[1]
K. Fall: Special Interest Group on Data Communication, New York, USA, July 28, 2003, pp.27-34.
Google Scholar
[2]
V. Cerf , Delay Tolerant Network Architecture, IETF RFC 2007, Vol. 22(2007), pp.120-123.
Google Scholar
[3]
L.B. Qin, Y.C. Ma: J. Comput. Sci. Eng., Vol. 4 (2013), pp.178-183.
Google Scholar
[4]
L. A. Meyers: Bulletin of the American Mathematical Society, Vol. 44(2010) No. 1, pp.63-87.
Google Scholar
[5]
H. Bian, H. Z. Yu: 2010 Second International Conference on Networks Security (Wuhan, China, April 24-25, 2010). Vol. 1, pp.153-156.
Google Scholar
[6]
H. Mohamed, M. H. Lee, M. Sarahintu, et al: J. Matematika, VOL. 32 (2008) No. 2, pp.43-51.
Google Scholar
[7]
G.X. Chen, Y.H. Du, P.K. Qin, L. Zhang: J. Comput. Sci. Eng., VOL. 8 (2013), pp.310-313.
Google Scholar
[8]
Fall K, Farrell S. DTNS: IEEE Journal on Selected Areas in Communications, 2008, 26(5): 828−836.
Google Scholar
[9]
A. Lindgreny, A. Doria, O. Schelen: ACM SIGMOB1LE Mobile Computing and Communications Review, vol. 7 (2003) no. 3, pp.19-20.
Google Scholar
[10]
N. Bulusu, J. Heidemann and D. Estrin: IEEE Personal Communications Magazine, vol. 7 (2000) no. 5, pp.28-34.
Google Scholar
[11]
D. Ganesan, B. Krishnamachari: Technical Report CSD-TR 02-13, vol. 10 (2002) no. 6, pp.156-162.
Google Scholar
[12]
R. Min, M. Bhardwaj, S. Cho, et al: In IEEE Wireless Communications, Vol. 9 (2002), pp.28-39.
Google Scholar
[13]
K. Sohrabi and G. J. Pottie: IEEE 50th Vehicular Technology Conf. (Amsterdam, Netherlands, Sep. 19-22, 2009), Vol. 2, p.1222–1226.
Google Scholar