-
1
-
-
84859148804
-
Opening closed regimes: What was the role of social media during the arab spring
-
Jan
-
P. N. Howard, A. Duffy, D. Freelon, M. Hussain, W. Mari, and M. Mazaid, “Opening closed regimes: What was the role of social media during the Arab Spring,” Project on Information Technology & Political Islam, Jan. 2011.
-
(2011)
Project on Information Technology & Political Islam
-
-
Howard, P.N.1
Duffy, A.2
Freelon, D.3
Hussain, M.4
Mari, W.5
Mazaid, M.6
-
2
-
-
85054540457
-
Hong Kong protesters are communicating via a mobile app that doesn’t actually use the internet
-
Sept
-
J. Cook, “Hong Kong protesters are communicating via a mobile app that doesn’t actually use the Internet,” businessinsider.com, Sept. 2014.
-
(2014)
Businessinsider.Com
-
-
Cook, J.1
-
5
-
-
84905842545
-
Tweeting when online is off? Opportunistically creating mobile ad-hoc networks in response to disrupted infrastructure
-
May
-
A. Al-Akkad, C. Raffelsberger, A. Boden, L. Ramirez, and A. Zimmermann, “Tweeting when online is off? Opportunistically creating mobile ad-hoc networks in response to disrupted infrastructure,” in Proc. Int. Conf. Information Systems for Crisis Response and Management, May 2014, pp. 662–671.
-
(2014)
Proc. Int. Conf. Information Systems for Crisis Response and Management
, pp. 662-671
-
-
Al-Akkad, A.1
Raffelsberger, C.2
Boden, A.3
Ramirez, L.4
Zimmermann, A.5
-
6
-
-
84871962057
-
Twitter in disaster mode: Opportunistic communication and distribution of sensor data in emergencies
-
Sept.
-
T. Hossmann, F. Legendre, P. Carta, P. Gunningberg, and C. Rohner, “Twitter in disaster mode: Opportunistic communication and distribution of sensor data in emergencies,” in Proc. Extreme Conf. on Communication: The Amazon Expedition, Sept. 2011, pp. 1:1–1:6.
-
(2011)
Proc. Extreme Conf. on Communication: The Amazon Expedition
, pp. 11-16
-
-
Hossmann, T.1
Legendre, F.2
Carta, P.3
Gunningberg, P.4
Rohner, C.5
-
7
-
-
85047020978
-
-
University of California, Berkeley, Tech. Rep. UCB/EECS-2013-128, July
-
G. Fanti, Y. Ben David, S. Benthall, E. Brewer, and S. Shenker, “Rangzen: Circumventing government-imposed communication blackouts,” University of California, Berkeley, Tech. Rep. UCB/EECS-2013-128, July 2013.
-
(2013)
Rangzen: Circumventing Government-Imposed Communication Blackouts
-
-
Fanti, G.1
Ben David, Y.2
Benthall, S.3
Brewer, E.4
Shenker, S.5
-
8
-
-
80052124479
-
BUBBLE rap: Social-based forwarding in delay tolerant networks
-
Nov
-
P. Hui, J. Crowcroft, and E. Yoneki, “BUBBLE rap: Social-based forwarding in delay tolerant networks,” IEEE Trans. Mobile Computing, vol. 10, no. 11, pp. 1576–1589, Nov. 2011.
-
(2011)
IEEE Trans. Mobile Computing
, vol.10
, Issue.11
, pp. 1576-1589
-
-
Hui, P.1
Crowcroft, J.2
Yoneki, E.3
-
9
-
-
38849162106
-
Evaluating opportunistic routing protocols with large realistic contact traces
-
Sept.
-
L. Song and D. Kotz, “Evaluating opportunistic routing protocols with large realistic contact traces,” in Proc. Wkshp. Challenged Networks, Sept. 2007, pp. 35–42.
-
(2007)
Proc. Wkshp. Challenged Networks
, pp. 35-42
-
-
Song, L.1
Kotz, D.2
-
10
-
-
49949111095
-
The changing usage of a mature campus-wide wireless network
-
T. Henderson, D. Kotz, and I. Abyzov, “The changing usage of a mature campus-wide wireless network,” Computer Networks, vol. 52, no. 14, pp. 2690–2712, 2008.
-
(2008)
Computer Networks
, vol.52
, Issue.14
, pp. 2690-2712
-
-
Henderson, T.1
Kotz, D.2
Abyzov, I.3
-
11
-
-
33745966183
-
Access and mobility of wireless PDA users
-
M. McNett and G. M. Voelker, “Access and mobility of wireless PDA users,” ACM SIGMOBILE Mobile Computing and Communications Review, vol. 9, no. 2, pp. 40–55, 2005.
-
(2005)
ACM SIGMOBILE Mobile Computing and Communications Review
, vol.9
, Issue.2
, pp. 40-55
-
-
McNett, M.1
Voelker, G.M.2
-
12
-
-
84869171535
-
Evaluating the impact of energy consumption on routing performance in delay tolerant networks
-
Aug.
-
A. Socievole and S. Marano, “Evaluating the impact of energy consumption on routing performance in delay tolerant networks,” in Proc. Int. Conf. Wireless Communications and Mobile Computing, Aug. 2012, pp. 481–486.
-
(2012)
Proc. Int. Conf. Wireless Communications and Mobile Computing
, pp. 481-486
-
-
Socievole, A.1
Marano, S.2
-
13
-
-
78149444710
-
Energy-efficient optimal opportunistic forwarding for delay-tolerant networks
-
Y. Li, Y. Jiang, D. Jin, L. Su, L. Zeng, and D. O. Wu, “Energy-efficient optimal opportunistic forwarding for delay-tolerant networks,” IEEE Trans. Vehicular Technology, vol. 59, no. 9, pp. 4500–4512, 2010.
-
(2010)
IEEE Trans. Vehicular Technology
, vol.59
, Issue.9
, pp. 4500-4512
-
-
Li, Y.1
Jiang, Y.2
Jin, D.3
Su, L.4
Zeng, L.5
Wu, D.O.6
-
14
-
-
77958123483
-
An energy-efficient n-epidemic routing protocol for delay tolerant networks
-
July
-
X. Lu and P. Hui, “An energy-efficient n-epidemic routing protocol for delay tolerant networks,” in Proc. Int. Conf. Networking, Architecture and Storage, July 2010, pp. 341–347.
-
(2010)
Proc. Int. Conf. Networking, Architecture and Storage
, pp. 341-347
-
-
Lu, X.1
Hui, P.2
-
15
-
-
85054542798
-
Aggregate characterization of user behavior in twitter and analysis of the retweet graph
-
accepted, in press
-
D. R. Bild, Y. Liu, R. P. Dick, Z. M. Mao, and D. S. Wallach, “Aggregate characterization of user behavior in Twitter and analysis of the retweet graph,” ACM Trans. Internet Technologies, accepted, in press.
-
ACM Trans. Internet Technologies
-
-
Bild, D.R.1
Liu, Y.2
Dick, R.P.3
Mao, Z.M.4
Wallach, D.S.5
-
16
-
-
37149047145
-
Cache-, hash-, and space-efficient bloom filters
-
F. Putze, P. Sanders, and J. Singler, “Cache-, hash-, and space-efficient Bloom filters,” J. of Experimental Algorithms, no. 4, pp. 108–121, 2007.
-
(2007)
J. of Experimental Algorithms
, Issue.4
, pp. 108-121
-
-
Putze, F.1
Sanders, P.2
Singler, J.3
-
17
-
-
80054029548
-
WiFi-opp: Ad-hoc-less opportunistic networking
-
Sept.
-
S. Trifunovic, B. Distl, D. Schatzmann, and F. Legendre, “WiFi-Opp: ad-hoc-less opportunistic networking,” in Proc. Wkshp. Challenged Networks, Sept. 2011, pp. 37–42.
-
(2011)
Proc. Wkshp. Challenged Networks
, pp. 37-42
-
-
Trifunovic, S.1
Distl, B.2
Schatzmann, D.3
Legendre, F.4
-
18
-
-
34247596905
-
Impact of human mobility on opportunistic forwarding algorithms
-
A. Chaintreau, P. Hui, J. Crowcroft, C. Diot, R. Gass, and J. Scott, “Impact of human mobility on opportunistic forwarding algorithms,” IEEE Trans. Mobile Computing, vol. 6, no. 6, pp. 606–620, 2007.
-
(2007)
IEEE Trans. Mobile Computing
, vol.6
, Issue.6
, pp. 606-620
-
-
Chaintreau, A.1
Hui, P.2
Crowcroft, J.3
Diot, C.4
Gass, R.5
Scott, J.6
-
20
-
-
80052648601
-
Human mobility, social ties, and link prediction
-
Aug.
-
D. Wang, D. Pedreschi, C. Song, F. Giannotti, and A.-L. Barabasi, “Human mobility, social ties, and link prediction,” in Proc. Int. Conf. Knowledge Discovery and Data Mining, Aug. 2011, pp. 1100–1108.
-
(2011)
Proc. Int. Conf. Knowledge Discovery and Data Mining
, pp. 1100-1108
-
-
Wang, D.1
Pedreschi, D.2
Song, C.3
Giannotti, F.4
Barabasi, A.-L.5
-
21
-
-
84886588199
-
Performance of IEEE 802.11 under jamming
-
E. Bayraktaroglu, C. King, X. Liu, G. Noubir, R. Rajaraman, and B. Thapa, “Performance of IEEE 802.11 under jamming,” Mobile Networks and Applications, vol. 18, no. 5, pp. 678–696, 2013.
-
(2013)
Mobile Networks and Applications
, vol.18
, Issue.5
, pp. 678-696
-
-
Bayraktaroglu, E.1
King, C.2
Liu, X.3
Noubir, G.4
Rajaraman, R.5
Thapa, B.6
-
22
-
-
0034721164
-
Error and attack tolerance of complex networks
-
R. Albert, H. Jeong, and A.-L. Barabási, “Error and attack tolerance of complex networks,” Nature, vol. 406, no. 6794, pp. 378–382, 2000.
-
(2000)
Nature
, vol.406
, Issue.6794
, pp. 378-382
-
-
Albert, R.1
Jeong, H.2
Barabási, A.-L.3
-
23
-
-
85054512726
-
-
Monsoon, “Monsoon power monitor,” 2008, http://www.msoon.com/LabEquipment/PowerMonitor/.
-
(2008)
Monsoon Power Monitor
-
-
-
24
-
-
0242612027
-
Asynchronous wakeup for ad hoc networks
-
June
-
R. Zheng, J. C. Hou, and L. Sha, “Asynchronous wakeup for ad hoc networks,” in Proc. Int. Symp. Mobile Ad Hoc Networking and Computing, June 2003, pp. 35–45.
-
(2003)
Proc. Int. Symp. Mobile Ad Hoc Networking and Computing
, pp. 35-45
-
-
Zheng, R.1
Hou, J.C.2
Sha, L.3
-
27
-
-
85054515581
-
-
“Sponge Castle,” 2014, http://rtyley.github.io/spongycastle/.
-
(2014)
Sponge Castle
-
-
-
28
-
-
85054523509
-
-
“OpenSSL,” 2014, https://www.openssl.org/.
-
(2014)
OpenSSL
-
-
-
29
-
-
84938086549
-
-
“Twitter usage,” 2015, https://about.twitter.com/company.
-
(2015)
Twitter Usage
-
-
-
32
-
-
84906337867
-
-
“YouTube statistics,” 2014, https://www.youtube.com/yt/press/statistics.html.
-
(2014)
YouTube Statistics
-
-
|