Select All | Select None
You can now keep track of new articles from Ad Hoc Networks on your personalized homepage!
Thanks to advances in the computing capabilities and added functionalities of modern mobile devices, creating and consuming digital media on the move has never been so easy and popular. Most of the DTN routing protocols proposed in the literature to enable content sharing have been exploiting...
We tackle the problem of individuals being able to self-detect the encounter communities within which they periodically occur. This has widespread applicability, not least for future communication systems where content can be locally shared via wireless opportunistic networking when devices...
We report on a data-driven investigation aimed at understanding the dynamics of message spreading in a real-world dynamical network of human proximity. We use data collected by means of a proximity-sensing network of wearable sensors that we deployed at three different social gatherings,...
Context information can be used to streamline routing decisions in opportunistic networks. We propose a novel social context-based routing scheme that considers both the spatial and the temporal dimensions of the activity of mobile nodes to predict the mobility patterns of nodes based on the...
Existing routing algorithms for Delay Tolerant Networks (DTNs) assume that nodes are willing to forward packets for others. In the real world, however, most people are socially selfish ; i.e., they are willing to forward packets for nodes with whom they have social ties but not others, and such...
Through web sites such as Twitter, micro-blogging has shown a remarkable growth, demonstrating the human desire to share and consume information and knowledge. At the same time, the capabilities of mobile devices such as smart phones has considerably increased, opening up new ways to communicate...
In the last 10 years, new paradigms for wireless networks based on human mobility have gained the attention of the research community. These paradigms, usually referred to as Pocket Switched Networks or Delay Tolerant Networks , jointly exploit human mobility and store-and-forward communications...
Reputation models play an important role in defending Ad-hoc networks, such as securing routing and data forwarding protocols, against insider attacks. However, the performance of reputation models could be easily compromised by various dishonest recommendation attacks, i.e., slandering,...
results per page
Save this article to read later. You can see your Read Later on your DeepDyve homepage.
To save an article, log in first, or sign up for a DeepDyve account if you don't already have one.
Sign Up Log In
To subscribe to email alerts, please log in first, or sign up for a DeepDyve account if you don't already have one.
Read and print from thousands of top scholarly journals.
Sign up with Facebook
Sign up with Google
Already have an account? Log in
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don't already have one.