2019
DOI: 10.1186/s13638-019-1458-5
|View full text |Cite
|
Sign up to set email alerts
|

Content distribution and protocol design issue for mobile social networks: a survey

Abstract: Mobile social network (MSN) consists of a flavor of social science and wireless communications for mobile networking. A mode to provide communication process between different nodes with similar interest's exploits MSN. Content delivery network (CDN) improves the network performance of MSN and provide quick and quite reliable applications by distributing content through some agents placed nearby the social community. MSN architecture can be modeled to provide smooth data exchange, sharing, and delivery of pack… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 11 publications
(10 citation statements)
references
References 86 publications
0
10
0
Order By: Relevance
“…In the above formula, n reject t represents the number of rejected services at time t. Similarly, n total t represents the total number of requests at time t, n accept represents the number of services received and L buff t is the buffer size at time t. Area occupied t represents the area occupied by the two-dimensional time-frequency resource grid at time t. Formulas ( 7) and ( 8) describe the reject rate at time t and the performance of long-term service rejection respectively. The resource utility ratio and buffer size are then represented in Equations ( 9) and (10).…”
Section: Performance Indicators and Evaluation Environmentmentioning
confidence: 99%
“…In the above formula, n reject t represents the number of rejected services at time t. Similarly, n total t represents the total number of requests at time t, n accept represents the number of services received and L buff t is the buffer size at time t. Area occupied t represents the area occupied by the two-dimensional time-frequency resource grid at time t. Formulas ( 7) and ( 8) describe the reject rate at time t and the performance of long-term service rejection respectively. The resource utility ratio and buffer size are then represented in Equations ( 9) and (10).…”
Section: Performance Indicators and Evaluation Environmentmentioning
confidence: 99%
“…In addition to traditional password-based mechanisms, Two Factor Authentication (TFA) techniques adds a registered token in possession of the user to further enforce authentication and verify that the user credentials have not been leaked. Nowadays, TFA is successfully adopted in the context of online banking [46], enterprise access [47], and mobile social networks [48], resorting to dedicated private solutions or commercial services, such as Encap Security [49], Duo [50] and Google 2-step verification [51], to name a few.…”
Section: A Backgroundmentioning
confidence: 99%
“…In this technique, the authors divided the complete network field into two parts to reduce the transmission energy, direct and indirect communication parts. In [22], the unique characteristics of social relationship with MSN (mobile social network) give rise to different protocol design issues are explained. In [23], a new computing paradigm for the optimization of parameters in adaptive beamforming using fractional processing is given.…”
Section: Literature Reviewmentioning
confidence: 99%