scholarly journals IEEE Access Special Section Editorial: Resource Management in Vehicular Adhoc Networks: Energy Management, Communication Protocol and Future Applications

IEEE Access ◽  
2017 ◽  
Vol 5 ◽  
pp. 7839-7842 ◽  
Author(s):  
Tariq Umer ◽  
Mubashir Husain Rehmani ◽  
Zhi Guo Ding ◽  
Byung-Seo Kim ◽  
Samee U. Khan
Author(s):  
Shivaprasad More ◽  
Rahul Sonkamble ◽  
Udaykumar Naik ◽  
Shraddha Phansalkar ◽  
Priyanka More ◽  
...  

IEEE Access ◽  
2021 ◽  
Vol 9 ◽  
pp. 125052-125064
Author(s):  
Mostafa Nozari ◽  
Faramarz Hendessi ◽  
Nadia H. Khiadani ◽  
Maryam Ataei Kachooei

2010 ◽  
Vol 63 (9) ◽  
pp. 1279-1296 ◽  
Author(s):  
Geoffrey Wood ◽  
Mike Wright

In this article we define and explain private equity, with particular emphasis on the heterogeneity of the phenomenon. We consider different theoretical perspectives of relevance to the study of private equity buyouts. In particular, we distinguish between approaches that take a zero-sum perspective (rational choice and financialization perspectives) and those with a more nuanced, complementary viewpoint (heterodox institutional and theories of action and structure perspectives). We discuss private equity in historical perspective. We then summarize the articles in this special section. Finally, we identify an agenda for further research that focuses upon employee relations and human resource aspects of private equity buyouts.


Author(s):  
Harsha Vasudev ◽  
Debasis Das

More study is needed to make VANETs more relevant. Opportunistic routing (OR) is a new model that has been proposed for wireless networks. OR has emerged from the research communities because of its ability to increase the performance of wireless networks. It benefits from the broadcast characteristic of wireless mediums to improve network performance. The basic function of OR is its ability to overhear the transmitted packet and to coordinate among relaying nodes. In this chapter, an exhaustive survey of existing OR protocols is done by considering various factors. More precisely, existing secure OR protocols are deliberated. Future directions of research are also included, which provide a superior way to overcome some of the limitations of these existing protocols. Through this detailed survey, an outline and in-depth knowledge of existing OR protocols can be acquired.


Sign in / Sign up

Export Citation Format

Share Document