• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,260
Next 10 →

Clustering for Opportunistic Communication

by Jay Budzik , Shannon Bradshaw, Xiaobin Fu, Kristian J. Hammond - IN: PROCEEDINGS OF WWW 2002, ACM PRESS , 2002
"... We describe ongoing work on I2I, a system aimed at fostering opportunistic communication among users viewing or manipulating content on the Web and in productivity applications. Unlike previous work in which the URLs of Web resources are used to group users visiting the same resource, we present a m ..."
Abstract - Cited by 13 (1 self) - Add to MetaCart
We describe ongoing work on I2I, a system aimed at fostering opportunistic communication among users viewing or manipulating content on the Web and in productivity applications. Unlike previous work in which the URLs of Web resources are used to group users visiting the same resource, we present a

Toward Opportunistic Communication Systems

by Jay Budzik, Xiaobin Fu, Kristian J. Hammond
"... Many of our conversations are not planned. Instead, they arise opportunistically as we become aware of the common interests and goals of others. We describe a prototype system, I2I, that allows users to collaborate based on their immediate goals and interests. I2I is embedded in common document mani ..."
Abstract - Add to MetaCart
other, they can use the system to communicate using a variety of interactive modalities. Keywords opportunistic communication, awareness, matchmaking, context

1 Impact of Altruism on Opportunistic Communications

by Kuang Xu, Pan Hui, Victor O. K. Li, Jon Crowcroft, Vito Latora, Pietro Lio, Deutsche Telekom Laboratories/tu-berlin
"... Abstract—Opportunistic networking largely relies on humancarried devices as relays to move data across the network. Human altruistic behavior is an important factor in the feasibility and performance of such a system. In this paper, we study the impact of different altruism distributions on the syst ..."
Abstract - Cited by 8 (1 self) - Add to MetaCart
on the system throughput and delay of opportunistic communications. We evaluate the system performance by utilizing social network topological models and experimental human mobility traces with different communication patterns. We also discuss several observations from the result of the study. To the best

Design Principles for Robust Opportunistic Communication

by S. Keshav
"... Abstract—A mobile device can simultaneously increase its throughput and dramatically reduce energy and bandwidth usage costs by exploiting transient communication opportunities. We argue that this opportunistic communication mode will play a significant role in future mobile communication systems. W ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
Abstract—A mobile device can simultaneously increase its throughput and dramatically reduce energy and bandwidth usage costs by exploiting transient communication opportunities. We argue that this opportunistic communication mode will play a significant role in future mobile communication systems

Opportunistic Communications with Distorted CSIT

by Young-han Nam, Jianzhong (charlie Zhang, Hesham El-gamal
"... Abstract — The effects of distorted Channel State Information at the Transmitter (CSIT) on opportunistic schemes are investigated for the symmetric broadcast channels. Opportunistic schemes are defined in the presence of distorted CSIT, by specification of scheduling schemes and rate-adaptation sche ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Abstract — The effects of distorted Channel State Information at the Transmitter (CSIT) on opportunistic schemes are investigated for the symmetric broadcast channels. Opportunistic schemes are defined in the presence of distorted CSIT, by specification of scheduling schemes and rate

Opportunistic Communications for Emergency Support

by Gokce Gorbil , 2013
"... I herewith certify that all material in this dissertation which is not my own work has been properly acknowledged. ..."
Abstract - Add to MetaCart
I herewith certify that all material in this dissertation which is not my own work has been properly acknowledged.

Vehicular Opportunistic Communication Under the Microscope

by David Hadaller, Srinivasan Keshav, Tim Brecht, Shubham Agarwal - In ACM MobiSys , 2007
"... We consider the problem of providing vehicular Internet access using roadside 802.11 access points. We build on previous work in this area [18, 8, 5, 11] with an extensive experimental analysis of protocol operation at a level of detail not previously explored. We report on data gathered with four c ..."
Abstract - Cited by 81 (4 self) - Add to MetaCart
for this throughput loss; and (3) We recommend best practices for using vehicular opportunistic connections. Moreover, we show that overall throughput could be significantly improved if environmental information was made available to the 802.11 MAC and to TCP. The central message in this paper is that wireless

Connectivity management for opportunistic communications in psn

by Anna-kaisa Pietilainen, Christophe Diot , 2008
"... Abstract: Opportunistic communications through Pocket Switched Networks (PSN) is a communication paradigm which aims to exploit contact opportunities between mobile devices and human mobility to transfer data in a peer-to-peer fashion. Building real PSN systems is challenging: mobile devices have re ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
Abstract: Opportunistic communications through Pocket Switched Networks (PSN) is a communication paradigm which aims to exploit contact opportunities between mobile devices and human mobility to transfer data in a peer-to-peer fashion. Building real PSN systems is challenging: mobile devices have

Supporting Opportunistic Communication in Mobile Settings

by Per Dahlberg, Fredrik Ljungberg, Johan Sanneblad , 2000
"... Proxy Lady is a mobile system for informal, opportunistic face-to-face communication, running on a PDA equipped with a radio transceiver. We describe the system and some preliminary evaluation results. KEYWORDS Mobile computing, hand-held devices, CSCW. PROXY LADY In this paper, we describe the ..."
Abstract - Cited by 9 (0 self) - Add to MetaCart
Proxy Lady is a mobile system for informal, opportunistic face-to-face communication, running on a PDA equipped with a radio transceiver. We describe the system and some preliminary evaluation results. KEYWORDS Mobile computing, hand-held devices, CSCW. PROXY LADY In this paper, we describe

Design Principles for Opportunistic Communication in Constrained Computing Environments

by Earl Oliver, Srinivasan Keshav
"... Constrained computing environments, such as smartphones and embedded wireless devices, are becoming increasingly prevalent. Driven by the need to minimize power usage, these devices are characterized by their low-power CPUs, limited memory, slow yet vast amounts of persistent storage, and one or mor ..."
Abstract - Cited by 3 (2 self) - Add to MetaCart
environment on opportunistic communication. Drawing from our experiences with two existing mobile systems, we detail the constraints that inhibit opportunistic communication. We also show how these constraints can be satisfied using a set of design principles for systems that depend on opportunistic
Next 10 →
Results 1 - 10 of 1,260
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University