2009 IEEE International Conference on Pervasive Computing and Communications 2009
DOI: 10.1109/percom.2009.4912814
|View full text |Cite
|
Sign up to set email alerts
|

Energy optimized fault tolerance for pervasive communication spaces

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2018
2018

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…Recent analysis of the top decays in the tt production channel already probes V tb in semitauonic decays of the top quark with competitive precision [46,47].…”
Section: B Semitauonic Top Decaysmentioning
confidence: 99%
“…Recent analysis of the top decays in the tt production channel already probes V tb in semitauonic decays of the top quark with competitive precision [46,47].…”
Section: B Semitauonic Top Decaysmentioning
confidence: 99%
“…A survey different techniques designed for ubiquitous fault-tolerant were explained in [10]. A new approach was introduced in [11] for using the application query workloads to recognize the best tradeoff between query communication costs and availability in data storage centric sensor network. Autonomic middleware architecture was designed in [12] for software component reconfiguration depending on ontology with fault-tolerance in ubiquitous computing environment.…”
Section: Related Workmentioning
confidence: 99%
“…Step 1: Evaluate the number of authorized mobile node by using (4) Step 2: Evaluate the number of unauthorized mobile node by using (8) Step 3: Measure one step transition probability of mobile nodes using (9) Step 4: Measure N-step transition probability of mobile nodes using (11) Step 5: Authorized mobile nodes with higher energy are combined to construct a Marko chain in its corresponding path for efficient communication by using (12) Step 6: The lower energy nodes and unauthorized mobile nodes in communication path are efficiently removed according to the property of Markov chain by using (14) Step 7: Provides resource efficient QoS END…”
Section: Beginmentioning
confidence: 99%