Analysis of Power Assignment in Radio Networks with Two Power Levels

Size: px
Start display at page:

Download "Analysis of Power Assignment in Radio Networks with Two Power Levels"

Transcription

1 Analysis of Power Assignment in Radio Networks with Two Power Levels Miguel Fiandor Gutierrez & Manuel Macías Córdoba Abstract. In this paper we analyze the Power Assignment in Radio Networks with Two Power Levels paper by Paz Carmi and Matthew J. Katz, referring to the problem of the power assignment in radio networks, where each transmitter-receiver can transmit in one of two possible power levels. We will explain in further detail the points of the paper we find more difficult to understand, as well as give examples. This paper will also analyze the application of the algorithm and give a list of advantages and disadvantages of the use of the algorithm in different purpose radio based networks. Keywords. Radio Network, Power Consumption, Approximation Algorithm, NP-Hard. 1. INTRODUCTION As stated in the original paper, the assignment of power levels (corresponding to transmission ranges) to the transmitters of a radio network, so the total power used is as low as possible, is a well known and in some cases (embedded networks) is a extremely important issue. Let P be the plane containing n point (each point represents a transmitter-receiver).we will assign transmission ranges to the transmitter-receiver in P, so that the resulting transmission graph is strongly connected; in other words, there will be a directed edge between the transmitter p and the transmitter q, if and only if q is in range r p assigned to p, so there will be a directed path in G between every p E P and every q E P. And the total power consumption (the cost of the assignment of ranges) is minimized, were the total power consumption is a function of the form Σ pєp r p c and c > 0 is a constant typically between 2 and 5. This version of the power assignment problem is know to be NP-hard, Kirousis proved it to 3-dimenssional point sets and presented a 2-approximation algorithm based on the minimum spanning tree of P which is the best approximation known, and Clementi prove that the problem is np-hard for planar point sets.

2 Miguel Fiandor Gutiérrez & Manuel Macías Córdoba Outside the papers, normally is impossible to assign arbitrary power levels, and we are forced to choose between predetermined ones. The problem analyzed in this paper is the one referred in the original paper by Paz Carmi and Matthew J. Katz, in which there are two power levels the radio transmitter-receivers can be assigned with, one corresponding to short range (r 1 ), and the other one corresponding to long range (r 2 ). Since the cost of the assignment of power level to the transmitters-receivers is the form of n1r1 c + (n n1)r2 c were n 1 is the number of transmitters-receivers assigned with range r 1 and c 1 is some constant, the cost of the assignment is determined logically as the number of transmitters-receivers assigned with r 2. In the paper is proved that the power assignment problem for two different power levels is np-hard when r2 > (3 r1/2). Being m the optimal number of transmitters-receivers assigned long range, we will show a polynomial time algorithm that solves the stated problem with a (11/6)mapproximation. A immediate corollary of this result is that for any ranges r 1 and r 2, and for any c, we can compute an assignment which cost is at most (11/6) times the cost of the optimal assignment. But as we will show in section 2.2, this cost is usually lower. The algorithm that is going to be shown consist mainly in two parts, the first one will assign short and long range to the transmitter-receivers in a way that the resulting communication graph will be a tree. The second part will perform an algorithm to assign the power levels with a (4/3) approximation to the number of optimal long range assignments needed to solve the tree G. A by product of the algorithm is logically generated, in the case the initial graph is a tree the algorithm will be 4/3m, were m is the optimal solution. In the last part of the paper we will give examples of the algorithm use in real radio networks, we will analyze its advantages and disadvantages according to fault tolerance, energy consumption management. 2. AN (11/6)-APPROXIMATION In the following paragraphs we will try to explain the algorithm presented in the original paper. Let n be the number of transmitter-receivers of the set P in a plane. Each transmitter can transmit in two different power levels, low (short range r 1 ) and high (long range r 2 ). If all transmitters in P use long range the resulting communication graph is strongly connected. The problem that the algorithm is designed to solve is to assign ranges to the transmitters

3 Analysis of Power Assignment in Radio Networks with Power Levels Figure Transmitters-Receivers network The algorithm that is going to be shown, will in polynomial-time assign ranges to the transmitters in P, such as the number of transmitters assigned long range is at most (11/6)m, were m is the number of transmitters that are assigned long range by OPT. For the set P of transceivers-receivers we will set all of them to short range. Next we will draw an edge between every pair of transceivers-receivers p and q which Euclidean distance is smaller than the short range distance, p-q < r1.we will get a (undirected) graph G, of components, being each component a subset of P. Figure Graph G of components. Now we draw an edge between two components C 1 and C 2 of G if there exist transmitters p Є C 1 and q Є C 2, such that p, q r2. See Figure

4 Miguel Fiandor Gutiérrez & Manuel Macías Córdoba Figure Graph G of connected components We can easily obtain a 2-approximation algorithm. By computing a minimum spanning tree of G,and,for each edge (C 1, C 2 ) of the tree, assign long range to two transmitters p Є C 2 and q Є C 2, such that p, q r2. The range assignment algorithm explained in the paper consists in two parts. In the first one we will repeatedly find a cycle (between components) in G and reduce it to a single component by assigning long range to one of the transceivers-receivers in each of the components of the cycle. The second part begins when there are no more cycles in G, the graph G will be a tree, and more transmitters will be assigned long range in order to finish our task. The following paragraphs will describe the two parts in detail: The first part of the algorithm will continue until there are no cycles in G. For the cycle C 1, C 2, C l, C 1 (be l 3). We will assign long range to a transmitter-receiver in C 1 that can reach C 2, then assign long range to a transmitter-receiver in C 2 that can reach C 3,etc. L transmitters will have now being assigned with long range. After doing this, any pair of transmitters in the union C = C 1 U U C l can talk with each other mainly trough other transmitter in C. Now we can merge these l components in the union C, reducing the number of components of G by l-1. After doing so, we forget that some of the transmitters-receivers in C have been set to long range and update the edges of G accordingly, see Figure 2.4. Figure Reducing the Cycle C 1, C 2, C 3, C 4, C 1 to the single component C When the first part of the algorithm have finished there will be no cycles in G (G will be a tree)

5 Analysis of Power Assignment in Radio Networks with Power Levels In the second part of the algorithm the 4/3-approximation algorithm for a tree, shown in section 3, will be applied to G in order to complete the range assignment task. Now we will show, as in the original paper, that the overall number of transmitters that were assigned long range is bounded by 11/6 m. Theorem 1. The range assignment algorithm (described above) computes an (11/6)-approximation in polynomial time. Proof. In the first part of the algorithm while there are still cycles in G, they will be replace by a single component in G. Note, we assume that this cycles are of length three as this is the worst case for the analysis. Let i be the number of cycles found during the first part of the algorithm. Let k be the number of components in G, at the beginning of the first part of the algorithm, just before the loop starts. Them m, the number of transmitter-receivers assigned long range by OPT, is at least k, since in initial component at least one of the transmitters-receivers has to be assigned long range. During the first part of the algorithm 3i (3 components in each cycle by i cycles) transmitters have been assigned long range, and the number of components in G at the end of this first part of the algorithm are k 2i. As it was explained above, when the first part of the algorithm finishes G is a tree, to further the analysis we have to distinguish between two different cases: Case 1: i > k/2 m/3, in this case instead of performing the second stage, we proceed in the most trivial way (for the porpoise of the analysis only) and assign long range to 2(k - 2i -1) transmitters. In other words, for each edge in G connecting two components for example the edge between C 1 and C 2, we assign long range to any transmitter-receiver in C 1 that can reach C 2 and vice versa. The total number of transmitters-receivers assigned long range is bounded by: 3 i + 2(k -2i -1) 2k i 2k (k/2 m/3) = 3k/2 m/3 11/6m 3 i + 2(k -2i -1) : number of transmitters-receivers assigned long range in the first part of the algorithm plus the ones in the second part. i > k/2 m/3 m is at least k Case 2: i k/2 m/3. In this case the second part of the algorithm is applied and assign long range to at most 4/3 m tree transmitters-receivers, where m tree is the number of long range assignments needed to solve the tree G. Obviously m tree m, so the number of transmitters-receivers assigned long range in the second part of the algorithm is at most 4/3 m. The total number of transmitters-receivers assigned long range is bounded by: 3i + 4/3m 3(k/2 m/3) + 4/3m = 3/2k + m/3 11/6m As in booth cases we were able to achieve an upper bound of 11/6m, we can reach the conclusion that our range assignment algorithm computes an 11/6-approximation

6 Miguel Fiandor Gutiérrez & Manuel Macías Córdoba As stated above, the cost of the algorithm is n1r1 c + (n n1)r2 c,were n 1 are the transmitters-receivers assigner range r 1 and c 1 is a constant between 2 and 5. An immediate corollary of Theorem 1 is that for any ranges r 1 and r 2 and for any c, we can compute and assignment of at least 11/6 cost of the optimal assignment. We will show below that usually the cost of the assignment that our algorithm makes is lower than this upper bound Algorithm proof example In order to give a clear and easy example of the behavior of the algorithm shown in this paper, we have chosen a communication network which fulfils the requirements of the case used to analyze the algorithm in the previous section. We start with the following 18 transmitter-receiver nodes in the plane, and the two power levels referring to the range distance r 1 and r 2, r 1 << r 2. In the firs step we set the range of the transmitters to r 1 and we draw an edge that connects every pair of nodes which Euclidean distance is less than r 1. The nodes that fulfill this condition are the pairs: (T 1a, T 1b ), (T 2a, T 2b ), (T 3a, T 3b ), (T 4a, T 4b ), (T 5a, T 5b ), (T 6a, T 6b ), (T 7a, T 7b ), (T 8a, T 8b ), (T 9a, T 9b )

7 Analysis of Power Assignment in Radio Networks with Power Levels Each connected nodes, will form a component of the graph G (C 1, C 2, C 3, C 4, C 5, C 6, C 7, C 8, C 9,). Now we draw an edge between two components C a and C b of G if there exist a transmitter p Є C a and q Є C b, such that p, q r2 and we obtain the graph of connected components G

8 Miguel Fiandor Gutiérrez & Manuel Macías Córdoba At this point we start the algorithm. As we can see the first cycle we encounter is the one composed by the components C 1, C 2, C 3. As the algorithm says we assign long range to any transmitter-receiver in C 1 which Euclidian distance with a transmitter from C 2 is less than r 2 and so on. In total we assign long range to three transmitters. Next we group the components C 1, C 2 and C 3 in a new component C 10 and substitute it in G. The next cycle we found is the one composed by C 10, C 4, C 5. We follow the steps taken before and we generate the component C 11 = C 10 U C 4 U C

9 Analysis of Power Assignment in Radio Networks with Power Levels We continue with the algorithm, and we select the next cycle C 11, C 7, C 8 in this iteration of the loop. We follow the steps taken before and we generate the component C 12 = C 10 U C 7 UC 8. The resulting graph has three component and cero cycles. The first part of the algorithm is finished. We have assigned long range to 9 transmitters-receivers (three in each iteration). Continuing with the analysis done in the section 2, we see that i > k/2 m/3, so as case one says, we assign long range to four more transmitter-receivers. Two for the communication between C 12 and C 6, plus two between C 12 and C 9. Analyzing the results we get: Total number of transmitters assigned long range: 3i + 4 = 13. m = 9. K = 9. i = 3. 3 i + 2(k -2i -1) 11/6m. => 13 < 16.5 This fits in the formulas stated in the sections above. Where: i = number of iterations in the first part of the algorithm m = optimal solution of the problem. 2.2 The cost for ranges 1 and d. This is the particular case we approximate defining the range of the two possible power levels as, r1 = 1 and r2 = d. Thus, we have the following theorem, - 9 -

10 Miguel Fiandor Gutiérrez & Manuel Macías Córdoba Theorem 2. If r 1 = 1 and r 2 = d, then one can compute a range assignment whose cost is at most 11d c / 6d c + 5 times the cost of an optimal assignment. For d = 2 we get a (44/29)-approximation, if c = 2, and a (22/17)-approximation, if c = 1. Proof. The cost of an optimal algorithm is d c m + 1 (n m) = n + (d c 1)m, where m is the number of transmitters assigned long range. We apply both our algorithm and the naive algorithm which assigns range d to all the transmitters, depending on the variable a, where a = n/m, n is the total number of transmitters in the problem. We distinguish between two cases. Case 1: a 11/6. In this case we use the naive algorithm whose cost is d c n. The ratio between the cost of the naive algorithm and the cost of an optimal algorithm is: d c n / (n + (d c 1)m) d c n / (n + (d c 1)(6/11)n) = d c / ((6/11)d c + (5/11)) In the left side of the constraint we have the cost of the naive algorithm, so in the right side we have the cost of an optimal algorithm. To calculate the ratio m has been replaced by (6/11)n in the right side, because the optimal value is obtained when m = (6/11)n. And it is demonstrated that every possible solution in case 1, left side constraint, will be upper bounded by d c / (6/11)d c + (5/11), the right side. Case 2: a 11/6. In this case we run our algorithm whose cost is: d c (11/6)m + 1 (n (11/6)m) = n + (11/6)(d c 1)m The ratio between the cost of our algorithm and the optimal one is: n + (11/6) (d c 1)m / (n + (d c 1)m) = a + (11/6)(d c 1) / a + (d c 1) (11/6)d c / d c + 5/6 = d c /(6/11)d c + (5/11)

11 Analysis of Power Assignment in Radio Networks with Power Levels Also in this case we got a d c / (6/11)d c + (5/11) -approximation on the cost. Thus we can check that in both cases for d = 2 we get a (44/29)-approximation, if c = 2, and a (22/17)-approximation, if c = A (4/3)-APPROXIMATION FOR A TREE OF COMPONENTS Now we explain the case where the components graph G is cycle free, i.e., where G is a tree, so a (4/3)-approximation algorithm is given. G is the graph obtained at the end of the first step of the general algorithm above. So, the (4/3)-approximation algorithm forms the second step of the initial algorithm and it works as follows. Fig 3.1 Firstly is picked an arbitrary component in G to be the root of G. Given a component C in G, we talk about its children components or leafs, and about the parents and neighbours. For connecting the different components C, we need to assign long range to some of the transmitters that belong to it, with the purpose of connect such component C to its children. So at least one of the transmitters in C assigned long range can reach C, and also at least one of these transmitters can reach the parent of C. A neighbour C of C is satisfied if at least one of the transmitters in C that can reach it when assigned long range, finally it has long range. Fig 3.2 The second step is start with the leaf components. We have two types of components leaves and internals. We assign long range to any transmitter in C that can reach the parent of C using long range. Finishing with all the leaf components of particular C, we will consider next group of leaf components until we finish the leaves

12 Miguel Fiandor Gutiérrez & Manuel Macías Córdoba Then we will start considering the internal components in the same way it has been done before. Now we show that this builds a (4/3)-approximation algorithm with the following definitions: C be the internal component that is about to be considered. X C is the number of children of C. m C is the number of long range assignments (transmitters in C) needed to satisfy all children of C. m C is the number of long range assignments (transmitters in C) assigned by OPT. Clearly for each child C of C, we must assign long range to at least one of the transmitters in C that can reach C. We have two possible cases, if the m C transmitters satisfying the children of C can be chosen so that one of them also satisfies the parent of C, then m C = m C, otherwise we would have to choose a new transmitter in C to satisfy its parent, so, m C = m C + 1. The following inequalities are immediate: Σ C m C = m, where m is the overall number of long range assignments assigned by OPT, and Σ C X C = k 1 < m, where k is the number of components in G. We will assign long range to at most (1/3)X C + m C transmitters in C. Summing over all components in G we obtain: ΣC ((1/3)XC + mc) 1/3m + m = 4/3m Notice that for each transmitter p in C there are a number of children of C that would be satisfied if p were assigned long range, that is called d p (the degree of p). This value has to be updated each time a transmitter q in C is selected to long range, this demands d q = 0. Because increasing the range to q we can satisfy children that were counted in any d p value. of X C, There is a last step of the algorithm of the original paper. Depending on the value

13 Analysis of Power Assignment in Radio Networks with Power Levels If XC 2, then we solve C optimally, that is, we find a minimum subset of transmitters in C that can reach all children of C and can also reach its parent (when assigned long range). We can do this since in this case mc 3. Otherwise, as long as the number of unsatisfied children is at least 3 and there exists a transmitter of degree at least 3, we assign long range to any transmitter q and update the degrees of all transmitters in C accordingly. By assigning long range to q we satisfy at least 3 of the children of C. Since for each of these 3 children, OPT assigns long range to one of their transmitters so that it can reach C, we charge the assignment to q to these 3 assignments of OPT. Thus in this loop we have used at most 1/3(XC x) long range assignments to transmitters in C, where x 0 is the number of remaining unsatisfied children of C. All this process justifies the following theorem, Theorem 3. If the components graph G is a tree, one can compute a range assignment that is a (4/3)-approximation in polynomial time. In order to clarify the ideas and demonstrate the Theorem 3 we show the next example, 3.1 Example 1. We start with five components that build a graph G free of cycles, what means it generates a tree T. See Fig Now we pick an arbitrary component in G to be the root of a new tree T. The component chosen as root is C We have to start with the leaf components, in this case C 5, we assign long range to any transmitter in C 5 that can reach its parent, C 4. Here could come the first difference with OPT, in case there is a transmitter in C 4 that can reach at the same time C 5 and its parent, C 2, when it is assigned with long range. OPT would choose a transmitter in C 5 that could reach such transmitter in C

14 Miguel Fiandor Gutiérrez & Manuel Macías Córdoba 4. We repeat this step with components C 2, C 3, and C 4. This last case, C 4, is when XC 2 when so is solve optimally and trivially, only has to be chosen the transmitters in C 4 that can reach all children, C 5, and also its parent C 2, at most 3 transmitters. 5. After this, we continue with the last component C 2, where the unsatisfied children are at least 3, and we simulate the case there exists one or more transmitters with degree at least 3 (in case with a smaller degree it is solved in a similar way). Founded all transmitters in C with degree equal 3; those are assigned with long range. Here OPT would difference from the algorithm choosing only one transmitter since a set of transmitters reach the same transmitters, and their degree is at least 3. It is not the case, but after this loop only can left transmitters with degree at most 2, and it would be solve optimally, as in step NP-HARDNESS As any computing problem is of huge interest to know about its NP-Hardness (non-deterministic polynomial-time hardness). In the original paper is shown that the problem of finding an optimal range assignment for a given set P of points in the plane, that represent transmitters-receivers, is NP-Hard, when any two ranges r 1 and r 2 subject to r2 > (3/2) r1. Even in the special case where is assigned short range to every component, we obtain a graph G, and then G consist on a central component C that is connected to k orbit components. This special case is also NP-Hard

15 Analysis of Power Assignment in Radio Networks with Power Levels Now we explain how the original paper qualifies this problem as NP-Hard. First it is used a reduction from minimum vertex cover in planar cubic graphs, PGC, where each of the nodes has degree at most 3. If a PCG = (V, E) is a planar cubic graph, a vertex cover for PCG is a subset U of V, such for each edge (v 1, v 2 ) Є E, either v 1 Є U or v 2 Є U. So, they use this reduction of the problem whose NP-Hardness is justified to its first reference. The original paper uses a second reduction, from the min vertex cover-4 to min vertex cover-3 where is demonstrated that is APX-Hard in its references [1] and [9]. The process continues transforming the planar cubic graph PGC = (V, E) in a rectangular grid of size O( V 2 ), what is showed by Valiant in the original paper reference [13]. Then each node v Є V corresponds to some grid vertex, and each edge (v1, v2) Є E corresponds to a rectilinear path of grid edges, whose endpoints are the grid vertices corresponding to v 1 and v 2. V 1 V

16 Miguel Fiandor Gutiérrez & Manuel Macías Córdoba Finally, its become with the conclusion that an optimal solution for the range assignment problem corresponds to a minimum vertex cover for the graph PCG. Theorem 4. Let r 1 and r 2 be any two ranges, such that r2 > (3/2) r1. Then the problem of finding an optimal range assignment (where r 1 and r 2 are the two possible ranges) for a given set P of points in the plane is NP-Hard. 5. Advantages and Disadvantages We have focused our study on the main cases where the power consumption problem is considered a high important issue. If we look at embedded networks (mainly consist on a collection of small devices known as motes connected each other via a wireless communication) the power consumption issue can be considered critical, as the motes carries small batteries. So, applying the algorithm in order to minimize the long range assignment to motes also saves energy to the network. We talked about power consumption as the main problem of the studied network, but this is not the only problem can arise in it, a radio network has to deal with other problems like, weak fault tolerance or low bandwidth. There are different kinds of networks with different requirements like Bluetooth or Wi-Fi. When we are in charge of developing or managing a network we would have to take a decision between all possible algorithms and the different features they give to the computed network. The algorithm exposed has an (11/6)-approximation factor to the optimal solution in the two range radio assignment. As a longer range assignment becomes with a higher power consumption, this 11/6 factor can be considered as an energy save feature of the network. When we talk about fault tolerance we mean the possibility that our network never split when one or more transmitters come down, disconnecting two components or dividing one in two. If the first step of the algorithm has finished and the resulting graph G is just one component (cycles have been founded in each iteration), between each component only exists one path. This is the worst case for computing a reliable high fault tolerance network, and also with a high bandwidth. The bandwidth feature is quite difficult to analyze, and also this kind of networks are not usually known by a high payload that goes through them. But this does not mean they do not exist, an example is the increasing of pictures and videos sharing between mobile phones, what demands a higher bandwidth transmission. The weakness in this algorithm can come in the connections between components (those made by long range transmitters). If a transmitter t 1 needs to communicate with another t 2, which is allocated in a different component it will be use the path made by the long range transmitters. So, only one path could not be a desired solution. This study introduce much more complexity and other fields of the communication problems that not belong to original paper, we only pretend to present the

17 Analysis of Power Assignment in Radio Networks with Power Levels possible weakness points can become with extremely optimal solution to the power assignment problem. 6. Problems Related Power Assignment For Symmetric Communication InWireless Sensor Networks. omp/proceedings/iscc/2006/2588/00/2588toc.xml&doi= /iscc E. Althaus, G. Cˇalinescu, I. I. Mˇandoiu, S. Prasad, N. Tchervenski, and A. Zelikovsky. Power Efficient Range Assignment in Ad-hoc Wireless Networks. Proc. IEEE Wireless Communications and Networking Conference (WCNC), , W. Liang. Constructing Minimum-Energy Broadcast Trees in Wireless Ad Hoc Networks. Proc. 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing, , I. Papadimitriou and L. Georgiadis. Energy-aware Broadcasting in Wireless Networks. Proc. Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt), , P.-J. Wan, G. Cˇalinescu, X.-Y. Li, and O. Frieder. Minimum-Energy Broadcast Routing in Static Ad Hoc Wireless Networks. ACM Wireless Networks 8: ,

Minimum Power Assignment in Wireless Ad Hoc Networks with Spanner Property

Minimum Power Assignment in Wireless Ad Hoc Networks with Spanner Property Minimum Power Assignment in Wireless Ad Hoc Networks with Spanner Property Yu Wang (ywang32@unnc.edu) Department of Computer Science, University of North Carolina at Charlotte Xiang-Yang Li (xli@cs.iit.edu)

More information

Fault-Tolerant Power Assignment and Backbone in Wireless Networks

Fault-Tolerant Power Assignment and Backbone in Wireless Networks Fault-Tolerant Power Assignment and Bacbone in Wireless Networs Paz Carmi Ben-Gurion University of the Negev Computer Science Beer-Sheva 84105, Israel carmip@cs.bgu.ac.il Michael Segal Ben-Gurion University

More information

Algorithmics of Directional Antennae: Strong Connectivity with Multiple Antennae

Algorithmics of Directional Antennae: Strong Connectivity with Multiple Antennae Algorithmics of Directional Antennae: Strong Connectivity with Multiple Antennae Ioannis Caragiannis Stefan Dobrev Christos Kaklamanis Evangelos Kranakis Danny Krizanc Jaroslav Opatrny Oscar Morales Ponce

More information

Energy-efficient Broadcasting in All-wireless Networks

Energy-efficient Broadcasting in All-wireless Networks Energy-efficient Broadcasting in All-wireless Networks Mario Čagalj Jean-Pierre Hubaux Laboratory for Computer Communications and Applications (LCA) Swiss Federal Institute of Technology Lausanne (EPFL)

More information

TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS

TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS A Thesis by Masaaki Takahashi Bachelor of Science, Wichita State University, 28 Submitted to the Department of Electrical Engineering

More information

Performance Evaluation of Minimum Power Assignments Algorithms for Wireless Ad Hoc Networks

Performance Evaluation of Minimum Power Assignments Algorithms for Wireless Ad Hoc Networks International Journal of Applied Science and Technology Vol. 4, No. 5; October 2014 Performance Evaluation of Minimum Power Assignments Algorithms for Wireless Ad Hoc Networks Festus K. Ojo Josephine O.

More information

Rumors Across Radio, Wireless, and Telephone

Rumors Across Radio, Wireless, and Telephone Rumors Across Radio, Wireless, and Telephone Jennifer Iglesias Carnegie Mellon University Pittsburgh, USA jiglesia@andrew.cmu.edu R. Ravi Carnegie Mellon University Pittsburgh, USA ravi@andrew.cmu.edu

More information

Optimal Multicast Routing in Ad Hoc Networks

Optimal Multicast Routing in Ad Hoc Networks Mat-2.108 Independent esearch Projects in Applied Mathematics Optimal Multicast outing in Ad Hoc Networks Juha Leino 47032J Juha.Leino@hut.fi 1st December 2002 Contents 1 Introduction 2 2 Optimal Multicasting

More information

On Coding for Cooperative Data Exchange

On Coding for Cooperative Data Exchange On Coding for Cooperative Data Exchange Salim El Rouayheb Texas A&M University Email: rouayheb@tamu.edu Alex Sprintson Texas A&M University Email: spalex@tamu.edu Parastoo Sadeghi Australian National University

More information

p-percent Coverage in Wireless Sensor Networks

p-percent Coverage in Wireless Sensor Networks p-percent Coverage in Wireless Sensor Networks Yiwei Wu, Chunyu Ai, Shan Gao and Yingshu Li Department of Computer Science Georgia State University October 28, 2008 1 Introduction 2 p-percent Coverage

More information

Algorithms and Data Structures: Network Flows. 24th & 28th Oct, 2014

Algorithms and Data Structures: Network Flows. 24th & 28th Oct, 2014 Algorithms and Data Structures: Network Flows 24th & 28th Oct, 2014 ADS: lects & 11 slide 1 24th & 28th Oct, 2014 Definition 1 A flow network consists of A directed graph G = (V, E). Flow Networks A capacity

More information

Topology Control. Chapter 3. Ad Hoc and Sensor Networks. Roger Wattenhofer 3/1

Topology Control. Chapter 3. Ad Hoc and Sensor Networks. Roger Wattenhofer 3/1 Topology Control Chapter 3 Ad Hoc and Sensor Networks Roger Wattenhofer 3/1 Inventory Tracking (Cargo Tracking) Current tracking systems require lineof-sight to satellite. Count and locate containers Search

More information

Mechanism Design without Money II: House Allocation, Kidney Exchange, Stable Matching

Mechanism Design without Money II: House Allocation, Kidney Exchange, Stable Matching Algorithmic Game Theory Summer 2016, Week 8 Mechanism Design without Money II: House Allocation, Kidney Exchange, Stable Matching ETH Zürich Peter Widmayer, Paul Dütting Looking at the past few lectures

More information

Connected Identifying Codes

Connected Identifying Codes Connected Identifying Codes Niloofar Fazlollahi, David Starobinski and Ari Trachtenberg Dept. of Electrical and Computer Engineering Boston University, Boston, MA 02215 Email: {nfazl,staro,trachten}@bu.edu

More information

Game Theory and Randomized Algorithms

Game Theory and Randomized Algorithms Game Theory and Randomized Algorithms Guy Aridor Game theory is a set of tools that allow us to understand how decisionmakers interact with each other. It has practical applications in economics, international

More information

Symmetric Connectivity in Wireless Sensor Networks with Directional Antennas

Symmetric Connectivity in Wireless Sensor Networks with Directional Antennas Symmetric Connectivity in Wireless Sensor Networks with Directional ntennas Tien Tran Department of Computer Science University of Texas at Dallas Richardson, TX 75080, US Email: tien.tran1@utdallas.edu

More information

NANYANG TECHNOLOGICAL UNIVERSITY SEMESTER II EXAMINATION MH1301 DISCRETE MATHEMATICS. Time Allowed: 2 hours

NANYANG TECHNOLOGICAL UNIVERSITY SEMESTER II EXAMINATION MH1301 DISCRETE MATHEMATICS. Time Allowed: 2 hours NANYANG TECHNOLOGICAL UNIVERSITY SEMESTER II EXAMINATION 206-207 DISCRETE MATHEMATICS May 207 Time Allowed: 2 hours INSTRUCTIONS TO CANDIDATES. This examination paper contains FOUR (4) questions and comprises

More information

Lecture 20 November 13, 2014

Lecture 20 November 13, 2014 6.890: Algorithmic Lower Bounds: Fun With Hardness Proofs Fall 2014 Prof. Erik Demaine Lecture 20 November 13, 2014 Scribes: Chennah Heroor 1 Overview This lecture completes our lectures on game characterization.

More information

Low-Latency Multi-Source Broadcast in Radio Networks

Low-Latency Multi-Source Broadcast in Radio Networks Low-Latency Multi-Source Broadcast in Radio Networks Scott C.-H. Huang City University of Hong Kong Hsiao-Chun Wu Louisiana State University and S. S. Iyengar Louisiana State University In recent years

More information

Problem Set 4 Due: Wednesday, November 12th, 2014

Problem Set 4 Due: Wednesday, November 12th, 2014 6.890: Algorithmic Lower Bounds Prof. Erik Demaine Fall 2014 Problem Set 4 Due: Wednesday, November 12th, 2014 Problem 1. Given a graph G = (V, E), a connected dominating set D V is a set of vertices such

More information

Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks

Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks Shih-Hsien Yang, Hung-Wei Tseng, Eric Hsiao-Kuang Wu, and Gen-Huey Chen Dept. of Computer Science and Information Engineering,

More information

2048 IS (PSPACE) HARD, BUT SOMETIMES EASY

2048 IS (PSPACE) HARD, BUT SOMETIMES EASY 2048 IS (PSPE) HRD, UT SOMETIMES ESY Rahul Mehta Princeton University rahulmehta@princeton.edu ugust 28, 2014 bstract arxiv:1408.6315v1 [cs.] 27 ug 2014 We prove that a variant of 2048, a popular online

More information

From Shared Memory to Message Passing

From Shared Memory to Message Passing From Shared Memory to Message Passing Stefan Schmid T-Labs / TU Berlin Some parts of the lecture, parts of the Skript and exercises will be based on the lectures of Prof. Roger Wattenhofer at ETH Zurich

More information

Target Coverage in Wireless Sensor Networks with Probabilistic Sensors

Target Coverage in Wireless Sensor Networks with Probabilistic Sensors Article Target Coverage in Wireless Sensor Networks with Probabilistic Sensors Anxing Shan 1, Xianghua Xu 1, * and Zongmao Cheng 2 1 School of Computer Science, Hangzhou Dianzi University, Hangzhou 310018,

More information

Data Gathering. Chapter 4. Ad Hoc and Sensor Networks Roger Wattenhofer 4/1

Data Gathering. Chapter 4. Ad Hoc and Sensor Networks Roger Wattenhofer 4/1 Data Gathering Chapter 4 Ad Hoc and Sensor Networks Roger Wattenhofer 4/1 Environmental Monitoring (PermaSense) Understand global warming in alpine environment Harsh environmental conditions Swiss made

More information

Minimum-Energy Multicast Tree in Cognitive Radio Networks

Minimum-Energy Multicast Tree in Cognitive Radio Networks TECHNICAL REPORT TR-09-04, UC DAVIS, SEPTEMBER 2009. 1 Minimum-Energy Multicast Tree in Cognitive Radio Networks Wei Ren, Xiangyang Xiao, Qing Zhao Abstract We address the multicast problem in cognitive

More information

Efficient Multihop Broadcast for Wideband Systems

Efficient Multihop Broadcast for Wideband Systems Efficient Multihop Broadcast for Wideband Systems Ivana Maric WINLAB, Rutgers University ivanam@winlab.rutgers.edu Roy Yates WINLAB, Rutgers University ryates@winlab.rutgers.edu Abstract In this paper

More information

Algorithmique appliquée Projet UNO

Algorithmique appliquée Projet UNO Algorithmique appliquée Projet UNO Paul Dorbec, Cyril Gavoille The aim of this project is to encode a program as efficient as possible to find the best sequence of cards that can be played by a single

More information

Minimum-Latency Schedulings for Group Communications in Multi-channel Multihop Wireless Networks

Minimum-Latency Schedulings for Group Communications in Multi-channel Multihop Wireless Networks Minimum-Latency Schedulings for Group Communications in Multi-channel Multihop Wireless Networks Peng-Jun Wan 1,ZhuWang 1,ZhiyuanWan 2,ScottC.-H.Huang 2,andHaiLiu 3 1 Illinois Institute of Technology,

More information

Distributed Broadcast Scheduling in Mobile Ad Hoc Networks with Unknown Topologies

Distributed Broadcast Scheduling in Mobile Ad Hoc Networks with Unknown Topologies Distributed Broadcast Scheduling in Mobile Ad Hoc Networks with Unknown Topologies Guang Tan, Stephen A. Jarvis, James W. J. Xue, and Simon D. Hammond Department of Computer Science, University of Warwick,

More information

Broadcasting in Conflict-Aware Multi-Channel Networks

Broadcasting in Conflict-Aware Multi-Channel Networks Broadcasting in Conflict-Aware Multi-Channel Networks Francisco Claude 1, Reza Dorrigiv 2, Shahin Kamali 1, Alejandro López-Ortiz 1, Pawe l Pra lat 3, Jazmín Romero 1, Alejandro Salinger 1, and Diego Seco

More information

Power-efficient topology control for static wireless networks with switched beam directional antennas

Power-efficient topology control for static wireless networks with switched beam directional antennas University of Massachusetts Amherst From the SelectedWorks of Lixin Gao January 1, 2008 Power-efficient topology control for static wireless networks with switched beam directional antennas V Namboodiri

More information

INTERFERENCE AWARE ROUTING AND SCHEDULING IN WIMAX BACKHAUL NETWORKS WITH SMART ANTENNAS. by Shen Wan

INTERFERENCE AWARE ROUTING AND SCHEDULING IN WIMAX BACKHAUL NETWORKS WITH SMART ANTENNAS. by Shen Wan INTERFERENCE AWARE ROUTING AND SCHEDULING IN WIMAX BACKHAUL NETWORKS WITH SMART ANTENNAS by Shen Wan A project report submitted in partial fulfillment of the requirements for the degree of Master of Science

More information

Interference-Aware Joint Routing and TDMA Link Scheduling for Static Wireless Networks

Interference-Aware Joint Routing and TDMA Link Scheduling for Static Wireless Networks Interference-Aware Joint Routing and TDMA Link Scheduling for Static Wireless Networks Yu Wang Weizhao Wang Xiang-Yang Li Wen-Zhan Song Abstract We study efficient interference-aware joint routing and

More information

Hierarchical Agglomerative Aggregation Scheduling in Directional Wireless Sensor Networks

Hierarchical Agglomerative Aggregation Scheduling in Directional Wireless Sensor Networks Hierarchical Agglomerative Aggregation Scheduling in Directional Wireless Sensor Networks Min Kyung An Department of Computer Science Sam Houston State University Huntsville, Texas 77341, USA Email: an@shsu.edu

More information

A GRASP HEURISTIC FOR THE COOPERATIVE COMMUNICATION PROBLEM IN AD HOC NETWORKS

A GRASP HEURISTIC FOR THE COOPERATIVE COMMUNICATION PROBLEM IN AD HOC NETWORKS A GRASP HEURISTIC FOR THE COOPERATIVE COMMUNICATION PROBLEM IN AD HOC NETWORKS C. COMMANDER, C.A.S. OLIVEIRA, P.M. PARDALOS, AND M.G.C. RESENDE ABSTRACT. Ad hoc networks are composed of a set of wireless

More information

A GRASP heuristic for the Cooperative Communication Problem in Ad Hoc Networks

A GRASP heuristic for the Cooperative Communication Problem in Ad Hoc Networks MIC2005: The Sixth Metaheuristics International Conference??-1 A GRASP heuristic for the Cooperative Communication Problem in Ad Hoc Networks Clayton Commander Carlos A.S. Oliveira Panos M. Pardalos Mauricio

More information

Universal Cycles for Permutations Theory and Applications

Universal Cycles for Permutations Theory and Applications Universal Cycles for Permutations Theory and Applications Alexander Holroyd Microsoft Research Brett Stevens Carleton University Aaron Williams Carleton University Frank Ruskey University of Victoria Combinatorial

More information

From Wireless Network Coding to Matroids. Rico Zenklusen

From Wireless Network Coding to Matroids. Rico Zenklusen From Wireless Network Coding to Matroids Rico Zenklusen A sketch of my research areas/interests Computer Science Combinatorial Optimization Matroids & submodular funct. Rounding algorithms Applications

More information

Optimal Transceiver Scheduling in WDM/TDM Networks. Randall Berry, Member, IEEE, and Eytan Modiano, Senior Member, IEEE

Optimal Transceiver Scheduling in WDM/TDM Networks. Randall Berry, Member, IEEE, and Eytan Modiano, Senior Member, IEEE IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 23, NO. 8, AUGUST 2005 1479 Optimal Transceiver Scheduling in WDM/TDM Networks Randall Berry, Member, IEEE, and Eytan Modiano, Senior Member, IEEE

More information

Planar tautologies, hard for Resolution

Planar tautologies, hard for Resolution Planar tautologies, hard for Resolution Stefan Dantchev 1 Dept. of Mathematics and Computer Science, University of Leicester dantchev@mcs.le.ac.uk Søren Riis Dept. of Computer Science, Queen Mary, University

More information

Faithful Representations of Graphs by Islands in the Extended Grid

Faithful Representations of Graphs by Islands in the Extended Grid Faithful Representations of Graphs by Islands in the Extended Grid Michael D. Coury Pavol Hell Jan Kratochvíl Tomáš Vyskočil Department of Applied Mathematics and Institute for Theoretical Computer Science,

More information

Mobile Ad Hoc Networks Theory of Interferences, Trade-Offs between Energy, Congestion and Delay

Mobile Ad Hoc Networks Theory of Interferences, Trade-Offs between Energy, Congestion and Delay Mobile Ad Hoc Networks Theory of Interferences, Trade-Offs between Energy, Congestion and Delay 5th Week 14.05.-18.05.2007 Christian Schindelhauer schindel@informatik.uni-freiburg.de 1 Unit Disk Graphs

More information

Energy-Efficient Data Management for Sensor Networks

Energy-Efficient Data Management for Sensor Networks Energy-Efficient Data Management for Sensor Networks Al Demers, Cornell University ademers@cs.cornell.edu Johannes Gehrke, Cornell University Rajmohan Rajaraman, Northeastern University Niki Trigoni, Cornell

More information

Robust Location Detection in Emergency Sensor Networks. Goals

Robust Location Detection in Emergency Sensor Networks. Goals Robust Location Detection in Emergency Sensor Networks S. Ray, R. Ungrangsi, F. D. Pellegrini, A. Trachtenberg, and D. Starobinski. Robust location detection in emergency sensor networks. In Proceedings

More information

Gateways Placement in Backbone Wireless Mesh Networks

Gateways Placement in Backbone Wireless Mesh Networks I. J. Communications, Network and System Sciences, 2009, 1, 1-89 Published Online February 2009 in SciRes (http://www.scirp.org/journal/ijcns/). Gateways Placement in Backbone Wireless Mesh Networks Abstract

More information

Clock Synchronization

Clock Synchronization Clock Synchronization Chapter 9 d Hoc and Sensor Networks Roger Wattenhofer 9/1 coustic Detection (Shooter Detection) Sound travels much slower than radio signal (331 m/s) This allows for quite accurate

More information

arxiv: v1 [cs.cc] 21 Jun 2017

arxiv: v1 [cs.cc] 21 Jun 2017 Solving the Rubik s Cube Optimally is NP-complete Erik D. Demaine Sarah Eisenstat Mikhail Rudoy arxiv:1706.06708v1 [cs.cc] 21 Jun 2017 Abstract In this paper, we prove that optimally solving an n n n Rubik

More information

Radio Aggregation Scheduling

Radio Aggregation Scheduling Radio Aggregation Scheduling ALGOSENSORS 2015 Rajiv Gandhi, Magnús M. Halldórsson, Christian Konrad, Guy Kortsarz, Hoon Oh 18.09.2015 Aggregation Scheduling in Radio Networks Goal: Convergecast, all nodes

More information

Computational Geometry: Theory and Applications

Computational Geometry: Theory and Applications Computational Geometry 43 (2010) 182 190 Contents lists available at ScienceDirect Computational Geometry: Theory and Applications www.elsevier.com/locate/comgeo Homogeneous 2-hop broadcast in 2D Gautam

More information

Algorithms. Abstract. We describe a simple construction of a family of permutations with a certain pseudo-random

Algorithms. Abstract. We describe a simple construction of a family of permutations with a certain pseudo-random Generating Pseudo-Random Permutations and Maimum Flow Algorithms Noga Alon IBM Almaden Research Center, 650 Harry Road, San Jose, CA 9510,USA and Sackler Faculty of Eact Sciences, Tel Aviv University,

More information

CCO Commun. Comb. Optim.

CCO Commun. Comb. Optim. Communications in Combinatorics and Optimization Vol. 2 No. 2, 2017 pp.149-159 DOI: 10.22049/CCO.2017.25918.1055 CCO Commun. Comb. Optim. Graceful labelings of the generalized Petersen graphs Zehui Shao

More information

Keyword: AVR Microcontroller, GSM, LCD, remote monitoring, Sensors, ZigBee.

Keyword: AVR Microcontroller, GSM, LCD, remote monitoring, Sensors, ZigBee. Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Design & Implementation

More information

Improved Algorithm for Broadcast Scheduling of Minimal Latency in Wireless Ad Hoc Networks

Improved Algorithm for Broadcast Scheduling of Minimal Latency in Wireless Ad Hoc Networks Acta Mathematicae Applicatae Sinica, English Series Vol. 26, No. 1 (2010) 13 22 DOI: 10.1007/s10255-008-8806-2 http://www.applmath.com.cn Acta Mathema ca Applicatae Sinica, English Series The Editorial

More information

SYSTEM SENSOR WIRELESS REMOTE INDICATOR PRODUCT SPECIFICATION

SYSTEM SENSOR WIRELESS REMOTE INDICATOR PRODUCT SPECIFICATION Model name: M200I-RF Introduction: The 200 Series Commercial RF System is designed for use with compatible intelligent fire systems using the System Sensor 200/500 Series CLIP, Enhanced and Advanced communication

More information

Broadcast with Heterogeneous Node Capability

Broadcast with Heterogeneous Node Capability Broadcast with Heterogeneous Node Capability Intae Kang and Radha Poovendran Department of Electrical Engineering, University of Washington, Seattle, WA. email: {kangit,radha}@ee.washington.edu Abstract

More information

Towards generalizing thrackles to arbitrary graphs

Towards generalizing thrackles to arbitrary graphs Towards generalizing thrackles to arbitrary graphs Jin-Woo Bryan Oh PRIMES-USA; Mentor: Rik Sengupta May 18, 2013 Thrackles and known results Thrackles and known results What is a thrackle? Thrackles and

More information

Lecture Notes 3: Paging, K-Server and Metric Spaces

Lecture Notes 3: Paging, K-Server and Metric Spaces Online Algorithms 16/11/11 Lecture Notes 3: Paging, K-Server and Metric Spaces Professor: Yossi Azar Scribe:Maor Dan 1 Introduction This lecture covers the Paging problem. We present a competitive online

More information

How hard are computer games? Graham Cormode, DIMACS

How hard are computer games? Graham Cormode, DIMACS How hard are computer games? Graham Cormode, DIMACS graham@dimacs.rutgers.edu 1 Introduction Computer scientists have been playing computer games for a long time Think of a game as a sequence of Levels,

More information

Scheduling Data Collection with Dynamic Traffic Patterns in Wireless Sensor Networks

Scheduling Data Collection with Dynamic Traffic Patterns in Wireless Sensor Networks Scheduling Data Collection with Dynamic Traffic Patterns in Wireless Sensor Networks Wenbo Zhao and Xueyan Tang School of Computer Engineering, Nanyang Technological University, Singapore 639798 Email:

More information

Minimum-Latency Broadcast Scheduling in Wireless Ad Hoc Networks

Minimum-Latency Broadcast Scheduling in Wireless Ad Hoc Networks Minimum-Latency Broadcast Scheduling in Wireless Ad Hoc Networks Scott C.-H. Huang, Peng-Jun Wan, Xiaohua Jia, Hongwei Du and Weiping Shang Department of Computer Science, City University of Hong Kong.

More information

On the Price of Proactivizing Round-Optimal Perfectly Secret Message Transmission

On the Price of Proactivizing Round-Optimal Perfectly Secret Message Transmission On the Price of Proactivizing Round-Optimal Perfectly Secret Message Transmission Ravi Kishore Ashutosh Kumar Chiranjeevi Vanarasa Kannan Srinathan Abstract In a network of n nodes (modelled as a digraph),

More information

Power Theft Identification system using Power Line Carrier Communication (PLCC) technique in Distribution system based on Binary Search Algorithm

Power Theft Identification system using Power Line Carrier Communication (PLCC) technique in Distribution system based on Binary Search Algorithm 1 Power Theft Identification system using Power Line Carrier Communication (PLCC) technique in Distribution system based on Binary Search Algorithm Thiruvalluvan S 1, Swardheep B 2, Arunachalam S 3 Abstract

More information

Physical Synthesis of Bus Matrix for High Bandwidth Low Power On-chip Communications

Physical Synthesis of Bus Matrix for High Bandwidth Low Power On-chip Communications Physical Synthesis of Bus Matrix for High Bandwidth Low Power On-chip Communications Renshen Wang 1, Evangeline Young 2, Ronald Graham 1 and Chung-Kuan Cheng 1 1 University of California San Diego 2 The

More information

Monitoring Churn in Wireless Networks

Monitoring Churn in Wireless Networks Monitoring Churn in Wireless Networks Stephan Holzer 1 Yvonne-Anne Pignolet 2 Jasmin Smula 1 Roger Wattenhofer 1 {stholzer, smulaj, wattenhofer}@tik.ee.ethz.ch, yvonne-anne.pignolet@ch.abb.com 1 Computer

More information

Capacity of Dual-Radio Multi-Channel Wireless Sensor Networks for Continuous Data Collection

Capacity of Dual-Radio Multi-Channel Wireless Sensor Networks for Continuous Data Collection This paper was presented as part of the main technical program at IEEE INFOCOM 2011 Capacity of Dual-Radio Multi-Channel ireless Sensor Networks for Continuous Data Collection Shouling Ji Department of

More information

Mobility Tolerant Broadcast in Mobile Ad Hoc Networks

Mobility Tolerant Broadcast in Mobile Ad Hoc Networks Mobility Tolerant Broadcast in Mobile Ad Hoc Networks Pradip K Srimani 1 and Bhabani P Sinha 2 1 Department of Computer Science, Clemson University, Clemson, SC 29634 0974 2 Electronics Unit, Indian Statistical

More information

arxiv: v1 [cs.cc] 12 Dec 2017

arxiv: v1 [cs.cc] 12 Dec 2017 Computational Properties of Slime Trail arxiv:1712.04496v1 [cs.cc] 12 Dec 2017 Matthew Ferland and Kyle Burke July 9, 2018 Abstract We investigate the combinatorial game Slime Trail. This game is played

More information

Lower Bounds for the Number of Bends in Three-Dimensional Orthogonal Graph Drawings

Lower Bounds for the Number of Bends in Three-Dimensional Orthogonal Graph Drawings ÂÓÙÖÒÐ Ó ÖÔ ÐÓÖØÑ Ò ÔÔÐØÓÒ ØØÔ»»ÛÛÛº ºÖÓÛÒºÙ»ÔÙÐØÓÒ»» vol.?, no.?, pp. 1 44 (????) Lower Bounds for the Number of Bends in Three-Dimensional Orthogonal Graph Drawings David R. Wood School of Computer Science

More information

Chapter 5 Backtracking. The Backtracking Technique The n-queens Problem The Sum-of-Subsets Problem Graph Coloring The 0-1 Knapsack Problem

Chapter 5 Backtracking. The Backtracking Technique The n-queens Problem The Sum-of-Subsets Problem Graph Coloring The 0-1 Knapsack Problem Chapter 5 Backtracking The Backtracking Technique The n-queens Problem The Sum-of-Subsets Problem Graph Coloring The 0-1 Knapsack Problem Backtracking maze puzzle following every path in maze until a dead

More information

OVSF code groups and reduction in call blocking for WCDMA systems

OVSF code groups and reduction in call blocking for WCDMA systems Indian Journal of Radio & Space Physics Vol 37, April 2008, pp. 143-147 OVSF code groups and reduction in call blocking for WCDMA systems Davinder S Saini, Sunil V Bhooshan & T Chakravarty Department of

More information

Pearl Puzzles are NP-complete

Pearl Puzzles are NP-complete Pearl Puzzles are NP-complete Erich Friedman Stetson University, DeLand, FL 32723 efriedma@stetson.edu Introduction Pearl puzzles are pencil and paper puzzles which originated in Japan [11]. Each puzzle

More information

A Factor Graph Based Dynamic Spectrum Allocation Approach for Cognitive Network

A Factor Graph Based Dynamic Spectrum Allocation Approach for Cognitive Network IEEE WCNC - Network A Factor Graph Based Dynamic Spectrum Allocation Approach for Cognitive Network Shu Chen, Yan Huang Department of Computer Science & Engineering Universities of North Texas Denton,

More information

5.4 Imperfect, Real-Time Decisions

5.4 Imperfect, Real-Time Decisions 5.4 Imperfect, Real-Time Decisions Searching through the whole (pruned) game tree is too inefficient for any realistic game Moves must be made in a reasonable amount of time One has to cut off the generation

More information

SOLITAIRE CLOBBER AS AN OPTIMIZATION PROBLEM ON WORDS

SOLITAIRE CLOBBER AS AN OPTIMIZATION PROBLEM ON WORDS INTEGERS: ELECTRONIC JOURNAL OF COMBINATORIAL NUMBER THEORY 8 (2008), #G04 SOLITAIRE CLOBBER AS AN OPTIMIZATION PROBLEM ON WORDS Vincent D. Blondel Department of Mathematical Engineering, Université catholique

More information

Bit Reversal Broadcast Scheduling for Ad Hoc Systems

Bit Reversal Broadcast Scheduling for Ad Hoc Systems Bit Reversal Broadcast Scheduling for Ad Hoc Systems Marcin Kik, Maciej Gebala, Mirosław Wrocław University of Technology, Poland IDCS 2013, Hangzhou How to broadcast efficiently? Broadcasting ad hoc systems

More information

Frequency and Power Allocation for Low Complexity Energy Efficient OFDMA Systems with Proportional Rate Constraints

Frequency and Power Allocation for Low Complexity Energy Efficient OFDMA Systems with Proportional Rate Constraints Frequency and Power Allocation for Low Complexity Energy Efficient OFDMA Systems with Proportional Rate Constraints Pranoti M. Maske PG Department M. B. E. Society s College of Engineering Ambajogai Ambajogai,

More information

Performance Analysis of a 1-bit Feedback Beamforming Algorithm

Performance Analysis of a 1-bit Feedback Beamforming Algorithm Performance Analysis of a 1-bit Feedback Beamforming Algorithm Sherman Ng Mark Johnson Electrical Engineering and Computer Sciences University of California at Berkeley Technical Report No. UCB/EECS-2009-161

More information

Autonomous Obstacle Avoiding and Path Following Rover

Autonomous Obstacle Avoiding and Path Following Rover Volume 114 No. 9 2017, 271-281 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu Autonomous Obstacle Avoiding and Path Following Rover ijpam.eu Sandeep Polina

More information

Design of intelligent surveillance systems: a game theoretic case. Nicola Basilico Department of Computer Science University of Milan

Design of intelligent surveillance systems: a game theoretic case. Nicola Basilico Department of Computer Science University of Milan Design of intelligent surveillance systems: a game theoretic case Nicola Basilico Department of Computer Science University of Milan Introduction Intelligent security for physical infrastructures Our objective:

More information

COMP Online Algorithms. Paging and k-server Problem. Shahin Kamali. Lecture 9 - Oct. 4, 2018 University of Manitoba

COMP Online Algorithms. Paging and k-server Problem. Shahin Kamali. Lecture 9 - Oct. 4, 2018 University of Manitoba COMP 7720 - Online Algorithms Paging and k-server Problem Shahin Kamali Lecture 9 - Oct. 4, 2018 University of Manitoba COMP 7720 - Online Algorithms Paging and k-server Problem 1 / 20 Review & Plan COMP

More information

RAINBOW COLORINGS OF SOME GEOMETRICALLY DEFINED UNIFORM HYPERGRAPHS IN THE PLANE

RAINBOW COLORINGS OF SOME GEOMETRICALLY DEFINED UNIFORM HYPERGRAPHS IN THE PLANE 1 RAINBOW COLORINGS OF SOME GEOMETRICALLY DEFINED UNIFORM HYPERGRAPHS IN THE PLANE 1 Introduction Brent Holmes* Christian Brothers University Memphis, TN 38104, USA email: bholmes1@cbu.edu A hypergraph

More information

NEW APPLICATIONS of wireless multi-hop networks,

NEW APPLICATIONS of wireless multi-hop networks, 1 TDMA Delay Aware Lin Scheduling for Multi-hop Wireless Networs Petar Djuic and Shahroh Valaee Abstract Time division multiple access (TDMA) based medium access control (MAC) protocols can provide QoS

More information

Broadcast in Radio Networks in the presence of Byzantine Adversaries

Broadcast in Radio Networks in the presence of Byzantine Adversaries Broadcast in Radio Networks in the presence of Byzantine Adversaries Vinod Vaikuntanathan Abstract In PODC 0, Koo [] presented a protocol that achieves broadcast in a radio network tolerating (roughly)

More information

Routing versus Network Coding in Erasure Networks with Broadcast and Interference Constraints

Routing versus Network Coding in Erasure Networks with Broadcast and Interference Constraints Routing versus Network Coding in Erasure Networks with Broadcast and Interference Constraints Brian Smith Department of ECE University of Texas at Austin Austin, TX 7872 bsmith@ece.utexas.edu Piyush Gupta

More information

3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007

3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007 3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 53, NO 10, OCTOBER 2007 Resource Allocation for Wireless Fading Relay Channels: Max-Min Solution Yingbin Liang, Member, IEEE, Venugopal V Veeravalli, Fellow,

More information

A Simple Greedy Algorithm for Link Scheduling with the Physical Interference Model

A Simple Greedy Algorithm for Link Scheduling with the Physical Interference Model A Simple Greedy Algorithm for Link Scheduling with the Physical Interference Model Abstract In wireless networks, mutual interference prevents wireless devices from correctly receiving packages from others

More information

Reduced Complexity by Incorporating Sphere Decoder with MIMO STBC HARQ Systems

Reduced Complexity by Incorporating Sphere Decoder with MIMO STBC HARQ Systems I J C T A, 9(34) 2016, pp. 417-421 International Science Press Reduced Complexity by Incorporating Sphere Decoder with MIMO STBC HARQ Systems B. Priyalakshmi #1 and S. Murugaveni #2 ABSTRACT The objective

More information

Multicast Energy Aware Routing in Wireless Networks

Multicast Energy Aware Routing in Wireless Networks Ahmad Karimi Department of Mathematics, Behbahan Khatam Alanbia University of Technology, Behbahan, Iran karimi@bkatu.ac.ir ABSTRACT Multicasting is a service for disseminating data to a group of hosts

More information

The Symmetric Traveling Salesman Problem by Howard Kleiman

The Symmetric Traveling Salesman Problem by Howard Kleiman I. INTRODUCTION The Symmetric Traveling Salesman Problem by Howard Kleiman Let M be an nxn symmetric cost matrix where n is even. We present an algorithm that extends the concept of admissible permutation

More information

COMP Online Algorithms. Paging and k-server Problem. Shahin Kamali. Lecture 11 - Oct. 11, 2018 University of Manitoba

COMP Online Algorithms. Paging and k-server Problem. Shahin Kamali. Lecture 11 - Oct. 11, 2018 University of Manitoba COMP 7720 - Online Algorithms Paging and k-server Problem Shahin Kamali Lecture 11 - Oct. 11, 2018 University of Manitoba COMP 7720 - Online Algorithms Paging and k-server Problem 1 / 19 Review & Plan

More information

CHAPTER 5 PAPR REDUCTION USING HUFFMAN AND ADAPTIVE HUFFMAN CODES

CHAPTER 5 PAPR REDUCTION USING HUFFMAN AND ADAPTIVE HUFFMAN CODES 119 CHAPTER 5 PAPR REDUCTION USING HUFFMAN AND ADAPTIVE HUFFMAN CODES 5.1 INTRODUCTION In this work the peak powers of the OFDM signal is reduced by applying Adaptive Huffman Codes (AHC). First the encoding

More information

Bounded-Hop Energy-Efficient Liveness of Flocking Swarms

Bounded-Hop Energy-Efficient Liveness of Flocking Swarms Bounded-Hop Energy-Efficient Liveness of Flocking Swarms 1 Shlomi Dolev, Senior Member, IEEE, Michael Segal, Senior Member, IEEE, Hanan Shpungin, Member, IEEE Abstract In this paper we consider a set of

More information

On the Lifetime of Large Wireless Sensor Networks with Multiple Battery Levels 1,2

On the Lifetime of Large Wireless Sensor Networks with Multiple Battery Levels 1,2 1 On the Lifetime of Large Wireless Sensor Networks with Multiple Battery Levels 1,2 Mihail L. Sichitiu Rudra Dutta Department of Electrical and Computer Eng. Department of Computer Science North Carolina

More information

CONVERGECAST, namely the collection of data from

CONVERGECAST, namely the collection of data from 1 Fast Data Collection in Tree-Based Wireless Sensor Networks Özlem Durmaz Incel, Amitabha Ghosh, Bhaskar Krishnamachari, and Krishnakant Chintalapudi (USC CENG Technical Report No.: ) Abstract We investigate

More information

ONE of the important applications of wireless stationary

ONE of the important applications of wireless stationary Maximizing Network Lifetime of Broadcasting Over Wireless Stationary Adhoc Networks Intae Kang and Radha Poovendran Department of Electrical Engineering, University of Washington, Seattle, WA email: {kangit,radha}@ee.washington.edu

More information

On the Capacity of Multi-Hop Wireless Networks with Partial Network Knowledge

On the Capacity of Multi-Hop Wireless Networks with Partial Network Knowledge On the Capacity of Multi-Hop Wireless Networks with Partial Network Knowledge Alireza Vahid Cornell University Ithaca, NY, USA. av292@cornell.edu Vaneet Aggarwal Princeton University Princeton, NJ, USA.

More information

Minimum Cost Topology Construction for Survivable Wireless Mesh Networks in Rural Area

Minimum Cost Topology Construction for Survivable Wireless Mesh Networks in Rural Area 0 0th International Conference on Mobile Ad-hoc and Sensor Networks Minimum Cost Topology Construction for Survivable Wireless Mesh Networks in Rural Area Suk Jin Lee* Computer Science Texas A&M University

More information

On Optimum Communication Cost for Joint Compression and Dispersive Information Routing

On Optimum Communication Cost for Joint Compression and Dispersive Information Routing 2010 IEEE Information Theory Workshop - ITW 2010 Dublin On Optimum Communication Cost for Joint Compression and Dispersive Information Routing Kumar Viswanatha, Emrah Akyol and Kenneth Rose Department

More information

Superimposed Code Based Channel Assignment in Multi-Radio Multi-Channel Wireless Mesh Networks

Superimposed Code Based Channel Assignment in Multi-Radio Multi-Channel Wireless Mesh Networks Superimposed Code Based Channel Assignment in Multi-Radio Multi-Channel Wireless Mesh Networks ABSTRACT Kai Xing & Xiuzhen Cheng & Liran Ma Department of Computer Science The George Washington University

More information