2019
DOI: 10.1007/s12083-019-00750-2
|View full text |Cite
|
Sign up to set email alerts
|

A time-aware resource search strategy with the ant colony optimization in MANETs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 24 publications
0
5
0
Order By: Relevance
“…According to the existing works, recently, there has been a plethora of research on Energy aware routing protocols for networking of data packets in MANETs to overcome the drawbacks due to inherent characteristics of the mobile nodes [10][11][12][13][14][15][16][17][18][19][20]. Towards this, authors in [13] have proposed an enhanced AODV routing protocol in MANET to improve energy e ciency and network lifetime by considering average energy of network.…”
Section: Literature Surveymentioning
confidence: 99%
“…According to the existing works, recently, there has been a plethora of research on Energy aware routing protocols for networking of data packets in MANETs to overcome the drawbacks due to inherent characteristics of the mobile nodes [10][11][12][13][14][15][16][17][18][19][20]. Towards this, authors in [13] have proposed an enhanced AODV routing protocol in MANET to improve energy e ciency and network lifetime by considering average energy of network.…”
Section: Literature Surveymentioning
confidence: 99%
“…According to the existing works, recently, there has been a plethora of research on Energy aware routing protocols for networking of data packets in MANETs to overcome the drawbacks due to inherent characteristics of the mobile nodes [10][11][12][13][14][15][16][17][18][19][20]. Towards this, authors in [13] have proposed an enhanced AODV routing protocol in MANET to improve energy e ciency and network lifetime by considering average energy of network.…”
Section: Literature Surveymentioning
confidence: 99%
“…en, publish public key, indicating that a new user has joined the system. (2) Step 2: the new user DU sends his public key to DO and then is authorized by DO to access the data. e DO randomly selects qk u ← R Z * p as the query key, calculates qk c � g wk/qk u , and generates the proxy reencryption key rk o⟶u � (h 2 g y u 1 g z 2 ) 1/x o of DU.…”
Section: Authorizationmentioning
confidence: 99%
“…P2P network file sharing system has been widely used and has rapidly developed because of its various advantages, such as decentralization, good extendibility, strong robustness, high cost-effectiveness, and load balancing characteristics [1][2][3]. With the development of communication and computer technology [4][5][6], the amount of data owned by users is increasing, but the local storage space of users is limited.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation