Sciweavers

1545 search results - page 38 / 309
» Opportunities in Opportunistic Computing
Sort
View
AINA
2010
IEEE
14 years 2 days ago
PRoPHET+: An Adaptive PRoPHET-Based Routing Protocol for Opportunistic Network
Abstract—We propose PRoPHET+, a routing scheme for opportunistic networks designed to maximize successful data delivery rate and minimize transmission delay. PRoPHET+ computes a ...
Ting-Kai Huang, Chia-Keng Lee, Ling-Jyh Chen
AINA
2008
IEEE
14 years 3 months ago
A Peer-to-Peer Approach for Mobile File Transfer in Opportunistic People Networks
With wireless technologies extending to every part of our daily lives, mobile networking applications are becoming increasingly popular for accessing the Internet. In this paper, ...
Ling-Jyh Chen, Ting-Kai Huang
BROADNETS
2005
IEEE
13 years 10 months ago
Opportunistic power allocation for fading channels with non-cooperative users and random access
— We present a game-theoretical model of a wireless communication system with multiple competing users sharing a multiaccess fading channel. With a specified capture rule and a ...
Jun Sun 0007, Eytan Modiano
PERCOM
2010
ACM
13 years 7 months ago
Privacy-enhanced social network routing in opportunistic networks
Opportunistic networking - forwarding messages in a disconnected mobile ad hoc network via any encountered nodes - otters a new mechanism for exploiting the mobile devices that man...
Iain Parris, Greg Bigwood, Tristan Henderson
DEXAW
2007
IEEE
199views Database» more  DEXAW 2007»
14 years 17 days ago
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security
A number of factors, such as the increasing popularity of wireless networks, the opportunities offered by 3G services, and the rapid proliferation of mobile devices, have stimulat...
Esther Palomar, Juan M. Estévez-Tapiador, J...