Academic literature on the topic 'Mobile opportunistic networks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Mobile opportunistic networks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Mobile opportunistic networks"

1

Ciobanu, Radu Ioan, and Ciprian Dobre. "Opportunistic Networks." International Journal of Virtual Communities and Social Networking 5, no. 2 (2013): 11–26. http://dx.doi.org/10.4018/jvcsn.2013040102.

Full text
Abstract:
When mobile devices are unable to establish direct communication, or when communication should be offloaded to cope with large throughputs, mobile collaboration can be used to facilitate communication through opportunistic networks. These types of networks, formed when mobile devices communicate only using short-range transmission protocols, usually when users are close, can help applications still exchange data. Routes are built dynamically, since each mobile device is acting according to the store-carry-and-forward paradigm. Thus, contacts are seen as opportunities to move data towards the d
APA, Harvard, Vancouver, ISO, and other styles
2

Vidhya Lakshmi, Vimitha R., and Gireesh Kumar T. "Opportunistic mobile social networks: architecture, privacy, security issues and future directions." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 2 (2019): 1145. http://dx.doi.org/10.11591/ijece.v9i2.pp1145-1152.

Full text
Abstract:
Mobile Social Networks and its related applications have made a very great impact in the society. Many new technologies related to mobile social networking are booming rapidly now-a-days and yet to boom. One such upcoming technology is Opportunistic Mobile Social Networking. This technology allows mobile users to communicate and exchange data with each other without the use of Internet. This paper is about Opportunistic Mobile Social Networks, its architecture, issues and some future research directions. The architecture and issues of Opportunistic Mobile Social Networks are compared with that
APA, Harvard, Vancouver, ISO, and other styles
3

Patra, Tapas Kumar, and Albert Sunny. "Forwarding in Heterogeneous Mobile Opportunistic Networks." IEEE Communications Letters 22, no. 3 (2018): 626–29. http://dx.doi.org/10.1109/lcomm.2018.2790393.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Abouaroek, Musaeed, and Khaleel Ahmad. "Node Authentication Using NTRU Algorithm in Opportunistic Network." Scalable Computing: Practice and Experience 20, no. 1 (2019): 83–92. http://dx.doi.org/10.12694/scpe.v20i1.1481.

Full text
Abstract:
The demand for using wireless paradigms for performing various information and communication operations has been exploded. The opportunistic networks is a special type of delay tolerant networks proposed to operate in an emergency manner to facilitate mobile connectivity between the nodes when there is no connectivity. These emergencies are caused either by human-made or natural disasters. Opportunistic Networks depend on mobile phones and other mobile devices that carry wireless technology. This paper is an attempt to expand the opportunistic network through the authentication nodes. We propo
APA, Harvard, Vancouver, ISO, and other styles
5

Zhao, Yan, and Farzana Akter. "Adaptive Clustering Algorithm for IIoT Based Mobile Opportunistic Networks." Security and Communication Networks 2022 (May 6, 2022): 1–11. http://dx.doi.org/10.1155/2022/3872214.

Full text
Abstract:
The clustering algorithms play a crucial role for energy saving solutions in mobile opportunistic networks. If the selection of cluster head is made appropriately, then the energy can be consumed optimally. The existing clustering algorithms do not consider the optimal selection of the cluster head resulting in low survival rates and high energy consumption rates in nodes. The adaptive clustering is required in Industrial Internet of Things (IIoT) based sophisticated networks where seamless connectivity is imperative for rapid communication. In order to meet this research gap, an adaptive clus
APA, Harvard, Vancouver, ISO, and other styles
6

Yan, Yeqing, Zhigang Chen, Jia Wu, and Leilei Wang. "An Effective Data Transmission Algorithm Based on Social Relationships in Opportunistic Mobile Social Networks." Algorithms 11, no. 8 (2018): 125. http://dx.doi.org/10.3390/a11080125.

Full text
Abstract:
With the popularization of mobile communication equipment, human activities have an increasing impact on the structure of networks, and so the social characteristics of opportunistic networks become increasingly obvious. Opportunistic networks are increasingly used in social situations. However, existing routing algorithms are not suitable for opportunistic social networks, because traditional opportunistic network routing does not consider participation in human activities, which usually causes a high ratio of transmission delay and routing overhead. Therefore, this research proposes an effec
APA, Harvard, Vancouver, ISO, and other styles
7

Dash, Sanjit Kumar, Aiswaryalaxmi Pradhan, Sasmita Mishra, and Jibitesh Mishra. "Lightweight Opportunistic Mobile Data Offloading." International Journal of Mobile Devices, Wearable Technology, and Flexible Electronics 9, no. 1 (2018): 1–15. http://dx.doi.org/10.4018/ijmdwtfe.2018010101.

Full text
Abstract:
Current cellular networks are overloaded due to the increasing number of smartphones and demands for bandwidth-eager multimedia content. Upgrading the existing infrastructure of the cellular system is the most straight forward solution to meet the growing demand. Apart from this, offloading mobile data through Wi-Fi can be a feasible solution. Mobile offloading via Wi-Fi is the latest emerging trend in research and industry. In this article, the authors have proposed a framework for mobile data offloading for both cellular and Wi-Fi networks. The authors have introduced a daemon process-based
APA, Harvard, Vancouver, ISO, and other styles
8

Zhang, Junbao, Haojun Huang, Geyong Min, Wang Miao, and Dapeng Wu. "Social-Aware Routing in Mobile Opportunistic Networks." IEEE Wireless Communications 28, no. 2 (2021): 152–58. http://dx.doi.org/10.1109/mwc.001.2000189.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mtibaa, Abderrahmen. "Towards Node Cooperation in Mobile Opportunistic Networks." Qatar Foundation Annual Research Forum Proceedings, no. 2011 (November 2011): CSO12. http://dx.doi.org/10.5339/qfarf.2011.cso12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Li, He, Kaoru Ota, Mianxiong Dong, and Minyi Guo. "Mobile Crowdsensing in Software Defined Opportunistic Networks." IEEE Communications Magazine 55, no. 6 (2017): 140–45. http://dx.doi.org/10.1109/mcom.2017.1600719.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Mobile opportunistic networks"

1

Erramilli, Vijay. "Forewarding in Mobile Opportunistic Networks." Boston University Computer Science Department, 2009. https://hdl.handle.net/2144/1722.

Full text
Abstract:
Recent advances in processor speeds, mobile communications and battery life have enabled computers to evolve from completely wired to completely mobile. In the most extreme case, all nodes are mobile and communication takes place at available opportunities – using both traditional communication infrastructure as well as the mobility of intermediate nodes. These are mobile opportunistic networks. Data communication in such networks is a difficult problem, because of the dynamic underlying topology, the scarcity of network resources and the lack of global information. Establishing end-t
APA, Harvard, Vancouver, ISO, and other styles
2

Pietiläinen, Anna-Kaisa. "Opportunistic mobile social networks at work." Paris 6, 2010. http://www.theses.fr/2010PA066587.

Full text
Abstract:
Les réseaux mobiles opportunistes ad-hoc se forment lorsque des terminaux mobiles portés par des utilisateurs communiquent entre eux sans aucune infrastructure. Ils diffèrent ainsi des réseaux classiques comme Internet dont l'architecture suppose la disponibilité instantanée de chemins reliant les hôtes et dont les délais de propagation, et le taux de perte des paquets, sont faibles. Dans les réseaux opportunistes, la mobilité des individus induit de nombreuses déconnexions et de grandes variations des délais. Dans cette thèse nous adoptons une démarche expérimentale pour concevoir et analyser
APA, Harvard, Vancouver, ISO, and other styles
3

Heinemann, Andreas. "Collaboration in Opportunistic Networks." Phd thesis, Saarbrücken VDM Verlag Dr. Müller, 2007. http://tuprints.ulb.tu-darmstadt.de/834/1/heinemann07-diss.pdf.

Full text
Abstract:
Motivation. With the increasing integration of wireless short-range communication technologies (Bluetooth, 802.11b WiFi) into mobile devices, novel applications for spontaneous communication, interaction and collaboration are possible. We distinguish between active and passive collaboration. The devices help users become aware of each other and stimulate face-to-face conversation (active collaboration). Also, autonomous device communication for sharing information without user interaction is possible, i.e., devices pass information to other devices in their vicinity (passive collaboration). Bo
APA, Harvard, Vancouver, ISO, and other styles
4

Panidis, Panteleimon. "Middleware for Context-Aware Opportunistic Networks." Thesis, KTH, Kommunikationssystem, CoS, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-92261.

Full text
Abstract:
Mobile devices such as palmtops and cell phones are continuously increasing in capabilities and popularity. At the same time, due to their decreasing price they are becoming more and more attractive and available to the average customer. This has lead to the development of many new applications for such portable electronic devices. Mobile devices tend to have increasing local resources in terms of memory/storage and CPU [2]. Despite these improvements in hardware attributes, there are still limitations that characterize these portable devices and which have not improved as quickly as the incre
APA, Harvard, Vancouver, ISO, and other styles
5

Yang, Zhimin. "Opportunistic Computing in Wireless Networks." The Ohio State University, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=osu1267743144.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Huang, Rui. "Providing Location-Privacy in Opportunistic Mobile Social Networks." Thesis, Université d'Ottawa / University of Ottawa, 2018. http://hdl.handle.net/10393/37353.

Full text
Abstract:
Users face location-privacy risks when accessing Location-Based Services (LBSs) in an Opportunistic Mobile Social Networks (OMSNs). In order to protect the original requester's identity and location, we propose two location privacy obfuscation protocols utilizing social ties between users. The first one is called Multi-Hop Location-Privacy Protection (MHLPP) protocol. To increase chances of completing obfuscation operations, users detect and make contacts with one-hop or multi-hop neighbor friends in social networks. Encrypted obfuscation queries avoid users learning important information esp
APA, Harvard, Vancouver, ISO, and other styles
7

Zhang, Boying. "Large Scale Message Dissemination in Mobile Opportunistic Networks." The Ohio State University, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=osu1338398822.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kouyoumdjieva, Sylvia T. "System Design for Opportunistic Networks." Doctoral thesis, KTH, Kommunikationsnät, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-176479.

Full text
Abstract:
Device-to-device communication has been suggested as a complement to traditional cellular networks as a means of offloading cellular traffic. In this thesis we explore a solution for device-to-device communication based on opportunistic content distribution in a content-centric network. Communication opportunities arise as mobile nodes roam around in an area and occasionally enter in direct communication range with one another. We consider a node to be a pedestrian equipped with a mobile device and explore the properties of opportunistic communication in the context of content dissemination in
APA, Harvard, Vancouver, ISO, and other styles
9

Phe-Neau, Tiphaine. "Properties and Impact of Vicinity in Mobile Opportunistic Networks." Phd thesis, Université Pierre et Marie Curie - Paris VI, 2014. http://tel.archives-ouvertes.fr/tel-00957864.

Full text
Abstract:
The networking paradigm uses new information vectors consisting of human carried devices is known as disruption-tolerant networks (DTN) or opportunistic networks. We identify the binary assertion issue in DTN. We notice how most DTNs mainly analyze nodes that are in contact. So all nodes that are not in contact are in intercontact. Nevertheless, when two nodes are not in contact, this does not mean that they are topologically far away from one another. We propose a formal definition of vicinities in DTNs and study the new resulting contact/intercontact temporal characterization. Then, we exami
APA, Harvard, Vancouver, ISO, and other styles
10

Chen, Yuan. "Opportunistic Overlays: Efficient Content Delivery in Mobile Environments." Diss., Available online, Georgia Institute of Technology, 2005, 2005. http://etd.gatech.edu/theses/available/etd-04082005-002659/unrestricted/chen%5Fyuan%5F200505%5Fphd.pdf.

Full text
Abstract:
Thesis (Ph. D.)--Computing, Georgia Institute of Technology, 2005.<br>Riley, George, Committee Member ; Zhou, Dong, Committee Member ; Pu, Calton, Committee Member ; Ahamad, Mustaque, Committee Member ; Schwan, Karsten, Committee Chair. Vita. Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Mobile opportunistic networks"

1

Misra, Sudip, Barun Kumar Saha, and Sujata Pal. Opportunistic Mobile Networks. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-29031-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mobile opportunistic networks: Architectures, protocols and applications. CRC Press, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Machinery, Association for Computing, and International Conference on Mobile Systems, Applications and Services (5th : 2007 : San Juan, P.R.), eds. MobiOpp '07: Proceedings of the First International MobiSys Workshop on Mobile Opportunistic Networking : San Juan, Puerto Rico, June 11, 2007. Association for Computing Machinery, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Denko, Mieso K., ed. Mobile Opportunistic Networks. Auerbach Publications, 2016. http://dx.doi.org/10.1201/b10904.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Denko, Mieso K. Mobile Opportunistic Networks. Taylor & Francis Group, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Denko, Mieso K. Mobile Opportunistic Networks. Taylor & Francis Group, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wu, Jie, and Yunsheng Wang, eds. Opportunistic Mobile Social Networks. CRC Press, 2014. http://dx.doi.org/10.1201/b17231.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wu, Jie, and Yunsheng Wang. Opportunistic Mobile Social Networks. Taylor & Francis Group, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wu, Jie, and Yunsheng Wang. Opportunistic Mobile Social Networks. Taylor & Francis Group, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wu, Jie, and Yunsheng Wang. Opportunistic Mobile Social Networks. Taylor & Francis Group, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Mobile opportunistic networks"

1

Chen, Yuanzhu, Cheng Li, and Zehua Wang. "Opportunistic Routing in Mobile Networks." In Opportunistic Networks. CRC Press, 2021. http://dx.doi.org/10.1201/9781003132585-13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Iglesias, Carlos Borrego. "Mobile-Code-Based Opportunistic Networking." In Opportunistic Networks. CRC Press, 2021. http://dx.doi.org/10.1201/9781003132585-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Talukdar, Md Ibrahim, and Md Sharif Hossen. "Reactive and Proactive Routing Strategies in Mobile Ad Hoc Network." In Opportunistic Networks. CRC Press, 2021. http://dx.doi.org/10.1201/9781003132585-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mir, Mohd Yaseen, and Chih-Lin Hu. "Message Forwarding and Relay Selection Strategies in Mobile Opportunistic Networks." In Opportunistic Networks. CRC Press, 2021. http://dx.doi.org/10.1201/9781003132585-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Naznin, Rukhsana, and Md Sharif Hossen. "Performance Analysis of AODV and DSDV Routing Protocols in Mobile Ad Hoc Network Using OMNeT++." In Opportunistic Networks. CRC Press, 2021. http://dx.doi.org/10.1201/9781003132585-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lee, Kyunghan, Pan Hui, and Song Chong. "Mobility Models in Opportunistic Networks." In Mobile Ad Hoc Networking. John Wiley & Sons, Inc., 2013. http://dx.doi.org/10.1002/9781118511305.ch10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Boldrini, Chiara, and Andrea Passarella. "Data Dissemination in Opportunistic Networks." In Mobile Ad Hoc Networking. John Wiley & Sons, Inc., 2013. http://dx.doi.org/10.1002/9781118511305.ch12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mitra, Pramita, and Christian Poellabauer. "Opportunistic Routing in Mobile Ad Hoc Networks." In Routing in Opportunistic Networks. Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-3514-3_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Misra, Sudip, Barun Kumar Saha, and Sujata Pal. "Opportunistic Mobile Networks: Toward Reality." In Computer Communications and Networks. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-29031-7_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Goswami, Antriksh, Ruchir Gupta, and Gopal Sharan Parashari. "Infrastructure in Mobile Opportunistic Networks." In Emerging Wireless Communication and Network Technologies. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-0396-8_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Mobile opportunistic networks"

1

Jun Tao, Yifan Xu, Chengwei Tan, and Xiaoxiao Wang. "Location-aware opportunistic forwarding in mobile opportunistic networks." In 2015 IEEE Wireless Communications and Networking Conference (WCNC). IEEE, 2015. http://dx.doi.org/10.1109/wcnc.2015.7127749.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Xiong, Yongping, Limin Sun, Wenbo He, and Jian Ma. "Anycast routing in mobile opportunistic networks." In 2010 IEEE Symposium on Computers and Communications (ISCC). IEEE, 2010. http://dx.doi.org/10.1109/iscc.2010.5546790.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Visca, Jorge, Raul Fuentes, Ana R. Cavalli, and Javier Baliosian. "Opportunistic media sharing for mobile networks." In NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium. IEEE, 2016. http://dx.doi.org/10.1109/noms.2016.7502902.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lakkakorpi, Jani, Mikko Pitkänen, and Jörg Ott. "Adaptive routing in mobile opportunistic networks." In the 13th ACM international conference. ACM Press, 2010. http://dx.doi.org/10.1145/1868521.1868539.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chaintreau, Augustin, and Laurent Massoulie. "Phase Transition in Opportunistic Mobile Networks." In 2008 IEEE International Zurich Seminar on Communications (IZS). IEEE, 2008. http://dx.doi.org/10.1109/izs.2008.4497269.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Martyna, Jerzy. "Multicast modelling in mobile opportunistic networks." In 2014 9th International Symposium on Communication Systems, Networks & Digital Signal Processing (CSNDSP). IEEE, 2014. http://dx.doi.org/10.1109/csndsp.2014.6923832.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kosmides, Pavlos, and Lambros Lambrinos. "Intelligent Routing in Mobile Opportunistic Networks." In 2018 Global Information Infrastructure and Networking Symposium (GIIS). IEEE, 2018. http://dx.doi.org/10.1109/giis.2018.8635592.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chaintreau, Augustin, Abderrahmen Mtibaa, Laurent Massoulie, and Christophe Diot. "The diameter of opportunistic mobile networks." In the 2007 ACM CoNEXT conference. ACM Press, 2007. http://dx.doi.org/10.1145/1364654.1364670.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Leedham, James, and Thanassis Tiropanis. "Opportunistic social networks for academia." In 2011 Workshop on Mobile and Online Social Networks (MOSN). IEEE, 2011. http://dx.doi.org/10.1109/mosn.2011.6060785.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Tsolkas, Dimitris, Dionysis Xenakis, Nikos Passas, and Lazaros Merakos. "Opportunistic spectrum access over mobile WiMAX networks." In 2010 IEEE 15th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD). IEEE, 2010. http://dx.doi.org/10.1109/camad.2010.5686976.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!