Results 1 - 10
of
1,260
Clustering for Opportunistic Communication
- IN: PROCEEDINGS OF WWW 2002, ACM PRESS
, 2002
"... We describe ongoing work on I2I, a system aimed at fostering opportunistic communication among users viewing or manipulating content on the Web and in productivity applications. Unlike previous work in which the URLs of Web resources are used to group users visiting the same resource, we present a m ..."
Abstract
-
Cited by 13 (1 self)
- Add to MetaCart
We describe ongoing work on I2I, a system aimed at fostering opportunistic communication among users viewing or manipulating content on the Web and in productivity applications. Unlike previous work in which the URLs of Web resources are used to group users visiting the same resource, we present a
Toward Opportunistic Communication Systems
"... Many of our conversations are not planned. Instead, they arise opportunistically as we become aware of the common interests and goals of others. We describe a prototype system, I2I, that allows users to collaborate based on their immediate goals and interests. I2I is embedded in common document mani ..."
Abstract
- Add to MetaCart
other, they can use the system to communicate using a variety of interactive modalities. Keywords opportunistic communication, awareness, matchmaking, context
1 Impact of Altruism on Opportunistic Communications
"... Abstract—Opportunistic networking largely relies on humancarried devices as relays to move data across the network. Human altruistic behavior is an important factor in the feasibility and performance of such a system. In this paper, we study the impact of different altruism distributions on the syst ..."
Abstract
-
Cited by 8 (1 self)
- Add to MetaCart
on the system throughput and delay of opportunistic communications. We evaluate the system performance by utilizing social network topological models and experimental human mobility traces with different communication patterns. We also discuss several observations from the result of the study. To the best
Design Principles for Robust Opportunistic Communication
"... Abstract—A mobile device can simultaneously increase its throughput and dramatically reduce energy and bandwidth usage costs by exploiting transient communication opportunities. We argue that this opportunistic communication mode will play a significant role in future mobile communication systems. W ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
Abstract—A mobile device can simultaneously increase its throughput and dramatically reduce energy and bandwidth usage costs by exploiting transient communication opportunities. We argue that this opportunistic communication mode will play a significant role in future mobile communication systems
Opportunistic Communications with Distorted CSIT
"... Abstract — The effects of distorted Channel State Information at the Transmitter (CSIT) on opportunistic schemes are investigated for the symmetric broadcast channels. Opportunistic schemes are defined in the presence of distorted CSIT, by specification of scheduling schemes and rate-adaptation sche ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
Abstract — The effects of distorted Channel State Information at the Transmitter (CSIT) on opportunistic schemes are investigated for the symmetric broadcast channels. Opportunistic schemes are defined in the presence of distorted CSIT, by specification of scheduling schemes and rate
Opportunistic Communications for Emergency Support
, 2013
"... I herewith certify that all material in this dissertation which is not my own work has been properly acknowledged. ..."
Abstract
- Add to MetaCart
I herewith certify that all material in this dissertation which is not my own work has been properly acknowledged.
Vehicular Opportunistic Communication Under the Microscope
- In ACM MobiSys
, 2007
"... We consider the problem of providing vehicular Internet access using roadside 802.11 access points. We build on previous work in this area [18, 8, 5, 11] with an extensive experimental analysis of protocol operation at a level of detail not previously explored. We report on data gathered with four c ..."
Abstract
-
Cited by 81 (4 self)
- Add to MetaCart
for this throughput loss; and (3) We recommend best practices for using vehicular opportunistic connections. Moreover, we show that overall throughput could be significantly improved if environmental information was made available to the 802.11 MAC and to TCP. The central message in this paper is that wireless
Connectivity management for opportunistic communications in psn
, 2008
"... Abstract: Opportunistic communications through Pocket Switched Networks (PSN) is a communication paradigm which aims to exploit contact opportunities between mobile devices and human mobility to transfer data in a peer-to-peer fashion. Building real PSN systems is challenging: mobile devices have re ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
Abstract: Opportunistic communications through Pocket Switched Networks (PSN) is a communication paradigm which aims to exploit contact opportunities between mobile devices and human mobility to transfer data in a peer-to-peer fashion. Building real PSN systems is challenging: mobile devices have
Supporting Opportunistic Communication in Mobile Settings
, 2000
"... Proxy Lady is a mobile system for informal, opportunistic face-to-face communication, running on a PDA equipped with a radio transceiver. We describe the system and some preliminary evaluation results. KEYWORDS Mobile computing, hand-held devices, CSCW. PROXY LADY In this paper, we describe the ..."
Abstract
-
Cited by 9 (0 self)
- Add to MetaCart
Proxy Lady is a mobile system for informal, opportunistic face-to-face communication, running on a PDA equipped with a radio transceiver. We describe the system and some preliminary evaluation results. KEYWORDS Mobile computing, hand-held devices, CSCW. PROXY LADY In this paper, we describe
Design Principles for Opportunistic Communication in Constrained Computing Environments
"... Constrained computing environments, such as smartphones and embedded wireless devices, are becoming increasingly prevalent. Driven by the need to minimize power usage, these devices are characterized by their low-power CPUs, limited memory, slow yet vast amounts of persistent storage, and one or mor ..."
Abstract
-
Cited by 3 (2 self)
- Add to MetaCart
environment on opportunistic communication. Drawing from our experiences with two existing mobile systems, we detail the constraints that inhibit opportunistic communication. We also show how these constraints can be satisfied using a set of design principles for systems that depend on opportunistic
Results 1 - 10
of
1,260