Author:
Wu Jia,Chen Zhigang,Zhao Ming
Funder
National Natural Science Foundation of China
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference28 articles.
1. Wu J, Chen Z, Zhao M (2018) Information cache management and data transmission algorithm in opportunistic social networks. Wirel Netw 25:2977–2988. https://doi.org/10.1007/s11276-018-1691-6
2. Cheong M, Lee VCS (2011) A microblogging-based approach to terrorism informatics: exploration and chronicling civilian sentiment and response to terrorism events via Twitter. Inf Syst Front 13(13):45–59
3. Wu J, Chen Z, Zhao M (2017) Effective information transmission based on socialization nodes in opportunistic networks. Comput Netw 129(Part 1):297–305. https://doi.org/10.1016/j.comnet.2017.10.005
4. Ristanovic N, Theodorakopoulos G, Le Boudec JY (2012) Traps and pitfalls of using contact traces in performance studies of opportunistic networks. NFOCOM, 2012 Proceedings IEEE. IEEE, 2012, pp 1377–1385
5. Wu J, Chen Z (2016) Data decision and transmission based on mobile data health records on sensor devices in wireless networks. Wirel Pers Commun 90(4):2073–2087. https://doi.org/10.1007/s11277-016-3438-y
Cited by
41 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献