W.Wang et aL/Computer Communications 83(2016)45-55 55 [9]T Spyropoulos.K.Psounis.C.S.Raghavendra.Spray and wait:an efficient rout- [24]M.Grossglauser,D.Tse.Mobility increases the capacity of ad hoc wireless net ing scheme for intermittently connected mobile networks,in:Proceedings of works,IEEE/ACM Trans.Netw.10(4)(2002)477-486. ACM SIGCOMM workshop on Delay-tolerant networking.2005,pp.252-259. [25]2012.IEEE standard for information technology telecommunications and infor [10]J.Liu,X.Jiang.H.Nishiyama,N.Kato,Delay and capacity in ad hoc mobile net- mation exchange between systems local and metropolitan area networksspe- works with f-cast relay algorithms.IEEE Trans.Wirel.Commun.10 (8)(2011) cinc requtrements part 11:Wireless lan medium access control (MAC)and 2738-2751. physical layer(PHY)specifications,IEEE Std 802.11-2012. [11]C.Boldrini,M.Conti,A.Passarella,Performance modelling of opportunistic for- [26]I.Huang.F.Qian,A.Gerber.Z.M.Mao,S.Sen.O.Spatscheck,A close exami- warding under heterogenous mobility.Comput.Commun.48(2014)56-70. nation of performance and power characteristics of 4G LTE networks,in:Pro- [12]P.Sermpezis.T.Spyropoulos.Understanding the effects of social selfishness on ceedings of ACM MobiSys,2012.pp.225-238. the performance of heterogeneous opportunistic networks,Comput.Commun [27]X.Zhuo.W.Gao,G.Cao,Y.Dai,Win-coupon:an incentive framework for 3g 48(2014)71-83 traffic offloading.in:Proceedings of IEEE ICNP.2011. [13]S.loannidis.L Massoulie.A.Chaintreau.Distributed caching over heteroge- 128]J.Burgess.B.Gallagher,D.Jensen.B.N.Levine.Maxprop:routing for vehi- neous mobile networks,in:Proceedings of ACM SIGMETRICS.2010. cle-based disruption-tolerant networks,in:Proceedings of IEEE INFOCOM.6. [14]S.loannidis.A.Chaintreau,L.Massoulie.Optimal and scalable distribution of 2006,pp.1-11. content updates over a mobile social network,in:Proceedings of IEEE INFO- [29]Y.Huang.TZ Fu,D.-M.Chiu,J.Lui,C.Huang.Challenges,design and analysis C0M.2009,pp.1422-1430. of a large-scale P2P-VoD system,in:ACM SIGCOMM Computer Communication [15]W.Gao.G.Cao.A.lyengar.M.Srivatsa,Supporting cooperative caching in dis- Review.38.2008.pp.375-388. ruption tolerant networks,in:Proceedings of IEEE ICDCS.2011. [30]W.Wang.V.Srinivasan,M.Motani.Adaptive contact probing mechanisms [16]W.Peng.F.Li.X.Zou,J.Wu.The virtue of patience:offloading topical cellu- for delay tolerant applications.in:Proceedings of ACM MobiCom,2007. lar content through opportunistic links,in:Proceedings of IEEE MASS,2013 pp.230-241. pp.402-410. [31]X.Zhuo.Q.Li,W.Gao,G.Cao,Y.Dai,Contact duration aware data replication [17]K.Chen,H.Shen.H.Zhang.Leveraging social networks for P2P content-based in delay tolerant networks,in:Proceedings of IEEE ICNP,2011. file sharing in disconnected manets.IEEE Trans.Mobile Comput.13(2)(2014) [32]R.Groenevelt.Stochastic models in mobile ad hoc networks.University of Nice. 235-249. 2010 Ph.d thesis. [18]W.Gao,G.Cao,User-centric data dissemination in disruption tolerant net- [33]H.Zhu,L Fu.G.Xue.Y.Zhu.M.Li.LM.Ni.Recognizing exponential inter-con- works,in:Proceedings of IEEE INFOCOM,2011. tact time in VANETs,in:Proceedings of IEEE INFOCOM,2010. Bayhan,E Hyyta.J.Kangashanu.J.Ott.Seeker-assisted intormation sea [34]S.M.Ross,Stochastic processes,Wiley,1983. in mobile clouds.in:Proceedings o ACM SIGCOMM workshop on Mobile cloud 35]N.Eagle.A.Pentland.Reality mining:sensing complex social systems.Personal computing,2013.pp.9-14. Ubiquitous Comput.10 (4)(2006)255-268. [20]E.Hyytia,S.Bayhan,J.Ott,J.Kangasharju,Searching a needle in (linear)op- 36]S.Liu.A.D.Striegel.Explori ng the potential in practice for opportunistic net- portunistic networks,in:Proceedings of ACM MSWiM,2014.pp.187-196. works amongst smart mobile devices,in:Proceedings of ACM MobiCom,2013. [21]N.Golrezaei,K.Shanmugam.A.Dimakis,A.Molisch.G.Caire.Femtocaching: pp.315-326. wireless video content delivery through distributed caching helpers.in:Pro- [37]S.P.Boyd.L Vandenberghe,Convex Optimization,Cambridge university press. ceedings of IEEE INFOCOM,2012. 2004. 122]G.M.Lee.S.Rallapalli,W.Dong.Y.-C.Chen,L.Qit Y.Zhang.Mobile video de 38]S.H.Low.D.E.Lapsley,Optimization flow control-l:basic algorithm and con livery via human movement,in:Proceedings of IEEE SECON,2013. vergence,IEEE/ACM Trans.Netw.7 (6)(1999)861-874. [23]K.Chen.H.Shen,Maximizing P2P file access availability in mobile ad hoc net- [39]L Breslau,P.Cao.L Fan,G.Phillips,S.Shenker.Web caching and zipf-like dis- works though replication for efficient file sharing.IEEE Trans.Comput.64 (4) tributions:evidence and implications,in:Proceedings of IEEE INFOCOM,1999. 20151029-1042W. Wang et al. / Computer Communications 83 (2016) 45–55 55 [9] T. Spyropoulos, K. Psounis, C.S. Raghavendra, Spray and wait: an efficient routing scheme for intermittently connected mobile networks, in: Proceedings of ACM SIGCOMM workshop on Delay-tolerant networking, 2005, pp. 252–259. [10] J. Liu, X. Jiang, H. Nishiyama, N. Kato, Delay and capacity in ad hoc mobile networks with f-cast relay algorithms, IEEE Trans. Wirel. Commun. 10 (8) (2011) 2738–2751. [11] C. Boldrini, M. Conti, A. Passarella, Performance modelling of opportunistic forwarding under heterogenous mobility, Comput. Commun. 48 (2014) 56–70. [12] P. Sermpezis, T. Spyropoulos, Understanding the effects of social selfishness on the performance of heterogeneous opportunistic networks, Comput. Commun. 48 (2014) 71–83. [13] S. Ioannidis, L. Massoulie, A. Chaintreau, Distributed caching over heterogeneous mobile networks, in: Proceedings of ACM SIGMETRICS, 2010. [14] S. Ioannidis, A. Chaintreau, L. Massoulié, Optimal and scalable distribution of content updates over a mobile social network, in: Proceedings of IEEE INFOCOM, 2009, pp. 1422–1430. [15] W. Gao, G. Cao, A. Iyengar, M. Srivatsa, Supporting cooperative caching in disruption tolerant networks, in: Proceedings of IEEE ICDCS, 2011. [16] W. Peng, F. Li, X. Zou, J. Wu, The virtue of patience: offloading topical cellular content through opportunistic links, in: Proceedings of IEEE MASS, 2013, pp. 402–410. [17] K. Chen, H. Shen, H. Zhang, Leveraging social networks for P2P content-based file sharing in disconnected manets, IEEE Trans. Mobile Comput. 13 (2) (2014) 235–249. [18] W. Gao, G. Cao, User-centric data dissemination in disruption tolerant networks, in: Proceedings of IEEE INFOCOM, 2011. [19] S. Bayhan, E. Hyytiä, J. Kangasharju, J. Ott, Seeker-assisted information search in mobile clouds, in: Proceedings of ACM SIGCOMM workshop on Mobile cloud computing, 2013, pp. 9–14. [20] E. Hyytiä, S. Bayhan, J. Ott, J. Kangasharju, Searching a needle in (linear) opportunistic networks, in: Proceedings of ACM MSWiM, 2014, pp. 187–196. [21] N. Golrezaei, K. Shanmugam, A. Dimakis, A. Molisch, G. Caire, Femtocaching: wireless video content delivery through distributed caching helpers, in: Proceedings of IEEE INFOCOM, 2012. [22] G.M. Lee, S. Rallapalli, W. Dong, Y.-C. Chen, L. Qiu, Y. Zhang, Mobile video delivery via human movement, in: Proceedings of IEEE SECON, 2013. [23] K. Chen, H. Shen, Maximizing P2P file access availability in mobile ad hoc networks though replication for efficient file sharing, IEEE Trans. Comput. 64 (4) (2015) 1029–1042. [24] M. Grossglauser, D. Tse, Mobility increases the capacity of ad hoc wireless networks, IEEE/ACM Trans. Netw. 10 (4) (2002) 477–486. [25] 2012, IEEE standard for information technology telecommunications and information exchange between systems local and metropolitan area networksspecific requirements part 11: Wireless lan medium access control (MAC) and physical layer (PHY) specifications, IEEE Std 802.11-2012. [26] J. Huang, F. Qian, A. Gerber, Z.M. Mao, S. Sen, O. Spatscheck, A close examination of performance and power characteristics of 4G LTE networks, in: Proceedings of ACM MobiSys, 2012, pp. 225–238. [27] X. Zhuo, W. Gao, G. Cao, Y. Dai, Win-coupon: an incentive framework for 3g traffic offloading, in: Proceedings of IEEE ICNP, 2011. [28] J. Burgess, B. Gallagher, D. Jensen, B.N. Levine, Maxprop: routing for vehicle-based disruption-tolerant networks, in: Proceedings of IEEE INFOCOM, 6, 2006, pp. 1–11. [29] Y. Huang, T.Z. Fu, D.-M. Chiu, J. Lui, C. Huang, Challenges, design and analysis of a large-scale P2P-VoD system, in: ACM SIGCOMM Computer Communication Review, 38, 2008, pp. 375–388. [30] W. Wang, V. Srinivasan, M. Motani, Adaptive contact probing mechanisms for delay tolerant applications, in: Proceedings of ACM MobiCom, 2007, pp. 230–241. [31] X. Zhuo, Q. Li, W. Gao, G. Cao, Y. Dai, Contact duration aware data replication in delay tolerant networks, in: Proceedings of IEEE ICNP, 2011. [32] R. Groenevelt, Stochastic models in mobile ad hoc networks, University of Nice, 2010 Ph.d thesis. [33] H. Zhu, L. Fu, G. Xue, Y. Zhu, M. Li, L.M. Ni, Recognizing exponential inter-contact time in VANETs, in: Proceedings of IEEE INFOCOM, 2010. [34] S.M. Ross, Stochastic processes, Wiley, 1983. [35] N. Eagle, A. Pentland, Reality mining: sensing complex social systems, Personal Ubiquitous Comput. 10 (4) (2006) 255–268. [36] S. Liu, A.D. Striegel, Exploring the potential in practice for opportunistic networks amongst smart mobile devices, in: Proceedings of ACM MobiCom, 2013, pp. 315–326. [37] S.P. Boyd, L. Vandenberghe, Convex Optimization, Cambridge university press, 2004. [38] S.H. Low, D.E. Lapsley, Optimization flow control–I: basic algorithm and convergence, IEEE/ACM Trans. Netw. 7 (6) (1999) 861–874. [39] L. Breslau, P. Cao, L. Fan, G. Phillips, S. Shenker, Web caching and zipf-like distributions: evidence and implications, in: Proceedings of IEEE INFOCOM, 1999