Since mobile devices nowadays have become ubiquitous, several types of networks formed over such devices have been proposed. One such approach is represented by opportunistic networking, which is based on a store-carry-and-forward paradigm, where nodes store data and carry it until they reach a suitable node for forwarding. The problem in such networks is how to decide what the next hop will be, since nodes do not have a global view of the network. We propose using the social network information of a node when performing routing, since a node is more likely to encounter members of its own social community than other nodes. In addition, we approximate a node's contact as a Poisson distribution and show that we can predict its future behavior...
In opportunistic mobile social networks, nodes are clustered according to their interests or hobbies...
Opportunistic routing protocols can enable message delivery in disconnected networks of mobile devic...
Recently, social-based approaches, which attempt to exploit the social behavior of mobile nodes to g...
When the connection to Internet is not available during networking activities, an opportunistic appr...
When the connection to Internet is not available during networking activities, an opportunistic appr...
When the connection to Internet is not available during networking activities, an opportunistic appr...
When the connection to Internet is not available during networking activities, an opportunistic appr...
There are contexts where TCP/IP is not suitable for performing data transmission due to long delays,...
Opportunistic routing protocols can enable message delivery in disconnected networks of mobile devic...
Opportunistic routing protocols can enable message delivery in disconnected networks of mobile devic...
Opportunistic networking is employed in scenarios where end-to-end communication paths between nodes...
Social opportunistic networks (SONs) are intermittently-connected networks that exploit unpredictabl...
Social opportunistic networks (SONs) are intermittently-connected networks that exploit unpredictabl...
Mobile, delay-tolerant, ad hoc and pocket-switched networks may form an important part of future ubi...
Social opportunistic networks are intermittently connected mobile ad hoc networks (ICNs) that exploi...
In opportunistic mobile social networks, nodes are clustered according to their interests or hobbies...
Opportunistic routing protocols can enable message delivery in disconnected networks of mobile devic...
Recently, social-based approaches, which attempt to exploit the social behavior of mobile nodes to g...
When the connection to Internet is not available during networking activities, an opportunistic appr...
When the connection to Internet is not available during networking activities, an opportunistic appr...
When the connection to Internet is not available during networking activities, an opportunistic appr...
When the connection to Internet is not available during networking activities, an opportunistic appr...
There are contexts where TCP/IP is not suitable for performing data transmission due to long delays,...
Opportunistic routing protocols can enable message delivery in disconnected networks of mobile devic...
Opportunistic routing protocols can enable message delivery in disconnected networks of mobile devic...
Opportunistic networking is employed in scenarios where end-to-end communication paths between nodes...
Social opportunistic networks (SONs) are intermittently-connected networks that exploit unpredictabl...
Social opportunistic networks (SONs) are intermittently-connected networks that exploit unpredictabl...
Mobile, delay-tolerant, ad hoc and pocket-switched networks may form an important part of future ubi...
Social opportunistic networks are intermittently connected mobile ad hoc networks (ICNs) that exploi...
In opportunistic mobile social networks, nodes are clustered according to their interests or hobbies...
Opportunistic routing protocols can enable message delivery in disconnected networks of mobile devic...
Recently, social-based approaches, which attempt to exploit the social behavior of mobile nodes to g...