نتایج جستجو برای: opportunistic

تعداد نتایج: 20666  

2013
Tamer Dag

Opportunistic networks are challenging types of networks where network connections are imminent. Network topologies are dynamic and can rapidly change. A path between a source node and a destination node may or may not exist, the network can be disconnected. This type of behavior observed under opportunistic networks makes classical networking solutions impractical. Thus, traditional routing al...

Journal: :JCM 2015
Zhenxiang Gao Yan Shi Shanzhi Chen

—Opportunistic networks exploit human mobility and consequent device-to-device contacts to opportunistically create data paths over time. Identifying influential nodes as relay is a crucial problem for efficient routing in opportunistic networks. The degree centrality method is very simple but of little relevance. Although closeness centrality and betweenness centrality can effectively identif...

2012
Radu-Ioan Ciobanu Ciprian Dobre Valentin Cristea

As wireless and 3G networks become more crowded, users with mobile devices have difficulties in accessing the network. Opportunistic networks, created between mobile phones using local peer-topeer connections, have the potential to solve such problems by dispersing some of the traffic to neighboring smartphones. Recently various opportunistic routing or dissemination algorithms were proposed an...

2011
Zhongliang Zhao Torsten Braun

This paper describes a framework for simulating opportunistic routing protocols in the INETMANET framework of OMNeT++. The proposed modules adopt an abstraction of the generic functions of the most representative opportunistic routing algorithms. The main contribution is an OMNeT++ modeling architecture that could be extended to implement different opportunistic routing schemes. Our work provid...

Journal: :JIT 2015
Eleni Lioliou Angelika Zimmermann

Academic researchers have attributed significant attention to the drivers of opportunistic behavior, yet our understanding of how opportunistic behavior can be mitigated remains relatively fragmented. Our investigation will focus on the social context and more specifically on the role of social capital in the deterrence of opportunistic behavior. Based on two qualitative case studies in the fin...

2007
Eric Horvitz Paul Koch Muru Subramani

We present a study exploring the promise of developing computational systems to support the discovery and execution of opportunistic activities in mobile settings. We introduce the challenge of mobile opportunistic planning, describe a prototype named Mobile Commodities, and focus on the construction and use of probabilistic user models to infer the cost of time required to execute opportunisti...

2015
Waldir Moreira Paulo Mendes

Providing connectivity in scenarios where nodes present a very dynamic behavior is quite challenging due to resulting link intermittency among user devices. In such a challenged scenario, opportunistic contacts can be used to perform data forwarding. Moreover, as these moving nodes are carried by humans, taking into account the users' interests, social relationships, and mobility behavior may p...

2001
Oscar de Bruijn Robert Spence

We investigate an important interaction that can take place in a ubiquitous computing environment, that of opportunistic browsing, a form of information gathering on the fly. Opportunistic browsing is characterised by being ubiquitous, unintentional and effortless. In this paper, we clarify the concept of opportunistic browsing and place it within a cognitive framework. We further discuss the n...

Journal: :AIDS 2013
Surbhi Modi Alex Chiu Bernadette Ng'eno Scott E Kellerman Nandita Sugandhi Lulu Muhe

OBJECTIVE Although antiretroviral treatment (ART) has reduced the incidence of HIV-related opportunistic infections among children living with HIV, access to ART remains limited for children, especially in resource-limited settings. This paper reviews current knowledge on the contribution of opportunistic infections and common childhood illnesses to morbidity and mortality in children living wi...

2014
Chao Zhang Albert Xin Jiang Martin B. Short P. Jeffrey Brantingham Milind Tambe

This paper introduces a new game-theoretic framework and algorithms for addressing opportunistic crime. Stackelberg Security Game (SSG), focused on highly strategic and resourceful adversaries, has become an important computational framework within multiagent systems. Unfortunately, SSG is ill-suited as a framework for handling opportunistic crimes, which are committed by criminals who are less...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید