A Unified Energy-Efficient Topology for Unicast and Broadcast

Size: px
Start display at page:

Download "A Unified Energy-Efficient Topology for Unicast and Broadcast"

Transcription

1 A Unified Energy-Efficient Topology for Unicast and Broadcast Xiang-Yang Li Dept. of Compter Science Illinois Institte of Technology, Chicago, IL, USA Wen-Zhan Song School of Eng. & Comp. Sci. Washington State Uniersity Vancoer, WA, USA Weizhao Wang Dept. of Compter Science Illinois Institte of Technology, Chicago, IL, USA ABSTRACT We propose a noel commnication efficient topology control algorithm for each wireless node to select commnication neighbors and adjst its transmission power, sch that all nodes together self-form a topology that is energy efficient simltaneosly for both nicast and broadcast commnications. We proe that the proposed topology is planar, which garantees packet deliery if a certain localized roting method is sed; it is power efficient for nicast the energy needed to connect any pair of nodes is within a small constant factor of the minimm nder a common power attenation model; it is efficient for broadcast: the energy consmption for broadcasting data on top of it is asymptotically the best compared with strctres constrcted locally; it has a constant bonded logical degree, which will potentially redce interference and signal contention. We frther proe that the aerage physical degree of all nodes is bonded by a small constant. To the best of or knowledge, this is the first commnication-efficient distribted algorithm to achiee all these properties. Preiosly, only a centralized algorithm was reported in []. Moreoer, by assming that the ID and position of eery node can be represented in O(log n) bits for a wireless network of n nodes, or method ses at most 1n messages, where each message is of O(log n) bits. We also show that this strctre can be efficiently pdated for dynamical network enironment. Or theoretical reslts are corroborated in the simlations. Categories and Sbject Descriptors C..1 [Network Architectre and Design]: Wireless commnication, Network topology; G.. [Graph Theory]: Network problems, Graph algorithms General Terms Algorithms, Design, Theory The work of the athor is partially spported by NSF CCR Permission to make digital or hard copies of all or part of this work for personal or classroom se is granted withot fee proided that copies are not made or distribted for profit or commercial adantage and that copies bear this notice and the fll citation on the first page. To copy otherwise, to repblish, to post on serers or to redistribte to lists, reqires prior specific permission and/or a fee. MobiCom 05, Ag. 8-Sept., 005, Cologne, German Copyright 005 ACM /04/ $5.00. Keywords Graph theory, wireless ad hoc networks, topology control, power efficient, low weight, interference, nicast, broadcast. 1. INTRODUCTION A wireless ad hoc network consists of a distribtion of radios in a certain geographical area. Unlike celllar wireless networks, there is no centralized control in the network, and wireless deices (called nodes hereafter) can commnicate ia mlti-hop wireless channels: a node can reach all nodes inside its transmission range while two far-away nodes commnicate throgh the relaying by intermediate nodes. An important reqirement of these networks is that they shold be self-organizing, i.e., transmission ranges and data paths are dynamically restrctred with changing topology. Energy conseration and network performance are probably the most critical isses in wireless ad hoc (and sensor) networks, becase wireless deices are sally powered by batteries only and hae limited compting capability and memory. A wireless ad hoc or sensor network is modelled by a set V of n wireless nodes distribted in a two-dimensional plane. Each node has the same maximm transmission range R meters, e.g., a typical 80.11g wireless LAN adapter has a transmission range arond 100m 500m. By a proper scaling, we assme that all nodes hae the maximm transmission range eqal to one nit. These wireless nodes define a nit disk graph UDG(V ) in which there is an edge between two nodes iff the Eclidean distance between them is at most one nit. In other words, we assme that two nodes can always receie the signal from each other directly if the Eclidean distance between them is no more than one nit. Notice that, in practice, the transmission region of a node is not necessarily a perfect disk. As done by most reslts in the literatre, for simplicity, we model it by disk in order to first explore the nderlying natre of ad hoc networks. Hereafter, UDG(V ) is always assmed to be connected. We also assme that all wireless nodes hae distinctie identities(ids). Additionally we assme that each node knows the relatie position of its one-hop neighbors. The relatie position of neighbors can be estimated by the direction of signal arrial and the strength of signal. The geometry location of a wireless node can also be obtained by a localization method, sch as [5, 8, 15]. We here assme that the localization is low cost or it is already reqired by some other protocols. Notice that the higher these localization costs, the less desirable the adocated approach to design any protocol based on nodes geometry location.

2 We adopt the most common power-attenation model from literatre: the power needed to spport a link is assmed to be β, where is the Eclidean distance between and, β is a real constant between and 5 depending on the wireless transmission enironment. Throghot this paper we only focs on the transmission power of all nodes. This energy model only acconts for the emission power. This can be a good approximation of what happens in case of long range techniqes althogh the actal energy consmption is gien by a fixed part (receiing power and the power needed to keep the electric circits on) pls the emission power component. In other words, we assme that the transmission range is large enogh sch that the emission power is the major component and the receiing power is negligible. Notice that, as pointed ot by an anonymos reiewer, een if the energy cost of receiing a packet is high, there are a nmber of ways of redcing this cost by redcing the nmber of packets receied by bt not intended for a node. It incldes, bt is not limited to, the following approaches: (1) signals are sent with special small preambles that identify the intended recipient ; () the radios are freqency-agile and can choose different freqency channels to commnicate with different neighbors () the radios hae directional antennas which limit the olme oer which their signals are receied ; (4) faoring rotes that traerse sparser portions of the network. The (localized) topology control techniqe lets each wireless deice (locally) adjst its transmission range and select certain neighbors for commnication, while maintaining a decent global strctre to spport energy efficient roting and to improe the oerall network performance. A distribted method is localized if it rns in constant nmber of ronds [4]. By enabling each wireless node to shrink its transmission power (which is sally mch smaller than its maximm transmission power) sfficiently enogh to coer its farthest selected neighbor, topology control schemes can not only sae energy and prolong network life, bt also improe the network throghpt throgh mitigating the MACleel medim contention. Unlike traditional wired and celllar networks, the moement of wireless deices dring the commnication cold change the network topology to some extent. Hence, it is more challenging to design a topology control algorithm for ad hoc wireless networks: the topology shold be locally and self-adaptiely maintained sing low commnication cost, withot affecting the whole network s performance. The main contribtions of this paper are as follows. We present the first commnication efficient algorithm to constrct a nified energy-efficient topology for nicast and broadcast in wireless ad hoc/sensor networks. In one single strctre, we garantee the following network properties: 1. power efficient nicast: gien any two nodes, there is a path connecting them in the strctre with total power cost no more than ρ+1 times of the power cost of any path connecting them in the original network. Here ρ > 1 is some constant that will be specified later.. power efficient broadcast: the power consmption for broadcast is within a constant factor of optimm among all locally constrcted strctres. Notice that or strctre cannot garantee that the energy consmption is within a constant factor of the global optimm. Essentially, we proe that the strctre is lowweighted: its total edge length is within a constant factor of that of Eclidean Minimm Spanning Tree.. bonded logical node degree: each node has to commnicate with at most k 1 logical neighbors, where k 9 is an adjstable parameter; 4. bonded aerage physical node degree: the aerage physical node degree is bonded from aboe by a small constant. Here the physical degree of a node in a strctre H is defined as the nmber of nodes inside the disk centered at with radis max H. 5. planar: there are no edges crossing each other. This enables seeral localized roting algorithms, sch as [, 18, 4, 5], to be performed on top of this strctre to garantee the packet deliery withot roting table. 6. neighbors Θ-separated: the directions between any two logical neighbors of any node are separated by at least an angle θ, which as we will see redces the signal interference. It also can be sed to redce the receiing power cost when directional antenna is sed. In graph theoretical terminologies, gien a nit disk graph modelling the wireless ad hoc networks, we propose an commnication efficient distribted method to bild a low-weighted planar power-spanner with a bonded logical node degree. Here a geometric strctre is called low-weighted if its total edge length is no more than a small constant factor of that of the Eclidean minimm spanning tree. To the best of or knowledge, it is the first known commnication efficient algorithm to constrct sch a single strctre with all these desired properties. Preiosly, only a centralized algorithm was reported in []. Moreoer, by assming that the ID and position of eery node can be represented in O(log n) bits for a wireless network of n nodes, we show that the strctre can be initially constrcted sing at most 5n to 1n messages. In addition, we proe that the expected aerage node interference (which is defined as the nmber of nodes within its adjsted transmission range) in the strctre is bonded by a small constant. This is significant in its own de to the following reasons: it has been taken for granted that a network topology with a small logical node degree will garantee a small interference and recently Brkhart et al. [5] showed that this is not tre generally. Or reslts show that, althogh generally a small logical node degree cannot garantee a small interference, the expected aerage interference is indeed small if the logical commnication neighbors are chosen careflly. All or theoretical reslts are corroborated in simlations. We also show that or strctre can be easily pdated in a dynamic enironment when a node moes or dies after the battery power is drained. When a node moes, the topology can be dynamically self-maintained withot affecting the whole network, since each node adjsts its transmission range and selects neighbors only according to its neighbor information. To facilitate the efficient constrction of sch a nified energy-efficient topology, in the paper, we will first gie an improed method to constrct degree-bonded planar spanner by sing relatie positions only. The new strctre has the same power spanning ratio ρ = β 1 ( sin π k )β as the strctre proposed in [4]. Here k 9 is a cstomizable parameter. In addition, the directions between any two neighbors of each node are separated by at least a certain angle θ depending on the parameter k. Simlations show that the

3 node interference in or new strctre is indeed smaller than the strctre proposed in [4]. The rest of the paper is organized as follows. In Section, we reiew some prior arts in topology control, and smmarize some preferred properties of network topology for nicast and broadcast. Section presents an improed algorithm to bild a degree-bonded planar spanner with Θ-separation property. We then propose, in Section 4, the first commnication efficient algorithm to constrct planar spanner with bonded-degree and low weight. We stdy the expected interference of arios strctres in Section 5. In Section 6, we briefly stdy how to dynamically pdate the strctre if nodes are mobile. In Section 7, we condct extensie simlations to alidate or theoretical reslts. Finally, we conclde or paper in Section 8.. CURRENT STATE OF KNOWLEDGE.1 Energy-Efficient Unicast Topology Seeral strctres hae been proposed for topology control in wireless ad hoc networks. The relatie neighborhood graph, denoted by RNG(V ) [4], consists of all edges sch that the intersection of two circles centered at and and with radis does not contain any ertex w from the set V. The Gabriel graph [1] GG(V ) contains an edge if and only if disk(, ) contains no other points of V, where disk(, ) is the disk with edge as a diameter. For conenience, we also denote GG and RNG as the intersection of GG(V ) and RNG(V ) with UDG(V ) respectiely. Both GG and RNG are planar, are connected, and contain the Eclidean minimm spanning tree(emst ) of V if UDG is connected. RNG is not power efficient for nicast, since the power stretch factor of RNG is n 1 in the worst case [48] and not bonded by a constant een for n nodes randomly distribted (or proof is similar to the proof in [4] and omitted here de to space limit). Both RNG and GG are not degree-bonded. The Yao graph [51] with an integer parameter k > 6, denoted by Y Gk, is defined as follows. At each node, any k eqally-separated rays originated at define k cones. In each cone, choose the shortest edge UDG(V ) among all edges emanated from, if there is any, and add a directed link. Ties are broken arbitrarily or by ID. The reslting directed graph is called the Yao graph. It is well-known that the Yao strctre is power efficient for nicast. Seeral ariations [1] of the Yao strctre cold hae bonded logical node degree also. Howeer, all Yao related strctres are not planar. Li et al. [9] proposed the Cone Based Topology Control (CBTC) algorithm to first focs on seeral desirable properties, in particlar being an energy spanner with bonded degree. It is basically similar to the Yao strctre for topology control. Each node finds a power p,α sch that in eery cone of degree α srronding, there is some node that can reach with power p,α. Here, neertheless, we assme that there is a node reachable from by the maximm power in that cone. Notice that the nmber of cones to be considered in the traditional Yao strctre is a constant k. Howeer, nlike the Yao strctre, for each node, the nmber of cones needed to be considered in the method proposed in [9] is, where each neighboring node cold contribte two cones on both side of segment. Then the graph G α contains all edges sch that can commnicate with sing power p,α. They proed that, if α 5π 6 and the UDG is connected, then graph G α is a connected graph. On the other hand, if α > 5π, they showed that the 6 connectiity of G α is not garanteed by giing some conterexample [9]. Unlike the Yao strctre, the final topology G α is not necessarily a bonded degree graph. Bose et al. [] proposed a centralized method with rnning time O(n log n) to bild a degree-bonded planar spanner for a two-dimensional point set. It constrcts a planar t- spanner with low-weight for a gien nodes set V, for t = (1 + π) C del 10.0, sch that the node degree is bonded from aboe by 7. Hereafter, we se C del <.6 to denote the spanning ratio of the Delanay trianglation [11, 0, 19]. Howeer, a straightforward distribted implementation of this centralized method takes O(n ) commnications in the worst case for a set V of n nodes. Wang and Li [46] proposed the first efficient distribted algorithm to bild a degree-bonded planar spanner BP S for wireless ad hoc networks. Thogh their method can achiee three desirable featres: planar, degree-bonded, and power efficient, the theoretical bond on the node degree of their strctre is a large constant. For example, when α = π/6, the theoretical bond on node degree is 5. In addition, the commnication cost of their method can be ery high, althogh it is O(n) theoretically, which is achieed by applying the method in [6] to collect -hop neighbors information. The hidden constant is large: it is seeral hndreds. Recently, Song et al. [4] proposed two methods to constrct degree-bonded power spanner, by applying the ordered Yao strctres on Gabriel graph. They achieed better performance with mch lower commnication cost, compared with the method in [46]. One method in [4] only costs n messages for the constrction, and garantees that there are at most one neighbor node in each of the k = 9 eqal-sized cones. Notice that the strctres constrcted by the methods proposed in [46, 4] are not garanteed to be low-weighted. Both strctres are planar and degree-bonded. The strctre constrcted in [4] is only a power-spanner, while the strctre constrcted in [46] is also a length-spanner. Notice that it is known that a length-spanner is always a power spanner [1]. The main contribtion of this paper is that we propose the first method to constrct a single topology that is planar, length-spanner, bonded-degree, and lowweighted. In smmary, for energy efficient nicast roting, the topology is preferred to hae following featres: 1. Power Spanner: Formally speaking, a sbgraph H is called a power spanner of a graph G if there is a positie real constant ρ sch that for any two nodes, the power consmption of the shortest path in H is at most ρ times of the power consmption of the shortest path in G. Here ρ is called the power stretch factor or spanning ratio.. Degree Bonded: It is also desirable that the logical node degree in the constrcted topology is bonded from aboe by a small constant. A small node degree cold redce the MAC-leel contention and interference, also may help to mitigate the well known hidden and exposed terminal problems. In addition, a strctre with a small degree will improe the oerall network throghot []. Bonded degree strctres also find applications in Bletooth wireless networks since a master node can hae only 7 actie slaes.

4 . Planar: A network topology is also preferred to be planar (no two edges crossing each other in the graph) to enable some localized roting algorithms work correctly and efficiently, sch as Greedy Face Roting (GFG) [], Greedy Perimeter Stateless Roting (GPSR) [18], Adaptie Face Roting(AFR) [4], and Greedy Other Adaptie Face Roting (GOAFR) [5]. Notice that with planar network topology as the nderlying roting strctre, these localized roting protocols garantee the message deliery withot sing a roting table: each intermediate node can decide which logical neighboring node to forward the packet sing only local information and the position of the sorce and the destination.. Energy-Efficient Broadcast Topology Broadcast is also a ery important operation in wireless ad hoc/sensor networks, as it proides an efficient way of commnication that does not reqire global information and fnctions well with topology changes. For example, many nicast roting protocols [17, 6, 9, 8, 41] for wireless mlti-hop networks se broadcast in the stage of rote discoery. Similarly, seeral information dissemination protocols in wireless sensor networks se some forms of broadcast/mlticast for solicitation or collection of sensor information [14, 16, 5]. Since sensor networks mainly [1] se broadcast for commnication, how to delier messages to all the wireless deices in a scalable and power-efficient manner has drawn more and more attention. Not ntil recently hae research efforts been made to deise power-efficient broadcast strctres for wireless ad hoc networks. Notice that, a broadcast roting protocol can be interpreted as flood-based broadcasting on a certain sbgraph of the original commnication networks, since any broadcast roting can be iewed as an arborescence (a directed tree) T, rooted at the sorce node of the broadcasting, that spans all nodes. The tree T contains a directed edge if node receied the first copy of the broadcast data from node. Once a broadcast strctre H is constrcted, the broadcast is a simple flooding on top of H: once a node got the broadcast message from any of its logical neighbors, say, for the first time, it will simply forward it to all its logical neighbors (maybe except the node ) either throgh one-to-one or oneto-all commnications. Let f H (p) denote the transmission power of the node p reqired by broadcasting message on top of a broadcast strctre H. We assme that the tree H is a directed graph rooted at the sorce of the broadcasting session: link pq H denotes that node p forwarded message to node q. For any leaf node p of H, clearly we hae f H (p) = 0 since it does not hae to forward the data to any other node. For any internal node p of H, f H (p) = max pq H pq β nder or energy model P if an one-to-all commnication model is sed; and f H (p) = pq H pq β nder or energy model if an one-to-one commnication P model is sed. The total energy reqired by H is p V fh (p). In the literatre, the one-to-all commnication model is typically assmed. Minimm-energy broadcast roting in a simple ad hoc networking enironment has been addressed in [9, 1, 49]. It is known [9] that the minimm-energy broadcast roting problem is NP-hard, i.e., it cannot be soled in polynomial time nless P=NP. Three greedy heristics were proposed in [49] for the minimm-energy broadcast roting problem: EMST (minimm spanning tree), SPT (shortest-path tree), and BIP (broadcasting incremental power). Wan et al. [44, 45] showed that the approximation ratios of EMST and BIP are between 6 and 1 and between 1 and 1 respectiely; on the other hand, the approximation ratio of SPT is at least n, where n is the nmber of nodes. The approximation ratio of EMST is improed to 8 recently by Flammini et al. [1]. Unfortnately, none of the aboe strctres can be formed and pdated sing only linear nmber of messages, nor locally. RNG, which can be constrcted locally, has been sed for broadcasting in wireless ad hoc networks [40]. Howeer, an example was gien in [0] to show that the total energy sed by broadcasting on RNG cold be abot O(n β ) times of the minimm-energy sed by an optimm method. Seeral practical broadcasting protocols [50, 7, 47] are proposed recently, howeer, all of them did not proide their theoretical performance bond on the energy consmption. In fact, Li [0] showed that, no deterministic localized algorithm can find a strctre that approximates the total energy consmption of broadcasting within a constant factor of the optimm. Frthermore, in the worst case, for any broadcast based on a locally constrcted and connected strctre, there is a network configration of n nodes sch that its energy consmption is Θ(n β 1 ) times the optimm. On the other hand, gien any low-weighted strctre H, i.e., ω(h) O(1) ω(emst ), they proed the following lemma Lemma 1. [0] ω β (H) O(n β 1 ) ω β (EMST ), where H is any low-weighted strctre. Here P ω(g) is the total length of the links in G, i.e., ω(g) = G, and ω β(g) P is the total power consmption of links in G, i.e., ω β (G) = G β. Conseqently, lowweighted strctre is asymptotically optimal for broadcasting among any connected strctres bilt in a localized manner. Notice that, the aboe analysis is based on the assmption that eery link is sed dring the broadcast (one-to-one commnication), sch as sing the TDMA scheme. Een considering that the broadcast signal sent by a node can be receied by all nodes in its transmission region simltaneosly (one-to-all commnication), the aboe claim is also correct. The reason is basically as follows. Let B s (H) be the total energy consmed by broadcasting on a strctre H with sender s sing the one-to-all commnication model. Clearly, any flood-based broadcast based on a strctre H P consmes energy at most e i H eβ i if the message receied by an intermediate node is not forwarded to its parent, i.e., the node that jst forwarded P this message to ; and the total energy is at most e i H eβ i if an intermediate node may also forward the message to its parent. On the other hand, P the total energy B s (H) sed by any strctre H is at least e i EMST eβ i /1 [45]. Ths, B s (EMST ) X e i EMST e β i /1 = ω β(emst )/1. Then, if H is a low-weighted X strctre, we hae B s(h) e β i = O(nβ 1 ) ω β (EMST ) e i H 1 O(n β 1 ) B s (EMST ) Recall that B s(emst ) is no more than a constant ( 8) times of the optimm in an one-to-all commnication model [45, 1]. Conseqently, we hae the following lemma.

5 Lemma. The broadcast based on any low-weighted strctre H consmes energy at most O(n β 1 ) times of the optimm in both one-to-one and one-to-all commnication models. And the bond O(n β 1 ) is tight. In smmary, to enable energy efficient broadcasting, the constrcted topology is also preferred to be low-weighted, in addition to the three properties for nicast: 4. Low Weighted: the total link length of final topology is within a constant factor of that of EMST. Recently, seeral localized algorithms [0, ] hae been proposed to constrct low-weighted strctres, which indeed approximate the energy efficiency of EMST as the network density increasing. Howeer, none of them is power efficient for nicast roting. In this paper we will present the first efficient distribted method to constrct a planar, bonded degree spanner that is also low-weighted.. POWER-EFFICIENT UNICAST: SPANNER, PLANAR AND BOUNDED-DEGREE The ltimate goal of this paper is to constrct a nified topology that is power-efficient for both nicast and broadcast, in addition to be planar and hae a constant bonded logical node degree. To achiee this ltimate goal, in this section, we first present a new method that can constrct a power-efficient topology for nicast. We will proe that the constrcted strctre is a power-spanner, planar and has bonded node degree. Frthermore, it has an extra property: any two neighbors of each node are separated by at least a certain angle θ. Hereafter, we call it the Θ-separation property. As we will see later that this property frther redces the interference, especially when adopting directional antennas for transmission. This property also makes the proof mch easier that the strctre constrcted in the next section is also power-efficient for broadcast. One possible way to constrct a degree-bonded planar power spanner is to apply the Yao strctre on Gabriel graph, since GG is already planar and has a power stretch factor exactly 1. In [1], Li et al. showed that the final strctre by directly applying the Yao strctre on GG is a planar power spanner, called Y aogg, bt its in-degree can be as large as O(n), as in the example shown in Figre 1(b). In [4], Song et. al proposed two new methods to bond node degree by applying the ordered Yao strctres on Gabriel graph. The strctre SY aogg in [4] garantees that there is at most one neighbor node in each of the k eqal-sized cones. In this section, we will propose an improed algorithm to frther redce the medim contention by selecting less commnication neighbors and separating neighbors wider. Before we gie the algorithm, we first define a concept called θ-dominating Region. Definition 1. θ-dominating Region: For each neighbor node of a node, the θ-dominating region of is the θ-cone emanated from, with the edge as its axis. Figre illstrates the θ-dominating region of a node in the transmission disk of node. Using the concept of θ-dominating region instead of absolte cone partition in SYaoGG [4], we are able to proe that any two neighbors of each node are garanteed to be separated by at least θ θ Figre : Node s θ-dominating Region with respect to node. an angle θ. The final topology will be called SΘGG. Intitiely, the commnication interference in SΘGG will be smaller than the interference in SY aogg, which is also erified later by simlations as shown in Figre 10(c) and (d). Algorithm 1 SΘGG: Power-Efficient Unicast Topology 1: First, each node self-constrcts the Gabriel graph GG locally. Initially, all nodes mark themseles White, i.e., nprocessed. : Once a White node has the smallest ID among all its White neighbors in N(), it ses the following strategy to select neighbors: 1. Node first sorts all its Black neighbors (if aailable) in N() in the distance-increasing order, then sorts all its White neighbors (if aailable) in N() similarly. The sorted reslts are then restored to N(), by first writing the sorted list of Black neighbors then appending the sorted list of White neighbors.. Node scans the sorted list N() from left to right. In each step, it keeps the crrent pointed neighbor w in the list, while deletes eery conflicted node in the remainder of the list. Here a node is conflicted with w means that node is in the θ- dominating region of node w. Here θ = π/k (k 9) is an adjstable parameter. Node then marks itself Black, i.e. processed, and notifies each deleted neighboring node in N() by a broadcasting message UpdateN. : Once a node receies the message UpdateN from a neighbor in N(), it checks whether itself is in the nodes set for deleting: if so, it deletes the sending node from list N(), otherwise, marks as BLACK in N(). 4: When all nodes are processed, all selected links { N(), GG} form the final network topology, denoted by SΘGG. Each node can shrink its transmission range as long as it sfficiently reaches its farthest neighbor in the final topology. The basic idea of or method is as follows. Since the Gabriel graph is planar and power-spanner, we will remoe some links of GG to bond the nodal degree while not destroying the power-spanner property. The basic approach of bonding the nodal degree is to only keep some shortest link in the θ-dominating region for eery node. We process the nodes in a certain order. A node is marked White if it is nprocessed and is marked Black if it is processed. Originally all nodes are marked White. Initially, a node elects itself to start processing its neighbors if its ID 1 is smaller than all its 1 It is not necessary to se ID here. We can also se some other mechanism to elect a certain node to perform the remaining pro-

6 (a) UDG (b) RNG, GG (c) BP S (d) OrdY aogg (e) SY aogg (f) SΘGG Figre 1: Seeral planar power spanners for UDG shown in (a). Here k = 9 for constrcting SY aogg, SΘGG. nprocessed logical neighbors in the Gabriel graph. Assme that a node is to be processed. We frther assme that there are already some processed logical neighboring nodes, say 1,, t, among its neighbors in GG. It keeps the link to the closest processed neighbor, say 1, in GG, and remoes all links to all neighbors in the θ-dominating region of 1. In other words, the neighbor 1 dominates all other neighbors in its θ-dominating region. It then repeats the aboe procedre ntil no processed logical neighbors in GG are left. Assme that node also has some nprocessed logical neighbors, i.e., marked White. The node then keeps the link to the closest nprocessed neighbor, say w, in GG if there is any, and then remoes the links to all neighbors in the the θ-dominating region of w. It then repeats the aboe procedre ntil no nprocessed neighbors in GG are left. Node then marks itself Black and then informs its logical neighbors in GG abot its change of stats. The algorithm terminates when all nodes are marked processed. The remaining links form the final strctre, called SΘGG. In or new algorithm, a data strctre will be sed: N() is the set of neighbors of each node in the final topology, which is initialized as the set of neighbor nodes in GG. We are now ready to present or Algorithm 1, which constrcts a bonded degree planar power spanner. Notice that the final topology based on Yao graph, sch as SY aogg [4], may ary as the choice of the direction of cones aries. Here, SΘGG does not rely on the absolte cone partition by adopting the new concept of θ-dominating region. Hence, gien the point set V, SΘGG is niqe. In addition, the aerage node degree, interference and transmission range of SΘGG is expected to be smaller than SY aogg too. Frthermore, it is interesting to notice that the theoretical bond on the spanning ratio for SΘGG, that we can proe, is same as SY aogg, as proed later in Theorem 4. Lemma. Graph SΘGG is connected if the nderlying graph GG is connected. Frthermore, gien any two nodes and, there exists a path {, t 1,..., t r, } connecting them sch that all edges hae length less than. Proof. We proe the connectiity by contradiction. Sppose a link is the shortest link in UDG whose connectiity is broken by Algorithm 1. W.l.o.g, assme the link is remoed while processing node, becase of the existence of another node w. As shown in Figre, there are only two cases (ties are broken by ID) that the link can be remoed by node : cedres first. For example, we can se the RTS/CTS mechanism proided in the MAC layer to achiee this: the node that first sccessflly sent a RTS signal within its one-hop neighborhood will be elected. In this paper, we se ID jst for the sake of an easy presentation. w (a) w < w (b) w > Figre : Two cases when is remoed while processing. Case a: w <. Notice that w θ < π/4, hence w <. In other words, both link w and w are smaller than link. Since there are no paths according to the assmption, either the path w or w is broken. That is to say, either the connectiity of w or w is broken. Ths, is not the shortest link whose connectiity is broken, it is a contradiction. Case b: w >. It happens only when node w is processed and node is nprocessed. Similarly, w θ < π/4 < w (otherwise w > π/ iolates the Gabriel graph property), hence w <. Since node w is a processed node and node decides to keep link w, the link w will be kept in SΘGG. According to assmption that and are not connected in SΘGG, w and are not connected either. That is to say, is not the shortest link whose connectiity is broken. It is a contradiction. This finishes the proof of connectiity. Notice that the aboe proof implies that the shortest link in UDG is kept in the final topology. Clearly, the shortest link is in GG. Link cannot be remoed in or algorithm de to the case illstrated by Figre (a). Assme, for the sake of contradiction, that is remoed de to the case (b) where w > and w is processed when processing. Then w < is a contradiction to that is the shortest link in UDG. We then show by indction that, gien any link in UDG, there is a path connecting them sing edges with length at most. Assme is remoed when processing and de to the existence of link w. We bild a path connecting and by concatenating w and w, as shown in Figre. It is not difficlt to see that the longest segment of the path is less than, which occrs in case (b). In this case, the link w mst be kept becase both endpoints are processed, and w <. This finishes the proof. The property that for any link, there is a path connecting them sch that the links on the path hae length at most

7 is crcial for or later proof that or Algorithm bilds a low-weighted bonded degree planar spanner. Theorem 4. The strctre SΘGG has node degree at most k 1 and is planar power spanner with neighbors Θ- separated. Its power stretch factor is at most ρ = where k 9 is an adjstable parameter. β 1 ( sin π k )β, Proof. The proof wold be similar with the proof of SY aogg in [4]. The only difference is that, we sed the concept of dominating cones instead of Yao graph. While the power stretch factor remains the same theoretically, the degree bond is redced from k to k 1. Obiosly, the links in SΘGG are Θ-separated, in other words, the direction of any two neighbors of a node is Θ-separated. Figre 1 (e) and (f) show the difference of SY aogg and SΘGG. Compared with SY aogg, SΘGG is more eenly distribted and has a lower node degree. 4. UNIFIED POWER-EFFICIENT TOPOLOGY: DEGREE-BOUNDED PLANAR SPANNER WITH LOW WEIGHT To the best of or knowledge, so far, no commnication efficient topology control algorithm has achieed all the desirable properties smmarized in Section : degree-bonded, planar, power spanner, low-weighted. Those properties are not only interesting in terms of comptational geometry, bt also hae important applications in wireless ad hoc networks, as shown in section : enable energy efficient nicast and broadcast rotings in same strctre. Recall that, spanner property ensres that an energy efficient path is always kept for any pair of nodes, hence it is a necessary condition to spport energy efficient nicast. While low-weighted strctre is optimal for broadcast among any connected strctres bilt locally. Unfortnately, all the known spanners, inclding Yao [51], GG [1] and the recent deeloped degreebonded planar spanners BP S [46], SY aogg, OrdY aogg [4] and SΘGG, are not low-weighted. As illstrated in Figre 1, all of them will keep at least n 1 links between the two circles, while EMST (in Figre 5(b)) will keep only one link between them. Hence the weight of any of them is at least O(n) w(emst ). It is worth to clarify that, in this section, we are interested in finding a sbgraph to enable efficient broadcast rotings, een based on the simple-flooding method. We do not aim to sbstitte the known broadcasting protocols. In fact, the methods sed in those broadcasting protocols [50, 7] can be applied on the low-weighted strctres to consere more energy. The main contribtion of low-weighted strctre is that it bonds the worst case performance for broadcasting. Seeral known localized algorithms are gien in [0, ] to generate low-weighted graphs. In their algorithms, gien a certain strctre G, for any two links and xy of a graph G, they remoe xy if xy is the longest link among qadrilateral xy. They proed that the final strctres are low-weighted if G is RNG [0] or LMST []. Obiosly, they are not spanners. In fact, their techniqes can not be applied on spanner graph to bond the weight withot losing its spanner property. Figre 4 illstrates an example by applying their algorithms to SΘGG. The node ID of i is i, 1 4 < θ and 1 > 4 > max( 1, 4 ). While constrcting SΘGG, first node θ ε 1 Figre 4: The graph cold be disconnected if applying the preios method to bild low-weighted strctre on SΘGG. 1 selects 1 and 1 as its incident logical links and node selects 1 and 4, then node selects 1 and deletes 4. Hence 4 / SΘGG. If applying the rle described in [0, ], the link 1 will also be deleted becase 1 > max( 1, 4, 4 ). Then the graph will be disconnected. Then we can conclde that simple extension of methods in [] on top of SΘGG does not een garantee the connectiity, nor to say power-spanner property. Indeed, the spanner property and low-weight property are not easy to be achieed at same time. Intitiely, the spanner property reqires to keep more links, while the lowweight property reqires to keep less links from original graph. In the following, we will describe a noel algorithm to bild a low-weighted strctre from SΘGG, while keeping enogh links to garantee the power efficiency. Figre 5 illstrates the difference of LSΘGG from SΘGG and LMST. 4 (a) SΘGG (b) LMST (c) LSΘGG Figre 5: Three different strctres. Algorithm presents or new method that constrcts a bonded degree planar power-spanner that is also lowweighted. Althogh or algorithm prodces only powerspanner here, it can be extended to prodce also the lengthspanner if it is needed. To get a length-spanner, we constrct the strctre LDel (defined in [7]) instead of the Gabriel graph sed in or algorithm. It was proed in [7] that LDel is a planar, length-spanner, and can be constrcted sing only O(n) messages. The basic idea of or new method is as follows. Since the graph SΘGG is already planar, power-spanner, and has bonded-degree, we will remoe some of its edges to garantee that the reslting topology is low-weighted while not destroying the power-spanner property. Notice that remoing edges will not break the planar property and the bonded-degree property. In all preios methods presented in the literatre, a node x decides to remoe or keep links that are incident on x, i.e., it only cares abot the incident edges. While, in the method presented here, a node x will decide whether to keep or remoe links for not only incident links, bt also the links that are incident on one of its neighbors. To garantee a lowweight property the methods presented in [0, ] remoe

8 1 n 1 n 1 n 1 n 1 n 1 n (a) original graph SΘGG (b) graph reslted sing method in [0] (c) graph based on or method Figre 6: A seqence of links are recrsiely remoed. Here solid and dashed links represent the links from the original graph and the dashed links represent the links that are remoed by a topology control algorithm, while solid links represent the final strctre constrcted by a certain method. Here we assme that i i = R and the ID of link i i is less than the ID of link i+1 i+1. some links from a certain strctre sch that the remaining links satisfy the isolation property: for each remaining link xy, the disk centered at the midpoint of xy sing a radis proportional to xy does not intersect with any other remaining links. They achieed this property by remoing a link xy if there is another link sch that xy is the longest link in the qadrilateral yx. Howeer, this simple heristic cannot garantee the spanner property. Consider a link xy in some shortest path from s to t. See Figre 7 for an illstration. Link xy will be remoed de to the existence of link. Link cold also later be remoed de to the existence of another link 1 1, which cold also be remoed de to the existence of another link, and so on. See Figre 6 (b) for an illstration of the sitation where a seqence of links will be remoed: all links i i, for i will be remoed. Conseqently, the shortest path connecting nodes n and n cold be arbitrarily long in the reslting graph. Ths, instead of blindly remoing all sch links xy wheneer it is the longest link in a qadrilateral yx, we will keep sch a link when some links in its certain neighborhood hae been remoed. To do so, among all links from a graph, sch as SΘGG, that is planar, bonded-degree, power-spanner, we implicitly define an independent set of links. A link is in this independent set, which will be kept at last, if it has the smallest ID among nselected links from its neighborhood. Specifically, we implicitly define a irtal graph G oer all links in SΘGG: the ertex set of G is the set of all links in SΘGG and two links xy and of SΘGG are connected in G if one end-point of is in the transmission range of one end-point of link xy (they will interfere with each other if transmit simltaneosly). For example, the links 1 1 and are not independent in network topology illstrated by Figre 6 (a); while the links 1 1 and n n are independent. Notice that links 1 1 and 1 are independent since they do not form a for ertices conex hll. Notice that in or method presented later, we did not explicitly define sch graph G, nor compte the maximal independent set of sch graph G explicitly. We will proe that the selected independent set of links in SΘGG indeed is low-weighted and still preseres the power-spanner property, althogh with a larger power spanning ratio. Or method will keep link 1 1 since it has the smallest ID among all links that are not independent. When link 1 1 is kept, all links that are not independent (here are and ) will be remoed. Then link 4 4 will be kept. The aboe procedre will be repeated ntil all links are processed. The final strctre reslted from or method is illstrated by Figre 6 (c). Obiosly, the constrction is consistent for two endpoints of each edge: if an edge is kept by node, then it is also kept by node. The ID of a link is defined as following: ID() = {, min(id(), ID()), max(id(), ID())}. As we will see later that the nmber in criterion of Algorithm is careflly selected. xy > max(, x, y ) Algorithm Constrct LSΘGG: Planar Spanner with Bonded Degree and Low Weight 1: All nodes together constrct the graph SΘGG in a localized manner, as described in Algorithm 1. Then, each node marks its incident edges in SΘGG nprocessed. : Each node locally broadcasts its incident edges in SΘGG to its one-hop neighbors and listens to its neighbors. Then, each node x can learn the existence of the set of -hop links E (x), which is defined as follows: E (x) = { SΘGG or N UDG(x)}. In other words, E (x) represents the set of edges in SΘGG with at least one endpoint in the transmission range of node x. : Once a node x learns that its nprocessed incident edge xy has the smallest ID among all nprocessed links in E (x), it will delete edge xy if there exists an edge E (x) (here both and are different from x and y), sch that xy > max(, x, y ); otherwise it simply marks edge xy processed. Here assme that yx is the conex hll of,, x and y. Then the link stats is broadcasted to all neighbors throgh a message UpdateStats(xy). 4: Once a node receies a message UpdateStats(xy), it records the stats of link xy at E (). 5: Each node repeats the aboe two steps ntil all edges hae been processed. Let LSΘGG be the final strctre formed by all remaining edges in SΘGG. Theorem 5. The strctre LSΘGG is a degree-bonded planar spanner. It has a power spanning ratio ρ + 1, where ρ is the power spanning ratio of SΘGG. The node degree is bonded by k 1 where k 9 is a cstomizable parameter in SΘGG. Proof. The degree-bonded and planar properties are obiosly deried from the SΘGG graph, since we do not add any links in Algorithm. To proe the spanner property,

9 we only need to show that the two endpoints of any deleted link xy SΘGG are still connected in LSΘGG with a constant spanning ratio path. We will proe it by indction on the length of deleted links from SΘGG. x Figre 7: The path between x and y is at most (ρ + 1) xy in LSΘGG if xy SΘGG. Assme xy is the shortest link of SΘGG which is deleted by Algorithm becase of the existence of link with smaller length. Obiosly, path x y can be constrcted throgh the concatenation of path x, link and path y, as shown in Figre 7. Since xy > max( x, y ) and link xy is the shortest among deleted links in Algorithm, we hae p(x ) < ρ x β and p( y) < ρ y β. Hence, p(x y) < β + ρ x β + ρ y β < (ρ + 1) xy β. Sppose all the i-th (i t 1) deleted shortest links of SΘGG hae a path connecting their endpoints with spanning ratio ρ + 1. For the t-th deleted shortest link xy SΘGG, according to Algorithm, it mst hae been deleted becase of the existence of a link : sch that xy > max(, x, y ) in a conex hll yx. Now, we hae p(x ) < (ρ + 1) x β and p( y) < (ρ + 1) y β. Ths, p(x y) = β + p( x) + p( y) < β + (ρ + 1) x β + (ρ + 1) y β < xy β + (ρ + 1)( xy /) β + (ρ + 1)( xy /) β (ρ + 1) xy β Ths, LSΘGG has a power spanning ratio ρ + 1. We then show that graph LSΘGG is low-weighted. To stdy the total weight of this strctre, inspired by the method proposed in [0], we will show that the edges in LSΘGG satisfy the isolation property [10]. Theorem 6. The strctre LSΘGG is low-weighted. See the appendix for the proof. We contine to analyze the commnication cost of Algorithm 1 and. First, clearly, bilding GG in Algorithm 1 can be done sing only n messages: each message contains the ID and geometry position of a node. Second, to bild SΘGG, initially, the nmber of edges, say p, in Gabriel Graph is p [n, n 6] since it is a planar graph. Remember that we will remoe some edges from GG to bond the logical node degree. Clearly, there are at most n sch remoed edges since we keep at least n 1 edges from the connectiity of the final strctre. Ths the total nmber of messages, say q, sed to inform the deleted edges from GG is at most q [0, n]. Notice that p q is the edges left in the final strctre, which is at least n 1 and at most n 6. Thirdly, in the marking process described in Algorithm, the commnication cost of broadcasting its incident edges (or its neighbors) and pdating link stats are both (p q). Therefore the total y commnication cost is n + 4p q [5n, 1n]. Then the following theorem directly follows. Theorem 7. Assming that both the ID and the geometry position can be represented by log n bits each, the total nmber of messages dring constrcting the strctre LSΘGG is in the range of [5n, 1n], where each message has at most O(log n) bits. Compared with preios known low-weighted strctres [0, ], LSΘGG not only achiees more desirable properties, bt also costs mch less messages dring constrction. To constrct LSΘGG, we only need to collect the information E (x) which costs at most 6n messages. Or algorithm can be generally applied to any known degree-bonded planar spanner to make it low-weighted while keeping all its preios properties, except increasing the spanning ratio from ρ to ρ + 1 theoretically. 5. EXPECTED INTERFERENCE IN RANDOM NETWORKS This section is deoted to stdy the aerage physical node degree of or strctre when the wireless nodes are distribted according to a certain distribtion. For aerage performance analysis, we consider a set of wireless nodes distribted in a two-dimensional nit sqare region. The nodes are distribted according to either the niform random point process or homogeneos Poisson process. A point set process is said to be a niform random point process, denoted by X n, in a region Ω if it consists of n independent points each of which is niformly and randomly distribted oer Ω. The standard probabilistic model of homogeneos Poisson process is characterized by the property that the nmber of nodes in a region is a random ariable depending only on the area (or olme in higher dimensions) of the region. In other words, The probability that there are exactly k nodes appearing in any region Ψ of area A is (λa)k k! e λa. For any region Ψ, the conditional distribtion of nodes in Ψ gien that exactly k nodes in the region is joint niform. Definition. Gien a strctre H, the adjsted transmission range r H() is defined as max H, i.e., the longest edge of H incident on. The physical node degree of in H is defined as the nmber of nodes inside the disk disk(, r H ()). The node interference, denoted by I H (), of a node in a strctre H is simply the physical node degree of. The maximm node interference of a strctre H is defined as max I H (). The aerage node interference of a strctre H is defined as P I H()/n. Theorem 8. For a set of nodes prodced by a Poisson point process with density n, the expected maximm node interference of any connected strctre, e.g., EMST, GG, RNG, Yao and LSΘGG, is at least Θ(log n). Proof. Let d n (H) be the longest edge of a strctre H of n points placed independently in -dimensions according to standard poisson distribtion with density n. Obiosly, d n (EMST ) is the smallest among all connected strctres H. For simplicity, let d n = d n (EMST ). In [7], they showed that lim n Pr(nπd n log n α) = e e α.

Chapter 7 TOPOLOGY CONTROL

Chapter 7 TOPOLOGY CONTROL Chapter TOPOLOGY CONTROL Oeriew Topology Control Gabriel Graph et al. XTC Interference SINR & Schedling Complexity Distribted Compting Grop Mobile Compting Winter 00 / 00 Distribted Compting Grop MOBILE

More information

Localized Delaunay Triangulation with Application in Ad Hoc Wireless Networks

Localized Delaunay Triangulation with Application in Ad Hoc Wireless Networks 1 Localized Delanay Trianglation with Application in Ad Hoc Wireless Networks Xiang-Yang Li Gria Călinesc Peng-Jn Wan Y Wang Department of Compter Science, Illinois Institte of Technology, Chicago, IL

More information

Maximal Cliques in Unit Disk Graphs: Polynomial Approximation

Maximal Cliques in Unit Disk Graphs: Polynomial Approximation Maximal Cliqes in Unit Disk Graphs: Polynomial Approximation Rajarshi Gpta, Jean Walrand, Oliier Goldschmidt 2 Department of Electrical Engineering and Compter Science Uniersity of California, Berkeley,

More information

Mobility Control and Its Applications in Mobile Ad Hoc Networks

Mobility Control and Its Applications in Mobile Ad Hoc Networks Mobility Control and Its Applications in Mobile Ad Hoc Netorks Jie W and Fei Dai Department of Compter Science and Engineering Florida Atlantic Uniersity Boca Raton, FL 3331 Abstract Most existing localized

More information

On Plane Constrained Bounded-Degree Spanners

On Plane Constrained Bounded-Degree Spanners On Plane Constrained Bonded-Degree Spanners Prosenjit Bose 1, Rolf Fagerberg 2, André an Renssen 1, Sander Verdonschot 1 1 School of Compter Science, Carleton Uniersity, Ottaa, Canada. Email: jit@scs.carleton.ca,

More information

On Plane Constrained Bounded-Degree Spanners

On Plane Constrained Bounded-Degree Spanners Algorithmica manscript No. (ill be inserted by the editor) 1 On Plane Constrained Bonded-Degree Spanners 2 3 Prosenjit Bose Rolf Fagerberg André an Renssen Sander Verdonschot 4 5 Receied: date / Accepted:

More information

Planarity-Preserving Clustering and Embedding for Large Planar Graphs

Planarity-Preserving Clustering and Embedding for Large Planar Graphs Planarity-Presering Clstering and Embedding for Large Planar Graphs Christian A. Dncan, Michael T. Goodrich, and Stephen G. Koboro Center for Geometric Compting The Johns Hopkins Uniersity Baltimore, MD

More information

On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing

On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing 1 On the Comptational Complexity and Effectiveness of N-hb Shortest-Path Roting Reven Cohen Gabi Nakibli Dept. of Compter Sciences Technion Israel Abstract In this paper we stdy the comptational complexity

More information

The Disciplined Flood Protocol in Sensor Networks

The Disciplined Flood Protocol in Sensor Networks The Disciplined Flood Protocol in Sensor Networks Yong-ri Choi and Mohamed G. Goda Department of Compter Sciences The University of Texas at Astin, U.S.A. fyrchoi, godag@cs.texas.ed Hssein M. Abdel-Wahab

More information

Pushing squares around

Pushing squares around Pshing sqares arond Adrian Dmitresc János Pach Ý Abstract We stdy dynamic self-reconfigration of modlar metamorphic systems. We garantee the feasibility of motion planning in a rectanglar model consisting

More information

v e v 1 C 2 b) Completely assigned T v a) Partially assigned Tv e T v 2 p k

v e v 1 C 2 b) Completely assigned T v a) Partially assigned Tv e T v 2 p k Approximation Algorithms for a Capacitated Network Design Problem R. Hassin 1? and R. Rai 2?? and F. S. Salman 3??? 1 Department of Statistics and Operations Research, Tel-Ai Uniersity, Tel Ai 69978, Israel.

More information

Mobility Control and Its Applications in Mobile Ad Hoc Networks

Mobility Control and Its Applications in Mobile Ad Hoc Networks Mobility Control and Its Applications in Mobile Ad Hoc Netorks Jie W and Fei Dai, Florida Atlantic Uniersity Abstract Most eisting localized protocols in mobile ad hoc netorks, sch as data commnication

More information

Visibility-Graph-based Shortest-Path Geographic Routing in Sensor Networks

Visibility-Graph-based Shortest-Path Geographic Routing in Sensor Networks Athor manscript, pblished in "INFOCOM 2009 (2009)" Visibility-Graph-based Shortest-Path Geographic Roting in Sensor Networks Gang Tan Marin Bertier Anne-Marie Kermarrec INRIA/IRISA, Rennes, France. Email:

More information

Localized Algorithms for Energy Efficient Topology in Wireless Ad Hoc Networks

Localized Algorithms for Energy Efficient Topology in Wireless Ad Hoc Networks Localized Algorithms for Energy Efficient Topology in Wireless Ad Hoc Networks Wen-Zhan Song Yu Wang Xiang-Yang Li Ophir Frieder Abstract. Topology control in wireless ad hoc networks is to select a subgraph

More information

An Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast

An Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering May 24 An Adaptive Strategy for Maximizing Throghpt in MAC layer Wireless Mlticast Prasanna

More information

Constrained Routing Between Non-Visible Vertices

Constrained Routing Between Non-Visible Vertices Constrained Roting Between Non-Visible Vertices Prosenjit Bose 1, Matias Korman 2, André van Renssen 3,4, and Sander Verdonschot 1 1 School of Compter Science, Carleton University, Ottawa, Canada. jit@scs.carleton.ca,

More information

Faster Random Walks By Rewiring Online Social Networks On-The-Fly

Faster Random Walks By Rewiring Online Social Networks On-The-Fly 1 Faster Random Walks By Rewiring Online ocial Networks On-The-Fly Zhojie Zho 1, Nan Zhang 2, Zhigo Gong 3, Gatam Das 4 1,2 Compter cience Department, George Washington Uniersity 1 rexzho@gw.ed 2 nzhang10@gw.ed

More information

On shortest-path all-optical networks without wavelength conversion requirements

On shortest-path all-optical networks without wavelength conversion requirements Research Collection Working Paper On shortest-path all-optical networks withot waelength conersion reqirements Athor(s): Erlebach, Thomas; Stefanakos, Stamatis Pblication Date: 2002 Permanent Link: https://doi.org/10.3929/ethz-a-004446054

More information

Chapter 5. Plane Graphs and the DCEL

Chapter 5. Plane Graphs and the DCEL Chapter 5 Plane Graphs and the DCEL So far we hae been talking abot geometric strctres sch as trianglations of polygons and arrangements of line segments withot paying mch attention to how to represent

More information

Reconstructing Generalized Staircase Polygons with Uniform Step Length

Reconstructing Generalized Staircase Polygons with Uniform Step Length Jornal of Graph Algorithms and Applications http://jgaa.info/ ol. 22, no. 3, pp. 431 459 (2018) DOI: 10.7155/jgaa.00466 Reconstrcting Generalized Staircase Polygons with Uniform Step Length Nodari Sitchinaa

More information

Faster Random Walks By Rewiring Online Social Networks On-The-Fly

Faster Random Walks By Rewiring Online Social Networks On-The-Fly Faster Random Walks By Rewiring Online ocial Networks On-The-Fly Zhojie Zho 1, Nan Zhang 2, Zhigo Gong 3, Gatam Das 4 1,2 Compter cience Department, George Washington Uniersity 1 rexzho@gw.ed 2 nzhang10@gw.ed

More information

Lemma 1 Let the components of, Suppose. Trees. A tree is a graph which is. (a) Connected and. (b) has no cycles (acyclic). (b)

Lemma 1 Let the components of, Suppose. Trees. A tree is a graph which is. (a) Connected and. (b) has no cycles (acyclic). (b) Trees Lemma Let the components of ppose "! be (a) $&%('*)+ - )+ / A tree is a graph which is (b) 0 %(')+ - 3)+ / 6 (a) (a) Connected and (b) has no cycles (acyclic) (b) roof Eery path 8 in which is not

More information

[1] Hopcroft, J., D. Joseph and S. Whitesides, Movement problems for twodimensional

[1] Hopcroft, J., D. Joseph and S. Whitesides, Movement problems for twodimensional Acknoledgement. The athors thank Bill Lenhart for interesting discssions on the recongration of rlers. References [1] Hopcroft, J., D. Joseph and S. Whitesides, Moement problems for todimensional linkages,

More information

Evaluating Influence Diagrams

Evaluating Influence Diagrams Evalating Inflence Diagrams Where we ve been and where we re going Mark Crowley Department of Compter Science University of British Colmbia crowley@cs.bc.ca Agst 31, 2004 Abstract In this paper we will

More information

Vertex Guarding in Weak Visibility Polygons

Vertex Guarding in Weak Visibility Polygons Vertex Garding in Weak Visibility Polygons Pritam Bhattacharya, Sbir Kmar Ghosh*, Bodhayan Roy School of Technology and Compter Science Tata Institte of Fndamental Research Mmbai 400005, India arxi:1409.46212

More information

On Bichromatic Triangle Game

On Bichromatic Triangle Game On Bichromatic Triangle Game Gordana Manić Daniel M. Martin Miloš Stojakoić Agst 16, 2012 Abstract We stdy a combinatorial game called Bichromatic Triangle Game, defined as follows. Two players R and B

More information

Friend of My Friend: Network Formation with Two-Hop Benefit

Friend of My Friend: Network Formation with Two-Hop Benefit Friend of My Friend: Network Formation with Two-Hop Benefit Elliot Ansheleich, Onkar Bhardwaj, and Michael Usher Rensselaer Polytechnic Institte, Troy NY, USA Abstract. How and why people form ties is

More information

Improving Network Connectivity Using Trusted Nodes and Edges

Improving Network Connectivity Using Trusted Nodes and Edges Improing Network Connectiity Using Trsted Nodes and Edges Waseem Abbas, Aron Laszka, Yegeniy Vorobeychik, and Xenofon Kotsokos Abstract Network connectiity is a primary attribte and a characteristic phenomenon

More information

Chapter 5 Network Layer

Chapter 5 Network Layer Chapter Network Layer Network layer Physical layer: moe bit seqence between two adjacent nodes Data link: reliable transmission between two adjacent nodes Network: gides packets from the sorce to destination,

More information

A sufficient condition for spiral cone beam long object imaging via backprojection

A sufficient condition for spiral cone beam long object imaging via backprojection A sfficient condition for spiral cone beam long object imaging via backprojection K. C. Tam Siemens Corporate Research, Inc., Princeton, NJ, USA Abstract The response of a point object in cone beam spiral

More information

Rectangle-of-influence triangulations

Rectangle-of-influence triangulations CCCG 2016, Vancoer, British Colmbia, Ag 3 5, 2016 Rectangle-of-inflence trianglations Therese Biedl Anna Lbi Saeed Mehrabi Sander Verdonschot 1 Backgrond The concept of rectangle-of-inflence (RI) draings

More information

Towards applications based on measuring the orbital angular momentum of light

Towards applications based on measuring the orbital angular momentum of light CHAPTER 8 Towards applications based on measring the orbital anglar momentm of light Efficient measrement of the orbital anglar momentm (OAM) of light has been a longstanding problem in both classical

More information

COMPOSITION OF STABLE SET POLYHEDRA

COMPOSITION OF STABLE SET POLYHEDRA COMPOSITION OF STABLE SET POLYHEDRA Benjamin McClosky and Illya V. Hicks Department of Comptational and Applied Mathematics Rice University November 30, 2007 Abstract Barahona and Mahjob fond a defining

More information

ABSOLUTE DEFORMATION PROFILE MEASUREMENT IN TUNNELS USING RELATIVE CONVERGENCE MEASUREMENTS

ABSOLUTE DEFORMATION PROFILE MEASUREMENT IN TUNNELS USING RELATIVE CONVERGENCE MEASUREMENTS Proceedings th FIG Symposim on Deformation Measrements Santorini Greece 00. ABSOUTE DEFORMATION PROFIE MEASUREMENT IN TUNNES USING REATIVE CONVERGENCE MEASUREMENTS Mahdi Moosai and Saeid Khazaei Mining

More information

Real-Time Robot Path Planning via a Distance-Propagating Dynamic System with Obstacle Clearance

Real-Time Robot Path Planning via a Distance-Propagating Dynamic System with Obstacle Clearance POSTPRINT OF: IEEE TRANS. SYST., MAN, CYBERN., B, 383), 28, 884 893. 1 Real-Time Robot Path Planning ia a Distance-Propagating Dynamic System with Obstacle Clearance Allan R. Willms, Simon X. Yang Member,

More information

Cautionary Aspects of Cross Layer Design: Context, Architecture and Interactions

Cautionary Aspects of Cross Layer Design: Context, Architecture and Interactions Cationary Aspects of Cross Layer Design: Context, Architectre and Interactions Vikas Kawadia and P. R. Kmar Dept. of Electrical and Compter Engineering, and Coordinated Science Lab University of Illinois,

More information

Today. B-splines. B-splines. B-splines. Computergrafik. Curves NURBS Surfaces. Bilinear patch Bicubic Bézier patch Advanced surface modeling

Today. B-splines. B-splines. B-splines. Computergrafik. Curves NURBS Surfaces. Bilinear patch Bicubic Bézier patch Advanced surface modeling Comptergrafik Matthias Zwicker Uniersität Bern Herbst 29 Cres Srfaces Parametric srfaces Bicbic Bézier patch Adanced srface modeling Piecewise Bézier cres Each segment spans for control points Each segment

More information

An Extended Fault-Tolerant Link-State Routing Protocol in the Internet

An Extended Fault-Tolerant Link-State Routing Protocol in the Internet An Extended Falt-Tolerant Link-State Roting Protocol in the Internet Jie W, Xiaola Lin, Jiannong Cao z, and Weijia Jia x Department of Compter Science and Engineering Florida Atlantic Uniersit Boca Raton,

More information

Image Restoration Image Degradation and Restoration

Image Restoration Image Degradation and Restoration Image Degradation and Restoration hxy Image Degradation Model: Spatial domain representation can be modeled by: g x y h x y f x y x y Freqency domain representation can be modeled by: G F N Prepared By:

More information

Design and Optimization of Multi-Faceted Reflectarrays for Satellite Applications

Design and Optimization of Multi-Faceted Reflectarrays for Satellite Applications Design and Optimization of Mlti-Faceted Reflectarrays for Satellite Applications Min Zho, Stig B. Sørensen, Peter Meincke, and Erik Jørgensen TICRA, Copenhagen, Denmark ticra@ticra.com Abstract The design

More information

Localized Algorithms for Energy Efficient Topology in Wireless Ad Hoc Networks

Localized Algorithms for Energy Efficient Topology in Wireless Ad Hoc Networks Localized Algorithms for Energy Efficient Topology in Wireless Ad Hoc Networks Wen-Zhan Song Yu Wang Xiang-Yang Li Ophir Frieder ABSTRACT We propose several novel localized algorithms to construct energy

More information

Efficient Scheduling for Periodic Aggregation Queries in Multihop Sensor Networks

Efficient Scheduling for Periodic Aggregation Queries in Multihop Sensor Networks 1 Efficient Schedling for Periodic Aggregation Qeries in Mltihop Sensor Networks XiaoHa X, Shaojie Tang, Member, IEEE, XiangYang Li, Senior Member, IEEE Abstract In this work, we stdy periodic qery schedling

More information

Assigning AS Relationships to Satisfy the Gao-Rexford Conditions

Assigning AS Relationships to Satisfy the Gao-Rexford Conditions Assigning AS Relationships to Satisfy the Gao-Rexford Conditions Lca Cittadini, Giseppe Di Battista, Thomas Erlebach, Marizio Patrignani, and Massimo Rimondini Dept. of Compter Science and Atomation, Roma

More information

Adaptive Influence Maximization in Microblog under the Competitive Independent Cascade Model

Adaptive Influence Maximization in Microblog under the Competitive Independent Cascade Model International Jornal of Knowledge Engineering, Vol. 1, No. 2, September 215 Adaptie Inflence Maximization in Microblog nder the Competitie Independent Cascade Model Zheng Ding, Kai Ni, and Zhiqiang He

More information

A Hybrid Weight-Based Clustering Algorithm for Wireless Sensor Networks

A Hybrid Weight-Based Clustering Algorithm for Wireless Sensor Networks Open Access Library Jornal A Hybrid Weight-Based Clstering Algorithm for Wireless Sensor Networks Cheikh Sidy Mohamed Cisse, Cheikh Sarr * Faclty of Science and Technology, University of Thies, Thies,

More information

Multiple Source Shortest Paths in a Genus g Graph

Multiple Source Shortest Paths in a Genus g Graph Mltiple Sorce Shortest Paths in a Gens g Graph Sergio Cabello Erin W. Chambers Abstract We gie an O(g n log n) algorithm to represent the shortest path tree from all the ertices on a single specified face

More information

(2, 4) Tree Example (2, 4) Tree: Insertion

(2, 4) Tree Example (2, 4) Tree: Insertion Presentation for se with the textbook, Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015 B-Trees and External Memory (2, 4) Trees Each internal node has 2 to 4 children:

More information

Fault Tolerance in Hypercubes

Fault Tolerance in Hypercubes Falt Tolerance in Hypercbes Shobana Balakrishnan, Füsn Özgüner, and Baback A. Izadi Department of Electrical Engineering, The Ohio State University, Colmbs, OH 40, USA Abstract: This paper describes different

More information

circuit simulation NP-complete? backward retiming forward retiming f(x)

circuit simulation NP-complete? backward retiming forward retiming f(x) Optimal FPGA Mapping and Retiming with Ecient Initial State Comptation Jason Cong and Chang W Department of Compter Science Uniersity of California, Los Angeles, CA 995 Abstract For seqential circits with

More information

This chapter is based on the following sources, which are all recommended reading:

This chapter is based on the following sources, which are all recommended reading: Bioinformatics I, WS 09-10, D. Hson, December 7, 2009 105 6 Fast String Matching This chapter is based on the following sorces, which are all recommended reading: 1. An earlier version of this chapter

More information

NETWORK PRESERVATION THROUGH A TOPOLOGY CONTROL ALGORITHM FOR WIRELESS MESH NETWORKS

NETWORK PRESERVATION THROUGH A TOPOLOGY CONTROL ALGORITHM FOR WIRELESS MESH NETWORKS ETWORK PRESERVATIO THROUGH A TOPOLOGY COTROL ALGORITHM FOR WIRELESS MESH ETWORKS F. O. Aron, T. O. Olwal, A. Krien, Y. Hamam Tshwane University of Technology, Pretoria, Soth Africa. Dept of the French

More information

Select-and-Protest-based Beaconless Georouting with Guaranteed Delivery in Wireless Sensor Networks

Select-and-Protest-based Beaconless Georouting with Guaranteed Delivery in Wireless Sensor Networks Select-and-Protest-based Beaconless Georoting ith Garanteed Deliery in Wireless Sensor Netorks Hanna Kalosha, Amiya Nayak, Stefan Rührp, Ian Stojmenoić School of Information Technology and Engineering

More information

Constraint-Driven Communication Synthesis

Constraint-Driven Communication Synthesis Constraint-Drien Commnication Synthesis Alessandro Pinto Goqiang Wang Lca P. Carloni Abstract Constraint-drien Commnication Synthesis enables the atomatic design of the commnication architectre of a complex

More information

Digital Image Processing Chapter 5: Image Restoration

Digital Image Processing Chapter 5: Image Restoration Digital Image Processing Chapter 5: Image Restoration Concept of Image Restoration Image restoration is to restore a degraded image back to the original image while image enhancement is to maniplate the

More information

Augmenting the edge connectivity of planar straight line graphs to three

Augmenting the edge connectivity of planar straight line graphs to three Agmenting the edge connectivity of planar straight line graphs to three Marwan Al-Jbeh Mashhood Ishaqe Kristóf Rédei Diane L. Sovaine Csaba D. Tóth Pavel Valtr Abstract We characterize the planar straight

More information

h-vectors of PS ear-decomposable graphs

h-vectors of PS ear-decomposable graphs h-vectors of PS ear-decomposable graphs Nima Imani 2, Lee Johnson 1, Mckenzie Keeling-Garcia 1, Steven Klee 1 and Casey Pinckney 1 1 Seattle University Department of Mathematics, 901 12th Avene, Seattle,

More information

arxiv: v1 [cs.cg] 27 Nov 2015

arxiv: v1 [cs.cg] 27 Nov 2015 On Visibility Representations of Non-planar Graphs Therese Biedl 1, Giseppe Liotta 2, Fabrizio Montecchiani 2 David R. Cheriton School of Compter Science, University of Waterloo, Canada biedl@waterloo.ca

More information

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY On the Analysis of the Bluetooth Time Division Duplex Mechanism

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY On the Analysis of the Bluetooth Time Division Duplex Mechanism IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY 2007 1 On the Analysis of the Bletooth Time Division Dplex Mechanism Gil Zssman Member, IEEE, Adrian Segall Fellow, IEEE, and Uri Yechiali

More information

3D SURFACE RECONSTRUCTION BASED ON COMBINED ANALYSIS OF REFLECTANCE AND POLARISATION PROPERTIES: A LOCAL APPROACH

3D SURFACE RECONSTRUCTION BASED ON COMBINED ANALYSIS OF REFLECTANCE AND POLARISATION PROPERTIES: A LOCAL APPROACH 3D SURFACE RECONSTRUCTION BASED ON COMBINED ANALYSIS OF REFLECTANCE AND POLARISATION PROPERTIES: A LOCAL APPROACH Pablo d Angelo and Christian Wöhler DaimlerChrysler Research and Technology, Machine Perception

More information

Point Location. The Slab Method. Optimal Schemes. The Slab Method. Preprocess a planar, polygonal subdivision for point location queries.

Point Location. The Slab Method. Optimal Schemes. The Slab Method. Preprocess a planar, polygonal subdivision for point location queries. Point Location The Slab Method Prerocess a lanar, olygonal sbdiision for oint location qeries. = (18, 11) raw a ertical line throgh each ertex. This decomoses the lane into slabs. In each slab, the ertical

More information

REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS. M. Meulpolder, D.H.J. Epema, H.J. Sips

REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS. M. Meulpolder, D.H.J. Epema, H.J. Sips REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS M. Melpolder, D.H.J. Epema, H.J. Sips Parallel and Distribted Systems Grop Department of Compter Science, Delft University of Technology, the Netherlands

More information

Alliances and Bisection Width for Planar Graphs

Alliances and Bisection Width for Planar Graphs Alliances and Bisection Width for Planar Graphs Martin Olsen 1 and Morten Revsbæk 1 AU Herning Aarhs University, Denmark. martino@hih.a.dk MADAGO, Department of Compter Science Aarhs University, Denmark.

More information

arxiv: v1 [cs.cg] 31 Aug 2017

arxiv: v1 [cs.cg] 31 Aug 2017 Lombardi Drawings of Knots and Links Philipp Kindermann 1, Stephen Koboro 2, Maarten Löffler 3, Martin Nöllenbrg 4, André Schlz 1, and Birgit Vogtenhber 5 arxi:1708.098191 [cs.cg] 31 Ag 2017 1 FernUniersität

More information

Localized Topology Control for Heterogeneous Wireless Sensor Networks

Localized Topology Control for Heterogeneous Wireless Sensor Networks Localized Topology Control for Heterogeneous Wireless Sensor Networks Xiang-Yang Li Wen-Zhan Song Yu Wang 2 The paper studies topology control in heterogeneous wireless sensor networks, where different

More information

Object Pose from a Single Image

Object Pose from a Single Image Object Pose from a Single Image How Do We See Objects in Depth? Stereo Use differences between images in or left and right eye How mch is this difference for a car at 00 m? Moe or head sideways Or, the

More information

Representing a Cubic Graph as the Intersection Graph of Axis-parallel Boxes in Three Dimensions

Representing a Cubic Graph as the Intersection Graph of Axis-parallel Boxes in Three Dimensions Representing a Cbic Graph as the Intersection Graph of Axis-parallel Boxes in Three Dimensions ABSTRACT Abhijin Adiga Network Dynamics and Simlation Science Laboratory Virginia Bioinformatics Institte,

More information

Bias of Higher Order Predictive Interpolation for Sub-pixel Registration

Bias of Higher Order Predictive Interpolation for Sub-pixel Registration Bias of Higher Order Predictive Interpolation for Sb-pixel Registration Donald G Bailey Institte of Information Sciences and Technology Massey University Palmerston North, New Zealand D.G.Bailey@massey.ac.nz

More information

Tdb: A Source-level Debugger for Dynamically Translated Programs

Tdb: A Source-level Debugger for Dynamically Translated Programs Tdb: A Sorce-level Debgger for Dynamically Translated Programs Naveen Kmar, Brce R. Childers, and Mary Lo Soffa Department of Compter Science University of Pittsbrgh Pittsbrgh, Pennsylvania 15260 {naveen,

More information

Complete Information Pursuit Evasion in Polygonal Environments

Complete Information Pursuit Evasion in Polygonal Environments Complete Information Prsit Easion in Polygonal Enironments Kyle Klein and Sbhash Sri Department of Compter Science Uniersity of California Santa Barbara, CA 9306 Abstract Sppose an npredictable eader is

More information

Chapter 7 TOPOLOGY CONTROL

Chapter 7 TOPOLOGY CONTROL Chapter 7 TOPOLOGY CONTROL Distributed Computing Group Mobile Computing Winter 2005 / 2006 Overview Topology Control Gabriel Graph et al. XTC Interference SINR & Scheduling Complexity Distributed Computing

More information

Towards Tight Bounds on Theta-Graphs

Towards Tight Bounds on Theta-Graphs Toards Tight Bonds on Theta-Graphs arxiv:10.633v1 [cs.cg] Apr 01 Prosenjit Bose Jean-Lo De Carfel Pat Morin André van Renssen Sander Verdonschot Abstract We present improved pper and loer bonds on the

More information

Maximum Weight Independent Sets in an Infinite Plane

Maximum Weight Independent Sets in an Infinite Plane Maximm Weight Independent Sets in an Infinite Plane Jarno Nosiainen, Jorma Virtamo, Pasi Lassila jarno.nosiainen@tkk.fi, jorma.virtamo@tkk.fi, pasi.lassila@tkk.fi Department of Commnications and Networking

More information

arxiv: v4 [cs.ds] 29 Jul 2015

arxiv: v4 [cs.ds] 29 Jul 2015 Efficient Farthest-Point Qeries in Two-Terminal Series-Parallel Networks Carsten Grimm 1, 1 Otto-on-Gericke-Uniersität Magdebrg, Magdebrg, Germany Carleton Uniersity, Ottawa, Ontario, Canada arxi:1503.017064

More information

Mathematical model for storing and effective processing of directed graphs in semistructured data management systems

Mathematical model for storing and effective processing of directed graphs in semistructured data management systems Mathematical model for storing and effectie processing of directed graphs in semistrctred data management MALIKOV A, GULEVSKIY Y, PARKHOMENKO D Information Systems and Technologies Department North Cacass

More information

Minimum Spanning Trees Outline: MST

Minimum Spanning Trees Outline: MST Minimm Spanning Trees Otline: MST Minimm Spanning Tree Generic MST Algorithm Krskal s Algorithm (Edge Based) Prim s Algorithm (Vertex Based) Spanning Tree A spanning tree of G is a sbgraph which is tree

More information

A choice relation framework for supporting category-partition test case generation

A choice relation framework for supporting category-partition test case generation Title A choice relation framework for spporting category-partition test case generation Athor(s) Chen, TY; Poon, PL; Tse, TH Citation Ieee Transactions On Software Engineering, 2003, v. 29 n. 7, p. 577-593

More information

arxiv: v1 [cs.cg] 1 Feb 2016

arxiv: v1 [cs.cg] 1 Feb 2016 The Price of Order Prosenjit Bose Pat Morin André van Renssen, arxiv:160.00399v1 [cs.cg] 1 Feb 016 Abstract We present tight bonds on the spanning ratio of a large family of ordered θ-graphs. A θ-graph

More information

CS 557 Lecture IX. Drexel University Dept. of Computer Science

CS 557 Lecture IX. Drexel University Dept. of Computer Science CS 7 Lectre IX Dreel Uniersity Dept. of Compter Science Fall 00 Shortest Paths Finding the Shortest Paths in a graph arises in many different application: Transportation Problems: Finding the cheapest

More information

IP Multicast Fault Recovery in PIM over OSPF

IP Multicast Fault Recovery in PIM over OSPF 1 IP Mlticast Falt Recovery in PIM over OSPF Abstract Relatively little attention has been given to nderstanding the falt recovery characteristics and performance tning of native IP mlticast networks.

More information

Constructing Multiple Light Multicast Trees in WDM Optical Networks

Constructing Multiple Light Multicast Trees in WDM Optical Networks Constrcting Mltiple Light Mlticast Trees in WDM Optical Networks Weifa Liang Department of Compter Science Astralian National University Canberra ACT 0200 Astralia wliang@csaneda Abstract Mlticast roting

More information

Fixed-Parameter Algorithms for Cluster Vertex Deletion

Fixed-Parameter Algorithms for Cluster Vertex Deletion Fixed-Parameter Algorithms for Clster Vertex Deletion Falk Hüffner Christian Komsieicz Hannes Moser Rolf Niedermeier Institt für Informatik, Friedrich-Schiller-Uniersität Jena, Ernst-Abbe-Platz 2, D-07743

More information

Triangle-Free Planar Graphs as Segments Intersection Graphs

Triangle-Free Planar Graphs as Segments Intersection Graphs Triangle-ree Planar Graphs as Segments Intersection Graphs N. de Castro 1,.J.Cobos 1, J.C. Dana 1,A.Márqez 1, and M. Noy 2 1 Departamento de Matemática Aplicada I Universidad de Sevilla, Spain {natalia,cobos,dana,almar}@cica.es

More information

Tri-Edge-Connectivity Augmentation for Planar Straight Line Graphs

Tri-Edge-Connectivity Augmentation for Planar Straight Line Graphs Tri-Edge-Connectivity Agmentation for Planar Straight Line Graphs Marwan Al-Jbeh 1, Mashhood Ishaqe 1, Kristóf Rédei 1, Diane L. Sovaine 1, and Csaba D. Tóth 1,2 1 Department of Compter Science, Tfts University,

More information

Networks An introduction to microcomputer networking concepts

Networks An introduction to microcomputer networking concepts Behavior Research Methods& Instrmentation 1978, Vol 10 (4),522-526 Networks An introdction to microcompter networking concepts RALPH WALLACE and RICHARD N. JOHNSON GA TX, Chicago, Illinois60648 and JAMES

More information

Bounded Partial-Order Reduction

Bounded Partial-Order Reduction Bonded Partial-Order Redction Katherine E. Coons Madanlal Msathi Kathryn S. McKinley The Uniersity of Texas at Astin Microsoft Research Abstract Eliminating concrrency errors is increasingly important

More information

Pipelined van Emde Boas Tree: Algorithms, Analysis, and Applications

Pipelined van Emde Boas Tree: Algorithms, Analysis, and Applications This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the IEEE INFOCOM 007 proceedings Pipelined van Emde Boas Tree: Algorithms, Analysis,

More information

Efficient and Accurate Delaunay Triangulation Protocols under Churn

Efficient and Accurate Delaunay Triangulation Protocols under Churn Efficient and Accrate Delanay Trianglation Protocols nder Chrn Dong-Yong Lee and Simon S. Lam Department of Compter Sciences The University of Texas at Astin {dylee, lam}@cs.texas.ed November 9, 2007 Technical

More information

Chapter 4: Network Layer

Chapter 4: Network Layer Chapter 4: Introdction (forarding and roting) Reie of qeeing theor Roting algorithms Link state, Distance Vector Roter design and operation IP: Internet Protocol IP4 (datagram format, addressing, ICMP,

More information

Cost Based Local Forwarding Transmission Schemes for Two-hop Cellular Networks

Cost Based Local Forwarding Transmission Schemes for Two-hop Cellular Networks Cost Based Local Forwarding Transmission Schemes for Two-hop Celllar Networks Zhenggang Zhao, Xming Fang, Yan Long, Xiaopeng H, Ye Zhao Key Lab of Information Coding & Transmission Sothwest Jiaotong University,

More information

Minimal Edge Addition for Network Controllability

Minimal Edge Addition for Network Controllability This article has been accepted for pblication in a ftre isse of this jornal, bt has not been flly edited. Content may change prior to final pblication. Citation information: DOI 10.1109/TCNS.2018.2814841,

More information

The final datapath. M u x. Add. 4 Add. Shift left 2. PCSrc. RegWrite. MemToR. MemWrite. Read data 1 I [25-21] Instruction. Read. register 1 Read.

The final datapath. M u x. Add. 4 Add. Shift left 2. PCSrc. RegWrite. MemToR. MemWrite. Read data 1 I [25-21] Instruction. Read. register 1 Read. The final path PC 4 Add Reg Shift left 2 Add PCSrc Instrction [3-] Instrction I [25-2] I [2-6] I [5 - ] register register 2 register 2 Registers ALU Zero Reslt ALUOp em Data emtor RegDst ALUSrc em I [5

More information

Drawing Outer-Planar Graphs in O(n log n) Area

Drawing Outer-Planar Graphs in O(n log n) Area Draing Oter-Planar Graphs in O(n log n) Area Therese Biedl School of Compter Science, Uniersity of Waterloo, Waterloo, ON N2L 3G1, Canada, biedl@aterloo.ca Abstract. In this paper, e stdy draings of oter-planar

More information

FINITE ELEMENT APPROXIMATION OF CONVECTION DIFFUSION PROBLEMS USING GRADED MESHES

FINITE ELEMENT APPROXIMATION OF CONVECTION DIFFUSION PROBLEMS USING GRADED MESHES FINITE ELEMENT APPROXIMATION OF CONVECTION DIFFUSION PROBLEMS USING GRADED MESHES RICARDO G. DURÁN AND ARIEL L. LOMBARDI Abstract. We consider the nmerical approximation of a model convection-diffsion

More information

arxiv: v1 [cs.cg] 12 Dec 2013

arxiv: v1 [cs.cg] 12 Dec 2013 Smooth Orthogonal Drawings of Planar Graphs Md. Jawaherl Alam, Michael A. Bekos, Michael Kafmann, Philipp Kindermann, Stephen G. Koboro, and Alexander Wolff arxi:.58 [cs.cg] Dec 0 Department of Compter

More information

Blended Deformable Models

Blended Deformable Models Blended Deformable Models (In IEEE Trans. Pattern Analysis and Machine Intelligence, April 996, 8:4, pp. 443-448) Doglas DeCarlo and Dimitri Metaxas Department of Compter & Information Science University

More information

Post-deployment Tuning of UMTS Cellular Networks through Dual-homing of RNCs

Post-deployment Tuning of UMTS Cellular Networks through Dual-homing of RNCs Post-deployment Tning of UMTS Celllar Networks throgh Dal-homing of RNCs Samir K Sadhkhan Indian Institte of Management (IIM) Calctta, India samir@iimcal.ac.in Swarp Mandal Wipro Technologies Kolkata,

More information

Combinatorial and Geometric Properties of Planar Laman Graphs

Combinatorial and Geometric Properties of Planar Laman Graphs Combinatorial and Geometric Properties of Planar Laman Graphs Stephen Koboro 1, Torsten Ueckerdt 2, and Kein Verbeek 3 1 Department of Compter Science, Uniersity of Arizona 2 Department of Applied Mathematics,

More information

EFFICIENT SOLUTION OF SYSTEMS OF ORIENTATION CONSTRAINTS

EFFICIENT SOLUTION OF SYSTEMS OF ORIENTATION CONSTRAINTS EFFICIENT SOLUTION OF SSTEMS OF OIENTATION CONSTAINTS Joseh L. Ganley Cadence Design Systems, Inc. ganley@cadence.com ABSTACT One sbtask in constraint-drien lacement is enforcing a set of orientation constraints

More information

Simulations of the quadrilateral-based localization

Simulations of the quadrilateral-based localization Simulations of the quadrilateral-based localization Cluster success rate v.s. node degree. Each plot represents a simulation run. 9/15/05 Jie Gao CSE590-fall05 1 Random deployment Poisson distribution

More information

The Impact of Avatar Mobility on Distributed Server Assignment for Delivering Mobile Immersive Communication Environment

The Impact of Avatar Mobility on Distributed Server Assignment for Delivering Mobile Immersive Communication Environment This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the ICC 27 proceedings. The Impact of Avatar Mobility on Distribted Server Assignment

More information