D
Dakshnamoorthy Manivannan
Researcher at University of Kentucky
Publications - 82
Citations - 1854
Dakshnamoorthy Manivannan is an academic researcher from University of Kentucky. The author has contributed to research in topics: Routing protocol & Optimized Link State Routing Protocol. The author has an hindex of 20, co-authored 73 publications receiving 1646 citations. Previous affiliations of Dakshnamoorthy Manivannan include Intel & Ohio State University.
Papers
More filters
Proceedings ArticleDOI
Routing protocols for sensor networks
TL;DR: A comparison of MANETs and sensor networks reveals the important features that need to be taken into consideration while designing and evaluating new routing protocols for sensor networks.
Journal ArticleDOI
Review: Unicast routing protocols for vehicular ad hoc networks: A critical comparison and classification
TL;DR: This paper discusses the design factors of unicast routing protocols for VANETs, and presents a timeline of the development of the existing unicasts, and classify and characterize the existing protocols, and provides a qualitative comparison of them.
Journal ArticleDOI
Quasi-synchronous checkpointing: Models, characterization, and classification
TL;DR: The theory not only helps to classify and characterize the quasi-synchronous checkpointing algorithms, but also helps to analyze the properties and limitations of the algorithms belonging to each class.
Proceedings ArticleDOI
A low-overhead recovery technique using quasi-synchronous checkpointing
TL;DR: A quasi-synchronous checkpointing algorithm and a low-overhead recovery algorithm based on it that preserves process autonomy by allowing them to take checkpoints asynchronously and uses communication-induced checkpoint coordination for the progression of the recovery line which helps bound rollback propagation during a recovery.
Journal ArticleDOI
Secure Authentication and Privacy-Preserving Techniques in Vehicular Ad-hoc NETworks (VANETs)
TL;DR: An overview of the following issues that arise in VANETs: privacy, authentication, and secure message dissemination is presented and a comprehensive review of various solutions proposed in the last 10 years which address these issues are presented.