2021
DOI: 10.1007/s11277-021-08158-z
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid Cache Management in Ad Hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 31 publications
0
3
0
Order By: Relevance
“…A problem with this approach is that it does not quantify the routes based on reliability and prioritize them for routing. The packet loss in wireless multicast was also reduced by using cooperative communications [6]. On observation of packet loss, a node attempts to recover by cooperating with neighbour nodes.…”
Section: Literature Reviewmentioning
confidence: 99%
“…A problem with this approach is that it does not quantify the routes based on reliability and prioritize them for routing. The packet loss in wireless multicast was also reduced by using cooperative communications [6]. On observation of packet loss, a node attempts to recover by cooperating with neighbour nodes.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In the 90's and 80's, innovations in two areas of technology helped create fingerprint-like tools in flawless applications such as personal computers, optical scanners and identity card programs. In the late 1990s, the introduction of low-priced fingerprint capture devices and the comprehensive emergence of speedy and consistent corresponding algorithms locate the phase for creating fingerprint matches for own utilization [10][11][12][13][14].…”
Section: Related Workmentioning
confidence: 99%
“…Nevertheless, the existing collaborative caching approaches in MANETs have drawbacks in term of achieving low hit ratio, high delay due to a number of pending queries. This is a consequence of serving queries based on hop by hop forwarding as in Artail et al (2008) , Cao, Yin & Das (2004) , Chand, Joshi & Misra (2007a) , Chand, Joshi & Misra (2007b) , Du & Gupta (2005) , Umamaheswari & Radhamani (2015) , Abbani & Artail (2015) , El Khawaga, Saleh & Ali (2016) , Ting & Chang (2013) , Larbi, Bouallouche-Medjkoune & Aissani (2018) and Delvadia & Dutta (2022) , and broadcast or flooding messages as in Denko (2007) , Du, Gupta & Varsamopoulos (2009) , Tian & Denko (2007) , Ting & Chang (2007) , Chand, Joshi & Misra (2007b) and Krishnan et al. (2021) .…”
Section: Introductionmentioning
confidence: 99%