2010 International Conference on Advances in Recent Technologies in Communication and Computing 2010
DOI: 10.1109/artcom.2010.97
|View full text |Cite
|
Sign up to set email alerts
|

Effective Maintenance of Replica in Distributed Network Environment Using DST

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2013
2013
2015
2015

Publication Types

Select...
5
2

Relationship

3
4

Authors

Journals

citations
Cited by 44 publications
(14 citation statements)
references
References 7 publications
0
14
0
Order By: Relevance
“…This paper explores the different network characteristics, communication patterns, architecture and security concerns in the current developing technology. The author has surveyed the diverse characteristics of the Ad-Hoc networks [25] that are formed dynamically. The Vehicular Ad-Hoc Network Applications are explained in brief, which includes the various forthcoming technologies to be applied in the Vehicular Ad Hoc Networks.…”
Section: Related Workmentioning
confidence: 99%
“…This paper explores the different network characteristics, communication patterns, architecture and security concerns in the current developing technology. The author has surveyed the diverse characteristics of the Ad-Hoc networks [25] that are formed dynamically. The Vehicular Ad-Hoc Network Applications are explained in brief, which includes the various forthcoming technologies to be applied in the Vehicular Ad Hoc Networks.…”
Section: Related Workmentioning
confidence: 99%
“…Based on this pheromone level communication [2,6,9] is established between the ants, to travel to find the shortest path, and is considered that with the greatest density of pheromone the ants will tend to follow the path with more pheromone. The task of the ants is to search the food in the vicinity of their nest.…”
Section: Ant Behaviormentioning
confidence: 99%
“…The mesh router consists of gateway transfer data to other devices like laptops, Wi-Fi, WiMax, and cellular networks [7][8][9]17] that are connected to mesh router using base station or access point. Orthodox clients [1,2,4,5] with different radio technologies can communicate with the mesh router using Ethernet interface [2,6,8,9] which is in their base station. The orthodox client with same radio technologies will communicate directly with mesh routers.…”
Section: Working Mechanismmentioning
confidence: 99%
See 1 more Smart Citation
“…The comparisons are made by means of structure, shape and proportions of the face; distance between the eyes, nose, mouth and jaw; the sides of the mouth; location of the eyes; and the cheek bone's surrounding area. There are many methods in face recognition.The main methods are: feature analysis, neural network [24], Eigen faces, automatic face processing [18,19]. A face recognition method using Eigen faces is used in this system.…”
Section: Face Recognitionmentioning
confidence: 99%