Sunday, October 16, 2011

Socialnets Resources

[1] S. Tang, E. Jaho, I. Stavrakakis, I. Koukoutsidis, and P. Van Mieghem. Modeling gossip-based content dissemination and search in distributed p2p overlays. Computer Communications, 34(6):765-779, May 2011. [ bib ]
[2] E. Jaho, M. Karaliopoulos, and I. Stavrakakis. ISCoDe: a framework for interest similarity-based community detection in social networks. In Third International Workshop on Network Science for Communication Networks (INFOCOM-NetSciCom'11), Shanghai, China, 15 April 2011. [ bib ]
[3] Eleonora Borgia, Marco Conti, and Andrea Passarella. Autonomic detection of dynamic social communities in opportunistic networks. In MedHocNet 2011 (submitted), 2011. [ bib ]
[4] Marco Conti, Andrea Passarella, and Fabio Pezzoni. A model for the generation of social network graphs. In IEEE AOC 2011, 2011. [ bib ]
[5] Daniele Vilone and Andrea Guazzini. Social aggregation as a cooperative game. Physica A, ((to appear)), 2011. [ bib ]
[6] Ioannis Stavrakakis. Some distributed approaches to the service facility location problem in dynamic and complex networks. In My T. Thai and Panos Pardalos, editors, Handbook of Optimization in Complex Networks: Vol. 1 (Theory and Applications) and Vol. 2 (Communication and Social Networks). Springer, summer 2011. [ bib ]
[7] S.M. Allen, M.J. Chorley, G.B. Colombo, E. Jaho, M. Karaliopoulos, I. Stavrakakis, and R.M. Whitaker. Exploiting user interest similarity and social links for micro-blog forwarding in mobile opportunistic networks. Pervasive and Mobile Computing, ((submitted)), 2011. [ bib ]
[8] E. Jaho, I. Koukoutsidis, I. Stavrakakis, and I. Jaho. Cooperative content replication in networks with autonomic nodes. to IEEE Journal on Selected Areas in Communications - Special Issue Cooperative Networking Challenges and Applications, ((submitted)), 2011. [ bib ]
[9] Ioannis Stavrakakis. Relevance and cognition for pervasive computation at scale. In NSF Workshop on Pervasive Computing at Scale (PeCS). Univ. of Washington, Seattle, USA, January 2011. [ bib | .pdf ]
[10] R. Dunbar and A. Sutcliffe. Social complexity and intelligence. In J. Vonk and T. Shackleford, editors, Oxford Handbook of Comparative Evolutionary Psychology. Oxford University Press, 2011. [ bib ]
[11] R.I.M. Dunbar. Evolutionary basis of the social brain. In J. Decety and J. Cacioppo, editors, Oxford Handbook of Social Neuroscience, pages 28-28. Oxford University Press, 2011. [ bib ]
[12] M.N. Burton-Chellew and R.I.M. Dunbar. Close relationships: impact of romantic relationships and kinship. Social Psychology, ((submitted)), 2011. [ bib ]
[13] A. Sutcliffe, R.I.M. Dunbar, J. Binder, and H. Arrow. Relationships and the social brain: integrating psychological and evolutionary perspectives. British Journal of Psychology, ((in press)), 2011. [ bib ]
[14] T. V. Pollett, S. Roberts, and Robin I. M. Dunbar. Use of social network sites and instant messaging does not lead to increased offline social network size, or to emotionally closer relationships with offline network members. Cyberpsychology, Behavior and Social Networking, ((in press)), 2011. [ bib ]
[15] T. V. Pollett, S. Roberts, and Robin I. M. Dunbar. Extraverts have larger social network layers but do not feel emotionally closer to individuals at any layer. Journal of Individual Differences, ((in press)), 2011. [ bib ]
[16] Robin I. M. Dunbar. Constraints on the evolution of social institutions and their implications for information flow. Journal of Institutional Economics, (in press), 2011. [ bib ]
[17] O. Curry and Robin I. M. Dunbar. Altruism in social networks: evidence for a "kin premium". British Journal of Psychology, ((revised and resubmitted)), 2011. [ bib ]
[18] O. Curry and Robin I. M. Dunbar. Why birds of a feather flock together? the effects of similarity on altruism. Social Networks, (submitted), 2011. [ bib ]
[19] O. Curry and Robin I. M. Dunbar. Altruism in networks: the effect of connections. Biology Letters, ((in press)), 2011. [ bib ]
[20] Pan Hui, Jon Crowcroft, and Eiko Yoneki. Bubble rap: Social-based forwarding in delay tolerant networks. IEEE Transactions on Mobile Computing, ((to appear)), 2011. [ bib ]
[21] M. Ostilli, A. L. Ferreira, and J. F. F. Mendes. Critical behavior and correlations on scale-free small-world networks. application to network design. Phys. Rev. E, ((to appear)), 2011. [ bib ]
[22] R. A. da Costa, S. N. Dorogovtsev, A. V. Goltsev, and J. F. F. Mendes. "Explosive Percolation" Transition is Actually Continuous. Physical Review Letters, 105(25), December 2010. [ bib | http ]
[23] G. J. Baxter, S. N. Dorogovtsev, A. V. Goltsev, and J. F. F. Mendes. Heterogeneous-k-core versus Bootstrap Percolation on Complex Networks. (submitted), December 2010. [ bib | http ]
[24] Sam G. B. Roberts and Robin I. M. Dunbar. The costs of family and friends: an 18-month longitudinal study of relationship maintenance and decay. Evolution and Human Behavior, December 2010. [ bib | http ]
[25] M. Ostilli and J. F. F. Mendes. Critical phenomena on heterogeneous small-world networks. Europhysics Letters, 92:40013, November 2010. [ bib ]
[26] Leucio Antonio Cutillo, Mark Manulis, and Thorsten Strufe. Security and privacy in online social networks. In Handbook of Social Network, Technologies and Applications. Springer, October 2010. [ bib ]
[27] Chiara Boldrini, Marco Conti, and Andrea Passarella. Modelling social-aware forwarding in opportunistic networks. In IFIP Performance Evaluation of Computer and Communication Systems (PERFORM 2010), Vienna, Austria, October 2010. [ bib ]
[28] S.M. Allen, M.J. Chorley, G.B. Colombo, and R.M. Whitaker. Self adaptation of cooperation in multi-agent content sharing systems. 2010 Fourth IEEE International Conference on Self-Adaptive and Self-Organizing Systems, pages 104-113, 27 September - 01 October 2010. [ bib ]
[29] C. Boldrini, M. Conti, F. Delmastro, and A. Passarella. Context- and social-aware middleware for opportunistic networks. J. Netw. Comput. Appl., 33:525-541, September 2010. [ bib | http ]
[30] Leucio Antonio Cutillo, Refik Molva, and Thorsten Strufe. On the Security and Feasibility of Safebook : a Distributed Privacy-Preserving Online Social Network. In PrimeLife/IFIP Summer School 2010, 6th International Summer School, IFIP AICT 320, Privacy and Identity Management for Life, Helsingborg, Sweden, August 2-6 2010. [ bib ]
[31] Mervyn P. Freeman, Nicholas W. Watkins, Eiko Yoneki, and Jon Crowcroft. Rhythm and randomness in human contact. In International Conference on Advances in Social Networks Analysis and Mining (ASONAM), Odense, Denmark, August 2010. [ bib ]
[32] Derek G. Murray, Eiko Yoneki, Jon Crowcroft, and Steven Hand. The case for crowd computing. In Proceedings of the second ACM SIGCOMM workshop on Networking, systems, and applications on mobile handhelds, MobiHeld '10, pages 39-44, New Delhi, India, August 2010. ACM. [ bib | http ]
[33] Alessandro Sorniotti and Refik Molva. A provably secure secret handshake with dynamic controlled matching. Computers and Security, 29 (5), July 2010. [ bib ]
[34] A. L. Ferreira, J. F. F. Mendes, and M. Ostilli. First- and second-order phase transitions in Ising models on small world networks, simulations and comparison with an effective field theory. Physical review. E, Statistical, nonlinear, and soft matter physics, 82(1)(1), July 2010. [ bib | www: ]
[35] Carla Balocco and Pietro Liò. Modelling infection spreading control in a hospital isolation room. Journal of Biomedical Science and Engineering, 3(7), July 2010. [ bib | http | .pdf ]
[36] Konstantinos Oikonomou, Dimitrios Kogias, and Ioannis Stavrakakis. Probabilistic flooding for efficient information dissemination in random graph topologies. Computer Networks, 54(10):1615-1629, July 2010. [ bib | http ]
[37] M. J. Williams, R. M. Whitaker, and S. M. Allen. Decentralised detection of periodic encounter communities in opportunistic networks. Ad Hoc Networks, ((submitted)), June 30 2010. [ bib ]
[38] A. V. Goltsev, F. V. de Abreu, S. N. Dorogovtsev, and J. F. F. Mendes. Stochastic cellular automata model of neural networks. Phys. Rev. E, 81(6):061921, June 2010. [ bib ]
[39] E. Jaho, M. Karaliopoulos, and I. Stavrakakis. Social similarity as a driver for selfish, cooperative and altruistic behavior. In 4th IEEE WoWMoM Workshop on Autonomic and Opportunistic Communications (AOC'10), Montreal, Canada, June 2010. [ bib | .pdf ]
[40] Chiara Boldrini and Andrea Passarella. HCMM: Modelling spatial and temporal properties of human mobility driven by users' social relationships. Computer Communications, 33(9):1056-1074, June 2010. [ bib | http ]
[41] Andrea Guazzini, Pietro Liò, Franco Bagnoli, Andrea Passarella, and Marco Conti. Cognitive network dynamics in chatlines. Procedia Computer Science, 1(issue 1):2355-2362, May 2010. [ bib ]
[42] G. J. Baxter, S. N. Dorogovtsev, A. V. Goltsev, and J. F. F. Mendes. Bootstrap Percolation on Complex Networks. Physical review. E, Statistical, nonlinear, and soft matter physics, 82 (1)(1), May 2010. [ bib | http ]
[43] Massimo Ostilli, Eiko Yoneki, Ian X.Y. Leung, Jose F.F. Mendes, Pietro Lió, and Jon Crowcroft. Statistical mechanics of rumour spreading in network communities. Procedia Computer Science, Vol. 1(Issue 1):2325 - 2333, May 2010. ICCS 2010. [ bib | http | .pdf ]
[44] Michal Kryczka, Ruben Cuevas, Carmen Guerrero, Eiko Yoneki, and Arturo Azcorra. A first step towards user assisted online social networks. In Proceedings of the 3rd Workshop on Social Network Systems, SNS '10, pages 6:1-6:6, Paris, France, April 2010. ACM. [ bib | http ]
[45] Alessandro Sorniotti and Refik Molva. Secret interest groups (SIGs) in social networks with an implementation on Facebook. In SAC 2010, 25th ACM Symposium On Applied Computing, pages 621-628, Sierre, Switzerland, March 22-26 2010. [ bib | http ]
[46] Abdullatif Shikfa, Melek Onen, and Refik Molva. Bootstrapping security associations in opportunistic networks. In 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), pages 147-152. IEEE, March 2010. [ bib | http ]
[47] S. N. Dorogovtsev, A. L. Ferreira, A. V. Goltsev, and J. F. F. Mendes. Zero pearson coefficient for strongly correlated growing trees. Physical Review E (Statistical, Nonlinear, and Soft Matter Physics), 81(3), March 2010. [ bib | www: ]
[48] Stuart M. Allen, Gualtiero Colombo, and Roger M. Whitaker. Cooperation through self-similar social networks. ACM Transactions on Autonomous and Adaptive Systems (TAAS), 5(1):4:1-4:29, February 2010. [ bib | http ]
[49] P. Pantazopoulos, I. Stavrakakis, A. Passarella, and M. Conti. Efficient social-aware content placement for opportunistic networks. In Seventh International Conference on Wireless On-demand Network Systems and Services, IFIP/IEEE WONS, Kranjska Gora, Slovenia, February, 3-5 2010. [ bib | .pdf ]
[50] Andrea Passarella and Marco Conti. Characterising aggregate inter-contact times in heterogeneous opportunistic networks. In IFIP Networking 2011, Valencia, Spain, 9-13 May 2010. [ bib ]
[51] E. Jaho, M. Karaliopoulos, and I. Stavrakakis. Analysis of content placement strategies based on social similarity. IEEE Transactions on Parallel and Distributed Systems, ((submitted)), 2010. [ bib ]
[52] S. M. Allen, M. J. Chorley, G. B. Colombo, and R. M. Whitaker. Incentivising cooperation between agents for content sharing. In Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, volume 2 of WI-IAT '10, pages 79-84. IEEE Computer Society, 2010. [ bib | http ]
[53] Chiara Boldrini. Design and analysis of context-aware forwarding protocols for opportunistic networks. In Proceedings of the Second International Workshop on Mobile Opportunistic Networking, MobiOpp '10, pages 201-202, New York, NY, USA, 2010. ACM. [ bib | http ]
[54] Sergey Dorogovtsev. Lectures on Complex Networks. Oxford University Press, Inc., New York, NY, USA, 2010. [ bib ]
[55] Abdullatif Shikfa, Melek Önen, and Refik Molva. Privacy and confidentiality in context-based and epidemic forwarding. Computer Communications, 33(13):1493 - 1504, 2010. [ bib | http ]
[56] G. Smaragdakis, N. Laoutaris, K. Oikonomou, I.Stavrakakis, and A. Bestavros. Distributed server migration for scalable internet service deployment (to appear). IEEE/ACM Transactions on Networking, 2010. [ bib ]
[57] Konstantinos Oikonomou and Ioannis Stavrakakis. Scalable service migration in autonomic network environments. IEEE Journal on Selected Areas in Communications (JSAC), Special Issue on Recent Advances in Autonomic Communications, 28(1):84-94, January 2010. [ bib | www: ]
[58] Marco Conti and Mohan Kumar. Opportunities in opportunistic computing. Computer, 43(1):42-50, January 2010. [ bib | http ]
[59] Chiara Boldrini, Marco Conti, and Andrea Passarella. Design and performance evaluation of contentplace, a social-aware data dissemination system for opportunistic networks. Comput. Netw., 54(4):589-604, 2010. [ bib ]
[60] Konstantinos Oikonomou, Dimitrios Kogias, and Ioannis Stavrakakis. A study of information dissemination under multiple random walkers and replication mechanisms. In MobiOpp '10: Proceedings of the Second International Workshop on Mobile Opportunistic Networking, pages 118-125, New York, NY, USA, 2010. ACM. [ bib ]
[61] Stuart M. Allen, Gualtiero Colombo, and Roger M. Whitaker. Uttering: social micro-blogging without the internet. In MobiOpp '10: Proceedings of the Second International Workshop on Mobile Opportunistic Networking, pages 58-64, New York, NY, USA, 2010. ACM. [ bib ]
[62] Leucio Antonio Cutillo, Refik Molva, and Thorsten Strufe. Safebook: a privacy preserving online social network leveraging on real-life trust. To appear in "IEEE Communications Magazine", Consumer Communications and Networking Series, December 2009. [ bib ]
[63] Eiko Yoneki and Fehmi Ben Abdesslem. Finding a data blackhole in bluetooth scanning. ExtremeCom, August 2009. [ bib | .pdf ]
[64] Eiko Yoneki. The importance of data collection for modelling contact networks. In IEEE Workshop on Social Computing with Mobile Phones and Sensors: Modeling, Sensing and Sharing at SocialCom, August 2009. [ bib | .pdf ]
[65] Eiko Yoneki, Ioannis Baltopoulos, and Jon Crowcroft. D3N: programming distributed computation in pocket switched networks. In MobiHeld '09: Proceedings of the 1st ACM workshop on Networking, systems, and applications for mobile handhelds, pages 43-48, New York, NY, USA, August 2009. ACM. [ bib | http | .pdf ]
[66] Narseo Vallina-Rodriguez, Pan Hui, and Jon Crowcroft. Has anyone seen my Goose? - social network services in developing regions (Invited Paper). In IEEE Workshop on Social Mobile Web (SMW'09), in conjunction with the 2009 IEEE International Conference on Social Computing, August 2009. [ bib | .pdf ]
[67] Eiko Yoneki, D Greenfield, and Jon Crowcroft. Dynamics of inter-meeting time in human contact networks. International Conference on Advances in Social Networks Analysis and Mining (ASONAM), Athens, Greece, July 2009. [ bib | .pdf ]
[68] Pan Hui and Sonja Buchegger. Groupthink and peer pressure: Social influence in online social network groups. In Proceeding of International Conference on Advances in Social Networks Analysis and Mining (ASONAM), Athens, Greece, July 2009. [ bib | .pdf ]
[69] Leucio Antonio Cutillo, Refik Molva, and Thorsten Strufe. Safebook: feasibility of transitive cooperation for privacy on a decentralized social network. The Third IEEE WoWMoM Workshop on Autonomic and Opportunistic Communications, Kos, Greece, June 15 2009. [ bib | http ]
[70] Marco Conti, Franca Delmastro, and Andrea Passarella. Social-aware content sharing in opportunistic networks. In 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks Workshops, pages 1-3. IEEE, June 2009. [ bib | http ]
[71] Abdullatif Shikfa, Melek Önen, and Refik Molva. Privacy in context-based and epidemic forwarding. In AOC 2009. 3rd IEEE International WoWMoM Workshop on Autonomic and Opportunistic Communications, June 15, 2009, Kos, Greece, June 2009. [ bib | .pdf ]
[72] Kuang Xu, Pan Hui, Victor O. K. Li, Jon Crowcroft, Vito Latora, and Pietro Liò. Impact of altruism on opportunistic communications. In Proceeding of First IEEE International Conference on Ubiquitous and Future Networks(ICUFN09), Hong Kong China, June 2009. [ bib | .pdf ]
[73] Alessandro Sorniotti and Refik Molva. A provably secure secret handshake with dynamic controlled matching. In IFIP SEC 2009, 24th International Information Security Conference, May 18-20, 2009, Pafos, Cyprus, May 2009. [ bib | http | .pdf ]
[74] Pan Hui, Kuang Xu, Victor O. K. Li, Jon Crowcroft, Vito Latora, and Pietro Liò. Selfishness, altruism and message spreading in mobile social networks. In Proceeding of First IEEE International Workshop on Network Science For Communication Networks (NetSciCom09), Rio de Janeiro, Brazil, April 24 2009. [ bib | .pdf ]
[75] Leucio Antonio Cutillo, Refik Molva, and Thorsten Strufe. Leveraging social links for trust and privacy in networks. In INetSec 2009. Open Research Problems in Network Security. April 23-24, 2009. Zurich, Switzerland, April 23-24, 2009. [ bib | http ]
[76] A Peddemors and Eiko Yoneki. Decentralized probabilistic world modeling with cooperative sensing. KiVS, March 2009. [ bib | .pdf ]
[77] Nishanth Sastry, Eiko Yoneki, and Jon Crowcroft. Buzztraq: predicting geographical access patterns of social cascades using social networks. In EuroSys workshop on Social Network Systems, March 2009. [ bib | .pdf ]
[78] E. Jaho and I. Stavrakakis. Joint interest- and locality-aware content dissemination in social networks. In Sixth Annual Conference on Wireless On demand Network Systems and Services, IFIP/IEEE WONS 2009, Snowbird, Utah, USA, February 2-4 2009. [ bib | .pdf ]
[79] Sam G. Roberts, Robin I. Dunbar, Thomas V. Pollet, and Toon Kuppens. Exploring variation in active network size: Constraints and ego characteristics. Social Networks, February 2009. [ bib | http ]
[80] M. Conti, F. Delmastro, and A. Passarella. Context-aware p2p over opportunistic networks. Mobile Peer-to-Peer Computing for Next Generation Distributed Environments: Advancing Conceptual and Algorithmic Applications, pages 460-480, 2009. [ bib | http ]
[81] Chiara Boldrini, Marco Conti, and Andrea Passarella. Social-based autonomic routing in opportunistic networks. Autonomic Communication, pages 31-67, 2009. [ bib | http ]
[82] Chiara Boldrini, Marco Conti, and Andrea Passarella. The sociable traveller: human travelling patterns in social-based mobility. In MobiWAC '09: Proceedings of the 7th ACM international symposium on Mobility management and wireless access, pages 34-41, New York, NY, USA, 2009. ACM. [ bib ]
[83] Yu-En Lu, Sam Roberts, Pietro Lio, Robin Dunbar, and Jon Crowcroft. On optimising personal network size to manage information flow. In CIKM '09: Proceedings of the 18th ACM International Conference on Informatio n and Knowledge Management, Complex Network Information and Knowledge Management Workshop, Hong Kong, China, 2009. [ bib | .pdf ]
[84] Yu-En Lu, Sam Roberts, Pietro Lio, Robin Dunbar, and Jon Crowcroft. Size matters: variation in personal network size, personality and effect on information transmission. In Proceedings of the IEEE International Conference on Social Computing (Social COM), Vancouver, Canada, 2009. [ bib | .pdf ]
[85] Shu Yan Chan, Ian X. Y. Leung, and Pietro Lio. Fast centrality approximation in modular networks. In Proceedings of the 1st ACM International Workshop on Complex Networks in Information and Knowledge Management (CNIKM), pages 31-38, Hong Kong, China, 2009. ACM. [ bib | .pdf ]
[86] Ian X. Y. Leung, Pan Hui, Pietro Liò, and Jon Crowcroft. Towards real-time community detection in large networks. Physical Review E (Statistical, Nonlinear, and Soft Matter Physics), 79(6:066107), 2009. [ bib | http | .pdf ]
[87] Leyla Bilge, Thorsten Strufe, Davide Balzarotti, and Engin Kirda. All your contacts are belong to us : Automated identity theft attacks on social networks. In WWW 2009, Madrid, Spain, 2009. [ bib | http ]
[88] Leucio Antonio Cutillo, Refik Molva, and Thorsten Strufe. Privacy preserving social networking through decentralization. In WONS 2009, 6th International Conference on Wireless On-demand Network Systems and Services, February 2-4, 2009, Snowbird, Utah, USA, 2009. [ bib | http | http ]
[89] S. M. Allen, G. Colombo, and R. M. Whitaker. Forming social networks of trust to incentivize cooperation. In HICSS 2009, 2009. [ bib | http ]
[90] Massimo Ostilli and J F F Mendes. Small-world of communities: communication and correlation of the meta-network. Journal of Statistical Mechanics: Theory and Experiment, 2009(08):L08004 (12pp), 2009. [ bib | http ]
[91] M. Ostilli and J. F. F. Mendes. Communication and correlation among communities. Physical Review E (Statistical, Nonlinear, and Soft Matter Physics), 80(1):011142, 2009. [ bib | http ]
[92] Stuart M. Allen, Marco Conti, Jon Crowcroft, Robin Dunbar, Pietro Liò, Jose F. Mendes, Refik Molva, Andrea Passarella, Ioannis Stavrakakis, and Roger M. Whitaker. Social networking for pervasive adaptation. In 2008 Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops, SASOW, volume 0, pages 49-54, Los Alamitos, CA, USA, October 2008. IEEE. [ bib | http ]
[93] Pan Hui, Jon Crowcroft, and Eiko Yoneki. Bubble rap: social-based forwarding in delay tolerant networks. In MobiHoc '08: Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing, pages 241-250, New York, NY, USA, 2008. ACM. [ bib ]
[94] Chiara Boldrini, Marco Conti, and Andrea Passarella. Context and resource awareness in opportunistic network data dissemination. In WOWMOM '08: Proceedings of the 2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks, pages 1-6, Washington, DC, USA, 2008. IEEE Computer Society. [ bib | http ]
[95] A. Panagakis, A. Vaios, and I. Stavrakakis. On the performance of two-hop message spreading in DTNs. Ad-Hoc Networks, 2008. [ bib | http ]
[96] S. N. Dorogovtsev, J. F. F. Mendes, A. N. Samukhin, and A. Y. Zyuzin. Organization of modular networks. Physical Review E (Statistical, Nonlinear, and Soft Matter Physics), 78(5):056106, 2008. [ bib | http ]
[97] A. V. Goltsev, S. N. Dorogovtsev, and J. F. F. Mendes. Percolation on correlated networks. Physical Review E, 78:051105, 2008. [ bib | http ]
[98] Chiara Boldrini, Marco Conti, and Andrea Passarella. Modelling data dissemination in opportunistic networks. In CHANTS '08: Proceedings of the third ACM workshop on Challenged networks, pages 89-96, 2008. [ bib | .pdf ]
[99] Chiara Boldrini, Marco Conti, and Andrea Passarella. ContentPlace: social-aware data dissemination in opportunistic networks. In MSWiM '08: Proceedings of the 11th international symposium on Modeling, analysis and simulation of wireless and mobile systems, pages 203-210, 2008. [ bib | .pdf ]
[100] R. Cuevas, E. Jaho, C. Guerrero, and I. Stavrakakis. OnMove: A protocol for content distribution in wireless delay tolerant networks based on social information. In ACM CoNEXT 2008 Student Workshop, 2008. [ bib | .pdf ]
[101] S. N. Dorogovtsev, J. F. F. Mendes, A. N. Samukhin, and A. Y. Zyuzin. Organization of modular networks. In Netsci 2008, 2008. [ bib | http | .pdf ]
[102] Chiara Boldrini, Marco Conti, and Andrea Passarella. Autonomic behaviour of opportunistic network routing. Int. J. Auton. Adapt. Commun. Syst., 1(1):122-147, 2008. [ bib ]
[103] Chiara Boldrini, Marco Conti, and Andrea Passarella. Exploiting users' social relations to forward data in opportunistic networks: The HiBOp solution. Pervasive and Mobile Computing, 4(5):633-657, 2008. [ bib | http ]

Gualtiero Colombo, Roger M. Whitaker, and Stuart M. Allen. Cooperation in social networks of trust. 2008 Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems (SASO) Workshops, pages 78-83, 2008. [ bib ]

Contact:
Twitter: @mazlan_abbas

Sunday, September 11, 2011

Opportunistic Networks (Oppnets) - Basis for Ubiquitous Networks

Opportunistic Networks (oppnets) is a rather new concept borned around 6 years ago. The key idea behind this kind of networks is to use mobile devices to build a network to transfer data from a source node to a destination one without knowing the path or route to follow. Moreover, the message has no guarantee of reaching destiny. The whole thing relays on a best effort policy but nevertheless results quite effective. An oppnet can be seen as a subset of a Delay-Tolerant Network where communication opportunities are intermittent, so an end-to-end path between the source and the destination may never exist.

A source node passes its message to a nearby node following a gossip fashion. Nodes move around and while being near to others pass the messages they have to them and at some point the destiny node is reached. The basic characteristic is that the nodes may enter and leave the oppnet at any time, they can move and take with them the messages. All these things are done without the interaction of people. Usual elements to become part of an oppnet are cell phones, PADs, netbooks, or any electronic device with communication capacity. The oppnet may be based on any kind of communication technology, WI-FI, Bluetooth, RFID, etc.

The oppnets are part of what has been known as ubiquitous computing and later as pervasive computing. Basically these concepts are related to the use of computing devices in everyday activities without explicit knowledge of the user of its existence. Oppnets appear then to link these devices in a friendly an easy way to help people. They differ from traditional network standards in that the size and structure of the network is unknown. Actually, the oppnet starts with a seed oppnet of one or just a few nodes and grows dynamically with the incorporation of friendly devices. The growth of the network is guided from the application layer that requires information to be retrieved/sent from/to other nodes. In this aspect it is essentially different to the previous approach of Mobile ad-hoc Networks (MANET). In Manets, each device is a”router” that has to keep in someway information about the possible paths to reach a specific destination. In a certain way, a device entering a MANET assumes a compromise for routing messages according to a certain transport and routing protocol. In oppnets instead, devices act as vectors propagating the information as they move. The main thing in oppnets is related to the application layer and not to the transport layer and there is no constraint on the underlying communication standard.
Oppnets bring new problems in their implementation as privacy and security are two main issues that are still not resolved.

They may turn to be an incredible tool to monitor different variables and as an alternative communication path when the main lines are dropped after an incident like an earthquake or hurricane. They can also be used in traffic jams, crowd management, environmental monitoring, etc. The devices should be prepared to hold information and pass it at the proper moment to other friendly devices. In this message passing, like a gossip chain, information can travel across the city and reach the destination nodes. Obviously, this implies that people, cars, buses, trains, etc, act like vectors carrying the data and in this way the privacy of a person may be violated by revealing the geographical position in a certain instant. People may want to share a public profile in such a way that while moving around the city can collect information on different subjects like shop offers, traffic delays, entertainment activities, etc. By making a public profile of interests, the person may reveal sensible data that may be used maliciously. These aspects are still to be solved.

Addressing key research challenges and open issues, this complete technical guide reports on the latest advancements in the deployment of stationary relay nodes on vehicular opportunistic networks. It also illustrates the use of the service location and planning (SLP) technique for resource utilization with quality of service (QoS) constraints in opportunistic capability utilization networks. The book introduces a novel prediction-based routing protocol, and supplies authoritative coverage of communication architectures, network algorithms and protocols, emerging applications, industrial and professional standards, and experimental studies—including simulation tools and implementation test beds.
1420088122 Mobile Opportunistic Networks: Architectures, Protocols and Applications


Check LIBrary PROJECT for free eBooks

Download Here

Share

Linkwithin

Related Posts Plugin for WordPress, Blogger...