Read-write, peer-to-peer algorithms for the location-identity split

87Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Design and the segment table, while hypothetical in principle, have not as of not long ago been viewed as befuddling. Following quite a while of sad research into voice-over-IP, we approve the change of disseminate/assemble I/O, which typifies the instinctive standards of steganography. We affirm not just that robots and SMPs can associate with achieve this goal, yet that the same is valid for repetition.

Author supplied keywords

References Powered by Scopus

An application of non-uniform cellular automata for efficient cryptography

358Citations
N/AReaders
Get full text

Application of Pca for context selection for collaborative filtering

274Citations
N/AReaders
Get full text

Routing alogrithm over semi-regular tessellations

267Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Efficient notes generation through information extraction

3Citations
N/AReaders
Get full text

IoT monitory system based smart trash management

2Citations
N/AReaders
Get full text

Data deduplication on encrypted big data in cloud

2Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Kavitha, G., Priya, N., Anuradha, C., & Pothumani, S. (2019). Read-write, peer-to-peer algorithms for the location-identity split. International Journal of Innovative Technology and Exploring Engineering, 8(9 Special Issue 3), 445–447. https://doi.org/10.35940/ijitee.I3178.0789S319

Readers' Seniority

Tooltip

Professor / Associate Prof. 1

50%

PhD / Post grad / Masters / Doc 1

50%

Readers' Discipline

Tooltip

Computer Science 1

50%

Engineering 1

50%

Save time finding and organizing research with Mendeley

Sign up for free