Mobility Control and Its Applications in Mobile Ad Hoc Networks

Size: px
Start display at page:

Download "Mobility Control and Its Applications in Mobile Ad Hoc Networks"

Transcription

1 Mobility Control and Its Applications in Mobile Ad Hoc Netorks Jie W and Fei Dai Department of Compter Science and Engineering Florida Atlantic Uniersity Boca Raton, FL 3331 Abstract Most existing localized protocols in mobile ad hoc netorks (MANETs), sch as data commnication and topology control, se local information for decentralized decision among nodes to achiee certain global objecties. These objecties inclde determining a small connected dominating set (CDS) for irtal backbone and topology control by adjsting transmission ranges of nodes. Becase of asynchronos sampling of local information at each node, delays at different stages of protocol handshake, and moement of mobile nodes, local ie captred at different nodes may be inconsistent and/or otdated and may not reflect the actal netork sitation. The former may case bad decisions that fail to keep the gien global constraint sch as global domination and connectiity, and the latter may incr broken links hich in trn ill ltimately case the failre of the constraint. In this paper, e reie some techniqes that handle inconsistent and otdated local ies. These techniqes are illstrated sing seeral ell-knon protocols in data commnication and topology control. Keyords: Connectiity, connected dominating set (CDS), mobile ad hoc netorks (MANETs), mobility management, simlation, topology control. This ork as spported in part by NSF grants CCR 32971, ANI 7373, and EIA 138. jie@cse.fa.ed Contact address:

2 1 Introdction In mobile ad hoc netorks (MANETs), all nodes cooperate to achiee a global task, sch as data gathering, commnication, and area monitoring. MANETs are characterized by nit disk graphs here to nodes are connected only if their geographical distance is ithin a gien transmission range (as shon in Figre 1 (a) here the transmission range is 2.). To design protocols that are simple and qick to conerge, many protocols in MANETs rely on localized algorithms. The localized algorithm rnning at each node makes its local decision based on local information ithin 1 or 2 hops. Collectiely, nodes rnning the localized algorithm achiee some desirable global objecties. To idely-sed applications of the localized algorithm are (1) determining a connected dominating set (CDS) for efficient roting [1, 3,, 1], and (2) selecting an appropriate transmission range of each node for topology control [2,,, 7]. A connected dominating set (CDS) is a sbset sch that each node in the system is either in the set or the neighbor of a node in the set. The CDS has been sed idely to spport the notion of irtal backbone in MANETs. Another application of CDS is in broadcasting, here nodes and only nodes in the CDS forard the broadcast message to redce message collision. Hoeer, finding a minimm CDS is NP-complete. Most practical approaches in MANETs se localized algorithms to find a small CDS. In a typical localized CDS protocol, each node ses local information to determine its stats, dominator or dominatee. Figre 1 (b) shos a CDS constrcted ia a localized algorithm [1]. In this diagram the connections beteen dominatees are not shon. As dominators (black nodes) form a backbone of the MANET, any dominatee (hite node) can sitch to the sleep mode for energy saing ithot casing netork partition. Most localized CDS algorithms rely on 2-hop information of the crrent node, hich incldes information of s neighbors and neighbors of s neighbors. In MANETs, in order to redce energy consmption and signal interference, it is important to select an appropriate transmission poer for each node, also called topology control, hile still satisfying certain global constraints, inclding connectiity and other reliability and throghpt related measres. In localized topology control, each node ses local information to select a sbset of physical neighbors, called logical neighbors, and its transmission range is redced to reaching only as far as the farthest logical neighbor. Figre 1 (c) shos the reslt of a localized topology control algorithm [2], here both the aerage nmber of neighbors and transmission range are redced significantly, hile the netork is still connected. Localized topology control algorithms sally rely on 1-hop location information of the crrent node, hich incldes information of s neighbors and their location information. Some algorithms reqire less information here distance or angle of arrial information of neighbors is sfficient. Compared ith their centralized conterparts, localized algorithms are lighteight, fast to conerge, and resilient to node moement. Hoeer, ithot a mobility control mechanism, global domination and connectiity may still be compromised by node moement. In most existing localized algorithms, each node in a MANET emits a periodic Hello message to adertise its presence and its position (if needed) at a fixed interal. Hello interals at different nodes are asynchronos to redce message collision. Each node ses receied Hello messages as samples to constrct a local ie of its 1- or 2-hop neighborhood. In a 1

3 (a) The original netork (b) Connected dominating set (c) Topology control Figre 1. Virtal netorks constrcted ia localized algorithms. The original MANET has 1 nodes and a transmission range of 2.. MANET ith mobile nodes, the limited sample freqency, asynchronos Hello interals, and delays at different stages of protocol handshake ill case a mismatch beteen the irtal netork constrcted from 1 the collection of local ies sampled at different nodes and the actal netork. This mismatch ill case the link aailability isse, here a neighbor in a irtal netork is no longer a neighbor in the actal netork, becase the irtal netork is constrcted from otdated information. Therefore, special mechanisms are needed to address the folloing isse: 2 3 Delay and mobility management: Ho protocols deal ith imprecise neighborhood information cased by node mobility and arios delays introdced at different stages of protocol handshake. One soltion in [8], as ill be discssed later in detail, ses to transmission ranges to address the link aailability isse. First, a transmission range r is determined based on the selected protocol. This transmission range is either the same as the Hello message range r as in the CDS protocol or shorter than r as in the topology control protocol. The actal transmission ses a long transmission range set to r + l. The difference, l, beteen these to ranges is based on the pdate freqency and the speed of node moement. The mismatch beteen the irtal netork and actal netork ill case a more serios problem: inconsistent local ies. Inconsistent local ies may case bad decisions that fail to keep the the global constraint sch as global domination and connectiity. Again, special mechanisms are needed to address the folloing isse: Node synchronization and consistent local ie: Ho each node knos hen to sample its local ie. Ho each node collects and ses the local information in a consistent ay. 2

4 We ill examine to different approaches that address the consistency isse: enforcing consistent ies and making conseratie decisions. The first approach as initially proposed in [9] to constrct consistent 1-hop information for topology control. This approach can also be extended to spport the constrction of 2-hop information. The second approach as originally proposed in [8] for CDS formation. Bt the same principle can be sed in topology control. The main objectie of this paper is to expose to the reader the challenging isse related to mobility control. Throgh discssion on the effect of mobile nodes on seeral important protocols, e present some problems, proide possible soltions, and discss seeral open isses. By this, e hope to stimlate more research in this important area. 2 Link aailability isse and soltion In MANETs, becase of asynchronos Hello messages and arios protocol handshake delays, neighborhood information and/or position sed in decision making may be otdated. For example, a preiosly sampled neighbor can moe ot of transmission range dring the actal transmission. In order to apply existing protocols ithot haing to redesign them, the notion of bffer zone is sed in [8], here to circles ith radii r and r + l are sed. r corresponds to the transmission range determined by a selected protocol, hereas r + l corresponds to the actal transmission range sed. l = d 2t is defined as a bffered range depending on the moing speed t of mobile nodes and the maximm time delay d. To simplify the discssion, both Hello interals and moing patterns/speeds are homogeneos, and hence, l is niform for each node. The aboe reqirement of bffered range garantees link aailability in the orst case sitation. Hoeer, probabilistic stdy in [8] reeals that the orst case rarely happens. In MANETs ith ery high moing speed (t), it is either impossible or too expensie to se sch a large l. Both probabilistic analysis and simlation reslts in [8] sho that link aailability is presered in most cases ith a bffered range mch smaller than d 2t. There is a ide range of potential trade-offs beteen efficiency and connectiity. Specifically, sppose r is the normal Hello message range. A typical CDS protocol orks as follos: 1. Select r = r for neighborhood information exchange. 2. Apply the selected localized CDS protocol to determine the stats of each node. 3. Use r + l for each dominator in the actal transmission. Step 2 of the aboe process aries from protocol to protocol. Here e se W and Li s marking process and Rles 1 and 2 [1] to illstrate: 3

5 r z x nmarked by marking process y s nmarked by Rle 1 nmarked by Rle 2 marked nodes t Figre 2. W and Li s CDS algorithm. Black nodes are marked (i.e., in the CDS). At each node : Marking Process: is marked tre (i.e., becomes a dominator) if there are to nconnected neighbors. Rle 1: is nmarked (i.e., becomes a dominatee) if its neighbor set is coered by another node ith a higher id. Rle 2: is nmarked if its neighbor set is coered jointly by to connected nodes ith higher id s. In Rles 1 and 2, e say s neighbor set, N(), is coered by one or to coering nodes, if eery node in N() is either a coering node or a neighbor of a coering node. Figre 2 shos a sample ad hoc netork ith 9 nodes. Node r is nmarked by the marking process becase its neighbors and z are directly connected. Node is nmarked by Rle 1 becase its neighbor set is coered by node x. Here node id x is higher than according to the alphabetical order. Node is nmarked by Rle 2 becase its neighbor set is coered by to connected nodes x and z. Clearly, the marked nodes, x, and z form a CDS of the sample netork. Originally, Rles 1 and 2 se only marked nodes as coering nodes, and inole oerhead in commnicating dominating set stats. Stojmenoic et al [] shoed that nmarked nodes can also be coering nodes, and there is no need to exchange dominating set stats. Dai and W s [1] proposed a generalized rle (called Rle k) to constrct a smaller CDS. Based on the generalized rle, is nmarked if its neighbor set is coered by seeral connected nodes ith higher id s. The nmber of the coering nodes is alloed to be more than to. When the netork is static or local ies are consistent (say, all nodes see only solid line) in Figre 3, both nodes and are marked after the marking process. ill be nmarked sing Rle 1.

6 x t x x x t1 (a) s position at t and t1 (b) s decision as an nmarked node at t1 (c) s decision as nmarked at t1 (d) s conseratie local ie at t1 Figre 3. As node moes aay from node (a), both nodes and are nmarked de to inconsistent local ies sampled at nodes and (b,c). Based on the conseratie ie, node is still marked for a little hile after it detected the broken link (, ). The dotted line represents a irtal link in s ie. A typical topology control protocol orks as follos: 1. Select r to collect neighborhood information. 2. Apply a selected localized topology control protocol to select r(), r() r, for node to coer its farthest logical neighbor. 3. Use r() + l for the actal transmission. We se Li, Ho, and Sha s topology control algorithm based on local minimm spanning tree (MST) [2] to illstrate step 2 of the aboe process. At each node : 1. Bild a local MST sing Prim s algorithm based on 1-hop location information. The resltant MST coers all 1-hop neighbors of. 2. Select neighbors in MST as logical neighbors of. 3. Set the transmission range of to the distance to the farthest logical neighbor. When the netork is static or local ies are consistent (say, all nodes see only solid line) in Figre (a), the MST incldes to links (, ) and (, ). Node has one logical neighbor and sets its range to. Node has one logical neighbor and sets its range to. Node has to logical neighbors and and sets its range to to reach the farthest node. When the netork contains mobile nodes, sch as node in Figre, the transmission range of each node is increased to maintain the link aailability. For example, if it is knon that the maximm relatie

7 t1 t t moement (a) s positions at t and t1 (b) LMST() bilt at time t (c) LMST() bilt at time t1 (d) Netork topology at time t1 Figre. Node becomes nreachable from nodes and de to inconsistent local ies sampled at nodes and. moement beteen to nodes dring one Hello interal is l = 2, then the actal transmission range of nodes,, and are adjsted to 8, 7, and 8, respectiely. Therefore, link (, ) is still aailable een if node moes pard and the distance beteen and becomes. It is also obsered in [8] that the bffer zone idth l = 2 is conseratie and not alays necessary. The probability is high that all links can be maintained ith a smaller l. 3 Vie consistency isse Again, e se to localized algorithms as examples to demonstrate ho inconsistent local ies case bad decisions in MANETs: W and Li s marking process [1] for CDS constrction, and Li, Ho, and Sha s topology control algorithm based on local MST [2]. In the CDS constrction example (as shon in Figre 3), e assme that node moes sothard. Link (, ) exists at time t and is broken at time t 1. We also assme t and t 1 belong to to interals. Since link (, ) is to hops aay from node, hen node decides its stats, it ses the otdated information (lagging by one interal) that link (, ) still exists. The local ie is shon in Figre 3 (b). Based on Rle 1, node is nmarked becase its neighbor set is coered by node. Hoeer, hen node decides its stats, it has the fresh information that link (, ) is broken since it is adjacent to the link (as shon in Figre 3 (c)). Based on the marking process, the only to neighbors of, x and, are connected, so node is also marked false. As a conseqence, none of the nodes in the netork are marked! In the topology control example (as shon in Figre ), assme node s ie reflects the topology at t (as shon in Figre (b)) hereas node s ie corresponds to the topology at t 1 (as shon in Figre (c)). This happens hen the recent Hello message from is sent at t, here t < t < t 1. In this case, has only one logical neighbor, and has only one logical neighbor. Based on the protocol, a link is selected only if both end nodes select each other. As a reslt, only one link (, ) exists after the topology control (as shon in Figre (d)). A netork partition occrs! In the aboe examples, indiidal nodes make bad decisions based on inconsistent local ies. To ies are inconsistent if their common parts do not match. In the CDS example, link (, ) exists in node

8 t h s d1 t 1 t h1 s1 h2 s2 d 2 t 1 (a) consistent 1 hop information (b) consistent 2 hop information Figre. Bild consistent local ies at the beginning of each Hello interal. Dotted lines represent Hello messages. Solid lines represent data packets. s ie bt not in node s ie. In the topology control example, is closer to in s ie bt closer to in s ie. There are to soltions to this problem: (1) enforcing consistent local ies, or (2) making conseratie decisions that maintain the global property, as ill be discssed in the next to sections. Consistent local ie We first consider 1-hop (location) information sed in topology control. Originally, each node receies Hello messages from its 1-hop neighbors, and pdates its local ie pon the arrial of eery Hello message. If all nodes hae synchronized clocks, this scheme actally orks. In the topology control example, if both nodes and make their decisions at t, they ill agree that is closer to ; at t 1, they ill agree that is closer. Here e omit the propagation delay and assme that a Hello message is receied by all neighbors at the same time. Hoeer, it is impossible to hae totally synchronized clocks in a MANET ithot centralized control. If makes its decision slightly earlier than, and s Hello message arries after s decision and before s decision, then the to nodes hae inconsistent ies. This inconsistency cannot be aoided no matter ho small the asynchrony is. The traditional soltion for this problem is to bild local ies only once at the beginning of each Hello interal. As shon in Figre (a), each Hello interal is diided into three time periods = h + s + d 1. Becase of asynchronos clocks, different nodes may start their Hello interals at different times. That is, some nodes hae faster clocks than other nodes. Hoeer, e assme the difference beteen to clocks is bonded by s. In the constrction of consistent ies, each node sends its Hello message dring period h, aits for a period s, and condcts normal actiities (e.g., sending data packets) in period d 1. As the h period of the sloest node ends before the s period of the fastest node, eery node receies all Hello messages before the end of its s period. Local ies bilt in the end of s are consistent. It is safe to rote data packets in period d 1 based on these local ies. This scheme can be extended to bild 2-hop information. As shon in Figre (b), each Hello interal is diided into fie periods = h 1 + s 1 + h 2 + s 2 + d 2. Normally h 1 = h 2 and s 1 = s 2. Again, e assme 7

9 the clock difference is bonded by both s 1 and s 2. Each node first adertises its -hop information (i.e., its id and/or location) in period h 1, bilds 1-hop information at the end of period s 1, and then adertises the nely constrcted 1-hop information in period h 2. At the end of period s 2, eery node constrcts its consistent local ie, hich is ready for se in period d 2. The draback of this scheme is that to Hello messages are sent dring each interal, and the effectie commnication period d 2 is frther redced. The traditional soltion relies on the assmption that the maximal difference among local clocks, s, is predictable and s. In a totally asynchronos system, s = and the aboe simple approach cannot be applied. Note that een if s < at a particlar netork, delays accmlate nless some clock synchronization protocol is applied. Althogh arios soltions exist to adjst clock ales, freqent clock synchronization is costly. When maintaining (partially) synchronos Hello interal becomes too expensie or impossible, e propose sing timestamped asynchronos Hello messages to enforce application specific consistent local ies. The basic idea is to maintain a seqence nmber i at each node, and attach the seqence nmber to each Hello message from this node. The seqence nmber seres as a timestamp. Consistent local ies are obtained from Hello messages ith the same timestamps. This can be done by carrying a timestamp in each data packet (inclding control packets from a higher leel protocol). The timestamp is chosen by the originator of the data packet, and all nodes relaying this packet mst determine their logical neighbors based on information of the same ersion (i.e., ith the same timestamp). In this scheme, each node keeps seeral local ies, each local ie corresponding to a recently sed timestamp. Similarly, seeral logic topologies co-exist in the same netork. Each logic topology corresponds to a timestamp and is connected. The logic time (i.e., the timestamp of the latest local ie) of the originator of the data packet is sed as a selector. It indicates in hich logical topology this data packet is traelling. This approach can tolerate a larger time ske among different local ies and, therefore, inoles less synchronization oerhead. In Figre, sppose the first Hello message from node has timestamp, and the second one has timestamp 1. When the aboe method is applied, to parallel logic topologies exist. The logical topology corresponding to timestamp incldes to bidirectional links (, ) and (, ). The logic topology corresponding to timestamp 1 incldes (, ) and (, ). When a data packet p is sent from to, the sorce node selects a recent timestamp and forards p on the corresponding logical topology. If p has timestamp, it is first forarded to. Based on s local ie ith timestamp, is a logical neighbor of, and p is forarded along the logical link (, ). If p has timestamp 1, it is sent to directly ia logical link (, ). In both cases, p arries safely at its destination. Conseratie local ie Both soltions for enforcing consistent local ies reqire a certain degree of internode synchronization, hich introdces extra oerhead. When maintaining consistent local ies becomes too expensie or impossible, another approach called conseratie local ie [9] can be applied, hich makes conseratie decisions based on inconsistent ies. No synchronization is necessary. A conseratie decision is one 8

10 that maintains the global property ith the penalty of loer efficiency. That means selecting more logical neighbors in a topology control algorithm, hich in trn generates a larger aerage transmission range, and marks more nodes as dominators in a CDS formation process. We se W and Li s marking process as an example to illstrate the conseratie approach. In W and Li s marking process, a node may be nmarked incorrectly if (1) no longer ies a node as its neighbor, and (2) another node still ies as s neighbor and nmarks itself based on this ie. As the broken link (, ) is first detected by and then propagated to ia periodical Hello messages, local ies of nodes and are inconsistent for a short period. Dring that period, and may be nmarked simltaneosly, and the CDS is temporarily compromised. In order to preent conditions (1) and (2) from happening together, each node mst se a conseratie local ie, instead of its most recent local ie, to make conseratie decisions. In this case, the conseratie local ie V ie c () of node is constrcted from k most recent local ie V ie 1 (), V ie 2 (),..., V ie k () based on the folloing rle: a link (, ) exists in V ie c () if and only if (1) (, ) exists in the most recent local ies V ie 1 (), or (2) = and (, ) exists in at least one recent local ie V ie i () for 1 i k. That is, a broken link is presered longer in the conseratie ies of its to end nodes than in those of all other nodes. As shon in Figre 3 (d), after node detects a broken link (, ), it ill keep a irtal link corresponding to the broken link in its local ie for a short time period. Based on this conseratie ie, is still a dominator. Note that the irtal link (, ) is still aailable dring this time period, if ses a large actal transmission range to create a bffer zone, as discssed in Section 2. The irtal link stays in s ie ntil all other nodes hae remoed this link from their ies. When 2-hop information is sed, link (, ) exists in local ies of s 1-hop neighbors and s 1-hop neighbors, hich ill remoe link (, ) from their local ies after receiing a Hello message from or. Node ill send its next Hello message ithin a Hello interal ( ). Node may detect the broken link and send its Hello message later than, bt the difference is bonded by. Therefore, it is safe to remoe the irtal link (, ) for s local ie after 2. This approach can also be applied to other localized CDS and topology control algorithms. Hoeer, the conseratie decisions are different from algorithm to algorithm, and the constrction of conseratie ies depends on the specific algorithm. For example, in Li, Ho, and Sha s local MST algorithm, a conseratie ie of node can be defined as follos: gien k most recent local ies V ie 1 (), V ie 2 (),..., V ie k (), hich contain distance ales d i (, ) (1 i k) beteen any to nodes and ithin s transmission range (inclding ), their distance in the conseratie ie is (1) max i d i (, ), if and, and (2) min i d i (, ) otherise. That is, the irtal distance beteen and a neighbor in its conseratie ie may be smaller than the actal distance, and the irtal distance beteen to neighbors may be larger than the actal distance. When conseratie local ies are sed in Figre, both nodes and select as a logical neighbor, and the netork connectiity is presered. 9

11 Connectiity ratio (%) Aerage moing speed (m/s) 1m 1m 1m m (a) With inconsistent local ies Connectiity ratio (%) Aerage moing speed (m/s) (b) With consistent local ies 1m 1m 1m m Figre. Connectiity ratio of a topology control algorithm nder different bffered ranges. Simlation Reslts We illstrate sample reslts from simlations of the mobility control mechanisms. For more reslts, the readers can refer to [8, 9]. All simlations are condcted sing ns-2, ith 1 nodes, a 9 9m 2 deployment area, normal transmission range r = 2m, 1s Hello interal, and a random aypoint mobility model. The netork connectiity is measred in terms of the connectiity ratio, hich is defined as the ratio of pairs of connected nodes to the total nmber of pairs. In the original Dai and W s CDS algorithm [1], the connectiity ratio drops rapidly as the aerage moing speed increases. When a small (2m) bffer zone is sed to tolerate broken links, the deliery ratio improes significantly nder lo (1m/s) to moderate (m/s) mobility. With a 1m bffer zone, the algorithm has almost 1% connectiity ratio nder ery high (1m/s) mobility. Figre (a) shos the connectiity ratio of Li, Ho, and Sha s topology control algorithm [2]. When there is no bffer zone (m), the connectiity ratio is ery lo (1%) nder an aerage moing speed of 1m/s. The connectiity ratio increases significantly after a ery small (1m) bffer zone is sed. On the other hand, 1% connectiity ratio is not achieed nder lo mobility. Moderate and high mobility cases lo connectiity ratio. Figre (b) shos the effect of sing consistent ies. When sing a 2m bffer zone in MANETs ith a 1m/s aerage moing speed, the connectiity ratio is % ithot consistent ies, and 7% ith consistent ies. When sing a 1m bffer zone nder a m/s aerage moing speed, the connectiity ratio reaches 98% ith consistent ies, hile the original connectiity ratio ithot consistent ies is only 7%. Oerall, simlation reslts confirm that the global connectiity can be compromised by both link aailability and ie consistency isses. Both isses can be oercome ith mobility control mechanisms, and the global property can be presered ith high probability and relatiely small oerhead. 1

12 7 Conclsion We hae addressed isses related to mobility control in mobile ad hoc netorks. To illstrate the importance of the negatie impact of mobile nodes on arios protocols, e focs on to types of protocols, one for CDS constrction and the other for topology control. It has been shon that most existing protocols on CDS constrction and topology control ill generate incorrect reslts in the presence of mobile nodes. We discss to major problems cased by mobility control: link aailability and ie consistency, and proide seeral soltions. Mobility control in MANETs is still in its infancy. Many open isses exist: Ho does mobility affect protocols at other layers? Can approaches for ie consistency in distribted systems be applied in mobile ad hoc netorks? Ho shold arios kinds of cost and efficiency trade-off be done? More efforts are needed to address these isses before arios protocols can be applied in MANETs ith mobile nodes. References [1] F. Dai and J. W. Distribted dominant prning in ad hoc ireless netorks. In Proc. of ICC, page 33, May 23. [2] N. Li, J. C. Ho, and L. Sha. Design and analysis of an MST-based topology control algorithm. In Proc. of INFOCOM, olme 3, pages , Mar./Apr. 23. [3] A. Qayym, L. Viennot, and A. Laoiti. Mltipoint relaying for flooding broadcast message in mobile ireless netorks. In Proc. of HICSS-3, Jan. 22. [] V. Rodopl and T. H. Meng. Minimm energy mobile ireless netorks. IEEE Jornal of Selected Areas in Commnications, 17(8): , Ag [] I. Stojmenoic, M. Seddigh, and J. Znic. Dominating sets and neighbor elimination based broadcasting algorithms in ireless netorks. IEEE Transactions on Parallel and Distribted Systems, 13(1):1 2, Jan. 22. [] Y. Wang, X. Li, P. Wan, and O. Frider. Distribted spanners ith bonded degree for ireless ad hoc netorks. International Jornal of Fondations of Compter Science, 1(2):183 2, 23. [7] R. Wattenhofer, L. Li, V. Bahl, and Y. M. Wang. Distribted topology control for poer efficient operation in mltihop ireless ad hoc netorks. In Proc. INFOCOM, pages , Apr. 21. [8] J. W and F. Dai. Mobility management and its applications in efficient broadcasting in mobile ad hoc netorks. In Proc. of INFOCOM, Mar

13 [9] J. W and F. Dai. Mobility-sensitie topology control in mobile ad hoc netorks. In Proc. of IPDPS, Apr. 2. accepted to appear. [1] J. W and H. Li. On calclating connected dominating set for efficient roting in ad hoc ireless netorks. In Proc. of DiaLM, pages 7 1,

Mobility Control and Its Applications in Mobile Ad Hoc Networks

Mobility Control and Its Applications in Mobile Ad Hoc Networks Mobility Control and Its Applications in Mobile Ad Hoc Netorks Jie W and Fei Dai, Florida Atlantic Uniersity Abstract Most eisting localized protocols in mobile ad hoc netorks, sch as data commnication

More information

An Extended Fault-Tolerant Link-State Routing Protocol in the Internet

An Extended Fault-Tolerant Link-State Routing Protocol in the Internet An Extended Falt-Tolerant Link-State Roting Protocol in the Internet Jie W, Xiaola Lin, Jiannong Cao z, and Weijia Jia x Department of Compter Science and Engineering Florida Atlantic Uniersit Boca Raton,

More information

Chapter 7 TOPOLOGY CONTROL

Chapter 7 TOPOLOGY CONTROL Chapter TOPOLOGY CONTROL Oeriew Topology Control Gabriel Graph et al. XTC Interference SINR & Schedling Complexity Distribted Compting Grop Mobile Compting Winter 00 / 00 Distribted Compting Grop MOBILE

More information

On Plane Constrained Bounded-Degree Spanners

On Plane Constrained Bounded-Degree Spanners Algorithmica manscript No. (ill be inserted by the editor) 1 On Plane Constrained Bonded-Degree Spanners 2 3 Prosenjit Bose Rolf Fagerberg André an Renssen Sander Verdonschot 4 5 Receied: date / Accepted:

More information

[1] Hopcroft, J., D. Joseph and S. Whitesides, Movement problems for twodimensional

[1] Hopcroft, J., D. Joseph and S. Whitesides, Movement problems for twodimensional Acknoledgement. The athors thank Bill Lenhart for interesting discssions on the recongration of rlers. References [1] Hopcroft, J., D. Joseph and S. Whitesides, Moement problems for todimensional linkages,

More information

Chapter 4: Network Layer

Chapter 4: Network Layer Chapter 4: Introdction (forarding and roting) Reie of qeeing theor Roting algorithms Link state, Distance Vector Roter design and operation IP: Internet Protocol IP4 (datagram format, addressing, ICMP,

More information

On Plane Constrained Bounded-Degree Spanners

On Plane Constrained Bounded-Degree Spanners On Plane Constrained Bonded-Degree Spanners Prosenjit Bose 1, Rolf Fagerberg 2, André an Renssen 1, Sander Verdonschot 1 1 School of Compter Science, Carleton Uniersity, Ottaa, Canada. Email: jit@scs.carleton.ca,

More information

Select-and-Protest-based Beaconless Georouting with Guaranteed Delivery in Wireless Sensor Networks

Select-and-Protest-based Beaconless Georouting with Guaranteed Delivery in Wireless Sensor Networks Select-and-Protest-based Beaconless Georoting ith Garanteed Deliery in Wireless Sensor Netorks Hanna Kalosha, Amiya Nayak, Stefan Rührp, Ian Stojmenoić School of Information Technology and Engineering

More information

A Unified Energy-Efficient Topology for Unicast and Broadcast

A Unified Energy-Efficient Topology for Unicast and Broadcast A Unified Energy-Efficient Topology for Unicast and Broadcast Xiang-Yang Li Dept. of Compter Science Illinois Institte of Technology, Chicago, IL, USA xli@cs.iit.ed Wen-Zhan Song School of Eng. & Comp.

More information

Flooding. Routing: Outlook. Flooding Algorithms. Spanning Tree. Flooding

Flooding. Routing: Outlook. Flooding Algorithms. Spanning Tree. Flooding Roting: Otlook Flooding Flooding Link-State: complete, global knoledge Distance-Vector: iteratie, distribted calclation Goal: To distribte a packet in the hole netork (i.e. to realie a netork-ide broadcast)

More information

ABSOLUTE DEFORMATION PROFILE MEASUREMENT IN TUNNELS USING RELATIVE CONVERGENCE MEASUREMENTS

ABSOLUTE DEFORMATION PROFILE MEASUREMENT IN TUNNELS USING RELATIVE CONVERGENCE MEASUREMENTS Proceedings th FIG Symposim on Deformation Measrements Santorini Greece 00. ABSOUTE DEFORMATION PROFIE MEASUREMENT IN TUNNES USING REATIVE CONVERGENCE MEASUREMENTS Mahdi Moosai and Saeid Khazaei Mining

More information

Localized Delaunay Triangulation with Application in Ad Hoc Wireless Networks

Localized Delaunay Triangulation with Application in Ad Hoc Wireless Networks 1 Localized Delanay Trianglation with Application in Ad Hoc Wireless Networks Xiang-Yang Li Gria Călinesc Peng-Jn Wan Y Wang Department of Compter Science, Illinois Institte of Technology, Chicago, IL

More information

Maximal Cliques in Unit Disk Graphs: Polynomial Approximation

Maximal Cliques in Unit Disk Graphs: Polynomial Approximation Maximal Cliqes in Unit Disk Graphs: Polynomial Approximation Rajarshi Gpta, Jean Walrand, Oliier Goldschmidt 2 Department of Electrical Engineering and Compter Science Uniersity of California, Berkeley,

More information

Chapter 5 Network Layer

Chapter 5 Network Layer Chapter Network Layer Network layer Physical layer: moe bit seqence between two adjacent nodes Data link: reliable transmission between two adjacent nodes Network: gides packets from the sorce to destination,

More information

Real-Time Robot Path Planning via a Distance-Propagating Dynamic System with Obstacle Clearance

Real-Time Robot Path Planning via a Distance-Propagating Dynamic System with Obstacle Clearance POSTPRINT OF: IEEE TRANS. SYST., MAN, CYBERN., B, 383), 28, 884 893. 1 Real-Time Robot Path Planning ia a Distance-Propagating Dynamic System with Obstacle Clearance Allan R. Willms, Simon X. Yang Member,

More information

The Disciplined Flood Protocol in Sensor Networks

The Disciplined Flood Protocol in Sensor Networks The Disciplined Flood Protocol in Sensor Networks Yong-ri Choi and Mohamed G. Goda Department of Compter Sciences The University of Texas at Astin, U.S.A. fyrchoi, godag@cs.texas.ed Hssein M. Abdel-Wahab

More information

Fixed-Parameter Algorithms for Cluster Vertex Deletion

Fixed-Parameter Algorithms for Cluster Vertex Deletion Fixed-Parameter Algorithms for Clster Vertex Deletion Falk Hüffner Christian Komsieicz Hannes Moser Rolf Niedermeier Institt für Informatik, Friedrich-Schiller-Uniersität Jena, Ernst-Abbe-Platz 2, D-07743

More information

Improving Network Connectivity Using Trusted Nodes and Edges

Improving Network Connectivity Using Trusted Nodes and Edges Improing Network Connectiity Using Trsted Nodes and Edges Waseem Abbas, Aron Laszka, Yegeniy Vorobeychik, and Xenofon Kotsokos Abstract Network connectiity is a primary attribte and a characteristic phenomenon

More information

Rectangle-of-influence triangulations

Rectangle-of-influence triangulations CCCG 2016, Vancoer, British Colmbia, Ag 3 5, 2016 Rectangle-of-inflence trianglations Therese Biedl Anna Lbi Saeed Mehrabi Sander Verdonschot 1 Backgrond The concept of rectangle-of-inflence (RI) draings

More information

On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing

On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing 1 On the Comptational Complexity and Effectiveness of N-hb Shortest-Path Roting Reven Cohen Gabi Nakibli Dept. of Compter Sciences Technion Israel Abstract In this paper we stdy the comptational complexity

More information

Faster Random Walks By Rewiring Online Social Networks On-The-Fly

Faster Random Walks By Rewiring Online Social Networks On-The-Fly 1 Faster Random Walks By Rewiring Online ocial Networks On-The-Fly Zhojie Zho 1, Nan Zhang 2, Zhigo Gong 3, Gatam Das 4 1,2 Compter cience Department, George Washington Uniersity 1 rexzho@gw.ed 2 nzhang10@gw.ed

More information

v e v 1 C 2 b) Completely assigned T v a) Partially assigned Tv e T v 2 p k

v e v 1 C 2 b) Completely assigned T v a) Partially assigned Tv e T v 2 p k Approximation Algorithms for a Capacitated Network Design Problem R. Hassin 1? and R. Rai 2?? and F. S. Salman 3??? 1 Department of Statistics and Operations Research, Tel-Ai Uniersity, Tel Ai 69978, Israel.

More information

Pushing squares around

Pushing squares around Pshing sqares arond Adrian Dmitresc János Pach Ý Abstract We stdy dynamic self-reconfigration of modlar metamorphic systems. We garantee the feasibility of motion planning in a rectanglar model consisting

More information

Assignments. Computer Networks LECTURE 7 Network Layer: Routing and Addressing. Network Layer Function. Internet Architecture

Assignments. Computer Networks LECTURE 7 Network Layer: Routing and Addressing. Network Layer Function. Internet Architecture ompter Netorks LETURE Netork Laer: Roting and ddressing ssignments Project : Web Pro Serer DUE OT Sandha Darkadas Department of ompter Science Uniersit of Rochester Internet rchitectre Bottom-p: phsical:

More information

Chapter 4: Network Layer. TDTS06 Computer networks. Chapter 4: Network Layer. Network layer. Two Key Network-Layer Functions

Chapter 4: Network Layer. TDTS06 Computer networks. Chapter 4: Network Layer. Network layer. Two Key Network-Layer Functions Chapter : Netork Laer TDTS06 Compter s Lectre : Netork laer II Roting algorithms Jose M. Peña, jospe@ida.li.se ID/DIT, LiU 009-09- Chapter goals: nderstand principles behind laer serices: laer serice models

More information

Faster Random Walks By Rewiring Online Social Networks On-The-Fly

Faster Random Walks By Rewiring Online Social Networks On-The-Fly Faster Random Walks By Rewiring Online ocial Networks On-The-Fly Zhojie Zho 1, Nan Zhang 2, Zhigo Gong 3, Gatam Das 4 1,2 Compter cience Department, George Washington Uniersity 1 rexzho@gw.ed 2 nzhang10@gw.ed

More information

Network layer. Two Key Network-Layer Functions. Datagram Forwarding table. IP datagram format. IP Addressing: introduction

Network layer. Two Key Network-Layer Functions. Datagram Forwarding table. IP datagram format. IP Addressing: introduction Netork laer transport segment sending to receiing host on sending side encapslates segments into grams on rcing side, deliers segments to transport laer laer protocols in eer host, roter roter eamines

More information

Policy-Based Benchmarking of Weak Heaps and Their Relatives

Policy-Based Benchmarking of Weak Heaps and Their Relatives Policy-Based Benchmarking of Weak Heaps and Their Relaties Asger Brn 1, Stefan Edelkamp 2,, Jyrki Katajainen 1,, and Jens Rasmssen 1 1 Department of Compter Science, Uniersity of Copenhagen, Uniersitetsparken

More information

Drawing Outer-Planar Graphs in O(n log n) Area

Drawing Outer-Planar Graphs in O(n log n) Area Draing Oter-Planar Graphs in O(n log n) Area Therese Biedl School of Compter Science, Uniersity of Waterloo, Waterloo, ON N2L 3G1, Canada, biedl@aterloo.ca Abstract. In this paper, e stdy draings of oter-planar

More information

3-DIMENSIONAL RESPONSE CHARACTERISTICS OF CONTINUOUS VIADUCT NEAR A FAULT

3-DIMENSIONAL RESPONSE CHARACTERISTICS OF CONTINUOUS VIADUCT NEAR A FAULT 13 th World Conference on Earthqake Engineering Vancoer, B.C., Canada Agst 1-6, 24 Paper No. 367 3-DIMENSIONAL RESPONSE CHARACTERISTICS OF CONTINUOUS VIADUCT NEAR A FAULT Kotak OHO 1, Takanori HARADA 2

More information

Cutting Cycles of Rods in Space: Hardness and Approximation

Cutting Cycles of Rods in Space: Hardness and Approximation Ctting Cycles of Rods in Space: Hardness and pproximation oris rono ark de erg Chris Gray Elena mford bstract We stdy the problem of ctting a set of rods (line segments in R 3 ) into fragments, sing a

More information

Queries. Inf 2B: Ranking Queries on the WWW. Suppose we have an Inverted Index for a set of webpages. Disclaimer. Kyriakos Kalorkoti

Queries. Inf 2B: Ranking Queries on the WWW. Suppose we have an Inverted Index for a set of webpages. Disclaimer. Kyriakos Kalorkoti Qeries Inf B: Ranking Qeries on the WWW Kyriakos Kalorkoti School of Informatics Uniersity of Edinbrgh Sppose e hae an Inerted Index for a set of ebpages. Disclaimer I Not really the scenario of Lectre.

More information

Isolates: Serializability Enforcement for Concurrent ML

Isolates: Serializability Enforcement for Concurrent ML Prde Uniersity Prde e-pbs Department of Compter Science Technical Reports Department of Compter Science 2010 Isolates: Serializability Enforcement for Concrrent ML Lkasz Ziarek Prde Uniersity, lziarek@cs.prde.ed

More information

NETWORK PRESERVATION THROUGH A TOPOLOGY CONTROL ALGORITHM FOR WIRELESS MESH NETWORKS

NETWORK PRESERVATION THROUGH A TOPOLOGY CONTROL ALGORITHM FOR WIRELESS MESH NETWORKS ETWORK PRESERVATIO THROUGH A TOPOLOGY COTROL ALGORITHM FOR WIRELESS MESH ETWORKS F. O. Aron, T. O. Olwal, A. Krien, Y. Hamam Tshwane University of Technology, Pretoria, Soth Africa. Dept of the French

More information

Visibility-Graph-based Shortest-Path Geographic Routing in Sensor Networks

Visibility-Graph-based Shortest-Path Geographic Routing in Sensor Networks Athor manscript, pblished in "INFOCOM 2009 (2009)" Visibility-Graph-based Shortest-Path Geographic Roting in Sensor Networks Gang Tan Marin Bertier Anne-Marie Kermarrec INRIA/IRISA, Rennes, France. Email:

More information

Reconstructing Generalized Staircase Polygons with Uniform Step Length

Reconstructing Generalized Staircase Polygons with Uniform Step Length Jornal of Graph Algorithms and Applications http://jgaa.info/ ol. 22, no. 3, pp. 431 459 (2018) DOI: 10.7155/jgaa.00466 Reconstrcting Generalized Staircase Polygons with Uniform Step Length Nodari Sitchinaa

More information

Combinatorial and Geometric Properties of Planar Laman Graphs

Combinatorial and Geometric Properties of Planar Laman Graphs Combinatorial and Geometric Properties of Planar Laman Graphs Stephen Koboro 1, Torsten Ueckerdt 2, and Kein Verbeek 3 1 Department of Compter Science, Uniersity of Arizona 2 Department of Applied Mathematics,

More information

KINEMATICS OF FLUID MOTION

KINEMATICS OF FLUID MOTION KINEMATICS OF FLUID MOTION The Velocity Field The representation of properties of flid parameters as fnction of the spatial coordinates is termed a field representation of the flo. One of the most important

More information

Towards applications based on measuring the orbital angular momentum of light

Towards applications based on measuring the orbital angular momentum of light CHAPTER 8 Towards applications based on measring the orbital anglar momentm of light Efficient measrement of the orbital anglar momentm (OAM) of light has been a longstanding problem in both classical

More information

IOGP: An Incremental Online Graph Partitioning Algorithm for Distributed Graph Databases

IOGP: An Incremental Online Graph Partitioning Algorithm for Distributed Graph Databases : An Incremental Online Graph Partitioning Algorithm for Distribted Graph Databases Dong Dai Texas Tech University Lbbock, Texas dong.dai@tt.ed Wei Zhang Texas Tech University Lbbock, Texas X-Spirit.zhang@tt.ed

More information

Evaluating Influence Diagrams

Evaluating Influence Diagrams Evalating Inflence Diagrams Where we ve been and where we re going Mark Crowley Department of Compter Science University of British Colmbia crowley@cs.bc.ca Agst 31, 2004 Abstract In this paper we will

More information

On the complexity of Submap Isomorphism

On the complexity of Submap Isomorphism On the compleit of Sbmap Isomorphism Christine Solnon 1,2, Gillame Damiand 1,2, Colin de la Higera 3, and Jean-Christophe Janodet 4 1 INSA de Lon, LIRIS, UMR 5205 CNRS, 69621 Villerbanne, France 2 Université

More information

Constructing Multiple Light Multicast Trees in WDM Optical Networks

Constructing Multiple Light Multicast Trees in WDM Optical Networks Constrcting Mltiple Light Mlticast Trees in WDM Optical Networks Weifa Liang Department of Compter Science Astralian National University Canberra ACT 0200 Astralia wliang@csaneda Abstract Mlticast roting

More information

Fault Tolerance in Hypercubes

Fault Tolerance in Hypercubes Falt Tolerance in Hypercbes Shobana Balakrishnan, Füsn Özgüner, and Baback A. Izadi Department of Electrical Engineering, The Ohio State University, Colmbs, OH 40, USA Abstract: This paper describes different

More information

An Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast

An Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering May 24 An Adaptive Strategy for Maximizing Throghpt in MAC layer Wireless Mlticast Prasanna

More information

Mathematical model for storing and effective processing of directed graphs in semistructured data management systems

Mathematical model for storing and effective processing of directed graphs in semistructured data management systems Mathematical model for storing and effectie processing of directed graphs in semistrctred data management MALIKOV A, GULEVSKIY Y, PARKHOMENKO D Information Systems and Technologies Department North Cacass

More information

circuit simulation NP-complete? backward retiming forward retiming f(x)

circuit simulation NP-complete? backward retiming forward retiming f(x) Optimal FPGA Mapping and Retiming with Ecient Initial State Comptation Jason Cong and Chang W Department of Compter Science Uniersity of California, Los Angeles, CA 995 Abstract For seqential circits with

More information

Networks An introduction to microcomputer networking concepts

Networks An introduction to microcomputer networking concepts Behavior Research Methods& Instrmentation 1978, Vol 10 (4),522-526 Networks An introdction to microcompter networking concepts RALPH WALLACE and RICHARD N. JOHNSON GA TX, Chicago, Illinois60648 and JAMES

More information

Planarity-Preserving Clustering and Embedding for Large Planar Graphs

Planarity-Preserving Clustering and Embedding for Large Planar Graphs Planarity-Presering Clstering and Embedding for Large Planar Graphs Christian A. Dncan, Michael T. Goodrich, and Stephen G. Koboro Center for Geometric Compting The Johns Hopkins Uniersity Baltimore, MD

More information

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY On the Analysis of the Bluetooth Time Division Duplex Mechanism

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY On the Analysis of the Bluetooth Time Division Duplex Mechanism IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY 2007 1 On the Analysis of the Bletooth Time Division Dplex Mechanism Gil Zssman Member, IEEE, Adrian Segall Fellow, IEEE, and Uri Yechiali

More information

Cautionary Aspects of Cross Layer Design: Context, Architecture and Interactions

Cautionary Aspects of Cross Layer Design: Context, Architecture and Interactions Cationary Aspects of Cross Layer Design: Context, Architectre and Interactions Vikas Kawadia and P. R. Kmar Dept. of Electrical and Compter Engineering, and Coordinated Science Lab University of Illinois,

More information

(2, 4) Tree Example (2, 4) Tree: Insertion

(2, 4) Tree Example (2, 4) Tree: Insertion Presentation for se with the textbook, Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015 B-Trees and External Memory (2, 4) Trees Each internal node has 2 to 4 children:

More information

CS 153 Design of Operating Systems Spring 18

CS 153 Design of Operating Systems Spring 18 CS 53 Design of Operating Systems Spring 8 Lectre 2: Virtal Memory Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Recap: cache Well-written programs exhibit

More information

Constraint-Driven Communication Synthesis

Constraint-Driven Communication Synthesis Constraint-Drien Commnication Synthesis Alessandro Pinto Goqiang Wang Lca P. Carloni Abstract Constraint-drien Commnication Synthesis enables the atomatic design of the commnication architectre of a complex

More information

arxiv: v2 [cs.cg] 5 Aug 2014

arxiv: v2 [cs.cg] 5 Aug 2014 The θ 5 -graph is a spanner Prosenjit Bose Pat Morin André van Renssen Sander Verdonschot November 5, 2018 arxiv:12120570v2 [cscg] 5 Ag 2014 Abstract Given a set of points in the plane, e sho that the

More information

5 Performance Evaluation

5 Performance Evaluation 5 Performance Evalation his chapter evalates the performance of the compared to the MIP, and FMIP individal performances. We stdy the packet loss and the latency to restore the downstream and pstream of

More information

Vertex Guarding in Weak Visibility Polygons

Vertex Guarding in Weak Visibility Polygons Vertex Garding in Weak Visibility Polygons Pritam Bhattacharya, Sbir Kmar Ghosh*, Bodhayan Roy School of Technology and Compter Science Tata Institte of Fndamental Research Mmbai 400005, India arxi:1409.46212

More information

Resource-Constrained Optimal Scheduling of Synchronous Dataflow Graphs via Timed Automata

Resource-Constrained Optimal Scheduling of Synchronous Dataflow Graphs via Timed Automata 0 th International Conference on Application of Concrrency to System Design Resorce-Constrained Optimal Schedling of Synchronos Dataflo Graphs ia Timed Atomata Waheed Ahmad, Robert de Groote, Philip K.F.

More information

Adaptive Influence Maximization in Microblog under the Competitive Independent Cascade Model

Adaptive Influence Maximization in Microblog under the Competitive Independent Cascade Model International Jornal of Knowledge Engineering, Vol. 1, No. 2, September 215 Adaptie Inflence Maximization in Microblog nder the Competitie Independent Cascade Model Zheng Ding, Kai Ni, and Zhiqiang He

More information

Pavlin and Daniel D. Corkill. Department of Computer and Information Science University of Massachusetts Amherst, Massachusetts 01003

Pavlin and Daniel D. Corkill. Department of Computer and Information Science University of Massachusetts Amherst, Massachusetts 01003 From: AAAI-84 Proceedings. Copyright 1984, AAAI (www.aaai.org). All rights reserved. SELECTIVE ABSTRACTION OF AI SYSTEM ACTIVITY Jasmina Pavlin and Daniel D. Corkill Department of Compter and Information

More information

IP Multicast Fault Recovery in PIM over OSPF

IP Multicast Fault Recovery in PIM over OSPF 1 IP Mlticast Falt Recovery in PIM over OSPF Abstract Relatively little attention has been given to nderstanding the falt recovery characteristics and performance tning of native IP mlticast networks.

More information

Towards Tight Bounds on Theta-Graphs

Towards Tight Bounds on Theta-Graphs Toards Tight Bonds on Theta-Graphs arxiv:10.633v1 [cs.cg] Apr 01 Prosenjit Bose Jean-Lo De Carfel Pat Morin André van Renssen Sander Verdonschot Abstract We present improved pper and loer bonds on the

More information

CS 557 Lecture IX. Drexel University Dept. of Computer Science

CS 557 Lecture IX. Drexel University Dept. of Computer Science CS 7 Lectre IX Dreel Uniersity Dept. of Compter Science Fall 00 Shortest Paths Finding the Shortest Paths in a graph arises in many different application: Transportation Problems: Finding the cheapest

More information

Step N' D(v),p(v) D(w),p(w) D(x),p(x) D(y),p(y) D(z),p(z) 0 u 7,u 3,u 5,u. N (uw) update D(v), D(x), D(y), D(z)

Step N' D(v),p(v) D(w),p(w) D(x),p(x) D(y),p(y) D(z),p(z) 0 u 7,u 3,u 5,u. N (uw) update D(v), D(x), D(y), D(z) Dijsktra s lgorithm Initialiation: N' = {s} for all nodes n If n adjacent to s then D(n) = c(s,n) 6 else D(n) = 8 Loop 9 Find m not in N' sch that D(m) is a minimm 0 dd m to N' pdate D(m) for all n adjacent

More information

Fixed-Parameter Tractability Results for Full-Degree Spanning Tree and Its Dual

Fixed-Parameter Tractability Results for Full-Degree Spanning Tree and Its Dual Fixed-Parameter Tractability Results for Full-Degree Spanning Tree and Its Dual Jiong Guo, Rolf Niedermeier, and Sebastian Wernicke Institut für Informatik, Friedrich-Schiller-Uniersität Jena Ernst-Abbe-Platz

More information

This chapter is based on the following sources, which are all recommended reading:

This chapter is based on the following sources, which are all recommended reading: Bioinformatics I, WS 09-10, D. Hson, December 7, 2009 105 6 Fast String Matching This chapter is based on the following sorces, which are all recommended reading: 1. An earlier version of this chapter

More information

A Hybrid Weight-Based Clustering Algorithm for Wireless Sensor Networks

A Hybrid Weight-Based Clustering Algorithm for Wireless Sensor Networks Open Access Library Jornal A Hybrid Weight-Based Clstering Algorithm for Wireless Sensor Networks Cheikh Sidy Mohamed Cisse, Cheikh Sarr * Faclty of Science and Technology, University of Thies, Thies,

More information

Multi-Way Search Tree ( ) (2,4) Trees. Multi-Way Inorder Traversal. Multi-Way Search Tree ( ) Multi-Way Searching. Multi-Way Searching

Multi-Way Search Tree ( ) (2,4) Trees. Multi-Way Inorder Traversal. Multi-Way Search Tree ( ) Multi-Way Searching. Multi-Way Searching Mlti-Way Search Tree ( 0..) (,) Trees 9 5 7 0 (,) Trees (,) Trees Mlti-Way Search Tree ( 0..) A mlti-ay search tree is an ordered tree sch that Each internal node has at least to children and stores d

More information

Dynamic Maintenance of Majority Information in Constant Time per Update? Gudmund S. Frandsen and Sven Skyum BRICS 1 Department of Computer Science, Un

Dynamic Maintenance of Majority Information in Constant Time per Update? Gudmund S. Frandsen and Sven Skyum BRICS 1 Department of Computer Science, Un Dynamic Maintenance of Majority Information in Constant Time per Update? Gdmnd S. Frandsen and Sven Skym BRICS 1 Department of Compter Science, University of arhs, Ny Mnkegade, DK-8000 arhs C, Denmark

More information

3D SURFACE RECONSTRUCTION BASED ON COMBINED ANALYSIS OF REFLECTANCE AND POLARISATION PROPERTIES: A LOCAL APPROACH

3D SURFACE RECONSTRUCTION BASED ON COMBINED ANALYSIS OF REFLECTANCE AND POLARISATION PROPERTIES: A LOCAL APPROACH 3D SURFACE RECONSTRUCTION BASED ON COMBINED ANALYSIS OF REFLECTANCE AND POLARISATION PROPERTIES: A LOCAL APPROACH Pablo d Angelo and Christian Wöhler DaimlerChrysler Research and Technology, Machine Perception

More information

Pipelined van Emde Boas Tree: Algorithms, Analysis, and Applications

Pipelined van Emde Boas Tree: Algorithms, Analysis, and Applications This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the IEEE INFOCOM 007 proceedings Pipelined van Emde Boas Tree: Algorithms, Analysis,

More information

Design and Optimization of Multi-Faceted Reflectarrays for Satellite Applications

Design and Optimization of Multi-Faceted Reflectarrays for Satellite Applications Design and Optimization of Mlti-Faceted Reflectarrays for Satellite Applications Min Zho, Stig B. Sørensen, Peter Meincke, and Erik Jørgensen TICRA, Copenhagen, Denmark ticra@ticra.com Abstract The design

More information

Assigning AS Relationships to Satisfy the Gao-Rexford Conditions

Assigning AS Relationships to Satisfy the Gao-Rexford Conditions Assigning AS Relationships to Satisfy the Gao-Rexford Conditions Lca Cittadini, Giseppe Di Battista, Thomas Erlebach, Marizio Patrignani, and Massimo Rimondini Dept. of Compter Science and Atomation, Roma

More information

Efficient and Accurate Delaunay Triangulation Protocols under Churn

Efficient and Accurate Delaunay Triangulation Protocols under Churn Efficient and Accrate Delanay Trianglation Protocols nder Chrn Dong-Yong Lee and Simon S. Lam Department of Compter Sciences The University of Texas at Astin {dylee, lam}@cs.texas.ed November 9, 2007 Technical

More information

Chapter 5. Plane Graphs and the DCEL

Chapter 5. Plane Graphs and the DCEL Chapter 5 Plane Graphs and the DCEL So far we hae been talking abot geometric strctres sch as trianglations of polygons and arrangements of line segments withot paying mch attention to how to represent

More information

On shortest-path all-optical networks without wavelength conversion requirements

On shortest-path all-optical networks without wavelength conversion requirements Research Collection Working Paper On shortest-path all-optical networks withot waelength conersion reqirements Athor(s): Erlebach, Thomas; Stefanakos, Stamatis Pblication Date: 2002 Permanent Link: https://doi.org/10.3929/ethz-a-004446054

More information

Efficient Scheduling for Periodic Aggregation Queries in Multihop Sensor Networks

Efficient Scheduling for Periodic Aggregation Queries in Multihop Sensor Networks 1 Efficient Schedling for Periodic Aggregation Qeries in Mltihop Sensor Networks XiaoHa X, Shaojie Tang, Member, IEEE, XiangYang Li, Senior Member, IEEE Abstract In this work, we stdy periodic qery schedling

More information

A sufficient condition for spiral cone beam long object imaging via backprojection

A sufficient condition for spiral cone beam long object imaging via backprojection A sfficient condition for spiral cone beam long object imaging via backprojection K. C. Tam Siemens Corporate Research, Inc., Princeton, NJ, USA Abstract The response of a point object in cone beam spiral

More information

Image Restoration Image Degradation and Restoration

Image Restoration Image Degradation and Restoration Image Degradation and Restoration hxy Image Degradation Model: Spatial domain representation can be modeled by: g x y h x y f x y x y Freqency domain representation can be modeled by: G F N Prepared By:

More information

Triangle Contact Representations

Triangle Contact Representations Triangle Contact Representations Stean Felsner elsner@math.t-berlin.de Technische Uniersität Berlin, Institt ür Mathematik Strasse des 7. Jni 36, 0623 Berlin, Germany Abstract. It is conjectred that eery

More information

Non-convex Representations of Graphs

Non-convex Representations of Graphs Non-conex Representations of Graphs Giseppe Di Battista, Fabrizio Frati, and Marizio Patrignani Dip. di Informatica e Atomazione Roma Tre Uniersity Abstract. We sho that eery plane graph admits a planar

More information

The Impact of Avatar Mobility on Distributed Server Assignment for Delivering Mobile Immersive Communication Environment

The Impact of Avatar Mobility on Distributed Server Assignment for Delivering Mobile Immersive Communication Environment This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the ICC 27 proceedings. The Impact of Avatar Mobility on Distribted Server Assignment

More information

Select-and-Protest-based Beaconless Georouting with Guaranteed Delivery in WSNs

Select-and-Protest-based Beaconless Georouting with Guaranteed Delivery in WSNs Select-and-Protest-based Beaconless Georouting ith Guaranteed Deliery in WSNs Hanna Kalosha, Amiya Nayak, Stefan Rührup, Ian Stojmenoić School of Information Technology & Engineering Uniersity of Ottaa,

More information

FPGA IMPLEMENTATION OF ADAPTIVE TEMPORAL KALMAN FILTER FOR REAL TIME VIDEO FILTERING March 15, 1999

FPGA IMPLEMENTATION OF ADAPTIVE TEMPORAL KALMAN FILTER FOR REAL TIME VIDEO FILTERING March 15, 1999 FPGA IMPLEMENTATION OF ADAPTIVE TEMPORAL KALMAN FILTER FOR REAL TIME VIDEO FILTERING March 15, 1999 Robert D. Turney +, Ali M. Reza, and Justin G. R. Dela + CORE Solutions Group, Xilinx San Jose, CA 9514-3450,

More information

Minimal Edge Addition for Network Controllability

Minimal Edge Addition for Network Controllability This article has been accepted for pblication in a ftre isse of this jornal, bt has not been flly edited. Content may change prior to final pblication. Citation information: DOI 10.1109/TCNS.2018.2814841,

More information

Friend of My Friend: Network Formation with Two-Hop Benefit

Friend of My Friend: Network Formation with Two-Hop Benefit Friend of My Friend: Network Formation with Two-Hop Benefit Elliot Ansheleich, Onkar Bhardwaj, and Michael Usher Rensselaer Polytechnic Institte, Troy NY, USA Abstract. How and why people form ties is

More information

Object Pose from a Single Image

Object Pose from a Single Image Object Pose from a Single Image How Do We See Objects in Depth? Stereo Use differences between images in or left and right eye How mch is this difference for a car at 00 m? Moe or head sideways Or, the

More information

Alliances and Bisection Width for Planar Graphs

Alliances and Bisection Width for Planar Graphs Alliances and Bisection Width for Planar Graphs Martin Olsen 1 and Morten Revsbæk 1 AU Herning Aarhs University, Denmark. martino@hih.a.dk MADAGO, Department of Compter Science Aarhs University, Denmark.

More information

Computer User s Guide 4.0

Computer User s Guide 4.0 Compter User s Gide 4.0 2001 Glenn A. Miller, All rights reserved 2 The SASSI Compter User s Gide 4.0 Table of Contents Chapter 1 Introdction...3 Chapter 2 Installation and Start Up...5 System Reqirements

More information

Online Optimal Smoothing of VBR Stream Aggregations in Systems with Available Bandwidth Constraints

Online Optimal Smoothing of VBR Stream Aggregations in Systems with Available Bandwidth Constraints Online Optimal moothing of VBR tream Aggregations in ystems ith Available Bandidth Constraints Pietro Camarda, Antonio e Gioia, omenico triccoli Politecnico di Bari ip. di Elettrotecnica ed Elettronica

More information

Congestion-adaptive Data Collection with Accuracy Guarantee in Cyber-Physical Systems

Congestion-adaptive Data Collection with Accuracy Guarantee in Cyber-Physical Systems Congestion-adaptive Data Collection with Accracy Garantee in Cyber-Physical Systems Nematollah Iri, Lei Y, Haiying Shen, Gregori Calfield Department of Electrical and Compter Engineering, Clemson University,

More information

Point Location. The Slab Method. Optimal Schemes. The Slab Method. Preprocess a planar, polygonal subdivision for point location queries.

Point Location. The Slab Method. Optimal Schemes. The Slab Method. Preprocess a planar, polygonal subdivision for point location queries. Point Location The Slab Method Prerocess a lanar, olygonal sbdiision for oint location qeries. = (18, 11) raw a ertical line throgh each ertex. This decomoses the lane into slabs. In each slab, the ertical

More information

Maximum Weight Independent Sets in an Infinite Plane

Maximum Weight Independent Sets in an Infinite Plane Maximm Weight Independent Sets in an Infinite Plane Jarno Nosiainen, Jorma Virtamo, Pasi Lassila jarno.nosiainen@tkk.fi, jorma.virtamo@tkk.fi, pasi.lassila@tkk.fi Department of Commnications and Networking

More information

On Bichromatic Triangle Game

On Bichromatic Triangle Game On Bichromatic Triangle Game Gordana Manić Daniel M. Martin Miloš Stojakoić Agst 16, 2012 Abstract We stdy a combinatorial game called Bichromatic Triangle Game, defined as follows. Two players R and B

More information

Available online: 25 Oct To link to this article:

Available online: 25 Oct To link to this article: This article was downloaded by: [Whan Uniersity] On: 5 Febrary 202, At: 9:06 Pblisher: Taylor & Francis Informa Ltd Registered in England and Wales Registered Nmber: 072954 Registered office: Mortimer

More information

A choice relation framework for supporting category-partition test case generation

A choice relation framework for supporting category-partition test case generation Title A choice relation framework for spporting category-partition test case generation Athor(s) Chen, TY; Poon, PL; Tse, TH Citation Ieee Transactions On Software Engineering, 2003, v. 29 n. 7, p. 577-593

More information

Tdb: A Source-level Debugger for Dynamically Translated Programs

Tdb: A Source-level Debugger for Dynamically Translated Programs Tdb: A Sorce-level Debgger for Dynamically Translated Programs Naveen Kmar, Brce R. Childers, and Mary Lo Soffa Department of Compter Science University of Pittsbrgh Pittsbrgh, Pennsylvania 15260 {naveen,

More information

Multiple-Choice Test Chapter Golden Section Search Method Optimization COMPLETE SOLUTION SET

Multiple-Choice Test Chapter Golden Section Search Method Optimization COMPLETE SOLUTION SET Mltiple-Choice Test Chapter 09.0 Golden Section Search Method Optimization COMPLETE SOLUTION SET. Which o the ollowing statements is incorrect regarding the Eqal Interval Search and Golden Section Search

More information

Digital Image Processing Chapter 5: Image Restoration

Digital Image Processing Chapter 5: Image Restoration Digital Image Processing Chapter 5: Image Restoration Concept of Image Restoration Image restoration is to restore a degraded image back to the original image while image enhancement is to maniplate the

More information

arxiv: v1 [cs.cg] 1 Feb 2016

arxiv: v1 [cs.cg] 1 Feb 2016 The Price of Order Prosenjit Bose Pat Morin André van Renssen, arxiv:160.00399v1 [cs.cg] 1 Feb 016 Abstract We present tight bonds on the spanning ratio of a large family of ordered θ-graphs. A θ-graph

More information