Advertisement

Cellular Automata and Agents in Simulations

  • Kim Smith
  • Richard Hill
  • Stuart BerryEmail author
  • Richard Conniss
Chapter
Part of the Simulation Foundations, Methods and Applications book series (SFMA)

Abstract

The average mobile phone and tablet that is now available has more computing power than even a year ago. In particular, the inclusion of Wi-fi capability enables such devices to be used as part of a Wi-fi-based information sharing network without needing to modify the existing mobile telephone infrastructure. In addition to this, the ability to create decentralized wireless ad hoc networks means that there is no reliance upon any form of network infrastructure, such as switches, routers, access points and servers.

Keywords

Mobile Device Cellular Automaton Opportunistic Network Service Advertisement Emergency Exit 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Camp T, Boleng J, Davies VA (2002) Survey of mobility models for ad hoc network research. Wireless communications & mobile computing (WCMC): Special issue on mobile ad hoc networking: research, trends and applications, vol 2, pp 483–502Google Scholar
  2. 2.
    Johnson DB, Maltz DA (1996) Dynamic source routing in ad hoc wireless networks. In: Mobile computing, Kluwer Academic Publishers, pp 153–181Google Scholar
  3. 3.
    Choffnes DR, Bustamante FE (2005) An integrated mobility and traffic model for vehicular wireless networks. In: Proceedings of the 2nd ACM international workshop on vehicular ad-hoc networks, pp 69–78Google Scholar
  4. 4.
    Yu S, Al-Jadir L, Spaccapietra S (2005) Matching user’s semantics with data semantics in location-based services, 1st workshop on Semantics in Mobile Environments (SME’05)Google Scholar
  5. 5.
    Smith A, Berry S (2012) Evaluation of a framework for measuring efficiency in opportunistic ad-hoc networks, emerging intelligent data and web technologies. In: 3rd international conferenceGoogle Scholar
  6. 6.
    Smith A, Hill R (2011) Towards framework for the evaluation of efficient provisioning in opportunistic ad-hoc networks. In: Proceedings of the 2011 international conference on P2P, IEEE Computer SocietyGoogle Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  • Kim Smith
    • 1
  • Richard Hill
    • 1
  • Stuart Berry
    • 1
    Email author
  • Richard Conniss
    • 1
  1. 1.College of Engineering and TechnologyUniversity of DerbyDerbyUK

Personalised recommendations