2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577) 2004
DOI: 10.1109/icc.2004.1313364
|View full text |Cite
|
Sign up to set email alerts
|

Effective management through prediction-based clustering approach in the next-generation ad hoc networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2006
2006
2017
2017

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…Network tools such as virtualization [32] and clustering [33], [34], [35], [36] have also been used to address the redundancy reduction task [37]. Two main types of virtualization have been proposed in the context of WSN: (1) virtualization of sensors (i.e., virtual sensors) and (2) virtualization of sensor networks (i.e., virtual sensor networks or sensor cloud).…”
Section: Redundancy Reduction In Wsnsmentioning
confidence: 99%
“…Network tools such as virtualization [32] and clustering [33], [34], [35], [36] have also been used to address the redundancy reduction task [37]. Two main types of virtualization have been proposed in the context of WSN: (1) virtualization of sensors (i.e., virtual sensors) and (2) virtualization of sensor networks (i.e., virtual sensor networks or sensor cloud).…”
Section: Redundancy Reduction In Wsnsmentioning
confidence: 99%
“…The idea behind this model are Virtual Cluster Concept, (P xk , T xk , D xk ) -Clustering approach and Mobility prediction model [4] .…”
Section: Nmmentioning
confidence: 99%
“…Due to larger distances, the end-to-end data latency also increases. In order to overcome these problems, ECC security mechanism [1][2][3] and a prediction based proactive hierarchical network [4] structure has been considered.…”
Section: Introductionmentioning
confidence: 99%
“…An efficient clustering algorithm must adapt itself to frequently and unpredictable topology changes known in ad hoc networks. It must also generate stable clusters as much as possible to prohibit their updates which can lead to update other information as routing, security, addressing and management information [1,2].…”
Section: Introductionmentioning
confidence: 99%