1. Tang L, Chai Y, Li Y, Weng B (2012) Buffer management policies in opportunistic networks. J Comput Inf Syst 8(12):5149–5159
2. Chaintreau A, Hui P, Crowcroft J, Diot C, Gass R, Scott J (2005) Pocket switched networks: real-world mobility and its consequences for opportunistic forwarding. Technical Report, UCAM-CL-TR-617, University of Cambridge, Feb 2005
3. Juang P, Oki H, Wang Y, Martonosi M, Peh L, Rubenstein D (2002) Energy-efficient computing for wildlife tracking: design tradeoffs and early experiences with ZebraNet. Proc Tenth Int Conf Archit Support Progr Lang Oper Syst 37(10):96–107
4. Rigano C, Scott K, Bush J, Edell R, Parikh S, Wade R, Adamson B (2008) Mitigating naval network instabilities with disruption tolerant networking. In: IEEE conference on military communications, Nov 2008, pp 1–7
5. Burleigh S, Hooke A, Torgerson L, Fall K, Cerf V, Durst B, Scott K, Weiss H (2003) Delay-tolerant networking: an approach to interplanetary internet. IEEE Commun Mag 41(6):128–136