Hybrid routing in delay tolerant networks
暂无分享,去创建一个
[1] Christophe Diot,et al. Are you moved by your social network application? , 2008, WOSN '08.
[2] Tracy Camp,et al. A survey of mobility models for ad hoc network research , 2002, Wirel. Commun. Mob. Comput..
[3] S. Keshav,et al. Practical security for disconnected nodes , 2005, 1st IEEE ICNP Workshop on Secure Network Protocols, 2005. (NPSec)..
[4] Uri Blumenthal,et al. Pre-Shared Key (PSK) Ciphersuites with NULL Encryption for Transport Layer Security (TLS) , 2007, RFC.
[5] Srinivasan Keshav,et al. Low-cost communication for rural internet kiosks using mechanical backhaul , 2006, MobiCom '06.
[6] Thierry Turletti,et al. Towards truly heterogeneous internets: Bridging infrastructure-based and infrastructure-less networks , 2011, 2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011).
[7] Christian Huitema,et al. STUN - Simple Traversal of User Datagram Protocol (UDP) Through Network Address Translators (NATs) , 2003, RFC.
[8] Christian Wagner,et al. The Spatial Node Distribution of the Random Waypoint Mobility Model , 2002, WMAN.
[9] Pan Hui,et al. Pocket Switched Networking: Challenges, Feasibility and Implementation Issues , 2005, WAC.
[10] Donald F. Towsley,et al. Relays, base stations, and meshes: enhancing mobile networks with infrastructure , 2008, MobiCom '08.
[11] Arun Venkataramani,et al. DTN routing as a resource allocation problem , 2007, SIGCOMM '07.
[12] Jörg Ott,et al. Opportunistic web access via WLAN hotspots , 2010, 2010 IEEE International Conference on Pervasive Computing and Communications (PerCom).
[13] Dharma P. Agrawal,et al. Mobile Ad hoc Networking , 2002 .
[14] Matthias Grossglauser,et al. Age matters: efficient route discovery in mobile ad hoc networks using encounter ages , 2003, MobiHoc '03.
[15] Martina Zitterbart,et al. Reconnecting the internet with ariba: self-organizing provisioning of end-to-end connectivity in heterogeneous networks , 2010, CCRV.
[16] Van Jacobson,et al. TCP Extensions for High Performance , 1992, RFC.
[17] P. Blanchard,et al. Mathematical Analysis of Urban Spatial Networks , 2008 .
[18] Robert Simon,et al. A Simulation Study of Common Mobility Models for Opportunistic Networks , 2008, 41st Annual Simulation Symposium (anss-41 2008).
[19] Jon Postel,et al. User Datagram Protocol , 1980, RFC.
[20] Lars Wolf,et al. Impact of radio range on contact characteristics in bus-based delay tolerant networks , 2011, 2011 Eighth International Conference on Wireless On-Demand Network Systems and Services.
[21] Devavrat Shah,et al. Throughput-delay trade-off in wireless networks , 2004, IEEE INFOCOM 2004.
[22] J. Redi,et al. A brief overview of ad hoc networks: challenges and directions , 2002, IEEE Communications Magazine.
[23] Qian Zhang,et al. Shortest path routing in partially connected ad hoc networks , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).
[24] David Mazières,et al. Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.
[25] Vania Conan,et al. HYMAD: Hybrid DTN-MANET routing for dense and highly dynamic wireless networks , 2009, 2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops.
[26] Mohan Kumar,et al. Opportunities in Opportunistic Computing , 2010, Computer.
[27] Adrian Hooke,et al. The interplanetary Internet , 2001, CACM.
[28] Injong Rhee,et al. On the levy-walk nature of human mobility , 2011, TNET.
[29] Pekka Nikander,et al. SEcure Neighbor Discovery (SEND) , 2005, RFC.
[30] Jon Crowcroft,et al. A survey and comparison of peer-to-peer overlay network schemes , 2005, IEEE Communications Surveys & Tutorials.
[31] Scott C. Burleigh,et al. Bundle Protocol Specification , 2007, RFC.
[32] W. Woess. Random walks on infinite graphs and groups, by Wolfgang Woess, Cambridge Tracts , 2001 .
[33] Thierry Turletti,et al. MeDeHa - Efficient Message Delivery in Heterogeneous Networks with Intermittent Connectivity , 2010 .
[34] Jochen Dinger,et al. Decentralized Bootstrapping of P2P Systems: A Practical View , 2009, Networking.
[35] Marcelo Bagnulo,et al. Multihoming L3 Shim Approach , 2005 .
[36] Pan Hui,et al. Pocket Switched Networks: Real-world mobility and its consequences for opportunistic forwarding , 2005 .
[37] Donald E. Eastlake,et al. US Secure Hash Algorithm 1 (SHA1) , 2001, RFC.
[38] Cauligi S. Raghavendra,et al. Spray and Focus: Efficient Mobility-Assisted Routing for Heterogeneous and Correlated Mobility , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).
[39] Charles E. Perkins,et al. IP Mobility Support for IPv4 , 2002, RFC.
[40] Injong Rhee,et al. Human Mobility Patterns and Their Impact on Delay Tolerant Networks , 2007, HotNets.
[41] Arun Venkataramani,et al. Augmenting mobile 3G using WiFi , 2010, MobiSys '10.
[42] Amin Vahdat,et al. MACEDON: Methodology for Automatically Creating, Evaluating, and Designing Overlay Networks , 2004, NSDI.
[43] Erina Ferro,et al. Bluetooth and Wi-Fi wireless protocols: a survey and a comparison , 2005, IEEE Wireless Communications.
[44] Sokol Kosta,et al. Small World in Motion (SWIM): Modeling Communities in Ad-Hoc Mobile Networking , 2010, 2010 7th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON).
[45] Antony I. T. Rowstron,et al. Virtual ring routing: network routing inspired by DHTs , 2006, SIGCOMM.
[46] Jörg Ott,et al. Integrating DTN and MANET routing , 2006, CHANTS '06.
[47] Yin Zhang,et al. Incentive-aware routing in DTNs , 2008, 2008 IEEE International Conference on Network Protocols.
[48] Stephen Farrell,et al. Delay- and Disruption-Tolerant Networking , 2006, IEEE Internet Computing.
[49] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.
[50] Donald F. Towsley,et al. On the capacity of hybrid wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[51] Zhensheng Zhang,et al. Routing in intermittently connected mobile ad hoc networks and delay tolerant networks: overview and challenges , 2006, IEEE Communications Surveys & Tutorials.
[52] Paul Francis,et al. The IP Network Address Translator (NAT) , 1994, RFC.
[53] Mark E. J. Newman,et al. Power-Law Distributions in Empirical Data , 2007, SIAM Rev..
[54] Arunabha Sen,et al. Broadcast scheduling algorithms for radio networks , 1995, Proceedings of MILCOM '95.
[55] Anders Lindgren,et al. Probabilistic Routing Protocol for Intermittently Connected Networks , 2012, RFC.
[56] R.M. Fujimoto,et al. Parallel and distributed simulation systems , 2001, Proceeding of the 2001 Winter Simulation Conference (Cat. No.01CH37304).
[57] P. R. Kumar,et al. Critical power for asymptotic connectivity , 1998, Proceedings of the 37th IEEE Conference on Decision and Control (Cat. No.98CH36171).
[58] Anders Lindgren,et al. Empirical evaluation of hybrid opportunistic networks , 2009, 2009 First International Communication Systems and Networks and Workshops.
[59] Christoph P. Mayer,et al. The Spontaneous Virtual Networks Architecture for Supporting Future Internet Services and Applications , 2008 .
[60] Jörg Widmer,et al. Network coding for efficient communication in extreme networks , 2005, WDTN '05.
[61] Yongdae Kim,et al. Attacking the Kad network , 2008, SecureComm.
[62] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[63] Pan Hui,et al. Distributed community detection in delay tolerant networks , 2007, MobiArch '07.
[64] Bernhard Heep. dCBR: A global view on network coordinates for more efficient peer-to-peer systems , 2010, 2010 Second International Conference on Ubiquitous and Future Networks (ICUFN).
[65] Amin Vahdat,et al. Epidemic Routing for Partially-Connected Ad Hoc Networks , 2009 .
[66] Russ Housley,et al. An Internet Attribute Certificate Profile for Authorization , 2010, RFC.
[67] Do Young Eun,et al. Toward stochastic anatomy of inter-meeting time distribution under general mobility models , 2008, MobiHoc '08.
[68] Timur Friedman,et al. DTN routing in a mobility pattern space , 2005, WDTN '05.
[69] Aravind Srinivasan,et al. Mobile data offloading in metropolitan area networks , 2010, MOCO.
[70] Do Young Eun,et al. Crossing over the bounded domain: from exponential to power-law inter-meeting time in MANET , 2007, MobiCom '07.
[71] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[72] Jörg Ott,et al. The ONE simulator for DTN protocol evaluation , 2009, SimuTools.
[73] Maria Udén,et al. Providing connectivity to the Saami nomadic community , 2002 .
[74] Christoph P. Mayer,et al. SpoVNet: An Architecture for Easy Creation and Deployment of Service Overlays , 2011 .
[75] Ben Y. Zhao,et al. Towards a Common API for Structured Peer-to-Peer Overlays , 2003, IPTPS.
[76] Brian Gallagher,et al. MaxProp: Routing for Vehicle-Based Disruption-Tolerant Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[77] Cauligi S. Raghavendra,et al. Spray and wait: an efficient routing scheme for intermittently connected mobile networks , 2005, WDTN '05.
[78] Ingmar Baumgart,et al. Verteilter Namensdienst für dezentrale IP-Telefonie , 2010 .
[79] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.2 , 2008, RFC.
[80] Taoufik En-Najjary,et al. A global view of kad , 2007, IMC '07.
[81] Deepak Ganesan,et al. Triage : A Power-Aware Software Architecture for Tiered Microservers , 2005 .
[82] Pan Hui,et al. BUBBLE Rap: Social-Based Forwarding in Delay-Tolerant Networks , 2008, IEEE Transactions on Mobile Computing.
[83] Jennifer C. Hou,et al. One Size Does Not Fit All: A Detailed Analysis and Modeling of P2P Traffic , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.
[84] Mark Handley,et al. Why the Internet only just works , 2006 .
[85] Alex Pentland,et al. Reality mining: sensing complex social systems , 2006, Personal and Ubiquitous Computing.
[86] Ellen W. Zegura,et al. Capacity Enhancement using Throwboxes in DTNs , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.
[87] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.
[88] Christoph P. Mayer,et al. On the impact of graph structure on mobility in opportunistic mobile networks , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[89] Charles E. Perkins,et al. Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.
[90] Alex Pentland,et al. DakNet: rethinking connectivity in developing nations , 2004, Computer.
[91] Oliver Brock,et al. MV routing and capacity building in disruption tolerant networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[92] Scott Shenker,et al. Internet indirection infrastructure , 2004, IEEE/ACM Transactions on Networking.
[93] David B. Johnson,et al. Routing in Ad Hoc Networks of Mobile Hosts , 1994, 1994 First Workshop on Mobile Computing Systems and Applications.
[94] J. Jubin,et al. The DARPA packet radio network protocols , 1987, Proceedings of the IEEE.
[95] Marcelo Dias de Amorim,et al. Relieving the wireless infrastructure: When opportunistic networks meet guaranteed delays , 2011, 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.
[96] Werner Vogels,et al. Dynamo: amazon's highly available key-value store , 2007, SOSP.
[97] Anders Lindgren,et al. Networking in the land of northern lights: two years of experiences from DTN system deployments , 2008, WiNS-DR '08.
[98] Cecilia Mascolo,et al. Adaptive routing for intermittently connected mobile ad hoc networks , 2005, Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks.
[99] Bobby Bhattacharjee,et al. Scalable application layer multicast , 2002, SIGCOMM '02.
[100] Quynh H. Dang,et al. Recommendation for Applications Using Approved Hash Algorithms , 2009 .
[101] L. Asz. Random Walks on Graphs: a Survey , 2022 .
[102] Ger Koole,et al. The message delay in mobile ad hoc networks , 2005, Perform. Evaluation.
[103] Panganamala Ramana Kumar,et al. RHEINISCH-WESTFÄLISCHE TECHNISCHE HOCHSCHULE AACHEN , 2001 .
[104] Aruna Balasubramanian,et al. DOME: a diverse outdoor mobile testbed , 2009, HotPlanet '09.
[105] Stephen Farrell,et al. Report on an Arctic summer DTN trial , 2011, Wirel. Networks.
[106] Célio Vinicius N. de Albuquerque,et al. NECTAR: a DTN routing protocol based on neighborhood contact history , 2009, SAC '09.
[107] Yakov Rekhter,et al. Address Allocation for Private Internets , 1994, RFC.
[108] Charles M. Grinstead,et al. Introduction to probability , 1999, Statistics for the Behavioural Sciences.
[109] Paul V. Mockapetris,et al. Domain names - implementation and specification , 1987, RFC.
[110] Ralph Holz,et al. SpoVNet Security Task Force Report , 2009 .
[111] András Varga,et al. An overview of the OMNeT++ simulation environment , 2008, SimuTools.
[112] Kazuyuki Shudo,et al. Overlay Weaver: An overlay construction toolkit , 2008, Computer Communications.
[113] Eric Rescorla,et al. SSL and TLS: Designing and Building Secure Systems , 2000 .
[114] Christophe Diot,et al. Impact of Human Mobility on Opportunistic Forwarding Algorithms , 2007, IEEE Transactions on Mobile Computing.
[115] Lixia Zhang,et al. Stream Control Transmission Protocol , 2000, RFC.
[116] Naoki Masuda,et al. Return times of random walk on generalized random graphs. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.
[117] Vijay Erramilli,et al. Delegation forwarding , 2008, MobiHoc '08.
[118] Joab Jackson. The Interplanetary Internet , 2005 .
[119] Stephen Farrell,et al. Licklider Transmission Protocol - Specification , 2008, RFC.
[120] Jörg Ott,et al. Message fragmentation in opportunistic DTNs , 2008, 2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks.
[121] Jari Arkko,et al. A Node Identity Internetworking Architecture , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[122] Pan Hui,et al. How Small Labels Create Big Improvements , 2006, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).
[123] Martin Vetterli,et al. Locating nodes with EASE: last encounter routing in ad hoc networks through mobility diffusion , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[124] Christopher D. Gill,et al. Accommodating Transient Connectivity in Ad Hoc and Mobile Settings , 2004, Pervasive.
[125] Jörg Ott,et al. Simulating Mobility and DTNs with the ONE (Invited Paper) , 2010, J. Commun..
[126] Patrick Weber,et al. OpenStreetMap: User-Generated Street Maps , 2008, IEEE Pervasive Computing.
[127] Mostafa Ammar,et al. Routing in Space and Time in Networks with Predictable Mobility , 2004 .
[128] Marco Conti,et al. Mobile Ad-hoc Networking - Minitrack Introduction , 2001, HICSS.
[129] Paolo Giaccone,et al. Capacity scaling in delay tolerant networks with heterogeneous mobile nodes , 2007, MobiHoc '07.
[130] Klaus Wehrle,et al. OCALA: An Architecture for Supporting Legacy Applications over Overlays , 2006, NSDI.
[131] Klaus Wehrle,et al. Peer-to-Peer Systems and Applications , 2005, Peer-to-Peer Systems and Applications.
[132] W. K. Hale. Frequency assignment: Theory and applications , 1980, Proceedings of the IEEE.
[133] David Tse,et al. Mobility increases the capacity of ad hoc wireless networks , 2002, TNET.
[134] Jean-Yves Le Boudec,et al. Power Law and Exponential Decay of Intercontact Times between Mobile Devices , 2010, IEEE Trans. Mob. Comput..
[135] Jon Postel,et al. Transmission Control Protocol , 1981, RFC.
[136] Julinda Stefa,et al. SWIM: A Simple Model to Generate Small Mobile Worlds , 2008, IEEE INFOCOM 2009.
[137] Yakov Rekhter,et al. An Architecture for IP Address Allocation with CIDR , 1993, RFC.
[138] K. Psounis,et al. Efficient Routing in Intermittently Connected Mobile Networks: The Single-Copy Case , 2008, IEEE/ACM Transactions on Networking.
[139] C. M. Sperberg-McQueen,et al. Extensible Markup Language (XML) , 1997, World Wide Web J..
[140] M. Frans Kaashoek,et al. Uia: a global connectivity architecture for mobile personal devices , 2008 .
[141] Jon Crowcroft. Cold topics in networking , 2008, CCRV.
[142] Mostafa Ammar,et al. Hybrid routing in clustered DTNs with message ferrying , 2007, MobiOpp '07.
[143] Ralph Holz,et al. Spontaneous Virtual Networks: On the Road Towards the Internet´s Next GenerationSpontane Virtuelle Netze: Auf dem Weg zur nächsten Generation des Internets , 2008, it Inf. Technol..
[144] Xue Chen,et al. HRing: A Structured P2P Overlay Based on Harmonic Series , 2008, IEEE Transactions on Parallel and Distributed Systems.
[145] Gabriel Montenegro,et al. Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Addresses , 2002, NDSS.
[146] Brian Neil Levine,et al. An Energy-Efficient Architecture for DTN Throwboxes , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[147] Klaus Wehrle,et al. SimBetAge: utilizing temporal changes in social networks for pocket switched networks , 2009, U-NET '09.
[148] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[149] Anders Lindgren,et al. Probabilistic routing in intermittently connected networks , 2003, MOCO.
[150] Christoph P. Mayer,et al. Offloading infrastructure using Delay Tolerant Networks and assurance of delivery , 2011, 2011 IFIP Wireless Days (WD).
[151] Seif Haridi,et al. A Practical Approach to Network Size Estimation for Structured Overlays , 2008, IWSOS.
[152] Jon Postel,et al. Internet Protocol , 1981, RFC.
[153] Robin Kravets,et al. Encounter: based routing in DTNs , 2009, MOCO.
[154] Eiko Yoneki. The Importance of Data Collection for Modelling Contact Networks , 2009, 2009 International Conference on Computational Science and Engineering.
[155] Wolfgang Kellerer,et al. ProtoPeer: a P2P toolkit bridging the gap between simulation and live deployement , 2009, SimuTools.
[156] Waylon Brunette,et al. Data MULEs: modeling a three-tier architecture for sparse sensor networks , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[157] J. Ott,et al. Simulating Mobility and DTNs with the ONE , 2010 .
[158] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[159] Christoph P. Mayer,et al. The Ariba Framework for Application Development using Service Overlays , 2010, PIK Prax. Informationsverarbeitung Kommun..
[160] Christoph P. Mayer,et al. Ariba: A Framework for Developing Decentralized Services , 2009 .
[161] Analog Vlsi,et al. On the Design of , 2000 .
[162] Tuomas Aura,et al. Cryptographically Generated Addresses (CGA) , 2005, ISC.
[163] James A. Davis,et al. Wearable computers as packet transport mechanisms in highly-partitioned ad-hoc networks , 2001, Proceedings Fifth International Symposium on Wearable Computers.
[164] Scott Oaks,et al. JXTA in a Nutshell , 2002 .
[165] Thierry Turletti,et al. Message delivery in heterogeneous networks prone to episodic connectivity , 2011, Wirel. Networks.
[166] Lixia Zhang,et al. Report from the IAB Workshop on Routing and Addressing , 2007, RFC.
[167] S. Chandrasekhar. Stochastic problems in Physics and Astronomy , 1943 .
[168] Arun Venkataramani,et al. Replication Routing in DTNs: A Resource Allocation Approach , 2010, IEEE/ACM Transactions on Networking.
[169] Injong Rhee,et al. SLAW: A New Mobility Model for Human Walks , 2009, IEEE INFOCOM 2009.
[170] Jörg Hähner,et al. Graph-based mobility model for mobile ad hoc network simulation , 2002, Proceedings 35th Annual Simulation Symposium. SS 2002.
[171] Martina Zitterbart,et al. Using Legacy Applications in Future Heterogeneous Networks with ariba , 2010, INFOCOM 2010.
[172] Jörg Ott,et al. Working day movement model , 2008, MobilityModels '08.
[173] Taoufik En-Najjary,et al. Long Term Study of Peer Behavior in the kad DHT , 2009, IEEE/ACM Transactions on Networking.
[174] Mun Choon Chan,et al. MobiCent: a Credit-Based Incentive System for Disruption Tolerant Network , 2010, 2010 Proceedings IEEE INFOCOM.
[175] M. Newman. Power laws, Pareto distributions and Zipf's law , 2005 .
[176] Mads Haahr,et al. Social network analysis for routing in disconnected delay-tolerant MANETs , 2007, MobiHoc '07.
[177] Srinivasan Keshav,et al. Design and implementation of the KioskNet system , 2007, 2007 International Conference on Information and Communication Technologies and Development.
[178] Mark Handley,et al. SIP: Session Initiation Protocol , 1999, RFC.
[179] Ellen W. Zegura,et al. A message ferrying approach for data delivery in sparse mobile ad hoc networks , 2004, MobiHoc '04.
[180] S. Krause,et al. OverSim: A Flexible Overlay Network Simulation Framework , 2007, 2007 IEEE Global Internet Symposium.
[181] Ian Clarke,et al. Freenet: A Distributed Anonymous Information Storage and Retrieval System , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[182] Albert-László Barabási,et al. Understanding individual human mobility patterns , 2008, Nature.
[183] Yves Lepage,et al. MBONE, multicasting tomorrow's Internet , 1996 .
[184] Guohong Cao,et al. Win-Coupon: An incentive framework for 3G traffic offloading , 2011, 2011 19th IEEE International Conference on Network Protocols.
[185] Kyunghan Lee,et al. Mobile Data Offloading: How Much Can WiFi Deliver? , 2013, IEEE/ACM Transactions on Networking.
[186] Mads Haahr,et al. Social Network Analysis for Information Flow in Disconnected Delay-Tolerant MANETs , 2009, IEEE Transactions on Mobile Computing.
[187] Augustin Chaintreau,et al. The age of impatience: optimal replication schemes for opportunistic networks , 2009, CoNEXT '09.
[188] Jie Wu,et al. Predict and relay: an efficient routing in disruption-tolerant networks , 2009, MobiHoc '09.
[189] Robert Simon,et al. Characteristics of common mobility models for opportunistic networks , 2007, PM2HW2N '07.
[190] D Volchenkov,et al. Random walks along the streets and canals in compact cities: spectral analysis, dynamical modularity, information, and statistical mechanics. , 2007, Physical review. E, Statistical, nonlinear, and soft matter physics.
[191] Aravind Srinivasan,et al. Cellular traffic offloading through opportunistic communications: a case study , 2010, CHANTS '10.
[192] Oliver P. Waldhorst,et al. Autonomous detection of connectivity , 2011, 2011 IEEE International Conference on Peer-to-Peer Computing.
[193] Richard H. Thayer,et al. Standards, Guidelines, and Examples on System and Software Requirements Engineering , 1994 .
[194] Rabin K. Patra,et al. Using redundancy to cope with failures in a delay tolerant network , 2005, SIGCOMM '05.
[195] Vinton G. Cerf,et al. Delay-Tolerant Networking Architecture , 2007, RFC.
[196] Pan Hui,et al. Haggle: A networking architecture designed around mobile users , 2006 .
[197] Gabriel Montenegro,et al. Crypto-based identifiers (CBIDs): Concepts and applications , 2004, TSEC.
[198] The Design of Cities , 1989 .
[199] Anders Lindgren,et al. Impact of communication infrastructure on forwarding in pocket switched networks , 2006, CHANTS '06.
[200] Stephen E. Deering,et al. Host extensions for IP multicasting , 1986, Request for Comments.
[201] Jianping Wang,et al. Programming Overlay Networks with Overlay Sockets , 2003, Networked Group Communication.
[202] Anders Lindgren,et al. Phase Transitions of Opportunistic Communications , 2008, MobiCom 2008.
[203] Christophe Diot,et al. Deployment issues for the IP multicast service and architecture , 2000, IEEE Netw..
[204] Ram Ramanathan,et al. Tracking Highly Mobile Endpoints , 2001, WOWMOM '01.
[205] Andrei Gurtov. Host Identity Protocol (HIP): Towards the Secure Mobile Internet , 2008 .
[206] Stephen E. Deering,et al. Internet Protocol, Version 6 (IPv6) Specification , 1995, RFC.
[207] Antony I. T. Rowstron,et al. Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.
[208] Henning Schulzrinne,et al. An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol , 2004, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[209] Leandros Tassiulas,et al. Throughput capacity of random ad hoc networks with infrastructure support , 2003, MobiCom '03.
[210] Martina Zitterbart,et al. ariba: Rahmenwerk für Overlay-basierte Dienste , 2011, PIK Prax. Informationsverarbeitung Kommun..
[211] E. Jones. Routing Strategies for Delay-Tolerant Networks , 2006 .
[212] Hagit Attiya,et al. Wiley Series on Parallel and Distributed Computing , 2004, SCADA Security: Machine Learning Concepts for Intrusion Detection and Prevention.
[213] Christoph P. Mayer,et al. User-Perceived Performance of the NICE Application Layer Multicast Protocol in Large and Highly Dynamic Groups , 2010, MMB/DFT.
[214] Panganamala Ramana Kumar,et al. Capacity bounds for ad hoc and hybrid wireless networks , 2004, CCRV.
[215] Jörg Ott,et al. Time scales and delay-tolerant routing protocols , 2008, CHANTS '08.
[216] Inwhee Joe,et al. A Message Priority Routing Protocol for Delay Tolerant Networks (DTN) in Disaster Areas , 2010, FGIT.
[217] M. Penrose. The longest edge of the random minimal spanning tree , 1997 .
[218] Michael Roe,et al. Child-proof authentication for MIPv6 (CAM) , 2001, CCRV.
[219] Kang-Won Lee,et al. Scaling properties of delay tolerant networks with correlated motion patterns , 2009, CHANTS '09.