Part-whole dissemination of large multimedia contents in opportunistic networks

N Belblidia, MD de Amorim, LHMK Costa… - Computer …, 2012 - Elsevier
A common assumption in intermittently-connected (or opportunistic) mobile networks is that
any contact has enough capacity to transfer the required amount of data. Although such an …

Mitigating the ack counterfeiting attack in delay and disruption tolerant networks

JF Naves, IM Moraes - 2017 IEEE Symposium on Computers …, 2017 - ieeexplore.ieee.org
Routing protocols for Delay and Disruption Tolerant Networks (DTNs) are prone to suffer
from malicious behavior of nodes. Particularly, in the acknowledgment counterfeiting attack …

延迟容忍网络路由协议研究

张俊宝, 罗光春, 李炯, 陈爱国 - 计算机应用研究, 2012 - cqvip.com
简介延迟容忍网络, 论述和追踪国内外延迟容忍网络路由协议的研究进展,
对现有的延迟容忍网络路由协议进行了分类研究, 着重介绍了一些经典路由协议 …

Reliability of Bluetooth-based connectivity traces for the characterization of human interaction

JM Cabero, I Urteaga, V Molina, F Liberal, JL Martín - Ad Hoc Networks, 2015 - Elsevier
The characterization of human interaction at different levels has been a matter of interest in
many disciplines. So far, social networking through the Internet has been the main source to …

Temporal random walk as a lightweight communication infrastructure for opportunistic networks

V Ramiro, E Lochin, P Sénac… - Proceeding of IEEE …, 2014 - ieeexplore.ieee.org
This paper explores the idea of sharing a common storage unit (token) as a lightweight
communication infrastructure for opportunistic networks. Instead of using contacts as …

Exploiting heterogeneity for improving forwarding performance in mobile opportunistic networks: An analytic approach

CH Lee - IEEE Transactions on Mobile Computing, 2015 - ieeexplore.ieee.org
Heterogeneity arises in a wide range of scenarios in mobile opportunistic networks and is
one of the key factors that govern the performance of forwarding algorithms. While the …

Noncontiguous locking techniques for parallel file systems

A Ching, W Liao, A Choudhary, R Ross… - Proceedings of the 2007 …, 2007 - dl.acm.org
Many parallel scientific applications use high-level I/O APIs that offer atomic I/O capabilities.
Atomic I/O in current parallel file systems is often slow when multiple processes …

[PDF][PDF] Opportunistic mobile social networks at work

AK Pietiläinen - Université Pierre et Marie Curie, 2010 - Citeseer
THIS dissertation presents one of the first experimental studies on opportunistic mo-bile
social networks. In this chapter we will first introduce the underlying motivations of our …

[PDF][PDF] Congestion control framework for delay-tolerant communications

A Grundy - 2012 - media.grundyonline.co.uk
Detecting and dealing with congestion in delay tolerant networks is an important and
challenging problem. Current DTN forwarding algorithms typically direct traffic towards …

[PDF][PDF] 节点相似度感知的社会化间断连接无线网络结构检测机制

吴大鹏, 靳继伟, 吕翊, 王汝言 - 电子与信息学报, 2013 - edit.jeit.ac.cn
间断连接无线网络中的节点采用“存储, 携带, 转发” 的方式传输消息, 网络中的节点具有较强的
社会属性. 该文提出一种基于相似度和标签传播的网络结构检测机制, 节点以运动过程所经历的 …