2021 IEEE International Conference on Smart Computing (SMARTCOMP) 2021
DOI: 10.1109/smartcomp52413.2021.00064
|View full text |Cite
|
Sign up to set email alerts
|

Modeling Efficient and Effective Communications in VANET through Population Protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…They assessed the VANET system's performance using the M/M/1 queuing model, which looked at metrics such as end-to-end latency, congestion on express routes, and waiting time during peak hours for multihop connection. 6,13 Antonio Bordonaro et al 14 proposed a new schema on vehicular communication based on the population protocol model, which efficiently updates about each event. Ping et al 15 projected a novel technique to revoke the malicious vehicles from the network through the batch verification algorithm and replicate the messages captured with the traceability of signature.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…They assessed the VANET system's performance using the M/M/1 queuing model, which looked at metrics such as end-to-end latency, congestion on express routes, and waiting time during peak hours for multihop connection. 6,13 Antonio Bordonaro et al 14 proposed a new schema on vehicular communication based on the population protocol model, which efficiently updates about each event. Ping et al 15 projected a novel technique to revoke the malicious vehicles from the network through the batch verification algorithm and replicate the messages captured with the traceability of signature.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Antonio Bordonaro et al 14 proposed a new schema on vehicular communication based on the population protocol model, which efficiently updates about each event. Ping et al 15 projected a novel technique to revoke the malicious vehicles from the network through the batch verification algorithm and replicate the messages captured with the traceability of signature.…”
Section: Literature Reviewmentioning
confidence: 99%