[1] Pirozmand P, Wu G, Jedari B, et al. Human mobility in opportunistic networks: Characteristics, models and prediction methods[J]. Journal of Network and Computer Applications,
2014,42:45-58.
[2] Biagioni E, Giordano S. Ad Hoc and sensor networks [Series Editorial][J]. IEEE Communications Magazine, 2015,53(1):248.
[3] Lin Yaguang, Wang Xiaoming, Zhang Lichen, et al. The impact of node velocity diversity on mobile opportunistic network performance[J]. Journal of Network and Computer
Applications, 2015,55:47-58.
[4] Pan Daru, Zhang Hui, Chen Weijing, et al. Transmission of multimedia contents in opportunistic networks with social selfish nodes[J]. Multimedia Systems, 2015,21
(3):277-288.
[5] Martin-Campillo A, Crowcroft J, Yoneki E, et al. Evaluating opportunistic networks in disaster scenarios[J]. Journal of Network and Computer Applications, 2013,36
(2):870-880.
[6] Punceva M, Rodero I, Parashar M, et al. Incentivising resource sharing in social clouds[J]. Concurrency and Computation: Practice and Experience, 2015,27
(6):1483-1497.
[7] Helmle S, Kuhn M, Pesch D, et al. Multi-hop link adaptation for emergency services narrowband mobile ad-hoc networks[C]// Proceedings of the 10th International ITG
Conference on Systems, Communications and Coding. 2015:1-6.
[8] Fujihara A, Miwa H. Disaster evacuation guidance using opportunistic communication: The potential for opportunity-based service[J]. Studies in Computational
Intelligence, 2014,546:425-446.
[9] Yuan Peiyan, Tang Shaojie. Community-based immunization in opportunistic social networks[J]. Physica A: Statistical Mechanics and its Applications, 2015,420:85-97.
[10]Ciobanu R, Marin R, Dobre C, et al. Interest-awareness in data dissemination for opportunistic networks[J]. Ad Hoc Networks, 2015,25:330-345.
[11]Wu Honghai, Ma Huadong, Zhao Dong. Videocent: A quality-oriented incentive mechanism for video delivery in opportunistic networks[J]. Wireless Networks, 2015,21
(3):769-781.
[12]Zhang X, Neglia G, Kurose J, et al. Performance modeling of epidemic routing[J]. Computer Networks, 2007,51(10):2867-2891.
[13]Zhang Sheng, Qian Zhuzhong, Wu Jie, et al. Virtual network embedding with opportunistic resource sharing[J]. IEEE Transactions on Parallel & Distributed Systems,
2014,25(3):816-827.
[14]Mohan S, Qu G, Mili F. Lecture Notes in Computer Science[M]. Springer Berlin Heidelberg, 2012:462-478.
[15]Wang Zhen, Wang Xinhua, Sui Jingqi. Extending research for ONE simulator of opportunistic network[J]. Application Research of Computers, 2012,29(1):272-277. |