Opportunistic networks utilize pocket switching for routing where each node forwards its messages to a suitable next node. The selection of the forwarder node is crucial for the efficient performance of a routing protocol. In any opportunistic network, some nodes have a paramount role in the routing process and these nodes could be identified with the assistance of the existing centrality measures available in network theory. However, the central nodes tend to suffer from congestion because a large number of nodes that are relatively less central attempt to forward their payload to the central nodes to increase the probability of the message delivery. This paper evaluates mechanisms to transform the social encounters into congestion aware m...
Since mobile devices nowadays have become ubiquitous, several types of networks formed over such dev...
Many scholars have tried to address the identification of critical nodes in complex networks from di...
The increasing penetration of smart devices with networking capability form novel networks. Such net...
Opportunistic networks utilize pocket switching for routing where each node forwards its messages to...
Opportunistic networks utilize pocket switching for routing where each node forwards its messages to...
Social opportunistic networks are intermittently connected mobile ad hoc networks (ICNs) that exploi...
Social opportunistic networks (SONs) are intermittently-connected networks that exploit unpredictabl...
Social opportunistic networks (SONs) are intermittently-connected networks that exploit unpredictabl...
In opportunistic networks, centrality characterizes a node's capability to act as a communication hu...
Abstract—In opportunistic networks, centrality characterizes a node’s capability to act as a communi...
Abstract—In opportunistic networks, centrality characterizes a node’s capability to act as a communi...
Quantitatively assessing the importance or criticality of each link in a network is of practical val...
Abstract—In an urban city, its transportation network sup-ports efficient flow of people between dif...
With the proliferation of high-end mobile devices that feature wireless interfaces, many promising a...
AbstractThe role of opportunistic networks can be crucial in data transmission. Here message forward...
Since mobile devices nowadays have become ubiquitous, several types of networks formed over such dev...
Many scholars have tried to address the identification of critical nodes in complex networks from di...
The increasing penetration of smart devices with networking capability form novel networks. Such net...
Opportunistic networks utilize pocket switching for routing where each node forwards its messages to...
Opportunistic networks utilize pocket switching for routing where each node forwards its messages to...
Social opportunistic networks are intermittently connected mobile ad hoc networks (ICNs) that exploi...
Social opportunistic networks (SONs) are intermittently-connected networks that exploit unpredictabl...
Social opportunistic networks (SONs) are intermittently-connected networks that exploit unpredictabl...
In opportunistic networks, centrality characterizes a node's capability to act as a communication hu...
Abstract—In opportunistic networks, centrality characterizes a node’s capability to act as a communi...
Abstract—In opportunistic networks, centrality characterizes a node’s capability to act as a communi...
Quantitatively assessing the importance or criticality of each link in a network is of practical val...
Abstract—In an urban city, its transportation network sup-ports efficient flow of people between dif...
With the proliferation of high-end mobile devices that feature wireless interfaces, many promising a...
AbstractThe role of opportunistic networks can be crucial in data transmission. Here message forward...
Since mobile devices nowadays have become ubiquitous, several types of networks formed over such dev...
Many scholars have tried to address the identification of critical nodes in complex networks from di...
The increasing penetration of smart devices with networking capability form novel networks. Such net...