Abstract is missing.
- Time-reference distribution in delay tolerant networksJohannes Morgenroth, Lars C. Wolf. 1-8 [doi]
- Free-riding the BitTorrent DHT to improve DTN connectivitySebastian Schildt, Till Lorentzen, Johannes Morgenroth, Wolf-Bastian Pöttner, Lars C. Wolf. 9-16 [doi]
- MADServer: a server architecture for mobile advanced deliveryAgoston Petz, Anders Lindgren, Pan Hui, Christine Julien. 17-22 [doi]
- LoadingZones: leveraging street parking to enable vehicular internet accessRiccardo Crepaldi, Ryan Beavers, Braden Ehrat, Matt Jaeger, Steven Biersteker, Robin Kravets. 23-30 [doi]
- Enabling ad-hoc-style communication in public WLAN hot-spotsTeemu Kärkkäinen, Mikko Pitkänen, Jörg Ott. 31-38 [doi]
- Performance evaluation of DTN implementations on a large-scale network emulation testbedRazvan Beuran, Shinsuke Miwa, Yoichi Shinoda. 39-42 [doi]
- A secure content network in spaceCraig Partridge, Robert Walsh, Matthew Gillen, Gregory Lauer, John Lowry, W. Timothy Strayer, Derrick Kong, David Levin, Joseph P. Loyall, Michael Paulitsch. 43-50 [doi]
- Nullspace-based stopping conditions for network-coded transmissions in DTNsAngela Hennessy, Alex Gladd, Brenton D. Walker. 51-56 [doi]
- An analysis of evaluation practices for DTN routing protocolsSamo Grasic, Anders Lindgren. 57-64 [doi]
- Flow control mechanisms for the bundle protocol in IEEE 802.15.4 low-power networksWolf-Bastian Pöttner, Lars Christian Wolf. 65-68 [doi]
- Adaptive usage of cellular and WiFi bandwidth: an optimal scheduling formulationOzlem Bilgir Yetim, Margaret Martonosi. 69-72 [doi]
- Pocket backup storage system with cloud integrationKarthik Nilakant, Eiko Yoneki. 73-74 [doi]
- A performance comparison of DTN bundle protocol implementations on resource constrained nodesGleneesha M. Johnson Williams, Brenton D. Walker, Angela Hennessy. 75-78 [doi]
- Adaptive user anonymity for mobile opportunistic networksMilena Radenkovic, Ivan Vaghi. 79-82 [doi]
- SCAMPI application platformTeemu Kärkkäinen, Mikko Pitkänen, Paul Houghton, Jörg Ott. 83-86 [doi]
- Is it worth taking a planned approach to design ad hoc infrastructure for post disaster communication?Sujoy Saha, Vijay Kumar Shah, Rohit Verma, Ratna Mandal, Subrata Nandi. 87-90 [doi]