2015
DOI: 10.1007/s00500-014-1572-6
|View full text |Cite
|
Sign up to set email alerts
|

Peer selection in P2P wireless mesh networks: comparison of different strategies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…In this case, the values of the cost functions on the links are crisp, but the uncertainty is applied to the inference process itself. Thus, in [17], the authors developed a fuzzy inference system using the Expected Transmission Time (ETX) and the number of hops as input variables to find the best server node in a P2P wireless mesh. The fuzzification of these variables and their introduction in the fuzzy decision rules allow us to outperform the efficiency of traditional methods, which select the server node based on a min-hop or random criteria.…”
Section: Related Workmentioning
confidence: 99%
“…In this case, the values of the cost functions on the links are crisp, but the uncertainty is applied to the inference process itself. Thus, in [17], the authors developed a fuzzy inference system using the Expected Transmission Time (ETX) and the number of hops as input variables to find the best server node in a P2P wireless mesh. The fuzzification of these variables and their introduction in the fuzzy decision rules allow us to outperform the efficiency of traditional methods, which select the server node based on a min-hop or random criteria.…”
Section: Related Workmentioning
confidence: 99%
“…Sharing economy has facilitated Peer-to-peer (P2P) platforms development through new applications in connectivity technologies (Valdés et al, 2015). The new economic context, where P2P platforms appear to become increasingly common, differs from the traditional one by facilitating a strong connection between businesses and users in multiple ways (Fremstad, 2018).…”
Section: Introductionmentioning
confidence: 99%
“…To address such security issues, Abujoda et al [Abujoda, Dietrich, Papadimitriou et al (2015)] implement and deploy a software-defined WMN (SDWMN) control plane in one of the confined community networks, in order to coordinate WMN transmission redirection. Through a comparative study of WMN and paws, Valdes et al [Valdes, Montesinos, Ariza et al (2015)] further study the potential benefits of shared WMN for public internet access. Their experimental results have shown that the shared WMN can provide a higher share of bandwidth utilization and can accommodate a large number of inbound traffic.…”
Section: Introductionmentioning
confidence: 99%