{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T11:44:48Z","timestamp":1725795888238},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319074245"},{"type":"electronic","value":"9783319074252"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07425-2_1","type":"book-chapter","created":{"date-parts":[[2014,6,18]],"date-time":"2014-06-18T18:16:59Z","timestamp":1403115419000},"page":"1-14","source":"Crossref","is-referenced-by-count":5,"title":["Combined Mobile Ad-Hoc and Delay\/Disruption-Tolerant Routing"],"prefix":"10.1007","author":[{"given":"Christian","family":"Raffelsberger","sequence":"first","affiliation":[]},{"given":"Hermann","family":"Hellwagner","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"13","key":"1_CR1","doi-asserted-by":"publisher","first-page":"3032","DOI":"10.1016\/j.comnet.2011.05.010","volume":"55","author":"A. Boukerche","year":"2011","unstructured":"Boukerche, A., Turgut, B., Aydin, N., Ahmad, M., B\u00f6l\u00f6ni, L., Turgut, D.: Routing protocols in ad hoc networks: A survey. Computer Networks\u00a055(13), 3032\u20133080 (2011)","journal-title":"Computer Networks"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Delosieres, L., Nadjm-Tehrani, S.: Batman store-and-forward: the best of the two worlds. In: Proc. Int. Conf. Pervasive Computing and Communications Workshops (PerCom Workshops 2012), pp. 721\u2013727. IEEE (2012)","DOI":"10.1109\/PerComW.2012.6197608"},{"issue":"2","key":"1_CR3","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1016\/j.adhoc.2008.04.006","volume":"7","author":"D. Johnson","year":"2009","unstructured":"Johnson, D., Hancke, G.: Comparison of two routing metrics in OLSR on a grid based mesh network. Ad Hoc Networks\u00a07(2), 374\u2013387 (2009)","journal-title":"Ad Hoc Networks"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Ker\u00e4nen, A., Ott, J., K\u00e4rkk\u00e4inen, T.: The ONE simulator for DTN protocol evaluation. In: Proc. 2nd Int. Conf. Simulation Tools and Techniques (SIMUTools 2009), pp. 55:1\u201355:10. ICST (2009)","DOI":"10.4108\/ICST.SIMUTOOLS2009.5674"},{"key":"1_CR5","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1145\/961268.961272","volume":"7","author":"A. Lindgren","year":"2003","unstructured":"Lindgren, A., Doria, A., Schel\u00e9n, O.: Probabilistic routing in intermittently connected networks. SIGMOBILE Mob. Comput. Commun. Rev.\u00a07, 19\u201320 (2003)","journal-title":"SIGMOBILE Mob. Comput. Commun. Rev."},{"key":"1_CR6","unstructured":"Raffelsberger, C., Hellwagner, H.: Evaluation of MANET routing protocols in a realistic emergency response scenario. In: Proc. Int. Workshop on Intelligent Solutions in Embedded Systems (WISES 2012), pp. 88\u201392. IEEE (2012)"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Raffelsberger, C., Hellwagner, H.: A hybrid MANET-DTN routing scheme for emergency response scenarios. In: Proc. Int. Conf. Pervasive Computing and Communications Workshops (PerCom Workshops 2013), pp. 505\u2013510. IEEE (2013)","DOI":"10.1109\/PerComW.2013.6529549"},{"issue":"8","key":"1_CR8","doi-asserted-by":"publisher","first-page":"2349","DOI":"10.1007\/s11276-010-0276-9","volume":"16","author":"T. Spyropoulos","year":"2010","unstructured":"Spyropoulos, T., Rais, R.N., Turletti, T., Obraczka, K., Vasilakos, A.: Routing for disruption tolerant networks: Taxonomy and design. Wireless Networks\u00a016(8), 2349\u20132370 (2010)","journal-title":"Wireless Networks"},{"key":"1_CR9","unstructured":"Vahdat, A., Becker, D.: Epidemic routing for partially-connected ad hoc networks. Tech. Rep. CS-2000-06, Duke University (July 2000)"},{"issue":"4","key":"1_CR10","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1023\/B:WINE.0000028548.44719.fe","volume":"10","author":"L. Viennot","year":"2004","unstructured":"Viennot, L., Jacquet, P., Clausen, T.H.: Analyzing control traffic overhead versus mobility and data traffic activity in mobile ad-hoc network protocols. Wireless Networks\u00a010(4), 447\u2013455 (2004)","journal-title":"Wireless Networks"}],"container-title":["Lecture Notes in Computer Science","Ad-hoc, Mobile, and Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07425-2_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T22:21:18Z","timestamp":1558304478000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-07425-2_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319074245","9783319074252"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07425-2_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}