Collaboration in opportunistic networks
暂无分享,去创建一个
[1] Marco Conti,et al. Opportunistic networking: data forwarding in disconnected mobile ad hoc networks , 2006, IEEE Communications Magazine.
[2] Jussi Kangasharju,et al. Incentives for electronic coupon systems , 2006, MobiShare '06.
[3] Kaustubh S. Phanse,et al. Opportunistic wireless access networks , 2006, AcessNets '06.
[4] Arnold Pears,et al. What & When?: Distributing Content in Opportunistic Networks , 2006, 2006 International Conference on Wireless and Mobile Communications (ICWMC'06).
[5] Pan Hui,et al. Impact of Human Mobility on the Design of Opportunistic Forwarding Algorithms , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[6] Stanislav Kurkovsky,et al. Using ubiquitous computing in interactive mobile marketing , 2006, Personal and Ubiquitous Computing.
[7] Alex Pentland,et al. Reality mining: sensing complex social systems , 2006, Personal and Ubiquitous Computing.
[8] Miguel Nussbaum,et al. Comparative Analysis of Ad-Hoc Networks Oriented to Collaborative Activities , 2006, ARCS.
[9] Pan Hui,et al. Haggle: A networking architecture designed around mobile users , 2006 .
[10] Oliver P. Waldhorst,et al. Design and quantitative analysis of protocols for epidemic information dissemination in mobile ad hoc networks , 2005, Ausgezeichnete Informatikdissertationen.
[11] A. Boukerche. Handbook of Algorithms for Wireless Networking and Mobile Computing , 2005 .
[12] Pan Hui,et al. Pocket Switched Networking: Challenges, Feasibility and Implementation Issues , 2005, WAC.
[13] Klaus Wehrle,et al. Peer-to-Peer Systems and Applications , 2005, Peer-to-Peer Systems and Applications.
[14] Max Mühlhäuser,et al. A Privacy Preserving Reputation System for Mobile Information Dissemination Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[15] David A. Wagner,et al. Security and Privacy Issues in E-passports , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[16] Jordi Sabater-Mir,et al. Review on Computational Trust and Reputation Models , 2005, Artificial Intelligence Review.
[17] Pan Hui,et al. Pocket switched networks and human mobility in conference environments , 2005, WDTN '05.
[18] Thad Starner,et al. Wearable computing for the developing world , 2005, IEEE Pervasive Comput..
[19] Alex Pentland,et al. Social serendipity: mobilizing social software , 2005, IEEE Pervasive Computing.
[20] Russell Beale,et al. Supporting social interaction with smart phones , 2005, IEEE Pervasive Computing.
[21] Tobias Hoßfeld,et al. Mapping of file-sharing onto mobile environments: feasibility and performance of eDonkey with GPRS , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[22] Tobias Hoßfeld,et al. Mapping of file-sharing onto mobile environments: enhancement by UMTS , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.
[23] David C. Wilson,et al. Peer-to-peer information sharing in a mobile ad hoc environment , 2004, Sixth IEEE Workshop on Mobile Computing Systems and Applications.
[24] Hartmut Pohl,et al. RFID security , 2004, Inf. Secur. Tech. Rep..
[25] Kevin C. Almeroth,et al. Coupons: wide scale information distribution for wireless ad hoc networks , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[26] David V. Keyson,et al. The human side of sharing in peer-to-peer networks , 2004, EUSAI '04.
[27] Jon Crowcroft,et al. Rethinking incentives for mobile ad hoc networks , 2004, PINS '04.
[28] K. Höök,et al. MobiTip: Using Bluetooth as a Mediator of Social Context , 2004 .
[29] Aris M. Ouksel,et al. Opportunistic resource exchange in inter-vehicle ad-hoc networks , 2004, IEEE International Conference on Mobile Data Management, 2004. Proceedings. 2004.
[30] Kevin C. Almeroth,et al. Coupon based incentive systems and the implications of equilibrium theory , 2004, Proceedings. IEEE International Conference on e-Commerce Technology, 2004. CEC 2004..
[31] Hannes Frey,et al. Scalable geographic routing algorithms for wireless ad hoc networks , 2004, IEEE Network.
[32] Karl Aberer,et al. Autonomous Gossiping: A Self-Organizing Epidemic Algorithm for Selective Information Dissemination in Wireless Mobile Ad-Hoc Networks , 2004, ICSNW.
[33] Timo Ojala,et al. Bluetooth and WAP push based location-aware mobile advertising system , 2004, MobiSys '04.
[34] Bernhard Bauer,et al. Towards a general approach to mobile profile based distributed grouping , 2004, Personal and Ubiquitous Computing.
[35] Tobias Straub,et al. An anonymous bonus point system for mobile commerce based on word-of-mouth recommendation , 2004, SAC '04.
[36] Bharat K. Bhargava,et al. Peer-to-peer file-sharing over mobile ad hoc networks , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.
[37] Giuseppe Anastasi,et al. Wi-fi in ad hoc mode: a measurement study , 2004, Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the.
[38] Bernhard Bauer,et al. MPDG - mobile profile based distributed grouping , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.
[39] Timo Ojala,et al. SmartRotuaari - Context-Aware Mobile Multimedia Services , 2003 .
[40] R. Bharat Rao,et al. Evolution of mobile location-based services , 2003, CACM.
[41] Oliver P. Waldhorst,et al. Peer-to-Peer Computing in Mobile Ad Hoc Networks , 2003, MASCOTS Tutorials.
[42] Timothy W. Finin,et al. eNcentive: a framework for intelligent marketing in mobile peer-to-peer environments , 2003, ICEC '03.
[43] Kevin C. Almeroth,et al. Towards realistic mobility models for mobile ad hoc networks , 2003, MobiCom '03.
[44] Miguel Nussbaum,et al. Encouraging Face-to-Face Collaborative Learning through the Use of Handheld Computers in the Classroom , 2003, Mobile HCI.
[45] Max Mühlhäuser,et al. iClouds - Peer-to-Peer Information Sharing in Mobile Environments , 2003, Euro-Par.
[46] Christian Seitz,et al. Towards an Approach for Mobile Profile Based Distributed Clustering , 2003, Euro-Par.
[47] Krishna P. Gummadi,et al. Measuring and analyzing the characteristics of Napster and Gnutella hosts , 2003, Multimedia Systems.
[48] Xiaoyan Hong,et al. ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks , 2003, MobiHoc '03.
[49] M. Conti,et al. IEEE 802.11 ad hoc networks: performance measurements , 2003, 23rd International Conference on Distributed Computing Systems Workshops, 2003. Proceedings..
[50] Mahadev Satyanarayanan,et al. Predictive Resource Management for Wearable Computing , 2003, MobiSys '03.
[51] Eija Kaasinen,et al. User needs for location-aware mobile services , 2003, Personal and Ubiquitous Computing.
[52] Max Mühlhäuser,et al. Engineering multimedia-aware personalized ubiquitous services , 2002, Fourth International Symposium on Multimedia Software Engineering, 2002. Proceedings..
[53] Baochun Li,et al. Efficient peer-to-peer data dissemination in mobile ad-hoc networks , 2002, Proceedings. International Conference on Parallel Processing Workshop.
[54] Christian Becker,et al. An epidemic model for information diffusion in MANETs , 2002, MSWiM '02.
[55] Roy H. Campbell,et al. Advertising in a pervasive computing environment , 2002, WMC '02.
[56] Oliver P. Waldhorst,et al. A distributed search service for peer-to-peer file sharing in mobile applications , 2002, Proceedings. Second International Conference on Peer-to-Peer Computing,.
[57] Tracy Camp,et al. A survey of mobility models for ad hoc network research , 2002, Wirel. Commun. Mob. Comput..
[58] Jörg Hähner,et al. Graph-based mobility model for mobile ad hoc network simulation , 2002, Proceedings 35th Annual Simulation Symposium. SS 2002.
[59] Oliver P. Waldhorst,et al. Eine Protokollumgebung für Peer-to-Peer Dokumentenaustausch in infrastrukturlosen mobilen Umgebungen , 2002, WMAN.
[60] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[61] A. Laouiti,et al. Optimized link state routing protocol for ad hoc networks , 2001, Proceedings. IEEE International Multi Topic Conference, 2001. IEEE INMIC 2001. Technology for the 21st Century..
[62] Einar Snekkenes,et al. Concepts for personal location privacy policies , 2001, EC '01.
[63] Kevin Leyton-Brown,et al. Incentives for sharing in peer-to-peer networks , 2001, EC '01.
[64] Gerd Kortuem,et al. When peer-to-peer comes face-to-face: collaborative peer-to-peer computing in mobile ad-hoc networks , 2001, Proceedings First International Conference on Peer-to-Peer Computing.
[65] Rüdiger Schollmeier,et al. A definition of peer-to-peer networking for the classification of peer-to-peer architectures and applications , 2001, Proceedings First International Conference on Peer-to-Peer Computing.
[66] C. Gavoille,et al. Routing in Trees , 2001, ICALP.
[67] David A. Maltz,et al. DSR: the dynamic source routing protocol for multihop wireless ad hoc networks , 2001 .
[68] Eytan Adar,et al. Free Riding on Gnutella , 2000, First Monday.
[69] Arjen K. Lenstra,et al. Selecting Cryptographic Key Sizes , 2000, Journal of Cryptology.
[70] Gerd Kortuem,et al. Close Encounters: Supporting Mobile Collaboration through Interchange of User Profiles , 1999, HUC.
[71] Bartosz Mielczarek,et al. Scenario-based performance analysis of routing protocols for mobile ad-hoc networks , 1999, MobiCom.
[72] Elizabeth M. Belding-Royer,et al. A review of current routing protocols for ad hoc mobile wireless networks , 1999, IEEE Wirel. Commun..
[73] Lars Erik Holmquist,et al. Supporting group collaboration with interpersonal awareness devices , 1999, Personal Technologies.
[74] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[75] David A. Maltz,et al. A performance comparison of multi-hop wireless ad hoc network routing protocols , 1998, MobiCom '98.
[76] Mario Gerla,et al. On-demand multicast in mobile wireless networks , 1998, Proceedings Sixth International Conference on Network Protocols (Cat. No.98TB100256).
[77] Michael Luby,et al. A digital fountain approach to reliable distribution of bulk data , 1998, SIGCOMM '98.
[78] Berry Schoenmakers,et al. Security Aspects of the EcashTM Payment System , 1997, State of the Art in Applied Cryptography.
[79] Hannes Federrath,et al. MIXes in Mobile Communication Systems: Location Management with Privacy , 1996, Information Hiding.
[80] Charles E. Perkins,et al. Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.
[81] Mark Weiser,et al. The world is not a desktop , 1994, INTR.
[82] M. Weiser,et al. Hot topics-ubiquitous computing , 1993 .
[83] Mark Weiser,et al. Some computer science issues in ubiquitous computing , 1993, CACM.
[84] Amos Fiat,et al. Untraceable Electronic Cash , 1990, CRYPTO.
[85] Scott Shenker,et al. Epidemic algorithms for replicated database maintenance , 1988, OPSR.
[86] David Chaum,et al. Security without identification: transaction systems to make big brother obsolete , 1985, CACM.
[87] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[88] Pierangela Samarati,et al. Location privacy in pervasive computing , 2008 .
[89] Tobias Straub,et al. Digitale Reisepässe in Deutschland - Prozesse und Sicherheitsinfrastruktur , 2006, Sicherheit.
[90] Marco Conti,et al. Peer-to-Peer Computing in Mobile Ad Hoc Networks , 2006, The Handbook of Mobile Middleware.
[91] Andreas Heinemann,et al. Survey on Location Privacy in Pervasive Computing , 2005 .
[92] Oliver P. Waldhorst,et al. Epidemic Data Dissemination for Mobile Peer-to-Peer Lookup Services , 2005, Peer-to-Peer Systems and Applications.
[93] Hannes Frey,et al. Information Dissemination Based on the En-Passent Communication Pattern , 2005, KiVS.
[94] Max Mühlhäuser,et al. Spontaneous Collaboration in Mobile Peer-to-Peer Networks , 2005, Peer-to-Peer Systems and Applications.
[95] Nathan Eagle,et al. Machine perception and learning of complex social systems , 2005 .
[96] Alex Pentland,et al. DakNet: rethinking connectivity in developing nations , 2004, Computer.
[97] M. Berger,et al. moPiMine - mobile profile mining , 2004, International Workshop on Wireless Ad-Hoc Networks, 2004..
[98] Tobias Straub,et al. Zur rechtsverträglichen Technikgestaltung anheind einer M-Commerce-Anwendung , 2004, Workshop Mobile Commerce.
[99] M. Mühlhäuser,et al. Allgegenwärtige Rechner : eine neue Dimension der IT-Sicherheitsproblematik , 2004 .
[100] Omer Mahmood,et al. Combining Mobile Data Transport and Mobile Data Recharging to Address Public Transport Information Maintenance Problems in Rural and Remote Australia , 2004, ISI.
[101] A. Beresford,et al. Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..
[102] Anwitaman Datta,et al. MobiGrid: Peer-to-Peer Overlay and Mobile Ad-Hoc Network Rendezvous - a Data Management Perspective. , 2003 .
[103] Jörg Hähner,et al. Usenet-on-the-fly - Supporting Locality of Information in Spontaneous Networking Environments , 2003 .
[104] Y. C. Hu,et al. USENIX Association Proceedings of HotOS IX : The 9 th Workshop on Hot Topics in Operating Systems , 2003 .
[105] Max Mühlhäuser,et al. Ad hoc collaboration and information services using information clouds , 2003 .
[106] Tobias Straub,et al. Mund-zu-Mund-Propaganda mit Bonussystem in mobilen Ad-Hoc-Netzen , 2003, GI Jahrestagung.
[107] Oliver P. Waldhorst,et al. A special-purpose peer-to-peer file sharing system for mobile ad hoc networks , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).
[108] T D'Roza,et al. An Overview of Location-Based Services , 2003 .
[109] Ronald L. Rivest,et al. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.
[110] A. Sadeghi,et al. Electronic Payment Systems , 2003, Digital Rights Management.
[111] Kurt Geihs,et al. Shark - a System for Management, Synchronization and Exchange of Knowledge in Mobile User Groups , 2002, J. Univers. Comput. Sci..
[112] Max Mühlhäuser,et al. Towards personalized ubiquitous computing services , 2002 .
[113] Gerd Kortuem,et al. A methodology and software platform for building wearable communities , 2002 .
[114] Kalle Lyytinen,et al. Issues and Challenges in Ubiquitous Computing , 2002 .
[115] Miguel Nussbaum,et al. An Agent-Based Middleware for Supporting Spontaneous Collaboration among Co-Located , Mobile , and not necessarily Known People , 2002 .
[116] Wolfgang Blochinger,et al. Dependable High Performance Computing on a Parallel Sysplex Cluster , 2000, PDPTA.
[117] Joseph P. Macker,et al. Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations , 1999, RFC.
[118] James H. Aylor,et al. Computer for the 21st Century , 1999, Computer.
[119] Michael Waidner. Electronic Payment Systems , 1996 .
[120] David Chaum,et al. Blind Signatures for Untraceable Payments , 1982, CRYPTO.