|
[1]Crawdad project. http://crawdad.cs.dartmouth.edu/. [2]Delay tolerant network simulator http://www.dtnrg.org/code/dtnsim.tgz [3]The disruption tolerant networking project at umass. http://prisms.cs.umass.edu/diesel [4]Jpeg 2000. http://www.jpeg.org/jpeg2000/ [5]UCSD wireless topology discovery project. http://sysnet.ucsd.edu/wtd/ [6]The zebranet wildlife tracker. http://www.princeton.edu/ mrm/zebranet.html [7]N. Borenstein and N. Freed. Mime (multipurpose internet mail extensions) part one: Mechanisms for specifying and describing the format of internet message bodies. Technical report, IETF RFC 1521, September 1993. [8]J. Burgess, B. Gallagher, D. Jensen, and B. N. Levine. Maxprop: Routing for vehicle-based disruption-tolerant networking. In IEEE Infocom, 2006. [9]T. Camp, J. Boleng, and V. Davies. A survey of mobility models for ad hoc network research. Wireless Communication and Mobile Computing Journal, 2(5):483–502, 2002 [10]A. Chaintreau, P. Hui, J. Crowcroft, C. Diot, R. Gass, and J. Scott. Pocket switched networks: Real-world mobility and its consequences for opportunistic forwarding. Technical Report UCAM-CL-TR-617, University of Cambridge, Computer Laboratory, February 2005. [11]A. Chaintreau, P. Hui, J. Crowcroft, C. Diot, R. Gass, and J. Scott. Impact of human mobility on the design of opportunistic forwarding algorithms. In IEEE Infocom, 2006. [12]L.-J. Chen, C.-H. Yu, T. Sun, Y.-C. Chen, and H. hua Chu. A hybrid routing approach for Opportunistic Networks. In ACM SIGCOMM Workshop on Challenged Networks, 2006. [13]P. A. Chou and K. Ramchandran. Clustering source/channel rate allocations for receiver-drivenmulticast under a limited number of streams. In IEEE ICME, 2000. [14]P. A. Chou, H. J. Wang, and V. N. Padmanabhan. Layered multiple description coding. In IEEE Packet Video Workshop, 2003 [15]J.-H. Cui, J. Kong, M. Gerla, and S. Zhou. Challenges: Building scalable mobile underwater wireless sensor networks for aquatic applications. IEEE Network, Special Issue on Wireless Sensor Networking, May 2006 [16]V. K. Goyal. Multiple description coding: Compression meets the network. IEEE Signal Processing Magazine, pages 74–93, September 2001. [17]M. Grossglauser and D. Tse. Mobility increases the capacity of ad-hoc wireless networks. In IEEE Infocom, 2001. [18]K. A. Harras, K. C. Almeroth, and E. M. Belding-Royer. Delay tolerant mobile networks (dtmns): Controlled flooding in sparse mobile networks. In IFIP Networking, 2005. [19]X. Hong, M. Gerla, R. Bagrodia, and G. Pei. A group mobility model for ad hoc wireless networks. In ACM International Workshop on Modeling, Analysis and Simulation of Wireless and Mobile Systems, 1999. [20]J.-H. Huang, S. Amjad, and S. Mishra. Cenwits: A sensorbased loosely coupled search and rescue system using witnesses. In ACM SenSys, 2005. [21]P. Hui, A. Chaintreau, J. Scott, R. Gass, J. Crowcroft, and C. Diot. Pocket switched networks and human mobility in conference environments. In ACM SIGCOMM Workshop on DTN, 2005. [22]S. Jain, K. Fall, and R. Patra. Routing in a delay tolerant network. In ACM SIGCOMM, 2004. [23]J. LeBrun, C.-N. Chuah, and D. Ghosal. Knowledge based opportunistic forwarding in vehicular wireless ad hoc networks. In IEEE VTC Spring, 2005. [24]J. Leguay, T. Friedman, and V. Conan. Dtn routing in a mobility pattern space. In ACM SIGCOMM Workshop on Delay Tolerant Networks, 2005. [25]J. Leguay, T. Friedman, and V. Conan. Evaluating mobility pattern space routing for dtns. In IEEE Infocom, 2006. [26]Y. Liao, K. Tan, Z. Zhang, and L. Gao. Estimation based erasure-coding routing in delay tolerant networks. In International Wireless Communications and Mobile Computing Conference, 2006. [27]A. Lindgren and A. Doria. Probabilistic routing protocol for intermittently connected networks. Technical report, draft-lindgren-dtnrg-prophet-01.txt, IETF Internet draft, July 2005. [28]A. Lindgren, A. Doria, and O. Schelen. Probabilistic routing in intermittently connected networks. ACM SIGMOBILE Mobile Computing and Communications Review, 7(3):19–20, July 2003. [29]M. G. Luby, M. Mitzenmacher, M. A. Shokrollahi, and D. A. Spielman. Efficient erasure correcting codes. IEEE Transactions on Information Theory, 47(2):569–584, February 2001. [30]S. R. McCanne. Scalable Compression and Transmission of Internet Multicast Video. PhD thesis, University of California, Berkeley, 1996. [31]J. Ott and D. Kutscher. Bundling the web: Http over dtn. In WNEPT, 2006. [32]V. N. Padmanabhan, H. J. Wang, and P. A. Chou. Resilient peer-to-peer streaming. In IEEE ICNP, 2003. [33]V. N. Padmanabhan, H. J. Wang, P. A. Chou, and K. Sripanidkulchai. Distributing streaming media content using cooperative networking. In IEEE NOSSDAV, 2002. [34]J. Palme, A. Hopmann, and N. Shelness. Mime encapsulation of aggregate documents, such as html (mhtml). Technical report, IETF RFC 2557, March 1999. [35]J. S. Plank and M. G. Thomason. A practical analysis of low-density parity-check erasure codes for wide-area storage applications. In The International Conference on Dependable Systems and Networks, 2004. [36]D. Snowdon, N. Glance, and J.-L. Meunier. Pollen: using people as a communication medium. Elsevier Computer Networks, 35(4):429–442, February 2001. [37]A. Vahdat and D. Becker. Epidemic routing for partially-connected ad hoc networks. Technical Report CS-2000-06, Duke University, 2000. [38]R. Y. Wang, S. Sobti, N. Garg, E. Ziskind, J. Lai, and A. Krishnamurthy. Turning the postal system into a generic digital communication mechanism. In ACM SIGCOMM, 2004. [39]Y. Wang, S. Jain, M. Martonosi, and K. Fall. Erasure coding based routing for Opportunistic Networks. In ACM SIGCOMM Workshop on Delay Tolerant Networks, 2005. [40]Y. Wang and H. Wu. Dft-msn: The delay fault tolerant mobile sensor network for pervasive information gathering. In IEEE Infocom, 2006. [41]H. Weatherspoon and J. D. Kubiatowicz. Erasure coding vs. replication: A quantitative comparison. In The 1st International Workshop on Peer-to-Peer Systems, March 2002. [42]J. Widmer and J.-Y. L. Boudec. Network coding for efficient communication in extreme networks. In ACM SIGCOMM Workshop on Delay Tolerant Networks, 2005. [43]Vikram Srinivasan, Mehul Motani, Wei Tsang Ooi. Analysis and Implications of Student Contact Patterns Derived from Campus Schedules, ACM MOBICOM 06.
|