메뉴 건너뛰기




Volumn , Issue , 2011, Pages 159-167

Modeling and simulation of service composition in opportunistic networks

Author keywords

Distance location modeling; Opportunistic networks; Ser vice provisioning

Indexed keywords

APPLICATION-LEVEL SERVICES; CENTRALIZED SYSTEMS; DISTRIBUTED SERVICE; EXTENSIVE SIMULATIONS; INTERMITTENT CONNECTIVITY; MODELING AND SIMULATION; NETWORKING ENVIRONMENT; OPPORTUNISTIC NETWORKING; OPPORTUNISTIC NETWORKS; PERVASIVE NETWORKS; SEQUENCE SET; SER- VICE PROVISIONING; SERVICE COMPOSITIONS; SERVICE LOADS; SERVICE REQUESTS; THREE STAGES; UNDERLYING MECHANISM; WIRED NETWORKS;

EID: 83055169652     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2068897.2068927     Document Type: Conference Paper
Times cited : (22)

References (28)
  • 1
    • 70450181097 scopus 로고    scopus 로고
    • Aging rules: What does the past tell about the future in mobile ad-hoc networks?
    • H. Cai and D. Y. Eun. Aging rules: what does the past tell about the future in mobile ad-hoc networks? In Proc. ACM MobiHoc, 2009.
    • (2009) Proc. ACM MobiHoc
    • Cai, H.1    Eun, D.Y.2
  • 4
    • 20844441245 scopus 로고    scopus 로고
    • Service composition for mobile environments
    • DOI 10.1007/s11036-005-1556-y, Mobile Services and Wireless Sensor Networks
    • D. Chakraborty, A. Joshi, T. Finin, and Y. Yesha. Service composition for mobile environments. Mobile Networks and Applications, 10:435-451, 2005. (Pubitemid 40859656)
    • (2005) Mobile Networks and Applications , vol.10 , Issue.4 , pp. 435-451
    • Chakraborty, D.1    Joshi, A.2    Finin, T.3    Yesha, Y.4
  • 5
    • 76649094265 scopus 로고    scopus 로고
    • Opportunities in opportunistic computing
    • M. Conti and M. Kumar. Opportunities in opportunistic computing. Computer, 43(1):42-50, 2010.
    • (2010) Computer , vol.43 , Issue.1 , pp. 42-50
    • Conti, M.1    Kumar, M.2
  • 6
    • 37849017498 scopus 로고    scopus 로고
    • Social network analysis for routing in disconnected delay-tolerant manets
    • E. M. Daly and M. Haahr. Social network analysis for routing in disconnected delay-tolerant manets. In Proc. ACM MobiHoc, 2007.
    • (2007) Proc. ACM MobiHoc
    • Daly, E.M.1    Haahr, M.2
  • 8
    • 56649093009 scopus 로고    scopus 로고
    • Reliable, discovery and selection of composite services in mobile environments
    • L. Del Prete and L. Capra. Reliable discovery and selection of composite services in mobile environments. In Proc. IEEE EDOC, 2008.
    • (2008) Proc. IEEE EDOC
    • Prete, L.D.1    Capra, L.2
  • 9
    • 0242443768 scopus 로고    scopus 로고
    • Age matters: Efficient route discovery in mobile ad hoc networks using encounter ages
    • H. Dubois-Ferriere, M. Grossglauser, and M. Vetterli. Age matters: efficient route discovery in mobile ad hoc networks using encounter ages. In Proc. ACM MobiHoc, 2003.
    • (2003) Proc. ACM MobiHoc
    • Dubois-Ferriere, H.1    Grossglauser, M.2    Vetterli, M.3
  • 10
    • 0042975095 scopus 로고    scopus 로고
    • Locating nodes with ease: Last encounter routing in ad hoc networks through mobility diffusion
    • M. Grossglauser and M. Vetterli. Locating nodes with ease: last encounter routing in ad hoc networks through mobility diffusion. In Proc. IEEE INFOCOM, 2003.
    • (2003) Proc. IEEE INFOCOM
    • Grossglauser, M.1    Vetterli, M.2
  • 11
    • 4944253981 scopus 로고    scopus 로고
    • Spidernet: An integrated peer-to-peer service composition framework
    • X. Gu, K. Nahrstedt, and B. Yu. Spidernet: an integrated peer-to-peer service composition framework. In Proc. IEEE HPDC, pages 110-119, 2004.
    • (2004) Proc. IEEE HPDC , pp. 110-119
    • Gu, X.1    Nahrstedt, K.2    Yu., B.3
  • 12
    • 57349133691 scopus 로고    scopus 로고
    • Bubble rap: Social-based forwarding in delay tolerant networks
    • P. Hui, J. Crowcroft, and E. Yoneki. Bubble rap: social-based forwarding in delay tolerant networks. In Proc. ACM MobiHoc, 2008.
    • (2008) Proc. ACM MobiHoc
    • Hui, P.1    Crowcroft, J.2    Yoneki, E.3
  • 14
    • 73949149885 scopus 로고    scopus 로고
    • Superdiffusive behavior of mobile nodes and its impact on routing protocol performance
    • S. Kim, C.-H. Lee, and D. Y. Eun. Superdiffusive behavior of mobile nodes and its impact on routing protocol performance. IEEE Trans. Mobile Comput., 9:288-304, 2010.
    • (2010) IEEE Trans. Mobile Comput , vol.9 , pp. 288-304
    • Kim, S.1    Lee, C.-H.2    Eun, D.Y.3
  • 15
    • 84885696801 scopus 로고    scopus 로고
    • A proxy-based model for service provision in opportunistic networks
    • ACM
    • N. Le Sommer, R. Said, and Y. Mahéo. A proxy-based model for service provision in opportunistic networks. In Proc. MPAC. ACM, 2008.
    • (2008) Proc. MPAC
    • Sommer, N.L.1    Said, R.2    Mahéo, Y.3
  • 19
    • 33947176178 scopus 로고    scopus 로고
    • Opportunistic networking: Data forwarding in disconnected mobile ad hoc networks
    • DOI 10.1109/MCOM.2006.248176
    • L. Pelusi, A. Passarella, and M. Conti. Opportunistic networking: data forwarding in disconnected mobile ad hoc networks. IEEE Communications Magazine, 44(11):134-141, 2006. (Pubitemid 46405650)
    • (2006) IEEE Communications Magazine , vol.44 , Issue.11 , pp. 134-141
    • Pelusi, L.1    Passarella, A.2    Conti, M.3
  • 22
    • 83355164689 scopus 로고    scopus 로고
    • ProxiMol: Proximity and mobility estimation for effcient forwarding in opportunistic networks
    • U. Sadiq and M. Kumar. ProxiMol: Proximity and mobility estimation for effcient forwarding in opportunistic networks. In Proc. IEEE MASS, 2011.
    • (2011) Proc. IEEE MASS
    • Sadiq, U.1    Kumar, M.2
  • 23
    • 4143077026 scopus 로고    scopus 로고
    • Scaling laws for capacity and delay in wireless ad hoc networks with random mobility
    • G. Sharma and R. Mazumdar. Scaling laws for capacity and delay in wireless ad hoc networks with random mobility. In Proc. IEEE ICC, 2004.
    • (2004) Proc. IEEE ICC
    • Sharma, G.1    Mazumdar, R.2
  • 24
    • 77954304132 scopus 로고    scopus 로고
    • Location-based service discovery and delivery in opportunistic networks
    • N. L. Sommer and S. B. Sassi. Location-based service discovery and delivery in opportunistic networks. In Proc. ICN, 2010.
    • (2010) Proc. ICN
    • Sommer, N.L.1    Sassi, S.B.2
  • 25
    • 40749157530 scopus 로고    scopus 로고
    • Efficient routing in intermittently connected mobile networks: The single-copy case
    • DOI 10.1109/TNET.2007.897962
    • T. Spyropoulos, K. Psounis, and C. S. Raghavendra. Effcient routing in intermittently connected mobile networks: the single-copy case. IEEE/ACM Trans. Netw., 16(1):63-76, 2008. (Pubitemid 351386756)
    • (2008) IEEE/ACM Transactions on Networking , vol.16 , Issue.1 , pp. 63-76
    • Spyropoulos, T.1    Psounis, K.2    Raghavendra, C.S.3
  • 26
    • 67649470389 scopus 로고    scopus 로고
    • Routing in delay-tolerant networks comprising heterogeneous node populations
    • T. Spyropoulos, T. Turletti, and K. Obraczka. Routing in delay-tolerant networks comprising heterogeneous node populations. IEEE Trans. Mobile Comput., 8(8):1132-1147, 2009.
    • (2009) IEEE Trans. Mobile Comput. , vol.8 , Issue.8 , pp. 1132-1147
    • Spyropoulos, T.1    Turletti, T.2    Obraczka, K.3
  • 27
    • 78650693597 scopus 로고    scopus 로고
    • Characterising temporal distance and reachability in mobile and online social networks
    • J. Tang, M. Musolesi, C. Mascolo, and V. Latora. Characterising temporal distance and reachability in mobile and online social networks. SIGCOMM Comput. Commun. Rev., 40(1):118-124, 2010.
    • (2010) SIGCOMM Comput. Commun. Rev. , vol.40 , Issue.1 , pp. 118-124
    • Tang, J.1    Musolesi, M.2    Mascolo, C.3    Latora, V.4
  • 28
    • 79952387187 scopus 로고    scopus 로고
    • Exploiting mobility prediction for dependable service composition in wireless mobile ad hoc networks
    • J. Wang. Exploiting mobility prediction for dependable service composition in wireless mobile ad hoc networks. IEEE Trans. on Services Comput., 4:44-55, 2011.
    • (2011) IEEE Trans. on Services Comput. , vol.4 , pp. 44-55
    • Wang, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.