Computer and Modernization ›› 2015, Vol. 0 ›› Issue (6): 101-104.doi: 10.3969/j.issn.1006-2475.2015.06.022
Previous Articles Next Articles
Received:
2015-02-12
Online:
2015-06-16
Published:
2015-06-18
CLC Number:
ZHOU Hong-jing. A Reliable Routing Algorithm Based on Probabilistic Delivery in Delay Tolerant Networks[J]. Computer and Modernization, 2015, 0(6): 101-104.
Add to citation manager EndNote|Ris|BibTeX
URL: http://www.c-a-m.org.cn/EN/10.3969/j.issn.1006-2475.2015.06.022
[1]Fall K. A delaytolerant network architecture for challenged Internets[C]// Proceedings of the ACM SIGCOMM 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication. 2003:27-34. [2] Ehsan S, Bradford K, Brugger M, et al. Design and analysis of delaytolerant sensor networks for monitoring and tracking free-roaming animals[J]. IEEE Transactions on Wireless Communications, 2012,11(3):1220-1227. [3] 刘唐,彭舰,杨进. 异构延迟容忍移动传感器网络中基于转发概率的数据传输[J]. 软件学报, 2013,24(2):215-229. [4] Fan Jianlu, Chen Jiming, Du Yuan, et al. Geocommunitybased broadcasting for data dissemination in mobile social networks[J]. IEEE Transactions on Parallel & Distributed Systems, 2013,24(4):734-743. [5] Wu Jie, Wang Yunsheng. Hypercubebased multipath social feature routing in human contact networks[J]. IEEE Transactions on Computers, 2014,63(2):383-396. [6] Sevimli K K, Soyturk M. Enabling delaytolerant communications for partially connected vehicular Ad Hoc networks[J]. International Journal of Ad Hoc and Ubiquitous Computing, 2012,11(4):157-168. [7] Bayir M A, Demirbas M. On the fly learning of mobility profiles for routing in pocket switched networks[J]. Ad Hoc Networks, 2014:13-27. [8] Vahdat A, Becker D. Epidemic routing for partially connected Ad Hoc networks[R]. DurhamNC: Department of Computer Science, DukeUniversity, 2000. [9] Lindgren A, Doria A, Schelen O. Probabilistic routing in intermittently connected networks[J]. Service Assurance with Partial and Intermittent Resources, 2004,3126:239-254. [10]Leguay J, Friedman T, Conan V. DTN routing in a mobility pattern space[C]// Proceedings of the 2005 ACM SIGCOMM Workshop on Delay-Tolerant Networking. 2005:276-283. [11]Wei Kaimin, Liang Xiao, Xu Ke. A survey of socialaware routing protocols in delay tolerant networks: Applications, taxonomy and designrelated issues[J]. IEEE Communicaitons Surveys & Tutorials, 2014,16(1):556-578. [12]Daly E, Haahr M. Social network analysis for routing in disconnected delaytolerant MANETs[C]// Proceedings of the 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc’07. 2007:32-40. [13]Pan Hui, Crowcroft J, Yoneki E. Bubble rap: Social-based forwarding in delay tolerant networks[J]. IEEE Transactions on Mobile Computing, 2010,10(11):1576-1589. [14]Abdelkader T, Naik K, Nayak A, et al. A sociallybased routing protocol for delay tolerant networks[C]// 2010 IEEE Global Telecommunications Conference(GLOBECOM 2010). 2010:1-5. [15]张振京,金志刚,舒炎泰. 基于节点运动预测的社会性DTN高效路由[J]. 计算机学报, 2013,36(3):626-635. [16]Grasic S, Davies E, Lindgren A, et al. The evolution of a DTN routing protocolPRoPHETv2[C]// Proceedings of the 6th ACM MobilCom Workshop on Challenged Networks. 2011:27-30. [17]Keranen A, Ott J, Karkkainen T. The ONE simulator for DTN protocol evaluation[C]// Proceedings of the 2nd International Conference on Simulation Tools and Techniques for Communications, Networks and Systems, SimuTools 2009. 2009:1-10. |
[1] | LYU Meijing1, NIAN Mei1, ZHANG Jun1, 2, FU Lusen1. Anomaly Detection of Network Traffic Based on Autoencoder [J]. Computer and Modernization, 2024, 0(12): 40-44. |
[2] | XIAO Junbi, QIU Yi. SDN Failure Detection and Recovery Scheme Based on State-aware Data Plane [J]. Computer and Modernization, 2024, 0(12): 116-123. |
[3] | ZHANG Tai1, YAN Zihao2, DUAN Jie2, ZHANG Zhihong2. Information Forwarding Strategy of Internet of Vehicles in Named Data Network [J]. Computer and Modernization, 2024, 0(11): 19-27. |
[4] | DONG Chongchong, ZHAO Cong, WU You, ZHANG Lei, ZHANG Jiawen, LI Zhihao. Zero-trust Dynamic Evaluation Method for IoT Terminals [J]. Computer and Modernization, 2024, 0(11): 41-45. |
[5] | WANG Cong1, YANG Wenjuan1, DING Xingwang2. An Aggregation Model of Historical Archive Resources Based on Multimodal#br# Information Fusion [J]. Computer and Modernization, 2024, 0(10): 120-126. |
[6] | MA Huiping1, LI Peng1, 2, HU Sujun1. Security Game Analysis Model of RFID System Based on Bayesian Attack Graph [J]. Computer and Modernization, 2024, 0(07): 93-99. |
[7] | ZHAO Wenbo1, XIANG Dong1, WANG Jiubin2, DENG Yuehui3, ZHANG Wei1, KANG Qian1, LI Yujie1. Infrared Image Segmentation of Electrical Equipment Based on Improved Slime Mould Algorithm and Tsallis Entropy [J]. Computer and Modernization, 2024, 0(06): 70-75. |
[8] | LI Shuang1, 2, YE Ning1, 2, XU Kang1, 2, WANG Su1, WANG Ruchuan1, 2. Edge Computing Unloading Method for Intelligent Elderly Care [J]. Computer and Modernization, 2024, 0(06): 95-102. |
[9] | SU Kaixuan . Network Intrusion Detection Based on Improved XGBoost Model [J]. Computer and Modernization, 2024, 0(06): 109-114. |
[10] | YUAN Hongwei1, CHANG Lijun1, HAO Jianhuan2, FAN Na2, WANG Chao2, LUO Chuang2, ZHANG Zehui2. Trajectory Interest Points Mining Based on Label Propagation and Privacy Protection [J]. Computer and Modernization, 2024, 0(05): 46-54. |
[11] | WANG Dongyue, LIU Hao. Multi-agent Genetic Algorithm Based Cloud Platform Anti-fake Data Injection Attack Method [J]. Computer and Modernization, 2024, 0(04): 21-26. |
[12] | YOU Jiajing1, 2, HE Yueshun1, HE Linlin1, ZHONG Hailong1, 2. Encryption Traffic Classification Method Based on AHP-CNN [J]. Computer and Modernization, 2024, 0(04): 83-87. |
[13] | ZHU Yong-shi, YANG Zi-yi, ZHAO Liang-ju, YAO Rui-chu. Volume-hiding Dynamic Encrypted Multi-maps [J]. Computer and Modernization, 0, (): 114-120. |
[14] | WANG Hong-jie, XU Sheng-chao, YANG Bo, MAO Ming-yang, JIANG Jin-ling. Automatic Arrangement Method of Cloud Network Security Service Chain Based on SRv6 Technology [J]. Computer and Modernization, 2024, 0(01): 1-5. |
[15] | HU Chong-jia, LIU Jin-zhou, FANG Li. Unsupervised Domain Adaptation for Outdoor Point Cloud Semantic Segmentation [J]. Computer and Modernization, 2024, 0(01): 74-79. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||