The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Social recommendation has been popular and successful in various urban sustainable applications such as online sharing, products recommendation and shopping services. These applications allow users to form several implicit social networks through their daily social interactions. The users in such social networks can rate some interesting items and give comments. The majority of the existing studies...
The rapid growth of emerging techniques for mobile resource sharing, content sharing, mobile social networks, and complex cyber-physical systems poses significant challenges for trust and security management. Several trust management schemes have been proposed recently to counter the security threat on Peer-to-Peer (P2P) systems. However, due to the difficulties caused by system mobility, wireless...
The most known drawback of IEEE 802.11 MAC is the low performance in terms of throughput in case of congested networks. Backoff time is one of the most important factors that govern the collision probability in Ad-Hoc network. Using backoff algorithm could push the performance up and decrease collision rate. This study presents an enhanced fibonacci backoff Algorithm (EFB) for Ad-Hoc Network in which...
Trust management in applications for peer-to-peer (P2P) mobile networks has recently gained enormous interests. In a P2P mobile social network, users interact with each other to share information without relying on a centralized infrastructure. Users with similar interests establish groups or communities thus encouraging sharing of information such as interest profiles, personal information, documents,...
Recently many decentralized methods for trust management have been proposed. FIRE trust and reputation model presents a modular approach to trust and reputation from different information sources, according to availability, interaction trust, role-based trust, witness reputation, and certified reputation. However, FIRE model does not consider malicious activity and possible collusive behavior in the...
Greedy and Contention-based forwarding schemes perform data routing hop-by-hop, without discovering the end-to-end route to the destination. Accordingly, the neighboring node that satisfies specific criteria is selected as the next forwarder of the packet. Both schemes require the nodes participating in the selection process to be within the area that confronts the location of the destination. Therefore,...
In Mobile Social Networks (MSN) users can participate in communication based on their mutual interests. Typical implementations of Social Networks involve client/server architecture where a user needs to subscribe to a server for content sharing with other clients. Popular Online Social Network providers have recently extended the web based service into the mobile domain. However due to mobility and...
This paper presents an original analytical model for a finite buffer queueing system with active queue management (AQM) where the dynamic channel conditions are captured by Markov-modulated Poisson processes. The model derives the close-form expressions of performance metrics including the mean number of packets in the system and in the queue, throughput, response time, delay, packet loss probability...
Wireless mesh networks (WMNs) are emerging as a key technology for the next-generation wireless networks owing to its attractive properties, such as dynamic self-organisation, quick deployment, easy maintenance, low cost, and high scalability. In this paper, we develop an analytical model to investigate the end-to-end delay in a random-access two-tier (i.e., the backhaul tier and access tier) WMN...
In Mobile Social Networks (MSN) users can participate in communication based on their mutual interests. Many solutions for Mobile Ad Hoc networks have been proposed however content based communication in partially or intermittently connected MANETs has been a recent research area. In this paper we present an adaptive protocol to facilitate implementation of a Mobile Social Network based on peer to...
Mobile ad-hoc network (MANET) is an appealing technology that has attracted lots of research efforts over past years. Although the principle of wireless, structure-less, dynamic networks is attractive, there are still some major flaws that prevent commercial expansion. Security is one of these main barriers; MANETs are known to be particularly vulnerable to security attack. One solution proposed to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.