Author:
Malhotra Amarjit,Dhurandher Sanjay Kumar,Gupta Megha,Kumar Bijendra
Publisher
Springer International Publishing
Reference17 articles.
1. https://newsroom.intel.com/news-releases/news-release-intel-announces-restructuring/
2. http://www.govtech.com/blogs/lohrmann-on-cybersecurity/will-a-smartphone-replace-your-pc.html
3. A. Malhotra, S.K. Dhurandher, B. Kumar, Resource allocation in multi-hop mobile ad hoc cloud. Recent Adv. Eng. Comput. Sci. (RAECS) (2014).
https://doi.org/10.1109/raecs.2014.6799578
4. S. Tarkoma, Overlay networks and distributed hash tables, in Publish/Subscribe systems: Design and principles, (2012), pp. 59–78.
https://doi.org/10.1002/9781118354261.ch3
5. I. Stoica, R. Morris, D.L. Nowell, D.R. Karger, M.F. Kaashoek, F. Dabek, H. Balakrishnan, CHORD: A scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Trans. Networking 11(1), 17–32 (2003).
https://doi.org/10.1109/tnet.2002.808407