{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:11:26Z","timestamp":1772907086387,"version":"3.50.1"},"reference-count":33,"publisher":"Elsevier BV","issue":"8","license":[{"start":{"date-parts":[[2010,5,1]],"date-time":"2010-05-01T00:00:00Z","timestamp":1272672000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2010,5,1]],"date-time":"2010-05-01T00:00:00Z","timestamp":1272672000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2010,5,1]],"date-time":"2010-05-01T00:00:00Z","timestamp":1272672000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2010,5,1]],"date-time":"2010-05-01T00:00:00Z","timestamp":1272672000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2010,5,1]],"date-time":"2010-05-01T00:00:00Z","timestamp":1272672000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2010,5,1]],"date-time":"2010-05-01T00:00:00Z","timestamp":1272672000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2010,5,1]],"date-time":"2010-05-01T00:00:00Z","timestamp":1272672000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[2010,5]]},"DOI":"10.1016\/j.comcom.2010.01.003","type":"journal-article","created":{"date-parts":[[2010,1,12]],"date-time":"2010-01-12T04:59:28Z","timestamp":1263272368000},"page":"929-939","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":37,"title":["DEEP: Density-based proactive data dissemination protocol for wireless sensor networks with uncontrolled sink mobility"],"prefix":"10.1016","volume":"33","author":[{"given":"Massimo","family":"Vecchio","sequence":"first","affiliation":[]},{"given":"Aline Carneiro","family":"Viana","sequence":"additional","affiliation":[]},{"given":"Artur","family":"Ziviani","sequence":"additional","affiliation":[]},{"given":"Roy","family":"Friedman","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"4","key":"10.1016\/j.comcom.2010.01.003_bib1","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1016\/S1389-1286(01)00302-4","volume":"38","author":"Akyildiz","year":"2002","journal-title":"Computer Networks"},{"issue":"5","key":"10.1016\/j.comcom.2010.01.003_bib2","doi-asserted-by":"crossref","first-page":"896","DOI":"10.1016\/j.comcom.2007.12.011","volume":"31","author":"Chatzigiannakis","year":"2008","journal-title":"Computer Communications"},{"issue":"6","key":"10.1016\/j.comcom.2010.01.003_bib3","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1109\/MWC.2008.4749745","volume":"15","author":"Hamida","year":"2008","journal-title":"IEEE Wireless Communications Magazine"},{"key":"10.1016\/j.comcom.2010.01.003_bib4","doi-asserted-by":"crossref","unstructured":"E.B. Hamida, G. Chelius, A line-based data dissemination protocol for wireless sensor networks with mobile sink, in: Proceedings of IEEE International Conference on Communications (ICC), 2008, pp. 2201\u20132205.","DOI":"10.1109\/ICC.2008.420"},{"issue":"1","key":"10.1016\/j.comcom.2010.01.003_bib5","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/s11276-004-4753-x","volume":"11","author":"Luo","year":"2005","journal-title":"Wireless Networks Journal (WINET)"},{"issue":"6","key":"10.1016\/j.comcom.2010.01.003_bib6","doi-asserted-by":"crossref","first-page":"831","DOI":"10.1007\/s11276-007-0017-x","volume":"14","author":"Basagni","year":"2008","journal-title":"Wireless Networks Journal (WINET)"},{"key":"10.1016\/j.comcom.2010.01.003_bib7","doi-asserted-by":"crossref","unstructured":"H. Yang, F. Ye, B. Sikdar, SIMPLE: using swarm intelligence methodology to design data acquisition protocol in sensor networks with mobile sinks, in: Proceedings of the IEEE INFOCOM, 2006, pp. 1\u201312.","DOI":"10.1109\/INFOCOM.2006.184"},{"key":"10.1016\/j.comcom.2010.01.003_bib8","unstructured":"R. Urgaonkar, B. Krishnamachari, FLOW: an efficient forwarding scheme to mobile sink in wireless sensor networks, in: Proceedings of ACM SECON, 2004."},{"key":"10.1016\/j.comcom.2010.01.003_bib9","doi-asserted-by":"crossref","unstructured":"Z. Vincze, D. Vass, R. Vida, A. Vidacs, A. Telcs, Adaptive sink mobility in event-driven multi-hop wireless sensor networks, in: Proceedings of First International Conference on Integrated Internet Ad Hoc and Sensor Networks, 2006, pp. 30\u201331.","DOI":"10.1145\/1142680.1142697"},{"key":"10.1016\/j.comcom.2010.01.003_bib10","doi-asserted-by":"crossref","unstructured":"A. Somasundara, A. Kansal, D. Jea, M. Srivastava, G. Pottie, D. Estrin, Controllably mobile infrastructure for low energy embedded networks, in: IEEE Transactions on Mobile Computing (TMC) 8 (5) (2006) 958\u2013973.","DOI":"10.1109\/TMC.2006.109"},{"issue":"3","key":"10.1016\/j.comcom.2010.01.003_bib11","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1109\/LCOMM.2009.081990","volume":"13","author":"Viana","year":"2009","journal-title":"IEEE Communications Letters"},{"issue":"2","key":"10.1016\/j.comcom.2010.01.003_bib12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1365815.1365817","volume":"26","author":"Bar-Yossef","year":"2008","journal-title":"ACM Transactions on Computer Systems"},{"key":"10.1016\/j.comcom.2010.01.003_bib13","doi-asserted-by":"crossref","unstructured":"S.Y. Ni, Y.C. Tseng, Y.S. Chen, J.P. Sheu, The broadcast storm problem in a mobile ad hoc network, in: Proc.5th ACM MOBICOM, 1999, pp. 151\u2013162.","DOI":"10.1145\/313451.313525"},{"key":"10.1016\/j.comcom.2010.01.003_bib14","doi-asserted-by":"crossref","unstructured":"Z. Haas, J. Halpern, L. Li, Gossip-based ad hoc routing, in: Proceedings of the IEEE INFOCOM, 2002, pp. 1707\u20131716.","DOI":"10.1109\/INFCOM.2002.1019424"},{"key":"10.1016\/j.comcom.2010.01.003_bib15","doi-asserted-by":"crossref","unstructured":"Y. Sasson, D. Cavin, A. Schiper, Probabilistic broadcast for flooding in wireless mobile ad hoc networks, in: Proceedings of the IEEE Wireless Communication and Networking Conference (WCNC), 2003, pp. 1124\u20131130.","DOI":"10.1109\/WCNC.2003.1200529"},{"issue":"1\u20134","key":"10.1016\/j.comcom.2010.01.003_bib16","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1023\/A:1023495021643","volume":"22","author":"Cartigny","year":"2003","journal-title":"Telecommunication Systems"},{"key":"10.1016\/j.comcom.2010.01.003_bib17","doi-asserted-by":"crossref","unstructured":"H. Miranda, S. Leggio, L. Rodrigues, K. Raatikainen, A power-aware broadcasting algorithm, in: Proceedings of the 17th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC\u201906), 2006, pp. 1\u20135.","DOI":"10.1109\/PIMRC.2006.254191"},{"key":"10.1016\/j.comcom.2010.01.003_bib18","doi-asserted-by":"crossref","unstructured":"V. Drabkin, R. Friedman, G. Kliot, M. Segal, RAPID: reliable probabilistic dissemination in wireless ad hoc networks, in: Proceedings of the 26th IEEE International Symposium on Reliable Distributed Systems (SRDS), 2007, pp. 13\u201322.","DOI":"10.1109\/SRDS.2007.9"},{"key":"10.1016\/j.comcom.2010.01.003_bib19","doi-asserted-by":"crossref","unstructured":"D. Jea, A. Somasundara, M. Srivastava, Multiple controlled mobile elements (data mules) for data collection in sensor networks, in: Proceedings of the First IEEE\/ACM International Conference on Distributed Computing in Sensor Systems (DCOSS05), Marina del Rey, CA, USA, 2005, pp. 244\u2013257.","DOI":"10.1007\/11502593_20"},{"key":"10.1016\/j.comcom.2010.01.003_bib20","doi-asserted-by":"crossref","unstructured":"J. Luo, J. Panchard, M. Piorkowski, M. Grossglauser, J.P. Hubaux, Mobiroute: routing towards a mobile sink for improving lifetime in sensor networks, in: Proceedings of the Second IEEE\/ACM International Conference on Distributed Computing in Sensor Systems (DCOSS06), San Francisco, CA, USA, 2006, pp. 480\u2013497.","DOI":"10.1007\/11776178_29"},{"key":"10.1016\/j.comcom.2010.01.003_bib21","unstructured":"K. Hwang, J. In, Y. Yun, D. Eom, Dynamic sink oriented tree algorithm for efficient target tracking of multiple mobile sink users in wide sensor field, in: Proceedings of the Sixth IEEE Vehicular Technology Conference \u2013 VTC2004-Fall, 2004, pp. 4607\u20134610."},{"key":"10.1016\/j.comcom.2010.01.003_bib22","doi-asserted-by":"crossref","unstructured":"Y. Wang, H. Wu, Dft-msn: the delay\/fault-tolerant mobile sensor network for pervasive information gathering, in: Proceedings of IEEE Infocom, 2006, pp. 1\u201312.","DOI":"10.1109\/INFOCOM.2006.272"},{"key":"10.1016\/j.comcom.2010.01.003_bib23","doi-asserted-by":"crossref","unstructured":"A. Kinalis, S. Nikoletseas, Adaptive redundancy for data propagation exploiting dynamic sensory mobility, in: Proceedings of 11th ACM MSWiM, 2008, pp. 149\u2013156.","DOI":"10.1145\/1454503.1454532"},{"key":"10.1016\/j.comcom.2010.01.003_bib24","doi-asserted-by":"crossref","unstructured":"P. Juang, H. Oki, Y. Wang, M. Martonosi, L. Peh, D. Rubenstein, Energy-efficient computing for wildlife tracking: design trade-offs and early experiences with zebranet, in: Proceedings of 10th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), 2002, pp. 96\u2013107.","DOI":"10.1145\/605397.605408"},{"key":"10.1016\/j.comcom.2010.01.003_bib25","doi-asserted-by":"crossref","unstructured":"P. Gupta, P. Kumar, Critical power for asymptotic connectivity in wireless networks, in: Proceedings of Stochastic Analysis, Control, Optimization and Applications, 1998, pp. 547\u2013566.","DOI":"10.1007\/978-1-4612-1784-8_33"},{"issue":"6","key":"10.1016\/j.comcom.2010.01.003_bib26","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1109\/LCOMM.2008.080300","volume":"12","author":"Marcelloni","year":"2008","journal-title":"IEEE Communications Letters"},{"key":"10.1016\/j.comcom.2010.01.003_bib27","doi-asserted-by":"crossref","unstructured":"C.M. Sadler, M. Martonosi, Data compression algorithms for energy-constrained devices in delay tolerant networks, in: SenSys \u201906: Proceedings of the Fourth International Conference on Embedded Networked Sensor Systems, 2006, pp. 265\u2013278.","DOI":"10.1145\/1182807.1182834"},{"key":"10.1016\/j.comcom.2010.01.003_bib28","doi-asserted-by":"crossref","unstructured":"A. Deligiannakis, Y. Kotidis, N. Roussopoulos, Compressing historical information in sensor networks, in: SIGMOD \u201904: Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data, 2004, pp. 527\u2013538.","DOI":"10.1145\/1007568.1007628"},{"key":"10.1016\/j.comcom.2010.01.003_bib29","doi-asserted-by":"crossref","unstructured":"R. Friedman, G. Kliot, C. Avin, Probabilistic quorum systems in wireless ad hoc networks, in: IEEE International Conference on Dependable Systems and Networks with FTCS and DCC, 2008, DSN 2008, 2008, pp. 277\u2013286.","DOI":"10.1109\/DSN.2008.4630096"},{"key":"10.1016\/j.comcom.2010.01.003_bib30","first-page":"1252","volume":"39","author":"Gilbert","year":"1960","journal-title":"Bell Systems Technical Journal"},{"key":"10.1016\/j.comcom.2010.01.003_bib31","doi-asserted-by":"crossref","first-page":"1977","DOI":"10.1002\/j.1538-7305.1963.tb00955.x","volume":"42","author":"Elliott","year":"1993","journal-title":"Bell System Technical Journal"},{"key":"10.1016\/j.comcom.2010.01.003_bib32","doi-asserted-by":"crossref","unstructured":"M. Zorzi, R. Rao, L. Milstein, On the accuracy of a first-order markov model for data transmission on fading channels, in: Proceedings of IEEE International Conference on Universal Personal Communications, 1995, pp. 211\u2013256.","DOI":"10.1109\/ICUPC.1995.496890"},{"key":"10.1016\/j.comcom.2010.01.003_bib33","series-title":"The Self-avoiding Walk","author":"Madras","year":"1993"}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366410000125?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366410000125?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T23:18:38Z","timestamp":1758842318000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366410000125"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,5]]},"references-count":33,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2010,5]]}},"alternative-id":["S0140366410000125"],"URL":"https:\/\/doi.org\/10.1016\/j.comcom.2010.01.003","relation":{},"ISSN":["0140-3664"],"issn-type":[{"value":"0140-3664","type":"print"}],"subject":[],"published":{"date-parts":[[2010,5]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"DEEP: Density-based proactive data dissemination protocol for wireless sensor networks with uncontrolled sink mobility","name":"articletitle","label":"Article Title"},{"value":"Computer Communications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.comcom.2010.01.003","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2010 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}