[1]
Jing S, James S, et al. Haggle: Seamless Networking for Mobile Applications[C]∥Proceedings of the Ninth International Con-ference on Ubiquitous omputing(UbiComp 2007). Innsbruck, Austria, (2007).
Google Scholar
[2]
Wang Y, Wu H. DFT-MSN: The Delay/Fault-Tolerant Mobile Sensor Network for Pervasive Information Gathering. INFO-COM, 2006: 1-12.
DOI: 10.1109/infocom.2006.272
Google Scholar
[3]
ChenZD, KungHT, Vlah D. Ad HocRelay Wireless Networks over Moving Vehicles on Highways[C]∥MobiHoc. (2001).
DOI: 10.1145/501416.501451
Google Scholar
[4]
Conti M, Giordano S. Multihop ad hoc networking: The reality. Communications Magazine, 2007, 45(4): 88−95.
DOI: 10.1109/mcom.2007.343617
Google Scholar
[5]
McNett M, Voelker G M. Access and mobility of wireless PDA users[J]. SIGMOBILE Mob. Comput. Commun. Rev., 2005, 9(2): 40-55.
DOI: 10.1145/1072989.1072995
Google Scholar
[6]
T. Camp, J. Boleng, and V. Davies, A survey of mobility models for ad hoc network research, Wireless Communications & Mobile Computing, vol. 2, pp.483-502, Aug (2002).
DOI: 10.1002/wcm.72
Google Scholar
[7]
Karagiannis T, et al. Power law and exponential decay of intercontact times between mobile devices[R]. MSR-TR-2007. Microsoft Research, March (2007).
Google Scholar
[8]
Muhammad A, George M. Characteristics of Common Mobility Models for 0pportunistic Networks[C]∥PM2HW2N. 2007: 105-109.
Google Scholar
[10]
Song L , Kotz D F . Evaluating opportunistic routing protocols with large realistic contact traces[C]∥CHANTS. 2007: 35-42.
DOI: 10.1145/1287791.1287799
Google Scholar
[11]
Esa H, Jorma V. Random waypoint model in n-dimension space[J]. Operations Research Letters, 2005, 33(6): 567-571.
Google Scholar
[12]
Hui P, Crowcroft J. How small labels create big improvements. In: Proc. of the 5th IEEE Int'l Conf. on Pervasive Computing and Communications Workshops. IEEE Computer Society, 2007. 65−70.
DOI: 10.1109/percomw.2007.55
Google Scholar