[1] Zhang Weiwei, Xi Xiaoqiang.The innovation and development of internet of vehicles[J].China Communications, 2016, 13(5):122-127.
[2] Cheng Jiujun, Cheng Junlu, Zhou Mengchu, et al.Routing in internet of vehicles:a review[J].IEEE Transactions on Intelligent Transportation Systems, 2015, 16(5):2339-2352.
[3] Alam K M, Saini M, ElSaddik A.Toward social internet of vehicles:concept, architecture, and applications[J].IEEE Access, 2015(3):343-357.
[4] Hernández-Orallo E, Cano J C, Calafate C T, et al.New approaches for characterizing inter-contact times in opportunistic networks[J].Ad Hoc Networks, 2016, 52:160-172.
[5] 熊永平, 孙利民, 牛建伟, 等.机会网络[J].软件学报, 2009, 20(1):124-137.Xiong Yongping, Sun Limin, Niu Jianwei, et al.Opportunistic networks[J].Journal of Software, 2009, 20(1):124-137.
[6] 李静林, 刘志晗, 杨放春.车联网体系结构及其关键技术[J].北京邮电大学学报, 2014, 37(6):95-100.Li Jinglin, Liu Zhihan, Yang Fangchun.Internet of vehicles:the framework and key technology[J].Journal of Beijing University of Posts and Telecommunications, 2014, 37(6):95-100.
[7] Dede J, Förster A, Hernández-Orallo E, et al.Simulating opportunistic networks:survey and future directions[J].IEEE Communications Surveys & Tutorials, 2018, 20(2):1547-1573.
[8] Le T, Gerla M.Time-constrained anycast routing under short contact duration in delay-tolerant networks[J].Annals of Telecommunications, 2018, 73(9-10):549-558.
[9] Conti M, Giordano S, May M, et al.From opportunistic networks to opportunistic computing[J].Communications Magazine, 2010, 48(9):126-139.
[10] Pramanik A, Choudhury B, Choudhury T S, et al.Simulative study of random waypoint mobility model for mobile Ad hoc networks[C]//Global Conference on Communication Technologies.Nagercoil, Tamil Nadu:IEEE, 2015:112-116.
[11] Zhang Jinbei, Fu Luoyi, Tian Xiaohua, et al.Analysis of random walk mobility models with location heterogeneity[J].IEEE Transactions on Parallel and Distributed Systems, 2015, 26(10):2657-2670.
[12] Carofiglio G, Chiasserini C F, Garetto M, et al.Route stability in MANETs under the random direction mobility model[J].IEEE Transactions on Mobile Computing, 2009, 8(9):1167-1179.
[13] Sharma G and Mazumdar R.Scaling laws for capacity and delay in wireless ad hoc networks with random mobility[C]//2004 IEEE International Conference on Communications, Paris:IEEE, 2004:3869-3873.
[14] Cai H, Eun D Y.Crossing over the bounded domain:from exponential to power-law inter-meeting time in manet[C]//Proceedings of the 13th Annual ACM International Conference on Mobile Computing and Networking.New York:ACM, 2007:159-170.
[15] Yuan Peiyan, Yu Hai, Liu Ping.User contact behavior analysis:a social relationship perspective[C]//Proceedings of the 11th EAI International Conference on Mobile Multimedia Communications.Brussels:ICST, 2018:143-152.
[16] Chaintreau A, Hui P, Crowcroft J.Impact of human mobility on the design of opportunistic forwarding algorithms[C]//The 25th IEEE International Conference on Computer Communications.Barcelona:IEEE, 2006:1-13.
[17] Hui P, Chaintreau A, Scott J, et al.Pocket switched networks and human mobility in conference environments[C]//Proceedings of the 2005 ACM SIGCOMM Workshop on Delay-Tolerant Networking.New York:ACM, 2005:244-251.
[18] Henderson T, Kotz D, Abyzov I.The changing usage of a mature campus-wide wireless network[C]//Proceedings of the 10th Annual International Conference on Mobile Computing and Networking.New York:ACM, 2008:187-201.
[19] Zhang Xiaolan, Kurose J, Levine B N, et al.Study of a bus-based disruption-tolerant network:mobility modeling and impact on routing[C]//Proceedings of the 13th Annual ACM International Conference on Mobile Computing and Networking.New York:ACM, 2007:195-206.
[20] Zhu Hongzi, Li Minglu, Fu Luoyi, et al.Impact of traffic influxes:revealing exponential intercontact time in urban vanets[J].Parallel and Distributed Systems, 2011, 22(8):1258-1266.
[21] Li Yong, Jin Depeng, Hui Pan, et al.Revealing contact interval patterns in large scale urban vehicular ad hoc networks[C]//Proceedings of the ACM SIGCOMM 2012 Conference On Applications, Technologies, Architectures, and Protocols For Computer Communication.New York:ACM, 2012:299-300.
[22] Karsai M, Jo H H, Kaski K.Empirical findings in human bursty dynamics[C]//Bursty Human Dynamics.Cham, Switzerland:Springer, 2018:31-46.
[23] Gao Meng, Xiang Longgang, Gong Jianya.Organizing large-scale trajectories with adaptive Geohash-tree based on secondo database[C]//2017 25th International Conference on Geoinformatics.Buffalo:IEEE, 2017:1-6. |