MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Mining the network value of customers
Proceedings of the seventh ACM SIGKDD international conference on Knowledge discovery and data mining
Mining knowledge-sharing sites for viral marketing
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
A delay-tolerant network architecture for challenged internets
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
Maximizing the spread of influence through a social network
Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining
Modeling epidemic information dissemination on mobile devices with finite buffers
SIGMETRICS '05 Proceedings of the 2005 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Social Serendipity: Mobilizing Social Software
IEEE Pervasive Computing
PeopleNet: engineering a wireless virtual social network
Proceedings of the 11th annual international conference on Mobile computing and networking
Impact of Human Mobility on Opportunistic Forwarding Algorithms
IEEE Transactions on Mobile Computing
Micro-Blog: sharing and querying content through mobile phones and social participation
Proceedings of the 6th international conference on Mobile systems, applications, and services
Coupons: A Multilevel Incentive Scheme for Information Dissemination in Mobile Networks
IEEE Transactions on Mobile Computing
Media sharing based on colocation prediction in urban transport
Proceedings of the 14th ACM international conference on Mobile computing and networking
Proceedings of the 6th ACM conference on Embedded network sensor systems
Context and resource awareness in opportunistic network data dissemination
WOWMOM '08 Proceedings of the 2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks
Energy consumption in mobile phones: a measurement study and implications for network applications
Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference
Augmenting mobile 3G using WiFi
Proceedings of the 8th international conference on Mobile systems, applications, and services
Rumour spreading and graph conductance
SODA '10 Proceedings of the twenty-first annual ACM-SIAM symposium on Discrete Algorithms
IEEE Communications Magazine
Mobile data offloading in metropolitan area networks
ACM SIGMOBILE Mobile Computing and Communications Review
Storage-enabled access points for improved mobile performance: an evaluation study
WWIC'11 Proceedings of the 9th IFIP TC 6 international conference on Wired/wireless internet communications
MobiTrade: trading content in disruption tolerant networks
CHANTS '11 Proceedings of the 6th ACM workshop on Challenged networks
WiFi-Opp: ad-hoc-less opportunistic networking
CHANTS '11 Proceedings of the 6th ACM workshop on Challenged networks
Multiple mobile data offloading through delay tolerant networks
CHANTS '11 Proceedings of the 6th ACM workshop on Challenged networks
Utility-based forwarding: a comparison in different mobility scenarios
Proceedings of the third ACM international workshop on Mobile Opportunistic Networks
MicroCast: cooperative video streaming on smartphones
Proceedings of the 10th international conference on Mobile systems, applications, and services
Spatial uplink mobile data offloading leveraging store-carry-forward paradigm
Proceedings of the first ACM international workshop on Practical issues and applications in next generation wireless networks
Fast track article: Push-and-track: Saving infrastructure bandwidth through opportunistic forwarding
Pervasive and Mobile Computing
Capillary networks: a novel networking paradigm for urban environments
Proceedings of the first workshop on Urban networking
HyCloud: a hybrid approach toward offloading cellular content through opportunistic communication
Proceeding of the 11th annual international conference on Mobile systems, applications, and services
A first look at cellular network performance during crowded events
Proceedings of the ACM SIGMETRICS/international conference on Measurement and modeling of computer systems
Sprinkler: distributed content storage for just-in-time streaming
Proceeding of the 2013 workshop on Cellular networks: operations, challenges, and future design
Proceedings of the 8th ACM MobiCom workshop on Challenged networks
Interest-based cloud-facilitated opportunistic networking
Proceedings of the 8th ACM MobiCom workshop on Challenged networks
On scheduling data access with cooperative load balancing in vehicular ad hoc networks (VANETs)
The Journal of Supercomputing
Adaptive role switching for fair and efficient battery usage in device-to-device communication
ACM SIGMOBILE Mobile Computing and Communications Review
Preventing spam in opportunistic networks
Computer Communications
Hi-index | 0.00 |
Due to the increasing popularity of various applications for smartphones, 3G networks are currently overloaded by mobile data traffic. Offloading cellular traffic through opportunistic communications is a promising solution to partially solve this problem, because there is no monetary cost for it. As a case study, we investigate the target-set selection problem for information delivery in the emerging Mobile Social Networks (MoSoNets). We propose to exploit opportunistic communications to facilitate the information dissemination and thus reduce the amount of cellular traffic. In particular, we study how to select the target set with only k users, such that we can minimize the cellular data traffic. In this scenario, initially the content service providers deliver information over cellular networks to only users in the target set. Then through opportunistic communications, target-users will further propagate the information among all the subscribed users. Finally, service providers will send the information to users who fail to receive it before the delivery deadline (i.e., delay-tolerance threshold). We propose three algorithms, called Greedy, Heuristic, and Random, for this problem and evaluate their performance through an extensive trace-driven simulation study. The simulation results verify the efficiency of these algorithms for both synthetic and real-world mobility traces. For example, the Heuristic algorithm can offload cellular traffic by up to 73.66% for a real-world mobility trace.