Pocket switched networks and human mobility in conference environments
Proceedings of the 2005 ACM SIGCOMM workshop on Delay-tolerant networking
Reality mining: sensing complex social systems
Personal and Ubiquitous Computing
Analysis and implications of student contact patterns derived from campus schedules
Proceedings of the 12th annual international conference on Mobile computing and networking
Distributed community detection in delay tolerant networks
Proceedings of 2nd ACM/IEEE international workshop on Mobility in the evolving internet architecture
Detecting Key Players in 11-M Terrorist Network: A Case Study
ARES '08 Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
Bubble rap: social-based forwarding in delay tolerant networks
Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing
Context-aware multicast routing scheme for Disruption Tolerant Networks
International Journal of Ad Hoc and Ubiquitous Computing
Performance comparison of different multicast routing strategies in disruption tolerant networks
Computer Communications
Communication dynamics of blog networks
SNAKDD'08 Proceedings of the Second international conference on Advances in social network mining and analysis
Social-aware multicast in disruption-tolerant networks
IEEE/ACM Transactions on Networking (TON)
Hi-index | 0.00 |
Mobile devices carried by people form dynamic networks. Understanding the social structures within the human mobility traces captured from the mobile devices help us to design more efficient message dissemination schemes. People who are in multiple communities are good message carriers. Thus, the ability to identify the different communities efficiently from the various communication traces e.g. contact traces from users' mobile devices is important. In this paper, using some human mobility traces from the real world, we first identify nodes that can play key roles using some social network metrics. Then, we investigate the usefulness of utilizing the keyrole nodes information in the design of multicast delivery schemes in human contact-based networks. Our results indicate that using such information can achieve similar delivery performance as the multi-copy epidemic scheme but at a much smaller communication cost.