default search action
7th CHANTS@MOBICOM 2012: Istanbul, Turkey
- Eiko Yoneki, Robin Hillary Kravets:
Proceedings of the seventh ACM international workshop on Challenged networks, CHANTS@MOBICOM 2012, Istanbul, Turkey, August 22-26, 2012. ACM 2012, ISBN 978-1-4503-1284-4
Managing disruption, disconnectivity and delay
- Johannes Morgenroth, Lars C. Wolf:
Time-reference distribution in delay tolerant networks. 1-8 - Sebastian Schildt, Till Lorentzen, Johannes Morgenroth, Wolf-Bastian Pöttner, Lars C. Wolf:
Free-riding the BitTorrent DHT to improve DTN connectivity. 9-16
Being opportunistic
- Agoston Petz, Anders Lindgren, Pan Hui, Christine Julien:
MADServer: a server architecture for mobile advanced delivery. 17-22 - Riccardo Crepaldi, Ryan Beavers, Braden Ehrat, Matt Jaeger, Steven Biersteker, Robin Kravets:
LoadingZones: leveraging street parking to enable vehicular internet access. 23-30 - Teemu Kärkkäinen, Mikko Pitkänen, Jörg Ott:
Enabling ad-hoc-style communication in public WLAN hot-spots. 31-38 - Razvan Beuran, Shinsuke Miwa, Yoichi Shinoda:
Performance evaluation of DTN implementations on a large-scale network emulation testbed. 39-42
Space and null space
- Craig Partridge, Robert Walsh, Matthew Gillen, Gregory Lauer, John Lowry, W. Timothy Strayer, Derrick Kong, David Levin, Joseph P. Loyall, Michael Paulitsch:
A secure content network in space. 43-50 - Angela Hennessy, Alex Gladd, Brenton D. Walker:
Nullspace-based stopping conditions for network-coded transmissions in DTNs. 51-56
Evaluating it all
- Samo Grasic, Anders Lindgren:
An analysis of evaluation practices for DTN routing protocols. 57-64 - Wolf-Bastian Pöttner, Lars Christian Wolf:
Flow control mechanisms for the bundle protocol in IEEE 802.15.4 low-power networks. 65-68 - Ozlem Bilgir Yetim, Margaret Martonosi:
Adaptive usage of cellular and WiFi bandwidth: an optimal scheduling formulation. 69-72
Demo
- Karthik Nilakant, Eiko Yoneki:
Pocket backup storage system with cloud integration. 73-74 - Gleneesha M. Johnson Williams, Brenton D. Walker, Angela Hennessy:
A performance comparison of DTN bundle protocol implementations on resource constrained nodes. 75-78 - Milena Radenkovic, Ivan Vaghi:
Adaptive user anonymity for mobile opportunistic networks. 79-82 - Teemu Kärkkäinen, Mikko Pitkänen, Paul Houghton, Jörg Ott:
SCAMPI application platform. 83-86 - Sujoy Saha, Vijay Kumar Shah, Rohit Verma, Ratna Mandal, Subrata Nandi:
Is it worth taking a planned approach to design ad hoc infrastructure for post disaster communication? 87-90
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.