE), Bangalore, India 2007, 1-6."},{"key":"688_CR17","first-page":"413","volume-title":"Proceedings of the 6th Annual Conference on Sensor, Mesh and Ad Hoc Communications and Networks","author":"G Resta","year":"2009","unstructured":"Resta G, Santi P: The effects of node cooperation level on routing performance in delay tolerant networks. In Proceedings of the 6th Annual Conference on Sensor, Mesh and Ad Hoc Communications and Networks. Washington, DC, USA: IEEE Computer Society; 2009:413-421."},{"key":"688_CR18","first-page":"100","volume":"3462","author":"E Altman","year":"2005","unstructured":"Altman E, Kherani AA, Pietro P, Molva R: Non-cooperative forwarding in ad hoc networks. Lect. Notes Comput. Sci. 2005, 3462: 100-128.","journal-title":"Lect. Notes Comput. Sci"},{"key":"688_CR19","first-page":"226","volume-title":"Proceedings of the ACM MobiHoc, Lausanne, Switzerland, June9-11","author":"S Buchegger","year":"2002","unstructured":"Buchegger S, Boudec JL: Performance analysis of the CONFIDANT protocol. Proceedings of the ACM MobiHoc, Lausanne, Switzerland, June9-11 2002, 226-236."},{"issue":"5","key":"688_CR20","doi-asserted-by":"publisher","first-page":"1660","DOI":"10.1016\/j.jnca.2011.05.005","volume":"34","author":"AT Prodhan","year":"2011","unstructured":"Prodhan AT, Das R, Kabir H, Shoja GC: TTL based routing in opportunistic networks. J. Netw. Comput. Appl. 2011, 34(5):1660-1670. 10.1016\/j.jnca.2011.05.005","journal-title":"J. Netw. Comput. Appl"},{"key":"688_CR21","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1038\/nature06958","volume":"453","author":"MC Gonza\u2019lez","year":"2008","unstructured":"Gonza\u2019lez MC, Hidalgo CA, Baraba\u2019si L: Understanding individual human mobility patterns. Nature 2008, 453: 779-782. 10.1038\/nature06958","journal-title":"Nature"},{"issue":"8","key":"688_CR22","doi-asserted-by":"publisher","first-page":"1557","DOI":"10.1016\/j.adhoc.2011.05.007","volume":"10","author":"HA Nguyen","year":"2012","unstructured":"Nguyen HA, Giordano S: Context information prediction for social-based routing in opportunistic networks. Ad Hoc Networks 2012, 10(8):1557-1569. 10.1016\/j.adhoc.2011.05.007","journal-title":"Ad Hoc Networks"},{"key":"688_CR23","first-page":"62","volume-title":"Proceedings of MobiOpp","author":"R Ram","year":"2007","unstructured":"Ram R, Richard H, Prithwish B, Regina RH, Rajesh K: Prioritized epidemic routing for opportunistic networks. In Proceedings of MobiOpp, NY, USA. : ; 2007:62-66."}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1186\/1687-1499-2013-103\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2013-103.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2013-103.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,22]],"date-time":"2019-01-22T12:03:00Z","timestamp":1548158580000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/1687-1499-2013-103"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4,17]]},"references-count":23,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,12]]}},"alternative-id":["688"],"URL":"https:\/\/doi.org\/10.1186\/1687-1499-2013-103","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,4,17]]},"article-number":"103"}}