{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T15:42:37Z","timestamp":1762875757749},"reference-count":73,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,3,22]],"date-time":"2016-03-22T00:00:00Z","timestamp":1458604800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1186\/s13638-016-0576-6","type":"journal-article","created":{"date-parts":[[2016,3,22]],"date-time":"2016-03-22T02:03:40Z","timestamp":1458612220000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["A novel queue management policy for delay-tolerant networks"],"prefix":"10.1186","volume":"2016","author":[{"given":"Saeid","family":"Iranmanesh","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,22]]},"reference":[{"key":"576_CR1","unstructured":"DTN Research Group, [Online]. Available: http:\/\/www.dtnrg.org ."},{"issue":"11","key":"576_CR2","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1109\/MCOM.2009.5307476","volume":"47","author":"MG Rubinstein","year":"2009","unstructured":"MG Rubinstein, FB Abdesslem, MD de Amorim, SR Cavalcanti, R dos Santos Alves, LHMK Costa, OCMB Duarte, MEM Campista, UF Fluminense, Measuring the capacity of in-car to in-car vehicular networks. Communications Magazine 47(11), 128\u2013136 (2009)","journal-title":"Communications Magazine"},{"key":"576_CR3","doi-asserted-by":"publisher","unstructured":"S Iranmanesh, R Raad, K-W Chin, A novel destination-based routing protocol (DBRP) in DTNs, in International Symposium on Communications and Information Technologies (ISCIT) (IEEE, Gold Coast, QLD, Australia, 2012)","DOI":"10.1109\/ISCIT.2012.6380915"},{"issue":"1","key":"576_CR4","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/1558590.1558602","volume":"13","author":"SC Nelson","year":"2009","unstructured":"SC Nelson, M Bakht, R Kravets, A Harris, Encounter: based routing in DTNs. SIGMOBILE Mobile Computing and Communications Review 13(1), 56\u201359 (2009)","journal-title":"SIGMOBILE Mobile Computing and Communications Review"},{"key":"576_CR5","doi-asserted-by":"publisher","unstructured":"SC Nelson, M Bakht, R Kravets, Encounter-based routing in DTNs, in INFOCOM (IEEE, Rio De Janeiro, Brazil, 2009)","DOI":"10.1109\/INFCOM.2009.5061994"},{"issue":"2","key":"576_CR6","first-page":"153","volume":"8","author":"S-Y Ni","year":"1999","unstructured":"S-Y Ni, Y-C Tseng, Y-S Chen, J-P Sheu, The broadcast storm problem in a mobile ad hoc network. Wirel. Netw 8(2), 153\u2013167 (1999)","journal-title":"Wirel. Netw"},{"issue":"8","key":"576_CR7","doi-asserted-by":"publisher","first-page":"943","DOI":"10.1109\/TMC.2007.1016","volume":"6","author":"EPC Jones","year":"2007","unstructured":"EPC Jones, L Li, JK Schmidtke, PAS Ward, Practical routing in delay-tolerant networks. Transactions on Mobile Computing 6(8), 943\u2013959 (2007)","journal-title":"Transactions on Mobile Computing"},{"issue":"5","key":"576_CR8","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1145\/605397.605408","volume":"30","author":"P Juang","year":"2002","unstructured":"P Juang, H Oki, Y Wang, M Martonosi, LS Peh, D Rubenstein, Energy-efficient computing for wildlife tracking: design tradeoffs and early experiences with ZebraNet. Proceedings of the 10th International Conference on Architectural Support for Programming Languages and Operating Systems 30(5), 96\u2013107 (2002)","journal-title":"Proceedings of the 10th International Conference on Architectural Support for Programming Languages and Operating Systems"},{"key":"576_CR9","doi-asserted-by":"crossref","unstructured":"V Erramilli, M Crovella, Forwarding in opportunistic networks with resource constraints, in CHANTS '08 Proceedings of the third ACM workshop on Challenged networks (ACM, San Francisco, California, USA, 2008)","DOI":"10.1145\/1409985.1409994"},{"key":"576_CR10","doi-asserted-by":"publisher","unstructured":"T Spyropoulos, K Psounis, CS Raghavendra, Spray and focus: efficient mobility-assisted routing for heterogeneous and correlated mobility, in Fifth Annual International Conference on Pervasive Computing and Communications Workshops (IEEE, White Plains, New York, USA, 2007)","DOI":"10.1109\/PERCOMW.2007.108"},{"key":"576_CR11","unstructured":"S. Kapadia, B. Krishnamachari, L. Zhang, \"Mobile Ad-Hoc Networks: Protocol Design\", Chapter 26: 'Data Delivery in Delay Tolerant Networks: A Survey. InTech, 565-578 (2011)."},{"key":"576_CR12","doi-asserted-by":"crossref","unstructured":"J Miao, O Hasan, SB Mokhtar, L Brunie, A self-regulating protocol for efficient routing in mobile delay tolerant networks, in 6th International Conference on Digital Ecosystems Technologies (DEST) (IEEE, Campion d'Italia, Italy, 2012)","DOI":"10.1109\/DEST.2012.6227912"},{"key":"576_CR13","doi-asserted-by":"publisher","unstructured":"MAT Prodhan, R Das, MH Kabir, GC Shoja, Probabilistic quota based adaptive routing in Opportunistic Networks, in Pacific Rim Conference on Communications, Computers and Signal Processing (PacRim) (IEEE, Victoria, BC, Canada, 2011)","DOI":"10.1109\/PACRIM.2011.6032884"},{"key":"576_CR14","doi-asserted-by":"publisher","unstructured":"S-C Lo, W-R Liou, Dynamic quota-based routing in delay-tolerant networks, in Vehicular Technology Conference (VTC) (IEEE, Yokohama, Japan, 2012)","DOI":"10.1109\/VETECS.2012.6239902"},{"issue":"10","key":"576_CR15","doi-asserted-by":"publisher","first-page":"2867","DOI":"10.1016\/j.comnet.2006.11.028","volume":"51","author":"X Zhang","year":"2007","unstructured":"X Zhang, G Neglia, J Kurose, D Towsley, Performance modeling of epidemic routing. Computer Networks: The International Journal of Computer and Telecommunications Networking 51(10), 2867\u20132891 (2007)","journal-title":"Computer Networks: The International Journal of Computer and Telecommunications Networking"},{"key":"576_CR16","volume-title":"Proceedings International Conference on Future Internet Technologies (CFIT)","author":"D Kim","year":"2008","unstructured":"D Kim, H Park, I Yeom, Minimizing the impact of buffer overflow in dtn, in Proceedings International Conference on Future Internet Technologies (CFIT), 2008"},{"key":"576_CR17","doi-asserted-by":"publisher","unstructured":"A Lindgren, KS Phanse, Evaluation of queueing policies and forwarding strategies for routing in intermittently connected networks, in First International Conference on Communication System Software and Middleware (IEEE, New Delhi, India, 2006)","DOI":"10.1109\/COMSWA.2006.1665196"},{"issue":"3","key":"576_CR18","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1145\/961268.961272","volume":"7","author":"A Lindgren","year":"2003","unstructured":"A Lindgren, A Doria, O Schelen, Probabilistic routing in intermittently connected networks. SIGMOBILE Mobile Computing and Communications Review 7(3), 19\u201320 (2003)","journal-title":"SIGMOBILE Mobile Computing and Communications Review"},{"issue":"5","key":"576_CR19","doi-asserted-by":"publisher","first-page":"871","DOI":"10.1109\/TPDS.2012.197","volume":"24","author":"A Elwhishi","year":"2013","unstructured":"A Elwhishi, P-H Ho, K Naik, B Shihada, A novel message scheduling framework for delay tolerant networks routing. Transactions on Parallel and Distributed Systems 24(5), 871\u2013880 (2013)","journal-title":"Transactions on Parallel and Distributed Systems"},{"key":"576_CR20","doi-asserted-by":"publisher","unstructured":"A Krifa, C Barakat, T Spyropoulos, Optimal buffer management policies for delay tolerant networks, in 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks SECON '08 (IEEE, San Francisco, CA, USA, 2008)","DOI":"10.1109\/SAHCN.2008.40"},{"issue":"9","key":"576_CR21","doi-asserted-by":"publisher","first-page":"1470","DOI":"10.1109\/TMC.2011.163","volume":"11","author":"A Krifa","year":"2012","unstructured":"A Krifa, C Barakat, T Spyropoulos, Message drop and scheduling in DTNs: theory and practice. Transactions on Mobile Computing 11(9), 1470\u20131483 (2012)","journal-title":"Transactions on Mobile Computing"},{"issue":"4","key":"576_CR22","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1145\/1282427.1282422","volume":"37","author":"A Balasubramanian","year":"2007","unstructured":"A Balasubramanian, B Levine, A Venkataramani, DTN routing as a resource allocation problem. SIGCOMM Computer Communication Review 37(4), 373\u2013384 (2007)","journal-title":"SIGCOMM Computer Communication Review"},{"key":"576_CR23","doi-asserted-by":"crossref","unstructured":"Y Li, M Qian, D Jin, L Su, L Zeng, Adaptive optimal buffer management policies for realistic DTN, in Global Telecommunications Conference GLOBECOM (IEEE, Honolulu, Hawaii, USA, 2009)","DOI":"10.1109\/GLOCOM.2009.5426161"},{"issue":"3","key":"576_CR24","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1007\/s11277-014-2066-7","volume":"80","author":"S Rashid","year":"2015","unstructured":"S Rashid, Q Ayub, AH Abdullah, Reactive weight based buffer management policy for DTN routing protocols. Wirel. Pers. Commun. 80(3), 993\u20131010 (2015)","journal-title":"Wirel. Pers. Commun."},{"key":"576_CR25","volume-title":"INFOCOM, Proceeding of 24th Annual Joint Conference of the IEEE Computer and Communications Societies","author":"B Burns","year":"2005","unstructured":"B Burns, O Brock, BN Levine, MV routing and capacity building in disruption tolerant networks, in INFOCOM, Proceeding of 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005"},{"key":"576_CR26","first-page":"10","volume":"2","author":"Q Ayub","year":"2010","unstructured":"Q Ayub, S Rashid, T-Drop: an optimal buffer management policy to improve QOS in DTN routing protocols. Journal of Computing 2, 10 (2010)","journal-title":"Journal of Computing"},{"key":"576_CR27","doi-asserted-by":"publisher","unstructured":"D Pan, Z Ruan, N Zhou, X Liu, Z Song, A comprehensive-integrated buffer management strategy for opportunistic networks. EURASIP J. Wirel. Commun. Netw, 103\u2013113 (2013)","DOI":"10.1186\/1687-1499-2013-103"},{"key":"576_CR28","doi-asserted-by":"publisher","unstructured":"JF Naves, IM Moraes, C Albuquerque, LPS and LRF: efficient buffer management policies for delay and disruption tolerant networks, in 37th Conference on Local Computer Networks (LCN) (IEEE, Clearwater, FL, USA, 2012)","DOI":"10.1109\/LCN.2012.6423649"},{"issue":"5","key":"576_CR29","doi-asserted-by":"publisher","first-page":"15","DOI":"10.5121\/ijwmn.2011.3502","volume":"3","author":"G Fathima","year":"2011","unstructured":"G Fathima, RSD Wahidabanu, Buffer management for preferential delivery in opportunistic delay tolerant networks. International Journal of Wireless & Mobile Networks 3(5), 15 (2011)","journal-title":"International Journal of Wireless & Mobile Networks"},{"key":"576_CR30","doi-asserted-by":"crossref","unstructured":"C Rohner, F Bjurefors, P Gunningberg, L McNamara, E Nordstrom, Making the most of your contacts: transfer ordering in data-centric opportunistic networks, in MobiOpp '12 Proceedings of the third ACM international workshop on Mobile Opportunistic Networks (ACM, Zurich, Switzerland, 2012)","DOI":"10.1145\/2159576.2159589"},{"key":"576_CR31","doi-asserted-by":"publisher","unstructured":"L Yin, HM Lu, Y da Cao, JM Gao, Buffer scheduling policy in DTN routing protocols, in 2nd International Conference on Future Computer and Communication (ICFCC) (IEEE, Wuhan, China, 2010)","DOI":"10.1109\/ICFCC.2010.5497636"},{"key":"576_CR32","doi-asserted-by":"publisher","unstructured":"D Pan, W Cao, H Zhang, M Lin, Buffer management and hybrid probability choice routing for packet delivery in opportunistic networks. Math. Probl. Eng, 2012 1\u201314 (2012)","DOI":"10.1155\/2012\/817528"},{"key":"576_CR33","doi-asserted-by":"crossref","unstructured":"Y Liu, J Wang, S Zhang, H Zhou, A buffer management scheme based on message transmission status in delay tolerant networks, in Global Telecommunications Conference (GLOBECOM) (IEEE, Houston, TX, USA, 2011)","DOI":"10.1109\/GLOCOM.2011.6134084"},{"issue":"6","key":"576_CR34","first-page":"753","volume":"5","author":"K Shin","year":"2011","unstructured":"K Shin, S Kim, Enhanced buffer management policy that utilizes message properties for delay-tolerant networks. Communications 5(6), 753\u2013759 (2011)","journal-title":"Communications"},{"key":"576_CR35","doi-asserted-by":"crossref","unstructured":"R Ramanathan, R Hansen, P Basu, R Rosales-Hain, R Krishnan, Prioritized epidemic routing for opportunistic networks, in MobiOpp '07 Proceedings of the 1st international MobiSys workshop on Mobile opportunistic networking (ACM, San Juan, Puerto Rico, 2007)","DOI":"10.1145\/1247694.1247707"},{"issue":"2","key":"576_CR36","doi-asserted-by":"publisher","first-page":"607","DOI":"10.1109\/SURV.2011.041911.00093","volume":"14","author":"MJ Khabbaz","year":"2012","unstructured":"MJ Khabbaz, CM Assi, WF Fawaz, Disruption-tolerant networking: a comprehensive survey on recent developments and persisting challenges. Communications Surveys & Tutorials 14(2), 607\u2013640 (2012)","journal-title":"Communications Surveys & Tutorials"},{"issue":"1","key":"576_CR37","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1109\/SURV.2012.032612.00004","volume":"15","author":"Y Zhu","year":"2013","unstructured":"Y Zhu, B Xu, X Shi, Y Wang, A survey of social-based routing in delay tolerant networks: positive and negative social effects. Communications Surveys & Tutorials 15(1), 387\u2013401 (2013)","journal-title":"Communications Surveys & Tutorials"},{"key":"576_CR38","doi-asserted-by":"publisher","unstructured":"JA Dias, JN Isento, VNGJ Soares, JJPC Rodrigues, Impact of scheduling and dropping policies on the performance of vehicular delay-tolerant networks, in International Conference on Communications (ICC) (IEEE, Kyoto, Japan, 2011)","DOI":"10.1109\/icc.2011.5962535"},{"issue":"1","key":"576_CR39","first-page":"137","volume":"3","author":"VNGJ Soares","year":"2010","unstructured":"VNGJ Soares, F Farahmand, JJPC Rodrigues, Performance analysis of scheduling and dropping policies in vehicular delay-tolerant networks. International Journal on Advances in Internet Technology - IARIA 3(1), 137\u2013145 (2010)","journal-title":"International Journal on Advances in Internet Technology - IARIA"},{"key":"576_CR40","doi-asserted-by":"crossref","unstructured":"M Ke, Y Nenghai, L Bin, A new packet dropping policy in delay tolerant network, in 12th IEEE International Conference on Communication Technology (ICCT) (IEEE, Nanjing, China, 2010)","DOI":"10.1109\/ICCT.2010.5689151"},{"issue":"5","key":"576_CR41","first-page":"1","volume":"18","author":"S Rashid","year":"2011","unstructured":"S Rashid, Q Ayub, MSM Zahid, AH Abdullah, Impact of mobility models on DLA (drop largest) optimized DTN epidemic routing protocol. Int. J. Comput. Appl. 18(5), 1\u20137 (2011)","journal-title":"Int. J. Comput. Appl."},{"key":"576_CR42","volume-title":"Epidemic routing for partially connected ad hoc networks","author":"A Vahdat","year":"2000","unstructured":"A Vahdat, D Becker, Epidemic routing for partially connected ad hoc networks (Duke University, Durhan NC, 2000)"},{"key":"576_CR43","doi-asserted-by":"crossref","unstructured":"T Spyropoulos, K Psounis, CS Raghavendra, Spray and wait: an efficient routing scheme for intermittently connected mobile networks, in WDTN '05 Proceedings of theSIGCOMM workshop on Delay-tolerant networking (ACM, Philadelphia, Pennsylvania, USA, 2005)","DOI":"10.1145\/1080139.1080143"},{"issue":"7","key":"576_CR44","first-page":"8","volume":"13","author":"S Rashid","year":"2011","unstructured":"S Rashid, Q Ayub, MSM Zahid, SH Abdullah, E-DROP: an effective drop buffer management policy for DTN routing protocols. Int. J. Comput. Appl. 13(7), 8\u201313 (2011)","journal-title":"Int. J. Comput. Appl."},{"issue":"3","key":"576_CR45","first-page":"396","volume":"70","author":"S Rashid","year":"2012","unstructured":"S Rashid, AH Abdullah, MSM Zahid, Q Ayub, Mean drop an effectual buffer management policy for delay tolerant network. Eur. J. Sci. Res. 70(3), 396\u2013407 (2012)","journal-title":"Eur. J. Sci. Res."},{"key":"576_CR46","first-page":"7","volume":"2","author":"Q Ayub","year":"2011","unstructured":"Q Ayub, S Rashid, MSM Zahid, Buffer scheduling policy for opportunistic networks. International Journal of Scientific & Engineering Research (IJSER) 2, 7 (2011)","journal-title":"International Journal of Scientific & Engineering Research (IJSER)"},{"key":"576_CR47","volume-title":"Third Conference on Smart Spaces and 10th International Conference","author":"HEL Amornsin","year":"2010","unstructured":"HEL Amornsin, Heuristic congestion control for massage deletion in delay tolerant network. In Smart Spaces and Next Generation Wired\/Wireless Networking, in Third Conference on Smart Spaces and 10th International Conference, 2010"},{"issue":"1","key":"576_CR48","doi-asserted-by":"publisher","first-page":"653","DOI":"10.1007\/s11277-013-1035-x","volume":"72","author":"S Rashid","year":"2013","unstructured":"S Rashid, Q Ayub, MSM Zahid, AH Abdullah, Message drop control buffer management policy for DTN routing protocols. Wirel. Pers. Commun. 72(1), 653\u2013669 (2013)","journal-title":"Wirel. Pers. Commun."},{"key":"576_CR49","doi-asserted-by":"publisher","unstructured":"L Yun, C Xinjian, L Qilie, Y Xianohu, A novel congestion control strategy in delay tolerant networks, in Second International Conference on Future Networks (IEEE, Sanya, Hainan, 2010)","DOI":"10.1109\/ICFN.2010.49"},{"issue":"1","key":"576_CR50","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1145\/1071690.1064280","volume":"33","author":"R Groenevelt","year":"2005","unstructured":"R Groenevelt, P Nain, G Koole, Message delay in MANET. SIGMETRICS Performance Evaluation Review 33(1), 412\u2013413 (2005)","journal-title":"SIGMETRICS Performance Evaluation Review"},{"issue":"2","key":"576_CR51","first-page":"480","volume":"25","author":"AP Silva","year":"2014","unstructured":"AP Silva, S Burleigh, CM Hirata, K Obraczka, A survey on congestion control for delay and disruption tolerant. Ad Hoc Netw. 25(2), 480\u2013494 (2014)","journal-title":"Ad Hoc Netw."},{"key":"576_CR52","doi-asserted-by":"publisher","unstructured":"E Coe, C Rachavendra, Token based congestion control for DTN, in Aerospace Conference (IEEE, Big Sky, MT, 2010)","DOI":"10.1109\/AERO.2010.5446944"},{"issue":"3","key":"576_CR53","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1145\/1710130.1710139","volume":"13","author":"N Thompson","year":"2009","unstructured":"N Thompson, R Kravets, Understanding and controlling congestion in DTNs. SIGMOBILE Mobile Computing and Communications Review 13(3), 42\u201345 (2009)","journal-title":"SIGMOBILE Mobile Computing and Communications Review"},{"key":"576_CR54","doi-asserted-by":"crossref","unstructured":"J Lakkakorpi, M Pitkanen, J Ott, Using buffer space advertisements to avoid congestion in mobile opportunistic DTNs, in WWIC'11 Proceedings of the 9th IFIP TC 6 international conference on Wired\/wireless internet communications (SPRINGER, Vilanova i la Geltru, Spain, 2011)","DOI":"10.1007\/978-3-642-21560-5_32"},{"issue":"10","key":"576_CR55","doi-asserted-by":"publisher","first-page":"1183","DOI":"10.1002\/wcm.521","volume":"7","author":"M Seligman","year":"2007","unstructured":"M Seligman, K Fall, P Mundur, Storage routing for DTN congestion control. Wireless Communications & Mobile Computing - Wireless Ad Hoc and Sensor Network 7(10), 1183\u20131196 (2007)","journal-title":"Wireless Communications & Mobile Computing - Wireless Ad Hoc and Sensor Network"},{"issue":"11","key":"576_CR56","doi-asserted-by":"publisher","first-page":"1576","DOI":"10.1109\/TMC.2010.246","volume":"10","author":"P Hui","year":"2011","unstructured":"P Hui, J Crowcroft, E Yoneki, BUBBLE rap: social-based forwarding in delay-tolerant networks. Transactions on Mobile Computing 10(11), 1576\u20131589 (2011)","journal-title":"Transactions on Mobile Computing"},{"key":"576_CR57","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1038\/nature06958","volume":"453","author":"MC Gonzalez","year":"2008","unstructured":"MC Gonzalez, CA Hidalgo, AL Barabasi, Understanding individual human mobility patterns. Nature 453, 779\u2013782 (2008)","journal-title":"Nature"},{"key":"576_CR58","unstructured":"A. Keranen, J. Ott, Increasing reality for DTN protocol simulations (Helsinki University of Technology, Helsinki, Finland). (2007)"},{"key":"576_CR59","doi-asserted-by":"crossref","unstructured":"F Bai, N Sadagopan, A Helmy, IMPORTANT: a framework to systematically analyze the impact of mobility on performance of routing protocols for adhoc networks, in INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications (IEEE, San Francisco, USA, 2003)","DOI":"10.1109\/INFCOM.2003.1208920"},{"issue":"5","key":"576_CR60","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1002\/wcm.72","volume":"2","author":"T Camp","year":"2002","unstructured":"T Camp, J Boleng, V Davies, A survey of mobility models for ad hoc network research. Wirel. Commun. Mob. Comput. 2(5), 483\u2013502 (2002)","journal-title":"Wirel. Commun. Mob. Comput."},{"issue":"2","key":"576_CR61","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1007\/s10776-015-0269-9","volume":"22","author":"S Iranmanesh","year":"2015","unstructured":"S Iranmanesh, K-W Chin, Mobility based routing protocols for semi-predictable disruption tolerant networks. Int. J. Wireless Inf. Networks 22(2), 138\u2013146 (2015)","journal-title":"Int. J. Wireless Inf. Networks"},{"issue":"10","key":"576_CR62","doi-asserted-by":"publisher","first-page":"1377","DOI":"10.1109\/TMC.2010.99","volume":"9","author":"T Karagiannis","year":"2010","unstructured":"T Karagiannis, J-YL Boudec, M Vojnovic, Power law and exponential decay of intercontact times between mobile devices. Transactions on Mobile Computing 9(10), 1377\u20131390 (2010)","journal-title":"Transactions on Mobile Computing"},{"key":"576_CR63","doi-asserted-by":"crossref","unstructured":"T Spyropoulos, K Psounis, CS Raghavendra, Performance analysis of mobility-assisted routing, in MobiHoc '06 Proceedings of the 7th ACM international symposium on Mobile ad hoc networking and computing (ACM, Florence, Italy, 2006)","DOI":"10.1145\/1132905.1132912"},{"issue":"2","key":"576_CR64","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/1072989.1072995","volume":"9","author":"M McNett","year":"2005","unstructured":"M McNett, GM Voelker, Access and mobility of wireless PDA users. SIGMOBILE Mobile Computing and Communications Review 9(2), 40\u201355 (2005)","journal-title":"SIGMOBILE Mobile Computing and Communications Review"},{"key":"576_CR65","unstructured":"J Krumm, E Horvitz, The Microsoft Multi Person Location Survey (Microsoft Research TechReport, 2005)"},{"key":"576_CR66","volume-title":"CRAWDAD Data Set Mit\/Reality (v. 2005-07-01)","author":"N Eagle","year":"2005","unstructured":"N Eagle, A Pentland, CRAWDAD Data Set Mit\/Reality (v. 2005-07-01), 2005"},{"issue":"4","key":"576_CR67","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/s00779-005-0046-3","volume":"10","author":"N Eagle","year":"2006","unstructured":"N Eagle, A Pentland, Reality mining: sensing complex social systems. Journal of Personal Ubiquitous Computing 10(4), 255\u2013268 (2006)","journal-title":"Journal of Personal Ubiquitous Computing"},{"issue":"6","key":"576_CR68","doi-asserted-by":"publisher","first-page":"606","DOI":"10.1109\/TMC.2007.1060","volume":"6","author":"A Chaintreau","year":"2007","unstructured":"A Chaintreau, P Hui, J Crowcroft, C Diot, R Gass, J Scott, Impact of human mobility on opportunistic forwarding algorithms. Transactions on Mobile Computing 6(6), 606\u2013620 (2007)","journal-title":"Transactions on Mobile Computing"},{"key":"576_CR69","volume-title":"CRAWDAD Data Set Cambridge\/Haggle (v. 2006-01-31)","author":"J Scott","year":"2006","unstructured":"J Scott, R Gass, J Crowcroft, P Hui, C Diot, A Chaintreau, CRAWDAD Data Set Cambridge\/Haggle (v. 2006-01-31), 2006"},{"key":"576_CR70","volume-title":"CRAWDAD Trace Cambridge\/Haggle\/Imote\/Infocom (v. 2006-01-31)","author":"J Scott","year":"2006","unstructured":"J Scott, R Gass, J Crowcroft, P Hui, C Diot, A Chaintreau, CRAWDAD Trace Cambridge\/Haggle\/Imote\/Infocom (v. 2006-01-31), 2006"},{"key":"576_CR71","first-page":"978","volume":"13","author":"M Taboga","year":"2012","unstructured":"M Taboga, Lectures on probability theory and mathematical statistics, Second ed. Amazon CreateSpace 13, 978\u20131480215238 (2012)","journal-title":"Amazon CreateSpace"},{"key":"576_CR72","doi-asserted-by":"crossref","unstructured":"A Keranen, J Ott, T Karkkainen, The ONE simulator for DTN protocol evaluation, in Simutools '09 Proceedings of the 2nd International Conference on Simulation Tools and Techniques (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, Rome, Italy, 2009)","DOI":"10.4108\/ICST.SIMUTOOLS2009.5674"},{"key":"576_CR73","doi-asserted-by":"crossref","unstructured":"F Ekman, A Keranen, J Karvo, J Ott, Working day movement model, in MobilityModels '08 Proceedings of the 1st ACM SIGMOBILE workshop on Mobility models (ACM, Hong Kong, Hong Kong, China, 2008)","DOI":"10.1145\/1374688.1374695"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-016-0576-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-016-0576-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-016-0576-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-016-0576-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,5]],"date-time":"2019-09-05T16:59:18Z","timestamp":1567702758000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-016-0576-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,22]]},"references-count":73,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["576"],"URL":"https:\/\/doi.org\/10.1186\/s13638-016-0576-6","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,3,22]]},"article-number":"88"}}