Nadjet Belblidia

Learn More
A common assumption in intermittently-connected (or opportunistic) mobile networks is that any contact has enough capacity to transfer the required amount of data. Although such an assumption is reasonable for analytical purposes and when contents are small, it does not hold anymore when users produce contents that are larger than the capacity of a contact.(More)
A common assumption in intermittently-connected (or opportunistic) mobile networks is that any contact has enough capacity to transfer the required amount of data. Although such an assumption is reasonable for analytical purposes and when contents are small, it does not hold anymore when nodes produce contents that are larger than the capacity of a contact.(More)
1. CONTEXT AND MOTIVATION Enabling content sharing among mobile users is a promising application for opportunistic networks. Clearly, collo-cated people are likely to share mutual interests. In this context, disseminating contents through opportunistic communications could be more efficient than passing through central servers. We implemented PACS(More)
Achieving efficient content dissemination in mobile opportunistic networks becomes a big challenge when content sizes are large and require more capacity than what contact opportunities between nodes may offer. Content fragmentation solves only part of the problem, as nodes still need to decide which fragment to send when a contact happens. To address this(More)
—Is the temporal dimension alone sufficient to characterize contacts in opportunistic networks? Several studies analyze the temporal aspect of contacts with significant results concerning contact and inter-contact distributions. Nevertheless, only the temporal dimension does not give a complete overview of contact characterization. In this paper, we propose(More)
Disseminating large files in opportunistic networks requires splitting the content into smaller pieces in order to leverage short contacts between nodes on the move. A negative consequence of content chopping is that it may generate significant overhead, as nodes have to exchange more signaling information to determine which pieces the neighbor misses. In(More)
Is temporal dimension knowledge alone sufficient to characterize contacts in opportunistic networks? Several studies analyze the temporal aspect of contacts with significant results concerning the contact and inter-contact duration. Nevertheless, only the temporal dimension does not give a complete overview of contact characterization. We propose the(More)
A growing number of works on disruption-tolerant networks (DTN) are based on datasets obtained through real-word experiments. Nevertheless, these datasets do not give any explicit information about the contact surrounding environments. Indeed, the contacts are only shown in terms of duration. In this paper, we propose to enrich the DTN datasets with a "(More)
  • 1