2017 2nd International Conference on Anti-Cyber Crimes (ICACC) 2017
DOI: 10.1109/anti-cybercrime.2017.7905278
|View full text |Cite
|
Sign up to set email alerts
|

New strategy of probabilistic Flooding with Fuzzy & Rough Sets techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 5 publications
0
1
0
Order By: Relevance
“…These techniques control the broadcast expenses of route discovery process. WRS [23], and [24] are proposed based on routing cache which select the set of neighbour nodes based on a few metrics. Many more techniques are proposed on the similar line those are surveyed in recently publish literatures [1,4].…”
Section: Related Contributionsmentioning
confidence: 99%
“…These techniques control the broadcast expenses of route discovery process. WRS [23], and [24] are proposed based on routing cache which select the set of neighbour nodes based on a few metrics. Many more techniques are proposed on the similar line those are surveyed in recently publish literatures [1,4].…”
Section: Related Contributionsmentioning
confidence: 99%