{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T23:31:03Z","timestamp":1764977463507,"version":"3.46.0"},"reference-count":40,"publisher":"Walter de Gruyter GmbH","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,1,1]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Resource pooling in ad hoc networks deals with accumulating computing and network resources to implement network control schemes such as routing, congestion, traffic management, and so on. Pooling of resources can be accomplished using the distributed and dynamic nature of ad hoc networks to achieve collaboration between the devices. Ad hoc networks need a resource-pooling technique that offers quick response, adaptability, and reliability. In this context, we are proposing an opportunistic resource-pooling scheme that uses a cognitive computing model to accumulate the resources with faster resource convergence rate, reliability, and lower latency. The proposed scheme is implemented using the behaviors-observations-beliefs cognitive model, in which the resource-pooling decisions are made based on accumulated knowledge over various behaviors exhibited by nodes in ad hoc networks.<\/jats:p>","DOI":"10.1515\/jisys-2015-0050","type":"journal-article","created":{"date-parts":[[2016,2,17]],"date-time":"2016-02-17T09:05:33Z","timestamp":1455699933000},"page":"47-68","source":"Crossref","is-referenced-by-count":1,"title":["A Cognitive Theory-based Opportunistic Resource-Pooling Scheme for Ad hoc Networks"],"prefix":"10.1515","volume":"26","author":[{"given":"Seema B.","family":"Hegde","sequence":"first","affiliation":[{"name":"Siddaganga Institute of Technology, Department of Computer Science and Engineering, Tumkur, India"}]},{"given":"B. Satish","family":"Babu","sequence":"additional","affiliation":[{"name":"Siddaganga Institute of Technology, Department of Computer Science and Engineering, Tumkur, India"}]},{"given":"Pallapa","family":"Venkataram","sequence":"additional","affiliation":[{"name":"Indian Institute of Science, Department of Electrical Communication Engineering, Protocol Engineering Technology Unit, Bangalore, India"}]}],"member":"374","published-online":{"date-parts":[[2016,2,17]]},"reference":[{"key":"2025120523280709784_j_jisys-2015-0050_ref_001_w2aab3b7d236b1b6b1ab2ab1Aa","unstructured":"A. Aggarwal, K. Gopal and A. Kumar, Lightweight trust aggregation through lightweight vibrations for trust, in: IEEE Conference on Contemporary Computing, pp. 421\u2013426, 2013."},{"key":"2025120523280709784_j_jisys-2015-0050_ref_002_w2aab3b7d236b1b6b1ab2ab2Aa","unstructured":"N. G. Aghaee and T. I. Oren, Effects of cognitive complexity in agent simulation: basics, in: Proceedings of the Summer Computer. Simulation Conference, 2004."},{"key":"2025120523280709784_j_jisys-2015-0050_ref_003_w2aab3b7d236b1b6b1ab2ab3Aa","doi-asserted-by":"crossref","unstructured":"A. H. Aghvami, O. Holland and Q. Fan, A dynamic hierarchal radio resource allocation scheme for mobile adhoc networks, IEEE Trans. Commun. (2004), 1005\u20131010.","DOI":"10.1109\/PIMRC.2004.1373850"},{"key":"2025120523280709784_j_jisys-2015-0050_ref_004_w2aab3b7d236b1b6b1ab2ab4Aa","unstructured":"K. Ahmed and S. Majid, Post-disaster communications: a cognitive agent approach, in: 7thInternational Conference on Networking, 2008."},{"key":"2025120523280709784_j_jisys-2015-0050_ref_005_w2aab3b7d236b1b6b1ab2ab5Aa","doi-asserted-by":"crossref","unstructured":"B. S. Babu and P. Venkataram, Cognitive agents based authentication & privacy scheme for mobile transactions (CABAPS), Comput. Commun.31 (2008), 4060\u20134071.","DOI":"10.1016\/j.comcom.2008.08.011"},{"key":"2025120523280709784_j_jisys-2015-0050_ref_006_w2aab3b7d236b1b6b1ab2ab6Aa","doi-asserted-by":"crossref","unstructured":"R. D. Beer, Framing the debate between computational and dynamical approaches to cognitive science, J. Behav. Brain Sci.21 (1998), 630.","DOI":"10.1017\/S0140525X98231736"},{"key":"2025120523280709784_j_jisys-2015-0050_ref_007_w2aab3b7d236b1b6b1ab2ab7Aa","unstructured":"L. Bernardo and R. Oliveira, Technical Report, 2005."},{"key":"2025120523280709784_j_jisys-2015-0050_ref_008_w2aab3b7d236b1b6b1ab2ab8Aa","unstructured":"L. Bernardo, P. Pinto and R. Oliveira, flooding techniques for resource discovery on high mobility MANETs, in: Int. Workshop on Wireless Ad-hoc Networks, London, UK, 2005."},{"key":"2025120523280709784_j_jisys-2015-0050_ref_009_w2aab3b7d236b1b6b1ab2ab9Aa","unstructured":"C. Bradley, Cognitive agents interacting in real and virtual world. http:\/\/act-r.psy.cmu.edu\/wordpress\/wp-content\/uploads\/2012\/12\/622SDOC4694.pdf."},{"key":"2025120523280709784_j_jisys-2015-0050_ref_010_w2aab3b7d236b1b6b1ab2ac10Aa","unstructured":"J. Bradshaw, Software agents, AAAI Press, California, 2000."},{"key":"2025120523280709784_j_jisys-2015-0050_ref_011_w2aab3b7d236b1b6b1ab2ac11Aa","doi-asserted-by":"crossref","unstructured":"A. T. Campbell, G.-S. Ahn, S.-B. Lee and X. Zhang, INSIGNIA: an IP-based quality of service framework for mobile ad hoc networks, J. Parallel Distrib. Comput.60(2000), 374\u2013406.","DOI":"10.1006\/jpdc.1999.1613"},{"key":"2025120523280709784_j_jisys-2015-0050_ref_012_w2aab3b7d236b1b6b1ab2ac12Aa","doi-asserted-by":"crossref","unstructured":"C. Castelfranchi, Guaranties for autonomy in cognitive agent architecture, intelligent agents: theories, architectures and languages, LNAI890 (2005), 56\u201370.","DOI":"10.1007\/3-540-58855-8_3"},{"key":"2025120523280709784_j_jisys-2015-0050_ref_013_w2aab3b7d236b1b6b1ab2ac13Aa","doi-asserted-by":"crossref","unstructured":"C. M. Chin, M. L. Sim and S. Olafsson, Mobile adhoc networks, in: Encyclopedia of Mobile Computing and Commerce, chapter 70, 2656, China, pp. 424\u2013428, 2007.","DOI":"10.4018\/978-1-59904-002-8.ch070"},{"key":"2025120523280709784_j_jisys-2015-0050_ref_014_w2aab3b7d236b1b6b1ab2ac14Aa","doi-asserted-by":"crossref","unstructured":"M. Conti, Opportunities in opportunistic computing, IEEECommun. Mag.43 (2010), 42\u201350.","DOI":"10.1109\/MC.2010.19"},{"key":"2025120523280709784_j_jisys-2015-0050_ref_015_w2aab3b7d236b1b6b1ab2ac15Aa","unstructured":"D1.2: services models, protocols and security specification, collaborative project with thematic priority: future Internet experimental facility and experimentally-driven research, 2012."},{"key":"2025120523280709784_j_jisys-2015-0050_ref_016_w2aab3b7d236b1b6b1ab2ac16Aa","doi-asserted-by":"crossref","unstructured":"J. Gaber and M. Bakhouya, Mobile agent-based approach for resource discovery in peer-to-peer networks, LNAI4461 (2008), 63\u201373.","DOI":"10.1007\/978-3-540-79705-0_6"},{"key":"2025120523280709784_j_jisys-2015-0050_ref_017_w2aab3b7d236b1b6b1ab2ac17Aa","doi-asserted-by":"crossref","unstructured":"M. N. Huhns and M. P. Singh, Cognitive agents, IEEE Internet Comput.2 (1998), 87\u201389.","DOI":"10.1109\/4236.735992"},{"key":"2025120523280709784_j_jisys-2015-0050_ref_018_w2aab3b7d236b1b6b1ab2ac18Aa","doi-asserted-by":"crossref","unstructured":"C.-M. Huang, C.-Z. Tsai and K.-c. Lan, A survey of opportunistic networks, IEEE Dig. Explor. (2008), DOI 10.1109\/WAINA.2008.292.","DOI":"10.1109\/WAINA.2008.292"},{"key":"2025120523280709784_j_jisys-2015-0050_ref_019_w2aab3b7d236b1b6b1ab2ac19Aa","unstructured":"B. Karaoglu, Efficient use of resources in mobile ad hoc networks, Ph.D. thesis University of Rochester, New York, 2013."},{"key":"2025120523280709784_j_jisys-2015-0050_ref_020_w2aab3b7d236b1b6b1ab2ac20Aa","doi-asserted-by":"crossref","unstructured":"D. B. Lange and M. Oshima, Programming and deploying Java mobile agents with Aglets, Addison-Wesley, USA, 1998.","DOI":"10.1023\/A:1019267832048"},{"key":"2025120523280709784_j_jisys-2015-0050_ref_021_w2aab3b7d236b1b6b1ab2ac21Aa","unstructured":"Y. Lim, The limit of adhoc networks to commercial success. http:\/\/www.cs.rutgers.edu\/~rmartin\/teaching\/fall04\/cs552\/papers\/017.pdf. Accessed 24 September, 2004."},{"key":"2025120523280709784_j_jisys-2015-0050_ref_022_w2aab3b7d236b1b6b1ab2ac22Aa","doi-asserted-by":"crossref","unstructured":"B. L. Mark, M. Hejmo, R. K. Thomas and C. Zouridaki, Robust cooperative trust establishment for MANETs, in: Proceedings of the 4th ACM Workshop on Security of Ad Hoc and Sensor Networks, Alexandria, VA, pp. 23\u201334, 2006.","DOI":"10.1145\/1180345.1180349"},{"key":"2025120523280709784_j_jisys-2015-0050_ref_023_w2aab3b7d236b1b6b1ab2ac23Aa","unstructured":"K. A. Mcartney, N. Migas, W. J. Buchnan, Mobile agents for routing, topology discovery, and automatic network reconfiguration in ad-hoc networks, in: 10thIEEE Int. Conference and Workshop on the Engineering of Computer-Based Systems, 2003."},{"key":"2025120523280709784_j_jisys-2015-0050_ref_024_w2aab3b7d236b1b6b1ab2ac24Aa","doi-asserted-by":"crossref","unstructured":"A. N. Mian, R. Baldoni and R. Beraldi, A survey of service discovery protocols in multihop mobile ad hoc networks, term paper, IEEE CS, Pervasive Comput. (2009), Department of Computer and Information Science and Engineering, University of Rome La Sapienza.","DOI":"10.1109\/MPRV.2009.2"},{"key":"2025120523280709784_j_jisys-2015-0050_ref_025_w2aab3b7d236b1b6b1ab2ac25Aa","unstructured":"Mobile ad hoc networking (MANET): routing protocol performance issues and evaluation considerations. https:\/\/tools.ietf.org\/html\/rfc2501. Accessed January, 1999."},{"key":"2025120523280709784_j_jisys-2015-0050_ref_026_w2aab3b7d236b1b6b1ab2ac26Aa","unstructured":"C. A. Ntuen, An agent-based model simulation of multiple collaborating mobile ad hoc networks (MANET), in: 16th Collective International Command, Control Research and Technology Symposium, 2009."},{"key":"2025120523280709784_j_jisys-2015-0050_ref_027_w2aab3b7d236b1b6b1ab2ac27Aa","doi-asserted-by":"crossref","unstructured":"J. R. Olson and M. Olson, The growth of cognitive modeling in human computer interface, J. Human Comput. Interact.5 (2005), 221\u2013265.","DOI":"10.1207\/s15327051hci0502&3_4"},{"key":"2025120523280709784_j_jisys-2015-0050_ref_028_w2aab3b7d236b1b6b1ab2ac28Aa","unstructured":"A. Passarella, F. Delmastro and M. Conti, Mobile service platforms based on opportunistic computing: the SCAMPI Project, ERCIM News93 (2013). http:\/\/ercim-news.ercim.eu\/en93\/special\/mobile-service-platforms-based-on-opportunistic-computing-the-scampi-project. Accessed April, 2013."},{"key":"2025120523280709784_j_jisys-2015-0050_ref_029_w2aab3b7d236b1b6b1ab2ac29Aa","unstructured":"K. Ponmozhi and R. S. Rajesh, Adhoc resource binding in MANETs, Proc. Int. J. Comput. Appl.37 (2011)."},{"key":"2025120523280709784_j_jisys-2015-0050_ref_030_w2aab3b7d236b1b6b1ab2ac30Aa","unstructured":"Pooling (resource management). http:\/\/en.wikipedia.org\/wiki\/Pooling_(resource_management). Accessed May, 2009."},{"key":"2025120523280709784_j_jisys-2015-0050_ref_031_w2aab3b7d236b1b6b1ab2ac31Aa","unstructured":"A. Postlewaite and O. Compte, Belief formation, PIER Working Paper (2012), DOI: 10.2139."},{"key":"2025120523280709784_j_jisys-2015-0050_ref_032_w2aab3b7d236b1b6b1ab2ac32Aa","doi-asserted-by":"crossref","unstructured":"C. Preist, M. Luck and P. Mcuberney, A manifesto for agent technology: towards next generation computing, Acution Agent Multi-AG, 203\u2013252, Kluwer Academic, USA, 2004.","DOI":"10.1023\/B:AGNT.0000038027.29035.7c"},{"key":"2025120523280709784_j_jisys-2015-0050_ref_033_w2aab3b7d236b1b6b1ab2ac33Aa","doi-asserted-by":"crossref","unstructured":"B. Saranya and V. Vetriselvi, Utilization of resources effectively by using an economic based model in opportunistic networks, in: Int. Conference on Computer Communication and Informatics, 2014.","DOI":"10.1109\/ICCCI.2014.6921758"},{"key":"2025120523280709784_j_jisys-2015-0050_ref_034_w2aab3b7d236b1b6b1ab2ac34Aa","doi-asserted-by":"crossref","unstructured":"H. Shen, H. Zhang and K. Chen, Leveraging social networks for P2P content-based file sharing in disconnected MANETs, IEEE Trans. Mobile Comput.13 (2014), 235\u2013249.","DOI":"10.1109\/TMC.2012.239"},{"key":"2025120523280709784_j_jisys-2015-0050_ref_035_w2aab3b7d236b1b6b1ab2ac35Aa","doi-asserted-by":"crossref","unstructured":"M. Wooldridge, Agent-based software engineering, Proc. IEEE Software Eng.144 (1997), 26\u201337.","DOI":"10.1049\/ip-sen:19971026"},{"key":"2025120523280709784_j_jisys-2015-0050_ref_036_w2aab3b7d236b1b6b1ab2ac36Aa","doi-asserted-by":"crossref","unstructured":"J. Wu and Q. Yuan, A dynamic Voronoi regions-based publish\/subscribe protocol in mobile networks, in: Proceedings of IEEE Infocom, 2008.","DOI":"10.1109\/INFOCOM.2007.277"},{"key":"2025120523280709784_j_jisys-2015-0050_ref_037_w2aab3b7d236b1b6b1ab2ac37Aa","unstructured":"J. Wu, A. Srinivasan and R. Thanawala, Efficient resource discovery in mobile ad hoc networks, communications, in: IEEE Int. Conference, 2009."},{"key":"2025120523280709784_j_jisys-2015-0050_ref_038_w2aab3b7d236b1b6b1ab2ac38Aa","unstructured":"J. Zheng, M. U. Uyar, M. A. Fecko and S. Samtani, Performance study of reliable server pooling, in: IEEE Int. Symp. Network Comput. Appl., Cambridge, MA, 2003."},{"key":"2025120523280709784_j_jisys-2015-0050_ref_039_w2aab3b7d236b1b6b1ab2ac39Aa","doi-asserted-by":"crossref","unstructured":"J. Zheng, M. U. Uyar, M. A. Fecko and S. Samtani, Reliable server pooling in highly mobile wireless networks, in: Proc. IEEE Int. Symp. Comput. Commun, Turkey, 2003, DOI: 10.1109\/ISCC.2003.1214188.","DOI":"10.1109\/ISCC.2003.1214188"},{"key":"2025120523280709784_j_jisys-2015-0050_ref_040_w2aab3b7d236b1b6b1ab2ac40Aa","doi-asserted-by":"crossref","unstructured":"B. Zhou, G. Yang, J. Chen, L.-J. Chen, M. Gerla, S. Das and Y.-Z. Lee, Dealing with node mobility in ad hoc wireless network, in: Formal Methods for Mobile Computing Vol. 3465, pp. 69\u2013106, Computer Science, USA, 2005.","DOI":"10.1007\/11419822_3"}],"container-title":["Journal of Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.degruyter.com\/view\/journals\/jisys\/26\/1\/article-p47.xml","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jisys-2015-0050\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jisys-2015-0050\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T23:28:42Z","timestamp":1764977322000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jisys-2015-0050\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,2,17]]},"references-count":40,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2015,11,20]]},"published-print":{"date-parts":[[2017,1,1]]}},"alternative-id":["10.1515\/jisys-2015-0050"],"URL":"https:\/\/doi.org\/10.1515\/jisys-2015-0050","relation":{},"ISSN":["2191-026X","0334-1860"],"issn-type":[{"type":"electronic","value":"2191-026X"},{"type":"print","value":"0334-1860"}],"subject":[],"published":{"date-parts":[[2016,2,17]]}}}