2010
DOI: 10.1109/tmc.2010.123
|View full text |Cite
|
Sign up to set email alerts
|

On Nodal Encounter Patterns in Wireless LAN Traces

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
51
0

Year Published

2011
2011
2014
2014

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 75 publications
(51 citation statements)
references
References 24 publications
0
51
0
Order By: Relevance
“…We also would like to construct a systematic way to automatically generate the configuration files, such that the communities and time periods of nodes are set to capture the inter-node encounter properties we observe in various traces (for example, the Small World encounter patterns observed in WLAN traces [13]). …”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…We also would like to construct a systematic way to automatically generate the configuration files, such that the communities and time periods of nodes are set to capture the inter-node encounter properties we observe in various traces (for example, the Small World encounter patterns observed in WLAN traces [13]). …”
Section: Discussionmentioning
confidence: 99%
“…Along this line, researchers have exploited existing wireless network infrastructure, such as wireless LANs (e.g., [2], [25], [10]) or cellular phone networks (e.g., [7]), to track user mobility by monitoring their locations. Such traces can be replayed as input mobility patterns for simulations of network protocols [13]. More recently, DTNspecific testbeds [6], [4], [19] aim at collecting encounter events between mobile nodes instead of the mobility patterns.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Goodness of fit tests indicate that both models provide good fit. In addition, we find hyperexponential models provide better match to the empirical data than BiPareto models [21], [28], [27] that have been proposed for NHDs.…”
Section: Introductionmentioning
confidence: 86%
“…Since the node mobility patterns are highly volatile and difficult to characterize or predict, node contact process [19] is also exploited, as abstraction of node mobility, to calculate relay selection metrics. More specifically, the nodes' capability of contacting others in the future is predicted based on their cumulative contact records from the past.…”
Section: Related Workmentioning
confidence: 99%