Exploiting Social Ties for Cooperative D2D Communications: A Mobile Social Networking Case
暂无分享,去创建一个
Xu Chen | Junshan Zhang | Xiaowen Gong | Brian Proulx | Junshan Zhang | Xiaowen Gong | Brian Proulx | Xu Chen
[1] Guanding Yu,et al. A distributed relay selection method for relay assisted Device-to-Device communication system , 2012, 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC).
[2] Sheng Zhong,et al. Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[3] R. Srikant,et al. Achieving cooperation in multihop wireless networks of selfish nodes , 2006, GameNets '06.
[4] Ravi S. Sandhu,et al. Social-Networks Connect Services , 2010, Computer.
[5] Cong Xiong,et al. Energy-efficient wireless communications: tutorial, survey, and open issues , 2011, IEEE Wireless Communications.
[6] S H Strogatz,et al. Random graph models of social networks , 2002, Proceedings of the National Academy of Sciences of the United States of America.
[7] Anand Srinivasan,et al. Efficient resource allocation for device-to-device communication underlaying LTE network , 2010, 2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications.
[8] Aravind Srinivasan,et al. Mobile Data Offloading through Opportunistic Communications and Social Participation , 2012, IEEE Transactions on Mobile Computing.
[9] Sanjay Kumar Madria,et al. Dynamic social grouping based routing in a Mobile Ad-Hoc network , 2010, 2010 International Conference on High Performance Computing.
[10] Roger B. Myerson,et al. Game theory - Analysis of Conflict , 1991 .
[11] Olav Tirkkonen,et al. On the Performance of Device-to-Device Underlay Communication with Simple Power Control , 2009, VTC Spring 2009 - IEEE 69th Vehicular Technology Conference.
[12] Theodore S. Rappaport,et al. Wireless communications - principles and practice , 1996 .
[13] C.-H. Yu,et al. Power Optimization of Device-to-Device Communication Underlaying Cellular Communication , 2009, 2009 IEEE International Conference on Communications.
[14] Guanhua Yan,et al. Privacy-Preserving Profile Matching for Proximity-Based Mobile Social Networking , 2013, IEEE Journal on Selected Areas in Communications.
[15] Dawn Xiaodong Song,et al. Privacy-Preserving Set Operations , 2005, CRYPTO.
[16] Raviraj S. Adve,et al. Improving amplify-and-forward relay networks: optimal power allocation versus selection , 2006, IEEE Transactions on Wireless Communications.
[17] Donghoon Lee,et al. Performance of multihop decode-and-forward relaying assisted device-to-device communication underlaying cellular networks , 2012, 2012 International Symposium on Information Theory and its Applications.
[18] V. Koivunen,et al. Interference-avoiding MIMO schemes for device-to-device radio underlaying cellular networks , 2009, 2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications.
[19] H. Gintis. Strong reciprocity and human sociality. , 2000, Journal of theoretical biology.
[20] Cecilia Mascolo,et al. Socially-aware routing for publish-subscribe in delay-tolerant mobile ad hoc networks , 2008, IEEE Journal on Selected Areas in Communications.
[21] K. J. Ray Liu,et al. Cooperation stimulation in cooperative communications: An indirect reciprocity game , 2012, 2012 IEEE International Conference on Communications (ICC).
[22] Pan Hui,et al. BUBBLE Rap: Social-Based Forwarding in Delay-Tolerant Networks , 2008, IEEE Transactions on Mobile Computing.
[23] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[24] Xiaohui Liang,et al. Morality-Driven Data Forwarding With Privacy Preservation in Mobile Social Networks , 2012, IEEE Transactions on Vehicular Technology.
[25] Tao Deng,et al. System Architecture for a Cellular Network with Cooperative Mobile Relay , 2011, 2011 IEEE Vehicular Technology Conference (VTC Fall).
[26] Dusit Niyato,et al. Applications, Architectures, and Protocol Design Issues for Mobile Social Networks: A Survey , 2011, Proceedings of the IEEE.
[27] Ming Li,et al. FindU: Privacy-preserving personal profile matching in mobile social networks , 2011, 2011 Proceedings IEEE INFOCOM.
[28] L. Shapley,et al. On cores and indivisibility , 1974 .
[29] Brian,et al. VENETA: Serverless Friend-of-Friend Detection in Mobile Social Networking , 2008 .
[30] Qinghua Li,et al. Multicasting in delay tolerant networks: a social network perspective , 2009, MobiHoc '09.
[31] Michael J. Neely. Optimal pricing in a free market wireless network , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[32] Peter Marbach,et al. Cooperation in wireless ad hoc networks: a market-based approach , 2005, IEEE/ACM Transactions on Networking.
[33] Tayfun Sönmez,et al. Core in a simple coalition formation game , 2001, Soc. Choice Welf..
[34] Anders Høst-Madsen,et al. Capacity bounds and power allocation for wireless relay channels , 2005, IEEE Transactions on Information Theory.
[35] C. R. Snyder,et al. Social Cognitive Psychology: History and Current Domains , 1997 .
[36] Xu Chen,et al. Social trust and social reciprocity based cooperative D2D communications , 2013, MobiHoc.
[37] Marco Conti,et al. ContentPlace: social-aware data dissemination in opportunistic networks , 2008, MSWiM '08.
[38] Guanhua Yan,et al. Fine-grained private matching for proximity-based mobile social networking , 2012, 2012 Proceedings IEEE INFOCOM.
[39] Stefan Parkvall,et al. Design aspects of network assisted device-to-device communications , 2012, IEEE Communications Magazine.
[40] T. Govier. Social trust and human communities , 1997 .