|
|
|
Mohd-Yaseen Mir, Hengbing Zhu and Chih-Lin Hu
Opportunistic ad hoc networks are characterized by intermittent and infrastructure-less connectivity among mobile nodes. Because of the lack of up-to-date network topology information and frequent link failures, geographic routing utilizes location infor...
ver más
|
|
|
|
|
|
|
Stylianos S. Mamais and George Theodorakopoulos
Online Behavioural Advertising (OBA) enables promotion companies to effectively target users with ads that best satisfy their purchasing needs. This is highly beneficial for both vendors and publishers who are the owners of the advertising platforms, suc...
ver más
|
|
|
|
|
|
|
Stylianos S. Mamais and George Theodorakopoulos
Online Behavioural Advertising (OBA) enables promotion companies to effectively target users with ads that best satisfy their purchasing needs. This is highly beneficial for both vendors and publishers who are the owners of the advertising platforms, suc...
ver más
|
|
|
|
|
|
|
Mei Guo and Min Xiao
Recently, with the development of big data and 5G networks, the number of intelligent mobile devices has increased dramatically, therefore the data that needs to be transmitted and processed in the networks has grown exponentially. It is difficult for th...
ver más
|
|
|
|
|
|
|
Azizah Assiri and Hassen Sallay
Opportunistic mobile social networks (OMSNs) have become increasingly popular in recent years due to the rise of social media and smartphones. However, message forwarding and sharing social information through intermediary nodes on OMSNs raises privacy c...
ver más
|
|
|
|
|
|
|
Miguel Ángel Martín-Pascual and Celia Andreu-Sánchez
Opportunistic networks allow for communication between nearby mobile devices through a radio connection, avoiding the need for cellular data coverage or a Wi-Fi connection. The limited spatial range of this type of communication can be overcome by using ...
ver más
|
|
|
|
|
|
|
Peiyan Yuan, Xiaoxiao Pang, Ping Liu and En Zhang
The performance of mobile opportunistic networks mainly relies on collaboration among nodes. Thus far, researchers have ignored the influence of node sociality on the incentive process, leading to poor network performance. Considering the fact that follo...
ver más
|
|
|
|
|
|
|
Feng Zeng, Yueyue Dou, Zhigang Chen and Hui Liu
In opportunistic mobile networks (OppNets), nodes should be in listening state to discover the neighbors for opportunistic message forwarding. While in OppNets, contacts between nodes are sparse, most of the node?s energy is consumed in idle listening st...
ver más
|
|
|
|
|
|
|
Feng Zeng, Yueyue Dou, Zhigang Chen and Hui Liu
-
|
|
|
|
|
|
|
Lige Ge and Shengming Jiang
Nautical wireless ad hoc networks are becoming increasingly popular in oceans due to their easy deployment and self-curing capability. They may alternate frequently between connected mobile ad hoc networks and partitioned opportunistic networks due to mo...
ver más
|
|
|
|
|
|
|
Bangyuan Chen and Lingna Chen
Opportunistic networks are considered as the promising network structures to implement traditional and typical infrastructure-based communication by enabling smart mobile devices in the networks to contact with each other within a fixed communication are...
ver más
|
|
|
|
|
|
|
Bambang Soelistijanto and Vittalis Ayu
Mobile social networks suffer from an unbalanced traffic load distribution due to the heterogeneity in mobility of nodes (humans) in the network. A few nodes in these networks are highly mobile, and the proposed social-based routing algorithms are likely...
ver más
|
|
|
|
|
|
|
Jorge Visca and Javier Baliosian
Opportunistic networks are highly stochastic networks supported by sporadic encounters between mobile devices. To route data efficiently, opportunistic-routing algorithms must capitalize on devices? movement and data transmission patterns. This work prop...
ver más
|
|
|
|
|
|
|
Kanghuai Liu, Zhigang Chen, Jia Wu, Yutong Xiao and Heng Zhang
In the social scene of opportunistic networks, message applications find suitable relay nodes or certain transmission destinations from the surrounding neighbors through specific network addresses of users. However, at the dawn of big data and 5G network...
ver más
|
|
|
|
|
|
|
Kanghuai Liu, Zhigang Chen, Jia Wu, Yutong Xiao and Heng Zhang
In the social scene of opportunistic networks, message applications find suitable relay nodes or certain transmission destinations from the surrounding neighbors through specific network addresses of users. However, at the dawn of big data and 5G network...
ver más
|
|
|
|
|
|
|
Peiyan Yuan, Xiaoxiao Pang and Xiaoyan Zhao
Mobile edge computing is a new communication paradigm, which stores content close to the end users, so as to reduce the backhaul delay and alleviate the traffic load of the backbone networks. Crowd participation is one of the most striking features of th...
ver más
|
|
|
|
|
|
|
Peiyan Yuan, Xiaoxiao Pang and Xiaoyan Zhao
Mobile edge computing is a new communication paradigm, which stores content close to the end users, so as to reduce the backhaul delay and alleviate the traffic load of the backbone networks. Crowd participation is one of the most striking features of th...
ver más
|
|
|
|
|
|
|
Bing Su and Jiwu Liang
With the innovation of wireless communication technology and the surge of data in mobile networks, traditional routing strategies need to be improved. Given the shortcomings of existing opportunistic routing strategies in transmission performance and sec...
ver más
|
|
|
|
|
|
|
Stylianos S. Mamais and George Theodorakopoulos
Service commissions, which are claimed by Ad-Networks and Publishers, are susceptible to forgery as non-human operators are able to artificially create fictitious traffic on digital platforms for the purpose of committing financial fraud. This places a s...
ver más
|
|
|
|
|
|
|
Stylianos S. Mamais and George Theodorakopoulos
Service commissions, which are claimed by Ad-Networks and Publishers, are susceptible to forgery as non-human operators are able to artificially create fictitious traffic on digital platforms for the purpose of committing financial fraud. This places a s...
ver más
|
|
|
|