Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
  • Graduated in Electrical Engineering from Samrat Ashok Technical Institute, Vidisha India and post graduated in Mic... moreedit
Research Interests:
Replicated Checkpointing is emerging as a scalable fault tolerance technique. The fault tolerance capability is severely limited by number of replicas as well as improper replica placements. Dynamic generation of more replicas for mission... more
Replicated Checkpointing is emerging as a scalable fault tolerance technique. The fault tolerance capability is severely limited by number of replicas as well as improper replica placements. Dynamic generation of more replicas for mission critical and important data ...
... 1 Department of Computer Science and Engineering, TIT, Bhopal, MP, India 2 Department of Information Technology, SoIT, UTD, RGPV, MP, India praneetsaurabh@ gmail.com, bk_verma3@rediffmail.com, sanjeev@rgtu.net Abstract. ...
... requesting routes, or by forwarding unnecessary packets to the node using, for example, a blackhole attack. ... the ad hoc networks routing protocols, only some of the common attacks that could ... From the investigation, we... more
... requesting routes, or by forwarding unnecessary packets to the node using, for example, a blackhole attack. ... the ad hoc networks routing protocols, only some of the common attacks that could ... From the investigation, we identified that most of the common attacks against the ad ...
Page 1. Defending Wireless Ad Hoc Network from Single and Cooperative Black Holes Sanjeev Sharma, Manpreet Singh Rajiv Gandhi Technological University, Bhopal, MP, India sanjeev@rgtu.net Abstract Mobile ad hoc networks ...
VV Das, G. Thomas, and F. Lumban Gaol (Eds.): AIM 2011, CCIS 147, pp. 445–448, 2011. © Springer-Verlag Berlin Heidelberg 2011 ... A Novel Stair-Case Replication (SCR) Based Fault ... Sanjay Bansal1, Sanjeev Sharma2, and Ishita Trivedi3... more
VV Das, G. Thomas, and F. Lumban Gaol (Eds.): AIM 2011, CCIS 147, pp. 445–448, 2011. © Springer-Verlag Berlin Heidelberg 2011 ... A Novel Stair-Case Replication (SCR) Based Fault ... Sanjay Bansal1, Sanjeev Sharma2, and Ishita Trivedi3 ... 1 Research Scholar, Rajiv ...
(IJIDCS) International Journal on Internet and Distributed Computing Systems. Vol: 1 No: 1, ... RGPV, Bhopal (India) RGPV, Bhopal ishita_34@yahoo.co.in ... Abstract - In this paper, we give a survey on various fault tolerance techniques... more
(IJIDCS) International Journal on Internet and Distributed Computing Systems. Vol: 1 No: 1, ... RGPV, Bhopal (India) RGPV, Bhopal ishita_34@yahoo.co.in ... Abstract - In this paper, we give a survey on various fault tolerance techniques and related issues in distributed systems. ...
... Sanjeev sharma*, Rajshree**, Ravi Prakash Pandey***, Vivek Shukla t *HOD, SOIT, Rajiv Gandhi Prodyogiki Vishwavidyalaya, Bhopal (MP) sanjeev(rgtu.net **Lecturer, Babasaheb Bhimrao Ambedkar University, Lucknow (UP)... more
... Sanjeev sharma*, Rajshree**, Ravi Prakash Pandey***, Vivek Shukla t *HOD, SOIT, Rajiv Gandhi Prodyogiki Vishwavidyalaya, Bhopal (MP) sanjeev(rgtu.net **Lecturer, Babasaheb Bhimrao Ambedkar University, Lucknow (UP) rajshree_shukla2001@rediffmail.com t Lecturer ...
... and its Detection in AODV Ashish Dhane Sanjeev Sharma ashishdhane@rgtu.netsanjeev@rgtu.net School of Information Technology School of Information Technology Rajiv Gandhi Technological University Rajiv Gandhi Technological University... more
... and its Detection in AODV Ashish Dhane Sanjeev Sharma ashishdhane@rgtu.netsanjeev@rgtu.net School of Information Technology School of Information Technology Rajiv Gandhi Technological University Rajiv Gandhi Technological University Bhopal, India – 462036 ...
Abstract: Secure routing is the milestone in mobile ad hoc networks .Ad hoc networks are widely used in military and other scientific areas with nodes which can move arbitrarily and connect to any nodes at will, it is impossible for Ad... more
Abstract: Secure routing is the milestone in mobile ad hoc networks .Ad hoc networks are widely used in military and other scientific areas with nodes which can move arbitrarily and connect to any nodes at will, it is impossible for Ad hoc network to own a fixed infrastructure. It also ...
Replicated Checkpointing is emerging as a scalable fault tolerance technique. The fault tolerance capability is severely limited by number of replicas as well as improper replica placements. Dynamic generation of more replicas for mission... more
Replicated Checkpointing is emerging as a scalable fault tolerance technique. The fault tolerance capability is severely limited by number of replicas as well as improper replica placements. Dynamic generation of more replicas for mission critical and important data ...
... 1 Department of Computer Science and Engineering, TIT, Bhopal, MP, India 2 Department of Information Technology, SoIT, UTD, RGPV, MP, India praneetsaurabh@ gmail.com, bk_verma3@rediffmail.com, sanjeev@rgtu.net Abstract. ...
... requesting routes, or by forwarding unnecessary packets to the node using, for example, a blackhole attack. ... the ad hoc networks routing protocols, only some of the common attacks that could ... From the investigation, we... more
... requesting routes, or by forwarding unnecessary packets to the node using, for example, a blackhole attack. ... the ad hoc networks routing protocols, only some of the common attacks that could ... From the investigation, we identified that most of the common attacks against the ad ...
Page 1. Defending Wireless Ad Hoc Network from Single and Cooperative Black Holes Sanjeev Sharma, Manpreet Singh Rajiv Gandhi Technological University, Bhopal, MP, India sanjeev@rgtu.net Abstract Mobile ad hoc networks ...
VV Das, G. Thomas, and F. Lumban Gaol (Eds.): AIM 2011, CCIS 147, pp. 445–448, 2011. © Springer-Verlag Berlin Heidelberg 2011 ... A Novel Stair-Case Replication (SCR) Based Fault ... Sanjay Bansal1, Sanjeev Sharma2, and Ishita Trivedi3... more
VV Das, G. Thomas, and F. Lumban Gaol (Eds.): AIM 2011, CCIS 147, pp. 445–448, 2011. © Springer-Verlag Berlin Heidelberg 2011 ... A Novel Stair-Case Replication (SCR) Based Fault ... Sanjay Bansal1, Sanjeev Sharma2, and Ishita Trivedi3 ... 1 Research Scholar, Rajiv ...
(IJIDCS) International Journal on Internet and Distributed Computing Systems. Vol: 1 No: 1, ... RGPV, Bhopal (India) RGPV, Bhopal ishita_34@yahoo.co.in ... Abstract - In this paper, we give a survey on various fault tolerance techniques... more
(IJIDCS) International Journal on Internet and Distributed Computing Systems. Vol: 1 No: 1, ... RGPV, Bhopal (India) RGPV, Bhopal ishita_34@yahoo.co.in ... Abstract - In this paper, we give a survey on various fault tolerance techniques and related issues in distributed systems. ...
... Sanjeev sharma*, Rajshree**, Ravi Prakash Pandey***, Vivek Shukla t *HOD, SOIT, Rajiv Gandhi Prodyogiki Vishwavidyalaya, Bhopal (MP) sanjeev(rgtu.net **Lecturer, Babasaheb Bhimrao Ambedkar University, Lucknow (UP)... more
... Sanjeev sharma*, Rajshree**, Ravi Prakash Pandey***, Vivek Shukla t *HOD, SOIT, Rajiv Gandhi Prodyogiki Vishwavidyalaya, Bhopal (MP) sanjeev(rgtu.net **Lecturer, Babasaheb Bhimrao Ambedkar University, Lucknow (UP) rajshree_shukla2001@rediffmail.com t Lecturer ...
... and its Detection in AODV Ashish Dhane Sanjeev Sharma ashishdhane@rgtu.netsanjeev@rgtu.net School of Information Technology School of Information Technology Rajiv Gandhi Technological University Rajiv Gandhi Technological University... more
... and its Detection in AODV Ashish Dhane Sanjeev Sharma ashishdhane@rgtu.netsanjeev@rgtu.net School of Information Technology School of Information Technology Rajiv Gandhi Technological University Rajiv Gandhi Technological University Bhopal, India – 462036 ...
Abstract: Secure routing is the milestone in mobile ad hoc networks .Ad hoc networks are widely used in military and other scientific areas with nodes which can move arbitrarily and connect to any nodes at will, it is impossible for Ad... more
Abstract: Secure routing is the milestone in mobile ad hoc networks .Ad hoc networks are widely used in military and other scientific areas with nodes which can move arbitrarily and connect to any nodes at will, it is impossible for Ad hoc network to own a fixed infrastructure. It also ...