{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,17]],"date-time":"2024-07-17T12:34:29Z","timestamp":1721219669235},"reference-count":15,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2015,1,10]],"date-time":"2015-01-10T00:00:00Z","timestamp":1420848000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1007\/s00500-014-1572-6","type":"journal-article","created":{"date-parts":[[2015,1,9]],"date-time":"2015-01-09T07:57:42Z","timestamp":1420790262000},"page":"2447-2455","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Peer selection in P2P wireless mesh networks: comparison of different strategies"],"prefix":"10.1007","volume":"19","author":[{"given":"Lissette","family":"Vald\u00e9s","sequence":"first","affiliation":[]},{"given":"Soraya","family":"Montesinos","sequence":"additional","affiliation":[]},{"given":"Alfonso","family":"Ariza","sequence":"additional","affiliation":[]},{"given":"Sira M.","family":"Allende","sequence":"additional","affiliation":[]},{"given":"Gonzalo","family":"Joya","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,1,10]]},"reference":[{"key":"1572_CR1","unstructured":"Ariza A (2014) Inetmanet framework. https:\/\/github.com\/aarizaq\/inetmanet"},{"key":"1572_CR2","doi-asserted-by":"crossref","unstructured":"Arom-oon U, Keeratiwintakorn P (2007) Fuzzy path selection for routing in energy-limited mobile ad hoc networks. In: Communications and information technologies, 2007. ISCIT \u201907. International symposium on, pp 860\u2013864. doi: 10.1109\/ISCIT.2007.4392136","DOI":"10.1109\/ISCIT.2007.4392136"},{"key":"1572_CR3","unstructured":"Buford JF, Yu H (2008) Lua EK (ed) P2P networking and applications. Elsevier Inc, http:\/\/www.sciencedirect.com\/science\/book\/9780123742148"},{"key":"1572_CR4","doi-asserted-by":"crossref","unstructured":"Clausen T, Jacquet P (2003) RFC 3626: optimized link state routing protocol (olsr). https:\/\/www.ietf.org\/rfc\/rfc3626.txt","DOI":"10.17487\/rfc3626"},{"key":"1572_CR5","doi-asserted-by":"crossref","unstructured":"De Couto DSJ (2004) High-throughput routing for multi-hop wireless networks. PhD thesis, MIT","DOI":"10.1145\/938998.939000"},{"key":"1572_CR6","unstructured":"del R\u00edo M, Molina AS (2001) Redes neuronales y sistemas borrosos. RA-MA"},{"key":"1572_CR7","unstructured":"IEEE (2012) Ieee standard for information technology-telecommunications and information exchange between systems local and metropolitan area networks-specific requirements part 11: wireless lan medium access control (MAC) and physical layer (PHY) specifications. ieee std 802.11-2012"},{"key":"1572_CR8","doi-asserted-by":"crossref","unstructured":"Kang C (2011) Survey of search and optimization of P2P networks. Peer-to-Peer networking and applications 4(3):211\u2013218. http:\/\/dblp.uni-trier.de\/db\/journals\/ppna\/ppna4.html#Kang11","DOI":"10.1007\/s12083-010-0082-2"},{"key":"1572_CR9","unstructured":"Lee KH (2005) First course on fuzzy theory and applications, advances in inteligent and soft computing, vol 27. Springer, Berlin. http:\/\/www.springer.com\/engineering\/computational+intelligence+and+complexity\/book\/978-3-540-22988-9"},{"key":"1572_CR10","doi-asserted-by":"crossref","unstructured":"Li X, Ji H, Zheng R, Li Y, Yu F (2009) A novel team-centric peer selection scheme for distributed wireless p2p networks. In: Wireless communications and networking conference, 2009. WCNC 2009. IEEE, pp 1\u20135. doi: 10.1109\/WCNC.2009.4917532","DOI":"10.1109\/WCNC.2009.4917532"},{"key":"1572_CR11","doi-asserted-by":"crossref","unstructured":"Luo Y (2012) Survey on p2p traffic managements. In: Gaol FL, Nguyen QV (eds) Proceedings of the 2011 2nd international congress on computer applications and computational science, advances in intelligent and soft computing, vol 145. Springer, Berlin, pp 191\u2013196. doi: 10.1007\/978-3-642-28308-6_26","DOI":"10.1007\/978-3-642-28308-6_26"},{"key":"1572_CR12","doi-asserted-by":"crossref","unstructured":"Umezaki K, Spaho E, Barolli L, Xhafa F, Younas M, Iwashige J (2012) An integrated fuzzy-based trustworthiness system for p2p communications in jxta-overlay. In: Broadband, wireless computing, communication and applications (BWCCA), 2012 seventh international conference on, pp 278\u2013284. doi: 10.1109\/BWCCA.2012.25","DOI":"10.1109\/BWCCA.2012.25"},{"key":"1572_CR13","doi-asserted-by":"crossref","unstructured":"Vald\u00e9s L, Ariza A, Allende SM, Parada R, Joya G (2013) Study of alternative strategies to selection of peer in P2P wireless mesh networks. In: Rojas I, Joya G, Gabestany J (eds) Advances in computational intelligence, lecture notes in computer science, vol 7902. Springer, Berlin, pp 124\u2013132. doi: 10.1007\/978-3-642-38679-4_11","DOI":"10.1007\/978-3-642-38679-4_11"},{"key":"1572_CR14","unstructured":"Varga A (2014) Omnet++. http:\/\/www.omnetpp.org\/"},{"key":"1572_CR15","doi-asserted-by":"crossref","unstructured":"Xi L, Hong J, Yu F, Ruiming Z (2009) A fcm-based peer grouping scheme for node failure recovery in wireless p2p file sharing. In: Communications, 2009. ICC \u201909. IEEE international conference on, pp 1\u20135. doi: 10.1109\/ICC.2009.5198602","DOI":"10.1109\/ICC.2009.5198602"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-014-1572-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-014-1572-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-014-1572-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,19]],"date-time":"2019-08-19T13:15:44Z","timestamp":1566220544000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-014-1572-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,1,10]]},"references-count":15,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2015,9]]}},"alternative-id":["1572"],"URL":"https:\/\/doi.org\/10.1007\/s00500-014-1572-6","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,1,10]]}}}