Computer Science ›› 2014, Vol. 41 ›› Issue (10): 191-195.doi: 10.11896/j.issn.1002-137X.2014.10.042
Previous Articles Next Articles
CAO Xiao-mei and YIN Ying
[1] 熊永平,孙利民,牛建伟,等.机会网络[J].软件学报,2009,0(1):124-137 [2] Grossglauser M,Tse D.Mobility increases the capacity of ad-hoc wireless networks[C]∥Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies(INFOCOM 2001).2001,3:1360-1369 [3] Spyropoulos T,Psounis K,Raghavendra C S,et al.Single-copyrouting in intermittently connected mobile networks[C]∥2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks,2004(IEEE SECON 2004).IEEE,2004:235-244 [4] LeBrun J,Chuah C N,Ghosal D,et al.Knowledge-based opportunistic forwarding in vehicular wireless ad hoc networks[C]∥Vehicular technology conference,2005.VTC 2005-Spring.2005 IEEE 61st.IEEE,2005,4:2289-2293 [5] Jones E P C,Li L,Schmidtke J K,et al.Practical routing in delay-tolerant networks[J].IEEE Transactions on Mobile Computing,2007,6(8):943-959 [6] 李东生,杨志义,郭斌,等.基于机会网络的社会性活动组织研究[J].计算机科学,2013,40(2):35-39 [7] Hui P,Crowcroft J,Yoneki E.Bubble rap:Social-based forwarding in delay-tolerant networks[J].IEEE Transactions on Mobile Computing,2011,10(11):1576-1589 [8] Boldrini C,Conti M,Jacopini J,et al.Hibop:a history based routing protocol for opportunistic networks[C]∥ IEEE International Symposium on World of Wireless,Mobile and Multimedia Networks,2007(WoWMoM 2007). IEEE,2007:1-12 [9] Lindgren A,Doria A,Schelén O.Probabilistic routing in intermittently connected networks[J].ACM SIGMOBILE Mobile Computing and Communications Review,2003,7(3):19-20 [10] Seth A,Keshav S.Practical security for disconnected nodes[C]∥1st IEEE ICNP Workshop on Secure Network Protocols,2005(NPSec).IEEE,2005:31-36 [11] Kate A,Zaverucha G M,Hengartner U.Anonymity and security in delay tolerant networks[C]∥Third International Conference on Security and Privacy in Communications Networks and the Workshops,2007(SecureComm 2007).IEEE,2007:504-513 [12] Shikfa A,Onen M,Molva R.Privacy in context-based and epidemic forwarding[C]∥IEEE International Symposium on a World of Wireless,Mobile and Multimedia Networks & Workshops,2009(WoWMoM 2009).IEEE,2009:1-7 [13] Trifunovic S,Legendre F.Trust in Opportunistic Networks[J].2009 [14] Kernen A,Ott J,Krkkinen T.The ONE simulator for DTN protocol evaluation[C]∥Proceedings of the 2nd International Conference on Simulation Tools and Techniques,ICST (Institute for Computer Sciences,Social-Informatics and Telecommunications Engineering).2009:55 |
No related articles found! |
|