Social network-based Sybil defenses exploit the algorithmic properties of social graphs to infer the extent to which an arbitrary node in such a graph should be trusted. However, these …
Encounter-based social networks and encounter-based systems link users who share a location at the same time, as opposed to the traditional social network paradigm of linking …
Connectivity and trust within social networks have been exploited to build applications on top of these networks, including information dissemination, Sybil defenses, and anonymous …
CC Sobin - 2015 International Conference on Computing and …, 2015 - ieeexplore.ieee.org
Delay Tolerant Networks (DTNs) are sparse networks, in which communication is possible without end-to-end connectivity. A node in DTN is considered as selfish when that node is …
Online social networks like Twitter and Facebook have become critical infrastructure for communicating and spreading news, especially in times of natural disasters or political …
The last 10 years of Internet development have been dominated by the growing popularity of cloud computing and online social networks. These enable the building of new services …
In this chapter, I present an application of a general purpose, multi-application mobile node sensor network based on mobile code applied to emergency scenarios. Mobile nodes host …
In this chapter we explain how to include mobile code in opportunistic networking (OppNet) messages to improve its performance. Store-carry-and-forward OppNet protocols offer new …
M Mohaisen, A Mohaisen - KSII Transactions on Internet and …, 2016 - koreascience.kr
Connectivity and trust in social networks have been exploited to propose applications on top of these networks, including routing, Sybil defenses, and anonymous communication …