[1] A. S. Bahora et al., “Integrated peer-to-peer applications for advanced emergency response systems. Part I. Concept of operations,” IEEE Systems and Information Engineering Design Symposium, pp. 255- 260, 24-25 April 2003. [2] K. Lorincz et al., “Sensor networks for emergency response: challenges and opportunities,” IEEE Pervasive Computing, vol.3, no.4, pp. 16- 23, Oct.-Dec. 2004. [3] T. Gao et al., “The Advanced Health and Disaster Aid Network: A Light-Weight Wireless Medical System for Triage,” IEEE Transactions on Biomedical Circuits and Systems, vol.1, no.3, pp.203-216, Sept. 2007. [4] A. Müller, A. S. Shirazi, F. Alt, A. Schmidt, “ZoneTrak: Design and Implementation of an Emergency Management Assistance System,” Adjunct Proceedings of the Eigth International Conference on Pervasive Computing (Pervasive 2010), Springer Helsinki, Finland 2010. [5] J. Casper, R. R. Murphy, “Human-robot interactions during the robot-assisted urban search and rescue response at the World Trade Center,” IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, vol.33, no.3, pp. 367- 385, June 2003. [6] J. Liu and I. Chlamtac, “Mobile Ad-Hoc Networking with a View of 4G Wireless: Imperatives and Challenges”, Mobile Ad Hoc Networking, chapter 1, Wiley-IEEE Press, July 2004. [7] E. K. Lua, et al., “A survey and comparison of peer-to-peer overlay network schemes,” IEEE Communications Surveys & Tutorials, vol.7, no.2, pp. 72- 93, Second Quarter 2005. [8] IDD-ESCAP. (2011), “ICT for Disaster Management: Real life examples,” [Online]. Available: http://www.unapcict.org/ecohub/ict-for-disaster-management-real-life-examples. [9] N. Aschenbruck et al., “Modelling mobility in disaster area scenarios,” Proceedings of 10th ACM IEEE Int. Symp. Model. Anal. Simul. Wirel. Mob. Syst. MSWIM, Chania, Greece, 2007. [10] S. Hamedi, M. Hormati, R. Glitho, and F. Khendek, “Integrating wireless sensor networks and mobile ad hoc networks for an enhanced end-user experience,” Kaleidoscope: Beyond the Internet? - Innovations for Future Networks and Services, 2010 ITU-T, pp.1-7, 13-15 Dec. 2010. [11] M. Hormati, F. Belqasmi, R. Glitho, and F. Khendek, “A DNS Protocol-Based Service Discovery Architecture For Disaster Response Systems,” Proceedings of IEEE symposium on Computers and Communications (ISCC), 2013. [12] S. Cheshire and M. Krochmal, “Multicast DNS,” IETF RFC 6762, February 2013. [13] H. Hartenstein and K. P. Laberteaux, “A tutorial survey on vehicular ad hoc networks,” IEEE Communications Magazine, vol.46, no.6, pp.164-171, June 2008. [14] M. S. Corson, J. P. Macker, and G. H. Cirincione, “Internet-Based Mobile Ad Hoc Networking,” IEEE Internet Computing, July–August 1999, pp.63-70. [15] H. Luo et al., “The Design and Evaluation of Unified Cellular and Ad-Hoc Networks,” IEEE Transactions on Mobile Computing, vol.6, no.9, pp.1060-1074, Sept. 2007. [16] H. Wu et al., “Integrated cellular and ad hoc relaying systems: iCAR,” IEEE Journal on Selected Areas in Communications, vol.19, no.10, pp.2105-2115, Oct 2001. [17] Conti, M., “Body, Personal, and Local Ad Hoc Wireless Networks,” M. Ilyas (Ed.), Handbook of Ad Hoc Networks, CRC Press, New York, 2003 (Chapter I). [18] S. Ullah et al., “A Comprehensive Survey of Wireless Body Area Networks,” Journal of Medical Systems, Volume 36, Issue 3, pp.1065-1094, 2012. [19] IEEE 802.15 working group for WPAN website, [online] Available: http://grouper.ieee.org/groups/802/15/. [20] B. Crow et al., “IEEE 802.11 Wireless Local Area Networks”, IEEE Communications Magazine, vol.35, no.9, pp.116,126, Sep 1997. [21] Napster, available at Internet: http://www.napster.com/. [22] M. Ripeanu, “Peer-to-peer architecture case study: Gnutella network,” Proceedings of First International Conference on Peer-to-Peer Computing, pp.99-100, Aug 2001. [23] Bittorrent, available at Internet: http://www.bittorrent.com/. [24] Kazaa, available at Internet: http://www.kazaa.com/. [25] Skype, available at Internet: http://www.skype.com/. [26] J. Liebeherr, T. K. Beam, “HyperCast: A Protocol for Maintaining Multicast Group Members in a Logical Hypercube Topology,” Proceedings of the First International COST264 Workshop on Networked Group Communication, p.72-89, November 17-20, 1999. [27] I. Clarke et al., “Freenet: A distributed anonymous information storage and retrieval system,” ICSI Workshop on Design Issues in Anonymity and Unobservability, pp.46-66, 2000. [28] Overnet, available at Internet: http://www.overnet.org/. [29] K. Ponmozhi, R. S. Rajesh, “Applying P2P in MANETs for resource sharing,” International Conference on Control, Automation, Communication and Energy Conservation (INCACEC) 2009, pp.1-5, 4-6 June 2009. [30] I. Stoica et al., “Chord: A scalable peer-to-peer lookup service for internet applications,” SIGCOMM Comput. Commun. Rev. 31, 4 (August 2001), pp.149-160. [31] A. I. T. Rowstron and P. Druschel, “Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems,” Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg, pp.329-350, November 12-16, 2001. [32] B. Y. Zhao, J. D. Kubiatowicz, and A. D. Joseph, “Tapestry: An infrastructure for fault-resilient wide-area location and routing,” Technical Report UCB-CSD-01-1141, U. C. Berkeley, Apr. 2001. [33] L. Yan, K. Sere, and X. Zhou, “Towards an integrated architecture for peer-to-peer and ad hoc overlay network applications,” Proceedings of 10th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS) 2004, pp.312- 318, 26-28 May 2004. [34] E. Cohen and S. Shenker, “Replication strategies in unstructured peer-to-peer networks,” IGCOMM Comput. Commun. Rev., vol. 32, no. 4, pp. 177-190, 2002. [35] K. Jeong et al., “RNet: A Hierarchical P2P Overlay Network for Improving Locality in a Mobile Environment,” Fourth International Conference on Networked Computing and Advanced Information Management, NCM '08, vol.1, no., pp.623-630, 2-4 Sept. 2008. [36] R. Winter, T. Zahn, and J. Schiller, “DynaMO: Applying Topological Locality to the Construction of Dynamic, Mobility-Aware Overlays,” Technical Report B 03-04, Freie Universität Berlin, February 2004. [37] T. Zahn, R. Winter, and J. Schiller, “Simple, efficient peer-to-peer overlay clustering in mobile, ad-hoc networks,” Proceedings of the 12th IEEE Intl Conf. on Networks, pp.520-524, 2004. [38] X. Shen et al., “Handbook of Peer-to-Peer Networking,” Springer, 2009. [39] Li Gong, “JXTA: a network programming environment,” IEEE Internet Computing, vol.5, no.3, pp.88,95, May/Jun 2001. [40] Open Chord, available at Internet: http://open-chord.sourceforge.net/. [41] Resilient Overlay Networks, available at Internet: http://nms.csail.mit.edu/ron/. [42] E. Meshkova et al., “A survey on resource discovery mechanisms, peer-to-peer and service discovery frameworks”, Computer Networks, Volume 52, Issue 11, 8 August 2008, pp.2097-2128. [43] K. Arnold et al., “Jini Specification, first ed.,” Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 1999. [44] E. Guttman et al., “Service Location Protocol,” Version 2, RFC 2165, June 1997. [45] K. Lua et al., “A survey and comparison of peer-to-peer overlay network schemes,” IEEE Communications Surveys and Tutorials 7 (2) (2004) pp.72–93. [46] S. Ratnasamy et al., “A scalable content-addressable network,” Proceedings of the ACM SIGCOMM, San Diego, CA, USA, August 2001, pp.161-172. [47] M. Stokes, “Gnutella2 Standard,” available at Internet: http://g2.trillinux.org/index.php?title=Main_Page [48] T. Hargreaves, “The fasttrack protocol,” available at Internet: http://cvs.berlios.de/cgi-bin/viewcvs.cgi/gift-fasttrack/giFT-FastTrack/PROTOCOL?view=markup&content-type=text%2Fvnd.viewcvs-markup&revision=HEAD [49] K. Sripanidkulchai, B. Maggs, and H. Zhang, “Efficient content location using interest-based locality in peer-to-peer systems,” Proceedings of INFOCOM, San Francisco, USA, March 2003, pp.177-180. [50] E. Crawley et al., “A Framework for QoS-Based Routing in the Internet,” IETF RFC 2386, Aug. 1998. [51] R. Braden, D. Clark, and S. Shenker, “Integrated Services in the Internet Architecture: an Overview,” IETF RFC 1633, June 1994. [52] S. Blake et al., “An Architecture for Differentiated Services,” IETF RFC 2475, Dec. 1998. [53] B. Davie et al., “An Expedited Forwarding PHB (Per-Hop Behavior),” IETF RFC 3246, March 2002. [54] J. Heinanen et al., “Assured Forwarding PHB Group”, IETF RFC 2597, June 1999. [55] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, “Wireless Sensor Networks: A Survey,” IEEE Communication Magazine, August 2002. [56] M.V. Pulgarin, R. Glitho, and A. Quintero, “An Overlay Gateway for the Integration of IP Multimedia Subsystem and Mobile Sink Based Wireless Sensor Networks,” IEEE Vehicular Technology Conference (VTC)), Ottawa, Canada, Fall 2010. [57] K. Kwak et al., “An Overlay-Based Resource Monitoring Scheme for Social Applications in MANET”, Computer Software and Applications Conference, 2009. COMPSAC '09. 33rd Annual IEEE International, vol.1, no., pp.517-524, 20-24 July 2009. [58] P. Costa et al., “The RUNES Middleware for Networked Embedded Systems and its Application in a Disaster Management Scenario”, Fifth IEEE International Conference on Pervasive Computing and Communications IEEE Computer Society Washington, DC, USA 2007. [59] L. Liquori et al., “Synapse: A Scalable Protocol for Interconnecting Heterogeneous Overlay Networks,” Crovella, M., Feeney, L.M., Rubenstein, D., Raghavan, S.V. (eds.) NETWORKING 2010, Lecture Notes in Computer Science (LNCS), vol. 6091, pp.67-82. Springer, Heidelberg (2010). [60] L. Cheng, “Bridging Distributed Hash Tables in Wireless Ad-Hoc Networks,” IEEE Global Telecommunications Conference, GLOBECOM 2007, pp.5159–5163, Los Alamitos (2007). [61] D. Borsetti et al., “Content Discovery in Heterogeneous Mobile Networks,” Heterogeneous Wireless Access Networks: Architectures and Protocols, pp.419-441. Springer, Heidelberg (2009). [62] L.G. Erice et al., “Hierarchical P2P Systems,” Kosch, H., Böszörményi, L., Hellwagner, H. (eds.) Euro-Par 2003, Lecture Notes in Computer Science (LNCS), vol. 2790, pp. 1230–1239. Springer, Heidelberg (2003). [63] C. Fu, R. Glitho, and F. Khendek, “Signaling for Multimedia Conferencing in Stand Alone Mobile Ad Hoc Networks,” IEEE Transactions on Mobile Computing, Vol. 8, No7, July 2009, pp.991-1005. [64] J. Rosenberg et al., “Session Initiation Protocol (SIP),” IETF RFC 3261, June 2002. [65] A. N. Mian, R. Baldoni, and R. Beraldi, “A Survey of Service Discovery Protocols in Multihop Mobile Ad Hoc Networks,” IEEE Pervasive Computing, vol.8, no.1, pp.66-74, Jan.-March 2009. [66] J S. Cheshire and M. Krochmal, “DNS-Based Service Discovery,” IETF RFC 6763, Feb. 2013. [67] P. Gu, J. Wang, and H. Cai, “ASAP: An advertisement-based search algorithm for unstructured peer-topeer systems,” International Conference on Parallel Processing (ICPP), September 10-14, page 8, Xian, China, 2007. [68] B. H. Bloom, “Space/time trade-offs in hash coding with allowable errors”, Communications of the ACM, 13(7), pp.422–426, 1970. [69] M. Skjegstad et al., “A protocol for robust and efficient service discovery in large, highly mobile radio networks,” MILITARY COMMUNICATIONS CONFERENCE, 2010 - MILCOM 2010, pp.456-463, Oct. 31 2010-Nov. 3 2010. [70] F. Sailhan and V. Issarny, “Scalable Service Discovery for MANET,” Proceedings of 3rd IEEE International Conference on Pervasive Computing and Communications (PerCom'2005), Kauai Island, Hawaii 8–12 March 2005. [71] R. Deepa, S. Swamynathan, “A Service Discovery Model for Mobile Ad Hoc Networks,” International Conference on Recent Trends in Information, Telecommunication and Computing (ITC), pp.135-139, 12-13 March 2010. [72] M. Klein and B. König-Ries, “Multi-layer clusters in ad hoc networks - an approach to service discovery,” Proceedings of 1st International Workshop on Peer-to-Peer Computing (Co-Located with Networking 2002), Pisa, Italy 2002, pp. 187–201. [73] G. Schiele, C. Becker, and K. Rothermel, “Energy-efficient cluster-based service discovery for ubiquitous computing,” Proceedings of 11th ACM SIGOPS European Workshop, Leuven, Belgium, Sep. 2004. [74] N. Suri et al., “Peer-to-peer communications for tactical environments: Observations, requirements, and experiences,” IEEE Communications Magazine, vol.48, no.10, pp.60-69, October 2010. [75] P. Mockapetris, “Domain names - concepts and facilities,” IETF RFC 1034, Nov. 1987. [76] S. Pöhlsen, C. Buschmann, and C. Werner, “Integrating a Decentralized Web Service Discovery System into the Internet Infrastructure”, Sixth European Conference on Web Services, 2008. [77] OPNET, available at Internet: http://www.opnet.com/. [78] N. Aschenbruck, E. Gerhards-Padilla, and P. Martini, “Modeling mobility in disaster area scenarios”, Performance Evaluation, Volume 66, Issue 12, December 2009, Pages 773-790. [79] N. Aschenbruck et al., “BonnMotion - A Mobility Scenario Generation and Analysis Tool SIMUTools”, Proceedings of the 3rd International ICTS Conference on Simulation Tools and Techniques, Torremolinos, Malaga, Spain, 2010. [80] B. Wellington. (2012), dnsjava (2.1.3) [Online]. Available: http://www.xbill.org/dnsjava/. [81] T. K. Moseng and Ø. Kure, “DiffServ in Ad Hoc Networks. Presented at the EuroNGI Wireless and Mobility workshop,” Sitges, Spain, June 7-9, 2006. [82] L. SoB, “INSIGNIA: An IP-based quality of service framework for mobile ad hoc networks,” Journal of Parallel and Distributed Computing, Special issue on Wireless and Mobile Computing and Communications, 2000, 60(4), pp.374-406. [83] R. Braden et al., “Resource ReSerVation Protocol (RSVP) -- Version 1 Functional Specification,” IETF RFC 2205, Sept. 1997. [84] H. Xiao and W. K. G. Seah, “A Flexible Quality of Service Model for Mobile Ad Hoc Networks”, IEEE VTC2000-spring, Tokyo, Japan, 2000, pp.445-449. [85] H. Badis and K. A. Agha, “CEQMM: a complete and efficient quality of service model for MANETs”, Proceedings of ACM Intl. w/s on Perf. Evaluation of wireless ad hoc, sensor & ubiquitous networks 2006, pp.25–32. [86] P. Sinha, R. Sivakumar, and V. Bharghavan, “CEDAR: a core extraction distributed ad hoc routing algorithm,” Proceedings of the IEEE Infocom’99, Vol. 17(8), p. 1454-1465. [87] G-S. Ahn et al., “Support Service Differentiation for Real-Time and Best Effort Traffic in Stateless Wireless Ad Hoc Networks (SWAN),” IEEE Transactions on Mobile Computing Sept. 2002. [88] K. Ramakrishnan, S. Floyd, and D. Black, “An Addition of Explicit Congestion Notification (ECN) to IP,” IETF RFC 3168, Sept. 2001.