References(25)
[3]
He Z., Cai Z., and Wang X., Modeling propagation dynamics and developing optimized countermeasures for rumor spreading in online social networks, in Distributed Computing Systems (ICDCS), 2015, pp. 205-214.
[4]
Bandyopadhyay D. and Sen J., Internet of things: Applications and challenges in technology and standardization, Wireless Personal Communications, vol. 58, no. 1, pp. 49-69, 2011.
[5]
Zheng X., Cai Z., Li J., and Gao H., An application aware scheduling policy for real-time traffic, in Distributed Computing Systems (ICDCS), 2015, pp. 421-430.
[6]
Zheng X., Cai Z., Li J., and Gao H., A study on application-aware scheduling inwireless networks, IEEE Transactions on Mobile Computing, .
[7]
Zhang L., Wang X., Lu J., Ren M., Duan Z., and Cai Z., A novel contact prediction-based routing scheme for DTNs, Transactions on Emerging Telecommunications Technologies, .
[8]
Zhuo J., Lu H., Lu Z., and Li Y., Scalable routing algorithm for partial matches in P2P systems, (in Chinese), Journal of Tsinghua University (Science and Technology), vol. 44, no. 10, pp. 1389-1393, 2004.
[9]
Zhao Q., Xu L., Mao Y., Leng S., Min G., Hu J., and Najjari N., Service-oriented wireless multimedia multicasting with partial frequency reuse, Tsinghua Science and Technology, vol. 21, no. 6, pp. 598-609, 2016.
[10]
Zheng X., Cai Z., Li J., and Gao H., Location-privacy- aware review publication mechanism for local business service systems, presented at the 36th Annual IEEE International Conference on Computer Communications (INFOCOM 2017), Atlanta, GA, USA, 2017.
[11]
Han M., Liang Y., Duan Z., and Wang Y., Mining public business knowledge: A case study in SEC’s EDGAR, in Big Data and Cloud Computing (BDCloud), Social Computing and Networking (SocialCom), Sustainable Computing and Communications (SustainCom)(BDCloud-SocialCom-SustainCom), 2016, pp. 393-400.
[12]
Barbera M. V., Stefa J., Viana A. C., Amorim M. D., and Boc M., VIP delegation: Enabling VIPs to offload data in wireless social mobile networks, in 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS), 2011, pp. 1-8.
[13]
Han B., Hui P., Kumar V. S., Marathe M. V., Pei G., and Srinivasan A., Cellular traffic offloading through opportunistic communications: A case study, in Proc. 5th ACM Workshop on Challenged Networks, 2010, pp. 31-38.
[14]
Cai Z., He Z., Guan X., and Li Y., Collective data sanitization for preventing sensitive information inference attacks in social networks, IEEE Transactions on Dependable and Secure Computing, .
[15]
Li Y., Su G., Hui P., Jin D., Su L., and Zeng L., Multiple mobile data offloading through delay tolerant networks, in Proc. 6th ACM Workshop on Challenged Networks, 2011, pp. 43-48.
[16]
Costa P., Mascolo C., Musolesi M., and Picco G. P., Socially-aware routing for publish-subscribe in delay tolerant mobile ad hoc networks, IEEE Journal on Selected Areas in Communications, vol. 26, no. 5, pp. 748-760, 2008.
[17]
Zhuo X., Gao W., Cao G., and Dai Y., Win-Coupon: An incentive framework for 3G traffic offloading, in 19th IEEE International Conference on Network Protocols, 2011, pp. 206-215.
[18]
Duan Z., Yan M., Cai Z., Wang X., Han M., and Li Y., Truthful incentive mechanisms for social cost minimization in mobile crowdsourcing systems, Sensors, vol. 16, no. 4, p. 481, 2016.
[19]
Anderegg L. and Eidenbenz S., Ad hoc-VCG: A truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents, in Proc. 9th Annual International Conference on Mobile Computing and Networking, 2003, pp. 245-259.
[20]
Wang W., Li X., and Wang Y., Truthful multicast routing in selfish wireless networks, in Proc. 10th Annual International Conference on Mobile Computing and Networking, 2004, pp. 245-259.
[21]
Li J., Cai Z., Yan M., and Li Y., Using crowdsourced data in location-based social networks to explore influence maximization, in The 35th Annual IEEE International Conference on Computer Communications, IEEE INFOCOM 2016, 2016.
[22]
He Z., Cai Z., Yu J., Wang X., Sun Y., and Li Y., Cost- efficient strategies for restraining rumor spreading in mobile social networks, IEEE Transactions on Vehicular Technology, vol. 66, no. 3, pp. 2789-2800, 2016.
[23]
Zhang L., Wang X., Lu J., Ren M., Duan Z., and Cai Z., A novel contact prediction based routing scheme for DTNs, Transactions on Emerging Telecommunications Technologies, .
[24]
Liu G., Krishnamani J., Sunderraman R., and Li Y., Prediction-based routing with packet scheduling under temporal constraint in delay tolerant networks, presented at the IEEE 32nd International Performance Computing and Communications Conference (IPCCC), 2013, pp. 1-7.
[25]
Gao W., Li Q., Zhao B., and Cao G., Multicasting in delay tolerant networks: A social network perspective, in Proc. Tenth ACM International Symposium on Mobile Ad hoc Networking and Computing, 2009, pp. 299-308.