EBookClubs

Read Books & Download eBooks Full Online

EBookClubs

Read Books & Download eBooks Full Online

Book Socially aware Routing in Delay tolerant Mobile Social Networks

Download or read book Socially aware Routing in Delay tolerant Mobile Social Networks written by Nikolaos Vastardis and published by . This book was released on 2014 with total page 420 pages. Available in PDF, EPUB and Kindle. Book excerpt:

Book Vehicular Social Networks

Download or read book Vehicular Social Networks written by Anna Maria Vegni and published by CRC Press. This book was released on 2017-03-31 with total page 192 pages. Available in PDF, EPUB and Kindle. Book excerpt: The book provides a comprehensive guide to vehicular social networks. The book focuses on a new class of mobile ad hoc networks that exploits social aspects applied to vehicular environments. Selected topics are related to social networking techniques, social-based routing techniques applied to vehicular networks, data dissemination in VSNs, architectures for VSNs, and novel trends and challenges in VSNs. It provides significant technical and practical insights in different aspects from a basic background on social networking, the inter-related technologies and applications to vehicular ad-hoc networks, the technical challenges, implementation and future trends.

Book A Secure Socially Aware Content Retrieval Framework for Delay Tolerant Networks

Download or read book A Secure Socially Aware Content Retrieval Framework for Delay Tolerant Networks written by Tuan Vu Le and published by . This book was released on 2016 with total page 183 pages. Available in PDF, EPUB and Kindle. Book excerpt: Delay Tolerant Networks (DTNs) are sparse mobile ad-hoc networks in which there is typically no complete path between the source and destination. Content retrieval is an important service in DTNs. It allows peer-to-peer data sharing and access among mobile users in areas that lack a fixed communication infrastructure such as rural areas, inter-vehicle communication, and military environments. There are many applications for content retrieval in DTNs. For example, mobile users can find interesting digital content such as music and images from other network peers for entertainment purposes. Vehicles can access live traffic information to avoid traffic delay. Soldiers with wireless devices can retrieve relevant information such as terrain descriptions, weather, and intelligence information from other nodes in a battlefield. In this dissertation, we propose the design of a secure and scalable architecture for content retrieval in DTNs. Our design consists of five key components: (1) a distributed content discovery service, (2) a routing protocol for message delivery, (3) a buffer management policy to schedule and drop messages in resource-constrained environments, (4) a caching framework to enhance the performance of data access, and (5) a mechanism to detect malicious and selfish behaviors in the network. To cope with the unstable network topology due to the highly volatile movement of nodes in DTNs, we exploit the underlying stable social relationships among nodes for message routing, caching, and placement of the content-lookup service. Specifically, we rely on three key social concepts: social tie, centrality, and social level. Centrality is used to form the distributed content discovery service and the caching framework. Social level guides the forwarding of content requests to a content discovery service node. Once the content provider ID is discovered, social tie is exploited to deliver content requests to the content provider, and content data to the requester node. Furthermore, to reduce the transmission cost, we investigate and propose routing strategies for three dominant communication models in DTNs: unicast (a content is sent to a single node), multicast (a content is sent to multiple nodes), and anycast (a content is sent to any one member in a group of nodes). We also address several security issues for content retrieval in DTNs. In the presence of malicious and selfish nodes, the content retrieval performance can be deteriorated significantly. To address this problem, we use Public Key Cryptography to secure social-tie records and content delivery records during a contact between two nodes. The unforgeable social-tie records prevent malicious nodes from falsifying the social-tie information, which corrupts the content lookup service placement and disrupts the social-tie routing protocol. The delivery records from which the packet forwarding ratio of a node is computed, helps detect selfish behavior. Furthermore, we propose a blacklist distribution scheme that allows nodes to filter out misbehaving nodes from their social contact graph, effectively preventing network traffic from flowing to misbehaving nodes. Through extensive simulation studies using real-world mobility traces, we show that our content retrieval scheme can achieve a high content delivery ratio, low delay, and low transmission cost. In addition, our proposed misbehavior detection method can detect insider attacks efficiently with a high detection ratio and a low false positive rate, thus improving the content retrieval performance.

Book Data Dissemination and Query in Mobile Social Networks

Download or read book Data Dissemination and Query in Mobile Social Networks written by Jiming Chen and published by Springer Science & Business Media. This book was released on 2012-03-27 with total page 91 pages. Available in PDF, EPUB and Kindle. Book excerpt: With the increasing popularization of personal hand-held mobile devices, more people use them to establish network connectivity and to query and share data among themselves in the absence of network infrastructure, creating mobile social networks (MSNet). Since users are only intermittently connected to MSNets, user mobility should be exploited to bridge network partitions and forward data. Currently, data route/forward approaches for such intermittently connected networks are commonly "store-carry-and-forward" schemes, which exploit the physical user movements to carry data around the network and overcome path disconnection. And since the source and destination may be far away from each other, the delay for the destination to receive the data from the source may be long. MSNets can be viewed as one type of socially-aware delay tolerant networks (DTNs). Observed from social networks, the contact frequencies are probably different between two friends and two strangers, and this difference should be taken into consideration when designing data dissemination and query schemes in MSNets. In this book, the fundamental concepts of MSNets are introduced including the background, key features and potential applications of MSNets, while also presenting research topics, such as, MSNets as realistic social contact traces and user mobility models. Because the ultimate goal is to establish networks that allow mobile users to quickly and efficiently access interesting information, particular attention is paid to data dissemination and query schemes in subsequent sections. Combined with geography information, the concepts of community and centrality are employed from a social network perspective to propose several data dissemination and query schemes, and further use real social contact traces to evaluate their performance, demonstrating that such schemes achieve better performance when exploiting more social relationships between users.

Book Delay Tolerant Networks

Download or read book Delay Tolerant Networks written by Longxiang Gao and published by Springer. This book was released on 2015-05-14 with total page 90 pages. Available in PDF, EPUB and Kindle. Book excerpt: This brief presents emerging and promising communication methods for network reliability via delay tolerant networks (DTNs). Different from traditional networks, DTNs possess unique features, such as long latency and unstable network topology. As a result, DTNs can be widely applied to critical applications, such as space communications, disaster rescue, and battlefield communications. The brief provides a complete investigation of DTNs and their current applications, from an overview to the latest development in the area. The core issue of data forward in DTNs is tackled, including the importance of social characteristics, which is an essential feature if the mobile devices are used for human communication. Security and privacy issues in DTNs are discussed, and future work is also discussed.

Book Modeling and Optimization for Mobile Social Networks

Download or read book Modeling and Optimization for Mobile Social Networks written by Zhou Su and published by Springer. This book was released on 2016-11-25 with total page 128 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book investigates the modeling and optimization issues in mobile social networks (MSNs). Firstly, the architecture and applications of MSNs are examined. The existing works on MSNs are reviewed by specifying the critical challenges and research issues. Then, with the introduction of MSN-based social graph and information dissemination mechanisms, the analytical model for epidemic information dissemination with opportunistic Links in MSNs is discussed. In addition, optimal resource allocation is studied based on a heterogeneous architecture, which provides mobile social services with high capacity and low latency. Finally, this book summarize some open problems and future research directions in MSNs. Written for researchers and academics, this book is useful for anyone working on mobile networks, network architecture, or content delivery. It is also valuable for advanced-level students of computer science.

Book Advances in Delay Tolerant Networks  DTNs

Download or read book Advances in Delay Tolerant Networks DTNs written by Joel J.P.C. Rodrigues and published by Woodhead Publishing. This book was released on 2020-11-20 with total page 324 pages. Available in PDF, EPUB and Kindle. Book excerpt: Advances in Delay-Tolerant Networks: Architecture and Enhanced Performance, Second Edition provides an important overview of delay-tolerant networks (DTNs) for researchers in electronics, computer engineering, telecommunications and networking for those in academia and R&D in industrial sectors. Part I reviews the technology involved and the prospects for improving performance, including different types of DTN and their applications, such as satellite and deep-space communications and vehicular communications. Part II focuses on how the technology can be further improved, addressing topics, such as data bundling, opportunistic routing, reliable data streaming, and the potential for rapid selection and dissemination of urgent messages. Opportunistic, delay-tolerant networks address the problem of intermittent connectivity in a network where there are long delays between sending and receiving messages, or there are periods of disconnection. Reviews the different types of DTN and shows how they can be applied in satellite and deep-space communications, vehicular communications (including unmanned aerial), and during large-scale disasters Considers security concerns for DTN and potential for rapid selection and dissemination of urgent messages Reviews the breadth of areas in which DTN is already providing solutions Covers the prospects for DTN's wider adoption and development of standards

Book Opportunistic Mobile Social Networks

Download or read book Opportunistic Mobile Social Networks written by Jie Wu and published by CRC Press. This book was released on 2014-08-05 with total page 546 pages. Available in PDF, EPUB and Kindle. Book excerpt: The widespread availability of mobile devices along with recent advancements in networking capabilities make opportunistic mobile social networks (MSNs) one of the most promising technologies for next-generation mobile applications. Opportunistic Mobile Social Networks supplies a new perspective of these networks that can help you enhance spontaneous interaction and communication among users that opportunistically encounter each other, without additional infrastructure support. The book explores recent developments in the theoretical, algorithmic, and application-based aspects of opportunistic MSNs. It presents the motivation behind opportunistic MSNs, describes their underpinning and key concepts, and also explores ongoing research. Supplies a systematic study of the constrained information flow problem Reviews the recent literature on social influence in complex social networks Presents a complete overview of the fundamental characteristics of link-level connectivity in opportunistic networks Explains how mobility and dynamic network structure impact the processing capacity of opportunistic MSNs for cloud applications Provides a comprehensive overview of the routing schemes proposed in opportunistic MSNs Taking an in-depth look at multicast protocols, the book explains how to provide pervasive data access to mobile users without the support of cellular or Internet infrastructures. Considering privacy and security issues, it surveys a collection of cutting-edge approaches for minimizing privacy leakage during opportunistic user profile exchange. The book concludes by introducing a framework for mobile peer rating using a multi-dimensional metric scheme based on encounter and location testing. It also explains how to develop a network emulation test bed for validating the efficient operation of opportunistic network applications and protocols in scenarios that involve both node mobility and wireless communication.

Book Routing in Opportunistic Networks

Download or read book Routing in Opportunistic Networks written by Isaac Woungang and published by Springer Science & Business Media. This book was released on 2013-09-10 with total page 421 pages. Available in PDF, EPUB and Kindle. Book excerpt: Routing in Opportunistic Networks focuses on the basics of opportunistic networks, modeling and communication in opportunistic networks, routing in opportunistic networks, and collaboration and cooperation in opportunistic networks. The editors will cover such topics as mobility characterization and discovery in opportunistic networks, scheduling and medium access control in opportunistic networks as well as testbed, tools, and measurements for opportunistic networks.

Book Algorithms    ESA 2011

    Book Details:
  • Author : Camil Demetrescu
  • Publisher : Springer Science & Business Media
  • Release : 2011-09-06
  • ISBN : 3642237185
  • Pages : 832 pages

Download or read book Algorithms ESA 2011 written by Camil Demetrescu and published by Springer Science & Business Media. This book was released on 2011-09-06 with total page 832 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book constitutes the refereed proceedings of the 19th Annual European Symposium on Algorithms, ESA 2011, held in Saarbrücken, Germany, in September 2011 in the context of the combined conference ALGO 2011. The 67 revised full papers presented were carefully reviewed and selected from 255 initial submissions: 55 out of 209 in track design and analysis and 12 out of 46 in track engineering and applications. The papers are organized in topical sections on approximation algorithms, computational geometry, game theory, graph algorithms, stable matchings and auctions, optimization, online algorithms, exponential-time algorithms, parameterized algorithms, scheduling, data structures, graphs and games, distributed computing and networking, strings and sorting, as well as local search and set systems.

Book Opportunistic Networks

Download or read book Opportunistic Networks written by Anshul Verma and published by CRC Press. This book was released on 2021-08-19 with total page 409 pages. Available in PDF, EPUB and Kindle. Book excerpt: The opportunistic network is an emerging and recent area of research. To make this research area more adaptable for practical and industrial use, there is a need to further investigate several research challenges in all aspects of opportunistic networks. Therefore, Opportunistic Networks: Fundamentals, Applications and Emerging Trends provides theoretical, algorithmic, simulation, and implementation-based research developments related to fundamentals, applications, and emerging research trends in opportunistic networks. The book follows a theoretical approach to describe fundamentals to beginners and incorporates a practical approach depicting the implementation of real-life applications to intermediate and advanced readers. This book is beneficial for academicians, researchers, developers, and engineers who work in or are interested in the fields related to opportunistic networks, delay tolerant networks, and intermittently connected ad hoc networks. This book also serves as a reference book for graduate and postgraduate courses in computer science, computer engineering, and information technology streams.

Book Handbook of Optimization in Complex Networks

Download or read book Handbook of Optimization in Complex Networks written by My T. Thai and published by Springer Science & Business Media. This book was released on 2011-11-25 with total page 539 pages. Available in PDF, EPUB and Kindle. Book excerpt: Complex Social Networks is a newly emerging (hot) topic with applications in a variety of domains, such as communication networks, engineering networks, social networks, and biological networks. In the last decade, there has been an explosive growth of research on complex real-world networks, a theme that is becoming pervasive in many disciplines, ranging from mathematics and computer science to the social and biological sciences. Optimization of complex communication networks requires a deep understanding of the interplay between the dynamics of the physical network and the information dynamics within the network. Although there are a few books addressing social networks or complex networks, none of them has specially focused on the optimization perspective of studying these networks. This book provides the basic theory of complex networks with several new mathematical approaches and optimization techniques to design and analyze dynamic complex networks. A wide range of applications and optimization problems derived from research areas such as cellular and molecular chemistry, operations research, brain physiology, epidemiology, and ecology.

Book Mobile Ad Hoc Networks

    Book Details:
  • Author : G Ram Mohana Reddy
  • Publisher : CRC Press
  • Release : 2016-08-19
  • ISBN : 1315351633
  • Pages : 139 pages

Download or read book Mobile Ad Hoc Networks written by G Ram Mohana Reddy and published by CRC Press. This book was released on 2016-08-19 with total page 139 pages. Available in PDF, EPUB and Kindle. Book excerpt: In recent years, a lot of work has been done in an effort to incorporate Swarm Intelligence (SI) techniques in building an adaptive routing protocol for Mobile Ad Hoc Networks (MANETs). Since centralized approach for routing in MANETs generally lacks in scalability and fault-tolerance, SI techniques provide a natural solution through a distributed approach for the adaptive routing for MANETs. In SI techniques, the captivating features of insects or mammals are correlated with the real world problems to find solutions. Recently, several applications of bio-inspired and nature-inspired algorithms in telecommunications and computer networks have achieved remarkable success. The main aims/objectives of this book, "Mobile Ad Hoc Networks: Bio-Inspired Quality of Service Aware Routing Protocols", are twofold; firstly it clearly distinguishes between principles of traditional routing protocols and SI based routing protocols, while explaining in detail the analogy between MANETs and SI principles. Secondly, it presents the readers with important Quality of Service (QoS) parameters and explains how SI based routing protocols achieves QoS demands of the applications. This book also gives quantitative and qualitative analysis of some of the SI based routing protocols for MANETs.

Book Socioinformatics   The Social Impact of Interactions between Humans and IT

Download or read book Socioinformatics The Social Impact of Interactions between Humans and IT written by Katharina Zweig and published by Springer. This book was released on 2014-09-15 with total page 175 pages. Available in PDF, EPUB and Kindle. Book excerpt: Socioinformatics is a new scientific approach to study the interactions between humans and IT. These proceedings are a collection of the contributions during a workshop of the Gesellschaft für Informatik (GI). Researchers in this emerging field discuss the main aspects of interactions between IT and humans with respect to; social connections, social changes, acceptance of IT and the social conditions affecting this acceptance, effects of IT on humans and in response changes of IT, structures of the society and the influence of IT on these structures, changes of metaphysics influenced by IT and the social context of a knowledge society.

Book Wireless Algorithms  Systems  and Applications

Download or read book Wireless Algorithms Systems and Applications written by Xinbing Wang and published by Springer. This book was released on 2012-08-10 with total page 762 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book constitutes the refereed proceedings of the 7th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2012, held in Yellow Mountains, China, in August 2012. The 24 revised full papers presented together with 32 invited papers were carefully reviewed and selected from 116 submissions. The papers cover a wide range of topics such as cognitive radio networks, cyber-physical network systems, mobile handset networking systems, underwater and radar wireless networks, and wireless and mobile security.

Book Opportunistic Networking

Download or read book Opportunistic Networking written by Nazmul Siddique and published by CRC Press. This book was released on 2017-09-19 with total page 371 pages. Available in PDF, EPUB and Kindle. Book excerpt: Opportunistic networking, by definition, allows devices to communicate whenever a window of opportunity is available. Many emerging technologies employ opportunistic exchanges of information. This book addresses this trend in communications engineering, taking into account three specific areas—vehicular, device-to-device (D2D), and cognitive radio—while describing the opportunistic communication methods of each. From smart homes to smart cities, smart agriculture to never-die-networks and beyond, the text explores the state of the art of opportunistic networking, providing the latest research, developments, and practices in one concise source.

Book Algorithms and Architectures for Parallel Processing

Download or read book Algorithms and Architectures for Parallel Processing written by Guojin Wang and published by Springer. This book was released on 2015-11-18 with total page 884 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book constitutes the refereed proceedings of the Workshops and Symposiums of the 15th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2015, held in Zhangjiajie, China, in November 2015. The program of this year consists of 6 symposiums/workshops that cover a wide range of research topics on parallel processing technology: the Sixth International Workshop on Trust, Security and Privacy for Big Data, TrustData 2015; the Fifth International Symposium on Trust, Security and Privacy for Emerging Applications, TSP 2015; the Third International Workshop on Network Optimization and Performance Evaluation, NOPE 2015; the Second International Symposium on Sensor-Cloud Systems, SCS 2015; the Second International Workshop on Security and Privacy Protection in Computer and Network Systems, SPPCN 2015; and the First International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and Applications, DependSys 2015. The aim of these symposiums/workshops is to provide a forum to bring together practitioners and researchers from academia and industry for discussion and presentations on the current research and future directions related to parallel processing technology. The themes and topics of these symposiums/workshops are a valuable complement to the overall scope of ICA3PP 2015 and give additional values and interests.