IEEE INFOCOM 2017 - IEEE Conference on Computer Communications 2017
DOI: 10.1109/infocom.2017.8057110
|View full text |Cite
|
Sign up to set email alerts
|

Contact avoidance routing in delay tolerant networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 21 publications
0
5
0
Order By: Relevance
“…Equation (22) suggests that a larger N e or a smaller  leads to a larger theft ratio of data messages. Note that the value of  is also related to the required delivery ratio , as depicted in (16).…”
Section: Expected Theft Ratiomentioning
confidence: 99%
See 1 more Smart Citation
“…Equation (22) suggests that a larger N e or a smaller  leads to a larger theft ratio of data messages. Note that the value of  is also related to the required delivery ratio , as depicted in (16).…”
Section: Expected Theft Ratiomentioning
confidence: 99%
“…The number of message pieces  is calculated by (16), and some numerical results are given in Figure 7.…”
Section: Impacts Of mentioning
confidence: 99%
“…[49] uses a system of partial differential equations to study an opportunistic content update system. [24], [50], and [51] apply Markov chains to model restricted epidemic routing schemes, spray and wait scheme, and contact avoidance routing, respectively. Furthermore, epidemic routing was studied in [27], [52], and [53].…”
Section: Related Workmentioning
confidence: 99%
“…We also propose four ODE models for epidemic routing in non-sparse DTNs. The main difference of our approach with previous approaches [22], [23], [24], [27], [30], [43], [44], [45], [46], [47], [49], [50], [51], [52] is that we target non-sparse networks in this paper while the aforementioned approaches study sparse networks wherein large clusters of nodes do not exist. In [27], dense network refers to a contact network wherein each pair of nodes meet with non-zero probability.…”
Section: Comparisonmentioning
confidence: 99%
“…More recently, security‐based solutions [15, 16], incentive‐based solutions [17, 18], and solutions that consider energy consumption [19, 20] and context awareness [21] are also proposed to facilitate data forwarding in mobile social networks. These innovative solutions on mobile opportunistic networks are summarised in Table 3.…”
Section: Related Workmentioning
confidence: 99%