{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,6]],"date-time":"2024-07-06T15:34:25Z","timestamp":1720280065576},"reference-count":27,"publisher":"Elsevier BV","content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[2014,7]]},"DOI":"10.1016\/j.comcom.2014.03.014","type":"journal-article","created":{"date-parts":[[2014,4,12]],"date-time":"2014-04-12T18:18:29Z","timestamp":1397326709000},"page":"98-110","update-policy":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":9,"special_numbering":"C","title":["Practical Bloom filter based epidemic forwarding and congestion control in DTNs: A comparative analysis"],"prefix":"10.1016","volume":"48","author":[{"given":"Ali","family":"Marandi","sequence":"first","affiliation":[]},{"given":"Mahdi","family":"Faghih Imani","sequence":"additional","affiliation":[]},{"given":"Kav\u00e9","family":"Salamatian","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"3","key":"10.1016\/j.comcom.2014.03.014_b0005","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1145\/961268.961272","article-title":"Probabilistic routing in intermittently connected networks","volume":"7","author":"Lindgren","year":"2003","journal-title":"ACM SIGMOBILE Mobile Comput. Commun. Rev."},{"key":"10.1016\/j.comcom.2014.03.014_b0010","series-title":"Proceedings of the 2005 ACM SIGCOMM Workshop on Delay-tolerant Networking","first-page":"252","article-title":"Spray and wait: an efficient routing scheme for intermittently connected mobile networks","author":"Spyropoulos","year":"2005"},{"key":"10.1016\/j.comcom.2014.03.014_b0015","series-title":"Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, 2007. PerCom Workshops\u201907","first-page":"79","article-title":"Spray and focus: Efficient mobility-assisted routing for heterogeneous and correlated mobility","volume":"85","author":"Spyropoulos","year":"2007"},{"key":"10.1016\/j.comcom.2014.03.014_b0020","unstructured":"A. Vahdat, D. Becker, et al., Epidemic routing for partially connected ad hoc networks, Tech. rep., Technical Report CS-200006, Duke University, 2000."},{"key":"10.1016\/j.comcom.2014.03.014_b0025","unstructured":"A. El Fawal, J. Le Boudec, K. Salamatian, Performance analysis of self limiting epidemic forwarding, Tech. rep., Technical Report LCA-REPORT-2006-127, EPFL, 2006."},{"key":"10.1016\/j.comcom.2014.03.014_b0030","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1007\/978-3-642-21560-5_32","article-title":"Using buffer space advertisements to avoid congestion in mobile opportunistic DTNs","author":"Lakkakorpi","year":"2011","journal-title":"Wired\/Wireless Internet Commun."},{"key":"10.1016\/j.comcom.2014.03.014_b0035","unstructured":"S. Schildt, J. Morgenroth, W.-B. Pottner, L. Wolf, IBR-DTN: a lightweight, modular and highly portable bundle protocol implementation, in: Electronic Communications of the EASST (2011)."},{"key":"10.1016\/j.comcom.2014.03.014_b0040","series-title":"2010 IEEE 30th International Conference on Distributed Computing Systems (ICDCS)","first-page":"634","article-title":"B-sub: a practical bloom-filter-based publish-subscribe system for human networks","author":"Zhao","year":"2010"},{"key":"10.1016\/j.comcom.2014.03.014_b0045","series-title":"Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004","first-page":"92","article-title":"An adaptive approach to content-based subscription in mobile ad hoc networks","author":"Yoneki","year":"2004"},{"key":"10.1016\/j.comcom.2014.03.014_b0050","series-title":"Securecomm and Workshops, 2006","first-page":"1","article-title":"Packet coding for strong anonymity in ad hoc networks","author":"Aad","year":"2006"},{"issue":"1","key":"10.1016\/j.comcom.2014.03.014_b0055","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1016\/j.comcom.2010.11.003","article-title":"Privacy-enhanced social-network routing","volume":"35","author":"Parris","year":"2012","journal-title":"Comput. Commun."},{"key":"10.1016\/j.comcom.2014.03.014_b0060","series-title":"Proceedings of the Fifth ACM International Workshop on Mobility in the Evolving Internet Architecture, MobiArch\u201910","article-title":"Fast inter-domain mobility with in-packet bloom filters","author":"S\u00e4rel\u00e4","year":"2010"},{"key":"10.1016\/j.comcom.2014.03.014_b0065","unstructured":"D. Ellard, R. Altmann, A. Gladd, D. Brown, Dtn ip neighbor discovery (ipnd) internet draft (2012). <https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/tools.ietf.org\/html\/draft-irtf-dtnrg-ipnd-02>."},{"key":"10.1016\/j.comcom.2014.03.014_b0070","series-title":"Proceedings of the 1st ACM workshop on Emerging Name-Oriented Mobile Networking Design \u2013 Architecture, Algorithms, and Applications, NoM\u201912","first-page":"25","article-title":"Bloogo: Bloom filter based gossip algorithm for wireless ndn","author":"Angius","year":"2012"},{"key":"10.1016\/j.comcom.2014.03.014_b0075","series-title":"Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly","first-page":"457","article-title":"N-drop: congestion control strategy under epidemic routing in DTN","author":"Li","year":"2009"},{"key":"10.1016\/j.comcom.2014.03.014_b0080","series-title":"Second International Conference on Future Networks, 2010. ICFN\u201910","first-page":"233","article-title":"A novel congestion control strategy in delay tolerant networks","author":"Yun","year":"2010"},{"key":"10.1016\/j.comcom.2014.03.014_b0085","doi-asserted-by":"crossref","unstructured":"A. Grundy, M. Radenkovic, Promoting congestion control in opportunistic networks, the Proceedings of IEEE WiMob 2010, Niagara Falls, Canada, pp 324\u2013330.","DOI":"10.1109\/WIMOB.2010.5645048"},{"key":"10.1016\/j.comcom.2014.03.014_b0090","doi-asserted-by":"crossref","unstructured":"M. Radenkovic, A. Grundy, Framework for utility driven congestion control in delay tolerant opportunistic networks, in: IWCMC, 2011, pp. 448\u2013454.","DOI":"10.1109\/IWCMC.2011.5982575"},{"key":"10.1016\/j.comcom.2014.03.014_b0095","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1007\/978-3-642-14891-0_26","article-title":"Heuristic congestion control for message deletion in delay tolerant network","author":"Leela-Amornsin","year":"2010","journal-title":"Smart Spaces Next Generation Wired\/Wireless Netw."},{"key":"10.1016\/j.comcom.2014.03.014_b0100","unstructured":"S. Burleigh, E. Jennings, J. Schoolcraft, Autonomous congestion control in delay-tolerant networks."},{"key":"10.1016\/j.comcom.2014.03.014_b0105","doi-asserted-by":"crossref","unstructured":"N. Thompson, S.C. Nelson, M. Bakht, T.F. Abdelzaher, R. Kravets, Retiring replicants: congestion control for intermittently-connected networks, in: INFOCOM, 2010, pp. 1118\u20131126.","DOI":"10.1109\/INFCOM.2010.5461934"},{"issue":"10","key":"10.1016\/j.comcom.2014.03.014_b0110","doi-asserted-by":"crossref","first-page":"1183","DOI":"10.1002\/wcm.521","article-title":"Storage routing for DTN congestion control","volume":"7","author":"Seligman","year":"2007","journal-title":"Wireless Commun. Mobile Comput."},{"issue":"9","key":"10.1016\/j.comcom.2014.03.014_b0115","doi-asserted-by":"crossref","first-page":"1470","DOI":"10.1109\/TMC.2011.163","article-title":"Message drop and scheduling in DTNs: Theory and practice","volume":"11","author":"Krifa","year":"2012","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"7","key":"10.1016\/j.comcom.2014.03.014_b0120","doi-asserted-by":"crossref","first-page":"422","DOI":"10.1145\/362686.362692","article-title":"Space\/time trade-offs in hash coding with allowable errors","volume":"13","author":"Bloom","year":"1970","journal-title":"Commun. ACM"},{"issue":"1","key":"10.1016\/j.comcom.2014.03.014_b0125","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1109\/TNET.2005.863461","article-title":"A new networking model for biological applications of ad hoc sensor networks","volume":"14","author":"Haas","year":"2006","journal-title":"IEEE\/ACM Transactions on Netw."},{"key":"10.1016\/j.comcom.2014.03.014_b0130","series-title":"First International Communication Systems and Networks and Workshops, 2009. COMSNETS 2009","first-page":"1","article-title":"A parsimonious model of mobile partitioned networks with clustering","author":"Pi\u00f3rkowski","year":"2009"},{"key":"10.1016\/j.comcom.2014.03.014_b0135","first-page":"2743","article-title":"Perfect simulation and stationarity of a class of mobility models","volume":"vol. 4","author":"Le Boudec","year":"2005"}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/api.elsevier.com\/content\/article\/PII:S0140366414001005?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/api.elsevier.com\/content\/article\/PII:S0140366414001005?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T09:17:43Z","timestamp":1565342263000},"score":1,"resource":{"primary":{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366414001005"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7]]},"references-count":27,"alternative-id":["S0140366414001005"],"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1016\/j.comcom.2014.03.014","relation":{},"ISSN":["0140-3664"],"issn-type":[{"value":"0140-3664","type":"print"}],"subject":[],"published":{"date-parts":[[2014,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Practical Bloom filter based epidemic forwarding and congestion control in DTNs: A comparative analysis","name":"articletitle","label":"Article Title"},{"value":"Computer Communications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1016\/j.comcom.2014.03.014","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2014 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}