{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T18:06:56Z","timestamp":1755799616549,"version":"3.44.0"},"reference-count":30,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2018,9,25]],"date-time":"2018-09-25T00:00:00Z","timestamp":1537833600000},"content-version":"vor","delay-in-days":267,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Science & Technology Pillar Program","award":["2015BAH03F02","2016YFE0204500"],"award-info":[{"award-number":["2015BAH03F02","2016YFE0204500"]}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"crossref","award":["2015BAH03F02","2016YFE0204500"],"award-info":[{"award-number":["2015BAH03F02","2016YFE0204500"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2018,1]]},"abstract":"<jats:p>Opportunistic offloading can be utilized to offload computing tasks and traffic data in Mobile Edge Computing (MEC). To improve the ratio of successful data offloading and reduce unnecessary data redundancy in opportunistic forwarding process, some methods of evaluating a device\u2019s forwarding capability are proposed. However, most of these methods do not consider the temporal impact from device mobility and the efficiency influence from the capability computation process. To settle these problems, we proposed a Transient\u2010cluster\u2010based Capability Evaluation Method (TCEM) to evaluate a device\u2019s data forwarding capability. The TCEM can be divided into two steps. The first step aims to reduce computational complexity by evaluating a device\u2019s possibility of contacting the destination within a time constraint based on the transient cluster generated by our proposed Transient Cluster Detection Method (TCDM). The second step is to calculate a device\u2019s probability of directly and indirectly forwarding data to the destination. The probability as a metric of evaluating a device\u2019s forwarding capability can be used in different data forwarding strategies. Simulation results demonstrate that the TCEM\u2010based data forwarding strategy outperforms other data forwarding strategies from the aspect of the proportion of the data delivery ratio to the data redundancy.<\/jats:p>","DOI":"10.1155\/2018\/4801465","type":"journal-article","created":{"date-parts":[[2018,9,25]],"date-time":"2018-09-25T19:31:33Z","timestamp":1537903893000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Efficient Forwarding Capability Evaluation Method for Opportunistic Offloading in Mobile Edge Computing"],"prefix":"10.1155","volume":"2018","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6513-1712","authenticated-orcid":false,"given":"Qian","family":"Wang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0563-6396","authenticated-orcid":false,"given":"Zhipeng","family":"Gao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1877-5982","authenticated-orcid":false,"given":"Kun","family":"Niu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7848-5421","authenticated-orcid":false,"given":"Yang","family":"Yang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7899-539X","authenticated-orcid":false,"given":"Xuesong","family":"Qiu","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2018,9,25]]},"reference":[{"key":"e_1_2_10_1_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2808242"},{"key":"e_1_2_10_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2745201"},{"key":"e_1_2_10_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2016.2524590"},{"key":"e_1_2_10_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.246"},{"key":"e_1_2_10_5_2","doi-asserted-by":"crossref","unstructured":"ErramilliV. CrovellaM. ChaintreauA. andDiotC. Delegation forwarding Proceedings of the 9th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc \u203208) May 2008 251\u2013260 https:\/\/doi.org\/10.1145\/1374618.1374653 2-s2.0-57349185558.","DOI":"10.1145\/1374618.1374653"},{"key":"e_1_2_10_6_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2015.07.017"},{"key":"e_1_2_10_7_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.03.003"},{"key":"e_1_2_10_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2017.2708090"},{"key":"e_1_2_10_9_2","unstructured":"MitchenerW.andVadhatA. Epidemic routing for partially connected ad hoc networks Technical Report CS-2000-06 2000."},{"key":"e_1_2_10_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2014.6829957"},{"key":"e_1_2_10_11_2","doi-asserted-by":"crossref","unstructured":"DalyE. M.andHaahrM. Social network analysis for routing in disconnected delay-tolerant MANETs Proceedings of the 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc\u203207) September 2007 32\u201340 https:\/\/doi.org\/10.1145\/1288107.1288113 2-s2.0-37849017498.","DOI":"10.1145\/1288107.1288113"},{"key":"e_1_2_10_12_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-016-0512-x"},{"key":"e_1_2_10_13_2","doi-asserted-by":"crossref","unstructured":"WuJ. WangJ. LiuL. TanhaM. andPanJ. A data forwarding scheme with reachable probability centrality in DTNs Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC \u203216) April 2016 1\u20136 2-s2.0-84989913221.","DOI":"10.1109\/WCNC.2016.7565160"},{"key":"e_1_2_10_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2008.161"},{"key":"e_1_2_10_15_2","doi-asserted-by":"crossref","unstructured":"AmaralL. SofiaR. MendesP. andMoreiraW. Oi! - Opportunistic data transmission based on Wi-Fi direct Proceedings of the IEEE INFOCOM - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS \u203216) April 2016 San Francisco Calif USA 578\u2013579 https:\/\/doi.org\/10.1109\/INFCOMW.2016.7562142.","DOI":"10.1109\/INFCOMW.2016.7562142"},{"key":"e_1_2_10_16_2","doi-asserted-by":"crossref","unstructured":"MoreiraW. MendesP. andSargentoS. Social-aware opportunistic routing protocol based on users interactions and interests Proceedins of the International Conference on Ad Hoc Networks 2013 Springer 100\u2013115.","DOI":"10.1007\/978-3-319-14225-8_7"},{"key":"e_1_2_10_17_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.08.012"},{"key":"e_1_2_10_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600657"},{"key":"e_1_2_10_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2308200"},{"key":"e_1_2_10_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.249"},{"key":"e_1_2_10_21_2","unstructured":"XieD. WangX. LiuL. andMaL. Exploiting time-varying graphs for data forwarding in mobile social Delay-Tolerant Networks Proceedings of the 24th IEEE\/ACM International Symposium on Quality of Service (IWQoS \u203216) June 2016 2-s2.0-85009743399."},{"key":"e_1_2_10_22_2","doi-asserted-by":"crossref","unstructured":"TaoJ. WuH. ShiS. HuJ. andGaoY. Contacts-aware opportunistic forwarding in mobile social networks: A community perspective Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC \u203218) April 2018 1\u20136 https:\/\/doi.org\/10.1109\/WCNC.2018.8377216.","DOI":"10.1109\/WCNC.2018.8377216"},{"key":"e_1_2_10_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2740218"},{"key":"e_1_2_10_24_2","doi-asserted-by":"crossref","unstructured":"LinkJ. \u00c1. B. ViolN. GoliathA. andWehrleK. SimBetAge: utilizing temporal changes in social networks for pocket switched networks Proceedings of the 1st ACM Workshop on User-Provided Networking: Challenges and Opportunities (U-NET \u203209) December 2009 New York NY USA ACM 13\u201318 https:\/\/doi.org\/10.1145\/1659029.1659034 2-s2.0-76749148687.","DOI":"10.1145\/1659029.1659034"},{"key":"e_1_2_10_25_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2016.04.003"},{"key":"e_1_2_10_26_2","doi-asserted-by":"crossref","unstructured":"Pietil\u00e4nenA.-K.andDiotC. Dissemination in opportunistic social networks: the role of temporal communities Proceedings of the 13th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc \u203212) June 2012 165\u2013174 https:\/\/doi.org\/10.1145\/2248371.2248396 2-s2.0-84863552574.","DOI":"10.1145\/2248371.2248396"},{"key":"e_1_2_10_27_2","doi-asserted-by":"crossref","unstructured":"Phe-NeauT. Dias De AmorimM. andConanV. The strength of vicinity annexation in opportunistic networking Proceedings of the 32nd IEEE Conference on Computer Communications (IEEE INFOCOM \u203213) April 2013 3369\u20133374 2-s2.0-84883127497.","DOI":"10.1109\/INFCOM.2013.6567166"},{"key":"e_1_2_10_28_2","doi-asserted-by":"publisher","DOI":"10.1145\/1558590.1558602"},{"key":"e_1_2_10_29_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-005-0046-3"},{"key":"e_1_2_10_30_2","unstructured":"ScottJ. GassR. CrowcroftJ. HuiP. DiotC. andChaintreauA. CRAWDAD trace - Haggle 2009 http:\/\/crawdad.cs.dartmouth.edu\/cambridge\/haggle."}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2018\/4801465.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2018\/4801465.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2018\/4801465","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,20]],"date-time":"2025-08-20T03:16:02Z","timestamp":1755659762000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2018\/4801465"}},"subtitle":[],"editor":[{"given":"Kok-Seng","family":"Wong","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2018,1]]},"references-count":30,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,1]]}},"alternative-id":["10.1155\/2018\/4801465"],"URL":"https:\/\/doi.org\/10.1155\/2018\/4801465","archive":["Portico"],"relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"type":"print","value":"1530-8669"},{"type":"electronic","value":"1530-8677"}],"subject":[],"published":{"date-parts":[[2018,1]]},"assertion":[{"value":"2018-04-13","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-09-04","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-09-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"4801465"}}