Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2159576.2159600acmconferencesArticle/Chapter ViewAbstractPublication PagesmobisysConference Proceedingsconference-collections
demonstration

From ego network to social network models

Published: 15 March 2012 Publication History

Abstract

The development of routing protocols for human pervasive networks can not disregard contextual information. Social network models can help researches giving information about human behaviors, e.g. estimating contact opportunities between nodes. In a previous work we defined a model for ego networks while in this work we present a method to integrate ego networks and obtain synthetic social networks ready-to-use for the development of routing protocols.

References

[1]
M. Conti et al., From opportunistic networks to opportunistic computing. Communications Magazine, IEEE, 48(9):126--139, 2010.
[2]
M. Conti et al., A model for the generation of social network graphs. WoWMoM, 2011 IEEE International Symposium on a, june 2011.
[3]
M. Granovetter, The strength of weak ties. American journal of sociology, pages 1360--1380, 1973.
[4]
A. Mislove et al., Measurement and analysis of online social networks. Proceedings of the 7th ACM SIGCOMM, pages 29--42. ACM, 2007.
[5]
J. Onnela et al., Geographic constraints on social network groups. PLoS one, 6(4):e16939, 2011.
[6]
S. Roberts, Constraints on social networks. Proceedings of the British Academy, volume 158, pages 117--138, 2010.
[7]
J. Ugander et al., The Anatomy of the Facebook Social Graph. ArXiv e-prints, Nov. 2011.

Cited By

View all
  • (2020)Investigation of User Vulnerability in Social Networking SiteData Science: New Issues, Challenges and Applications10.1007/978-3-030-39250-5_12(219-234)Online publication date: 13-Feb-2020
  • (2014)Security and trust management in opportunistic networks: a surveySecurity and Communication Networks10.1002/sec.11168:9(1812-1827)Online publication date: 18-Sep-2014

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
MobiOpp '12: Proceedings of the third ACM international workshop on Mobile Opportunistic Networks
March 2012
106 pages
ISBN:9781450312080
DOI:10.1145/2159576

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 15 March 2012

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. human pervasive networks
  2. social networks models

Qualifiers

  • Demonstration

Conference

MobiOpp' 12
Sponsor:
MobiOpp' 12: Workshop on Mobile Opportunistic Networking
March 15 - 16, 2012
Zürich, Switzerland

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 25 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2020)Investigation of User Vulnerability in Social Networking SiteData Science: New Issues, Challenges and Applications10.1007/978-3-030-39250-5_12(219-234)Online publication date: 13-Feb-2020
  • (2014)Security and trust management in opportunistic networks: a surveySecurity and Communication Networks10.1002/sec.11168:9(1812-1827)Online publication date: 18-Sep-2014

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media