Sciweavers

33 search results - page 5 / 7
» Contact surround in opportunistic networks
Sort
View
RAID
2010
Springer
13 years 5 months ago
Anomaly Detection and Mitigation for Disaster Area Networks
Abstract. One of the most challenging applications of wireless networking are in disaster area networks where lack of infrastructure, limited energy resources, need for common oper...
Jordi Cucurull, Mikael Asplund, Simin Nadjm-Tehran...
SIGCOMM
2009
ACM
14 years 2 months ago
MobiClique: middleware for mobile social networking
We consider a mobile ad hoc network setting where Bluetooth enabled mobile devices communicate directly with other devices as they meet opportunistically. We design and implement ...
Anna Kaisa Pietiläinen, Earl Oliver, Jason Le...
MOBIQUITOUS
2007
IEEE
14 years 1 months ago
Content Source Selection in Bluetooth Networks
—Large scale market penetration of electronic devices equipped with Bluetooth technology now gives the ability to share content (such as music or video clips) between members of ...
Liam McNamara, Cecilia Mascolo, Licia Capra
CEAS
2005
Springer
14 years 1 months ago
Comparative Graph Theoretical Characterization of Networks of Spam
Email is an increasingly important and ubiquitous means of communication, both facilitating contact between individuals and enabling rises in the productivity of organizations. Ho...
Luíz Henrique Gomes, Rodrigo B. Almeida, Lu...
MOBIHOC
2008
ACM
14 years 7 months ago
Routing performance analysis of human-driven delay tolerant networks using the truncated levy walk model
The routing performance of delay tolerant networks (DTN) is highly correlated with the distribution of inter-contact times (ICT), the time period between two successive contacts o...
Seongik Hong, Injong Rhee, Seong Joon Kim, Kyungha...