A survey of context data distribution for mobile ubiquitous systems

P Bellavista, A Corradi, M Fanelli… - ACM computing surveys …, 2012 - dl.acm.org
The capacity to gather and timely deliver to the service level any relevant information that
can characterize the service-provisioning environment, such as computing …

[HTML][HTML] A survey on multihop ad hoc networks for disaster response scenarios

DG Reina, M Askalani, SL Toral… - International …, 2015 - journals.sagepub.com
Disastrous events are one of the most challenging applications of multihop ad hoc networks
due to possible damages of existing telecommunication infrastructure. The deployed cellular …

Mobile ad hoc networking: milestones, challenges, and new research directions

M Conti, S Giordano - IEEE Communications Magazine, 2014 - ieeexplore.ieee.org
In this article we discuss the state of the art of (mobile) multihop ad hoc networking. This
paradigm has often been identified with the solutions developed inside the IETF MANET …

Exploiting users' social relations to forward data in opportunistic networks: The HiBOp solution

C Boldrini, M Conti, A Passarella - Pervasive and Mobile Computing, 2008 - Elsevier
Opportunistic networks, in which nodes opportunistically exploit any pair-wise contact to
identify next hops towards the destination, are one of the most interesting technologies to …

Power-efficient routing schemes for MANETs: a survey and open issues

WA Jabbar, M Ismail, R Nordin, S Arif - Wireless Networks, 2017 - Springer
Ubiquitous smart devices with embedded sensors are paving the way for mobile ad hoc
networks (MANETs) that enable users to communicate directly, thereby playing a key role in …

[HTML][HTML] State-of-the-art survey on P2P overlay networks in pervasive computing environments

A Malatras - Journal of Network and Computer Applications, 2015 - Elsevier
P2P overlay networks have attracted significant research interest due to their utility as
virtualized abstractions of complex network infrastructures, optimized to satisfy specific …

A Bayesian approach to detect pedestrian destination-sequences from WiFi signatures

A Danalet, B Farooq, M Bierlaire - Transportation Research Part C …, 2014 - Elsevier
In this paper, we propose a methodology to use the communication network infrastructure, in
particular WiFi traces, to detect the sequence of activity episodes visited by pedestrians. Due …

Prominent unicast routing protocols for Mobile Ad hoc Networks: Criterion, classification, and key attributes

TK Saini, SC Sharma - Ad Hoc Networks, 2019 - Elsevier
Abstract Mobile Ad hoc Networks are decentralized networks in which participating nodes
are mobile, small form-factor, equipped with the wireless interface, and have forwarding …

[PDF][PDF] Destination-sequenced distance vector (DSDV) routing protocol implementation in ns-3.

H Narra, Y Cheng, EK Cetinkaya, JP Rohrer… - SIMUTools, 2011 - academia.edu
Routing protocols are a critical aspect to performance in mobile wireless networks. The
development of new protocols requires testing against well-known protocols in various …

A data management perspective on vehicular networks

S Ilarri, T Delot, R Trillo-Lado - IEEE Communications Surveys …, 2015 - ieeexplore.ieee.org
The interest of intelligent transportation systems and vehicular ad hoc networks has
increased in recent years. As a fundamental building block for the development of …