User Modeling in Human–Computer Interaction
User Modeling and User-Adapted Interaction
Conditional Random Fields: Probabilistic Models for Segmenting and Labeling Sequence Data
ICML '01 Proceedings of the Eighteenth International Conference on Machine Learning
A service-oriented middleware for building context-aware services
Journal of Network and Computer Applications
PeopleNet: engineering a wireless virtual social network
Proceedings of the 11th annual international conference on Mobile computing and networking
Social Computing: From Social Informatics to Social Intelligence
IEEE Intelligent Systems
DARWIN: distributed and adaptive reputation mechanism for wireless ad-hoc networks
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Context-Aware Middleware for Anytime, Anywhere Social Networks
IEEE Intelligent Systems
Bubble rap: social-based forwarding in delay tolerant networks
Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing
The Rise of People-Centric Sensing
IEEE Internet Computing
An incentive-based electronic payment scheme for digital content transactions over the Internet
Journal of Network and Computer Applications
MobiClique: middleware for mobile social networking
Proceedings of the 2nd ACM workshop on Online social networks
Routing in socially selfish delay tolerant networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
Context- and social-aware middleware for opportunistic networks
Journal of Network and Computer Applications
A self-organising directory and matching service for opportunistic social networking
Proceedings of the 3rd Workshop on Social Network Systems
The Internet of Things: A survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Bridging the gap between physical location and online social networks
Proceedings of the 12th ACM international conference on Ubiquitous computing
"Read" More from Business Cards: Toward a Smart Social Contact Management System
WI-IAT '11 Proceedings of the 2011 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology - Volume 01
Living with Internet of Things: The Emergence of Embedded Intelligence
ITHINGSCPSCOM '11 Proceedings of the 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing
Inferring social ties across heterogenous networks
Proceedings of the fifth ACM international conference on Web search and data mining
Hybrid SN: Interlinking Opportunistic and Online Communities to Augment Information Dissemination
UIC-ATC '12 Proceedings of the 2012 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing
Research challenges and perspectives on Wisdom Web of Things (W2T)
The Journal of Supercomputing
Editorial: Collaboration technologies and applications
Journal of Network and Computer Applications
An introduction to the special issue on cross-community mining
Personal and Ubiquitous Computing
Cross-community context management in Cooperating Smart Spaces
Personal and Ubiquitous Computing
SpinRadar: a spontaneous service provision middleware for place-aware social interactions
Personal and Ubiquitous Computing
Hi-index | 0.00 |
The traditional view of Internet of Things (IoT) attempts to connect all the physical objects to build a global, infrastructure-based IoT. In this paper, however, we will present opportunistic IoT, which is formed based on the ad hoc, opportunistic networking of devices (e.g., mobile phones and smart vehicles) using short-range radio techniques (e.g., Bluetooth and Wi-Fi). The opportunistic IoT demonstrates inherently the close relationship between human and opportunistic connection of smart things. It enables information forwarding and dissemination within and among the opportunistic communities formed based on the movement and opportunistic contact nature of human. We characterize the bi-directional effects between human and opportunistic IoT, discuss the technical challenges faced by this new research field, and propose a reference architecture for developing opportunistic IoT systems. Some of our ongoing practices, including opportunistic mobile social networking, opportunistic marketing, and community service provision are further presented to demonstrate the potential application areas and technical solutions of opportunistic IoT.