A. Bibliographieant+12, E. Antoniou, and . Theodoridis, Ioannis Chatzigiannakis et Georgios Mylonas. « Human mobility trace acquisition and social interactions monitoring for business intelligence using smartphones, Informatics (PCI), 2012 16th Panhellenic Conference on. IEEE. 2012, pp.1-6

C. Barry and . Arnold, Pareto distribution Wiley Online Library, 2015 (cf, p.10

P. Bovet and S. Benhamou, Spatial analysis of animals' movements using a correlated random walk model, Journal of Theoretical Biology, vol.131, issue.4, pp.419-433, 1988.
DOI : 10.1016/S0022-5193(88)80038-9

I. Bilogrevic, Inferring social ties in academic networks using shortrange wireless communications, Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society. ACM. 2013, pp.179-188
URL : https://hal.archives-ouvertes.fr/hal-00853975

[. Benbadis and J. Leguay, CRAWDAD dataset upmc/rollernet (v. 2009-02-02) Downloaded from http, Fév, p.7, 2009.

C. Bettini and D. Riboni, Privacy protection in pervasive systems: State of the art and technical challenges, Pervasive and Mobile Computing, vol.17, pp.159-174, 2015.
DOI : 10.1016/j.pmcj.2014.09.010

[. Brown, N. Lathia, and C. Mascolo, Anastasios Noulas et Vincent Blondel. « Group colocation behavior in technological social networks, PloS one 9, pp.105816-105829, 2014.

[. Broch, A. David, . Maltz, B. David, Y. Johnson et al., A performance comparison of multi-hop wireless ad hoc network routing protocols, Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking , MobiCom '98, pp.85-97, 1998.
DOI : 10.1145/288235.288256

R. Alastair, F. Beresford, and . Stajano, « Location privacy in pervasive computing, IEEE Pervasive computing, vol.1, issue.59, pp.46-55, 2003.

[. Backstrom, E. Sun, and C. Marlow, Find me if you can, Proceedings of the 19th international conference on World wide web, WWW '10, pp.61-70, 2010.
DOI : 10.1145/1772690.1772698

[. Cattuto, W. Van-den-broeck, A. Barrat, and V. Colizza, Jean-François Pinton et Alessandro Vespignani. « Dynamics of person-toperson interactions from distributed RFID sensor networks, PloS one, vol.57, pp.11596-11602, 2010.

T. Camp, J. Boleng, and V. Davies, A survey of mobility models for ad hoc network research, Wireless communications and mobile computing 2, pp.483-502, 2002.
DOI : 10.1002/wcm.72

A. Chaintreau, P. Hui, J. Crowcroft, C. Diot, R. Gass et al., « Impact of human mobility on opportunistic forwarding algorithms, Mobile Computing, pp.606-620, 2007.

A. Chaintreau, A. Mtibaa, L. Massoulie, and C. Diot, The diameter of opportunistic mobile networks, Proceedings of the 2007 ACM CoNEXT conference on , CoNEXT '07, pp.12-17, 2007.
DOI : 10.1145/1364654.1364670

M. Mathieu-cunche, R. Kaafar, and . Boreli, Linking wireless devices using information contained in Wi-Fi probe requests, Pervasive and Mobile Computing, vol.11, pp.56-69, 2014.
DOI : 10.1016/j.pmcj.2013.04.001

[. Cho, A. Seth, J. Myers, and . Leskovec, Friendship and mobility, Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '11, pp.1082-1090, 2011.
DOI : 10.1145/2020408.2020579

H. John and . Cochrane, « How big is the random walk in GNP ?, The Journal of Political Economy, pp.893-920, 1988.

J. David, L. Crandall, D. Backstrom, S. Cosley, D. Suri et al., « Inferring social ties from geographic coincidences, Proceedings of the National Academy of Sciences, pp.22436-22441, 2010.

A. Clauset, C. R. Shalizi, E. Mark, and . Newman, Power-Law Distributions in Empirical Data, SIAM review 51, pp.661-703, 2009.
DOI : 10.1137/070710111

URL : http://arxiv.org/abs/0706.1062

[. Dobyns, Proximity Based Social Networking. US Patent App, 2014.

W. Dong, D. Olguin-olguin, B. Waber, T. Kim, and A. S. Pentland, Mapping Organizational Dynamics with Body Sensor Networks, 2012 Ninth International Conference on Wearable and Implantable Body Sensor Networks, pp.130-135, 2012.
DOI : 10.1109/BSN.2012.16

A. «. Einstein, Über die von der molekularkinetischen Theorie der Wärme geforderte Bewegung von in ruhenden Flüssigkeiten suspendierten Teilchen, Annalen der physik 322, pp.549-560, 1905.
DOI : 10.1002/andp.19053220806

[. Eagle and A. Pentland, « Reality mining : sensing complex social systems ». Dans : Personal and ubiquitous computing 10, pp.255-268, 2006.
DOI : 10.1007/s00779-005-0046-3

N. Eagle, A. S. Pentland, and D. Lazer, Inferring friendship network structure by using mobile phone data, Proceedings of the national academy of sciences, pp.15274-15278, 2009.
DOI : 10.1073/pnas.0900282106

[. Eagle, A. S. Pentland, and D. Lazer, Inferring friendship network structure by using mobile phone data, Proceedings of the National Academy of Sciences, pp.15274-15278, 2009.
DOI : 10.1073/pnas.0900282106

URL : http://www.ncbi.nlm.nih.gov/pmc/articles/PMC2741241

K. Fall, A delay-tolerant network architecture for challenged internets, Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications , SIGCOMM '03, pp.27-34, 2003.
DOI : 10.1145/863955.863960

[. Gomez, J. Oller, and J. Paradells, Overview and Evaluation of Bluetooth Low Energy: An Emerging Low-Power Wireless Technology, Sensors, vol.12, issue.12, pp.11734-11753, 2012.
DOI : 10.3390/s120911734

URL : http://doi.org/10.3390/s120911734

[. Gaito, E. Pagani, and G. P. Rossi, Fine-Grained Tracking of Human Mobility in Dense Scenarios, 2009 6th IEEE Annual Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks Workshops, pp.1-3, 2009.
DOI : 10.1109/SAHCNW.2009.5172935

[. Hong, M. Gerla, G. Pei, and C. Chiang, « A group mobility model for ad hoc wireless networks analysis and simulation of wireless and mobile systems, Proceedings of the 2nd ACM international workshop on Modeling, pp.53-60, 1999.

W. Hsu, T. Spyropoulos, K. Psounis, and A. Helmy, Modeling Time-Variant User Mobility in Wireless Mobile Networks, IEEE INFOCOM 2007, 26th IEEE International Conference on Computer Communications, pp.758-766, 2007.
DOI : 10.1109/INFCOM.2007.94

[. Hui, A. Chaintreau, J. Scott, R. Gass, J. Crowcroft et al., Pocket switched networks and human mobility in conference environments, Proceeding of the 2005 ACM SIGCOMM workshop on Delay-tolerant networking , WDTN '05, pp.244-251, 2005.
DOI : 10.1145/1080139.1080142

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.192.2902

L. Isella, J. Stehlé, A. Barrat, and C. Cattuto, Jean-François Pinton et Wouter Van den Broeck. « What's in a crowd ? Analysis of faceto-face behavioral networks, Journal of theoretical biology, vol.2711, pp.166-180, 2011.

[. Kim, D. Kotz, and S. Kim, Extracting a Mobility Model from Real User Traces, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications, pp.1-13, 2006.
DOI : 10.1109/INFOCOM.2006.173

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.120.3646

[. Liang, J. Zygmunt, and . Haas, Predictive distance-based mobility management for PCS networks, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320), pp.1377-1384, 1999.
DOI : 10.1109/INFCOM.1999.752157

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.6376

J. Leskovec and A. Krevl, SNAP Datasets : Stanford Large Network Dataset Collection

M. Mcnett, M. Geoffrey, and . Voelker, Access and mobility of wireless PDA users, ACM SIGMOBILE Mobile Computing and Communications Review, vol.92, pp.40-55, 2005.

[. Naghian, T. Lindstrom, T. Kärkkäinen, T. Jarmo, K. Mäkinen et al., Mobile mesh Ad-Hoc networking, US Patent, vol.6879574, p.4, 2005.
DOI : 10.1109/pimrc.2003.1260275

. New05, E. Mark, and . Newman, « Power laws, Pareto distributions and Zipf's law ». Dans : Contemporary physics 46, pp.323-351, 2005.

[. Newman, Networks : an introduction, p.27, 2010.
DOI : 10.1093/acprof:oso/9780199206650.001.0001

[. Noulas, M. Musolesi, M. Pontil, and C. Mascolo, « Inferring interests from mobility and social interactions, NIPS Workshop on Analyzing Networks and Learning with Graphs, pp.2-88, 2009.

M. Robert, . Nosofsky, J. Thomas, and . Palmeri, « An exemplar-based random walk model of speeded classification. » Dans : Psychological review 104, p.266, 1997.

V. Pavel, K. Nikitin, and . Rao, « Performance limitations of passive UHF RFID systems, IEEE Antennas and Propagation Society International Symposium . T. 1011, p.44, 2006.

A. Olteanu, K. Huguenin, R. Shokri, and J. Hubaux, Quantifying the Effect of Co-location Information on Location Privacy, Privacy Enhancing Technologies Symposium, pp.184-203, 2014.
DOI : 10.1007/978-3-319-08506-7_10

URL : https://hal.archives-ouvertes.fr/hal-00978629

A. Panisson and . Pymobility, url : https : / / github . com / panisson / pymobility (visité le 01, p.31, 2016.

[. Passarella and M. Conti, Characterising Aggregate Inter-contact Times in Heterogeneous Opportunistic Networks, International Conference on Research in Networking, pp.301-313, 2011.
DOI : 10.1007/978-3-642-20798-3_23

K. Pearson, The Problem of the Random Walk, Nature, vol.72, issue.1867, p.342, 1905.
DOI : 10.1038/072342a0

E. Charles and . Perkins, Ad hoc networking, 2008.

A. Papliatseyeu and O. Mayora, Mobile Habits: Inferring and Predicting User Activities with a Location-Aware Smartphone, 3rd Symposium of Ubiquitous Computing and Ambient Intelligence, pp.343-352, 2008.
DOI : 10.1007/978-3-540-85867-6_40

[. Pelusi, A. Passarella, and M. Conti, Opportunistic networking: data forwarding in disconnected mobile ad hoc networks, IEEE Communications Magazine, vol.44, issue.11, pp.134-141, 2006.
DOI : 10.1109/MCOM.2006.248176

[. Rhee, M. Shin, S. Hong, K. Lee, S. Kim et al., CRAWDAD dataset ncsu/mobilitymodels (v. 2009-07-23) Downloaded from http, Juil, p.6, 2009.

[. Rhee, M. Shin, S. Hong, K. Lee, S. Kim et al., « On the levy-walk nature of human mobility, IEEE/ACM transactions on networking (TON), vol.193, pp.630-643, 2011.

M. Elizabeth, P. Royer, E. Michael-melliar-smith-et-louise, and . Moser, « An analysis of the optimum node density for ad hoc mobile networks, ICC 2001. IEEE International Conference on. T. 3. IEEE, pp.857-861, 2001.

M. Salathé, J. W. Kazandjieva, P. Lee, . Levis, W. Marcus et al., A high-resolution human contact network for infectious disease transmission, Proceedings of the National Academy of Sciences, pp.22020-22025, 2010.
DOI : 10.1073/pnas.1009094108

J. Scott, R. Gass, J. Crowcroft, P. Hui, C. Diot et al., CRAWDAD dataset cambridge/haggle (v. 2009-05-29) Downloaded from http, p.7, 2009.

P. «. Hubaux, Quantifying location privacy Security and privacy (sp), ieee symposium on. IEEE. 2011, pp.247-262, 2011.

K. Chai and . Toh, Ad hoc mobile wireless networks : protocols and systems, Pearson Education, 2001.

L. Jameson, C. Toole, . Herrera-yaqüe, M. Christian, . Schneider et al., « Coupling human mobility and social ties, Journal of The Royal Society Interface, vol.12105, pp.20141128-20141134, 2015.

P. Tournoux, J. Leguay, F. Benbadis, J. Whitbeck, V. Conan et al., Density-Aware Routing in Highly Dynamic DTNs: The RollerNet Case, IEEE Transactions on Mobile Computing, vol.10, issue.12, pp.1755-1768, 2011.
DOI : 10.1109/TMC.2010.247

URL : https://hal.archives-ouvertes.fr/hal-01151836

[. Wu, N. Benjamin, S. Waber, E. Aral, A. Brynjolfsson et al., Mining Face-to-Face Interaction Networks using Sociometric Badges: Predicting Productivity in an IT Configuration Task, SSRN Electronic Journal, pp.1130251-1130257, 2008.
DOI : 10.2139/ssrn.1130251

[. Yoon, M. Liu, and B. Noble, twenty-second annual joint conference of the IEEE computer and communications. IEEE societies, Random waypoint considered harmful, pp.1312-1321, 2003.

J. Friginal, M. Olivier-killijian, R. Pasqua, M. Roy, and G. Trédan, Does Mobility Matter? An Evaluation Methodology for Opportunistic Apps, 2014 IEEE 13th International Symposium on Network Computing and Applications, pp.24-31
DOI : 10.1109/NCA.2014.8

URL : https://hal.archives-ouvertes.fr/hal-01242260

R. Pasqua, M. Roy, and G. Tredan, Loca, Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp '16, pp.535-544, 2016.
DOI : 10.1145/2971648.2971663

URL : https://hal.archives-ouvertes.fr/hal-01372317