Skip to main content
This paper provides a description of operational examples of User-centric networking models, providing a specific characterization of their main features. The paper provides also a set of guidelines concerning the deployment of future... more
    • by  and +1
    •   3  
      Wireless CommunicationsWireless Networks (Computer Science)User-Centric Networking
This paper proposes an assessment model, based on a new taxonomy, which comprises an evaluation guideline with performance metrics and experimental setup to aid designers in evaluating solutions through fair comparisons. Simulation... more
    • by 
    • Bill of Material
Due to the increased capabilities of mobile devices and through wireless opportunistic contacts, users can experience new ways to share and retrieve content anywhere and anytime, even in the presence of link intermittency. Due to the... more
    • by 
    •   3  
      Performance EvaluationMobile DeviceAssessment Model
The adoption of wireless mesh networks as a solution for access networks in indoor and outdoor environments is considered by the academic community and industry as a good alternative for Internet access due to their economic and technical... more
    • by  and +1
    •   5  
      Open SourceInternet AccessWireless Mesh NetworkMESH NETWORK
    • by  and +3
    • by 
S. Zeadally et al. (Eds.): FMN 2010, LNCS 6157, pp. 100–111, 2010. © Springer-Verlag Berlin Heidelberg 2010 ... Abare: A Coordinated and Autonomous Framework for ... Billy Pinheiro1, Vagner Nascimento1, Eduardo Cerqueira1,2, Waldir... more
    • by  and +1
    •   5  
      Open SourcePerformance EvaluationInternet AccessWireless Mesh Network
The Transmission Control Protocol - TCP has been widely researched in many different networking technologies such as wireless, optical, satellite, sensor, and wired since it is the most used protocol on the Internet. In Wireless mesh... more
    • by 
    •   5  
      Congestion ControlTCP performanceWireless Mesh NetworkCross layer
    • by 
    •   8  
      Human FactorsVehicle DynamicsWireless networksMobile Computing
Throughout the history of the Internet, several technologies and networking architectures have emerged, some of which have been widely deployed, and others have only made its reach to niche markets. Some generic cases that can be cited... more
    • by  and +1
—This demo presents Oi!, an opportunistic data transmission tool. Implemented on Android and available as open-source, Oi! relies on social interaction, device-to-device short-range wireless transmission, as well as on history of contact... more
    • by  and +1
    •   2  
      Wireless Networks (Computer Science)Opportunistic Networks
    • by 
    • by 
    •   9  
      Wireless SystemsNetworkQuality of ExperiencePerformance Evaluation
The increasing demand of multimedia applications requires a new behavior of routing protocols for wireless mesh networks (WMNs). It is necessary to support the minimum requirements for quality of service (QoS), but WMNs also need to... more
    • by 
    •   6  
      Quality of ExperiencePerformance EvaluationQuality of ServiceRouting Protocol
    • by 
    •   8  
      Routing protocolsQuality of ServiceRouting ProtocolWireless Mesh Network
This paper presents a proposal for dynamic control of Quality of Service (QoS) in optical networks based on optical burst switching (OBS) using a GMPLS control plane. In this proposal, monitoring agents are used to verify the QoS... more
    • by 
    •   7  
      ApplicationsDynamic controlQuality of ServiceTraffic Flow
    • by 
ince users move around based on social relationships and interests, their imovement patterns represent how nodes are socially connected (i.e., nodes with strong social ties, nodes that meet occasionally by sharing the same working... more
    • by 
The advances in the areas of microelectronics and telecommunications are helping to materialize the vision of a pervasive computing model through the incorporation of sensors and communication interfaces into objects of everyday life. In... more
    • by 
Despite the evolution in deployed infrastructure and in the way that people access information, still there are those who are socially excluded and have no access to information due to their geographic location (e.g.,... more
    • by