1. M. Conti, M. Kumar, Opportunities in opportunistic computing, vol. 43, no. 1, Jan 2010, pp. 42–50. http://dx.doi.org/10.1109/MC.2010.19 ISSN: 0018-9162.
2. M.J.F. Alenazi, Y. Cheng, D. Zhang, J.P.G. Sterbenz, Epidemic routing protocol implementation in Ns-3, in: ACM Proc. Workshop on Ns-3, 2015, pp. 83–90. http://dx.doi.org/10.1145/2756509.2756523 ISBN: 978-1-4503-3375-7 http://doi.acm.org/10.1145/2756509.2756523.
3. B. Han, A. Srinivasan, Your Friends Have More Friends Than You Do: Identifying Influential Mobile Users Through Random Walks, in: Proc. ACM Int. Symp. on MobiHoc, 2012, pp. 5–14. http://dx.doi.org/10.1145/2248371.2248376, ISBN: 978-1-4503-1281-3 http://doi.acm.org/10.1145/2248371.2248376.
4. P. Hui, J. Crowcroft, E. Yoneki, BUBBLE Rap: Social-based forwarding in delay-tolerant networks, vol. 10, no. 11, Nov 2011, pp. 1576–1589. http://dx.doi.org/10.1109/TMC.2010.246, ISSN: 1536-1233.
5. R. Pathak, P. Hu, J. Indulska, M. Portmann, Protocol for efficient opportunistic communication, in: The 38th IEEE Conference on Local Computer Networks, Sydney, Australia, October 2013.