Vicinity Enhanced Social Group-based Routing for Opportunistic Networks

来源 :2014全国理论计算机科学学术年会 | 被引量 : 0次 | 上传用户:xi19870623
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
  Mobile devices in Opportunistic Networks are used and carried by people,whose social behaviors and characteristics can greatly improve the routing performance.However,most routing protocols resort mere to the state information,including the contact history or the social feature of nodes,to assist the relay selections.In fact,nodes vicinity is considered to achieve optimal selection of relay.In this paper,we propose a new method of social group formation and an enhanced social group-based routing in which the relay node is selected based on the vicinity of a node and the social group information together.Extensive simulations on real traces demonstrate the efficiency and effectiveness of the proposed method by comparing it with several existing routing schemes.
其他文献
With the rapid development of cloud computing,how to effectively improve the utilization of computing resources in a cloud becomes a difficult problem.Therefore,a large number of distributed and paral
Considering poor quality and high noise in medical data,we propose an ensemble classifier based on support vector machine (SVM) and apply this classifier to health identification.Health identification
An L(2,1)-labeling of a graph G is an assignment of nonnegative integers to the vertices of G such that adjacent vertices get numbers at least two apart,and vertices at distance two get distinct numbe
We investigate the unbalanced cut problems.A cut (A;B) is called unbalanced if the size of its smaller side is at most k (called k-size) or exactly k (called Ek-size),where k is an input parameter.An
会议
To solve the security problems in single-cloud storage,multi-cloud storage system has been put forward in some literatures.However,when using multi-cloud,a user needs to be authenticated by different
It is crucial for synonym substitution-based steganographic algorithms to choose a suitable coding strategy for high embedding capacity.In this paper,three existing coding strategies are discussed in
Three-dimensional image registration of CT and MRI of human knees facilitates the construction of high-quality models providing the features of both modalities.This multi-modal image registration prob
K-anonymity privacy model is a typical model to protect privacy when disseminating data involving individual subjects.The drawback of k-anonymity is that generalization will result in considerable los
Feature selection method is very important for text categorization.In this paper,several classic feature selection methods are analyzed and their defficiencies are summarized firstly,and then a new fe
In the rigid-fluid coupling scenarios,rigid body sampling plays an important role on the authenticity of the simulation.The sampling method usually used is not uniform,and the effect is not ideal.This