{"title":"机会应用扩展建模","authors":"Ádám Horváth","doi":"10.1145/1755743.1755791","DOIUrl":null,"url":null,"abstract":"Investigating information spreading via opportunistic connections between mobile devices is a popular research topic today. However, studying the characteristics of application spreading via such a way has not got too much attention so far. In this extended abstract, we propose the use of Closed Queuing Networks to model application spreading which tries to capture not only the opportunistic connection possibilities but also the users' behavior. In the future, we want to examine how to set the parameters of our model, and run simulations to evaluate it.","PeriodicalId":198518,"journal":{"name":"International Workshop on Mobile Opportunistic Networks","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Modeling opportunistic application spreading\",\"authors\":\"Ádám Horváth\",\"doi\":\"10.1145/1755743.1755791\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Investigating information spreading via opportunistic connections between mobile devices is a popular research topic today. However, studying the characteristics of application spreading via such a way has not got too much attention so far. In this extended abstract, we propose the use of Closed Queuing Networks to model application spreading which tries to capture not only the opportunistic connection possibilities but also the users' behavior. In the future, we want to examine how to set the parameters of our model, and run simulations to evaluate it.\",\"PeriodicalId\":198518,\"journal\":{\"name\":\"International Workshop on Mobile Opportunistic Networks\",\"volume\":\"17 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-02-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Workshop on Mobile Opportunistic Networks\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/1755743.1755791\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Workshop on Mobile Opportunistic Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/1755743.1755791","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Investigating information spreading via opportunistic connections between mobile devices is a popular research topic today. However, studying the characteristics of application spreading via such a way has not got too much attention so far. In this extended abstract, we propose the use of Closed Queuing Networks to model application spreading which tries to capture not only the opportunistic connection possibilities but also the users' behavior. In the future, we want to examine how to set the parameters of our model, and run simulations to evaluate it.