Proceedings of the 8th ACM MobiCom Workshop on Challenged Networks 2013
DOI: 10.1145/2505494.2505503
|View full text |Cite
|
Sign up to set email alerts
|

MobOCloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2015
2015
2018
2018

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(1 citation statement)
references
References 21 publications
0
1
0
Order By: Relevance
“…Mobile ad hoc networks is an example of such a network level opportunistic computing, where nodes that are close to each other are providing packet forwarding facility to each other. Network level augmentation has been extended to delay tolerant network as well [31,32,33,34,35], where physical movements of computing elements are used to create "store and carry" networks. Such networks are still examples of network level opportunistic computing because the opportunistic actions (i.e., packet forwarding) are limited to the network layer.…”
Section: Opportunistic Computing Levelsmentioning
confidence: 99%
“…Mobile ad hoc networks is an example of such a network level opportunistic computing, where nodes that are close to each other are providing packet forwarding facility to each other. Network level augmentation has been extended to delay tolerant network as well [31,32,33,34,35], where physical movements of computing elements are used to create "store and carry" networks. Such networks are still examples of network level opportunistic computing because the opportunistic actions (i.e., packet forwarding) are limited to the network layer.…”
Section: Opportunistic Computing Levelsmentioning
confidence: 99%