2014
DOI: 10.1007/s11276-014-0719-9
|View full text |Cite
|
Sign up to set email alerts
|

Primate-inspired adaptive routing in intermittently connected mobile communication systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(10 citation statements)
references
References 45 publications
0
10
0
Order By: Relevance
“…Generally speaking, The LM scheme collects much more mark information than other schemes, so its overhead will be higher. However, on the other hand, the target of traceback scheme is to collect mark information as much as possible, and it help to locate the malicious node more quickly, so it is necessary to pay the overhead [20][21][22].…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Generally speaking, The LM scheme collects much more mark information than other schemes, so its overhead will be higher. However, on the other hand, the target of traceback scheme is to collect mark information as much as possible, and it help to locate the malicious node more quickly, so it is necessary to pay the overhead [20][21][22].…”
Section: Resultsmentioning
confidence: 99%
“…The ID number of the node and its private key is assigned to each node before it is deployed [2,10,25]. After the network is deployed, sensor nodes work to collect information from their surroundings and report back to the Sink via multihop wireless channels [2,10,20,25]. The link failure/recovery which result from node failure is not considered in this article [27,28].…”
Section: The System Model and Problem Statementmentioning
confidence: 99%
“…The experiment results show that the supervised CFA outperforms both linear and kernel versions of CFA without considering class label information. We also plan to explore potential of proposed algorithm using big data analysis and high performance computing [20], [21], [22], [23], [24], [9], [10], [25], [26], [27], [28], [29], [30], [31], [20], for applications of big multimodal data processing [32], [33], [34], [35], [36], [37], information and network security [38], [39], [40], [41], [42], [43], [44], [45], [46], [47], computer vision [48], [49], [50], [51], [52], [53], [54], [55], [56], and bioinformatics [57], [58], [59], [60], [61], [62], [60], [63],…”
Section: Discussionmentioning
confidence: 99%
“…The proposed method outperformed the predictor with other popularly used loss functions. In the future, we will investigate if the regularized maximum correntropy framework can be used to regularize ranking score learning [23,24], data representation [25,26,27,28,29,30,31,32,33] Moreover, we also plan to extend the proposed regularized correntropy based classifier for wireless sensor network [34,35,36,37,38,39,40], computer vision [41,42,43,44,45,46,46,47,48], and computer network security [49,50,51,52,53,54,55].…”
Section: Discussionmentioning
confidence: 99%