Shortest-path and minimum-delay algorithms in networks with time-dependent edge-length
Journal of the ACM (JACM)
The small-world phenomenon: an algorithmic perspective
STOC '00 Proceedings of the thirty-second annual ACM symposium on Theory of computing
Connectivity and inference problems for temporal networks
STOC '00 Proceedings of the thirty-second annual ACM symposium on Theory of computing
Mobility increases the capacity of ad hoc wireless networks
IEEE/ACM Transactions on Networking (TON)
Access and mobility of wireless PDA users
ACM SIGMOBILE Mobile Computing and Communications Review
A message ferrying approach for data delivery in sparse mobile ad hoc networks
Proceedings of the 5th ACM international symposium on Mobile ad hoc networking and computing
Routing in a delay tolerant network
Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications
The changing usage of a mature campus-wide wireless network
Proceedings of the 10th annual international conference on Mobile computing and networking
Graphs over time: densification laws, shrinking diameters and possible explanations
Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining
Reality mining: sensing complex social systems
Personal and Ubiquitous Computing
Analysis and implications of student contact patterns derived from campus schedules
Proceedings of the 12th annual international conference on Mobile computing and networking
Experiences from measuring human mobility using Bluetooth inquiring devices
MobiEval '07 Proceedings of the 1st international workshop on System evaluation for mobile platforms
Impact of Human Mobility on Opportunistic Forwarding Algorithms
IEEE Transactions on Mobile Computing
Power law and exponential decay of inter contact times between mobile devices
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Study of a bus-based disruption-tolerant network: mobility modeling and impact on routing
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Are you moved by your social network application?
Proceedings of the first workshop on Online social networks
Characterizing user mobility in second life
Proceedings of the first workshop on Online social networks
Delay tolerant bulk data transfers on the internet
Proceedings of the eleventh international joint conference on Measurement and modeling of computer systems
Distributing content updates over a mobile social network
ACM SIGMOBILE Mobile Computing and Communications Review
On the strength of weak ties in mobile social networks
Proceedings of the Second ACM EuroSys Workshop on Social Network Systems
Tuning message size in opportunistic mobile networks
Proceedings of the 1st ACM workshop on Networking, systems, and applications for mobile handhelds
Quantifying content consistency improvements through opportunistic contacts
Proceedings of the 4th ACM workshop on Challenged networks
On the degree distribution of opportunistic networks
MobiOpp '10 Proceedings of the Second International Workshop on Mobile Opportunistic Networking
Second life: a social network of humans and bots
Proceedings of the 20th international workshop on Network and operating systems support for digital audio and video
Peoplerank: social opportunistic forwarding
INFOCOM'10 Proceedings of the 29th conference on Information communications
Routing in socially selfish delay tolerant networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
Globs in the primordial soup: the emergence of connected crowds in mobile wireless networks
Proceedings of the eleventh ACM international symposium on Mobile ad hoc networking and computing
Mobility profiler: A framework for discovering mobility profiles of cell phone users
Pervasive and Mobile Computing
The smallville effect: social ties make mobile networks more secure against node capture attack
Proceedings of the 8th ACM international workshop on Mobility management and wireless access
Trace-based mobility modeling for multi-hop wireless networks
Computer Communications
Understanding stateful vs stateless communication strategies for ad hoc networks
MobiCom '11 Proceedings of the 17th annual international conference on Mobile computing and networking
How much off-center are centrality metrics for routing in opportunistic networks
CHANTS '11 Proceedings of the 6th ACM workshop on Challenged networks
Vicinity-based DTN characterization
Proceedings of the third ACM international workshop on Mobile Opportunistic Networks
Halo: managing node rendezvous in opportunistic sensor networks
DCOSS'10 Proceedings of the 6th IEEE international conference on Distributed Computing in Sensor Systems
Dissemination in opportunistic social networks: the role of temporal communities
Proceedings of the thirteenth ACM international symposium on Mobile Ad Hoc Networking and Computing
Proceedings of the 18th annual international conference on Mobile computing and networking
Prioritized gossip in vehicular networks
Ad Hoc Networks
CAF: Community aware framework for large scale mobile opportunistic networks
Computer Communications
Shaping opportunistic networks
Computer Communications
Proceedings of the 22nd international conference on World Wide Web companion
Towards resource sharing in mobile device clouds: power balancing across mobile devices
Proceedings of the second ACM SIGCOMM workshop on Mobile cloud computing
Link prediction in human mobility networks
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Reprint of "Prioritized gossip in vehicular networks"
Ad Hoc Networks
Delay-tolerant bulk data transfers on the internet
IEEE/ACM Transactions on Networking (TON)
Preventing spam in opportunistic networks
Computer Communications
Hi-index | 0.00 |
Portable devices have more data storage and increasing communication capabilities everyday. In addition to classic infrastructure based communication, these devices can exploit human mobility and opportunistic contacts to communicate. We analyze the characteristics of such opportunistic forwarding paths. We establish that opportunistic mobile networks in general are characterized by a small diameter, a destination device is reachable using only a small number of relays under tight delay constraint. This property is first demonstrated analytically on a family of mobile networks which follow a random graph process. We then establish a similar result empirically with four data sets capturing human mobility, using a new methodology to efficiently compute all the paths that impact the diameter of an opportunistic mobile networks. We complete our analysis of network diameter by studying the impact of intensity of contact rate and contact duration. This work is, to our knowledge, the first validation that the so called "small world" phenomenon applies very generally to opportunistic networking between mobile nodes.