Geometric Routing: Of Theory and Practice
|
|
- Randolf Wilkins
- 5 years ago
- Views:
Transcription
1 Geometric Routing: Of Theory and Practice PODC 03 F. Kuhn, R. Wattenhofer, Y. Zhang, A. Zollinger [KWZ 02] [KWZ 03] [KK 00] Asymptotically Optimal Geometric Mobile Ad-Hoc Routing Worst-Case Optimal and Average-Case Efficient Geometric Ad-Hoc Routing GPSR: Greedy Perimeter Stateless Routing for Wireless Networks
2 Outline Context Model Algorithm Correctness Worst-case complexity Average-case efficiency Extensions
3 Context Routing Paradigm s If s and t are not connected, then report so? t
4 Context Routing Paradigm s If s and t are not connected, then report so Else, find a path p... p t
5 Context Routing Paradigm s If s and t are not connected, then report so p p Else, find a path p s.t. p / p is minimal t
6 Context Routing Paradigm s If s and t are not connected, then report so p p Else, find a path p s.t. p / p is minimal t Minimize amount of memory per node
7 (x, y) v Context Geometric Routing Each node v stores its own and its neighbors positions O(deg(v)) (= O(1) if deg(v) bounded) Each packet contains: the destination s position O(1) additional control info (e.g. estimated dist. to dest.) + No system state, no routing tables Requires an embedding of the nodes
8 Context Geometric Algorithms Greedy Routing + can be applied w. any embedding + very effective in practice
9 Context Geometric Algorithms? Greedy Routing + can be applied w. any embedding + very effective in practice can get stuck
10 Context Geometric Algorithms RH LH? RH LH LH RH RH Greedy Routing + can be applied w. any embedding + very effective in practice can get stuck Face Routing + certified + can be made asymptotically optimal AFR, OAFR [KWZ 02] requires a planar embedding not quite effective in practice
11 Context Geometric Algorithms RH LH? Solution: combine both techniques: Start by greedy routing When greedy routing gets stuck, toggle face routing GOAFR [KWZ 03], GPSR [KK00]
12 Context Geometric Algorithms RH LH? Solution: combine both techniques: Start by greedy routing When greedy routing gets stuck, toggle face routing GOAFR [KWZ 03], GPSR [KK00] fall back to greedy routing as soon as possible (>GPSR) bound the searchable area (>GOAFR) GOAFR+ (this paper)
13 Model input graph G = (V, E) is a PSLG nodes do not move nodes have same transmission range (say 1) G is a subgraph of the unit-disk graph G UDG (V ) each node has O(1) neighbors in G UDG (V ) G is a subgraph of the Gabriel graph G GG (V ) edges have various transmission costs increasing cost function c : ]0, 1] R + c l (x) = 1 x link distance c d (x) = x x Euclidean distance c α (x) = x α x (α 2) energy cost
14 Model Equivalence of metrics Lemma Assume the degrees of the vertices of G UDG (V ) are bounded by an absolute constant k. Then, for any cost functions c 1 (.) and c 2 (.), there exist four constants: α(k), β(k), α (k), β (k), such that for any cycle-free path p in G UDG (V ), α(k) c 1 (p) + β(k) c 2 (p) α (k) c 1 (p) + β (k)
15 Model Equivalence of metrics Lemma Assume the degrees of the vertices of G UDG (V ) are bounded by an absolute constant k. Then, for any cost functions c 1 (.) and c 2 (.), there exist four constants: α(k), β(k), α (k), β (k), such that for any cycle-free path p in G UDG (V ), α(k) c 1 (p) + β(k) c 2 (p) α (k) c 1 (p) + β (k) Proof. (with c 1 = c d and c 2 = c l ) Every edge of G has length at most 1 c d (p) c l (p). v, #(V D(v, 1)) k starting from v, p cannot travel more than k + 1 edges inside D(v, 1) without making a cycle c l (p) (k + 1) c d (p) (k + 1)(c d (p) + 1). D(v, 1) v
16 Model Equivalence of metrics Lemma Assume the degrees of the vertices of G UDG (V ) are bounded by an absolute constant k. Then, for any cost functions c 1 (.) and c 2 (.), there exist four constants: α(k), β(k), α (k), β (k), such that for any cycle-free path p in G UDG (V ), α(k) c 1 (p) + β(k) c 2 (p) α (k) c 1 (p) + β (k) In the sequel, wlog, we use the link distance metric c l
17 GOAFR+ Algorithm INPUT: G, s, t s t
18 GOAFR+ Algorithm INPUT: G, s, t INIT: ρ ρ 0 > 1 σ > 0 C(t, ρ 0 d(s, t)) s t C
19 GOAFR+ Algorithm INPUT: G, s, t INIT: ρ ρ 0 > 1 σ > 0 C(t, ρ 0 d(s, t)) 1. Greedy Routing Mode - choose neighbor closest to t - reduce C s radius whenever possible (r C := r C/ρ) s t C
20 GOAFR+ Algorithm INPUT: G, s, t INIT: ρ ρ 0 > 1 σ > 0 C(t, ρ 0 d(s, t)) 1. Greedy Routing Mode - choose neighbor closest to t - reduce C s radius whenever possible (r C := r C/ρ) 2. Face Routing Mode Maintain: p = #{nodes closer than u} q = #{other nodes} Follow side of F (LH) until one of the following occurs: s u min. F p = 0 q = 1 t C
21 GOAFR+ Algorithm INPUT: G, s, t INIT: ρ ρ 0 > 1 σ > 0 C(t, ρ 0 d(s, t)) 1. Greedy Routing Mode - choose neighbor closest to t - reduce C s radius whenever possible (r C := r C/ρ) 2. Face Routing Mode Maintain: p = #{nodes closer than u} q = #{other nodes} Follow side of F (LH) until one of the following occurs: s u F p = 0 q = 2 t C
22 GOAFR+ Algorithm INPUT: G, s, t INIT: ρ ρ 0 > 1 σ > 0 C(t, ρ 0 d(s, t)) 1. Greedy Routing Mode - choose neighbor closest to t - reduce C s radius whenever possible (r C := r C/ρ) 2. Face Routing Mode Maintain: p = #{nodes closer than u} q = #{other nodes} Follow side of F (LH) until one of the following occurs: 2a. packet hits C once: go backwards hits C s u F p = 0 q = 2 t C
23 GOAFR+ Algorithm INPUT: G, s, t INIT: ρ ρ 0 > 1 σ > 0 C(t, ρ 0 d(s, t)) 1. Greedy Routing Mode - choose neighbor closest to t - reduce C s radius whenever possible (r C := r C/ρ) 2. Face Routing Mode Maintain: p = #{nodes closer than u} q = #{other nodes} Follow side of F (LH) until one of the following occurs: 2a. packet hits C once: go backwards s u F p = 0 q = 2 t C
24 GOAFR+ Algorithm INPUT: G, s, t INIT: ρ ρ 0 > 1 σ > 0 C(t, ρ 0 d(s, t)) 1. Greedy Routing Mode - choose neighbor closest to t - reduce C s radius whenever possible (r C := r C/ρ) 2. Face Routing Mode Maintain: p = #{nodes closer than u} q = #{other nodes} Follow side of F (LH) until one of the following occurs: 2a. packet hits C once: go backwards s u F p = 0 q = 3 t C
25 GOAFR+ Algorithm INPUT: G, s, t INIT: ρ ρ 0 > 1 σ > 0 C(t, ρ 0 d(s, t)) 1. Greedy Routing Mode - choose neighbor closest to t - reduce C s radius whenever possible (r C := r C/ρ) 2. Face Routing Mode Maintain: p = #{nodes closer than u} q = #{other nodes} Follow side of F (LH) until one of the following occurs: 2a. packet hits C once: go backwards s v u F p = 0 q = 3 t 2b. packet hits C twice: if p > 0, then restart 1. from node closest to t hits C C
26 GOAFR+ Algorithm INPUT: G, s, t INIT: ρ ρ 0 > 1 σ > 0 C(t, ρ 0 d(s, t)) 1. Greedy Routing Mode - choose neighbor closest to t - reduce C s radius whenever possible (r C := r C/ρ) 2. Face Routing Mode Maintain: p = #{nodes closer than u} q = #{other nodes} Follow side of F (LH) until one of the following occurs: 2a. packet hits C once: go backwards s v u F p = 0 q = 4 t 2b. packet hits C twice: if p > 0, then restart 1. from node closest to t else, set r C := ρ r c and continue 2. from v C
27 GOAFR+ Algorithm INPUT: G, s, t INIT: ρ ρ 0 > 1 σ > 0 C(t, ρ 0 d(s, t)) 1. Greedy Routing Mode - choose neighbor closest to t - reduce C s radius whenever possible (r C := r C/ρ) 2. Face Routing Mode Maintain: p = #{nodes closer than u} q = #{other nodes} Follow side of F (LH) until one of the following occurs: 2a. packet hits C once: go backwards s v u F p = 0 q = 5 t 2b. packet hits C twice: if p > 0, then restart 1. from node closest to t else, set r C := ρ r c and continue 2. from v C
28 GOAFR+ Algorithm INPUT: G, s, t INIT: ρ ρ 0 > 1 σ > 0 C(t, ρ 0 d(s, t)) 1. Greedy Routing Mode - choose neighbor closest to t - reduce C s radius whenever possible (r C := r C/ρ) 2. Face Routing Mode Maintain: p = #{nodes closer than u} q = #{other nodes} Follow side of F (LH) until one of the following occurs: 2a. packet hits C once: go backwards s v u F p = 0 q = 6 t 2b. packet hits C twice: if p > 0, then restart 1. from node closest to t else, set r C := ρ r c and continue 2. from v C
29 GOAFR+ Algorithm INPUT: G, s, t INIT: ρ ρ 0 > 1 σ > 0 C(t, ρ 0 d(s, t)) 1. Greedy Routing Mode - choose neighbor closest to t - reduce C s radius whenever possible (r C := r C/ρ) 2. Face Routing Mode Maintain: p = #{nodes closer than u} q = #{other nodes} Follow side of F (LH) until one of the following occurs: 2a. packet hits C once: go backwards s v u F p = 1 q = 6 t 2b. packet hits C twice: if p > 0, then restart 1. from node closest to t else, set r C := ρ r c and continue 2. from v C
30 GOAFR+ Algorithm INPUT: G, s, t INIT: ρ ρ 0 > 1 σ > 0 C(t, ρ 0 d(s, t)) 1. Greedy Routing Mode - choose neighbor closest to t - reduce C s radius whenever possible (r C := r C/ρ) 2. Face Routing Mode Maintain: p = #{nodes closer than u} q = #{other nodes} Follow side of F (LH) until one of the following occurs: 2a. packet hits C once: go backwards s v u F p = 2 q = 6 w t 2b. packet hits C twice: if p > 0, then restart 1. from node closest to t else, set r C := ρ r c and continue 2. from v 2c. p > σ q : restart 1. from node closest to t C
31 GOAFR+ Algorithm INPUT: G, s, t INIT: ρ ρ 0 > 1 σ > 0 C(t, ρ 0 d(s, t)) 1. Greedy Routing Mode - choose neighbor closest to t - reduce C s radius whenever possible (r C := r C/ρ) 2. Face Routing Mode Maintain: p = #{nodes closer than u} q = #{other nodes} Follow side of F (LH) until one of the following occurs: 2a. packet hits C once: go backwards s v u F p = 2 q = 6 w t 2b. packet hits C twice: if p > 0, then restart 1. from node closest to t else, set r C := ρ r c and continue 2. from v 2c. p > σ q : restart 1. from node closest to t C
32 GOAFR+ Algorithm INPUT: G, s, t INIT: ρ ρ 0 > 1 σ > 0 C(t, ρ 0 d(s, t)) 1. Greedy Routing Mode - choose neighbor closest to t - reduce C s radius whenever possible (r C := r C/ρ) 2. Face Routing Mode Maintain: p = #{nodes closer than u} q = #{other nodes} Follow side of F (LH) until one of the following occurs: 2a. packet hits C once: go backwards s v u F p = 2 q = 6 w t 2b. packet hits C twice: if p > 0, then restart 1. from node closest to t else, set r C := ρ r c and continue 2. from v 2c. p > σ q : restart 1. from node closest to t C
33 GOAFR+ Algorithm INPUT: G, s, t INIT: ρ ρ 0 > 1 σ > 0 C(t, ρ 0 d(s, t)) 1. Greedy Routing Mode - choose neighbor closest to t - reduce C s radius whenever possible (r C := r C/ρ) 2. Face Routing Mode Maintain: p = #{nodes closer than u} q = #{other nodes} Follow side of F (LH) until one of the following occurs: 2a. packet hits C once: go backwards s v u F p = 2 q = 6 w t 2b. packet hits C twice: if p > 0, then restart 1. from node closest to t else, set r C := ρ r c and continue 2. from v 2c. p > σ q : restart 1. from node closest to t C
34 GOAFR+ Algorithm INPUT: G, s, t INIT: ρ ρ 0 > 1 σ > 0 C(t, ρ 0 d(s, t)) 1. Greedy Routing Mode - choose neighbor closest to t - reduce C s radius whenever possible (r C := r C/ρ) 2. Face Routing Mode Maintain: p = #{nodes closer than u} q = #{other nodes} Follow side of F (LH) until one of the following occurs: 2a. packet hits C once: go backwards s v u F p = 2 q = 6 w t 2b. packet hits C twice: if p > 0, then restart 1. from node closest to t else, set r C := ρ r c and continue 2. from v 2c. p > σ q : restart 1. from node closest to t C
35 GOAFR+ Algorithm INPUT: G, s, t INIT: ρ ρ 0 > 1 σ > 0 C(t, ρ 0 d(s, t)) 1. Greedy Routing Mode - choose neighbor closest to t - reduce C s radius whenever possible (r C := r C/ρ) 2. Face Routing Mode Maintain: p = #{nodes closer than u} q = #{other nodes} Follow side of F (LH) until one of the following occurs: 2a. packet hits C once: go backwards s v u F p = 2 q = 6 w C t 2b. packet hits C twice: if p > 0, then restart 1. from node closest to t else, set r C := ρ r c and continue 2. from v 2c. p > σ q : restart 1. from node closest to t
36 GOAFR+ Algorithm INPUT: G, s, t INIT: ρ ρ 0 > 1 σ > 0 C(t, ρ 0 d(s, t)) 1. Greedy Routing Mode - choose neighbor closest to t - reduce C s radius whenever possible (r C := r C/ρ) 2. Face Routing Mode Maintain: p = #{nodes closer than u} q = #{other nodes} Follow side of F (LH) until one of the following occurs: 2a. packet hits C once: go backwards s v u F p = 2 q = 6 w C t 2b. packet hits C twice: if p > 0, then restart 1. from node closest to t else, set r C := ρ r c and continue 2. from v 2c. p > σ q : restart 1. from node closest to t
37 GOAFR+ Algorithm INPUT: G, s, t INIT: ρ ρ 0 > 1 σ > 0 C(t, ρ 0 d(s, t)) 1. Greedy Routing Mode - choose neighbor closest to t - reduce C s radius whenever possible (r C := r C/ρ) 2. Face Routing Mode Maintain: p = #{nodes closer than u} q = #{other nodes} Follow side of F (LH) until one of the following occurs: 2a. packet hits C once: go backwards s v u F p = 2 q = 6 w t 2b. packet hits C twice: if p > 0, then restart 1. from node closest to t else, set r C := ρ r c and continue 2. from v 2c. p > σ q : restart 1. from node closest to t 2d. F is entirely explored: let n F be closest to t: if n closer than u to t, then restart 1. from n else report graph disconnection to s (w. GOAFR+)
38 Definition a greedy step (1.) Correctness A round of the algorithm is either: a face routing phase terminated by early fallback (2b. or 2c.) a face routing phase terminated after complete exploration of the boundary of the current face (2d.)
39 Correctness Lemma (monotonicity) Consider a round of the algorithm. If t and the current node u are connected in G, then the packet gets closer to t during the round.
40 Correctness Lemma (monotonicity) Consider a round of the algorithm. If t and the current node u are connected in G, then the packet gets closer to t during the round. Proof. greedy step: the packet goes to a neighbor of u closer to t 2b. or 2c.: when fallback occurs, p 1 and the packet is sent to the previously visited node of F closest to t
41 Correctness Lemma (monotonicity) Consider a round of the algorithm. If t and the current node u are connected in G, then the packet gets closer to t during the round. Proof. greedy step: the packet goes to a neighbor of u closer to t 2b. or 2c.: when fallback occurs, p 1 and the packet is sent to the previously visited node of F closest to t 2d.: since u and t are connected, F contains a vertex closer than u to t. Indeed, if not, an edge e crosses the circle C(t, d(t, u)) between t and u. e cannot be a Gabriel edge. u e t
42 Worst-case complexity Upper bound Theorem The cost of routing a packet from s to t with GOAFR+ is O ( c l (p ) 2), where p is an optimal path from s to t.
43 Worst-case complexity Upper bound Theorem The cost of routing a packet from s to t with GOAFR+ is O ( c l (p ) 2), where p is an optimal path from s to t. Sketch of proof. Let C i = C(t, r max ρ i ), where r max is the radius of the biggest circle C used during the course of the algorithm. (1) r max ρ c l (p ) (radius update policy) p s t p C c d (p ) r c l (p ) r (G UDG ) r C
44 Worst-case complexity Upper bound Theorem The cost of routing a packet from s to t with GOAFR+ is O ( c l (p ) 2), where p is an optimal path from s to t. Sketch of proof. Let C i = C(t, r max ρ i ), where r max is the radius of the biggest circle C used during the course of the algorithm. (1) r max ρ c l (p ) (radius update policy) (2) inside C i, every edge of G is visited O(1) times by GOAFR+ (cf. monotonicity lemma). inside C i, the total cost of GOAFR+ is O( E i ) = O(rC 2 i )
45 Worst-case complexity Upper bound Theorem The cost of routing a packet from s to t with GOAFR+ is O ( c l (p ) 2), where p is an optimal path from s to t. Sketch of proof. Let C i = C(t, r max ρ i ), where r max is the radius of the biggest circle C used during the course of the algorithm. (1) r max ρ c l (p ) (radius update policy) (2) inside C i, every edge of G is visited O(1) times by GOAFR+ (cf. monotonicity lemma). inside C i, the total cost of GOAFR+ is O( E i ) = O(rC 2 i ) (3) sum up over all i s: O ( ( ) ) rc 2 i = r 2 max O ρ 2i = O ( ) ( rmax 2 = O cl (p ) 2) i i
46 Worst-case complexity Given n, distribute 2n nodes evenly along C r n /π Lower bound [KWZ 02] 1 C
47 Worst-case complexity Given n, distribute 2n nodes evenly along C r n /π radial chains stop at r /2 connected only by C n /2π nodes per radius Lower bound [KWZ 02] > 1 r C
48 Worst-case complexity Given n, distribute 2n nodes evenly along C r n /π radial chains stop at r /2 connected only by C n /2π nodes per radius Lower bound [KWZ 02] s t C
49 Given n, distribute 2n nodes evenly along C r n /π radial chains stop at r /2 connected only by C n /2π nodes per radius s Worst-case complexity Lower bound t [KWZ 02] s, t disconnected any algo. A with no routing tables has to explore the whole graph before reporting a graph disconnection. C
50 Worst-case complexity Given n, distribute 2n nodes evenly along C r n /π radial chains stop at r /2 connected only by C n /2π nodes per radius Lower bound [KWZ 02] w s, t disconnected any algo. A with no routing tables has to explore the whole graph before reporting a graph disconnection. s t if A is deterministic, then its execution is the same on this new graph Ω(n 2 ) steps C
51 Average case efficiency randomly and uniformly generated nodes on a field unit disk graph
52 Average case efficiency randomly and uniformly generated nodes on a field unit disk graph intersection with Gabriel graph randomly chosen source and destination
53 Average case efficiency GPSR GOAFR GOAFR FC GOAFR+
54 Extensions Dropping the O(1)-neighbors hypothesis Without the O(1)-neighbors hypothesis, GOAFR+ is still certified, but no longer guaranteed to be worst-case optimal. if a node v knows all its neighbors, then the data stored at v is no longer O(1)
55 Extensions Dropping the O(1)-neighbors hypothesis
56 Extensions Dropping the O(1)-neighbors hypothesis Initial construction: routing backbone graph G BG G: - G BG is a bounded-degree UDG - v G, w G BG s.t. [v, w] E
57 Extensions Dropping the O(1)-neighbors hypothesis Initial construction: routing backbone graph G BG G: - G BG is a bounded-degree UDG - v G, w G BG s.t. [v, w] E clustered backbone graph G CBG
58 Extensions Dropping the O(1)-neighbors hypothesis Initial construction: routing backbone graph G BG G: - G BG is a bounded-degree UDG - v G, w G BG s.t. [v, w] E clustered backbone graph G CBG Routing: (1) reach G BG from s, using G CBG (2) apply GOAFR+ on G BG (3) reach t from G BG, using G CBG
59 Extensions Dropping the O(1)-neighbors hypothesis Definition A cost function c(.) is linearly bounded if there exists some constant m > 0 such that x ]0, 1], c(x) m x. A cost function that is not linearly bounded is said super-linear. 1 c l (.) c d (.) c α (.) 0 1
60 Extensions Dropping the O(1)-neighbors hypothesis Definition A cost function c(.) is linearly bounded if there exists some constant m > 0 such that x ]0, 1], c(x) m x. A cost function that is not linearly bounded is said super-linear. Theorem if c(.) is linearly bounded, then for any UDG G, for any s, t V, the routing algorithm finds a path p from s to t, with c(p) = O ( c(p ) 2). if c(.) is super-linear, then no geometric routing algorithm can find a path p s.t. c(p) = O ( c(p ) 2) for any pair of vertices of any UDG.
61 Conclusion Contributions: Yet another geometric routing algorithm (combines existing techniques). Extension of geometric routing to UDGs with unbounded-degree vertices. Open questions: Is the UDG hypothesis relevant in practice? What is the pracicality of the general cost model linearly bounded vs. super-linear? Can one get rid of the planar embedding?
Geometric Ad-Hoc Routing: Of Theory and Practice. Fabian Kuhn Roger Wattenhofer Yan Zhang Aaron Zollinger
Geometric Ad-Hoc Routing: Of Theory and Practice Fabian Kuhn Roger Wattenhofer Yan Zhang Aaron Zollinger Geometric Routing s??? t s PODC 2003 2 Greedy Routing Each node forwards message to best neighbor
More informationGeographical routing 1
Geographical routing 1 Routing in ad hoc networks Obtain route information between pairs of nodes wishing to communicate. Proactive protocols: maintain routing tables at each node that is updated as changes
More informationGeometric Ad-Hoc Routing: Of Theory and Practice
Geometric Ad-Hoc Routing: Of Theory and Practice Fabian Kuhn, Roger Wattenhofer, Yan Zhang, Aaron Zollinger Department of Computer Science ETH Zurich 8092 Zurich, Switzerland {kuhn, wattenhofer, yzhang,
More informationGeo-Routing. Chapter 2. Ad Hoc and Sensor Networks Roger Wattenhofer
Geo-Routing Chapter 2 Ad Hoc and Sensor Networks Roger Wattenhofer 2/1 Application of the Week: Mesh Networking (Roofnet) Sharing Internet access Cheaper for everybody Several gateways fault-tolerance
More informationSimulations of the quadrilateral-based localization
Simulations of the quadrilateral-based localization Cluster success rate v.s. node degree. Each plot represents a simulation run. 9/15/05 Jie Gao CSE590-fall05 1 Random deployment Poisson distribution
More informationWorst-Case Optimal and Average-Case Efficient Geometric Ad-Hoc Routing
Worst-Case Optimal and Average-Case Efficient Geometric Ad-Hoc Routing Fabian Kuhn, Roger Wattenhofer, Aaron Zollinger Department of Computer Science ETH Zurich 892 Zurich, Switzerland {kuhn, wattenhofer,
More informationChapter 7 TOPOLOGY CONTROL
Chapter 7 TOPOLOGY CONTROL Distributed Computing Group Mobile Computing Winter 2005 / 2006 Overview Topology Control Gabriel Graph et al. XTC Interference SINR & Scheduling Complexity Distributed Computing
More informationRouting. Geo-Routing. Thanks to Stefan Schmid for slides
Routing Geo-Routing Thanks to Stefan Schmid for slides 1 Overview Classic routing overview Geo-routing Greedy geo-routing Euclidean and Planar graphs Face Routing Greedy and Face Routing 2 Shortest path
More informationThe Capacity of Wireless Networks
The Capacity of Wireless Networks Piyush Gupta & P.R. Kumar Rahul Tandra --- EE228 Presentation Introduction We consider wireless networks without any centralized control. Try to analyze the capacity of
More informationChapter 8 DOMINATING SETS
Chapter 8 DOMINATING SETS Distributed Computing Group Mobile Computing Summer 2004 Overview Motivation Dominating Set Connected Dominating Set The Greedy Algorithm The Tree Growing Algorithm The Marking
More informationChapter 6 DOMINATING SETS
Chapter 6 DOMINATING SETS Distributed Computing Group Mobile Computing Summer 2003 Overview Motivation Dominating Set Connected Dominating Set The Greedy Algorithm The Tree Growing Algorithm The Marking
More informationChapter 8 DOMINATING SETS
Distributed Computing Group Chapter 8 DOMINATING SETS Mobile Computing Summer 2004 Overview Motivation Dominating Set Connected Dominating Set The Greedy Algorithm The Tree Growing Algorithm The Marking
More informationData Communication. Guaranteed Delivery Based on Memorization
Data Communication Guaranteed Delivery Based on Memorization Motivation Many greedy routing schemes perform well in dense networks Greedy routing has a small communication overhead Desirable to run Greedy
More informationFace Routing with Guaranteed Message Delivery in Wireless Ad-hoc Networks. Xiaoyang Guan
Face Routing with Guaranteed Message Delivery in Wireless Ad-hoc Networks by Xiaoyang Guan A thesis submitted in conformity with the requirements for the degree of Doctor of Philosophy Graduate Department
More informationLoad Balanced Short Path Routing in Wireless Networks Jie Gao, Stanford University Li Zhang, Hewlett-Packard Labs
Load Balanced Short Path Routing in Wireless Networks Jie Gao, Stanford University Li Zhang, Hewlett-Packard Labs Aravind Ranganathan University of Cincinnati February 22, 2007 Motivation Routing in wireless
More informationVoid Traversal for Guaranteed Delivery in Geometric Routing
Void Traversal for Guaranteed Delivery in Geometric Routing Mikhail Nesterenko and Adnan Vora Computer Science Department Kent State University Kent, OH, 44242 mikhail@cs.kent.edu, avora@cs.kent.edu arxiv:0803.3632v
More informationAn efficient implementation of the greedy forwarding strategy
An efficient implementation of the greedy forwarding strategy Hannes Stratil Embedded Computing Systems Group E182/2 Technische Universität Wien Treitlstraße 3 A-1040 Vienna Email: hannes@ecs.tuwien.ac.at
More informationOn Greedy Geographic Routing Algorithms in Sensing-Covered Networks
On Greedy Geographic Routing Algorithms in Sensing-Covered Networks Guoliang Xing; Chenyang Lu; Robert Pless Department of Computer Science and Engineering Washington University in St. Louis St. Louis,
More informationGeometric Spanners for Routing in Mobile Networks
1 Geometric Spanners for Routing in Mobile Networks Jie Gao, Leonidas J Guibas, John Hershberger, Li Zhang, An Zhu Abstract We propose a new routing graph, the Restricted Delaunay Graph (RDG), for mobile
More informationTheory and Practice of Geographic Routing
Theory and Practice of Geographic Routing Stefan Rührup Department of Computer Science University of Freiburg, Germany February 2009 Abstract Geographic routing algorithms use position information for
More informationA Survey on Geographic Routing Protocols for Mobile Ad hoc Networks
A Survey on Geographic Routing Protocols for Mobile Ad hoc Networks Atekeh Maghsoudlou, Marc St-Hilaire, and Thomas Kunz Department of Systems and Computer Engineering Carleton University, Ottawa, ON,
More informationarxiv: v1 [cs.ni] 28 Apr 2015
Succint greedy routing without metric on planar triangulations Pierre Leone, Kasun Samarasinghe Computer Science Department, University of Geneva, Battelle A, route de Drize 7, 1227 Carouge, Switzerland
More informationAN AD HOC network consists of a collection of mobile
174 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 23, NO. 1, JANUARY 2005 Geometric Spanners for Routing in Mobile Networks Jie Gao, Member, IEEE, Leonidas J. Guibas, John Hershberger, Li Zhang,
More informationLifetime Comparison on Location Base Routing in Wireless Sensor Networks
Lifetime Comparison on Location Base Routing in Wireless Sensor Networks Hadi Asharioun, Hassan Asadollahi, Abdul Samad Ismail, and Sureswaran Ramadass Abstract Lifetime of a sensor network is defined
More informationMidpoint Routing algorithms for Delaunay Triangulations
Midpoint Routing algorithms for Delaunay Triangulations Weisheng Si and Albert Y. Zomaya Centre for Distributed and High Performance Computing School of Information Technologies Prologue The practical
More informationOn Delivery Guarantees of Face and Combined Greedy-Face Routing in Ad Hoc and Sensor Networks
On Delivery Guarantees of Face and Combined Greedy-Face Routing in Ad Hoc and Sensor Networks ABSTRACT Hannes Frey IMADA, University of Southern Denmark DK-5230 Odense M, Denmark frey@imada.sdu.dk It was
More informationDistributed Computing over Communication Networks: Leader Election
Distributed Computing over Communication Networks: Leader Election Motivation Reasons for electing a leader? Reasons for not electing a leader? Motivation Reasons for electing a leader? Once elected, coordination
More informationTopology Control in 3-Dimensional Networks & Algorithms for Multi-Channel Aggregated Co
Topology Control in 3-Dimensional Networks & Algorithms for Multi-Channel Aggregated Convergecast Amitabha Ghosh Yi Wang Ozlem D. Incel V.S. Anil Kumar Bhaskar Krishnamachari Dept. of Electrical Engineering,
More informationApproximating Fault-Tolerant Steiner Subgraphs in Heterogeneous Wireless Networks
Approximating Fault-Tolerant Steiner Subgraphs in Heterogeneous Wireless Networks Ambreen Shahnaz and Thomas Erlebach Department of Computer Science University of Leicester University Road, Leicester LE1
More informationMobile Advanced Networks. Position-based routing geometric, geographic, location-based. Navid Nikaein Mobile Communication Department
Mobile Advanced Networks Position-based routing geometric, geographic, location-based Navid Nikaein Mobile Communication Department Navid Nikaein 2010 1 Reminder In topology-based routing, each node has
More informationRobust Position-based Routing for Wireless Ad Hoc Networks
Robust Position-based Routing for Wireless Ad Hoc Networks Kousha Moaveninejad, Wen-Zhan Song, Xiang-Yang Li Department of Computer Science Illinois Institute of Technology Abstract We consider a wireless
More informationDoes Topology Control Reduce Interference? Martin Burkhart Pascal von Rickenbach Roger Wattenhofer Aaron Zollinger
Does Topology Control Reduce Interference? Martin Burkhart Pascal von Rickenbach Roger Wattenhofer Aaron Zollinger Overview What is Topology Control? Context related work Explicit interference model Interference
More informationChallenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning
Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning Brad Karp Berkeley, CA bkarp@icsi.berkeley.edu DIMACS Pervasive Networking Workshop 2 May, 2 Motivating Examples Vast
More informationOblivious Routing on Geometric Networks
Oblivious Routing on Geometric Networks Costas Busch, Malik Magdon-Ismail and Jing Xi {buschc,magdon,xij2}@cs.rpi.edu July 20, 2005. Outline Oblivious Routing: Background and Our Contribution The Algorithm:
More informationGeographic Routing on Improved Coordinates
Geographic Routing on mproved Coordinates Ulrik Brandes, Daniel Fleischer Department of Computer & nformation Science, University of Konstanz Abstract We consider routing methods for networks when geographic
More informationRandom Walks and Cover Times. Project Report. Aravind Ranganathan. ECES 728 Internet Studies and Web Algorithms
Random Walks and Cover Times Project Report Aravind Ranganathan ECES 728 Internet Studies and Web Algorithms 1. Objectives: We consider random walk based broadcast-like operation in random networks. First,
More informationAsymptotically Optimal Geometric Mobile Ad-Hoc Routing
Asymptotically Optimal Geometric Mobile Ad-Hoc Routing Fabian Kuhn Department of Computer Science ETH Zurich 8092 Zurich, Switzerland kuhn@inf.ethz.ch Roger Wattenhofer Department of Computer Science ETH
More informationLocalized Algorithms for Energy Efficient Topology in Wireless Ad Hoc Networks
Localized Algorithms for Energy Efficient Topology in Wireless Ad Hoc Networks Wen-Zhan Song Yu Wang Xiang-Yang Li Ophir Frieder Abstract. Topology control in wireless ad hoc networks is to select a subgraph
More informationLinear Programming in Small Dimensions
Linear Programming in Small Dimensions Lekcija 7 sergio.cabello@fmf.uni-lj.si FMF Univerza v Ljubljani Edited from slides by Antoine Vigneron Outline linear programming, motivation and definition one dimensional
More informationarxiv:cs/ v1 [cs.dc] 22 Nov 2006
arxiv:cs/0611117v1 [cs.dc] 22 Nov 06 Abstract 2FACE: Bi-Directional Face Traversal for Efficient Geometric Routing Mark Miyashita Mikhail Nesterenko Department of Computer Science Kent State University
More informationSorting Based Data Centric Storage
Sorting Based Data Centric Storage Fenghui Zhang, Anxiao(Andrew) Jiang, and Jianer Chen Dept. of Computer Science, Texas A&M Univ. College Station, TX 77843. {fhzhang, ajiang, chen}@cs.tamu.edu. Abstract
More informationEstimating the Free Region of a Sensor Node
Estimating the Free Region of a Sensor Node Laxmi Gewali, Navin Rongratana, Jan B. Pedersen School of Computer Science, University of Nevada 4505 Maryland Parkway Las Vegas, NV, 89154, USA Abstract We
More informationSAMPLING AND THE MOMENT TECHNIQUE. By Sveta Oksen
SAMPLING AND THE MOMENT TECHNIQUE By Sveta Oksen Overview - Vertical decomposition - Construction - Running time analysis - The bounded moments theorem - General settings - The sampling model - The exponential
More informationImproved algorithms for constructing fault-tolerant spanners
Improved algorithms for constructing fault-tolerant spanners Christos Levcopoulos Giri Narasimhan Michiel Smid December 8, 2000 Abstract Let S be a set of n points in a metric space, and k a positive integer.
More informationSurvey on Position-Based Routing 1
Survey on Position-Based Routing 1 Filipe Araújo and Luís Rodrigues Universidade de Lisboa {filipius,ler}@di.fc.ul.pt Abstract In this paper we review position-based routing for wireless ad hoc and for
More informationOnline Algorithms. Lecture 11
Online Algorithms Lecture 11 Today DC on trees DC on arbitrary metrics DC on circle Scheduling K-server on trees Theorem The DC Algorithm is k-competitive for the k server problem on arbitrary tree metrics.
More informationOutline. CS38 Introduction to Algorithms. Approximation Algorithms. Optimization Problems. Set Cover. Set cover 5/29/2014. coping with intractibility
Outline CS38 Introduction to Algorithms Lecture 18 May 29, 2014 coping with intractibility approximation algorithms set cover TSP center selection randomness in algorithms May 29, 2014 CS38 Lecture 18
More informationClustering: Centroid-Based Partitioning
Clustering: Centroid-Based Partitioning Yufei Tao Department of Computer Science and Engineering Chinese University of Hong Kong 1 / 29 Y Tao Clustering: Centroid-Based Partitioning In this lecture, we
More informationAd hoc and Sensor Networks Topology control
Ad hoc and Sensor Networks Topology control Goals of this chapter Networks can be too dense too many nodes in close (radio) vicinity This chapter looks at methods to deal with such networks by Reducing/controlling
More informationApproximation Algorithms for Clustering Uncertain Data
Approximation Algorithms for Clustering Uncertain Data Graham Cormode AT&T Labs - Research graham@research.att.com Andrew McGregor UCSD / MSR / UMass Amherst andrewm@ucsd.edu Introduction Many applications
More informationarxiv: v2 [cs.dc] 28 Feb 2018
Competitive Routing in Hybrid Communication Networks Daniel Jung 1, Christina Kolb 2, Christian Scheideler 3, and Jannik Sundermeier 4 arxiv:1710.09280v2 [cs.dc] 28 Feb 2018 1 Heinz Nixdorf Institute &
More informationGeographical Quadtree Routing
Geographical Quadtree Routing Chen Avin, Yaniv Dvory, Ran Giladi Department of Communication Systems Engineering Ben Gurion University of the Negev Beer Sheva 84105, Israel Email: avin@cse.bgu.ac.il, dvory@bgu.ac.il,
More informationGeometric Problems on Ad-Hoc Networ (Computational Geometry and Discret. Citation 数理解析研究所講究録 (2009), 1641:
Title Geometric Problems on Ad-Hoc Networ (Computational Geometry and Discret Author(s) Tokuyama, Takeshi Citation 数理解析研究所講究録 (2009), 1641: 135-143 Issue Date 2009-04 URL http://hdl.handle.net/2433/140577
More informationLocalized Algorithms for Energy Efficient Topology in Wireless Ad Hoc Networks
Localized Algorithms for Energy Efficient Topology in Wireless Ad Hoc Networks Wen-Zhan Song Yu Wang Xiang-Yang Li Ophir Frieder ABSTRACT We propose several novel localized algorithms to construct energy
More informationAd hoc and Sensor Networks Chapter 10: Topology control
Ad hoc and Sensor Networks Chapter 10: Topology control Holger Karl Computer Networks Group Universität Paderborn Goals of this chapter Networks can be too dense too many nodes in close (radio) vicinity
More informationLocalized Topology Control for Heterogeneous Wireless Sensor Networks
Localized Topology Control for Heterogeneous Wireless Sensor Networks Xiang-Yang Li Wen-Zhan Song Yu Wang 2 The paper studies topology control in heterogeneous wireless sensor networks, where different
More informationComputational Geometry
Lecture 12: Lecture 12: Motivation: Terrains by interpolation To build a model of the terrain surface, we can start with a number of sample points where we know the height. Lecture 12: Motivation: Terrains
More informationCS 372: Computational Geometry Lecture 10 Linear Programming in Fixed Dimension
CS 372: Computational Geometry Lecture 10 Linear Programming in Fixed Dimension Antoine Vigneron King Abdullah University of Science and Technology November 7, 2012 Antoine Vigneron (KAUST) CS 372 Lecture
More informationGeographic Routing in Simulation: GPSR
Geographic Routing in Simulation: GPSR Brad Karp UCL Computer Science CS M038/GZ06 23 rd January 2013 Context: Ad hoc Routing Early 90s: availability of off-the-shelf wireless network cards and laptops
More informationApproximation Algorithms
Chapter 8 Approximation Algorithms Algorithm Theory WS 2016/17 Fabian Kuhn Approximation Algorithms Optimization appears everywhere in computer science We have seen many examples, e.g.: scheduling jobs
More informationWireless Networking Graph Theory Unplugged. Distributed Computing Group Roger Wattenhofer WG 2004
Wireless Networking Graph Theory Unplugged Distributed Computing Group Roger Wattenhofer WG 2004 Overview Introduction Ad-Hoc and Sensor Networks Routing / Broadcasting Clustering Topology Control Conclusions
More informationOn the perimeter of k pairwise disjoint convex bodies contained in a convex set in the plane
On the perimeter of k pairwise disjoint convex bodies contained in a convex set in the plane Rom Pinchasi August 2, 214 Abstract We prove the following isoperimetric inequality in R 2, conjectured by Glazyrin
More informationChapter 5 Graph Algorithms Algorithm Theory WS 2012/13 Fabian Kuhn
Chapter 5 Graph Algorithms Algorithm Theory WS 2012/13 Fabian Kuhn Graphs Extremely important concept in computer science Graph, : node (or vertex) set : edge set Simple graph: no self loops, no multiple
More informationGuaranteed-delivery Geographic Routing under Uncertain Node Locations
Guaranteed-delivery Geographic Routing under Uncertain Node Locations Stefan Funke Max-Planck-Institut für Informatik Stuhlsatzenhausweg 85 66123 Saarbrücken, Germany Email: funke@mpi-inf.mpg.de Nikola
More informationRouting on Overlay Graphs in Mobile Ad Hoc Networks
Routing on Overlay Graphs in Mobile Ad Hoc Networks Sumesh J. Philip Department of Computer Science Western Illinois University Macomb IL 61455 Email: sj-philip@wiu.edu Joy Ghosh, Hung Q. Ngo, Chunming
More informationBeaconless Position Based Routing with Guaranteed Delivery for Wireless Ad-Hoc and Sensor Networks
Beaconless Position Based Routing with Guaranteed Delivery for Wireless Ad-Hoc and Sensor Networks Mohit Chawla 1, Nishith Goel 2, Kalai Kalaichelvan 3, Amiya Nayak 4, and Ivan Stojmenovic 4 1 IIT Guwahati,
More informationCompasses, Faces, and Butterflies: Route Discovery in Ad-Hoc Networks
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 1 Compasses, Faces, and Butterflies: Route Discovery in Ad-Hoc Networks By Evangelos Kranakis School of Computer Science Carleton
More informationA Robust Interference Model for Wireless Ad-Hoc Networks
A Robust Interference Model for Wireless Ad-Hoc Networks Pascal von Rickenbach, Stefan Schmid, Roger Wattenhofer, Aaron Zollinger {vonrickenbach, schmiste, wattenhofer, zollinger}@tik.ee.ethz.ch Computer
More informationRouting in Sensor Networks
Routing in Sensor Networks Routing in Sensor Networks Large scale sensor networks will be deployed, and require richer inter-node communication In-network storage (DCS, GHT, DIM, DIFS) In-network processing
More informationOutline. Wireless Ad Hoc & Sensor Networks (Wireless Sensor Networks III) Localisation and Positioning. Localisation and Positioning properties
Wireless Ad Hoc & Sensor Networks (Wireless Sensor Networks III) Outline Localisation and Positioning Topology Control Routing Summary WS 2009/2010 Prof. Dr. Dieter Hogrefe/Prof. Dr. Xiaoming Fu Dr. Omar
More informationGRAAL/AEOLUS School on Hot Topics in Network Algorithms. Algorithms for Sensor Networks Roger Wattenhofer 2/1
Algorithms for Sensor Networks GRAAL/AEOLUS School on Hot Topics in Network Algorithms Algorithms for Sensor Networks Roger Wattenhofer 2/1 Sensor Networks = Distributed Algorithms? Reloaded Distributed
More informationHighway Dimension and Provably Efficient Shortest Paths Algorithms
Highway Dimension and Provably Efficient Shortest Paths Algorithms Andrew V. Goldberg Microsoft Research Silicon Valley www.research.microsoft.com/ goldberg/ Joint with Ittai Abraham, Amos Fiat, and Renato
More informationarxiv: v1 [cs.ma] 8 May 2018
Ordinal Approximation for Social Choice, Matching, and Facility Location Problems given Candidate Positions Elliot Anshelevich and Wennan Zhu arxiv:1805.03103v1 [cs.ma] 8 May 2018 May 9, 2018 Abstract
More informationCompact and Low Delay Routing Labeling Scheme for Unit Disk. Graphs
Compact and Low Delay Routing Labeling Scheme for Unit Disk Graphs Chenyu Yan, Yang Xiang and Feodor F. Dragan Algorithmic Research Laboratory, Department of Computer Science Kent State University, Kent,
More informationConvex hulls of spheres and convex hulls of convex polytopes lying on parallel hyperplanes
Convex hulls of spheres and convex hulls of convex polytopes lying on parallel hyperplanes Menelaos I. Karavelas joint work with Eleni Tzanaki University of Crete & FO.R.T.H. OrbiCG/ Workshop on Computational
More informationCS133 Computational Geometry
CS133 Computational Geometry Voronoi Diagram Delaunay Triangulation 5/17/2018 1 Nearest Neighbor Problem Given a set of points P and a query point q, find the closest point p P to q p, r P, dist p, q dist(r,
More informationApproximating Node-Weighted Multicast Trees in Wireless Ad-Hoc Networks
Approximating Node-Weighted Multicast Trees in Wireless Ad-Hoc Networks Thomas Erlebach Department of Computer Science University of Leicester, UK te17@mcs.le.ac.uk Ambreen Shahnaz Department of Computer
More informationDivided-and-Conquer for Voronoi Diagrams Revisited. Supervisor: Ben Galehouse Presenter: Xiaoqi Cao
Divided-and-Conquer for Voronoi Diagrams Revisited Supervisor: Ben Galehouse Presenter: Xiaoqi Cao Outline Introduction Generalized Voronoi Diagram Algorithm for building generalized Voronoi Diagram Applications
More informationCompetitive analysis of aggregate max in windowed streaming. July 9, 2009
Competitive analysis of aggregate max in windowed streaming Elias Koutsoupias University of Athens Luca Becchetti University of Rome July 9, 2009 The streaming model Streaming A stream is a sequence of
More informationAn algorithm for Performance Analysis of Single-Source Acyclic graphs
An algorithm for Performance Analysis of Single-Source Acyclic graphs Gabriele Mencagli September 26, 2011 In this document we face with the problem of exploiting the performance analysis of acyclic graphs
More informationPlanar Graphs. 1 Graphs and maps. 1.1 Planarity and duality
Planar Graphs In the first half of this book, we consider mostly planar graphs and their geometric representations, mostly in the plane. We start with a survey of basic results on planar graphs. This chapter
More informationData-Centric Query in Sensor Networks
Data-Centric Query in Sensor Networks Jie Gao Computer Science Department Stony Brook University 10/27/05 Jie Gao, CSE590-fall05 1 Papers Chalermek Intanagonwiwat, Ramesh Govindan and Deborah Estrin, Directed
More informationApproximation Algorithms: The Primal-Dual Method. My T. Thai
Approximation Algorithms: The Primal-Dual Method My T. Thai 1 Overview of the Primal-Dual Method Consider the following primal program, called P: min st n c j x j j=1 n a ij x j b i j=1 x j 0 Then the
More informationOnline Graph Exploration
Distributed Computing Online Graph Exploration Semester thesis Simon Hungerbühler simonhu@ethz.ch Distributed Computing Group Computer Engineering and Networks Laboratory ETH Zürich Supervisors: Sebastian
More informationThomas Moscibroda Roger Wattenhofer MASS Efficient Computation of Maximal Independent Sets in Unstructured Multi-Hop Radio Networks
Efficient Computation of Maximal Independent Sets in Unstructured Multi-Hop Radio Networks Thomas Moscibroda Roger Wattenhofer Distributed Computing Group MASS 2004 Algorithms for Ad Hoc and Sensor Networks...
More informationNear Optimal Broadcast with Network Coding in Large Sensor Networks
in Large Sensor Networks Cédric Adjih, Song Yean Cho, Philippe Jacquet INRIA/École Polytechnique - Hipercom Team 1 st Intl. Workshop on Information Theory for Sensor Networks (WITS 07) - Santa Fe - USA
More informationFractional Cascading in Wireless. Jie Gao Computer Science Department Stony Brook University
Fractional Cascading in Wireless Sensor Networks Jie Gao Computer Science Department Stony Brook University 1 Sensor Networks Large number of small devices for environment monitoring 2 My recent work Lightweight,
More informationGiven a graph, find an embedding s.t. greedy routing works
Given a graph, find an embedding s.t. greedy routing works Greedy embedding of a graph 99 Greedy embedding Given a graph G, find an embedding of the vertices in R d, s.t. for each pair of nodes s, t, there
More informationRouting. Chapter 11. Ad Hoc and Sensor Networks Roger Wattenhofer 11/1
Routing Chapter 11 Ad Hoc and Sensor Networks Roger Wattenhofer 11/1 Application of the Week: Games / Art Uncountable possibilities, below, e.g., a beer coaster that can interact with other coasters [sentilla]
More informationConnected Dominating Sets in Wireless Networks with Different Transmission Ranges
1 Connected Dominating Sets in Wireless Networks with Different Transmission Ranges My T. Thai Feng Wang Dan Liu Shiwei Zhu Ding-Zhu Du Dept. of Computer Science & Enginering University of Minnesota Minneapolis,
More informationRouting with Guaranteed Delivery on Virtual Coordinates
Routing with Guaranteed Delivery on Virtual Coordinates The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters. Citation Published Version
More informationLocalized Topology Control for Heterogeneous Wireless Sensor Networks
Localized Topology Control for Heterogeneous Wireless Sensor Networks XIANG-YANG LI Illinois Institute of Technology WEN-ZHAN SONG Washington State University and YU WANG University of North Carolina at
More informationThe geometry and combinatorics of closed geodesics on hyperbolic surfaces
The geometry and combinatorics of closed geodesics on hyperbolic surfaces CUNY Graduate Center September 8th, 2015 Motivating Question: How are the algebraic/combinatoric properties of closed geodesics
More informationA Local O(1)-Approximation for Dominating Sets on Bounded Genus Graphs
A Local O(1)-Approximation for Dominating Sets on Bounded Genus Graphs Saeed Akhoondian Amiri Stefan Schmid Sebastian Siebertz Table of contents 1 Introduction 2 Definitions and Prelims 3 Algorithm 4 Analysis
More informationPERFORMANCE EVALUATION OF CONSUMED- ENERGY-TYPE-AWARE ROUTING (CETAR) FOR WIRELESS SENSOR NETWORKS
PERFORMANCE EVALUATION OF CONSUMED- ENERGY-TYPE-AWARE ROUTING (CETAR) FOR WIRELESS SENSOR NETWORKS Shinya Ito 1 and Kenji Yoshigoe 1 BeachHead, Inc., 37899 W. 1 Mile Rd, Suite 100 Farmington Hills, MI
More informationCPSC 536N: Randomized Algorithms Term 2. Lecture 10
CPSC 536N: Randomized Algorithms 011-1 Term Prof. Nick Harvey Lecture 10 University of British Columbia In the first lecture we discussed the Max Cut problem, which is NP-complete, and we presented a very
More informationMa/CS 6b Class 11: Kuratowski and Coloring
Ma/CS 6b Class 11: Kuratowski and Coloring By Adam Sheffer Kuratowski's Theorem Theorem. A graph is planar if and only if it does not have K 5 and K 3,3 as topological minors. We know that if a graph contains
More informationConnected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees
Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees Pouya Ostovari Department of Computer and Information Siences Temple University Philadelphia, Pennsylvania, USA Email: ostovari@temple.edu
More informationA synchronizer generates sequences of clock pulses at each node of the network satisfying the condition given by the following definition.
Chapter 8 Synchronizers So far, we have mainly studied synchronous algorithms because generally, asynchronous algorithms are often more di cult to obtain and it is substantially harder to reason about
More informationTraveling Salesman Problem (TSP) Input: undirected graph G=(V,E), c: E R + Goal: find a tour (Hamiltonian cycle) of minimum cost
Traveling Salesman Problem (TSP) Input: undirected graph G=(V,E), c: E R + Goal: find a tour (Hamiltonian cycle) of minimum cost Traveling Salesman Problem (TSP) Input: undirected graph G=(V,E), c: E R
More information