{"title":"Modeling opportunistic application spreading","authors":"Ádám Horváth","doi":"10.1145/1755743.1755791","DOIUrl":null,"url":null,"abstract":"Investigating information spreading via opportunistic connections between mobile devices is a popular research topic today. However, studying the characteristics of application spreading via such a way has not got too much attention so far. In this extended abstract, we propose the use of Closed Queuing Networks to model application spreading which tries to capture not only the opportunistic connection possibilities but also the users' behavior. In the future, we want to examine how to set the parameters of our model, and run simulations to evaluate it.","PeriodicalId":198518,"journal":{"name":"International Workshop on Mobile Opportunistic Networks","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Workshop on Mobile Opportunistic Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/1755743.1755791","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Investigating information spreading via opportunistic connections between mobile devices is a popular research topic today. However, studying the characteristics of application spreading via such a way has not got too much attention so far. In this extended abstract, we propose the use of Closed Queuing Networks to model application spreading which tries to capture not only the opportunistic connection possibilities but also the users' behavior. In the future, we want to examine how to set the parameters of our model, and run simulations to evaluate it.