{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T10:00:43Z","timestamp":1771668043088,"version":"3.50.1"},"reference-count":32,"publisher":"Association for Computing Machinery (ACM)","issue":"12","license":[{"start":{"date-parts":[[2013,12,1]],"date-time":"2013-12-01T00:00:00Z","timestamp":1385856000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2013,12]]},"abstract":"<jats:p>'Where's' in a name?<\/jats:p>","DOI":"10.1145\/2500501","type":"journal-article","created":{"date-parts":[[2013,11,26]],"date-time":"2013-11-26T13:23:15Z","timestamp":1385472195000},"page":"90-98","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":84,"title":["A survey of mobility in information-centric networks"],"prefix":"10.1145","volume":"56","author":[{"given":"Gareth","family":"Tyson","sequence":"first","affiliation":[{"name":"University of London, U.K."}]},{"given":"Nishanth","family":"Sastry","sequence":"additional","affiliation":[{"name":"King's College London, U.K."}]},{"given":"Ruben","family":"Cuevas","sequence":"additional","affiliation":[{"name":"Universidad Carlos III de Madrid, Spain"}]},{"given":"Ivica","family":"Rimac","sequence":"additional","affiliation":[{"name":"Alcatel-Lucent Bell Labs, Stuttgart, Germany"}]},{"given":"Andreas","family":"Mauthe","sequence":"additional","affiliation":[{"name":"Lancaster University, U.K."}]}],"member":"320","published-online":{"date-parts":[[2013,12]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOF.2011.6126671"},{"key":"e_1_2_1_2_1","volume-title":"Forecast and methodology","author":"Cisco","year":"2011","unstructured":"Cisco visual networking index : Forecast and methodology , 2011 --2016. Cisco visual networking index: Forecast and methodology, 2011--2016."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018584.2018587"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2010.5466661"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2013.01.009"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2005.1593277"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/857076.857078"},{"key":"e_1_2_1_8_1","volume-title":"Proceedings of the Intl. Conference on Broadband Communications, Networks, and Systems","author":"Fotiou N.","year":"2010","unstructured":"Fotiou , N. , Nikander , P. , Trossen , D. and Polyzos , G.C . Developing Information Networking Further: From PSIRP to PURSUIT . In Proceedings of the Intl. Conference on Broadband Communications, Networks, and Systems ( 2010 ). Fotiou, N., Nikander, P., Trossen, D. and Polyzos, G.C. Developing Information Networking Further: From PSIRP to PURSUIT. In Proceedings of the Intl. Conference on Broadband Communications, Networks, and Systems (2010)."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2070562.2070563"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018584.2018586"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2011.5983977"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851322.1851330"},{"key":"e_1_2_1_13_1","volume-title":"Proceedings of the 7th Swedish National Computer Networking Workshop","author":"Hermans F.","year":"2011","unstructured":"Hermans , F. , Ngai , E. and Gunningberg , P . Mobile sources in an information-centric network with hierarchical names: An indirection approach . In Proceedings of the 7th Swedish National Computer Networking Workshop ( 2011 ). Hermans, F., Ngai, E. and Gunningberg, P. Mobile sources in an information-centric network with hierarchical names: An indirection approach. In Proceedings of the 7th Swedish National Computer Networking Workshop (2011)."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658941"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1594977.1592592"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1532940.1532943"},{"key":"e_1_2_1_17_1","volume-title":"Proceedings of the MobiHoc Workshop on Tactical Mobile Ad Hoc Networking","author":"Kawadia V.","year":"2011","unstructured":"Kawadia , V. , Riga , N. , Opper , J. and Sampath , D . Slinky: An adaptive protocol for content access in disruption-tolerant ad hoc networks . In Proceedings of the MobiHoc Workshop on Tactical Mobile Ad Hoc Networking ( 2011 ). Kawadia, V., Riga, N., Opper, J. and Sampath, D. Slinky: An adaptive protocol for content access in disruption-tolerant ad hoc networks. In Proceedings of the MobiHoc Workshop on Tactical Mobile Ad Hoc Networking (2011)."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282402"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2005.1610546"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1859983.1859986"},{"key":"e_1_2_1_22_1","volume-title":"Mobile IP. In Proceedings of the Intl. Telecommunications Symposium","author":"Perkins C.E.","year":"1994","unstructured":"Perkins , C.E. and Myles , A . Mobile IP. In Proceedings of the Intl. Telecommunications Symposium ( 1994 ), 415--419. Perkins, C.E. and Myles, A. Mobile IP. In Proceedings of the Intl. Telecommunications Symposium (1994), 415--419."},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/570738.570750"},{"key":"e_1_2_1_24_1","volume-title":"Proceedings of IEEE INFOCOM","author":"Rumin R.","year":"2011","unstructured":"Rumin , R. , Laoutaris , N. , Yang , X. , Siganos , G. and Rodriguez , P . Deep diving into bittorrent locality . In Proceedings of IEEE INFOCOM ( 2011 ). Rumin, R., Laoutaris, N., Yang, X., Siganos, G. and Rodriguez, P. Deep diving into bittorrent locality. In Proceedings of IEEE INFOCOM (2011)."},{"key":"e_1_2_1_25_1","volume-title":"Proceedings of the IFIP Wireless Days Conference","author":"Soon-Young Oh M.G.","year":"2010","unstructured":"Soon-Young Oh , M.G. and Lau , D . Content centric networking in tactical and emergency MANETs . In Proceedings of the IFIP Wireless Days Conference ( 2010 ). Soon-Young Oh, M.G. and Lau, D. Content centric networking in tactical and emergency MANETs. In Proceedings of the IFIP Wireless Days Conference (2010)."},{"key":"e_1_2_1_26_1","volume":"50","author":"Trossen D.","year":"2012","unstructured":"Trossen , D. and Parisis , G. Designing and realizing an information-centric Internet. IEEE Communications Magazine 50 ( July 2012 ). Trossen, D. and Parisis, G. Designing and realizing an information-centric Internet. IEEE Communications Magazine 50 (July 2012).","journal-title":"Internet. IEEE Communications Magazine"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2013.6970723"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2012.6289181"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2012.6181010"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2390209.2390210"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/WONS.2011.5720195"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2010.5698270"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298321"}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2500501","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2500501","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:34:26Z","timestamp":1750232066000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2500501"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":32,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2013,12]]}},"alternative-id":["10.1145\/2500501"],"URL":"https:\/\/doi.org\/10.1145\/2500501","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"value":"0001-0782","type":"print"},{"value":"1557-7317","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,12]]},"assertion":[{"value":"2013-12-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}