{"id":"https://openalex.org/W2180537115","doi":"https://doi.org/10.1109/sahcn.2015.7338295","title":"MobileCopy: Resisting correlated node failures to enhance data availability in DTNs","display_name":"MobileCopy: Resisting correlated node failures to enhance data availability in DTNs","publication_year":2015,"publication_date":"2015-06-01","ids":{"openalex":"https://openalex.org/W2180537115","doi":"https://doi.org/10.1109/sahcn.2015.7338295","mag":"2180537115"},"language":"en","primary_location":{"id":"doi:10.1109/sahcn.2015.7338295","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sahcn.2015.7338295","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 12th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030843666","display_name":"Yan Li","orcid":"https://orcid.org/0000-0002-3761-1345"},"institutions":[{"id":"https://openalex.org/I8078737","display_name":"Clemson University","ror":"https://ror.org/037s24f05","country_code":"US","type":"education","lineage":["https://openalex.org/I8078737"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Li Yan","raw_affiliation_strings":["Department of Electrical and Computer Engineering Clemson University, Clemson"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering Clemson University, Clemson","institution_ids":["https://openalex.org/I8078737"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100447188","display_name":"Kang Chen","orcid":"https://orcid.org/0000-0002-2376-2898"},"institutions":[{"id":"https://openalex.org/I8078737","display_name":"Clemson University","ror":"https://ror.org/037s24f05","country_code":"US","type":"education","lineage":["https://openalex.org/I8078737"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kang Chen","raw_affiliation_strings":["Department of Electrical and Computer Engineering Clemson University, Clemson"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering Clemson University, Clemson","institution_ids":["https://openalex.org/I8078737"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064217355","display_name":"Haiying Shen","orcid":"https://orcid.org/0000-0002-7681-6255"},"institutions":[{"id":"https://openalex.org/I8078737","display_name":"Clemson University","ror":"https://ror.org/037s24f05","country_code":"US","type":"education","lineage":["https://openalex.org/I8078737"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Haiying Shen","raw_affiliation_strings":["Department of Electrical and Computer Engineering Clemson University, Clemson"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering Clemson University, Clemson","institution_ids":["https://openalex.org/I8078737"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033324788","display_name":"Guoxin Liu","orcid":"https://orcid.org/0000-0001-7996-9305"},"institutions":[{"id":"https://openalex.org/I8078737","display_name":"Clemson University","ror":"https://ror.org/037s24f05","country_code":"US","type":"education","lineage":["https://openalex.org/I8078737"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Guoxin Liu","raw_affiliation_strings":["Department of Electrical and Computer Engineering Clemson University, Clemson"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering Clemson University, Clemson","institution_ids":["https://openalex.org/I8078737"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5030843666"],"corresponding_institution_ids":["https://openalex.org/I8078737"],"apc_list":null,"apc_paid":null,"fwci":1.3313,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.83646004,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"91","last_page":"99"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8455944657325745},{"id":"https://openalex.org/keywords/file-system-fragmentation","display_name":"File system fragmentation","score":0.7174656391143799},{"id":"https://openalex.org/keywords/torrent-file","display_name":"Torrent file","score":0.6808245182037354},{"id":"https://openalex.org/keywords/replica","display_name":"Replica","score":0.6305100321769714},{"id":"https://openalex.org/keywords/replication","display_name":"Replication (statistics)","score":0.6219071745872498},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.6070672869682312},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6025086641311646},{"id":"https://openalex.org/keywords/self-certifying-file-system","display_name":"Self-certifying File System","score":0.5576636791229248},{"id":"https://openalex.org/keywords/versioning-file-system","display_name":"Versioning file system","score":0.49082550406455994},{"id":"https://openalex.org/keywords/distributed-file-system","display_name":"Distributed File System","score":0.46880558133125305},{"id":"https://openalex.org/keywords/computer-file","display_name":"Computer file","score":0.4664708077907562},{"id":"https://openalex.org/keywords/file-sharing","display_name":"File sharing","score":0.46100208163261414},{"id":"https://openalex.org/keywords/distributed-hash-table","display_name":"Distributed hash table","score":0.4585869014263153},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.42356210947036743},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4195641279220581},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.3327888250350952},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3208608031272888},{"id":"https://openalex.org/keywords/device-file","display_name":"Device file","score":0.31202268600463867},{"id":"https://openalex.org/keywords/peer-to-peer","display_name":"Peer-to-peer","score":0.18149232864379883},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.16797369718551636},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.12630587816238403}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8455944657325745},{"id":"https://openalex.org/C26656859","wikidata":"https://www.wikidata.org/wiki/Q4089244","display_name":"File system fragmentation","level":4,"score":0.7174656391143799},{"id":"https://openalex.org/C40350719","wikidata":"https://www.wikidata.org/wiki/Q2451637","display_name":"Torrent file","level":4,"score":0.6808245182037354},{"id":"https://openalex.org/C2775937380","wikidata":"https://www.wikidata.org/wiki/Q1232589","display_name":"Replica","level":2,"score":0.6305100321769714},{"id":"https://openalex.org/C12590798","wikidata":"https://www.wikidata.org/wiki/Q3933199","display_name":"Replication (statistics)","level":2,"score":0.6219071745872498},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.6070672869682312},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6025086641311646},{"id":"https://openalex.org/C82820731","wikidata":"https://www.wikidata.org/wiki/Q2640620","display_name":"Self-certifying File System","level":3,"score":0.5576636791229248},{"id":"https://openalex.org/C166807848","wikidata":"https://www.wikidata.org/wiki/Q3445065","display_name":"Versioning file system","level":4,"score":0.49082550406455994},{"id":"https://openalex.org/C152043487","wikidata":"https://www.wikidata.org/wiki/Q1229600","display_name":"Distributed File System","level":2,"score":0.46880558133125305},{"id":"https://openalex.org/C95637964","wikidata":"https://www.wikidata.org/wiki/Q82753","display_name":"Computer file","level":2,"score":0.4664708077907562},{"id":"https://openalex.org/C551386961","wikidata":"https://www.wikidata.org/wiki/Q22666","display_name":"File sharing","level":3,"score":0.46100208163261414},{"id":"https://openalex.org/C2780224649","wikidata":"https://www.wikidata.org/wiki/Q863506","display_name":"Distributed hash table","level":3,"score":0.4585869014263153},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.42356210947036743},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4195641279220581},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.3327888250350952},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3208608031272888},{"id":"https://openalex.org/C193769178","wikidata":"https://www.wikidata.org/wiki/Q14679","display_name":"Device file","level":3,"score":0.31202268600463867},{"id":"https://openalex.org/C534932454","wikidata":"https://www.wikidata.org/wiki/Q161410","display_name":"Peer-to-peer","level":2,"score":0.18149232864379883},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.16797369718551636},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.12630587816238403},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/sahcn.2015.7338295","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sahcn.2015.7338295","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 12th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1487819478","https://openalex.org/W1494818354","https://openalex.org/W1646038191","https://openalex.org/W1975804880","https://openalex.org/W1989640353","https://openalex.org/W2020021541","https://openalex.org/W2020765652","https://openalex.org/W2073418598","https://openalex.org/W2116777751","https://openalex.org/W2126514689","https://openalex.org/W2127278621","https://openalex.org/W2134583876","https://openalex.org/W2140581108","https://openalex.org/W2146033465","https://openalex.org/W2156956586","https://openalex.org/W2158049821","https://openalex.org/W2165197855","https://openalex.org/W2166407761"],"related_works":["https://openalex.org/W1990666357","https://openalex.org/W2342627122","https://openalex.org/W2092235977","https://openalex.org/W4313226861","https://openalex.org/W1572832495","https://openalex.org/W2069457782","https://openalex.org/W3199587876","https://openalex.org/W2559378645","https://openalex.org/W2082631053","https://openalex.org/W4250364891"],"abstract_inverted_index":{"Motivated":[0],"by":[1],"the":[2,111,165,177,187,214],"growing":[3],"popularity":[4,146,162],"of":[5,105,113,118,167,169,180,189,202,217],"mobile":[6],"devices":[7],"and":[8,32,145,150,212,236],"their":[9],"increasing":[10],"capacities,":[11],"file":[12,47,53,58,65,92,109,133,148,156,161,171,218,222,239],"sharing":[13,134,240],"in":[14,29,36,46,55,74,82,97,121,172,238,241],"disruption":[15],"tolerant":[16],"networks":[17],"(DTNs)":[18],"has":[19,62,137],"attracted":[20],"significant":[21],"attention":[22],"recently.":[23],"Since":[24],"nodes":[25,208],"are":[26,33,80],"sparsely":[27],"distributed":[28,91,152],"separated":[30],"areas":[31],"intermittently":[34],"disconnected":[35],"DTNs,":[37,98],"it":[38],"is":[39,129,230],"difficult":[40],"to":[41,70,101,163,195,209],"achieve":[42,102],"high":[43,116],"data":[44,72,142,196],"availability":[45,54],"sharing.":[48],"Many":[49],"previous":[50,244],"methods":[51],"enhance":[52],"DTNs":[56],"through":[57],"replication.":[59],"However,":[60],"there":[61],"been":[63],"no":[64],"replication":[66,93],"method":[67,94],"that":[68,192,228],"tries":[69],"reduce":[71],"loss":[73,143],"correlated":[75,125,233],"node":[76,126,190,234],"failures,":[77],"which":[78,99],"however":[79],"common":[81],"wireless":[83],"networks.":[84],"In":[85],"this":[86],"paper,":[87],"we":[88],"propose":[89],"a":[90,108,115,170,203],"(called":[95],"MobileCopy)":[96],"aims":[100],"low":[103],"probability":[104,188],"totally":[106],"losing":[107,199],"at":[110],"expense":[112],"having":[114],"number":[117,166],"impacted":[119],"files":[120],"an":[122],"individual":[123],"large-scale":[124],"failure.":[127],"MobileCopy":[128,159,184,206,229],"designed":[130],"for":[131,220],"community-based":[132],"systems.":[135],"It":[136],"two":[138],"main":[139],"components:":[140],"i)":[141],"resistant":[144],"aware":[147],"replication,":[149],"ii)":[151],"hash":[153],"table":[154],"(DHT)-based":[155],"replica":[157,182],"indexing.":[158],"considers":[160],"determine":[164],"replicas":[168,201,219],"each":[173],"community.":[174],"Through":[175],"limiting":[176],"possible":[178],"combination":[179],"candidate":[181],"holders,":[183],"greatly":[185],"reduces":[186],"failures":[191,235],"will":[193],"lead":[194],"loss,":[197],"i.e.,":[198],"all":[200],"file.":[204],"Moreover,":[205],"enables":[207],"efficiently":[210],"store":[211],"fetch":[213],"placement":[215],"information":[216],"efficient":[221,237],"searching.":[223],"Extensive":[224],"trace-driven":[225],"experiments":[226],"show":[227],"robust":[231],"against":[232],"comparison":[242],"with":[243],"methods.":[245]},"counts_by_year":[{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
