The quest for a killer app for opportunistic and delay tolerant networks: (invited paper)
暂无分享,去创建一个
[1] Pan Hui,et al. BUBBLE Rap: Social-Based Forwarding in Delay-Tolerant Networks , 2008, IEEE Transactions on Mobile Computing.
[2] Anders Lindgren,et al. Empirical evaluation of hybrid opportunistic networks , 2009, 2009 First International Communication Systems and Networks and Workshops.
[3] Edwin Blake,et al. Developing locally relevant applications for rural areas: a South African example , 2004 .
[4] Pan Hui,et al. Haggle: A networking architecture designed around mobile users , 2006 .
[5] L. Lambrinos. Deploying Open Source IP Telephony in Rural Environments , 2008, 2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies.
[6] Gary Marsden,et al. People are people, but technology is not technology , 2008, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.
[7] Francisco del Pozo,et al. Analysis of information and communication needs in rural primary health care in developing countries , 2005, IEEE Transactions on Information Technology in Biomedicine.
[8] Anders Lindgren,et al. Networking in the land of northern lights: two years of experiences from DTN system deployments , 2008, WiNS-DR '08.
[9] Michael K. Reiter,et al. Crowds: anonymity for Web transactions , 1998, TSEC.
[10] Vinay Avasthi,et al. Position Paper – Mobile Internet UX for Developing Countries , 2007 .
[11] William David Tucker,et al. Developing locally relevant software applications for rural areas: a South African example , 2004 .
[12] Beth E. Kolko,et al. Communication as information-seeking: the case for mobile social software for developing regions , 2007, WWW '07.
[13] Anders Lindgren,et al. Probabilistic Routing in Intermittently Connected Networks , 2004, SAPIR.
[14] Pan Hui,et al. Sharing airtime with Shair avoids wasting time and money , 2009, HotMobile '09.
[15] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[16] Kostas Pentikousis,et al. Design considerations for a network of information , 2008, CoNEXT '08.
[17] Cauligi S. Raghavendra,et al. Spray and wait: an efficient routing scheme for intermittently connected mobile networks , 2005, WDTN '05.
[18] Amin Vahdat,et al. Epidemic Routing for Partially-Connected Ad Hoc Networks , 2009 .
[19] Christophe Diot,et al. Impact of Human Mobility on Opportunistic Forwarding Algorithms , 2007, IEEE Transactions on Mobile Computing.
[20] Liam McNamara,et al. Media sharing based on colocation prediction in urban transport , 2008, MobiCom '08.
[21] Arun Venkataramani,et al. DTN routing as a resource allocation problem , 2007, SIGCOMM '07.
[22] John Burgess,et al. Surviving attacks on disruption-tolerant networks without authentication , 2007, MobiHoc '07.
[23] Kevin R. Fall,et al. A delay-tolerant network architecture for challenged internets , 2003, SIGCOMM '03.