Skip to main navigation Skip to search Skip to main content

Opportunistic networks for emergency applications and their standard implementation framework

  • Leszek Lilien
  • , Ajay Gupta
  • , Zijiang Yang
  • Western Michigan University
  • Purdue University

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

62 Scopus citations

Abstract

We present a novel paradigm of opportunistic networks or oppnets in the context of Emergency Preparedness and Response (EPR). Oppnets constitute the category of ad hoc networks where diverse systems, not employed originally as nodes of an oppnet, join it dynamically in order to perform certain tasks they have been called to participate in. After describing the oppnets and their operation, we discuss the Oppnet Virtual Machine (OVM) - a standard implementation framework for oppnet applications. Oppnets can significantly improve effectiveness and efficiency of EPR-one of the six mission areas within the national strategy for Homeland Security. They can also improve other diverse applications, including agriculture, environment, healthcare, manufacturing, surveillance, and transportation. Oppnets should create new application niches as yet hard to imagine. To the best of our knowledge we have been the first to work on oppnets.

Original languageEnglish
Title of host publication27th IEEE International Performance Computing and Communications Conference, IPCCC 07
Pages588-593
Number of pages6
DOIs
StatePublished - 2007
Event27th IEEE International Performance Computing and Communications Conference, IPCCC 07 - New Orleans, LA, United States
Duration: 11 Apr 200713 Apr 2007

Publication series

NameConference Proceedings of the IEEE International Performance, Computing, and Communications Conference

Conference

Conference27th IEEE International Performance Computing and Communications Conference, IPCCC 07
Country/TerritoryUnited States
CityNew Orleans, LA
Period11/04/0713/04/07

Fingerprint

Dive into the research topics of 'Opportunistic networks for emergency applications and their standard implementation framework'. Together they form a unique fingerprint.

Cite this