2013 3rd IEEE International Advance Computing Conference (IACC) 2013
DOI: 10.1109/iadcc.2013.6514255
|View full text |Cite
|
Sign up to set email alerts
|

A key based cache replacement policy for cooperative caching in mobile ad hoc networks

Abstract: Cooperative caching in mobile ad hoc networks aims at improving the efficiency of information access by reducing access latency and bandwidth usage. Cache replacement policy plays a vital role in improving the performance of a cache in a mobile node since it has limited memory. In this paper we propose a new key based cache replacement policy called E-LRU for cooperative caching in ad hoc networks. The proposed scheme for replacement considers the time interval between the recent references, size and consisten… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 17 publications
0
6
0
Order By: Relevance
“…Joy and Jacob [13] have proposed cache replacement algorithm for cooperative caching in ad hoc networks. This cache replacement algorithm greatly improves the effectiveness of the cache by selecting suitable subset of data for caching.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Joy and Jacob [13] have proposed cache replacement algorithm for cooperative caching in ad hoc networks. This cache replacement algorithm greatly improves the effectiveness of the cache by selecting suitable subset of data for caching.…”
Section: Related Workmentioning
confidence: 99%
“…In our previous work [13], we have proposed a multipath routing protocol for effective local route recovery , each source and destination pair establishes multiple paths in single route discovery and they are cached in their route caches. The cached routes are sorted on the basis of their bandwidth availability.…”
Section: Introductionmentioning
confidence: 99%
“…A key based caching [16] and checking system is used which sends a message along with a key over the network to a destination that is entirely decided based on the key. The key is generated based on a random seed sent by a trusted initiator.…”
Section: Distributed Detection Protocolmentioning
confidence: 99%
“…Thus, a good replacement policy allows reducing general traffic by conserving cached data as long as possible. In order to ensure this, some replacement policies were previously proposed [15], [21]- [23]. They are classified following the parameters used to take the replacement decision.…”
Section: Related Work a Cooperative Cachingmentioning
confidence: 99%