Su Jing, Chin A, and Popivanova A, et al.. User mobility for opportunistic Ad-Hoc networking[C]. 6th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA2004), English Lake District, UK, Dec. 2004: 41-50.[3]Wu H Y, Wang Y, Dang H, and Lin F. Analytic, simulation, and empirical evaluation of delay/fault-tolerant mobile sensor networks [J].IEEE Transactions on Wireless Communications.2007, 6(9):3287-3296[5]Xu Fu-long.[J].Liu Ming, and Cao Jian-nong, et al.. A motion tendency-based adaptive data delivery scheme for delay tolerant mobile sensor networks[C]. The 51st Annual IEEE Global Telecommunications Conference (GLOBECOM09), Hawaii, USA.2009,:-[6]张可, 曾家智, 刘伟. 延迟容忍移动传感器网络中基于概率复制的数据传输策略及其性能研究[J].电子与信息学报.2010, 32(3):677-681浏览[7]Zhang Ke, Zeng Jia-zhi, and Liu Wei. Data delivery scheme of DTMSN based on probability replication and its performance research[J].Journal of Electronics Information Technology.2010, 32(3):677-681[10]Kohvakka M, Suhonen J, and Kuorilehto M, et al.. Energy- efficient neighbor discovery protocol for mobile wireless sensor networks[J].Ad hoc networks.2009, 7(1):24-41[12]Yang Dong-min,Shin Jong-min,and Kim Jeonggyu, et al.. Asynchronous probing scheme for the optimal energy- efficient neighbor discovery in opportunistic networking [C].7th Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2009), Galveston, TX, USA,2009: 1-4.[18]Hyyti E, Lassila P, Nieminen L, and Virtamo J. Spatial node distribution of the random waypoint mobility model with applications[J].IEEE Transactions on Mobile Computing.2006, 5(6):680-694[20]Wang Wei,Motani M,and Srinivasan V.Opportunistic energy-efficient contact probing in delay-tolerant applications [J].IEEE/ACM Transactions on Network.2009, 17(5):1592-1605[21]Hyytia E, Lassila P, and Virtamo J.Spatial node distribution of the random waypoint mobility model with applications [J].IEEE Transactions on Mobile Computing.2006, 5(6):680-694[22]Bettstetter C, Hartenstein H, and Prez-Costa X. Stochastic properties of random waypoint mobility model [J].Wireless Networks.2004, 10(5):555-567[23]Wander A S.[J].Gura N, and Eberle H, et al.. Energy analysis of public-key cryptography for wireless sensor networks[C]. Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications05, Washington, DC, USA.2005,:-
|