Sciweavers

77 search results - page 9 / 16
» Opportunistic forwarding in workplaces
Sort
View
ADHOCNOW
2006
Springer
14 years 1 months ago
ROAR: A Multi-rate Opportunistic AODV Routing Protocol for Wireless Ad-Hoc Networks
In this paper, we outline a simple approach, called ROAR, that enables the Ad-Hoc On-Demand Distance Vector (AODV) routing protocol to strengthen its routes by recruiting neighbors...
Kwan Wu Chin, Darryn Lowe
PERCOM
2010
ACM
13 years 11 months ago
Opportunistic web access via WLAN hotspots
—Mobile phones are becoming commonplace for consuming Internet content and services. However, availability, affordability, and quality of the supposedly ubiquitous cellular netwo...
Mikko Juhani Pitkänen, Teemu Kärkkä...
PIMRC
2010
IEEE
13 years 5 months ago
Contact surround in opportunistic networks
Abstract--Is the temporal dimension alone sufficient to characterize contacts in opportunistic networks? Several studies analyze the temporal aspect of contacts with significant re...
Nadjet Belblidia, Marcelo Dias de Amorim, Jeremie ...
JSAC
2008
79views more  JSAC 2008»
13 years 7 months ago
A content-centric framework for effective data dissemination in opportunistic networks
In this paper, we address the challenges of content transfer in opportunistic networks, and propose techniques to better facilitate data dissemination based on the characteristics ...
Ling-Jyh Chen, Chen-Hung Yu, Cheng-Long Tseng, Hao...
SIGSOFT
2007
ACM
14 years 8 months ago
CTG: a connectivity trace generator for testing the performance of opportunistic mobile systems
The testing of the performance of opportunistic communication protocols and applications is usually done through simulation as i) deployments are expensive and should be left to t...
Roberta Calegari, Mirco Musolesi, Franco Raimondi,...