Double Barrier Coverage in Dense Sensor Networks

Size: px
Start display at page:

Download "Double Barrier Coverage in Dense Sensor Networks"

Transcription

1 Jiang CD, Chen GL. Double barrier coverage in dense sensor networks. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 23(1): 154 inside back cover Jan Double Barrier Coverage in Dense Sensor Networks Cheng-Dong Jiang ( ) and Guo-Liang Chen ( ) Department of Computer Science and Technology, University of Science and Technology of China, Hefei , China cdjiang@ustc.edu.cn; glchen@ustc.edu.cn Received December 12, 2006; revised October 19, Abstract When a sensor network is deployed to detect objects penetrating a protected region, it is not necessary to have every point in the deployment region covered by a sensor. It is enough if the penetrating objects are detected at some point in their trajectory. If a sensor network guarantees that every penetrating object will be detected by two distinct sensors at the same time somewhere in this area, we say that the network provides double barrier coverage (DBC). In this paper, we propose a new planar structure of Sparse Delaunay Triangulation (SparseDT), and prove some elaborate attributes of it. We develop theoretical foundations for double barrier coverage, and propose efficient algorithms with NS2 simulator using which one can activate the necessary sensors to guarantee double barrier coverage while the other sensors go to sleep. The upper and lower bounds of number of active nodes are determined, and we show that high-speed target will be detected efficiently with this configuration. Keywords wireless sensor network, barrier coverage, Delaunay triangulation, distributed algorithm 1 Introduction Wireless sensor network is becoming quite useful in some modern applications, such as target tracking, environmental monitoring, and intrusion detection, which require the distributed and cooperated work of separated elements. These distributed sensing applications bring forward new demands for the property of sensor networks. An important application of a sensor network is to detect penetrating objects crossing a barrier. The objective is to minimize the probability of undetected penetration through the barrier. There is not much research on it until now. The maximal breach path and the maximal support path model were introduced by Meguerdichian et al. [1] Another model, called exposure-based model, was also introduced by Meguerdichian et al. [2] There are also some other introductory work [3,4]. Kumar s prominent work [5] presents a method to determine the minimum number of sensors needed to ensure k-barrier coverage in a given belt region, and also gives the checking algorithm. This k-barrier coverage problem means that every path crossing the width of the belt region is covered by at least k distinct sensors [5]. The algorithms presented in Meguerdichian s work [1] heavily rely on geometric structures such as the Voronoi Diagram and Delaunay triangulation of the network, which was not constructed locally. The Delaunay triangulation technique is quite useful in construction and analysis of network topology [6,7]. Recently, it was used to construct a geographic routing algorithm which achieves better path dilation [8]. But the distributed algorithm of Delaunay triangulation does not work well up until now. Filipe Araújo s outstanding work [9] gives a well working distributed algorithm. But the nodes need to collect 2-hop information, and it might cause severe synchronization problem in dense sensor networks. Li proposed a sparse planar structure, namely, partial Delaunay triangulation [7], which could be constructed locally. But it is much like a subgraph which is a little denser than the Gabriel Graph. In our paper, we consider the double barrier coverage problem, which is a little different from the k- barrier coverage problem. Actually, there is not any efficient algorithm for the construction of k-covered barrier when sensors are deployed randomly. We prove in Subsection 4.3 that the 2-covered barrier has better capability in target detection than two disjoint 1-covered barriers/paths with the metric of minimum detection length. This metric denotes the exposure time that a target moving at regular speed stays in the sensing covered region. A target with bounded moving speed could be detected assuredly under the model that sensing activity occurs periodically, but it is not Regular Paper This paper is supported by the National Grand Fundamental Research 973 Program of China under Grant No. 2006CB

2 Cheng-Dong Jiang et al.: Double Barrier Coverage in Dense Sensor Networks 155 true with disjoint 1-covered paths because the exposure time might approach zero in some certain cases. The 2-covered barrier is also constructed based on the Delaunay triangulation technique, and we present a new sparse planar network structure here, SparseDT (Sparse Delaunay Triangulation), which could be constructed locally and efficiently. In particular, it is constructed without collecting 2-hop neighbor information. It could also be quite useful in other problems of sensor networks. The rest of the paper is organized as follows. In Section 2, we define the problem formally, and propose the centralized algorithm. In Section 3, an efficient distributed algorithm to construct SparseDT structure is given, and the 2-covered barrier is formed based on it. In Section 4, we prove the correctness of our algorithm, and give the upper and lower bounds of the number of active sensors. The detection ability of the 2-covered barrier is also analyzed. In Section 5, we provide some results from simulation. Section 6 concludes the paper. 2 Preliminaries 2.1 Assumptions We assume all sensors are deployed in a two dimensional space with Poisson spatial distribution. Every node has the same sensing range R s and communication range R c with the relation of R c R s. We assume a deterministic sensing model that a sensor node s can cover any point inside its sensing circle Cs Rs which is centered at s and has a radius R s, i.e., any point with distance to s less than R s is covered by s. We define circle Cs r in the same way. Definition 2.1. Given a set of nodes V in a two dimensional space, we model a wireless sensor network with Unit Disk Graph with unit length r, G r (V, E) or G r (V ), which is comprised of all nodes in V and all edges connecting nodes of V whose distance is at most the unit length r, i.e., two nodes u and v are direct neighbors if and only if uv < r. It is generally convenient for the analysis of coverage problems that we set the unit length in this model as r = R s, and r = R c for connectivity problems. With different unit length, the edge sets could be quite different, such as G Rc (V, E 1 ) and G Rs (V, E 2 ). 2.2 Problem Formulation In this paper, we consider the Double Barrier Coverage (DBC) Problem. Given a sensor network deployed in a rectangular region A with the assumptions hereinabove, and two distant sinks sink 1 and sink 2 which are normally placed at two sides of the region, we would like to find a continuous line between sink 1 and sink 2, and the least number of active sensors that can cover every point on the line at least two times. The set V of these active nodes is called a 2-covered barrier between sink 1 and sink 2 in the region. That is, a target wanting to traverse the region A from between these two sinks must be detected by at least two sensors at the same time. 2.3 Centralized Algorithm Here, we classify the double barrier coverage problem in a series of alike problems, and present a centralized algorithm to deal with. 1) 1-Dimensional, 1-Covered Case. Given a line segment l and a set of sections S, such that every section s S covers a part of l, and the union of them covers l fully, i.e., s S s = l. The problem is to find the least number of sections to fully cover the line segment. This is in fact a continuous variety of the Set Cover Problem which is NP-hard. However, it is more tractable, and could be solved with a simple greedy algorithm. 2) 2-Dimensional, 1-Covered Case. In a two dimensional space, this problem and the DBC problem are much alike except that the barrier only needs to be 1-covered. It could be modeled as the shortest path problem in a UDG Graph, and thus settled. 3) 1-Dimensional, 2-Covered Case. This scenario could be handled just like the following 2-dimensional case, except that the intersection estimation is much easier. 4) 2-Dimensional, 2-Covered Case. This is just the problem we considered. Now we give a centralized algorithm for it. With the model of Unit Disk Graph with unit graph r, we know that an edge e E in G 2Rs (V, E) means the sensing circles of the two sensor nodes adjacent to e cross each other, and form an olive-shaped overlap (see Fig.1). We construct the Junction Graph G J (V, E ) based on G 2Rs (V, E). It represents the junction relationship of those olive-shaped overlaps. For each vertex v i V, there is a corresponding olive-shaped overlap and an edge e i E (Fig.1). We define p i as the parent node set of e i which is v i s corresponding edge in G 2Rs (V, E), such as p 1 = {s 1, s 2 } in Fig.1. Edge v 1 v 2 E if and only if the minimum bounding circle of p 1 p 2 has radius r < R s. That it, the corresponding overlaps of v 1 and v 2 are joint with each other. In the Junction graph, vertex S i denotes sink i, and it connects to those v j whose corresponding overlap

3 156 intersects sink i s sensing circle. That is, Si vj E 0 if and only if sink i s E for s pj. J. Comput. Sci. & Technol., Jan. 2008, Vol.23, No.1 form a 2-covered barrier with the corresponding sensor nodes of them. Conversely, there exists a path in GJ (V 0, E 0 ) for every 2-covered barrier. Fig.2. Edge in Junction graph (below) with weight 2 and the corresponding scenario in Unit disk graph (above). Fig.1. Unit disk graph G2Rs (V, E) (above) and the corresponding Junction graph GJ (V 0, E 0 )(below). Shadow area means the olive-shaped overlap of two adjacent sensing circles. We assign a weight to each edge v1 v2 in the Junction graph GJ (V 0, E 0 ), w(v1 v2 ) = 1 or 2, according to the difference of parent node sets of v1 and v2 s corresponding edges in G2Rs (V, E), i.e., w(v1 v2 ) = p1 p2. In Fig.2, v1 and v2 s corresponding edges in G2Rs (V, E) are e1 and e2 whose parent node sets are p1 = {s1, s2 } and p2 = {s3, s4 } respectively. So the weight w(v1 v2 ) = p1 p2 = {s1, s2 } {s3, s4 } = 2. In contrast, we have w(v1 v2 ) = {s1, s2 } {s1, s4 } = 1 in Fig.1, and there is no other value of edge weight in Junction graph. The edges adjacent to Si are assigned weight w(si vj ) = 1. We also define the weight of a path on Junction graph as the total weight of the edges on this path. The following theorem bounds the optimum solution to DBC Problem, that is, the least number of active sensors to construct a 2-covered barrier between two sinks. Theorem 2.2. The weight of the shortest path P between S1 and S2 in Junction Graph GJ (V 0, E 0 ) bounds the minimum number of sensors needed to construct a 2-covered barrier between sink 1 and sink 2 in this region. Proof. First, a path connecting S1 and S2 in GJ (V 0, E 0 ) depicts a chain of joint overlaps which Now we show that the minimum number of active nodes, which are needed to construct a 2-covered barrier between sink 1 and sink 2, is bounded by the weight of the shortest path P between S1 and S2. Suppose that P = {S1, v1, v2,..., vn, S2 }. We have w(p ) = 2 + n 1 X w(vi vi+1 ) = 2 + i=1 n 1 X pi+1 pi i=1 n [ n 1 [ pi. (pi+1 pi ) > >2+ i=1 (1) i=1 The rightmost quantity is the number of corresponding sensor nodes of this path. All inequalities in (1) become equalities while there is no loops in P. That is, while path P extends, all nodes of pi+1 pi are newly activated for the first time. This could be guaranteed supposing that the monitoring area is fully 2covered by the sensor network with node set V. There may be loops while it is not fully 2-covered, or the path P may not even exist while there are not enough sensors. The complexity of this centralized algorithm is O(n4 ), since V 0 = O( V 2 ) = O(n2 ), and E 0 = O( V 0 2 ) = O(n4 ). This method could be extended to 2-d, k-c scenario, except that it is relatively hard to determine overlaps and junction relationships. We construct the k-junction Graph GkJ (V 0, E 0 ) based on G2Rs (V, E). It represents the junction relationship of those k-covered overlaps. For each vertex

4 Cheng-Dong Jiang et al.: Double Barrier Coverage in Dense Sensor Networks 157 v i V, there is a corresponding k-covered overlap and a clique K i V with cardinality K i = k which satisfies the condition that the minimum bounding circle of K i has radius r < R s. Edge v 1 v 2 E if and only if the minimum bounding circle of K 1 K 2 has radius r < R s. That it, the corresponding overlaps of v 1 and v 2 are joint with each other. The weight of edge v i v j E is defined as w(v i v j ) = K i K j {1,..., k}. Vertex S i is defined similarly, and it could be verified in the same way that the weight of the shortest path between S 1 and S 2 in G k J (V, E ) bounds the minimum number of sensors needed to construct a k-covered barrier between sink 1 and sink 2 in this region. In a sensor network, there is no way to centralize that much information to settle, so distributed measure is more practical. In the following section, we propose a distributed algorithm to deal with the DBC problem. First we construct Delaunay triangulation on part of the nodes selected from all sensors to be active, and then construct 2-covered barrier from these nodes according to the properties of triangulation. 3 Distributed Algorithm The Delaunay triangulation (DT) of a set V of n points in 2-dimensional space possesses a host of nice and useful properties many of which are well known and understood nowadays. It has many interesting applications. We first investigate some most important properties of it: 1) Definition. The Delaunay triangulation (DT) of a node set V, represented as Del(V ), is the set of edges satisfying the empty circle property: edge uv belongs to the triangulation if and only if there is a circle containing u and v, but not containing any other node. 2) Dual Property. The planar Voronoi diagram and the Delaunay triangulation of V are duals in a graph theoretical sense. 3) Empty Circumcircle Property. The circumcircle of a triangle does not contain any other node of V. 4) Gabriel Edge. Two points u, v form an edge of DT if the minimum circle C(u, v) which contains u and v on its boundary contains no other points. These edges compose the Gabriel Graph which is a subgraph of Del(V ). There are many algorithms to construct the Delaunay triangulation. One of the most commonly used methods is Randomized Incremental Method [10] with complexity of O(n log n). 3.1 Sparse Delaunay Triangulation If R c R s, network is connected means it is also double covered. We only need to find a shortest path as the double covered barrier. Assuming that R c > R s, we could construct the sparse Delaunay triangulation only depending on local information. Using Filipe Araújo s algorithm framework [9] for reference, we propose a new distributed algorithm here for sparse Delaunay triangulation. We studied Filipe Araújo s algorithm, and found there are some Triangulate messages which are broadcasted to guarantee the rationality of local triangles. We dispose of these extra messages in our algorithm which is the crucial difference from Filipe Araújo s, so that the triangulation structure is constructed without any unnecessary communications. This nontrivial trick should save us much time and energy on communications which carry no valid sensed data. Following is the Algorithm description: 1) Neighbor Discovery Step: assuming that each sensor has been localized in advance. Localization is another important issue in the research area of sensor networks, and almost all topology control protocol need the support of localization protocol. There are many papers concentrated on it, and more detailed information is skipped here. Each sensor broadcasts periodically or randomly messages which include its position information, so that all sensors could collect the information of their neighbors, mainly the position and the status of activity. 2) Sparse Step: in random sequence, each active sensor node broadcasts a Sparse message, which would notify those sensors in a given range to sleep. This given range is called gap, which is normally set to the sensing range. It defines the extent of sparseness of the dispersed network. Those active nodes who survive this step compose the vertex set V of resultant graph G. 3) Triangulation Step: each sensor node s computes its local Delaunay triangles based on the neighbor location information. Only active neighbor nodes participate in the triangulation. Those edges incident to s whose lengths are within range of [R s, 3R s ) are kept, and others discarded. The complexity of this step is O(1) for each node as long as the number of active neighboring nodes is bounded. At the end of the algorithm, each node has the information of incident edges in a graph. It could be shown that the graph G(V, E) we created is part of the Delaunay triangulation (UDel) of the dispersed network. We call it Sparse Delaunay Triangulation (SparseDT).

5 158 J. Comput. Sci. & Technol., Jan. 2008, Vol.23, No.1 Fig.3. 2-covered barrier description. Fig.4. 2-covered barrier found with Algorithm DBC. 3.2 Double Barrier Coverage After the distributed Delaunay triangulation, we get Graph G(V, E). We now show that this graph could be used to construct 2-covered barrier. In Fig.3, triangles result from the above algorithm, solid circles limit the sensing range, and the dashed circles form the circumcircles of those triangles with centers at c, c 1, c 2 separately. From Lemma 4.2 which will be shown later, the center of circumcircle is within the sensing range of those sensors located at the triangle vertices, and it has coverage degree of at least 3. We could use the center as the joint of the 2-covered areas intersected by two neighboring sensors, such as c 1 -c-c 2. Barrier could then be constructed by the end-to-end connectivity of these joint segments, which is shown with the chain of thick segments in Fig.3. From another point of view, Barrier is a path between sinks in the dual Voronoi graph G of G(V, E). Algorithm DBC. Formally we should retrieve those triangles that denote the shortest path on the dual Voronoi diagram. This would give the least number of nodes that compose the 2-covered barrier. But it needs the storage of the information of dual graph, which is not preferred here. We only need to find the shortest path with any geographic or non-geographic routing protocol, and activate those sensors on this path and their neighboring sensors that stay at one side of this path (Fig.4). In the following section, we give theoretical foundation of the SparseDT planar structure, and analyze the static and dynamic performance of the 2-covered barrier. 4 Theoretical Analysis In this section, we first develop some elaborate attributes of the SparseDT planar graph, and then derive a better network dilation of it. We also analyze the detection ability of our 2-covered barrier here.

6 Cheng-Dong Jiang et al.: Double Barrier Coverage in Dense Sensor Networks 159 Fig.5. Delaunay triangle. Fig.6. Circumcircle of Delaunay triangle. Fig.7. Proof of Theorem Properties of SparseDT Under the Unit Disk Graph with unit length model we assumed, a complete Delaunay triangulation may not exist. We refer to another form of Delaunay triangulation defined as follows. Definition 4.1. Given a set of nodes V in a two dimensional space, we define Delaunay triangulation with unit length r as UDel r (V ) = Del(V ) G r (V ), which is comprised of all nodes in V and all edges in Del(V ) whose lengths are at most r. Lemma 4.2. The Delaunay triangle computed locally has a circumcircle of radius r, with (R s / 3) r < R s. Proof. According to our algorithm, every edge e in the Delaunay triangulation has the property 3R s > Length(e) R s. For arbitrary Delaunay triangle P QR (Fig.5) in the dispersed network, it must have an internal angle θ = QPR π/3. We could get some results from elementary geometry as follows. 1) Area of triangle S PQR = ab sin θ 2R s 2 2 = 3R 2 s. 2) Radius of circumcircle r = c 2 sin θ R s. 3 3) r < R s. 4) S = 1 2 ah a > 1 ( 2 R 3 ) 3 s 2 R s = 4 R2 s. The results of 3) and 4) should be taken care of with some geometry illumination. Fig.6 gives all you need, and proof is omitted. We see that the set V of active nodes is a maximal independent set of Unit Disk Graph G Rs (V ), where V is the set of all deployed sensors. We call this set V of active nodes as the dispersed network. Theorem 4.3. While R c 2R s, the SparseDT graph G(V, E) we created on the dispersed network, which is a set V of active nodes, is a Delaunay triangulation with unit length r = 3R s, i.e., UDel 3R s (V ). Proof. We prove the equality of graph G(V, E) and UDel 3R s (V ) according to the definition of Delaunay triangulation and Definition 4.1. For any edge s 1 s 2 G(V, E), it must be legalized by the local Delaunay triangulation step of s 1 or s 2 in our algorithm. Without loss of generality, suppose that its s 1 (see Fig.7). If s 1 s 2 is a Gabriel edge in the local triangulation, so it is in UDel 3R s (V ). Or else, there must be a minimum circle, which legalizes edge s 1 s 2, with an active node s 3 on its circumference. It is easy to verify that s 3 C(s 1, s 2 ), which is the the minimum circle containing s 1 and s 2, so that the three edges of ABC all have lengths of less than 3R s. We have that the circumcircle of this triangle has radius r < R s according to Lemma 4.2 about the Delaunay triangle, so that there are no other nodes in V inside this circle as long as R c 2R s. We have s 1 s 2 UDel 3R s (V ). On the other hand, for any edge e UDel 3R s (V ), the minimum circle which legalizes this edge has a radius of less than R s from the reasoning given above. In this case, it could also be verified by our algorithm as long as R c 2R s. So we have e G(V, E) and prove the theorem. Theorem 4.4. While R c 3R s, the full coverage of the dispersed network implies the connectivity of the SparseDT graph G(V, E) we created. Proof. Suppose that the SparseDT graph G(V, E) is not connected, i.e., there are at least two connected components of it. Among all pairs of nodes which belong to different components, we choose one pair with the shortest distance, denoted with s 1 and s 2.

7 160 J. Comput. Sci. & Technol., Jan. 2008, Vol.23, No.1 There should have no active nodes inside the minimum circle C(s 1, s 2 ) containing s 1 and s 2. We know that s 1 s 2 3R s, or else the graph should have an edge s 1 s 2 E which should have been legalized by the triangulation step of our algorithm. On the other hand, we have s 1 s 2 < 2R s, or else the center of the circle C(s 1, s 2 ) is not covered by any sensor nodes. So there is an intersection point X between the sensing circles of s 1 and s 2 (see Fig.8). Fig.8. Proof of Theorem 4.4. With the knowledge of plane geometry, it is easy to verify that every point s inside the circle C Rs X has the attribute that min{ s 1 s, s 2 s } < s 1 s 2. So that there should have no active nodes inside this circle, or else s 1 and s 2 should not have the shortest distance among all pairs of disconnected nodes, which is a contradiction. It means that point X is not covered in the dispersed network, which also contradicts the presupposition of full coverage. Assume that the initial deployment of all sensors takes the Poisson distribution with density λ 0 = n πr2 s A, where A is the total area of the monitoring region. We bound the probability P a that the dispersed network fully covers the whole monitoring area, and this probability approaches one as the total number n of deployed sensors increases. The probability that there is a hole, which is not covered by the dispersed network, around any certain point X in the region, is P hole = 1 P a. It means that no sensors are active nearby when X is in a hole. We have P hole = n k=0 λ k 0/k!(1 P e λ0 DT ) k e λ0p DT, where P DT is the probability that a deployed node becomes active in the dispersed network. So that P a 1 e λ, where λ is the node density of the dispersed network. We have lim n P a = 1. In fact, if there is a hole with radius r, there must be no sensors deployed initially in the hole according to our algorithm, which has the probability P {hole is empty} = e nπr2 /A approaching zero as n. Definition 4.5. We define DT path between two nodes sink 1 and sink 2 as a chain of edge neighboring Delaunay triangles connecting them (see Fig.4). The length of a DT path is defined as the number of triangles on it. With the same analysis as the Junction graph, a DT path between two sinks means that the sensor nodes of the triangles on this path compose a 2-covered barrier. Because there is no loop in a DT path as defined, the number of triangles on a DT path, as well as the total number of sensor nodes of these triangles except two sinks, equals the weight of the corresponding path in Junction graph created based on SparseDT graph. According to the proof of Theorem 2.2, the shortest DT path depicts the optimum 2-covered barrier in dispersed network. In Algorithm DBC, we do not construct 2-covered barrier by find the shortest DT path between two sinks, because it needs the knowledge of dual Voronoi graph in each node and the path searching is relatively more complex. On the contrary, a much simpler method is used in algorithm DBC. As long as the SparseDT graph is connected, a shortest path between two sinks could be found using any multi-hop routing protocol, and by one side of this path may exist a DT path which satisfies the purpose we want. Following Theorem 4.6 guarantees the quality of the solution we found, and generally, the solution is even the optimum. Theorem 4.6. If the shortest path between two sinks in SparseDT graph is not adjacent to any nontriangular faces, the Delaunay triangles by one side of it compose a DT path between these two sinks. The length of it could be bounded as L (d max 2)L opt /4+ 1, where L opt is the length of the shortest DT path, and d max is the maximum vertex degree in SparseDT graph. On average, the length of it is within one of the optimal. Proof. Suppose that the shortest path P has length m, and the shortest DT path from sink 1 to sink 2 crosses n triangles (see Fig.4), i.e., L opt = n. We see that the total number of edges by two sides of this DT path is 3n 2(n 1) = n + 2. Those edges at either side compose a path between these two sinks, and the length of the shorter one is no more than n/2 + 1 m. Now given a shortest path P with length of m, there are at most d max (m 1) incident edges on the inner nodes of path P except the edges on path, and one side of this path has as most (d max 2)(m 1)/2 (d max 2)n/4 incident edges. As long as the shortest path is not adjacent to any non-triangular faces, these edges along with their adjacent triangles depict a DT path with length no more than (d max 2)n/ So

8 Cheng-Dong Jiang et al.: Double Barrier Coverage in Dense Sensor Networks 161 we prove the theorem. We now bound the maximum vertex degree in SparseDT graph as d max 11. It is easy to verify that their minimum angle in a triangle with edge length R s e < 3R s is greater than π/6. So that d max < 12, and L 9n/ From [11], we know that the average degree of a Delaunay triangulation is less than six, so is the average degree in SparseDT graph. On average, there are at most 4(m 1) incident edges on the inner nodes of path P except the edges on path, and one side of this path has as most 2(m 1) 2 n/2 n incident edges. The DT path constructed has length L n + 1, which is within one of the optimal, as long as the shortest path is not adjacent to any non-triangular faces. 4.2 Network Dilation and the Bound Analysis Definition 4.7. The network dilation of the network G(V, E) is defined by: D n = max u,v V τ G (u, v) uv R c where τ G (u, v) is the network length of the shortest path between nodes u and v, and uv is the Euclidean distance between them. Theorem 4.8. On average, it needs N DBC 2 D n s 1 s 2 /R c active sensors to compose a 2-covered barrier from s 1 to s 2 in a region. Proof. There is a theorem about network dilation [8]. In a sensing-covered network G(V, E), the network length of the shortest path between nodes u and v satisfies: τ G (u, v) D n uv /R c, where D n is the network dilation. According to Theorem 4.6, the DT path we constructed between s 1 and s 2 has average length of 2τ G (s 1, s 2 ). We can see that a new sensor is activated every time we cross a new triangle on the DT path. So we prove the result. Theorem 4.9. We could bound the number of active sensors as L/( 3R s ) N DBC 4L/( 3R s ), where L is the length of region. Proof. In Fig.3, the length of barrier segment (distance of circumcircle centers of two adjacent triangles) cc 1 2 Rs 2 (R s /2) 2 = 3R s according to Lemma 4.2. So that, the number of active sensors, i.e., the hops of barrier, N DBC L/( 3R s ). We get the lower bound. Now we estimate the upper bound of N DBC. First, the projection of Delaunay triangle on any line, Proj, is at least the smallest of three heights in triangle. Proj 2S /a 3/2R s (Lemma 4.2). It is trivial to verify that the projection of total DT path from s 1 to s 2 on line s 1 s 2 covers this line two times. It means that 2 s 1 s 2 = DT path(s 1,s 2) Proj N DBC 3/2R s = N DBC 4 s 1 s 2 /( 3R s ). Suppose that s 1 and s 2 are two sinks located at opposite sides of the region with length L, N DBC 4L/( 3R s ). According to Theorem 4.6, the shortest network length between any two nodes s 1, s 2 in SparseDT graph is approximately N DBC (s 1, s 2 )/2 2 s 1 s 2 /( 3R s ). So that, the asymptotic network dilation of SparseDT graph is Dn (SparseDT ) 2R c /( 3R s ). We could construct the optimum solution of double barrier coverage problem as two overlapped chains of neighboring sensors crossing the region. Opt(DBC ) = L/R s. Corollary Assuming that R c = 2R s, the ratio of N DBC to Opt(DBC ) is D n 4/ 3. We could see that the asymptotic network dilation of our SparseDT graph is much better than the planar Delaunay triangulation presented in Filipe Araújo s work [9] and the normal sensing-covered network [8] which is 8 3π/ Target Detection Analysis The 2-covered barrier we presented here has better capability in target detection than two disjunct 1-covered barrier, which is constructed as a chain of connected neighboring sensors. Suppose that a target transverses the region straight downwards. According to Theorem 4.8, there Fig.9. Target detection scenario with DBC. Note that this ratio is not the approximate ratio of algorithm, but a relaxed bound.

9 162 J. Comput. Sci. & Technol., Jan. 2008, Vol.23, No.1 Suppose that the region has length L, and the sensing range of n randomly deployed sensors is equally R s, the isometry detection distance could be computed as d iso nπrs/l. 2 If target moves at speed v m/s, and the sensing cycle is T seconds, we can compute the average time N d that the target is detected crossing the region, N d = d iso /(vt ). It is inversely proportional to speed v while T is fixed, which could be verified later in simulation. In this model, we ignore the difference between barriers which are deployed randomly or sedulously. 5 Simulation Fig.10. Minimum 2-covered length across barrier. exists a 2-covered barrier in the shortest DT path. It also increases the detection length of 1-coverage, which offers higher detection probability than two disjunct 1-covered barrier. We now analyze the minimum detection length of 1-covered region and 2-covered region. In Fig.9, the target traces from p 1 to p 2, which delimit the 1-covered region, and the 2-covered region is indicated with thick line segment. The length of 1- covered region is p 1 p 2 > p 2 p 3 > p 3 p 4 3 3/2R s. On the other hand, the shortest length of 2-covered region could be found at line segment d 3 d 4 in Fig.10, whose prolonged line is tangent to the sensing circle of sensor C. This peculiar scenario needs very careful deployment of sensors and quite clever breach angle. It is easy to verify that d 3 d 4 0. It should be noticed that the area of short 1-covered region is just about the area of long 2-covered region, and vice versa, which is a fine complementary attribute of 2-covered barrier. In detection of high-speed target, we suppose that the target moves at speed v meters per second, and the sensor s sensing cycle is T seconds. It takes the target at least t = 3 3R s /(2v) 2.6R s /v seconds to pass the 1-covered region. As long as t T, the target must be detected. But for 1-covered barrier (even for several disjunct barriers), the target could not be assuringly detected at any speed. By the way, it needed not much more sensors to form one 2-covered barrier (Theorem 4.8) than two disjunct 1-covered barrier. As for the average performance of the barrier, we give another model for the barrier region analysis. Definition We define the isometry detection distance d iso as the average length that a target is detected traversing the barrier region straight downwards. In this section, we present our simulation results. First, we study the average performance of our DBC algorithm. We then investigate the detection capability of the barrier it constructed. We implement the sparse Delaunay triangulation algorithm as a protocol agent and double barrier coverage algorithm as its application in NS2 simulator of version All sensor nodes use the IEEE as the MAC layer protocol. It is quite appropriate for monitoring applications with sensor networks, and its dynamic performance is better than and some other MAC protocols aiming at sensor networks, such as s-mac and d-mac. We select two-ray ground model as the radio propagation model. Fig covered barrier constructed from 800 sensors deployed uniformly in an area of 50 50, with R s = 5. We set the sensing radius R s to be 5 meters, and communication radius R c to be 10 meters. Because there is no sensing model in NS2 simulator at present,

10 Cheng-Dong Jiang et al.: Double Barrier Coverage in Dense Sensor Networks 163 we devise a little trick to simulate the sensing event with the given sensing range and sensing cycle. Hundreds of sensors are deployed uniformly in an area of meters to simulate a dense sensor network. Fig.11 shows sample session of constructing a 2- covered barrier. The solid lines are edges in Delaunay triangulation of those nodes selected from all sensors. The dark nodes are on the shortest path between two separate sinks at leftmost and rightmost sides of the monitored region. The 2-covered barrier is denoted by blue circles around the active nodes resulted from DBC algorithm. Next, we design a complete scheme for simulation of the barrier. Both statically and dynamically, the behavior of the barrier is analyzed, and the results are given. with the total number of sensors, and be bounded as Theorem 4.8 ensures. The ratio of ndbc to npath also matches the result of network dilation. In our simulation, it could be verified that the maximum degree nns (Fig.12) in the SparseDT graph is at most 6 on average. 5.1 Static Analysis: Number of Alive Sensors We increase the total number of nodes from 100 to 1000, with each case running tens times, and get a few in Fig.12 and Fig.13. ndt means the number statistic Fig.13. Simulation result of SparseDT algorithm. ndt means the Average number of active nodes in dispersed network. nmaxns denotes the density of deployed sensors. Fig.12. Simulation result of DBC algorithm. It displays the average number of nodes required to form a 2-covered barrier where total number varies. Data are grouped statistically with confidential interval of of nodes in dispersed network. nmaxns denotes the density of deployed sensors. ndbc means the number of nodes needed to form a 2-covered barrier. npath means the number of nodes in the path from left to right. naperture means the number of apertures in the barrier which is explained later on. We can see that the average numbers ndt and ndbc increase In Fig.11, there is a small region which is not triangulated. This region is called hole. While the DT path passes by a hole, the barrier constructed may have an aperture in it, which means that the target may cross the aperture without being detected twice. We can see that the number of apertures increases while the total number of nodes decreases and the barrier will be degraded to be 1-covered. Because node density is small, the path should walk around many holes, and be prolonged a little. This counteracts the effect of increased hop distance due to the sparseness, and keeps the hop count of path. While number of nodes is less than 100, there is almost no path from left to right, so that the double barrier coverage is meaningless under sparse circumstance. The hole problem may have two reasons. One is that the region is not fully covered by this sensor network originally due to the random feature of deployment. The other arises from the simplicity of our sparse algorithm, because the algorithm does not consider the inequable density in different part of the area. Any methods managing it need special technique.

11 164 J. Comput. Sci. & Technol., Jan. 2008, Vol.23, No Dynamic Analysis: Moving Target Detection We construct a 2-covered barrier for target detection analysis. It contains 14 active nodes selected from total 500 sensors deployed uniformly in region of 50m 50m. It is not perfect generally, and has an aperture in it. All sensors have the same sensing cycle of 500ms. One target crosses the region straight downwards with speed from 1m/s to 15m/s at step of 0.2m/s, and re- peats tens times at each speed. We compare the result with the 1-covered barrier which is just the shortest path spanning horizontally from left to right. We record three states: total times target is sensed by 2-covered barrier (n2-covered), times target is dually checked by two sensors at the same time in the 2-covered region (ndoublechecked), and total times target is sensed by 1-covered barrier (n1-covered). In Fig.14, we can see that the curve fits perfectly with the reversely proportional line, which proves our model mentioned in Section 4. The isometry detection distance here is d iso 7π, and the coefficient of the fitted line is 38 which approximates d iso /T with permitted error. This error attributes to the fact that there are two or three sensors which are out of the region boundary, so as to affect the computing. There is another error shown in Fig.14, that the fitted line is not approaching origin, which roots in the lack of simulation for higher speed. 6 Conclusion In this paper, we proposed double barrier coverage as an efficient scheme in sensor network deployed to detect objects penetrating a protected region. We presented a quite efficient distributed algorithm to construct the 2-covered barrier with as least as possible number of active sensors. Some fundamental theoretical results are derived according to the new sparse planar structure of SparseDT, and the performance of the 2-covered barrier is also analyzed. As for the nice property of the SparseDT, we could not bear to stop looking through it. It is quite possible to design a new topology control protocol based on it, and this work will be presented later on. References Fig.14. Simulation result of 2-covered barrier s detection capability while target moves at different speed. n2-covered denotes the average time when target is detected by sensors in 2-covered barrier. ndoublechecked denotes the average time when target is detected dually by sensors. n1-covered is just the same as n2-covered except that only 1-covered barrier is active and responsible for the detection. [1] Meguerdichian S, Koushanfar F, Potkonjak M, Srivastava M B. Coverage problems in wireless ad-hoc sensor networks. In Proc. INFOCOM, vol.3, Anchorage, Alaska, USA, 2001, pp [2] Meguerdichian S, Koushanfar F, Qu G, Potkonjak M. Exposure in wireless ad-hoc sensor networks. In Proc. MOBI- COM, Rome, Italy, 2001, pp [3] Liu B, Towsley D. On the coverage and detectability of wireless sensor networks. In Proc. WiOpt 03: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, Sophia-Antipolis, France, From [12], we know that the necessary condition for asymptotic 1-coverage could be rephrased and approximated as n/ log(n) > 400/π = n > 300 in the region of 50m 50m with sensing range of 5m. We increase n to 500 here for one aperture hypothesis according to Fig.12. In common sense, human normally walks at speed of 5km/h 1.4m/s, and cars drive normally at speed of 54km/h = 15m/s. Considering the small sensing range here in simulation, we do not try higher speed scenario.

12 [4] Thai M T, Wang F, Du Ding-Zhu. Coverage problems in wireless sensor networks: Designs and analysis. International Journal of Sensor Networks, Special Issue on Coverage Problems in Sensor Networks, 2006, accepted. [5] Kumar S, Lai T H, Arora A. Barrier coverage with wireless sensors. In Proc. MOBICOM, Porta, T L, Lindemann C, Belding-Royer E M, Lu S (eds.), ACM, 2005, pp [6] Li Xiang-Yang, Calinescu G, Wan P J. Distributed construction of planar spanner and routing for ad hoc wireless networks. In Proc. INFOCOM, New York, USA, 2002, pp [7] Li Xiang-Yang, Stojmenovic I, Wang Y. Partial Delaunay triangulation and degree limited localized bluetooth scatternet formation. IEEE Trans. Parallel Distrib. Syst., 2004, 15(4): [8] Xing Guoliang, Lu Chenyang, Pless R, Huang Qingfeng. Impact of sensing coverage on greedy geographic routing algorithms. IEEE Trans. Parallel Distrib. Syst., 2006, 17(4): [9] Araújo F, Rodrigues L. Fast localized Delaunay triangulation. In Proc. OPODIS, Grenoble, France, LNCS 3544, Higashino T (ed.), Springer, 2004 pp [10] Guibas L J, Knuth D E, Sharir M. Randomized incremental construction of Delaunay and Voronoi diagrams. Algorithmica, 1992, 7: , also In Proc. 17th Int. Colloq. Automata, Languages and Programming, Warwick University, England, LNCS 443, Springer-Verlag, 1990, pp [11] Sack J, Urrutia G (eds.). Voronoi Diagrams. Handbook of Computational Geometry. Elsevier Science Publishing, [12] Kumar S, Lai T H, Balogh J. On k-coverage in a mostly sleeping sensor network. In Proc. MOBICOM, Haas Z J, Das S R, Jain R (eds.), ACM, 2004, pp Cheng-Dong Jiang received the B.S. degree in computer science in 1996 from University of Science and Technology of China. He is now a Ph.D. candidate and faculty member in the Department of Computer Science at the same university. His research interests include topology control in wireless sensor networks, optimization techniques for NP-hard problem, and the design of VLSI. Guo-Liang Chen was born in Now he is an academician of Chinese Academy of Sciences and Ph.D. supervisor at University of Science and Technology of China, and director of the National High Performance Computing Center at Hefei, and a CCF senior member. His current research areas are parallel computing, computer architecture and combinatorial optimization.

Simulations of the quadrilateral-based localization

Simulations of the quadrilateral-based localization Simulations of the quadrilateral-based localization Cluster success rate v.s. node degree. Each plot represents a simulation run. 9/15/05 Jie Gao CSE590-fall05 1 Random deployment Poisson distribution

More information

Computational Geometry

Computational Geometry Lecture 12: Lecture 12: Motivation: Terrains by interpolation To build a model of the terrain surface, we can start with a number of sample points where we know the height. Lecture 12: Motivation: Terrains

More information

On Greedy Geographic Routing Algorithms in Sensing-Covered Networks

On Greedy Geographic Routing Algorithms in Sensing-Covered Networks On Greedy Geographic Routing Algorithms in Sensing-Covered Networks Guoliang Xing; Chenyang Lu; Robert Pless Department of Computer Science and Engineering Washington University in St. Louis St. Louis,

More information

CLASSIFICATION OF SURFACES

CLASSIFICATION OF SURFACES CLASSIFICATION OF SURFACES JUSTIN HUANG Abstract. We will classify compact, connected surfaces into three classes: the sphere, the connected sum of tori, and the connected sum of projective planes. Contents

More information

An efficient implementation of the greedy forwarding strategy

An efficient implementation of the greedy forwarding strategy An efficient implementation of the greedy forwarding strategy Hannes Stratil Embedded Computing Systems Group E182/2 Technische Universität Wien Treitlstraße 3 A-1040 Vienna Email: hannes@ecs.tuwien.ac.at

More information

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Yingshu Li Department of Computer Science Georgia State University Atlanta, GA 30303 yli@cs.gsu.edu Donghyun Kim Feng

More information

Estimating the Free Region of a Sensor Node

Estimating the Free Region of a Sensor Node Estimating the Free Region of a Sensor Node Laxmi Gewali, Navin Rongratana, Jan B. Pedersen School of Computer Science, University of Nevada 4505 Maryland Parkway Las Vegas, NV, 89154, USA Abstract We

More information

Midpoint Routing algorithms for Delaunay Triangulations

Midpoint Routing algorithms for Delaunay Triangulations Midpoint Routing algorithms for Delaunay Triangulations Weisheng Si and Albert Y. Zomaya Centre for Distributed and High Performance Computing School of Information Technologies Prologue The practical

More information

Optimal k-support Coverage Paths in Wireless Sensor Networks

Optimal k-support Coverage Paths in Wireless Sensor Networks Optimal k-support Coverage Paths in Wireless Sensor Networks ShaoJie Tang Department of Computer Science Illinois Institute of Technology Chicago, IL, 60616. Email: stang7@iit.edu XuFei Mao Department

More information

Interleaving Schemes on Circulant Graphs with Two Offsets

Interleaving Schemes on Circulant Graphs with Two Offsets Interleaving Schemes on Circulant raphs with Two Offsets Aleksandrs Slivkins Department of Computer Science Cornell University Ithaca, NY 14853 slivkins@cs.cornell.edu Jehoshua Bruck Department of Electrical

More information

Distributed Coordinate-free Hole Detection and Recovery

Distributed Coordinate-free Hole Detection and Recovery Distributed Coordinate-free Hole Detection and Recovery Xiaoyun Li xliw@essex.ac.uk David K. Hunter dkhunter@essex.ac.uk Kun Yang kunyang@essex.ac.uk Abstract A distributed algorithm is introduced which

More information

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College

More information

Minimum connected dominating sets and maximal independent sets in unit disk graphs

Minimum connected dominating sets and maximal independent sets in unit disk graphs Theoretical Computer Science 352 (2006) 1 7 www.elsevier.com/locate/tcs Minimum connected dominating sets and maximal independent sets in unit disk graphs Weili Wu a,,1, Hongwei Du b, Xiaohua Jia b, Yingshu

More information

Algorithms for Minimum m-connected k-dominating Set Problem

Algorithms for Minimum m-connected k-dominating Set Problem Algorithms for Minimum m-connected k-dominating Set Problem Weiping Shang 1,2, Frances Yao 2,PengjunWan 3, and Xiaodong Hu 1 1 Institute of Applied Mathematics, Chinese Academy of Sciences, Beijing, China

More information

Algorithms on Minimizing the Maximum Sensor Movement for Barrier Coverage of a Linear Domain

Algorithms on Minimizing the Maximum Sensor Movement for Barrier Coverage of a Linear Domain Algorithms on Minimizing the Maximum Sensor Movement for Barrier Coverage of a Linear Domain Danny Z. Chen 1, Yan Gu 2, Jian Li 3, and Haitao Wang 1 1 Department of Computer Science and Engineering University

More information

arxiv: v1 [cs.ni] 28 Apr 2015

arxiv: v1 [cs.ni] 28 Apr 2015 Succint greedy routing without metric on planar triangulations Pierre Leone, Kasun Samarasinghe Computer Science Department, University of Geneva, Battelle A, route de Drize 7, 1227 Carouge, Switzerland

More information

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.9, September 2017 139 Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks MINA MAHDAVI

More information

On minimum m-connected k-dominating set problem in unit disc graphs

On minimum m-connected k-dominating set problem in unit disc graphs J Comb Optim (2008) 16: 99 106 DOI 10.1007/s10878-007-9124-y On minimum m-connected k-dominating set problem in unit disc graphs Weiping Shang Frances Yao Pengjun Wan Xiaodong Hu Published online: 5 December

More information

Connectivity-based Distributed Coverage Hole Detection in Wireless Sensor Networks

Connectivity-based Distributed Coverage Hole Detection in Wireless Sensor Networks Connectivity-based Distributed Coverage Hole Detection in Wireless Sensor Networks Feng Yan, Philippe Martins, Laurent Decreusefond To cite this version: Feng Yan, Philippe Martins, Laurent Decreusefond.

More information

Mathematical and Algorithmic Foundations Linear Programming and Matchings

Mathematical and Algorithmic Foundations Linear Programming and Matchings Adavnced Algorithms Lectures Mathematical and Algorithmic Foundations Linear Programming and Matchings Paul G. Spirakis Department of Computer Science University of Patras and Liverpool Paul G. Spirakis

More information

An approximation algorithm for a bottleneck k-steiner tree problem in the Euclidean plane

An approximation algorithm for a bottleneck k-steiner tree problem in the Euclidean plane Information Processing Letters 81 (2002) 151 156 An approximation algorithm for a bottleneck k-steiner tree problem in the Euclidean plane Lusheng Wang,ZimaoLi Department of Computer Science, City University

More information

WIRELESS sensor networks (WSNs) have attracted a. Homology-based Distributed Coverage Hole Detection in Wireless Sensor Networks

WIRELESS sensor networks (WSNs) have attracted a. Homology-based Distributed Coverage Hole Detection in Wireless Sensor Networks IEEE/ACM TRANSACTIONS ON NETWORKING 1 Homology-based Distributed Coverage Hole Detection in Wireless Sensor Networks Feng Yan, Member, IEEE, Anaïs Vergne, Philippe Martins, Senior Member, IEEE, Laurent

More information

On Distributed Algorithms for Maximizing the Network Lifetime in Wireless Sensor Networks

On Distributed Algorithms for Maximizing the Network Lifetime in Wireless Sensor Networks On Distributed Algorithms for Maximizing the Network Lifetime in Wireless Sensor Networks Akshaye Dhawan Georgia State University Atlanta, Ga 30303 akshaye@cs.gsu.edu Abstract A key challenge in Wireless

More information

Algorithms for minimum m-connected k-tuple dominating set problem

Algorithms for minimum m-connected k-tuple dominating set problem Theoretical Computer Science 381 (2007) 241 247 www.elsevier.com/locate/tcs Algorithms for minimum m-connected k-tuple dominating set problem Weiping Shang a,c,, Pengjun Wan b, Frances Yao c, Xiaodong

More information

Dynamic Coverage in Ad-hoc Sensor Networks

Dynamic Coverage in Ad-hoc Sensor Networks Dynamic Coverage in Ad-hoc Sensor Networks Hai Huang Andréa W. Richa, Michael Segal Abstract Ad-hoc networks of sensor nodes are in general semi-permanently deployed. However, the topology of such networks

More information

FREE REGIONS OF SENSOR NODES. Howard R. Hughes College of Engineering. University of Nevada, Las Vegas, NV ABSTRACT

FREE REGIONS OF SENSOR NODES. Howard R. Hughes College of Engineering. University of Nevada, Las Vegas, NV ABSTRACT FREE REGIONS OF SENSOR NODES Laxmi Gewali 1, Navin Rongatana 2, Henry Selvaraj 3, Jan B. Pedersen 4 Howard R. Hughes College of Engineering University of Nevada, Las Vegas, NV 89154-4026 1 laxmi@cs.unlv.edu,

More information

Strongly Connected Dominating Sets in Wireless Sensor Networks with Unidirectional Links

Strongly Connected Dominating Sets in Wireless Sensor Networks with Unidirectional Links Strongly Connected Dominating Sets in Wireless Sensor Networks with Unidirectional Links Ding-Zhu Du 1,MyT.Thai 1,YingshuLi 2,DanLiu 1, and Shiwei Zhu 1 1 Department of Computer Science and Engineering,

More information

Dual Power Management for Network Connectivity in Wireless Sensor Networks

Dual Power Management for Network Connectivity in Wireless Sensor Networks Dual Power Management for Network Connectivity in Wireless Sensor Networks Yanxia Rong, Hongsik Choi and Hyeong-Ah Choi Department of Computer Science George Washington University Washington DC Department

More information

Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees

Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees Pouya Ostovari Department of Computer and Information Siences Temple University Philadelphia, Pennsylvania, USA Email: ostovari@temple.edu

More information

Geographical routing 1

Geographical routing 1 Geographical routing 1 Routing in ad hoc networks Obtain route information between pairs of nodes wishing to communicate. Proactive protocols: maintain routing tables at each node that is updated as changes

More information

Straight-Line Drawings of 2-Outerplanar Graphs on Two Curves

Straight-Line Drawings of 2-Outerplanar Graphs on Two Curves Straight-Line Drawings of 2-Outerplanar Graphs on Two Curves (Extended Abstract) Emilio Di Giacomo and Walter Didimo Università di Perugia ({digiacomo,didimo}@diei.unipg.it). Abstract. We study how to

More information

Fast and Efficient Restricted Delaunay Triangulation in Random Geometric Graphs

Fast and Efficient Restricted Delaunay Triangulation in Random Geometric Graphs Fast and Efficient Restricted Delaunay Triangulation in Random Geometric Graphs Chen Avin Computer Science Department University of California, Los Angeles Los Angeles, CA 90095-1596, USA. avin@cs.ucla.edu

More information

A Constant Factor Distributed Algorithm for Computing Connected Dominating Sets in Wireless Sensor Networks

A Constant Factor Distributed Algorithm for Computing Connected Dominating Sets in Wireless Sensor Networks A Constant Factor Distributed Algorithm for Computing Connected Dominating Sets in Wireless Sensor Networks Kamrul Islam, Selim G Akl, and Henk Meijer School of Computing, Queen s University Kingston,

More information

CS 532: 3D Computer Vision 14 th Set of Notes

CS 532: 3D Computer Vision 14 th Set of Notes 1 CS 532: 3D Computer Vision 14 th Set of Notes Instructor: Philippos Mordohai Webpage: www.cs.stevens.edu/~mordohai E-mail: Philippos.Mordohai@stevens.edu Office: Lieb 215 Lecture Outline Triangulating

More information

Lifetime Comparison on Location Base Routing in Wireless Sensor Networks

Lifetime Comparison on Location Base Routing in Wireless Sensor Networks Lifetime Comparison on Location Base Routing in Wireless Sensor Networks Hadi Asharioun, Hassan Asadollahi, Abdul Samad Ismail, and Sureswaran Ramadass Abstract Lifetime of a sensor network is defined

More information

Notes in Computational Geometry Voronoi Diagrams

Notes in Computational Geometry Voronoi Diagrams Notes in Computational Geometry Voronoi Diagrams Prof. Sandeep Sen and Prof. Amit Kumar Indian Institute of Technology, Delhi Voronoi Diagrams In this lecture, we study Voronoi Diagrams, also known as

More information

Summary of Coverage Problems in Wireless Ad-hoc Sensor Networks

Summary of Coverage Problems in Wireless Ad-hoc Sensor Networks Summary of Coverage Problems in Wireless Ad-hoc Sensor Networks Laura Kneckt 21th of March, 2005 Abstract This paper presents a brief summary of the article about Coverage Problems in Wireless Ad-hoc Sensor

More information

6. Lecture notes on matroid intersection

6. Lecture notes on matroid intersection Massachusetts Institute of Technology 18.453: Combinatorial Optimization Michel X. Goemans May 2, 2017 6. Lecture notes on matroid intersection One nice feature about matroids is that a simple greedy algorithm

More information

ROBOT MOTION USING DELAUNAY TRIANGULATION

ROBOT MOTION USING DELAUNAY TRIANGULATION ROBOT MOTION USING DELAUNAY TRIANGULATION by Ioana-Maria Ileană Abstract. Robot motion is nowadays studied from a lot of different perspectives. This paper is based on the assumption of a fully known environment,

More information

Randomized k-coverage Algorithms For Dense Sensor Networks

Randomized k-coverage Algorithms For Dense Sensor Networks Randomized k-coverage Algorithms For Dense Sensor Networks Mohamed Hefeeda School of Computing Science Simon Fraser University Surrey, BC, Canada Majid Bagheri School of Computing Science Simon Fraser

More information

CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS

CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS International Journal of Wireless Communications and Networking 3(1), 2011, pp. 7-13 CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS Sudhanshu Pant 1, Naveen Chauhan 2 and Brij Bihari Dubey 3 Department

More information

[8] that this cannot happen on the projective plane (cf. also [2]) and the results of Robertson, Seymour, and Thomas [5] on linkless embeddings of gra

[8] that this cannot happen on the projective plane (cf. also [2]) and the results of Robertson, Seymour, and Thomas [5] on linkless embeddings of gra Apex graphs with embeddings of face-width three Bojan Mohar Department of Mathematics University of Ljubljana Jadranska 19, 61111 Ljubljana Slovenia bojan.mohar@uni-lj.si Abstract Aa apex graph is a graph

More information

Planar Graphs. 1 Graphs and maps. 1.1 Planarity and duality

Planar Graphs. 1 Graphs and maps. 1.1 Planarity and duality Planar Graphs In the first half of this book, we consider mostly planar graphs and their geometric representations, mostly in the plane. We start with a survey of basic results on planar graphs. This chapter

More information

Geometric Spanners for Routing in Mobile Networks

Geometric Spanners for Routing in Mobile Networks 1 Geometric Spanners for Routing in Mobile Networks Jie Gao, Leonidas J Guibas, John Hershberger, Li Zhang, An Zhu Abstract We propose a new routing graph, the Restricted Delaunay Graph (RDG), for mobile

More information

CS133 Computational Geometry

CS133 Computational Geometry CS133 Computational Geometry Voronoi Diagram Delaunay Triangulation 5/17/2018 1 Nearest Neighbor Problem Given a set of points P and a query point q, find the closest point p P to q p, r P, dist p, q dist(r,

More information

AN AD HOC network consists of a collection of mobile

AN AD HOC network consists of a collection of mobile 174 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 23, NO. 1, JANUARY 2005 Geometric Spanners for Routing in Mobile Networks Jie Gao, Member, IEEE, Leonidas J. Guibas, John Hershberger, Li Zhang,

More information

Chapter 7 TOPOLOGY CONTROL

Chapter 7 TOPOLOGY CONTROL Chapter 7 TOPOLOGY CONTROL Distributed Computing Group Mobile Computing Winter 2005 / 2006 Overview Topology Control Gabriel Graph et al. XTC Interference SINR & Scheduling Complexity Distributed Computing

More information

EULER S FORMULA AND THE FIVE COLOR THEOREM

EULER S FORMULA AND THE FIVE COLOR THEOREM EULER S FORMULA AND THE FIVE COLOR THEOREM MIN JAE SONG Abstract. In this paper, we will define the necessary concepts to formulate map coloring problems. Then, we will prove Euler s formula and apply

More information

On the Maximum Throughput of A Single Chain Wireless Multi-Hop Path

On the Maximum Throughput of A Single Chain Wireless Multi-Hop Path On the Maximum Throughput of A Single Chain Wireless Multi-Hop Path Guoqiang Mao, Lixiang Xiong, and Xiaoyuan Ta School of Electrical and Information Engineering The University of Sydney NSW 2006, Australia

More information

Design and Analysis of Connected Dominating Set Formation for Topology Control in Wireless Ad Hoc Networks

Design and Analysis of Connected Dominating Set Formation for Topology Control in Wireless Ad Hoc Networks Design and Analysis of Connected Dominating Set Formation for Topology Control in Wireless Ad Hoc Networks Bo Han and Weijia Jia Department of Computer Science, City University of Hong Kong 3 Tat Chee

More information

Chapter 6. Planar Orientations. 6.1 Numberings of Digraphs

Chapter 6. Planar Orientations. 6.1 Numberings of Digraphs Chapter 6 Planar Orientations In this chapter we will focus on algorithms and techniques used for drawing planar graphs. The algorithms we will use are based on numbering the vertices and orienting the

More information

Designing k-coverage schedules in wireless sensor networks

Designing k-coverage schedules in wireless sensor networks J Comb Optim (2008) 15: 127 146 DOI 10.1007/s10878-007-9072-6 Designing k-coverage schedules in wireless sensor networks Yingshu Li Shan Gao Published online: 21 March 2007 Springer Science+Business Media,

More information

Maximal Monochromatic Geodesics in an Antipodal Coloring of Hypercube

Maximal Monochromatic Geodesics in an Antipodal Coloring of Hypercube Maximal Monochromatic Geodesics in an Antipodal Coloring of Hypercube Kavish Gandhi April 4, 2015 Abstract A geodesic in the hypercube is the shortest possible path between two vertices. Leader and Long

More information

SHAPE SEGMENTATION FOR SHAPE DESCRIPTION

SHAPE SEGMENTATION FOR SHAPE DESCRIPTION SHAPE SEGMENTATION FOR SHAPE DESCRIPTION Olga Symonova GraphiTech Salita dei Molini 2, Villazzano (TN), Italy olga.symonova@graphitech.it Raffaele De Amicis GraphiTech Salita dei Molini 2, Villazzano (TN),

More information

5 Graphs

5 Graphs 5 Graphs jacques@ucsd.edu Some of the putnam problems are to do with graphs. They do not assume more than a basic familiarity with the definitions and terminology of graph theory. 5.1 Basic definitions

More information

An Optimal Bound for the MST Algorithm to Compute Energy Efficient Broadcast Trees in Wireless Networks. Qassem Abu Ahmad February 10, 2008

An Optimal Bound for the MST Algorithm to Compute Energy Efficient Broadcast Trees in Wireless Networks. Qassem Abu Ahmad February 10, 2008 An Optimal Bound for the MST Algorithm to Compute Energy Efficient Broadcast Trees in Wireless Networks Qassem Abu Ahmad February 10, 2008 i Contents 1 Introduction 1 2 Main Results 2 3 An Optimal bound

More information

Hierarchical Low Power Consumption Technique with Location Information for Sensor Networks

Hierarchical Low Power Consumption Technique with Location Information for Sensor Networks Hierarchical Low Power Consumption Technique with Location Information for Sensor Networks Susumu Matsumae Graduate School of Science and Engineering Saga University Saga 840-8502, Japan Fukuhito Ooshita

More information

arxiv: v1 [cs.cg] 8 Jan 2018

arxiv: v1 [cs.cg] 8 Jan 2018 Voronoi Diagrams for a Moderate-Sized Point-Set in a Simple Polygon Eunjin Oh Hee-Kap Ahn arxiv:1801.02292v1 [cs.cg] 8 Jan 2018 Abstract Given a set of sites in a simple polygon, a geodesic Voronoi diagram

More information

Constructing weakly connected dominating set for secure clustering in distributed sensor network

Constructing weakly connected dominating set for secure clustering in distributed sensor network J Comb Optim (01) 3:301 307 DOI 10.1007/s10878-010-9358-y Constructing weakly connected dominating set for secure clustering in distributed sensor network Hongjie Du Weili Wu Shan Shan Donghyun Kim Wonjun

More information

On Delivery Guarantees of Face and Combined Greedy-Face Routing in Ad Hoc and Sensor Networks

On Delivery Guarantees of Face and Combined Greedy-Face Routing in Ad Hoc and Sensor Networks On Delivery Guarantees of Face and Combined Greedy-Face Routing in Ad Hoc and Sensor Networks ABSTRACT Hannes Frey IMADA, University of Southern Denmark DK-5230 Odense M, Denmark frey@imada.sdu.dk It was

More information

Integrated Coverage and Connectivity Configuration in Wireless Sensor Networks

Integrated Coverage and Connectivity Configuration in Wireless Sensor Networks Integrated Coverage and Connectivity Configuration in Wireless Sensor Networks Xiaorui Wang, Guoliang Xing, Yuanfang Zhang *, Chenyang Lu, Robert Pless, Christopher Gill Department of Computer Science

More information

Parameterized graph separation problems

Parameterized graph separation problems Parameterized graph separation problems Dániel Marx Department of Computer Science and Information Theory, Budapest University of Technology and Economics Budapest, H-1521, Hungary, dmarx@cs.bme.hu Abstract.

More information

Topology Control in 3-Dimensional Networks & Algorithms for Multi-Channel Aggregated Co

Topology Control in 3-Dimensional Networks & Algorithms for Multi-Channel Aggregated Co Topology Control in 3-Dimensional Networks & Algorithms for Multi-Channel Aggregated Convergecast Amitabha Ghosh Yi Wang Ozlem D. Incel V.S. Anil Kumar Bhaskar Krishnamachari Dept. of Electrical Engineering,

More information

Packing Two Disks into a Polygonal Environment

Packing Two Disks into a Polygonal Environment Packing Two Disks into a Polygonal Environment Prosenjit Bose, School of Computer Science, Carleton University. E-mail: jit@cs.carleton.ca Pat Morin, School of Computer Science, Carleton University. E-mail:

More information

Approximation Algorithms for Geometric Intersection Graphs

Approximation Algorithms for Geometric Intersection Graphs Approximation Algorithms for Geometric Intersection Graphs Subhas C. Nandy (nandysc@isical.ac.in) Advanced Computing and Microelectronics Unit Indian Statistical Institute Kolkata 700108, India. Outline

More information

Cutting out polygons with a circular saw

Cutting out polygons with a circular saw Cutting out polygons with a circular saw Adrian Dumitrescu Masud Hasan April 0, 202 Abstract Given a simple (cuttable) polygon Q drawn on a piece of planar material R, we cut Q out of R by a (small) circular

More information

Efficient Prefix Computation on Faulty Hypercubes

Efficient Prefix Computation on Faulty Hypercubes JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 17, 1-21 (21) Efficient Prefix Computation on Faulty Hypercubes YU-WEI CHEN AND KUO-LIANG CHUNG + Department of Computer and Information Science Aletheia

More information

Triangle Graphs and Simple Trapezoid Graphs

Triangle Graphs and Simple Trapezoid Graphs JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 18, 467-473 (2002) Short Paper Triangle Graphs and Simple Trapezoid Graphs Department of Computer Science and Information Management Providence University

More information

Min-Cost Multicast Networks in Euclidean Space

Min-Cost Multicast Networks in Euclidean Space Min-Cost Multicast Networks in Euclidean Space Xunrui Yin, Yan Wang, Xin Wang, Xiangyang Xue School of Computer Science Fudan University {09110240030,11110240029,xinw,xyxue}@fudan.edu.cn Zongpeng Li Dept.

More information

Mesh Generation through Delaunay Refinement

Mesh Generation through Delaunay Refinement Mesh Generation through Delaunay Refinement 3D Meshes Mariette Yvinec MPRI 2009-2010, C2-14-1, Lecture 4b ENSL Winter School, january 2010 Input : C : a 2D PLC in R 3 (piecewise linear complex) Ω : a bounded

More information

2 Geometry Solutions

2 Geometry Solutions 2 Geometry Solutions jacques@ucsd.edu Here is give problems and solutions in increasing order of difficulty. 2.1 Easier problems Problem 1. What is the minimum number of hyperplanar slices to make a d-dimensional

More information

Localized Topology Control for Heterogeneous Wireless Sensor Networks

Localized Topology Control for Heterogeneous Wireless Sensor Networks Localized Topology Control for Heterogeneous Wireless Sensor Networks Xiang-Yang Li Wen-Zhan Song Yu Wang 2 The paper studies topology control in heterogeneous wireless sensor networks, where different

More information

Approximating Fault-Tolerant Steiner Subgraphs in Heterogeneous Wireless Networks

Approximating Fault-Tolerant Steiner Subgraphs in Heterogeneous Wireless Networks Approximating Fault-Tolerant Steiner Subgraphs in Heterogeneous Wireless Networks Ambreen Shahnaz and Thomas Erlebach Department of Computer Science University of Leicester University Road, Leicester LE1

More information

Monotone Paths in Geometric Triangulations

Monotone Paths in Geometric Triangulations Monotone Paths in Geometric Triangulations Adrian Dumitrescu Ritankar Mandal Csaba D. Tóth November 19, 2017 Abstract (I) We prove that the (maximum) number of monotone paths in a geometric triangulation

More information

Geo-Routing. Chapter 2. Ad Hoc and Sensor Networks Roger Wattenhofer

Geo-Routing. Chapter 2. Ad Hoc and Sensor Networks Roger Wattenhofer Geo-Routing Chapter 2 Ad Hoc and Sensor Networks Roger Wattenhofer 2/1 Application of the Week: Mesh Networking (Roofnet) Sharing Internet access Cheaper for everybody Several gateways fault-tolerance

More information

The Farthest Point Delaunay Triangulation Minimizes Angles

The Farthest Point Delaunay Triangulation Minimizes Angles The Farthest Point Delaunay Triangulation Minimizes Angles David Eppstein Department of Information and Computer Science UC Irvine, CA 92717 November 20, 1990 Abstract We show that the planar dual to the

More information

APPROXIMATING THE MAXMIN AND MINMAX AREA TRIANGULATIONS USING ANGULAR CONSTRAINTS. J. Mark Keil, Tzvetalin S. Vassilev

APPROXIMATING THE MAXMIN AND MINMAX AREA TRIANGULATIONS USING ANGULAR CONSTRAINTS. J. Mark Keil, Tzvetalin S. Vassilev Serdica J. Computing 4 00, 3 334 APPROXIMATING THE MAXMIN AND MINMAX AREA TRIANGULATIONS USING ANGULAR CONSTRAINTS J. Mark Keil, Tzvetalin S. Vassilev Abstract. We consider sets of points in the two-dimensional

More information

Voronoi Diagrams and Delaunay Triangulation slides by Andy Mirzaian (a subset of the original slides are used here)

Voronoi Diagrams and Delaunay Triangulation slides by Andy Mirzaian (a subset of the original slides are used here) Voronoi Diagrams and Delaunay Triangulation slides by Andy Mirzaian (a subset of the original slides are used here) Voronoi Diagram & Delaunay Triangualtion Algorithms Divide-&-Conquer Plane Sweep Lifting

More information

Voronoi Diagrams and Delaunay Triangulations. O Rourke, Chapter 5

Voronoi Diagrams and Delaunay Triangulations. O Rourke, Chapter 5 Voronoi Diagrams and Delaunay Triangulations O Rourke, Chapter 5 Outline Preliminaries Properties and Applications Computing the Delaunay Triangulation Preliminaries Given a function f: R 2 R, the tangent

More information

Lecture 3: Art Gallery Problems and Polygon Triangulation

Lecture 3: Art Gallery Problems and Polygon Triangulation EECS 396/496: Computational Geometry Fall 2017 Lecture 3: Art Gallery Problems and Polygon Triangulation Lecturer: Huck Bennett In this lecture, we study the problem of guarding an art gallery (specified

More information

Ice-Creams and Wedge Graphs

Ice-Creams and Wedge Graphs Ice-Creams and Wedge Graphs Eyal Ackerman Tsachik Gelander Rom Pinchasi Abstract What is the minimum angle α > such that given any set of α-directional antennas (that is, antennas each of which can communicate

More information

CMSC 425: Lecture 9 Geometric Data Structures for Games: Geometric Graphs Thursday, Feb 21, 2013

CMSC 425: Lecture 9 Geometric Data Structures for Games: Geometric Graphs Thursday, Feb 21, 2013 CMSC 425: Lecture 9 Geometric Data Structures for Games: Geometric Graphs Thursday, Feb 21, 2013 Reading: Today s materials is presented in part in Computational Geometry: Algorithms and Applications (3rd

More information

Chapter 8. Voronoi Diagrams. 8.1 Post Oce Problem

Chapter 8. Voronoi Diagrams. 8.1 Post Oce Problem Chapter 8 Voronoi Diagrams 8.1 Post Oce Problem Suppose there are n post oces p 1,... p n in a city. Someone who is located at a position q within the city would like to know which post oce is closest

More information

Connected Dominating Sets in Wireless Networks with Different Transmission Ranges

Connected Dominating Sets in Wireless Networks with Different Transmission Ranges 1 Connected Dominating Sets in Wireless Networks with Different Transmission Ranges My T. Thai Feng Wang Dan Liu Shiwei Zhu Ding-Zhu Du Dept. of Computer Science & Enginering University of Minnesota Minneapolis,

More information

G 6i try. On the Number of Minimal 1-Steiner Trees* Discrete Comput Geom 12:29-34 (1994)

G 6i try. On the Number of Minimal 1-Steiner Trees* Discrete Comput Geom 12:29-34 (1994) Discrete Comput Geom 12:29-34 (1994) G 6i try 9 1994 Springer-Verlag New York Inc. On the Number of Minimal 1-Steiner Trees* B. Aronov, 1 M. Bern, 2 and D. Eppstein 3 Computer Science Department, Polytechnic

More information

On the Minimum k-connectivity Repair in Wireless Sensor Networks

On the Minimum k-connectivity Repair in Wireless Sensor Networks On the Minimum k-connectivity epair in Wireless Sensor Networks Hisham M. Almasaeid and Ahmed E. Kamal Dept. of Electrical and Computer Engineering, Iowa State University, Ames, IA 50011 Email:{hisham,kamal}@iastate.edu

More information

6. Concluding Remarks

6. Concluding Remarks [8] K. J. Supowit, The relative neighborhood graph with an application to minimum spanning trees, Tech. Rept., Department of Computer Science, University of Illinois, Urbana-Champaign, August 1980, also

More information

Preferred directions for resolving the non-uniqueness of Delaunay triangulations

Preferred directions for resolving the non-uniqueness of Delaunay triangulations Preferred directions for resolving the non-uniqueness of Delaunay triangulations Christopher Dyken and Michael S. Floater Abstract: This note proposes a simple rule to determine a unique triangulation

More information

Algorithms for Euclidean TSP

Algorithms for Euclidean TSP This week, paper [2] by Arora. See the slides for figures. See also http://www.cs.princeton.edu/~arora/pubs/arorageo.ps Algorithms for Introduction This lecture is about the polynomial time approximation

More information

NODE LOCALIZATION IN WSN: USING EUCLIDEAN DISTANCE POWER GRAPHS

NODE LOCALIZATION IN WSN: USING EUCLIDEAN DISTANCE POWER GRAPHS CHAPTER 6 NODE LOCALIZATION IN WSN: USING EUCLIDEAN DISTANCE POWER GRAPHS Abstract Localization of sensor nodes in a wireless sensor network is needed for many practical purposes. If the nodes are considered

More information

GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS. Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani

GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS. Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani Centre for Telecommunication and Information Engineering Monash University,

More information

Cut Graph Based Information Storage and Retrieval in 3D Sensor Networks with General Topology

Cut Graph Based Information Storage and Retrieval in 3D Sensor Networks with General Topology 213 Proceedings IEEE INFOCOM Cut Graph Based Information Storage and Retrieval in 3D Sensor Networks with General Topology Yang Yang, Miao Jin, Yao Zhao, and Hongyi Wu Abstract We address the problem of

More information

Locating Objects in a Sensor Grid

Locating Objects in a Sensor Grid Locating Objects in a Sensor Grid Buddhadeb Sau 1 and Krishnendu Mukhopadhyaya 2 1 Department of Mathematics, Jadavpur University, Kolkata - 700032, India buddhadebsau@indiatimes.com 2 Advanced Computing

More information

WIRELESS sensor networks (WSNs) have been

WIRELESS sensor networks (WSNs) have been IEEE TRANSACTIONS ON MOBILE COMPUTING 1 Achieving k-barrier Coverage in Hybrid Directional Sensor Networks Zhibo Wang, Jilong Liao, Qing Cao, Member, IEEE, Hairong Qi,Senior Member, IEEE, and Zhi Wang,

More information

The Geodesic Integral on Medial Graphs

The Geodesic Integral on Medial Graphs The Geodesic Integral on Medial Graphs Kolya Malkin August 013 We define the geodesic integral defined on paths in the duals of medial graphs on surfaces and use it to study lens elimination and connection

More information

Distributed Algorithm for Voronoi Partition of Wireless Sensor Networks with a Limited Sensing Range

Distributed Algorithm for Voronoi Partition of Wireless Sensor Networks with a Limited Sensing Range sensors Article Distributed Algorithm for Voronoi Partition of Wireless Sensor Networks with a Limited Sensing Range Chenlong He 1, * ID, Zuren Feng 1 and Zhigang Ren 2 1 State Key Laboratory for Manufacturing

More information

Algorithm and Complexity of Disjointed Connected Dominating Set Problem on Trees

Algorithm and Complexity of Disjointed Connected Dominating Set Problem on Trees Algorithm and Complexity of Disjointed Connected Dominating Set Problem on Trees Wei Wang joint with Zishen Yang, Xianliang Liu School of Mathematics and Statistics, Xi an Jiaotong University Dec 20, 2016

More information

arxiv: v2 [cs.cg] 24 Jul 2011

arxiv: v2 [cs.cg] 24 Jul 2011 Ice-Creams and Wedge Graphs Eyal Ackerman Tsachik Gelander Rom Pinchasi Abstract arxiv:116.855v2 [cs.cg] 24 Jul 211 What is the minimum angle α > such that given any set of α-directional antennas (that

More information

Notes for Lecture 24

Notes for Lecture 24 U.C. Berkeley CS170: Intro to CS Theory Handout N24 Professor Luca Trevisan December 4, 2001 Notes for Lecture 24 1 Some NP-complete Numerical Problems 1.1 Subset Sum The Subset Sum problem is defined

More information

Notes on Binary Dumbbell Trees

Notes on Binary Dumbbell Trees Notes on Binary Dumbbell Trees Michiel Smid March 23, 2012 Abstract Dumbbell trees were introduced in [1]. A detailed description of non-binary dumbbell trees appears in Chapter 11 of [3]. These notes

More information