參考文獻 |
[1] A. Carzaniga and A. L. Wolf, “Forwarding in a content-based network,” in ACM SIGCOMM, 2003, pp. 163–174.
[2] V. Jacobson and D. K. S. et al, “Networking named content,” in ACM CoNEXT, 2009, pp. 1–12.
[3] ——, “A data-oriented (and beyond) network architecture,” in ACM SIGCOMM, 2007, pp. 181–192.
[4] Y. Ko and N. H. Vaidya, “Location-aided routing (lar) mobile ad hoc networks,” ACM MOBICOM, vol. 6, pp. 307–321, Jul. 1998.
[5] ——, “Geotora: a protocol for geocasting in mobile ad hoc networks.” in IEEE ICNP, 2000, pp. 240–250.
[6] ——, “A two-tier data dissemination model for largescale wireless sensor networks,” in ACM MOBICOM, 2002, pp. 148–159.
[7] I. Baev and R. Rajaraman, “Approximation algorithms for data placement in arbitrary networks,” in SODA, 2001, pp. 661–670.
[8] E. Cohen and S. Shenker, “Replication strategies in unstructured peer-topeer networks,” in ACM SIGCOMM, 2002, pp. 177–190.
[9] B. J. Ko and D. Rubenstein, “Distributed, self-stablizing placement of replicated resources in emerging networks,” IEEE ICNP, vol. 13, pp. 476–487, Jun. 2005.
[10] B. Li, M. J. Golin, G. F. Ialiano, and X. Deng, “On the optimal placement of web proxies in the internet,” in IEEE INFOCOM, 1999, pp. 1282 – 1290 vol.3.
[11] L. Qiu, V. N. Padmanabhan, and G. M. Voelker, “On the placement of web server replicas,” in IEEE INFOCOM, 2001, pp. 1587 – 1596 vol.3.
[12] G. Cao, L. Yin, and C. R. Das, “Cooperative cache-based data access in ad hoc networks,” IEEE Computer, vol. 37, no. 2, pp. 32–39, Feb. 2004.
[13] S.-B. Lee, H. Y. S. Wong, K.-W. Lee, and S. Lu, “Content management in a mobile ad hoc network: beyond opportunistic strategy,” IJCNDS, vol. 10, no. 2, pp. 123–145, Feb. 2013.
[14] T. Hara, “Replica allocation methods in ad hoc networks with data update,” Mobile Networks and Applications, vol. 8, no. 4, pp. 343–354, Aug. 2003.
[15] ——, “Replica allocation in ad hoc networks with periodic data update,” in Proceed-ings of International Conference on Mobile Data Management, 2002, pp. 79–86.
[16] M. Fiore, F. Mininni, C. Casetti, and C. F. Chiasserini, “To cache or not to cache?” in IEEE INFOCOM, 2009, pp. 235 – 243.
[17] S. De, “On hop count and euclidean distance in greedy forwarding in wireless ad hoc networks,” IEEE Communications Letters, vol. 9, no. 11, pp. 1000–1002, Nov. 2005.
[18] “The Network Simulator NS-2,” http://www.isi.edu/nsnam/ns/.
[19] “IEEE 802.11,” http://standards.ieee.org/about/get/802/802.11.html.
[20] “Random waypoint model,” http://www.netlab.tkk.fi/ esa/java/rwp/rwpmodel.html. |