Abstract is missing.
- Towards a formalism for routing in challenged networksRam Ramanathan, Prithwish Basu, Rajesh Krishnan. 3-10 [doi]
- Understanding the wireless and mobile network space: a routing-centered classificationVincent Borrel, Mostafa H. Ammar, Ellen W. Zegura. 11-18 [doi]
- Analysis of simple counting protocols for delay-tolerant networksBrenton D. Walker, Joel K. Glenn, T. Charles Clancy. 19-26 [doi]
- Event-driven, role-based mobility in disaster recovery networksSamuel C. Nelson, Albert F. Harris III, Robin Kravets. 27-34 [doi]
- Evaluating opportunistic routing protocols with large realistic contact tracesLibo Song, David Kotz. 35-42 [doi]
- Detecting the presence of nodes in MANETsThi Minh Chau Tran, Björn Scheuermann, Martin Mauve. 43-50 [doi]
- Network interrupts: supporting delay sensitive applications in low power wireless control networksJames Brown, Joe Finney, Christos Efstratiou, Ben Green, Nigel Davies, Mark Lowton, Gerd Kortuem. 51-58 [doi]
- Web search from a busAruna Balasubramanian, Yun Zhou, W. Bruce Croft, Brian Neil Levine, Arun Venkataramani. 59-66 [doi]
- On the performance evaluation and prediction of encounter-based worm interactions based on node characteristicsSapon Tanachaiwiwat, Ahmed Helmy. 67-74 [doi]
- Wireless opportunistic podcasting: implementation and design tradeoffsMartin May, Vincent Lenders, Gunnar Karlsson, Clemens Wacha. 75-82 [doi]
- Data management in human networksCalicrates Policroniades, Pablo Vidales, Martin Roth, Daniel Kreienbühl. 83-90 [doi]
- Enhanced DHCP clientSilvia Giordano, Davide Lenzarini, Alessandro Puiatti, Salvatore Vanini. 91-92 [doi]
- Visualizing community detection in opportunistic networksEiko Yoneki, Pan Hui, Jon Crowcroft. 93-96 [doi]
- Opportunistic email distribution and access in challenged heterogeneous environmentsTuomo Hyyryläinen, Teemu Kärkkäinen, Cheng Luo, Valdas Jaspertas, Jouni Karvo, Jörg Ott. 97-100 [doi]