Sciweavers

224 search results - page 40 / 45
» Routing Optimization for Nested Mobile Networks
Sort
View
CONEXT
2009
ACM
15 years 7 days ago
The age of impatience: optimal replication schemes for opportunistic networks
: We study mobile P2P content dissemination schemes which leverage the local dedicated caches provided by hand-held devices (e.g., smart-phones, PDAs) and opportunistic contacts be...
Joshua Reich, Augustin Chaintreau
JCM
2010
126views more  JCM 2010»
14 years 9 months ago
Adding Redundancy to Replication in Window-aware Delay-tolerant Routing
— This paper presents a resource-efficient protocol for opportunistic routing in delay-tolerant networks (DTN). First, our approach exploits the context of mobile nodes (speed, ...
Gabriel Sandulescu, Simin Nadjm-Tehrani
GECCO
2007
Springer
268views Optimization» more  GECCO 2007»
15 years 5 months ago
Vulnerability analysis and security framework (BeeSec) for nature inspired MANET routing protocols
Design, development and evaluation of adaptive, scalable, and power aware Bio/Nature inspired routing protocols has received a significant amount of attention in the recent past....
Nauman Mazhar, Muddassar Farooq
JNW
2008
71views more  JNW 2008»
14 years 11 months ago
Enhancement of Delivery of Warning Messages for Mobile Networks
Vehicle-to-vehicle (V2V) communication systems have been studied extensively in recent years by transportation experts worldwide. Such systems enable the transmission of warning me...
Chia-Sheng Tsai, Wun-Kai Du
INFOCOM
2010
IEEE
14 years 9 months ago
PeopleRank: Social Opportunistic Forwarding
— In opportunistic networks, end-to-end paths between two communicating nodes are rarely available. In such situations, the nodes might still copy and forward messages to nodes t...
Abderrahmen Mtibaa, Martin May, Christophe Diot, M...