Analysis of Power Assignment in Radio Networks with Two Power Levels
|
|
- Julian Hardy
- 6 years ago
- Views:
Transcription
1 Analysis of Power Assignment in Radio Networks with Two Power Levels Miguel Fiandor Gutierrez & Manuel Macías Córdoba Abstract. In this paper we analyze the Power Assignment in Radio Networks with Two Power Levels paper by Paz Carmi and Matthew J. Katz, referring to the problem of the power assignment in radio networks, where each transmitter-receiver can transmit in one of two possible power levels. We will explain in further detail the points of the paper we find more difficult to understand, as well as give examples. This paper will also analyze the application of the algorithm and give a list of advantages and disadvantages of the use of the algorithm in different purpose radio based networks. Keywords. Radio Network, Power Consumption, Approximation Algorithm, NP-Hard. 1. INTRODUCTION As stated in the original paper, the assignment of power levels (corresponding to transmission ranges) to the transmitters of a radio network, so the total power used is as low as possible, is a well known and in some cases (embedded networks) is a extremely important issue. Let P be the plane containing n point (each point represents a transmitter-receiver).we will assign transmission ranges to the transmitter-receiver in P, so that the resulting transmission graph is strongly connected; in other words, there will be a directed edge between the transmitter p and the transmitter q, if and only if q is in range r p assigned to p, so there will be a directed path in G between every p E P and every q E P. And the total power consumption (the cost of the assignment of ranges) is minimized, were the total power consumption is a function of the form Σ pєp r p c and c > 0 is a constant typically between 2 and 5. This version of the power assignment problem is know to be NP-hard, Kirousis proved it to 3-dimenssional point sets and presented a 2-approximation algorithm based on the minimum spanning tree of P which is the best approximation known, and Clementi prove that the problem is np-hard for planar point sets.
2 Miguel Fiandor Gutiérrez & Manuel Macías Córdoba Outside the papers, normally is impossible to assign arbitrary power levels, and we are forced to choose between predetermined ones. The problem analyzed in this paper is the one referred in the original paper by Paz Carmi and Matthew J. Katz, in which there are two power levels the radio transmitter-receivers can be assigned with, one corresponding to short range (r 1 ), and the other one corresponding to long range (r 2 ). Since the cost of the assignment of power level to the transmitters-receivers is the form of n1r1 c + (n n1)r2 c were n 1 is the number of transmitters-receivers assigned with range r 1 and c 1 is some constant, the cost of the assignment is determined logically as the number of transmitters-receivers assigned with r 2. In the paper is proved that the power assignment problem for two different power levels is np-hard when r2 > (3 r1/2). Being m the optimal number of transmitters-receivers assigned long range, we will show a polynomial time algorithm that solves the stated problem with a (11/6)mapproximation. A immediate corollary of this result is that for any ranges r 1 and r 2, and for any c, we can compute an assignment which cost is at most (11/6) times the cost of the optimal assignment. But as we will show in section 2.2, this cost is usually lower. The algorithm that is going to be shown consist mainly in two parts, the first one will assign short and long range to the transmitter-receivers in a way that the resulting communication graph will be a tree. The second part will perform an algorithm to assign the power levels with a (4/3) approximation to the number of optimal long range assignments needed to solve the tree G. A by product of the algorithm is logically generated, in the case the initial graph is a tree the algorithm will be 4/3m, were m is the optimal solution. In the last part of the paper we will give examples of the algorithm use in real radio networks, we will analyze its advantages and disadvantages according to fault tolerance, energy consumption management. 2. AN (11/6)-APPROXIMATION In the following paragraphs we will try to explain the algorithm presented in the original paper. Let n be the number of transmitter-receivers of the set P in a plane. Each transmitter can transmit in two different power levels, low (short range r 1 ) and high (long range r 2 ). If all transmitters in P use long range the resulting communication graph is strongly connected. The problem that the algorithm is designed to solve is to assign ranges to the transmitters
3 Analysis of Power Assignment in Radio Networks with Power Levels Figure Transmitters-Receivers network The algorithm that is going to be shown, will in polynomial-time assign ranges to the transmitters in P, such as the number of transmitters assigned long range is at most (11/6)m, were m is the number of transmitters that are assigned long range by OPT. For the set P of transceivers-receivers we will set all of them to short range. Next we will draw an edge between every pair of transceivers-receivers p and q which Euclidean distance is smaller than the short range distance, p-q < r1.we will get a (undirected) graph G, of components, being each component a subset of P. Figure Graph G of components. Now we draw an edge between two components C 1 and C 2 of G if there exist transmitters p Є C 1 and q Є C 2, such that p, q r2. See Figure
4 Miguel Fiandor Gutiérrez & Manuel Macías Córdoba Figure Graph G of connected components We can easily obtain a 2-approximation algorithm. By computing a minimum spanning tree of G,and,for each edge (C 1, C 2 ) of the tree, assign long range to two transmitters p Є C 2 and q Є C 2, such that p, q r2. The range assignment algorithm explained in the paper consists in two parts. In the first one we will repeatedly find a cycle (between components) in G and reduce it to a single component by assigning long range to one of the transceivers-receivers in each of the components of the cycle. The second part begins when there are no more cycles in G, the graph G will be a tree, and more transmitters will be assigned long range in order to finish our task. The following paragraphs will describe the two parts in detail: The first part of the algorithm will continue until there are no cycles in G. For the cycle C 1, C 2, C l, C 1 (be l 3). We will assign long range to a transmitter-receiver in C 1 that can reach C 2, then assign long range to a transmitter-receiver in C 2 that can reach C 3,etc. L transmitters will have now being assigned with long range. After doing this, any pair of transmitters in the union C = C 1 U U C l can talk with each other mainly trough other transmitter in C. Now we can merge these l components in the union C, reducing the number of components of G by l-1. After doing so, we forget that some of the transmitters-receivers in C have been set to long range and update the edges of G accordingly, see Figure 2.4. Figure Reducing the Cycle C 1, C 2, C 3, C 4, C 1 to the single component C When the first part of the algorithm have finished there will be no cycles in G (G will be a tree)
5 Analysis of Power Assignment in Radio Networks with Power Levels In the second part of the algorithm the 4/3-approximation algorithm for a tree, shown in section 3, will be applied to G in order to complete the range assignment task. Now we will show, as in the original paper, that the overall number of transmitters that were assigned long range is bounded by 11/6 m. Theorem 1. The range assignment algorithm (described above) computes an (11/6)-approximation in polynomial time. Proof. In the first part of the algorithm while there are still cycles in G, they will be replace by a single component in G. Note, we assume that this cycles are of length three as this is the worst case for the analysis. Let i be the number of cycles found during the first part of the algorithm. Let k be the number of components in G, at the beginning of the first part of the algorithm, just before the loop starts. Them m, the number of transmitter-receivers assigned long range by OPT, is at least k, since in initial component at least one of the transmitters-receivers has to be assigned long range. During the first part of the algorithm 3i (3 components in each cycle by i cycles) transmitters have been assigned long range, and the number of components in G at the end of this first part of the algorithm are k 2i. As it was explained above, when the first part of the algorithm finishes G is a tree, to further the analysis we have to distinguish between two different cases: Case 1: i > k/2 m/3, in this case instead of performing the second stage, we proceed in the most trivial way (for the porpoise of the analysis only) and assign long range to 2(k - 2i -1) transmitters. In other words, for each edge in G connecting two components for example the edge between C 1 and C 2, we assign long range to any transmitter-receiver in C 1 that can reach C 2 and vice versa. The total number of transmitters-receivers assigned long range is bounded by: 3 i + 2(k -2i -1) 2k i 2k (k/2 m/3) = 3k/2 m/3 11/6m 3 i + 2(k -2i -1) : number of transmitters-receivers assigned long range in the first part of the algorithm plus the ones in the second part. i > k/2 m/3 m is at least k Case 2: i k/2 m/3. In this case the second part of the algorithm is applied and assign long range to at most 4/3 m tree transmitters-receivers, where m tree is the number of long range assignments needed to solve the tree G. Obviously m tree m, so the number of transmitters-receivers assigned long range in the second part of the algorithm is at most 4/3 m. The total number of transmitters-receivers assigned long range is bounded by: 3i + 4/3m 3(k/2 m/3) + 4/3m = 3/2k + m/3 11/6m As in booth cases we were able to achieve an upper bound of 11/6m, we can reach the conclusion that our range assignment algorithm computes an 11/6-approximation
6 Miguel Fiandor Gutiérrez & Manuel Macías Córdoba As stated above, the cost of the algorithm is n1r1 c + (n n1)r2 c,were n 1 are the transmitters-receivers assigner range r 1 and c 1 is a constant between 2 and 5. An immediate corollary of Theorem 1 is that for any ranges r 1 and r 2 and for any c, we can compute and assignment of at least 11/6 cost of the optimal assignment. We will show below that usually the cost of the assignment that our algorithm makes is lower than this upper bound Algorithm proof example In order to give a clear and easy example of the behavior of the algorithm shown in this paper, we have chosen a communication network which fulfils the requirements of the case used to analyze the algorithm in the previous section. We start with the following 18 transmitter-receiver nodes in the plane, and the two power levels referring to the range distance r 1 and r 2, r 1 << r 2. In the firs step we set the range of the transmitters to r 1 and we draw an edge that connects every pair of nodes which Euclidean distance is less than r 1. The nodes that fulfill this condition are the pairs: (T 1a, T 1b ), (T 2a, T 2b ), (T 3a, T 3b ), (T 4a, T 4b ), (T 5a, T 5b ), (T 6a, T 6b ), (T 7a, T 7b ), (T 8a, T 8b ), (T 9a, T 9b )
7 Analysis of Power Assignment in Radio Networks with Power Levels Each connected nodes, will form a component of the graph G (C 1, C 2, C 3, C 4, C 5, C 6, C 7, C 8, C 9,). Now we draw an edge between two components C a and C b of G if there exist a transmitter p Є C a and q Є C b, such that p, q r2 and we obtain the graph of connected components G
8 Miguel Fiandor Gutiérrez & Manuel Macías Córdoba At this point we start the algorithm. As we can see the first cycle we encounter is the one composed by the components C 1, C 2, C 3. As the algorithm says we assign long range to any transmitter-receiver in C 1 which Euclidian distance with a transmitter from C 2 is less than r 2 and so on. In total we assign long range to three transmitters. Next we group the components C 1, C 2 and C 3 in a new component C 10 and substitute it in G. The next cycle we found is the one composed by C 10, C 4, C 5. We follow the steps taken before and we generate the component C 11 = C 10 U C 4 U C
9 Analysis of Power Assignment in Radio Networks with Power Levels We continue with the algorithm, and we select the next cycle C 11, C 7, C 8 in this iteration of the loop. We follow the steps taken before and we generate the component C 12 = C 10 U C 7 UC 8. The resulting graph has three component and cero cycles. The first part of the algorithm is finished. We have assigned long range to 9 transmitters-receivers (three in each iteration). Continuing with the analysis done in the section 2, we see that i > k/2 m/3, so as case one says, we assign long range to four more transmitter-receivers. Two for the communication between C 12 and C 6, plus two between C 12 and C 9. Analyzing the results we get: Total number of transmitters assigned long range: 3i + 4 = 13. m = 9. K = 9. i = 3. 3 i + 2(k -2i -1) 11/6m. => 13 < 16.5 This fits in the formulas stated in the sections above. Where: i = number of iterations in the first part of the algorithm m = optimal solution of the problem. 2.2 The cost for ranges 1 and d. This is the particular case we approximate defining the range of the two possible power levels as, r1 = 1 and r2 = d. Thus, we have the following theorem, - 9 -
10 Miguel Fiandor Gutiérrez & Manuel Macías Córdoba Theorem 2. If r 1 = 1 and r 2 = d, then one can compute a range assignment whose cost is at most 11d c / 6d c + 5 times the cost of an optimal assignment. For d = 2 we get a (44/29)-approximation, if c = 2, and a (22/17)-approximation, if c = 1. Proof. The cost of an optimal algorithm is d c m + 1 (n m) = n + (d c 1)m, where m is the number of transmitters assigned long range. We apply both our algorithm and the naive algorithm which assigns range d to all the transmitters, depending on the variable a, where a = n/m, n is the total number of transmitters in the problem. We distinguish between two cases. Case 1: a 11/6. In this case we use the naive algorithm whose cost is d c n. The ratio between the cost of the naive algorithm and the cost of an optimal algorithm is: d c n / (n + (d c 1)m) d c n / (n + (d c 1)(6/11)n) = d c / ((6/11)d c + (5/11)) In the left side of the constraint we have the cost of the naive algorithm, so in the right side we have the cost of an optimal algorithm. To calculate the ratio m has been replaced by (6/11)n in the right side, because the optimal value is obtained when m = (6/11)n. And it is demonstrated that every possible solution in case 1, left side constraint, will be upper bounded by d c / (6/11)d c + (5/11), the right side. Case 2: a 11/6. In this case we run our algorithm whose cost is: d c (11/6)m + 1 (n (11/6)m) = n + (11/6)(d c 1)m The ratio between the cost of our algorithm and the optimal one is: n + (11/6) (d c 1)m / (n + (d c 1)m) = a + (11/6)(d c 1) / a + (d c 1) (11/6)d c / d c + 5/6 = d c /(6/11)d c + (5/11)
11 Analysis of Power Assignment in Radio Networks with Power Levels Also in this case we got a d c / (6/11)d c + (5/11) -approximation on the cost. Thus we can check that in both cases for d = 2 we get a (44/29)-approximation, if c = 2, and a (22/17)-approximation, if c = A (4/3)-APPROXIMATION FOR A TREE OF COMPONENTS Now we explain the case where the components graph G is cycle free, i.e., where G is a tree, so a (4/3)-approximation algorithm is given. G is the graph obtained at the end of the first step of the general algorithm above. So, the (4/3)-approximation algorithm forms the second step of the initial algorithm and it works as follows. Fig 3.1 Firstly is picked an arbitrary component in G to be the root of G. Given a component C in G, we talk about its children components or leafs, and about the parents and neighbours. For connecting the different components C, we need to assign long range to some of the transmitters that belong to it, with the purpose of connect such component C to its children. So at least one of the transmitters in C assigned long range can reach C, and also at least one of these transmitters can reach the parent of C. A neighbour C of C is satisfied if at least one of the transmitters in C that can reach it when assigned long range, finally it has long range. Fig 3.2 The second step is start with the leaf components. We have two types of components leaves and internals. We assign long range to any transmitter in C that can reach the parent of C using long range. Finishing with all the leaf components of particular C, we will consider next group of leaf components until we finish the leaves
12 Miguel Fiandor Gutiérrez & Manuel Macías Córdoba Then we will start considering the internal components in the same way it has been done before. Now we show that this builds a (4/3)-approximation algorithm with the following definitions: C be the internal component that is about to be considered. X C is the number of children of C. m C is the number of long range assignments (transmitters in C) needed to satisfy all children of C. m C is the number of long range assignments (transmitters in C) assigned by OPT. Clearly for each child C of C, we must assign long range to at least one of the transmitters in C that can reach C. We have two possible cases, if the m C transmitters satisfying the children of C can be chosen so that one of them also satisfies the parent of C, then m C = m C, otherwise we would have to choose a new transmitter in C to satisfy its parent, so, m C = m C + 1. The following inequalities are immediate: Σ C m C = m, where m is the overall number of long range assignments assigned by OPT, and Σ C X C = k 1 < m, where k is the number of components in G. We will assign long range to at most (1/3)X C + m C transmitters in C. Summing over all components in G we obtain: ΣC ((1/3)XC + mc) 1/3m + m = 4/3m Notice that for each transmitter p in C there are a number of children of C that would be satisfied if p were assigned long range, that is called d p (the degree of p). This value has to be updated each time a transmitter q in C is selected to long range, this demands d q = 0. Because increasing the range to q we can satisfy children that were counted in any d p value. of X C, There is a last step of the algorithm of the original paper. Depending on the value
13 Analysis of Power Assignment in Radio Networks with Power Levels If XC 2, then we solve C optimally, that is, we find a minimum subset of transmitters in C that can reach all children of C and can also reach its parent (when assigned long range). We can do this since in this case mc 3. Otherwise, as long as the number of unsatisfied children is at least 3 and there exists a transmitter of degree at least 3, we assign long range to any transmitter q and update the degrees of all transmitters in C accordingly. By assigning long range to q we satisfy at least 3 of the children of C. Since for each of these 3 children, OPT assigns long range to one of their transmitters so that it can reach C, we charge the assignment to q to these 3 assignments of OPT. Thus in this loop we have used at most 1/3(XC x) long range assignments to transmitters in C, where x 0 is the number of remaining unsatisfied children of C. All this process justifies the following theorem, Theorem 3. If the components graph G is a tree, one can compute a range assignment that is a (4/3)-approximation in polynomial time. In order to clarify the ideas and demonstrate the Theorem 3 we show the next example, 3.1 Example 1. We start with five components that build a graph G free of cycles, what means it generates a tree T. See Fig Now we pick an arbitrary component in G to be the root of a new tree T. The component chosen as root is C We have to start with the leaf components, in this case C 5, we assign long range to any transmitter in C 5 that can reach its parent, C 4. Here could come the first difference with OPT, in case there is a transmitter in C 4 that can reach at the same time C 5 and its parent, C 2, when it is assigned with long range. OPT would choose a transmitter in C 5 that could reach such transmitter in C
14 Miguel Fiandor Gutiérrez & Manuel Macías Córdoba 4. We repeat this step with components C 2, C 3, and C 4. This last case, C 4, is when XC 2 when so is solve optimally and trivially, only has to be chosen the transmitters in C 4 that can reach all children, C 5, and also its parent C 2, at most 3 transmitters. 5. After this, we continue with the last component C 2, where the unsatisfied children are at least 3, and we simulate the case there exists one or more transmitters with degree at least 3 (in case with a smaller degree it is solved in a similar way). Founded all transmitters in C with degree equal 3; those are assigned with long range. Here OPT would difference from the algorithm choosing only one transmitter since a set of transmitters reach the same transmitters, and their degree is at least 3. It is not the case, but after this loop only can left transmitters with degree at most 2, and it would be solve optimally, as in step NP-HARDNESS As any computing problem is of huge interest to know about its NP-Hardness (non-deterministic polynomial-time hardness). In the original paper is shown that the problem of finding an optimal range assignment for a given set P of points in the plane, that represent transmitters-receivers, is NP-Hard, when any two ranges r 1 and r 2 subject to r2 > (3/2) r1. Even in the special case where is assigned short range to every component, we obtain a graph G, and then G consist on a central component C that is connected to k orbit components. This special case is also NP-Hard
15 Analysis of Power Assignment in Radio Networks with Power Levels Now we explain how the original paper qualifies this problem as NP-Hard. First it is used a reduction from minimum vertex cover in planar cubic graphs, PGC, where each of the nodes has degree at most 3. If a PCG = (V, E) is a planar cubic graph, a vertex cover for PCG is a subset U of V, such for each edge (v 1, v 2 ) Є E, either v 1 Є U or v 2 Є U. So, they use this reduction of the problem whose NP-Hardness is justified to its first reference. The original paper uses a second reduction, from the min vertex cover-4 to min vertex cover-3 where is demonstrated that is APX-Hard in its references [1] and [9]. The process continues transforming the planar cubic graph PGC = (V, E) in a rectangular grid of size O( V 2 ), what is showed by Valiant in the original paper reference [13]. Then each node v Є V corresponds to some grid vertex, and each edge (v1, v2) Є E corresponds to a rectilinear path of grid edges, whose endpoints are the grid vertices corresponding to v 1 and v 2. V 1 V
16 Miguel Fiandor Gutiérrez & Manuel Macías Córdoba Finally, its become with the conclusion that an optimal solution for the range assignment problem corresponds to a minimum vertex cover for the graph PCG. Theorem 4. Let r 1 and r 2 be any two ranges, such that r2 > (3/2) r1. Then the problem of finding an optimal range assignment (where r 1 and r 2 are the two possible ranges) for a given set P of points in the plane is NP-Hard. 5. Advantages and Disadvantages We have focused our study on the main cases where the power consumption problem is considered a high important issue. If we look at embedded networks (mainly consist on a collection of small devices known as motes connected each other via a wireless communication) the power consumption issue can be considered critical, as the motes carries small batteries. So, applying the algorithm in order to minimize the long range assignment to motes also saves energy to the network. We talked about power consumption as the main problem of the studied network, but this is not the only problem can arise in it, a radio network has to deal with other problems like, weak fault tolerance or low bandwidth. There are different kinds of networks with different requirements like Bluetooth or Wi-Fi. When we are in charge of developing or managing a network we would have to take a decision between all possible algorithms and the different features they give to the computed network. The algorithm exposed has an (11/6)-approximation factor to the optimal solution in the two range radio assignment. As a longer range assignment becomes with a higher power consumption, this 11/6 factor can be considered as an energy save feature of the network. When we talk about fault tolerance we mean the possibility that our network never split when one or more transmitters come down, disconnecting two components or dividing one in two. If the first step of the algorithm has finished and the resulting graph G is just one component (cycles have been founded in each iteration), between each component only exists one path. This is the worst case for computing a reliable high fault tolerance network, and also with a high bandwidth. The bandwidth feature is quite difficult to analyze, and also this kind of networks are not usually known by a high payload that goes through them. But this does not mean they do not exist, an example is the increasing of pictures and videos sharing between mobile phones, what demands a higher bandwidth transmission. The weakness in this algorithm can come in the connections between components (those made by long range transmitters). If a transmitter t 1 needs to communicate with another t 2, which is allocated in a different component it will be use the path made by the long range transmitters. So, only one path could not be a desired solution. This study introduce much more complexity and other fields of the communication problems that not belong to original paper, we only pretend to present the
17 Analysis of Power Assignment in Radio Networks with Power Levels possible weakness points can become with extremely optimal solution to the power assignment problem. 6. Problems Related Power Assignment For Symmetric Communication InWireless Sensor Networks. omp/proceedings/iscc/2006/2588/00/2588toc.xml&doi= /iscc E. Althaus, G. Cˇalinescu, I. I. Mˇandoiu, S. Prasad, N. Tchervenski, and A. Zelikovsky. Power Efficient Range Assignment in Ad-hoc Wireless Networks. Proc. IEEE Wireless Communications and Networking Conference (WCNC), , W. Liang. Constructing Minimum-Energy Broadcast Trees in Wireless Ad Hoc Networks. Proc. 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing, , I. Papadimitriou and L. Georgiadis. Energy-aware Broadcasting in Wireless Networks. Proc. Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt), , P.-J. Wan, G. Cˇalinescu, X.-Y. Li, and O. Frieder. Minimum-Energy Broadcast Routing in Static Ad Hoc Wireless Networks. ACM Wireless Networks 8: ,
Minimum Power Assignment in Wireless Ad Hoc Networks with Spanner Property
Minimum Power Assignment in Wireless Ad Hoc Networks with Spanner Property Yu Wang (ywang32@unnc.edu) Department of Computer Science, University of North Carolina at Charlotte Xiang-Yang Li (xli@cs.iit.edu)
More informationFault-Tolerant Power Assignment and Backbone in Wireless Networks
Fault-Tolerant Power Assignment and Bacbone in Wireless Networs Paz Carmi Ben-Gurion University of the Negev Computer Science Beer-Sheva 84105, Israel carmip@cs.bgu.ac.il Michael Segal Ben-Gurion University
More informationAlgorithmics of Directional Antennae: Strong Connectivity with Multiple Antennae
Algorithmics of Directional Antennae: Strong Connectivity with Multiple Antennae Ioannis Caragiannis Stefan Dobrev Christos Kaklamanis Evangelos Kranakis Danny Krizanc Jaroslav Opatrny Oscar Morales Ponce
More informationEnergy-efficient Broadcasting in All-wireless Networks
Energy-efficient Broadcasting in All-wireless Networks Mario Čagalj Jean-Pierre Hubaux Laboratory for Computer Communications and Applications (LCA) Swiss Federal Institute of Technology Lausanne (EPFL)
More informationTIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS
TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS A Thesis by Masaaki Takahashi Bachelor of Science, Wichita State University, 28 Submitted to the Department of Electrical Engineering
More informationPerformance Evaluation of Minimum Power Assignments Algorithms for Wireless Ad Hoc Networks
International Journal of Applied Science and Technology Vol. 4, No. 5; October 2014 Performance Evaluation of Minimum Power Assignments Algorithms for Wireless Ad Hoc Networks Festus K. Ojo Josephine O.
More informationRumors Across Radio, Wireless, and Telephone
Rumors Across Radio, Wireless, and Telephone Jennifer Iglesias Carnegie Mellon University Pittsburgh, USA jiglesia@andrew.cmu.edu R. Ravi Carnegie Mellon University Pittsburgh, USA ravi@andrew.cmu.edu
More informationOptimal Multicast Routing in Ad Hoc Networks
Mat-2.108 Independent esearch Projects in Applied Mathematics Optimal Multicast outing in Ad Hoc Networks Juha Leino 47032J Juha.Leino@hut.fi 1st December 2002 Contents 1 Introduction 2 2 Optimal Multicasting
More informationOn Coding for Cooperative Data Exchange
On Coding for Cooperative Data Exchange Salim El Rouayheb Texas A&M University Email: rouayheb@tamu.edu Alex Sprintson Texas A&M University Email: spalex@tamu.edu Parastoo Sadeghi Australian National University
More informationp-percent Coverage in Wireless Sensor Networks
p-percent Coverage in Wireless Sensor Networks Yiwei Wu, Chunyu Ai, Shan Gao and Yingshu Li Department of Computer Science Georgia State University October 28, 2008 1 Introduction 2 p-percent Coverage
More informationAlgorithms and Data Structures: Network Flows. 24th & 28th Oct, 2014
Algorithms and Data Structures: Network Flows 24th & 28th Oct, 2014 ADS: lects & 11 slide 1 24th & 28th Oct, 2014 Definition 1 A flow network consists of A directed graph G = (V, E). Flow Networks A capacity
More informationTopology Control. Chapter 3. Ad Hoc and Sensor Networks. Roger Wattenhofer 3/1
Topology Control Chapter 3 Ad Hoc and Sensor Networks Roger Wattenhofer 3/1 Inventory Tracking (Cargo Tracking) Current tracking systems require lineof-sight to satellite. Count and locate containers Search
More informationMechanism Design without Money II: House Allocation, Kidney Exchange, Stable Matching
Algorithmic Game Theory Summer 2016, Week 8 Mechanism Design without Money II: House Allocation, Kidney Exchange, Stable Matching ETH Zürich Peter Widmayer, Paul Dütting Looking at the past few lectures
More informationConnected Identifying Codes
Connected Identifying Codes Niloofar Fazlollahi, David Starobinski and Ari Trachtenberg Dept. of Electrical and Computer Engineering Boston University, Boston, MA 02215 Email: {nfazl,staro,trachten}@bu.edu
More informationGame Theory and Randomized Algorithms
Game Theory and Randomized Algorithms Guy Aridor Game theory is a set of tools that allow us to understand how decisionmakers interact with each other. It has practical applications in economics, international
More informationSymmetric Connectivity in Wireless Sensor Networks with Directional Antennas
Symmetric Connectivity in Wireless Sensor Networks with Directional ntennas Tien Tran Department of Computer Science University of Texas at Dallas Richardson, TX 75080, US Email: tien.tran1@utdallas.edu
More informationNANYANG TECHNOLOGICAL UNIVERSITY SEMESTER II EXAMINATION MH1301 DISCRETE MATHEMATICS. Time Allowed: 2 hours
NANYANG TECHNOLOGICAL UNIVERSITY SEMESTER II EXAMINATION 206-207 DISCRETE MATHEMATICS May 207 Time Allowed: 2 hours INSTRUCTIONS TO CANDIDATES. This examination paper contains FOUR (4) questions and comprises
More informationLecture 20 November 13, 2014
6.890: Algorithmic Lower Bounds: Fun With Hardness Proofs Fall 2014 Prof. Erik Demaine Lecture 20 November 13, 2014 Scribes: Chennah Heroor 1 Overview This lecture completes our lectures on game characterization.
More informationLow-Latency Multi-Source Broadcast in Radio Networks
Low-Latency Multi-Source Broadcast in Radio Networks Scott C.-H. Huang City University of Hong Kong Hsiao-Chun Wu Louisiana State University and S. S. Iyengar Louisiana State University In recent years
More informationProblem Set 4 Due: Wednesday, November 12th, 2014
6.890: Algorithmic Lower Bounds Prof. Erik Demaine Fall 2014 Problem Set 4 Due: Wednesday, November 12th, 2014 Problem 1. Given a graph G = (V, E), a connected dominating set D V is a set of vertices such
More informationUtilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks
Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks Shih-Hsien Yang, Hung-Wei Tseng, Eric Hsiao-Kuang Wu, and Gen-Huey Chen Dept. of Computer Science and Information Engineering,
More information2048 IS (PSPACE) HARD, BUT SOMETIMES EASY
2048 IS (PSPE) HRD, UT SOMETIMES ESY Rahul Mehta Princeton University rahulmehta@princeton.edu ugust 28, 2014 bstract arxiv:1408.6315v1 [cs.] 27 ug 2014 We prove that a variant of 2048, a popular online
More informationFrom Shared Memory to Message Passing
From Shared Memory to Message Passing Stefan Schmid T-Labs / TU Berlin Some parts of the lecture, parts of the Skript and exercises will be based on the lectures of Prof. Roger Wattenhofer at ETH Zurich
More informationTarget Coverage in Wireless Sensor Networks with Probabilistic Sensors
Article Target Coverage in Wireless Sensor Networks with Probabilistic Sensors Anxing Shan 1, Xianghua Xu 1, * and Zongmao Cheng 2 1 School of Computer Science, Hangzhou Dianzi University, Hangzhou 310018,
More informationData Gathering. Chapter 4. Ad Hoc and Sensor Networks Roger Wattenhofer 4/1
Data Gathering Chapter 4 Ad Hoc and Sensor Networks Roger Wattenhofer 4/1 Environmental Monitoring (PermaSense) Understand global warming in alpine environment Harsh environmental conditions Swiss made
More informationMinimum-Energy Multicast Tree in Cognitive Radio Networks
TECHNICAL REPORT TR-09-04, UC DAVIS, SEPTEMBER 2009. 1 Minimum-Energy Multicast Tree in Cognitive Radio Networks Wei Ren, Xiangyang Xiao, Qing Zhao Abstract We address the multicast problem in cognitive
More informationEfficient Multihop Broadcast for Wideband Systems
Efficient Multihop Broadcast for Wideband Systems Ivana Maric WINLAB, Rutgers University ivanam@winlab.rutgers.edu Roy Yates WINLAB, Rutgers University ryates@winlab.rutgers.edu Abstract In this paper
More informationAlgorithmique appliquée Projet UNO
Algorithmique appliquée Projet UNO Paul Dorbec, Cyril Gavoille The aim of this project is to encode a program as efficient as possible to find the best sequence of cards that can be played by a single
More informationMinimum-Latency Schedulings for Group Communications in Multi-channel Multihop Wireless Networks
Minimum-Latency Schedulings for Group Communications in Multi-channel Multihop Wireless Networks Peng-Jun Wan 1,ZhuWang 1,ZhiyuanWan 2,ScottC.-H.Huang 2,andHaiLiu 3 1 Illinois Institute of Technology,
More informationDistributed Broadcast Scheduling in Mobile Ad Hoc Networks with Unknown Topologies
Distributed Broadcast Scheduling in Mobile Ad Hoc Networks with Unknown Topologies Guang Tan, Stephen A. Jarvis, James W. J. Xue, and Simon D. Hammond Department of Computer Science, University of Warwick,
More informationBroadcasting in Conflict-Aware Multi-Channel Networks
Broadcasting in Conflict-Aware Multi-Channel Networks Francisco Claude 1, Reza Dorrigiv 2, Shahin Kamali 1, Alejandro López-Ortiz 1, Pawe l Pra lat 3, Jazmín Romero 1, Alejandro Salinger 1, and Diego Seco
More informationPower-efficient topology control for static wireless networks with switched beam directional antennas
University of Massachusetts Amherst From the SelectedWorks of Lixin Gao January 1, 2008 Power-efficient topology control for static wireless networks with switched beam directional antennas V Namboodiri
More informationINTERFERENCE AWARE ROUTING AND SCHEDULING IN WIMAX BACKHAUL NETWORKS WITH SMART ANTENNAS. by Shen Wan
INTERFERENCE AWARE ROUTING AND SCHEDULING IN WIMAX BACKHAUL NETWORKS WITH SMART ANTENNAS by Shen Wan A project report submitted in partial fulfillment of the requirements for the degree of Master of Science
More informationInterference-Aware Joint Routing and TDMA Link Scheduling for Static Wireless Networks
Interference-Aware Joint Routing and TDMA Link Scheduling for Static Wireless Networks Yu Wang Weizhao Wang Xiang-Yang Li Wen-Zhan Song Abstract We study efficient interference-aware joint routing and
More informationHierarchical Agglomerative Aggregation Scheduling in Directional Wireless Sensor Networks
Hierarchical Agglomerative Aggregation Scheduling in Directional Wireless Sensor Networks Min Kyung An Department of Computer Science Sam Houston State University Huntsville, Texas 77341, USA Email: an@shsu.edu
More informationA GRASP HEURISTIC FOR THE COOPERATIVE COMMUNICATION PROBLEM IN AD HOC NETWORKS
A GRASP HEURISTIC FOR THE COOPERATIVE COMMUNICATION PROBLEM IN AD HOC NETWORKS C. COMMANDER, C.A.S. OLIVEIRA, P.M. PARDALOS, AND M.G.C. RESENDE ABSTRACT. Ad hoc networks are composed of a set of wireless
More informationA GRASP heuristic for the Cooperative Communication Problem in Ad Hoc Networks
MIC2005: The Sixth Metaheuristics International Conference??-1 A GRASP heuristic for the Cooperative Communication Problem in Ad Hoc Networks Clayton Commander Carlos A.S. Oliveira Panos M. Pardalos Mauricio
More informationUniversal Cycles for Permutations Theory and Applications
Universal Cycles for Permutations Theory and Applications Alexander Holroyd Microsoft Research Brett Stevens Carleton University Aaron Williams Carleton University Frank Ruskey University of Victoria Combinatorial
More informationFrom Wireless Network Coding to Matroids. Rico Zenklusen
From Wireless Network Coding to Matroids Rico Zenklusen A sketch of my research areas/interests Computer Science Combinatorial Optimization Matroids & submodular funct. Rounding algorithms Applications
More informationOptimal Transceiver Scheduling in WDM/TDM Networks. Randall Berry, Member, IEEE, and Eytan Modiano, Senior Member, IEEE
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 23, NO. 8, AUGUST 2005 1479 Optimal Transceiver Scheduling in WDM/TDM Networks Randall Berry, Member, IEEE, and Eytan Modiano, Senior Member, IEEE
More informationPlanar tautologies, hard for Resolution
Planar tautologies, hard for Resolution Stefan Dantchev 1 Dept. of Mathematics and Computer Science, University of Leicester dantchev@mcs.le.ac.uk Søren Riis Dept. of Computer Science, Queen Mary, University
More informationFaithful Representations of Graphs by Islands in the Extended Grid
Faithful Representations of Graphs by Islands in the Extended Grid Michael D. Coury Pavol Hell Jan Kratochvíl Tomáš Vyskočil Department of Applied Mathematics and Institute for Theoretical Computer Science,
More informationMobile Ad Hoc Networks Theory of Interferences, Trade-Offs between Energy, Congestion and Delay
Mobile Ad Hoc Networks Theory of Interferences, Trade-Offs between Energy, Congestion and Delay 5th Week 14.05.-18.05.2007 Christian Schindelhauer schindel@informatik.uni-freiburg.de 1 Unit Disk Graphs
More informationEnergy-Efficient Data Management for Sensor Networks
Energy-Efficient Data Management for Sensor Networks Al Demers, Cornell University ademers@cs.cornell.edu Johannes Gehrke, Cornell University Rajmohan Rajaraman, Northeastern University Niki Trigoni, Cornell
More informationRobust Location Detection in Emergency Sensor Networks. Goals
Robust Location Detection in Emergency Sensor Networks S. Ray, R. Ungrangsi, F. D. Pellegrini, A. Trachtenberg, and D. Starobinski. Robust location detection in emergency sensor networks. In Proceedings
More informationGateways Placement in Backbone Wireless Mesh Networks
I. J. Communications, Network and System Sciences, 2009, 1, 1-89 Published Online February 2009 in SciRes (http://www.scirp.org/journal/ijcns/). Gateways Placement in Backbone Wireless Mesh Networks Abstract
More informationClock Synchronization
Clock Synchronization Chapter 9 d Hoc and Sensor Networks Roger Wattenhofer 9/1 coustic Detection (Shooter Detection) Sound travels much slower than radio signal (331 m/s) This allows for quite accurate
More informationarxiv: v1 [cs.cc] 21 Jun 2017
Solving the Rubik s Cube Optimally is NP-complete Erik D. Demaine Sarah Eisenstat Mikhail Rudoy arxiv:1706.06708v1 [cs.cc] 21 Jun 2017 Abstract In this paper, we prove that optimally solving an n n n Rubik
More informationRadio Aggregation Scheduling
Radio Aggregation Scheduling ALGOSENSORS 2015 Rajiv Gandhi, Magnús M. Halldórsson, Christian Konrad, Guy Kortsarz, Hoon Oh 18.09.2015 Aggregation Scheduling in Radio Networks Goal: Convergecast, all nodes
More informationComputational Geometry: Theory and Applications
Computational Geometry 43 (2010) 182 190 Contents lists available at ScienceDirect Computational Geometry: Theory and Applications www.elsevier.com/locate/comgeo Homogeneous 2-hop broadcast in 2D Gautam
More informationAlgorithms. Abstract. We describe a simple construction of a family of permutations with a certain pseudo-random
Generating Pseudo-Random Permutations and Maimum Flow Algorithms Noga Alon IBM Almaden Research Center, 650 Harry Road, San Jose, CA 9510,USA and Sackler Faculty of Eact Sciences, Tel Aviv University,
More informationCCO Commun. Comb. Optim.
Communications in Combinatorics and Optimization Vol. 2 No. 2, 2017 pp.149-159 DOI: 10.22049/CCO.2017.25918.1055 CCO Commun. Comb. Optim. Graceful labelings of the generalized Petersen graphs Zehui Shao
More informationKeyword: AVR Microcontroller, GSM, LCD, remote monitoring, Sensors, ZigBee.
Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Design & Implementation
More informationImproved Algorithm for Broadcast Scheduling of Minimal Latency in Wireless Ad Hoc Networks
Acta Mathematicae Applicatae Sinica, English Series Vol. 26, No. 1 (2010) 13 22 DOI: 10.1007/s10255-008-8806-2 http://www.applmath.com.cn Acta Mathema ca Applicatae Sinica, English Series The Editorial
More informationSYSTEM SENSOR WIRELESS REMOTE INDICATOR PRODUCT SPECIFICATION
Model name: M200I-RF Introduction: The 200 Series Commercial RF System is designed for use with compatible intelligent fire systems using the System Sensor 200/500 Series CLIP, Enhanced and Advanced communication
More informationBroadcast with Heterogeneous Node Capability
Broadcast with Heterogeneous Node Capability Intae Kang and Radha Poovendran Department of Electrical Engineering, University of Washington, Seattle, WA. email: {kangit,radha}@ee.washington.edu Abstract
More informationTowards generalizing thrackles to arbitrary graphs
Towards generalizing thrackles to arbitrary graphs Jin-Woo Bryan Oh PRIMES-USA; Mentor: Rik Sengupta May 18, 2013 Thrackles and known results Thrackles and known results What is a thrackle? Thrackles and
More informationLecture Notes 3: Paging, K-Server and Metric Spaces
Online Algorithms 16/11/11 Lecture Notes 3: Paging, K-Server and Metric Spaces Professor: Yossi Azar Scribe:Maor Dan 1 Introduction This lecture covers the Paging problem. We present a competitive online
More informationHow hard are computer games? Graham Cormode, DIMACS
How hard are computer games? Graham Cormode, DIMACS graham@dimacs.rutgers.edu 1 Introduction Computer scientists have been playing computer games for a long time Think of a game as a sequence of Levels,
More informationScheduling Data Collection with Dynamic Traffic Patterns in Wireless Sensor Networks
Scheduling Data Collection with Dynamic Traffic Patterns in Wireless Sensor Networks Wenbo Zhao and Xueyan Tang School of Computer Engineering, Nanyang Technological University, Singapore 639798 Email:
More informationMinimum-Latency Broadcast Scheduling in Wireless Ad Hoc Networks
Minimum-Latency Broadcast Scheduling in Wireless Ad Hoc Networks Scott C.-H. Huang, Peng-Jun Wan, Xiaohua Jia, Hongwei Du and Weiping Shang Department of Computer Science, City University of Hong Kong.
More informationOn the Price of Proactivizing Round-Optimal Perfectly Secret Message Transmission
On the Price of Proactivizing Round-Optimal Perfectly Secret Message Transmission Ravi Kishore Ashutosh Kumar Chiranjeevi Vanarasa Kannan Srinathan Abstract In a network of n nodes (modelled as a digraph),
More informationPower Theft Identification system using Power Line Carrier Communication (PLCC) technique in Distribution system based on Binary Search Algorithm
1 Power Theft Identification system using Power Line Carrier Communication (PLCC) technique in Distribution system based on Binary Search Algorithm Thiruvalluvan S 1, Swardheep B 2, Arunachalam S 3 Abstract
More informationPhysical Synthesis of Bus Matrix for High Bandwidth Low Power On-chip Communications
Physical Synthesis of Bus Matrix for High Bandwidth Low Power On-chip Communications Renshen Wang 1, Evangeline Young 2, Ronald Graham 1 and Chung-Kuan Cheng 1 1 University of California San Diego 2 The
More informationMonitoring Churn in Wireless Networks
Monitoring Churn in Wireless Networks Stephan Holzer 1 Yvonne-Anne Pignolet 2 Jasmin Smula 1 Roger Wattenhofer 1 {stholzer, smulaj, wattenhofer}@tik.ee.ethz.ch, yvonne-anne.pignolet@ch.abb.com 1 Computer
More informationCapacity of Dual-Radio Multi-Channel Wireless Sensor Networks for Continuous Data Collection
This paper was presented as part of the main technical program at IEEE INFOCOM 2011 Capacity of Dual-Radio Multi-Channel ireless Sensor Networks for Continuous Data Collection Shouling Ji Department of
More informationMobility Tolerant Broadcast in Mobile Ad Hoc Networks
Mobility Tolerant Broadcast in Mobile Ad Hoc Networks Pradip K Srimani 1 and Bhabani P Sinha 2 1 Department of Computer Science, Clemson University, Clemson, SC 29634 0974 2 Electronics Unit, Indian Statistical
More informationarxiv: v1 [cs.cc] 12 Dec 2017
Computational Properties of Slime Trail arxiv:1712.04496v1 [cs.cc] 12 Dec 2017 Matthew Ferland and Kyle Burke July 9, 2018 Abstract We investigate the combinatorial game Slime Trail. This game is played
More informationLower Bounds for the Number of Bends in Three-Dimensional Orthogonal Graph Drawings
ÂÓÙÖÒÐ Ó ÖÔ ÐÓÖØÑ Ò ÔÔÐØÓÒ ØØÔ»»ÛÛÛº ºÖÓÛÒºÙ»ÔÙÐØÓÒ»» vol.?, no.?, pp. 1 44 (????) Lower Bounds for the Number of Bends in Three-Dimensional Orthogonal Graph Drawings David R. Wood School of Computer Science
More informationChapter 5 Backtracking. The Backtracking Technique The n-queens Problem The Sum-of-Subsets Problem Graph Coloring The 0-1 Knapsack Problem
Chapter 5 Backtracking The Backtracking Technique The n-queens Problem The Sum-of-Subsets Problem Graph Coloring The 0-1 Knapsack Problem Backtracking maze puzzle following every path in maze until a dead
More informationOVSF code groups and reduction in call blocking for WCDMA systems
Indian Journal of Radio & Space Physics Vol 37, April 2008, pp. 143-147 OVSF code groups and reduction in call blocking for WCDMA systems Davinder S Saini, Sunil V Bhooshan & T Chakravarty Department of
More informationPearl Puzzles are NP-complete
Pearl Puzzles are NP-complete Erich Friedman Stetson University, DeLand, FL 32723 efriedma@stetson.edu Introduction Pearl puzzles are pencil and paper puzzles which originated in Japan [11]. Each puzzle
More informationA Factor Graph Based Dynamic Spectrum Allocation Approach for Cognitive Network
IEEE WCNC - Network A Factor Graph Based Dynamic Spectrum Allocation Approach for Cognitive Network Shu Chen, Yan Huang Department of Computer Science & Engineering Universities of North Texas Denton,
More information5.4 Imperfect, Real-Time Decisions
5.4 Imperfect, Real-Time Decisions Searching through the whole (pruned) game tree is too inefficient for any realistic game Moves must be made in a reasonable amount of time One has to cut off the generation
More informationSOLITAIRE CLOBBER AS AN OPTIMIZATION PROBLEM ON WORDS
INTEGERS: ELECTRONIC JOURNAL OF COMBINATORIAL NUMBER THEORY 8 (2008), #G04 SOLITAIRE CLOBBER AS AN OPTIMIZATION PROBLEM ON WORDS Vincent D. Blondel Department of Mathematical Engineering, Université catholique
More informationBit Reversal Broadcast Scheduling for Ad Hoc Systems
Bit Reversal Broadcast Scheduling for Ad Hoc Systems Marcin Kik, Maciej Gebala, Mirosław Wrocław University of Technology, Poland IDCS 2013, Hangzhou How to broadcast efficiently? Broadcasting ad hoc systems
More informationFrequency and Power Allocation for Low Complexity Energy Efficient OFDMA Systems with Proportional Rate Constraints
Frequency and Power Allocation for Low Complexity Energy Efficient OFDMA Systems with Proportional Rate Constraints Pranoti M. Maske PG Department M. B. E. Society s College of Engineering Ambajogai Ambajogai,
More informationPerformance Analysis of a 1-bit Feedback Beamforming Algorithm
Performance Analysis of a 1-bit Feedback Beamforming Algorithm Sherman Ng Mark Johnson Electrical Engineering and Computer Sciences University of California at Berkeley Technical Report No. UCB/EECS-2009-161
More informationAutonomous Obstacle Avoiding and Path Following Rover
Volume 114 No. 9 2017, 271-281 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu Autonomous Obstacle Avoiding and Path Following Rover ijpam.eu Sandeep Polina
More informationDesign of intelligent surveillance systems: a game theoretic case. Nicola Basilico Department of Computer Science University of Milan
Design of intelligent surveillance systems: a game theoretic case Nicola Basilico Department of Computer Science University of Milan Introduction Intelligent security for physical infrastructures Our objective:
More informationCOMP Online Algorithms. Paging and k-server Problem. Shahin Kamali. Lecture 9 - Oct. 4, 2018 University of Manitoba
COMP 7720 - Online Algorithms Paging and k-server Problem Shahin Kamali Lecture 9 - Oct. 4, 2018 University of Manitoba COMP 7720 - Online Algorithms Paging and k-server Problem 1 / 20 Review & Plan COMP
More informationRAINBOW COLORINGS OF SOME GEOMETRICALLY DEFINED UNIFORM HYPERGRAPHS IN THE PLANE
1 RAINBOW COLORINGS OF SOME GEOMETRICALLY DEFINED UNIFORM HYPERGRAPHS IN THE PLANE 1 Introduction Brent Holmes* Christian Brothers University Memphis, TN 38104, USA email: bholmes1@cbu.edu A hypergraph
More informationNEW APPLICATIONS of wireless multi-hop networks,
1 TDMA Delay Aware Lin Scheduling for Multi-hop Wireless Networs Petar Djuic and Shahroh Valaee Abstract Time division multiple access (TDMA) based medium access control (MAC) protocols can provide QoS
More informationBroadcast in Radio Networks in the presence of Byzantine Adversaries
Broadcast in Radio Networks in the presence of Byzantine Adversaries Vinod Vaikuntanathan Abstract In PODC 0, Koo [] presented a protocol that achieves broadcast in a radio network tolerating (roughly)
More informationRouting versus Network Coding in Erasure Networks with Broadcast and Interference Constraints
Routing versus Network Coding in Erasure Networks with Broadcast and Interference Constraints Brian Smith Department of ECE University of Texas at Austin Austin, TX 7872 bsmith@ece.utexas.edu Piyush Gupta
More information3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007
3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 53, NO 10, OCTOBER 2007 Resource Allocation for Wireless Fading Relay Channels: Max-Min Solution Yingbin Liang, Member, IEEE, Venugopal V Veeravalli, Fellow,
More informationA Simple Greedy Algorithm for Link Scheduling with the Physical Interference Model
A Simple Greedy Algorithm for Link Scheduling with the Physical Interference Model Abstract In wireless networks, mutual interference prevents wireless devices from correctly receiving packages from others
More informationReduced Complexity by Incorporating Sphere Decoder with MIMO STBC HARQ Systems
I J C T A, 9(34) 2016, pp. 417-421 International Science Press Reduced Complexity by Incorporating Sphere Decoder with MIMO STBC HARQ Systems B. Priyalakshmi #1 and S. Murugaveni #2 ABSTRACT The objective
More informationMulticast Energy Aware Routing in Wireless Networks
Ahmad Karimi Department of Mathematics, Behbahan Khatam Alanbia University of Technology, Behbahan, Iran karimi@bkatu.ac.ir ABSTRACT Multicasting is a service for disseminating data to a group of hosts
More informationThe Symmetric Traveling Salesman Problem by Howard Kleiman
I. INTRODUCTION The Symmetric Traveling Salesman Problem by Howard Kleiman Let M be an nxn symmetric cost matrix where n is even. We present an algorithm that extends the concept of admissible permutation
More informationCOMP Online Algorithms. Paging and k-server Problem. Shahin Kamali. Lecture 11 - Oct. 11, 2018 University of Manitoba
COMP 7720 - Online Algorithms Paging and k-server Problem Shahin Kamali Lecture 11 - Oct. 11, 2018 University of Manitoba COMP 7720 - Online Algorithms Paging and k-server Problem 1 / 19 Review & Plan
More informationCHAPTER 5 PAPR REDUCTION USING HUFFMAN AND ADAPTIVE HUFFMAN CODES
119 CHAPTER 5 PAPR REDUCTION USING HUFFMAN AND ADAPTIVE HUFFMAN CODES 5.1 INTRODUCTION In this work the peak powers of the OFDM signal is reduced by applying Adaptive Huffman Codes (AHC). First the encoding
More informationBounded-Hop Energy-Efficient Liveness of Flocking Swarms
Bounded-Hop Energy-Efficient Liveness of Flocking Swarms 1 Shlomi Dolev, Senior Member, IEEE, Michael Segal, Senior Member, IEEE, Hanan Shpungin, Member, IEEE Abstract In this paper we consider a set of
More informationOn the Lifetime of Large Wireless Sensor Networks with Multiple Battery Levels 1,2
1 On the Lifetime of Large Wireless Sensor Networks with Multiple Battery Levels 1,2 Mihail L. Sichitiu Rudra Dutta Department of Electrical and Computer Eng. Department of Computer Science North Carolina
More informationCONVERGECAST, namely the collection of data from
1 Fast Data Collection in Tree-Based Wireless Sensor Networks Özlem Durmaz Incel, Amitabha Ghosh, Bhaskar Krishnamachari, and Krishnakant Chintalapudi (USC CENG Technical Report No.: ) Abstract We investigate
More informationONE of the important applications of wireless stationary
Maximizing Network Lifetime of Broadcasting Over Wireless Stationary Adhoc Networks Intae Kang and Radha Poovendran Department of Electrical Engineering, University of Washington, Seattle, WA email: {kangit,radha}@ee.washington.edu
More informationOn the Capacity of Multi-Hop Wireless Networks with Partial Network Knowledge
On the Capacity of Multi-Hop Wireless Networks with Partial Network Knowledge Alireza Vahid Cornell University Ithaca, NY, USA. av292@cornell.edu Vaneet Aggarwal Princeton University Princeton, NJ, USA.
More informationMinimum Cost Topology Construction for Survivable Wireless Mesh Networks in Rural Area
0 0th International Conference on Mobile Ad-hoc and Sensor Networks Minimum Cost Topology Construction for Survivable Wireless Mesh Networks in Rural Area Suk Jin Lee* Computer Science Texas A&M University
More informationOn Optimum Communication Cost for Joint Compression and Dispersive Information Routing
2010 IEEE Information Theory Workshop - ITW 2010 Dublin On Optimum Communication Cost for Joint Compression and Dispersive Information Routing Kumar Viswanatha, Emrah Akyol and Kenneth Rose Department
More informationSuperimposed Code Based Channel Assignment in Multi-Radio Multi-Channel Wireless Mesh Networks
Superimposed Code Based Channel Assignment in Multi-Radio Multi-Channel Wireless Mesh Networks ABSTRACT Kai Xing & Xiuzhen Cheng & Liran Ma Department of Computer Science The George Washington University
More information