参考文献
[1]Burleigh S,Hooke A,Torgerson L,et al.Delay-tolerant Networking:An Approach to Interplanetary Internet[J].IEEE Communications Magazine,2003,41(6):128-136.
[2]苏金树,胡乔林,赵宝康,等.容延容断网络路由技术[J].软件学报,2010,21(1):119-132.
[3]马华东,袁培燕,赵东.移动机会网络路由问题研究进展[J].软件学报,2015,26(3):600-616.
[4]Helgason O R,Legendre F,Lenders V,et al.Performance of Opportunistic Content Distribution Under Different Levels of Cooperation[C]//Proceedings of European Wireless Conference.Washington D.C.,USA:IEEE Press,2010:903-910.
[5]Resta G,Santi P.A Framework for Routing Performance Analysis in Delay Tolerant Networks with Application to Noncooperative Networks[J].IEEE Transactions on Parallel and Distributed Systems,2012,23(1):2-10.
[6]Miao J,Hasan O,Mokhtar S B,et al.An Investigation on the Unwillingness of Nodes to Participate in Mobile Delay Tolerant Network Routing[J].International Journal of Information Management,2013,33(2):252-262.
[7]Dini G,Duca A L.A Reputation-based Approach to Tolerate Misbehaving Carriers in Delay Tolerant Networks[C]//Proceedings of the IEEE Symposium on Computers and Communications.Washington D.C.,USA:IEEE Press,2010:772-777.
[8]Chen Binbin,Chan Munchoon.Mobicent:A Credit-based Incentive System for Disruption Tolerant Network[C]// Proceedings of the 29th Conference on Information.Washington D.C.,USA:IEEE Press,2010:1-9.
[9]Shevade U,Song H H,Qiu V L,et al.Incentive-aware Routing in DTNs[C]//Proceedings of IEEE International Conference on Network Protocols.Washington D.C.,USA:IEEE Press,2008:238-247.
[10]Wei Lifei,Zhu Haojin,Cao Zhenfu,et al.MobiID:A User-centric and Social Aware Reputation Based Incentive Scheme for Delay/Disruption Tolerant Networks[C]//Proceedings of the 10th International Conference on Ad-hoc,Mobile,and Wireless Networks.New York,USA:ACM Press,2011:177-190.
[11]赵广松,陈鸣.自私性机会网络中激励感知的内容分发的研究[J].通信学报,2013,34(2):73-84.
[12]李云,于季弘,尤肖虎.资源受限的机会网络节点激励策略研究[J].计算机学报,2013,36(5):947-956.
[13]Baig O,AI-Harthi Y S,Al-Tubaishi E.Game-theoretic Algorithm Stimulating Cooperation in Multihop Wireless Networks[C]//Proceedings of the 5th International Conference on Institute of Electrical and Electronics Engineers.Washington D.C.,USA:IEEE Press,2014:1-5.
[14]许力,陈志德,黄川.博弈理论在无线网络中的应用[M].北京:科学出版社,2012.
[15]Boyer S,Robert J M,Rousseau C,et al.A Novel Reputation-based Tit-for-Tat Strategy for IEEE 802.11 CSMA/CA Protocol[C]//Proceedings of Consumer Communications and Networking Conference.New York,USA:ACM Press,2012:143-148.
[16]Jindal A,Psounis K.Performance Analysis of Epidemic Routing Under Contention[C]//Proceedings of Inter-national Conference on Wireless Communications and Mobile Computing.New York,USA:ACM Press,2006:539-544.
[17]Spyropoulos T,Psounis K,Raghavendra C S.Spray and Wait:An Efficient Routing Scheme for Intermittently Connected Mobile Networks[C]//Proceedings of ACM SIGCOMM Workshop on Delay-tolerant Networking.New York,USA:ACM Press,2005:252-259.
[18]Keranen A,Ott J,Karkkainen T.The ONE Simulator for DTN Protocol Evaluation[C]//Proceedings of the 2nd International Conference on Simulation Tools and Techniques.New York,USA:ACM Press,2009:55.
[19]Pan Hui,Crowcroft J,Yoneki E.BUBBLE Rap:Social-based Forwarding in Delay-tolerant Networks[J].IEEE Transactions on Mobile Computing,2010,10(11):1576-1589.
[20]Lorenzo B,Marco B,Pierpaolo L,et al.CRAWDAD Dataset Roma/Taxi[DB/OL].(2014-07-17).http://cr-awdad.org/roma/taxi/20140717.
[21]Anderson R,Edjair M.Implementation of Selfish Behavior in Opportunistic Network Using the ONE,RT-GRCM-2014/1[R].Federal University of Amazonas,2014.
编辑顾逸斐 |