Abstract—In this paper, an up-and-down routing protocol is proposed for mobile opportunistic social networks, which exhibit a nested core-periphery structure. In such a network, a few active nodes with large weighted degrees form the network core, while the network peripheries are composed of many inactive nodes with small weighted degrees. By nested, it means that the core-periphery structure is preserved, when periphery nodes are removed. Based on this structure, a message can be uploaded from the source to the network core, through iteratively forwarding the message to a relay that has a higher position in the nested network hierarchy. Then, space-efficient Bloom-filter-based hints are introduced to provide guidance for downloading messa...
In Mobile Social Networks (MSNs), the single-path rout-ing might not have enough of a chance to tran...
AbstractThe role of opportunistic networks can be crucial in data transmission. Here message forward...
Due to copyright restrictions, the access to the full text of this article is only available via sub...
In opportunistic mobile social networks, nodes are clustered according to their interests or hobbies...
With the recent technical advances and popularization of smartphones, which are able to store, displ...
Opportunistic routing protocols can enable message delivery in disconnected networks of mobile devic...
With the advancement in communication technologies and the widespread availability of mobile devices...
In the social scene of opportunistic networks, message applications find suitable relay nodes or cer...
An Opportunistic Network (OppNet) is a new paradigm of the Delay Tolerant Network (DTN). The dynamic...
in this paper, we propose to leverage social graphs from Online Social Networks (OSN) to improve the...
Since mobile devices nowadays have become ubiquitous, several types of networks formed over such dev...
Abstract—In this paper, an opportunistic multi-copy two-hop routing algorithm is proposed for mobile...
Opportunistic routing protocols can enable message delivery in disconnected networks of mobile devic...
In opportunistic networks, the nodes usually exploit a con-tact opportunity to perform hop-by-hop ro...
In this paper, an opportunistic multi-copy two-hop routing algorithm is proposed for mobile social n...
In Mobile Social Networks (MSNs), the single-path rout-ing might not have enough of a chance to tran...
AbstractThe role of opportunistic networks can be crucial in data transmission. Here message forward...
Due to copyright restrictions, the access to the full text of this article is only available via sub...
In opportunistic mobile social networks, nodes are clustered according to their interests or hobbies...
With the recent technical advances and popularization of smartphones, which are able to store, displ...
Opportunistic routing protocols can enable message delivery in disconnected networks of mobile devic...
With the advancement in communication technologies and the widespread availability of mobile devices...
In the social scene of opportunistic networks, message applications find suitable relay nodes or cer...
An Opportunistic Network (OppNet) is a new paradigm of the Delay Tolerant Network (DTN). The dynamic...
in this paper, we propose to leverage social graphs from Online Social Networks (OSN) to improve the...
Since mobile devices nowadays have become ubiquitous, several types of networks formed over such dev...
Abstract—In this paper, an opportunistic multi-copy two-hop routing algorithm is proposed for mobile...
Opportunistic routing protocols can enable message delivery in disconnected networks of mobile devic...
In opportunistic networks, the nodes usually exploit a con-tact opportunity to perform hop-by-hop ro...
In this paper, an opportunistic multi-copy two-hop routing algorithm is proposed for mobile social n...
In Mobile Social Networks (MSNs), the single-path rout-ing might not have enough of a chance to tran...
AbstractThe role of opportunistic networks can be crucial in data transmission. Here message forward...
Due to copyright restrictions, the access to the full text of this article is only available via sub...