{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,5]],"date-time":"2022-06-05T19:10:03Z","timestamp":1654456203619},"reference-count":76,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,2,29]],"date-time":"2016-02-29T00:00:00Z","timestamp":1456704000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1186\/s13638-016-0544-1","type":"journal-article","created":{"date-parts":[[2016,2,29]],"date-time":"2016-02-29T13:28:06Z","timestamp":1456752486000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An initial analysis of packet function-aware extension to Dijkstra algorithm for wireless networks"],"prefix":"10.1186","volume":"2016","author":[{"given":"Mustafa","family":"Arisoylu","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,2,29]]},"reference":[{"key":"544_CR1","unstructured":"X Wu, W Li, F Liu, H Yu, in IEEE International Conference on Wavelet Active Media Technology and Information Processing (ICWAMTIP). Packet size distribution of typical Internet applications, (2012)."},{"issue":"6","key":"544_CR2","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/MNET.2003.1248656","volume":"17","author":"C Fraleigh","year":"2003","unstructured":"C Fraleigh, S Moon, B Lyles, C Cotton, M Khan, D Moll, R Rockell, T Seely, C Diot, Packet-level traffic measurements from the Sprint IP backcone. IEEE Network. 17(6), 6\u201316 (2003).","journal-title":"IEEE Network"},{"key":"544_CR3","unstructured":"R Sinha, C Papadopulos, J Heidemann, Internet packet size distributions: some observations, ISI-TR-2007-643. USC\/Information Sciences Institute Technical Report, (2007)."},{"key":"544_CR4","doi-asserted-by":"crossref","unstructured":"Y Cheng, V Ravindran, A Leon-Garcia, in 26th IEEE International Conference on Computer Communications, INFOCOM. Internet traffic characterization using packet-pair probing, (2007).","DOI":"10.1109\/INFCOM.2007.206"},{"key":"544_CR5","unstructured":"J Downey, Understanding VoIP packet sizing and traffic engineering, in SCRE Cable-tec Expo, White Paper, (June 2005)."},{"issue":"6","key":"544_CR6","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/65.642356","volume":"11","author":"K Thompson","year":"1997","unstructured":"K Thompson, G Miller, R Wilder, Wide-area internet traffic patterns and characteristics. IEEE Network. 11(6), 10\u201323 (1997).","journal-title":"IEEE Network"},{"key":"544_CR7","unstructured":"A Mena, J Heidemann, in Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies, INFOCOM. An empirical study of real audio traffic, (2000)."},{"key":"544_CR8","doi-asserted-by":"crossref","unstructured":"Sun, Jun, Y Wen, L Zheng, in Proceedings IEEE International Conference on Computer Communications, INFOCOM. On file-based content distribution over wireless networks via multiple paths: coding and delay trade-off, (2011).","DOI":"10.1109\/INFCOM.2011.5935187"},{"issue":"8","key":"544_CR9","doi-asserted-by":"publisher","first-page":"1528","DOI":"10.1109\/JSAC.2002.803996","volume":"20","author":"JW Byers","year":"2002","unstructured":"JW Byers, M Luby, M Mitzenmacher, A digital fountain approach to asynchronous reliable multicast. IEEE Journal on Selected Areas in Communications, JSAC. 20(8), 1528\u20131540 (2002).","journal-title":"IEEE Journal on Selected Areas in Communications, JSAC"},{"key":"544_CR10","doi-asserted-by":"crossref","unstructured":"JW Byers, M Lubyy, M Mitzenmacher, A Rege, in Proc. Special Interest Group on Data Communications Conference ACM SIGCOMM. A digital fountain approach to reliable distribution of bulk data, (1998).","DOI":"10.1145\/285237.285258"},{"key":"544_CR11","first-page":"43","volume-title":"Proceedings of Special Interest Group on Data Communications Conference, ACM SIGCOMM","author":"S Floyd","year":"2000","unstructured":"S Floyd, et al., in Proceedings of Special Interest Group on Data Communications Conference, ACM SIGCOMM. Equation-based congestion control for unicast applications (SwedenStockholm, 2000), pp. 43\u201356."},{"key":"544_CR12","unstructured":"J Padhye, D Kurose, R Towsley, in Proc. Int\u2019l. Wksp. Network and Op. Sys. Support for Digital Audio and Video, NOSSDAV. A model based TCP-friendly rate control protocol, (1999)."},{"issue":"5","key":"544_CR13","doi-asserted-by":"publisher","first-page":"703","DOI":"10.1109\/TNET.2003.818187","volume":"11","author":"S Cen","year":"2003","unstructured":"S Cen, PC Cosman, GM Voelker, End-to-end differentiation of congestion and wireless losses. Netw. IEEE\/ACM Trans. 11(5), 703\u2013717 (2003).","journal-title":"Netw. IEEE\/ACM Trans"},{"key":"544_CR14","doi-asserted-by":"crossref","unstructured":"M Arisoylu, T Javidi, RL Cruz, in IEEE International Conference on Communications, ICC. End-to-end and MAC-layer fair rate assignment in interference-limited wireless access networks, (2006).","DOI":"10.1109\/ICC.2006.255335"},{"key":"544_CR15","doi-asserted-by":"crossref","unstructured":"C Kim, Y Ko, NH Vaidya, in IEEE Military Communications Conference, MILCOM. Link-state routing protocol for multi-channel multi-interface wireless networks, (2008).","DOI":"10.1109\/MILCOM.2008.4753578"},{"key":"544_CR16","doi-asserted-by":"crossref","unstructured":"M Heusse, F Rousseau, GB Sabbatel, A Duda, in Twenty-Second Annual Joint Conference of the IEEE Computer and Communications, INFOCOM. Performance anomaly of 802.11b, (2003).","DOI":"10.1109\/INFCOM.2003.1208921"},{"key":"544_CR17","unstructured":"P Liu, Z Tao, S Panwar, in IEEE International Conference on Communications, ICC. A cooperative MAC protocol for wireless local area networks, (2005)."},{"key":"544_CR18","doi-asserted-by":"crossref","unstructured":"T Korakis, S Narayanan, A Bagri, S Panwar, in IEEE International Conference on Communications, ICC. Implementing a cooperative MAC protocol for wireless LANs, (2006).","DOI":"10.1109\/ICC.2006.255400"},{"key":"544_CR19","doi-asserted-by":"crossref","unstructured":"J Dunn, M Neufeld, A Sheth, D Grunwald, J Bennett, in IEEE First International Conference on Broadband Networks, BroadNets. A practical cross-layer mechanism for fairness in 802.11 networks, (2004).","DOI":"10.1007\/s11036-005-4459-z"},{"issue":"4","key":"544_CR20","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1007\/s11276-005-1766-z","volume":"11","author":"DSJ De Couto","year":"2005","unstructured":"DSJ De Couto, D Aguayo, J Bicket, R Morris, A high throughput path metric for multi-hop wireless routing. Journal Wireless Networks - Special issue: Selected papers from ACM MobiCom 2003. 11(4), 419\u2013434 (2005).","journal-title":"Journal Wireless Networks - Special issue: Selected papers from ACM MobiCom 2003"},{"key":"544_CR21","doi-asserted-by":"crossref","unstructured":"M Arisoylu, S Ergut, RL Cruz, R Rao, in IEEE Consumer Communications and Networking Conference, CCNC. Packet size aware path setup for wireless networks, (2008).","DOI":"10.1109\/ccnc08.2007.8"},{"key":"544_CR22","unstructured":"C Pepin, UC Kozat, AS Ramprashad, in 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, IEEE WiOpt. A joint traffic shaping and routing approach to improve the performance of 802.11 mesh networks, (2006)."},{"key":"544_CR23","doi-asserted-by":"crossref","unstructured":"B Awerbuch, D Holmer, H Rubens, High throughput route selection in multi-rate ad hoc wireless networks, Wireless On-demand Network Systems (WONS), (2004).","DOI":"10.1007\/978-3-540-24614-5_19"},{"issue":"2","key":"544_CR24","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/s11036-005-4477-x","volume":"11","author":"DHB Awerbuch","year":"2006","unstructured":"DHB Awerbuch, H Rubens, The medium time metric: High throughput route selection in multirate ad hoc wireless networks. Mobile Networks and Applications. 11(2), 253\u2013266 (2006).","journal-title":"Mobile Networks and Applications"},{"key":"544_CR25","unstructured":"M Arisoylu, RL Cruz, T Javidi, in Proceedings of the Allerton Conference on Communications, Control, and Computing. Rate assignment in micro-buffered high speed networks, (2005)."},{"key":"544_CR26","unstructured":"R Perlman, Interconnections: bridges, routers, switches and Internet-working protocols, 2nd Ed (Addison Wesley, 1999)."},{"key":"544_CR27","volume-title":"Data Networks","author":"D Bertsekas","year":"1992","unstructured":"D Bertsekas, R Gallager, Data Networks, 2nd edn. (Prentice Hall, Englewood Cliffs, New Jersey, 1992)."},{"key":"544_CR28","doi-asserted-by":"crossref","unstructured":"J Moy, OSPF version 2, RFC 2328 (1998) http:\/\/ietf.org\/rfc\/rfc2328.txt .","DOI":"10.17487\/rfc2328"},{"key":"544_CR29","doi-asserted-by":"crossref","unstructured":"T Clausen, P Jacquet, A Laouiti, P Minet, P Muhlethaler, A Qayyum, L Viennot (Optimized link state routing protocol, draft MANET-IETF, 2002. http:\/\/www.ietf.org\/internet-drafts\/draft-ietfmanet-olsr-07.txt .","DOI":"10.17487\/rfc3626"},{"key":"544_CR30","doi-asserted-by":"crossref","unstructured":"D Oran, OSI IS-IS Intra-domain routing protocol, RFC 1142 (1990) http:\/\/ietf.org\/rfc\/rfc1142.txt .","DOI":"10.17487\/rfc1142"},{"key":"544_CR31","volume-title":"OSPF, Anatomy of an Internet Routing Protocol","author":"J Moy","year":"1998","unstructured":"J Moy, OSPF, Anatomy of an Internet Routing Protocol (AddisonWesley, Boston, 1998)."},{"key":"544_CR32","unstructured":"R Murty, J Padhye, R Chandra, A Wolman, B Zill, in NSDI \u201908: 5th USENIX Symposium on Networked Systems Design and Implementation. Designing high performance enterprise Wi-Fi networks, (2008)."},{"key":"544_CR33","unstructured":"A Raniwala, T Chiueh, in IEEE International Conference on Computer Communications INFOCOM. Architecture and algorithms for an IEEE 802.11-based multi-channel wireless mesh network (Miami, FL, 2005)."},{"key":"544_CR34","doi-asserted-by":"crossref","unstructured":"KN Ramachandran, EM Belding, KC Almeroth, MM Buddhikot, in IEEE International Conference on Computer Communications INFOCOM. Interference-aware channel assignment in multi-radio wireless mesh networks, (2006).","DOI":"10.1109\/INFOCOM.2006.177"},{"issue":"8","key":"544_CR35","doi-asserted-by":"publisher","first-page":"1454","DOI":"10.1109\/49.779926","volume":"17","author":"R Sivakumar","year":"1999","unstructured":"R Sivakumar, P Sinha, V Bharghavan, CEDAR: a core-extraction distributed ad hoc routing algorithm. IEE J. Selected Areas Commun. 17(8), 1454\u20131465 (1999).","journal-title":"IEE J. Selected Areas Commun"},{"key":"544_CR36","doi-asserted-by":"crossref","unstructured":"A Raha, SS Babu, MK Naskar, O Alfandi, Hogrefe D, in IEEE 5th International Conference on Advanced Networks and Telecommunication Systems (ANTS). Trust integrated link state routing protocol for wireless sensor networks (TILSRP), (2011).","DOI":"10.1109\/ANTS.2011.6163648"},{"key":"544_CR37","doi-asserted-by":"publisher","first-page":"120","DOI":"10.2307\/1426331","volume":"3","author":"EC van der Meulen","year":"1971","unstructured":"EC van der Meulen, Three-terminal communication channels. Adv. Appl. Probab. 3:, 120\u2013154 (1971).","journal-title":"Adv. Appl. Probab"},{"issue":"11","key":"544_CR38","doi-asserted-by":"publisher","first-page":"1927","DOI":"10.1109\/TCOMM.2003.818096","volume":"51","author":"A Sendonaris","year":"2003","unstructured":"A Sendonaris, E Erkip, B Aazhang, User cooperation diversity\u2014Part I: system description. IEEE Trans. Commun. 51(11), 1927\u20131938 (2003).","journal-title":"IEEE Trans. Commun"},{"issue":"11","key":"544_CR39","doi-asserted-by":"publisher","first-page":"1939","DOI":"10.1109\/TCOMM.2003.819238","volume":"51","author":"A Sendonaris","year":"2003","unstructured":"A Sendonaris, E Erkip, B Aazhang, User cooperation diversity\u2014Part II: implementation aspects and performance analysis. IEEE Trans. Commun. 51(11), 1939\u20131948 (2003).","journal-title":"IEEE Trans. Commun"},{"issue":"5","key":"544_CR40","doi-asserted-by":"publisher","first-page":"572","DOI":"10.1109\/TIT.1979.1056084","volume":"25","author":"T Cover","year":"1979","unstructured":"T Cover, A Gamal, Capacity theorems for the relay channel. IEEE Trans. Inf. Theory. 25(5), 572\u2013584 (1979).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"9","key":"544_CR41","doi-asserted-by":"publisher","first-page":"3037","DOI":"10.1109\/TIT.2005.853304","volume":"51","author":"G Kramer","year":"2005","unstructured":"G Kramer, M Gastpar, P Gupta, Cooperative strategies and capacity theorems for relay networks. IEEE Trans. Inf. Theory. 51(9), 3037\u20133063 (2005).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"4","key":"544_CR42","doi-asserted-by":"publisher","first-page":"1522","DOI":"10.1109\/TIT.2006.871576","volume":"52","author":"A Host-Madsen","year":"2006","unstructured":"A Host-Madsen, Capacity bounds for cooperative diversity. IEEE Trans. Inf. Theory. 52(4), 1522\u20131544 (2006).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"3","key":"544_CR43","doi-asserted-by":"publisher","first-page":"805","DOI":"10.1109\/TIT.2005.864421","volume":"52","author":"L Lai","year":"2006","unstructured":"L Lai, K Liu, H El Gamal, The three-node wireless network: achievable rates and cooperation strategies. IEEE Trans. Inf. Theory. 52(3), 805\u2013828 (2006).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"544_CR44","doi-asserted-by":"crossref","unstructured":"DSJD Couto, D Aguayo, J Bicket, R Morris, in 9th annual international conference on mobile computing and networking (ACM MobiCom 03). A high-throughput path metric for multi-hop wireless networks, (2003).","DOI":"10.1145\/938985.939000"},{"key":"544_CR45","doi-asserted-by":"crossref","unstructured":"D Aguayo, J Bicket, S Biswas, G Judd, R Morris, in Proceedings of Special Interest Group on Data Communications Conference, ACM SIGCOMM. Link-level measurements from an 802.11b mesh network, (2004).","DOI":"10.1145\/1015467.1015482"},{"key":"544_CR46","doi-asserted-by":"crossref","unstructured":"R Draves, J Padhye, B Zill, in Proceedings of Special Interest Group on Data Communications Conference, ACM SIGCOMM. Comparison of routing metrics for static multi-hop wireless networks, (2004).","DOI":"10.1145\/1015467.1015483"},{"key":"544_CR47","unstructured":"A Adya, P Bahl, J Padhye, A Wolman, L Zhou, in IEEE International Conference on Broadband Networks, BroadNets. A multi-radio unification protocol for ieee 802.11 wireless networks, (2004)."},{"key":"544_CR48","doi-asserted-by":"crossref","unstructured":"S Keshav, in Proceedings of Special Interest Group on Data Communications Conference, ACM SIGCOMM. A control-theoretic approach to flow control, (1991).","DOI":"10.1145\/115992.115995"},{"key":"544_CR49","doi-asserted-by":"crossref","unstructured":"R Draves, J Padhye, B Zill, in annual international conference on mobile computing and networking in ACM MobiCom. Routing in multi-radio, multi-hop wireless mesh networks, (2004).","DOI":"10.1145\/1023720.1023732"},{"key":"544_CR50","doi-asserted-by":"crossref","unstructured":"R Karrer, A Sabharwal, E Knightly, in ACM Workshop on Hot Topics in Networks (HotNets). Enabling large-scale wireless broadband: the case for TAPs, (2003).","DOI":"10.1145\/972374.972380"},{"key":"544_CR51","unstructured":"D Aguayo, J Bicket, S Biswas, DD Couto, in annual international conference on mobile computing and networking MobiCom Poster. MIT roofnet: construction of a production quality ad-hoc network, (2003)."},{"key":"544_CR52","unstructured":"K Ramachandran, I Sheriff, E Belding, K Almeroth, in PAM\u201907 Proceedings of the 8th international conference on Passive and active network measurement. Routing stability in static wireless mesh networks, (2007)."},{"key":"544_CR53","doi-asserted-by":"crossref","unstructured":"K Fall, in Proceedings of Special Interest Group on Data Communications Conference, ACM SIGCOMM. A delay-tolerant network architecture for challenged Internets, (2003).","DOI":"10.1145\/863956.863960"},{"issue":"2","key":"544_CR54","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/s11276-012-0457-9","volume":"19","author":"Y Zeng","year":"2013","unstructured":"Y Zeng, et al., Directional routing and scheduling for green vehicular delay tolerant networks. Wireless Netw. 19(2), 161\u2013173 (2013).","journal-title":"Wireless Netw"},{"issue":"8","key":"544_CR55","doi-asserted-by":"publisher","first-page":"2349","DOI":"10.1007\/s11276-010-0276-9","volume":"16","author":"T Spyropoulos","year":"2010","unstructured":"T Spyropoulos, et al., Routing for disruption tolerant networks: taxonomy and design. Wireless Netw. 16(8), 2349\u20132370 (2010).","journal-title":"Wireless Netw"},{"key":"544_CR56","volume-title":"Delay tolerant networks: Protocols and applications","author":"A Vasilakos","year":"2012","unstructured":"A Vasilakos, et al., Delay tolerant networks: Protocols and applications (CRC Press, Boca Raton, 2012)."},{"issue":"4","key":"544_CR57","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1145\/1851275.1851233","volume":"41","author":"A Dvir","year":"2011","unstructured":"A Dvir, et al., Backpressure-based routing protocol for DTNs. ACM SIGCOMM Comput. Commun. Rev. 41(4), 405\u2013406 (2011).","journal-title":"ACM SIGCOMM Comput. Commun. Rev"},{"key":"544_CR58","doi-asserted-by":"crossref","unstructured":"Li Peng, et al., in IEEE International Conference on Computer Communications INFOCOM. CodePipe: an opportunistic feeding and routing protocol for reliable multicast with pipelined network coding, (2012).","DOI":"10.1109\/INFCOM.2012.6195456"},{"issue":"12","key":"544_CR59","doi-asserted-by":"publisher","first-page":"3264","DOI":"10.1109\/TPDS.2013.2297105","volume":"25","author":"Li Peng","year":"2014","unstructured":"Li Peng, et al., Reliable multicast with pipelined network coding using opportunistic feeding and routing. IEEE Trans. Parallel Distributed Syst. 25(12), 3264\u20133273 (2014).","journal-title":"IEEE Trans. Parallel Distributed Syst"},{"issue":"3","key":"544_CR60","first-page":"819","volume":"64","author":"L Liu","year":"2015","unstructured":"L Liu, et al., Physarum Optimization: A biology-inspired algorithm for the Steiner tree problem in networks. IEEE Trans. Comput. 64(3), 819\u2013832 (2015).","journal-title":"IEEE Trans. Comput"},{"key":"544_CR61","doi-asserted-by":"publisher","unstructured":"Y Liu, et al., Multi-layer clustering routing algorithm for wireless vehicular sensor networks. IET Commun. 4(7), 810\u2013816.","DOI":"10.1049\/iet-com.2009.0164"},{"issue":"9","key":"544_CR62","doi-asserted-by":"publisher","first-page":"1270","DOI":"10.1109\/TC.2011.145","volume":"61","author":"C Busch","year":"2012","unstructured":"C Busch, et al., Approximating congestion + dilation in networks via \u201cQuality of Routing\u201d games. IEEE Trans. Comput. 61(9), 1270\u20131283 (2012).","journal-title":"IEEE Trans. Comput"},{"key":"544_CR63","doi-asserted-by":"publisher","unstructured":"T Meng, et al., Spatial reusability-aware routing in multi-hop wireless networks. IEEE TMC (2015). doi: 10.1109\/TC.2015.2417543 .","DOI":"10.1109\/TC.2015.2417543"},{"issue":"11-12","key":"544_CR64","doi-asserted-by":"publisher","first-page":"2238","DOI":"10.1016\/j.mcm.2010.10.008","volume":"53","author":"Y-S Yen","year":"2011","unstructured":"Y-S Yen, et al., Flooding-limited and multi-constrained QoS multicast routing based on the genetic algorithm for MANETs. Math. Comput. Modell. 53(11-12), 2238\u20132250 (2011).","journal-title":"Math. Comput. Modell"},{"issue":"1","key":"544_CR65","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1109\/SURV.2013.082713.00184","volume":"16","author":"M Youssef","year":"2014","unstructured":"M Youssef, et al., Routing metrics of cognitive radio networks: a survey. IEEE Commun. Surv. Tutorials. 16(1), 92\u2013109 (2014).","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"544_CR66","doi-asserted-by":"publisher","unstructured":"I Woungang, SK Dhurandher, A Athanasios, V Vasilakos, Routing in opportunistic networks (Springer, 2013).","DOI":"10.1007\/978-1-4614-3514-3"},{"issue":"4","key":"544_CR67","doi-asserted-by":"publisher","first-page":"742","DOI":"10.1109\/TMC.2014.2331966","volume":"14","author":"XM Zhang","year":"2015","unstructured":"XM Zhang, et al., Interference-based topology control algorithm for delay-constrained mobile ad hoc networks. IEEE Trans. Mobile Comput. 14(4), 742\u2013754 (2015).","journal-title":"IEEE Trans. Mobile Comput"},{"key":"544_CR68","doi-asserted-by":"publisher","first-page":"3172","DOI":"10.1109\/JPROC.2012.2208211","volume":"12","author":"A Attar","year":"2012","unstructured":"A Attar, et al., A survey of security challenges in cognitive radio networks: solutions and future research directions. Proc. IEEE. 12:, 3172\u20133186 (2012).","journal-title":"Proc. IEEE"},{"key":"544_CR69","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2015.02.001","volume":"52","author":"AV Vasilakos","year":"2015","unstructured":"AV Vasilakos, et al., Information centric network: research challenges and opportunities. J. Netw. Comput. Appl. 52:, 1\u201310 (2015).","journal-title":"J. Netw. Comput. Appl"},{"key":"544_CR70","unstructured":"Marwaha S, et al., in Congress on Evolutionary Computation, CEC, 2. Evolutionary fuzzy multi-objective routing for wireless mobile ad hoc networks, (2004), pp. 1964\u20131971."},{"key":"544_CR71","doi-asserted-by":"crossref","unstructured":"A Vasilakos, et al., Optimizing QoS routing in hierarchical ATM networks using computational intelligence techniques. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, (2003).","DOI":"10.1109\/TSMCC.2003.817354"},{"key":"544_CR72","doi-asserted-by":"crossref","unstructured":"W Quan, C Xu, AV Vasilakos, J Guan, H Zhang, LA Grieco, in IFIP Networking Conference. TB2F: Tree-bitmap and bloom-filter for a scalable and efficient name lookup in content-centric networking, (2014).","DOI":"10.1109\/IFIPNetworking.2014.6857122"},{"key":"544_CR73","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1016\/j.comnet.2015.08.020","volume":"91","author":"K Liu","year":"2015","unstructured":"K Liu, et al., A cooperative MAC protocol with rapid relay selection for wireless ad hoc networks. Comput. Netw. 91:, 262\u2013282 (2015).","journal-title":"Comput. Netw"},{"key":"544_CR74","doi-asserted-by":"crossref","unstructured":"L Xiang, et al., in 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON). Compressed data aggregation for energy efficient wireless sensor networks, (2011).","DOI":"10.1109\/SAHCN.2011.5984932"},{"key":"544_CR75","doi-asserted-by":"crossref","unstructured":"C Perkins, Royer E, in Second IEEE Workshop on Mobile Computing Systems and Applications, WMCSA. Ad hoc on-demand distance vector routing, (1999).","DOI":"10.1109\/MCSA.1999.749281"},{"key":"544_CR76","doi-asserted-by":"crossref","unstructured":"DB Johnson, DA Maltz, Dynamic source routing in Ad-hoc Wireless Networks. Mobile Computing, pages 153\u2013181. Kluwer Academic Publishers (1996).","DOI":"10.1007\/978-0-585-29603-6_5"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-016-0544-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-016-0544-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-016-0544-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-016-0544-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,5]],"date-time":"2022-06-05T18:45:56Z","timestamp":1654454756000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-016-0544-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,2,29]]},"references-count":76,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["544"],"URL":"https:\/\/doi.org\/10.1186\/s13638-016-0544-1","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,2,29]]},"article-number":"65"}}