Overview of Routing Algorithm in Pocket Switched Networks
暂无分享,去创建一个
Yongjian Yang | Chuang Ma | Zhanwei Du | Chijun Zhang | Yongjian Yang | Zhanwei Du | Chijun Zhang | Chuang Ma
[1] Rossano Schifanella,et al. On the Dynamics of Human Proximity for Data Diffusion in Ad-Hoc Networks , 2011, Ad Hoc Networks.
[2] Intae Ryoo,et al. Delay-Tolerant Network Routing Algorithm for Periodical Mobile Nodes , 2014 .
[3] Srinivasan Parthasarathy,et al. An event-based framework for characterizing the evolutionary behavior of interaction graphs , 2007, KDD '07.
[4] Pan Hui,et al. Impact of Human Mobility on the Design of Opportunistic Forwarding Algorithms , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[5] Timothy W. Finin,et al. Detecting Commmunities via Simultaneous Clustering of Graphs and Folksonomies , 2008, WebKDD 2008.
[6] Marco Conti,et al. Exploiting users' social relations to forward data in opportunistic networks: The HiBOp solution , 2008, Pervasive Mob. Comput..
[7] Srinivasan Parthasarathy,et al. An event-based framework for characterizing the evolutionary behavior of interaction graphs , 2009, ACM Trans. Knowl. Discov. Data.
[8] Nathan Eagle,et al. Persistence and periodicity in a dynamic proximity network , 2012, ArXiv.
[9] Licia Capra,et al. Fair content dissemination in participatory DTNs , 2012, Ad Hoc Networks.
[10] Marco Pellegrini,et al. Extraction and classification of dense communities in the web , 2007, WWW '07.
[11] A-L Barabási,et al. Structure and tie strengths in mobile communication networks , 2006, Proceedings of the National Academy of Sciences.
[12] Ahmed Helmy,et al. CSI: A paradigm for behavior-oriented profile-cast services in mobile networks , 2012, Ad Hoc Networks.
[13] Xiao Mingjun and Huang Liusheng. Delay-Tolerant Network Routing Algorithm , 2009 .
[14] Mohan Kumar,et al. Opportunities in Opportunistic Computing , 2010, Computer.
[15] Cristina Comaniciu,et al. Beyond traditional DTN routing: social networks for opportunistic communication , 2011, IEEE Communications Magazine.
[16] Jon M. Kleinberg,et al. Wherefore art thou R3579X? , 2011, Commun. ACM.
[17] Nathan Eagle,et al. Behavioral Inference across Cultures: Using Telephones as a Cultural Lens , 2008, IEEE Intelligent Systems.
[18] J. Crowcroft,et al. Bubble Rap: Forwarding in small world DTNs in ever decreasing circles , 2007 .
[19] Vinton G. Cerf,et al. Delay-Tolerant Networking Architecture , 2007, RFC.
[20] Pan Hui,et al. Haggle: A networking architecture designed around mobile users , 2006 .
[21] Anders Lindgren,et al. Probabilistic routing in intermittently connected networks , 2003, MOCO.
[22] Nathan Eagle,et al. Community Computing: Comparisons between Rural and Urban Societies Using Mobile Phone Data , 2009, 2009 International Conference on Computational Science and Engineering.
[23] Pan Hui,et al. Impact of human mobility on the performance of opportunistic forwarding algorithms , 2006, INFOCOM 2006.
[24] Pan Hui,et al. How Small Labels Create Big Improvements , 2007, PerCom Workshops.
[25] Robert Simon,et al. The Impact of the Mobility Model on Delay Tolerant Networking Performance Analysis , 2007, 40th Annual Simulation Symposium (ANSS'07).
[26] Kevin J. Lang,et al. Communities from seed sets , 2006, WWW '06.
[27] A. Barabasi,et al. Quantifying social group evolution , 2007, Nature.
[28] Silvia Giordano,et al. Context information prediction for social-based routing in opportunistic networks , 2012, Ad Hoc Networks.
[29] Jon Crowcroft,et al. Human mobility models and opportunistic communications system design , 2008, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.
[30] Yuqing Zhang,et al. Dealing with dishonest recommendation: The trials in reputation management court , 2012, Ad Hoc Networks.
[31] Huan Liu,et al. Uncoverning Groups via Heterogeneous Interaction Analysis , 2009, 2009 Ninth IEEE International Conference on Data Mining.
[32] Stuart M. Allen,et al. Opportunistic social dissemination of micro-blogs , 2012, Ad Hoc Networks.
[33] Albert-László Barabási,et al. Understanding individual human mobility patterns , 2008, Nature.
[34] Alex Pentland,et al. Reality mining: sensing complex social systems , 2006, Personal and Ubiquitous Computing.
[35] Cecilia Mascolo,et al. Mining User Mobility Features for Next Place Prediction in Location-Based Services , 2012, 2012 IEEE 12th International Conference on Data Mining.
[36] Krishna P. Gummadi,et al. Exploiting Social Interactions in Mobile Systems , 2007, UbiComp.
[37] Amin Vahdat,et al. Epidemic Routing for Partially-Connected Ad Hoc Networks , 2009 .
[38] Herbert E. Huppert,et al. Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences , 2006 .
[39] Jie Wu,et al. An Efficient Prediction-Based Routing in Disruption-Tolerant Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.
[40] Huan Liu,et al. Community Detection and Mining in Social Media , 2010, Community Detection and Mining in Social Media.
[41] Marta C. González,et al. A universal model for mobility and migration patterns , 2011, Nature.
[42] Mads Haahr,et al. Editorial for special issue on social-based routing in mobile and delay-tolerant networks , 2012, Ad Hoc Networks.
[43] Stanley Wasserman,et al. Social Network Analysis: Methods and Applications , 1994 .
[44] Luigi Paura,et al. Human-mobility enabled networks in urban environments: Is there any (mobile wireless) small world out there? , 2012, Ad Hoc Networks.
[45] Thomas F. La Porta,et al. On Exploiting Transient Social Contact Patterns for Data Forwarding in Delay-Tolerant Networks , 2013, IEEE Transactions on Mobile Computing.
[46] Huan Liu,et al. Community evolution in dynamic multi-mode networks , 2008, KDD.
[47] Eric Gilbert,et al. Predicting tie strength with social media , 2009, CHI.
[48] Stuart M. Allen,et al. Decentralised detection of periodic encounter communities in opportunistic networks , 2012, Ad Hoc Networks.
[49] Wei-Ying Ma,et al. A unified framework for clustering heterogeneous Web objects , 2002, Proceedings of the Third International Conference on Web Information Systems Engineering, 2002. WISE 2002..
[50] David Lazer,et al. Inferring friendship network structure by using mobile phone data , 2009, Proceedings of the National Academy of Sciences.
[51] Ram Dantu,et al. Behavioral Entropy of a Cellular Phone User , 2008 .
[52] Jean-Yves Le Boudec,et al. Power Law and Exponential Decay of Intercontact Times between Mobile Devices , 2007, IEEE Transactions on Mobile Computing.
[53] Pan Hui,et al. How Small Labels Create Big Improvements , 2006, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).
[54] Qinghua Li,et al. A routing protocol for socially selfish delay tolerant networks , 2012, Ad Hoc Networks.
[55] C. Lee Giles,et al. Efficient identification of Web communities , 2000, KDD '00.
[56] Mads Haahr,et al. Social network analysis for routing in disconnected delay-tolerant MANETs , 2007, MobiHoc '07.
[57] Pan Hui,et al. Pocket Switched Networking: Challenges, Feasibility and Implementation Issues , 2005, WAC.