نتایج جستجو برای: opportunistic
تعداد نتایج: 20666 فیلتر نتایج به سال:
Opportunistic networks are challenging types of networks where network connections are imminent. Network topologies are dynamic and can rapidly change. A path between a source node and a destination node may or may not exist, the network can be disconnected. This type of behavior observed under opportunistic networks makes classical networking solutions impractical. Thus, traditional routing al...
—Opportunistic networks exploit human mobility and consequent device-to-device contacts to opportunistically create data paths over time. Identifying influential nodes as relay is a crucial problem for efficient routing in opportunistic networks. The degree centrality method is very simple but of little relevance. Although closeness centrality and betweenness centrality can effectively identif...
As wireless and 3G networks become more crowded, users with mobile devices have difficulties in accessing the network. Opportunistic networks, created between mobile phones using local peer-topeer connections, have the potential to solve such problems by dispersing some of the traffic to neighboring smartphones. Recently various opportunistic routing or dissemination algorithms were proposed an...
This paper describes a framework for simulating opportunistic routing protocols in the INETMANET framework of OMNeT++. The proposed modules adopt an abstraction of the generic functions of the most representative opportunistic routing algorithms. The main contribution is an OMNeT++ modeling architecture that could be extended to implement different opportunistic routing schemes. Our work provid...
Academic researchers have attributed significant attention to the drivers of opportunistic behavior, yet our understanding of how opportunistic behavior can be mitigated remains relatively fragmented. Our investigation will focus on the social context and more specifically on the role of social capital in the deterrence of opportunistic behavior. Based on two qualitative case studies in the fin...
We present a study exploring the promise of developing computational systems to support the discovery and execution of opportunistic activities in mobile settings. We introduce the challenge of mobile opportunistic planning, describe a prototype named Mobile Commodities, and focus on the construction and use of probabilistic user models to infer the cost of time required to execute opportunisti...
Providing connectivity in scenarios where nodes present a very dynamic behavior is quite challenging due to resulting link intermittency among user devices. In such a challenged scenario, opportunistic contacts can be used to perform data forwarding. Moreover, as these moving nodes are carried by humans, taking into account the users' interests, social relationships, and mobility behavior may p...
We investigate an important interaction that can take place in a ubiquitous computing environment, that of opportunistic browsing, a form of information gathering on the fly. Opportunistic browsing is characterised by being ubiquitous, unintentional and effortless. In this paper, we clarify the concept of opportunistic browsing and place it within a cognitive framework. We further discuss the n...
OBJECTIVE Although antiretroviral treatment (ART) has reduced the incidence of HIV-related opportunistic infections among children living with HIV, access to ART remains limited for children, especially in resource-limited settings. This paper reviews current knowledge on the contribution of opportunistic infections and common childhood illnesses to morbidity and mortality in children living wi...
This paper introduces a new game-theoretic framework and algorithms for addressing opportunistic crime. Stackelberg Security Game (SSG), focused on highly strategic and resourceful adversaries, has become an important computational framework within multiagent systems. Unfortunately, SSG is ill-suited as a framework for handling opportunistic crimes, which are committed by criminals who are less...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید