Reduced Path, Sink Failures in AutonomousNetwork Reconfiguration System (ANRS)Techniques
暂无分享,去创建一个
rasekar | V. Khanaa | K.G.S. Venkatesan | A. Ch | K. Venkatesan | V. Khanaa | A. Ch
[1] K. C. Karthika,et al. Wireless mesh network: A survey , 2016, 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET).
[2] K.G.S. Venkatesan,et al. Secure Data Transaction in Multi Cloud UsingTwo-Phase Validation , 2015 .
[3] rasekar,et al. Autonomous System(AS) for Mesh Networkby Using Packet Transmission & FailureDetection , 2015 .
[4] Teerawat Issariyakul,et al. Introduction to Network Simulator NS2 , 2008 .
[5] K.G.S. Venkatesan,et al. Transmission of Data between Sensors bydevolved Recognition , 2015 .
[6] Murali S. Kodialam,et al. Characterizing the capacity region in multi-radio multi-channel wireless mesh networks , 2005, MobiCom '05.
[7] Rudolf Ferenc,et al. Using the Conceptual Cohesion of Classes for Fault Prediction in Object-Oriented Systems , 2008, IEEE Transactions on Software Engineering.
[8] K.G.S. Venkatesan,et al. Mining User Profile Exploitation Cluster fromComputer Program Logs , 2015 .
[9] A. Girotra,et al. Performance Analysis of the IEEE 802 . 11 Distributed Coordination Function , 2005 .
[10] Kausik Mondal,et al. Enhancement of Social Network Security by Third Party Application , 2013 .
[11] Eytan Modiano,et al. Enabling distributed throughput maximization in wireless mesh networks: a partitioning approach , 2006, MobiCom '06.
[12] Sathish Raja,et al. ELECTRONIC MAIL SPAM ZOMBIES PURIFY IN EMAIL CONNECTION , 2013 .
[13] Karthika K.C. Wireless mesh network: A survey , 2016 .
[14] Annapurna Vemparala. A Reputation based Scheme for Routing Misbehavior Detection in MANETs , 2013 .
[15] K.G.S. Venkatesan,et al. Efficiency comparison of selected endoscopicvideo analysis algorithms , 2014 .
[16] G. Dayalin Leena,et al. Efficient Colour Image Watermarking using Factor Entrenching Method , 2014 .
[17] K. Venkatesan,et al. Planning in FARS by dynamic multipath Reconfiguration system failure recovery in Wireless Mesh Network , 2014 .
[18] K. G. S. Venkatesan. Automatic Detection and Control of Malware Spread in Decentralized Peer To Peer Network , 2014 .
[19] S. Vijayalakshmi,et al. Implementation of optimized cost, Load andService monitoring for Grid Computing , 2015 .
[20] Jing Cao,et al. Minimum Interference Channel Assignment in Multiradio Wireless Mesh Networks , 2008, IEEE Transactions on Mobile Computing.
[21] R. Vasanthi,et al. Transmission of Data between Sensors by Devolved Recognition , 2014 .
[22] R. Remya,et al. Anonymizing Geographic Routing for Preserving Location Privacy Using Unlinkability and Unobservability , 2014 .
[23] Kang G. Shin,et al. Self-Reconfigurable Wireless Mesh Networks , 2011, IEEE/ACM Transactions on Networking.
[24] Ian F. Akyildiz,et al. Wireless mesh networks: a survey , 2005, Comput. Networks.
[25] Tzi-cker Chiueh,et al. Architecture and algorithms for an IEEE 802.11-based multi-channel wireless mesh network , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[26] K.G.S. Venkatesan,et al. Assist Autism Spectrum, Data Acquisitionmethod using Spatio-temporal Model , 2015 .
[27] S. Anand. SAT: A Security Architecture in Wireless Mesh Networks , 2013 .
[28] Jian Tang,et al. Interference-aware topology control and QoS routing in multi-channel wireless mesh networks , 2005, MobiHoc '05.