International audienceMost existing proposals in the area of disruption-tolerant networking rely on the binaryassertion that when two nodes are not in contact, they are necessarily in intercontact. Sucha monolithic notion is, in our opinion, too limitative. In this paper, we advocate the use of theneighborhood of a node beyond one hop to help design more efficient communication solutions.We provide a formal definition of j-vicinity and associated measures, namely j-contactand j-intercontact. These measures allow better understanding the proximity betweennodes as they are not restrained solely to the direct contact situation.Weobserve unexpectedbehaviors in j-contact distributions and point out their dependency on node density. Wealso observ...
Progress has been made in how to suppress epidemic spreading on temporal networks via blocking all c...
Neighbor discovery was initially conceived as a means to deal with energy issues at deployment, wher...
Abstract—Distance-bounding protocols allow devices to crypto-graphically verify the physical proximi...
International audienceWe relax the traditional definition of contact and intercontact times by bring...
The networking paradigm uses new information vectors consisting of human carried devices is known as...
International audienceSo far, efforts attempting to characterize the spa- tiotemporal nature of disr...
Abstract—Most disruption-tolerant networking (DTN) proto-cols available in the literature have focus...
International audienceMost disruption-tolerant networking protocols available have focused on mere c...
Poster at ACM MSWiM 2013International audienceModeling the dynamics of opportunistic networks genera...
Abstract—When studying and designing protocols for mobile opportunistic networks, most works conside...
Disruption tolerant networks (DTNs) consist of mobile devices that call each other opportunistically...
Summarization: Sensor networks are often used to perform monitoring tasks, such as animal and vehicl...
Sensor networks are often used to perform monitoring tasks, such as animal and vehicle tracking, or ...
We present an efficient distributed data structure, called the D-SPANNER, for maintaining proximity ...
Abstract—Is the temporal dimension alone sufficient to charac-terize contacts in opportunistic netwo...
Progress has been made in how to suppress epidemic spreading on temporal networks via blocking all c...
Neighbor discovery was initially conceived as a means to deal with energy issues at deployment, wher...
Abstract—Distance-bounding protocols allow devices to crypto-graphically verify the physical proximi...
International audienceWe relax the traditional definition of contact and intercontact times by bring...
The networking paradigm uses new information vectors consisting of human carried devices is known as...
International audienceSo far, efforts attempting to characterize the spa- tiotemporal nature of disr...
Abstract—Most disruption-tolerant networking (DTN) proto-cols available in the literature have focus...
International audienceMost disruption-tolerant networking protocols available have focused on mere c...
Poster at ACM MSWiM 2013International audienceModeling the dynamics of opportunistic networks genera...
Abstract—When studying and designing protocols for mobile opportunistic networks, most works conside...
Disruption tolerant networks (DTNs) consist of mobile devices that call each other opportunistically...
Summarization: Sensor networks are often used to perform monitoring tasks, such as animal and vehicl...
Sensor networks are often used to perform monitoring tasks, such as animal and vehicle tracking, or ...
We present an efficient distributed data structure, called the D-SPANNER, for maintaining proximity ...
Abstract—Is the temporal dimension alone sufficient to charac-terize contacts in opportunistic netwo...
Progress has been made in how to suppress epidemic spreading on temporal networks via blocking all c...
Neighbor discovery was initially conceived as a means to deal with energy issues at deployment, wher...
Abstract—Distance-bounding protocols allow devices to crypto-graphically verify the physical proximi...