JF Naves, IM Moraes - 2017 IEEE Symposium on Computers …, 2017 - ieeexplore.ieee.org
Routing protocols for Delay and Disruption Tolerant Networks (DTNs) are prone to suffer from malicious behavior of nodes. Particularly, in the acknowledgment counterfeiting attack …
The characterization of human interaction at different levels has been a matter of interest in many disciplines. So far, social networking through the Internet has been the main source to …
V Ramiro, E Lochin, P Sénac… - Proceeding of IEEE …, 2014 - ieeexplore.ieee.org
This paper explores the idea of sharing a common storage unit (token) as a lightweight communication infrastructure for opportunistic networks. Instead of using contacts as …
CH Lee - IEEE Transactions on Mobile Computing, 2015 - ieeexplore.ieee.org
Heterogeneity arises in a wide range of scenarios in mobile opportunistic networks and is one of the key factors that govern the performance of forwarding algorithms. While the …
Many parallel scientific applications use high-level I/O APIs that offer atomic I/O capabilities. Atomic I/O in current parallel file systems is often slow when multiple processes …
AK Pietiläinen - Université Pierre et Marie Curie, 2010 - Citeseer
THIS dissertation presents one of the first experimental studies on opportunistic mo-bile social networks. In this chapter we will first introduce the underlying motivations of our …
Detecting and dealing with congestion in delay tolerant networks is an important and challenging problem. Current DTN forwarding algorithms typically direct traffic towards …