E N D
1. Exploiting Social Interactions in Mobile Systems Presented By:
Baha Alsaify
2. Introduction This paper investigates how mobile systems could exploit peoples social interactions.
A Trace-Driven simulator were developed and three mobile systems were investigated:
DTN routing protocols.
Firewalls preventing a worm infection.
Mobile P2P file sharing.
3. Trace Description