|
[1] FireChat: https://opengarden.com/firechat [2] Yu-Chee Tseng , Sze-Yao Ni , Yuh-Shyan Chen , Jang-Ping Sheu, The broadcast storm problem in a mobile ad hoc network, Wireless Networks, v.8 n.2/3, p.153-167, March-May 2002 [3] R. Ahlswede, N. Cai, S.-Y. R. Li and R. W. Yeung, "Network information flow," IEEE Trans. On Information Theory, vol. 46, pp. 1204-1216, 2000. [4] K. Fall, “A delay-tolerant network architecture for challenged internets.” in Proc. SIGCOMM, 2003. [5] Jian Shen, Sangman Moh, and Ilyong Chung, “Routing Protocols in Delay Tolerant Networks: A Comparative Survey” in International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC’ 08), July 2008 [6] T. Ho, R. Koetter, M. Medard, D. R. Karger, and M.Effros. “The benefits of coding over routing in a randomized setting”International Symposium on Information Theory (ISIT), page 442, July 2003 [7] R. H. Frenkiel, B. R. Badrinath, J. Borres, and R. D. Yates, “The infostations challenge: balancing cost and ubiquity in delivering wireless data,” IEEE Personal Communications, vol. 7, no. 2, pp. 66–71, 2000 [8] A. Demers, D. Greene, C. Houser, W. Irish, J. Larson, S. Shenker, H. Sturgis, D. Swinehart, and D. Terry,“Epidemic algorithms for replicated database maintenance,” SIGOPS Operating Systems Review, vol. 22, pp. 8–32, January 1988. [9] TSAI, Tzu-Chieh; CHAN, Ho-Hsiang. NCCU Trace: social-network-aware mobility trace. IEEE Communications Magazine, 2015, 53.10: 144-149. [10] N. Eagle and A. Pentland. Reality mining: sensing complex social systems. Personal and Ubiquitous Computing, Vol 10(4):255–268, May 2006. [11] P. Hui, People are the network: experimental design and evaluation of social-based forwarding algorithms, Ph.D. dissertation, UCAM-CL-TR-713. University of Cambridge, Comp.Lab., 2008 [12] V. Srinivasan, M. Motani, and W. T. Ooi, “Analysis and implications of student contact patterns derived from campus schedules,” in Proc.ACM MobiCom, Los Angeles,CA, Sep.2006,pp.86–97. [13] CHEN, Yuanzhu, et al. Delay-tolerant networks and network coding: Comparative studies on simulated and real device experiments. Computer Networks, 2015, 83: 349-362. [14] OSTOVARI, Pouya; KHREISHAH, Abdallah; WU, Jie. Broadcasting with hard deadlines in wireless multihop networks using network coding. Wireless Communications and Mobile Computing, 2015, 15.5: 983-999. [15] Ostovari, Pouya, Jie Wu, and Abdallah Khreishah. "Deadline-aware broadcasting in wireless networks with local network coding." Computing, Networking and Communications (ICNC), 2012 International Conference on. IEEE, 2012. [16] Spyropoulos, Thrasyvoulos, Konstantinos Psounis, and Cauligi S. Raghavendra. "Spray and wait: an efficient routing scheme for intermittently connected mobile networks." Proceedings of the 2005 ACM SIGCOMM workshop on Delay-tolerant networking. ACM, 2005. [17] Xiao, Mingjun, Jie Wu, and Liusheng Huang. "Community-aware opportunistic routing in mobile social networks." IEEE Transactions on Computers 63.7 (2014): 1682-1695. [18] Jorg Widmer, Jean-Yves Le Boudec, Network coding for efficient communication in extreme networks, in: Proceedings of the 2005 ACM SIGCOMM Workshop on Delay-Tolerant Networking, 2005, pp. 284–291. [19] A. Chaintreau, P. Hui, J. Crowcroft, C. Diot, R. Gass, and J. Scott, “Impact of human mobility on the design of opportunistic forwarding algorithms,” in Proc. INFOCOM, April 2006. [20] T. Karagiannis, J.-Y. Le Boudec, and M. Vojnovic, “Power law and exponential decay of inter contact times between mobile ´ devices,” in ACM MobiCom ’07, 2007. [21] J. Leguay, A. Lindgren, J. Scott, T. Friedman, and J. Crowcroft, “Opportunistic content distribution in an urban setting,” in ACM CHANTS, 2006, pp. 205–212. [22] Socievole, Annalisa, Floriano De Rango, and Antonio Caputo. "Wireless contacts, Facebook friendships and interests: Analysis of a multi-layer social network in an academic environment." 2014 IFIP Wireless Days (WD). IEEE, 2014. [23] https://github.com/NCCU-MCLAB/NCCU-Trace-Data [24] L. Li, R. Ramjee, M. Buddhikot, and S. Miller, “Network coding-based broadcast in mobile ad-hoc networks,” in IEEE INFOCOM, May 2007. [25] http://www.investopedia.com/terms/t/timevalue.asp [26] 郭振茂, "淺談選擇權評價Black-Scholes 公式中希臘字母的應用", 2003 [27] https://en.wikipedia.org/wiki/Greeks_(finance) [28] A. Ker¨anen, J. Ott, and T. K¨arkk¨ainen. The ONE Simulator for DTN Protocol Evaluation. In Proceedings of the 2nd International Conference on Simulation Tools and Techniques, March 2009. [29] Marin, Radu-Corneliu, Ciprian Dobre, and Fatos Xhafa. "Exploring Predictability in Mobile Interaction." EIDWT. 2012.
|