2013
DOI: 10.1016/j.future.2012.12.001
|View full text |Cite
|
Sign up to set email alerts
|

Efficient service cache management in mobile P2P networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 34 publications
(2 citation statements)
references
References 45 publications
0
2
0
Order By: Relevance
“…Therefore, the organizations should remove the central control in their system to maintain the data integrity in their process. It specifies the computers to connect with the network across the different geographical areas and different locations (Pratheepkumar et al, 2017;Srivel et al, 2018;Paul et al, 2012;Paul et al, 2013). It creates an identity and maintains online and overcome the slow business processes like money flow and fund settlements can also be done instantly without any kind of further delay.…”
Section: Review Of Literaturementioning
confidence: 99%
“…Therefore, the organizations should remove the central control in their system to maintain the data integrity in their process. It specifies the computers to connect with the network across the different geographical areas and different locations (Pratheepkumar et al, 2017;Srivel et al, 2018;Paul et al, 2012;Paul et al, 2013). It creates an identity and maintains online and overcome the slow business processes like money flow and fund settlements can also be done instantly without any kind of further delay.…”
Section: Review Of Literaturementioning
confidence: 99%
“…They are typically characterized by limited resources, high mobility, transient availability, and lack of direct access to the data source (server). In MANET environments, data caching is essential because it increases the ability of mobile nodes to access desired data and improves overall system performance . In a typical caching architecture, several mobile devices cache data items that other devices frequently access or query.…”
Section: Introductionmentioning
confidence: 99%