1L. Atzori, A. lera, G. Morabito. The Intemet of Things: A Survey[J]. Computer Networks, 2010, 54(15): 2787-2805.
2B. Guo, D. Zhang, Z. Wang. Living with Internet of Things: The Emergence of Embedded Intelligence. Proc[C]. of the 2011 IEEE International Conference on Cyber, Physical, and Social Computing, Dalian, China, 2011.
4D.R. Choffnes, F.E. Bustamante. An integrated mobility and traffic model for vehicular wireless networks. Proc[C]. of the 2nd ACM International Workshop on Vehicular Ad hoc Networks, 2005, pp. 69-78.
5N. Eagle, et al. Inferring Social Network Structure using Mobile Phone Data[C]. Proceedings of the National Academy of Sciences (PNAS), 2007, 106(36):15274-15278.
6B. Guo, Z. Yu, D, Zhang, X. Zhou. Opportunistic loT: Exploring the Social Side of the Intemet of Things[C]. The 16th IEEE IntemationalConference on Computer Supported Cooperative Work in Design (CSCWD 2012), Wuhan, China, 2012.
7L. Lihen, Z. H. Kamal, A. Gupta. Opportunistic Networks: Research Challenges in Specializing the P2P Paradigm[C]. Proc. 3rd International Workshop on P2P Data Management, Security and Trust, 2006, pp. 722-726.
8M. Conti, M. Kumar. Opportunities in Opportunistic Computing[J]. IEEE Computer, 2010, 43(01): 42-50.
10A. Kapadia, N. Tri , C. Cornelius, D. Peebles, D. Kotz. AnonySense: Opportunistic and Privacy-Preserving Context Collection[C]. Proc. of 6th International Conferenfce on Pervasive Computing, 2008, pp. 280-297.