LEADER 01000nam0-2200325---450- 001 990008637140403321 005 20080320113313.0 010 $a978-88-598-0025-5 035 $a000863714 035 $aFED01000863714 035 $a(Aleph)000863714FED01 035 $a000863714 100 $a20080320d2007----km-y0itay50------ba 101 0 $aita 102 $aIT 105 $a--------001yy 200 1 $a<>diritto dello sport$fdiretto da Carlo Guglielmo Izzo, Antonio Merone , Mario Tortora$gcon la collaborazione di Giancarlo Guarino, Giuditta Merone 210 $aTorino$cGiuffrč$d2007 215 $aX, 388 p.$d24 cm 225 1 $aGiurisprudenza sistematica di diritto civile e commerciale 702 1$aIzzo,$bCarlo Guglielmo 702 1$aMerone,$bAntonio 702 1$aTortora,$bMario 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990008637140403321 952 $a1-C-106$b14469$fDDCP 959 $aDDCP 996 $aDirito dello sport$958612 997 $aUNINA LEADER 00940nam0-2200325---450- 001 990008681680403321 005 20080703115958.0 010 $a1-58488-433-9 035 $a000868168 035 $aFED01000868168 035 $a(Aleph)000868168FED01 035 $a000868168 100 $a20080630d2004----km-y0itay50------ba 101 0 $aeng 102 $aUS 105 $aa-------001yy 200 1 $aStatistics for epidemiology$fNicholas P. Jewell 210 $aBoca Raton [etc.]$cChapman & Hall/CRC$d©2004 215 $aXIV, 333 p.$cill.$d25 cm 225 1 $aTexts in statistical science$v58 610 0 $aEpidemiologia$aMetodi statistici 676 $a614.40727$v20$zita 700 1$aJewell,$bNicholas P.$0503591 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990008681680403321 952 $aVI E 1200 (58)$b43247$fFSPBC 959 $aFSPBC 996 $aStatistics for epidemiology$9716713 997 $aUNINA LEADER 07269nam 22006135 450 001 9910842496703321 005 20250808093231.0 010 $a3-031-47866-5 024 7 $a10.1007/978-3-031-47866-6 035 $a(MiAaPQ)EBC31207719 035 $a(Au-PeEL)EBL31207719 035 $a(DE-He213)978-3-031-47866-6 035 $a(CKB)30864578300041 035 $a(EXLCZ)9930864578300041 100 $a20240311d2024 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aOpportunistic Networks $eConcepts and Systems /$fby Anna Förster, Pietro Manzoni, Enrique Hernández Orallo, Koojana Kuladinithi, Asanga Udugama 205 $a1st ed. 2024. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2024. 215 $a1 online resource (201 pages) 311 08$a3-031-47865-7 327 $aI Foundations of Opportunistic Networks -- 1 Mobility of Opportunistic Networks -- 1.1 Scale and density -- 1.2 Collecting mobility traces -- 1.3 From mobility traces to location information -- 1.4 From mobility traces to contact information -- 1.4.1 Converting GPS traces into contact traces -- 1.4.2 Direct gathering of contact traces -- 1.5 Mobility metrics -- 1.6 Large-Scale Mobility Characteristics in OppNets -- 1.7 Impact of mobility on opportunistic networks -- 1.8 Chapter summary -- Problems -- 2 Data Dissemination in Opportunstic Networks -- 2.1 Terms and metrics -- 2.2 Optimal dissemination -- 2.3 Flooding protocols -- 2.3.1 Epidemic Routing -- 2.3.2 Spray and Wait -- 2.3.3 Optimal Stopping Theory -- 2.4 Mobility based protocols -- 2.4.1 Geocasting protocols -- 2.4.2 Speed/direction based protocols -- 2.4.3 Encounter based protocols -- 2.5 Social awareness based protocols -- 2.6 Data content based protocols -- 2.7 Network coding based protocols -- 2.8 Caching in Opportunistic Networks -- 2.9 Chapter summary -- Problems -- 3 Security in Opportunistic Networks -- 3.1 Overview -- 3.2 Types of Attacks -- 3.2.1 Masquerade -- 3.2.2 Eavesdropping . -- 3.2.3 Sabotage -- 3.2.4 Data Manipulation -- 3.2.5 Physical Attacks -- 3.2.6 Free-riding -- 3.3 Attacks Evaluation -- 3.3.1 Evaluation Methodology and Setup -- 3.3.2 Effects of the Attacks -- 3.4 Chapter summary -- Problems -- Part II Evaluation of Opportunistic Networks 4 Overview of Evaluation of Opportunistic Networks -- 4.1 Overview -- 4.2 Methods for evaluating Opportunistic Networks -- 4.3 Metrics for evaluating Opportunistic Networks -- 4.4 Chapter summary -- Problems -- 5 Theoretical Models for Opportunistic Networks -- 5.1 General assumptions and their validity -- 5.2 Markov Chain Models -- 5.2.1 Modeling epidemic diffusion in OppNet -- 5.2.2 Limitations and applications of Markov Chain Models -- 5.3 Compartmental models -- 5.3.1 Basic epidemic model -- 5.3.2 Epidemic model for an open area -- 5.3.3 Limitations and applicationsof Compartmental Models -- 5.4 Other methods -- 5.5 Chapter summary -- Problems -- 6 Simulation models for Opportunistic Networks -- 6.1 Simulation model stack for opportunistic networks -- 6.4 Mobility Models and Contact Traces -- 6.4.1 Terminology -- 6.4.2 Properties of mobility models -- 6.4.3 Contact traces -- 6.4.4 Discussion of mobility models -- 6.5 Simulation Speedup -- 6.6 Chapter summary -- Problems -- 7 Simulation tools for Opportunistic Networks -- 7.1 Discrete event-based simulation -- 7.2 OMNeT++ and the Opportunistic Network Simulator (OPS) -- 7.3 The ONE -- 7.4 Network Simulator 3 (ns-3) -- 7.5 Comparison of simulators -- 7.6 Mobility tools -- 7.7 Chapter summary -- Problems -- 8 Benchmarking Opportunistic Networks -- 8.1 Benchmarks for OppNets -- 8.2 Metrics for comparing opportunistic protocols -- 8.3 Comparing opportunistic protocols -- 8.4 Chapter summary -- Problems -- Part III Implementation of Opportunistic Networks 9 Connectivity Technologies for OpportunisticNetworks -- 9.1 Mobile Ad Hoc Networks -- 9.2 Communication Technologies -- 9.2.1 LoRa -- 9.2.2 Radio Frequency Identification (RFID) -- 9.2.3 Bluetooth Low Energy (BLE) -- 9.2.4 Wi-Fi Direct -- 9.2.5 ZigBee -- 9.2.6 802.11p -- 9.2.7 Satellite communication -- 9.3 Toward 5G and 6G Networks -- 9.4 Related software and libraries -- 9.4.1 Exposure Notifications System (ENS) -- 9.4.2 Apple Multipeer Connectivity. 330 $aThis textbook provides an exhaustive exploration of Opportunistic Networks (OppNets). Divided into three parts, it starts with the foundational principles and metrics of OppNets, detailing their mobility and data dissemination. Significant focus is given to the security challenges faced by OppNets, including strategies to counter various attacks. The second part evaluates OppNets, introducing methods and metrics for assessment, theoretical and simulation models, and tools such as OMNeT++, The ONE and ns-3. This textbook also offers comparative analyses and discussions on benchmarking. The third part delves into the implementation of OppNets, discussing technologies from Mobile Ad Hoc Networks to satellite communication and their integration with cellular technologies like 4G, 5G and 6G. Detailed insight into device characterization reveals the potential and limitations of devices within OppNets. Practical applications of OppNets in scenarios such as disaster management, remote communication, IoT challenges, smart cities and satellite networks are presented as well. Through detailed discussions and case studies, readers gain a comprehensive understanding of the structure, operation and practical implications of OppNets. It equips readers with knowledge to appreciate the vast potential of OppNets in various applications and settings. This textbook targets advanced-level students and postdocs in computer science and electrical engineering as well as researchers, who are starting new in the area and need a comprehensive view of opportunistic networks. Practitioners who are interested in applying the concepts of opportunistic networks in their products and services, and would like to have a jump start into the development and applications of opportunistic networks will also want to purchase this book as a reference. 606 $aComputer networks 606 $aWireless communication systems 606 $aMobile communication systems 606 $aTelecommunication 606 $aComputer Communication Networks 606 $aWireless and Mobile Communication 606 $aCommunications Engineering, Networks 615 0$aComputer networks. 615 0$aWireless communication systems. 615 0$aMobile communication systems. 615 0$aTelecommunication. 615 14$aComputer Communication Networks. 615 24$aWireless and Mobile Communication. 615 24$aCommunications Engineering, Networks. 676 $a004.6 700 $aFörster$b Anna$01430115 701 $aManzoni$b Pietro$0737066 701 $aOrallo$b Enrique Hernández$01732968 701 $aKuladinithi$b Koojana$01732969 701 $aUdugama$b Asanga$01732970 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910842496703321 996 $aOpportunistic Networks$94147937 997 $aUNINA