Journal of Computer Applications ›› 2014, Vol. 34 ›› Issue (9): 2476-2481.DOI: 10.11772/j.issn.1001-9081.2014.09.2476
• Network and communications • Previous Articles Next Articles
DAI Chenqu,LI Jianbo,YOU Lei,XU Jixing
Received:
2014-02-10
Revised:
2014-03-18
Online:
2014-09-30
Published:
2014-09-01
Contact:
LI Jianbo
Supported by:
Foundation Research Project of Qingdao Science and Technology Plan
戴晨曲,李建波,由磊,徐吉兴
通讯作者:
李建波
作者简介:
基金资助:
青岛市科技计划基础研究项目;山东省自然科学基金资助项目;山东省教育厅项目
CLC Number:
DAI Chenqu LI Jianbo YOU Lei XU Jixing. Routing algorithm based on node similarity in delay/disruption tolerant networks[J]. Journal of Computer Applications, 2014, 34(9): 2476-2481.
戴晨曲 李建波 由磊 徐吉兴. 基于节点相似性的容延/容断网络路由算法[J]. 计算机应用, 2014, 34(9): 2476-2481.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2014.09.2476
[1]FALL K. A delay-tolerant network architecture for challenged Internets [C]// Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication. New York: ACM, 2003: 27-34.
[2]ZHANG L, ZHOU X, WANG J, et al.Routing protocols for delay and disruption tolerant networks [J]. Journal of Software, 2010, 21(10): 2554-2572. (张龙,周贤伟,王建萍,等. 容迟与容断网络中的路由协议[J]. 软件学报, 2010, 21(10):2554-2572.)
[3]AKKAYA K, YOUNIS M. A survey on routing protocols for wireless sensor networks [J]. Ad Hoc Networks, 2005, 3(3):325-349.
[4]WU H, FUJIMOTO R, GUENSLER R, et al.MDDV: a mobility-centric data dissemination algorithm for vehicular networks [C]// VANET '04: Proceedings of the 1st ACM International Workshop on Vehicular Ad Hoc Networks. New York: ACM, 2004: 47-56.
[5]PEREIRA P R, CASACA A, RODRIGUES J J P C, et al.From delay-tolerant networks to vehicular delay-tolerant networks [J]. IEEE Communications Surveys & Tutorials, 2012, 14(4):1166-1182.
[6]SOARES V, RODRIGUES J, FARAHMAND F. GeoSpray: a geographic routing protocol for vehicular delay-tolerant networks [J]. Information Fusion, 2011, 15:102-113.
[7]GUO Z, WANG B, CUI J. Generic prediction assisted single-copy routing in underwater delay tolerant sensor networks [J]. Ad Hoc Networks, 2013, 11(3):1136-1149.
[8]DEMMER M, FALL K. DTLSR: Delay tolerant routing for developing regions [C]// Proceedings of the 2007 Workshop on Networked Systems for Developing Regions. New York: ACM, 2007: No.5.
[9]JAIN S, FALL K, PATRA R. Routing in a delay tolerant networks [C]// Proceedings of the 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications. New York: ACM, 2004:145-158.
[10]AHMED S, KANHERE S. A Bayesian routing framework for delay tolerant networks [C]// WCNC 2010: Proceedings of the 2010 IEEE Wireless Communications and Networking Conference. Piscataway: IEEE, 2010:1-6
[11]GUO Z, WANG B, CUI J. Prediction assisted single-copy routing in underwater delay tolerant networks [C]// GLOBECOM 2010: Proceedings of the Global Telecommunications Conference. Piscataway: IEEE, 2010: 1-6
[12]SPYROPOULOS T, PSOUNIS K, RAGHAVENDRA C S. Spray and wait: an efficient routing scheme for intermittently connected mobile networks [C]// WDTN '05: Proceedings of the 2005 ACM SIGCOMM Workshop on Delay-Tolerant Networking. New York: ACM, 2005: 252-259.
[13]LINDGREN A, DORIA A, SCHELEN O. Probabilistic routing in intermittently connected networks [J]. ACM SIGMOBILE Mobile Computing and Communications Review, 2003, 7(3):19-20.
[14]JAIN S, DEMMER M, PATRA R, et al.Using redundancy to cope with failures in a delay tolerant networks [C]// Proceedings of the 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications. New York: ACM, 2005:109-120.
[15]WANG Y, JAIN S, MARTONOSI M, et al.Erasure-coding based routing for opportunistic networks [C]// Proceedings of the 2005 ACM SIGCOMM Workshop on Delay-Tolerant Networking. New York: ACM, 2005:229-236.
[16]WIDMER J, BOUDEC J. Network coding for efficient communication in extreme networks [C]// Proceedings of the 2005 ACM SIGCOMM Workshop on Delay-Tolerant Networking. New York: ACM, 2005:284-291.
[17]LIU C, WU J. On Multicopy opportunistic forwarding protocols in nondeterministic delay tolerant networks [J]. IEEE Transactions on Parallel and Distributed Systems, 2012, 23(6):1121-1128
[18]ZHU Y, XU B, SHI X, et al.A survey of social-based routing in delay tolerant networks: positive and negative social effects [J]. IEEE Communications Surveys & Tutorials, 2013, 15(1):387 - 401
[19]VAHDAT A, BECKER D. Epidemic routing for partially connected Ad Hoc networks, CS-2000-06 [R]. Durham: Duke University, Department of Computer Science, 2000.
[20]KERANEN A, OTT J, KARKKAINEN T. The ONE simulator for DTN protocol evaluation [C]// Proceedings of the 2nd International Conference on Simulation Tools and Techniques. New York: ACM, 2009: No.55. |
[1] | ZONG Xuejun, HAN Bing, WANG Guogang, NING Bowei, HE Kan, LIAN Lian. TDRFuzzer: fuzzy testing method for industrial control protocols based on adaptive dynamic interval strategy [J]. Journal of Computer Applications, 0, (): 0-0. |
[2] | Ming ZHANG, Le FU, Haifeng WANG. Relay control model for concurrent data flow in edge computing [J]. Journal of Computer Applications, 2024, 44(12): 3876-3883. |
[3] | . Survey of DNS tunneling detection technology research [J]. Journal of Computer Applications, 0, (): 0-0. |
[4] | . Large scale IoT binary component identification based on named entity recognition [J]. Journal of Computer Applications, 0, (): 0-0. |
[5] | Yixi LIU, Jun HE, Bo WU, Bingtong LIU, Ziyu LI. Survey of software security testing techniques in DevSecOps [J]. Journal of Computer Applications, 2024, 44(11): 3470-3478. |
[6] | Chuanlin PANG, Rui TANG, Ruizhi ZHANG, Chuan LIU, Jia LIU, Shibo YUE. Distributed power allocation algorithm based on graph convolutional network for D2D communication systems [J]. Journal of Computer Applications, 2024, 44(9): 2855-2862. |
[7] | Jiepo FANG, Chongben TAO. Hybrid internet of vehicles intrusion detection system for zero-day attacks [J]. Journal of Computer Applications, 2024, 44(9): 2763-2769. |
[8] | ZHANG Yiming, CAO Tengfei. Federated Learning Optimization Algorithm based on Local Drift and Diversity Computing Power [J]. Journal of Computer Applications, 0, (): 0-0. |
[9] | Hang XU, Zhi YANG, Xingyuan CHEN, Bing HAN, Xuehui DU. Coverage-guided fuzzing based on adaptive sensitive region mutation [J]. Journal of Computer Applications, 2024, 44(8): 2528-2535. |
[10] | Hong CHEN, Bing QI, Haibo JIN, Cong WU, Li’ang ZHANG. Class-imbalanced traffic abnormal detection based on 1D-CNN and BiGRU [J]. Journal of Computer Applications, 2024, 44(8): 2493-2499. |
[11] |
GENG Haijun, DONG Yun, HU Zhiguo, CHI Haotian, YANG Jing, YIN Xia.
Encrypted traffic classification method based on Attention-1DCNN-CE#br#
#br#
[J]. Journal of Computer Applications, 0, (): 0-0.
|
[12] | . Summary of network intrusion detection systems based on deep learning [J]. Journal of Computer Applications, 0, (): 0-0. |
[13] | CHEN Ruilong, HU Tao, BU Youjun, YI Peng, HU Xianjun, QIAO Wei. Stacking ensemble adversarial defense method for encrypted malicious traffic detection model [J]. Journal of Computer Applications, 0, (): 0-0. |
[14] | Zhongdai WU, Dezhi HAN, Haibao JIANG, Cheng FENG, Bing HAN, Chongqing CHEN. Review of marine ship communication cybersecurity [J]. Journal of Computer Applications, 2024, 44(7): 2123-2136. |
[15] | Zihao YAO, Yuanming LI, Ziqiang MA, Yang LI, Lianggen WEI. Multi-object cache side-channel attack detection model based on machine learning [J]. Journal of Computer Applications, 2024, 44(6): 1862-1871. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||