Localized Minimum Spanning Tree Based Multicast Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Sensor Networks
|
|
- MargaretMargaret Beryl Gordon
- 5 years ago
- Views:
Transcription
1 Localized Minimum Spanning Tree Baed Multicat Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Senor Network Hanne Frey Univerity of Paderborn D-3398 Paderborn Françoi Ingelret LCAV, EPFL CH-115 Lauanne, Switzerland David Simplot-Ryl IRCICA/LIFL, Univ. Lille 1 CNRS UMR 822, INRIA Futur, France David.Simplot@lifl.fr Abtract We preent a localized geographic multicat cheme, MSTEAM, baed on the contruction of local minimum panning tree (MST), that require information only on 1- hop neighbor. A meage replication occur when the MST panning the current node and the et of detination ha multiple edge originated at the current node. Detination panned by thee edge are grouped together, and for each of thee ubet the bet neighbor i elected a the next hop. Thi election i baed on a cot over progre metric, where the progre i approximated by ubtracting the weight of the MST over a given neighbor and the ubet of detination to the weight of the MST over the current node and the ubet of detination. Since uch greedy cheme may lead the meage to a void area (i.e., no neighbor providing poitive progre), we propoe a new multicat generalization of the well-known face recovery mechanim. We provide a theoretical analyi proving that MSTEAM i loop-free, and achieve delivery of the multicat meage a long a a path to the detination exit. Our reult demontrate that MSTEAM, outperform the bet exiting localized multicat cheme, and i almot a efficient a a centralized cheme in high denitie. 1 Introduction We conider multi-hop ad hoc and enor network, and localized routing cheme, where node maintain knowledge only about patially nearby node. Thu, unlike in centralized cheme, change in the network require only local meage exchange. Becaue of mall batterie, routing mut be energy-efficient to maximize network lifetime. We epecially conider geographic routing, where each node know it own location, and where the next hop i choen baed on the poition of neighbor with repect to the detination. Almot all cheme are baed on greedy heuritic: the bet neighbor according to an evaluation function i elected. For intance, a olution i to chooe the cloet neighbor to the detination. Obviouly, the meage may be blocked (i.e., no neighbor cloer to the detination than the current node). To guarantee delivery, an additional cheme, face routing [1], i generally ued to ecape from thee cae. In multicat routing, a meage i to be delivered from a ource node to a et of detination. When uing geographic routing to olve the multicat problem, the mot challenging quetion i to decide when the meage hould be replicated into different packet. The bet olution i to route the meage uing a common path among all detination, and then to replicate it at the end of thi path. Of coure, the difficulty lie in determining the bet common path by uing only local information at each hop. Moreover, even with a global knowledge, thi problem i NP-complete. In thi paper, we preent a Minimum Spanning Tree baed Energy Aware Multicat cheme (MSTEAM), a generalization for the multicat cae of the cot over progre framework decribed in [6]. In uch cheme, greedy routing i done by electing at each hop the neighbor v providing the mallet ratio between the cot needed to tranmit the meage to v and the progre toward the detination provided by v. We ue a minimum panning tree (MST) a a backbone to decide when a meage ha to be replicated. In addition, we ue an MST-baed localized next hop election cheme which conider energy conumption of ending a meage to a neighbor v over the progre achieved thank to thi node. To ecape from void area, MSTEAM ue a multicat generalization of the face recovery mechanim. A key apect of our olution i that it highly fit wirele dynamic network ince it i localized. Indeed, forwarding node need to contruct local MST uing only information on their 1-hop neighborhood, which may be obtained thank to beacon meage. MSTEAM i alo well-uited for contrained mobile device, ince an MST may be efficiently computed in time O(n log n). Moreover, MSTEAM i loop-free and alway achieve delivery /8/$25. c 28 IEEE
2 (a) Unit dik graph G = (V, E). (b) Euclidean MST (V ). (c) Gabriel graph of G. Figure 1: A unit dik graph G = (V,E) and two ubgraph. 2 Preliminarie 2.1 Network model A wirele network i a graph G = (V,E), V being the et of vertice (network node) and E V 2 the et of communication link: there exit a pair (u,v) E if u i phyically able to communicate with v. The neighborhood et N(u) of a node u i defined a: N(u) = {v V v u (u,v) E}. The denity d i the average number of neighbor per node. The et of edge E depend on the underlying phyical model. The mot well-known one i the unit dik graph (UDG) model. Given a et of node V and a maximum communication range R, E i defined a: E = {(u,v) V 2 u v uv R}, uv being the Euclidean ditance between u and v. Fig. 1a provide an example of a UDG. For a given multicat tak, the et of detination i denoted a T = {,...,t k }. We aume that node can adjut their tranmitting power, i.e., ending a meage from u to v require the mallet poible power. We aume that node collec-hop neighborhood information by uing beacon. 2.2 MAC layer model When a meage i replicated, the forwarding node end the packet to more than one neighbor. We conider two MAC layer model. In the unicat MAC layer, ending a meage to j next hop neighbor i performed by j independent unicat tranmiion. In the multicat MAC layer, ending a meage i done by only one tranmiion, exploiting the broadcat capabilitie of the wirele media. A detailed invetigation on how a reliable communication i achieved either in the unicat or the multicat MAC layer i beyond the cope of thi work. 2.3 Geometric concept The minimum panning tree (MST) i a well-known graph contruction: a tree (u 1,...,u n ) i an MST if it weight (u 1,...,u n ) i minimal. The weight of the tree denote the um of the weight over all tree edge. In a Euclidean MST, illutrated by Fig. 1b, the weight of an edge i equal to it Euclidean length. Such tree may be efficiently computed in time O(nlog n). Note that we ue throughout the paper the notation (S), which i equivalent to (u 1,...,u n ) for any et S = {u 1,...,u n }. The Steiner tree problem i imilar to the MST one: the goal i to contruct a tree Γ(u 1,...,u n ) with minimal weight, while allowing the inertion of additional intermediate Steiner point, to reduce the weight of the reulting panning tree. Thi problem i NP-complete. A planar graph i a graph in which no edge interect. Gabriel graph contruction (cf. Fig. 1c) i a localized contruction method baed on a geometric concept, introduced in [4]. Starting from a UDG G = (V, E), each edge (u,v) E i removed if there exit a vertex w located inide the circle U(u,v) of diameter uv centered at the midpoint of the egment [uv]. Thi graph i intereting for decentralized network ince the removal algorithm may be applied independently by each node, and doe not require any meage exchange. 3 Related Work One of the firt multicat algorithm for ad hoc network i MIP [11], a variant of the BIP algorithm. In BIP, a tree i built from a ource node by adding at each tep the le expenive node. Both cheme are centralized they cannot be applied in a ditributed network without a large overhead, and MIP tree i compoed of ubtree coming from BIP, which i explicitly built for broadcat. A a reult, routing i not optimal becaue there i not enough path reue. The pioneering work in localized multicat i [7], which decribe the Poition-Baed Multicat (PBM) protocol. Forwarding i performed by determining the neighbor ub-
3 et maximizing a weighted um over two conflicting objective: maximizing the number of next hop and minimizing the remaining ditance to the detination. The weight of the two objective i controlled by a parameter λ [,1]. An early packet replication i achieved by a λ cloe to. Le frequent replication are obtained with λ cloe to 1. PBM require teting each poible ubet and electing the one maximizing the objective function. The complexity of PBM i thu O(2 m ) for m neighbor. To recover from void area, face recovery compute an average point p over the detination and tart traveral of the face interected by the traight line p. When a detination can be handled in greedy mode again, the meage i replicated and the packet i handled in greedy mode again, while the other part continue with face recovery. Even under the Gabriel graph contruction, routing loop may occur with PBM. The protocol decribed in [2] perform meage forwarding along a backbone defined by contructing a panning tree over the ource node and the detination. Three panning tree heuritic are conidered. For each panning tree edge t originated at the tart node, a ingle multicat intance i ent to the end node t. The detination ubet addreed by thi meage conit of thoe detination that are reachable over thi tree edge. Thi i comparable to the replication trategy decribed in thi work. However, the mechanim decribed in [2] differ from MSTEAM in the following way: firt, any meage i forced to follow a backbone edge t until it eventually arrive at the detination. Only when arrived at thi node the meage might be replicated again. Thi i in contrat to MSTEAM where premature meage replication are poible at any node. Second, in contrat to MSTEAM, all detination reachable over t in the backbone will be diconnected whenever node t i not reachable from the ource node. Third, multicat routing decribed in [2] i only concerned with localized contruction of multicat overlay. Routing a meage along an overlay edge uv i done in a centralized way by calculating the hortet path from u to v. In thi work, we decribe a localized metric in order to elect an energy-efficient next hop by uing information about the detination and the neighbor only. Fourth, with global information, recovery from greedy routing failure i not an iue in PBM. A recent localized cheme, Geographic Multicat Routing (GMR), can be found in [8]. The algorithm i baed on the cot over progre framework [6] and, oppoed to PBM, doe not require etting a proper network-dependent parameter λ. In the unicat cae, cot over progre denote the relation between cot produced in the next hop and the progre achieved by thi next hop. The multicat extenion of thi framework minimize the number of elected next hop over the progre achieved by the elected et. Progre i the difference between the um over all individual ditance between the current node and detination, and the um over ditance of each next hop and the detination covered by thi node. A node v cover a detination if thi detination i cloet to v compared to all other next hop. In contrat to [7], thi cheme decribe alo an efficient neighbor et election trategy which reduce the cot from O(2 m ) to O(mk min(m,k) 3 ) in the wort cae, where k i the number of detination and m the number of neighbor. Since thi cheme i greedy, a meage can be blocked. The cheme decribe a face recovery trategy which applie traditional unicat face traveral for each detination. To ave bandwidth, however, face meage traveling the ame face are aggregated into a ingle meage. All the cheme conider hop count a the optimization criteria. When the hardware provide ignal trength adaptation, a ingle tranmiion over a large ditance can be more expenive than many mall-ditance tranmiion. The firt localized cheme conidering thi poibility i decribed in [9]. Thi cheme, GMREE, i an extenion of GMR conidering the cot of the total energy conumption of the next tranmiion. 4 MST baed Multicat In thi ection, we provide a motivation of the goodne of uing Euclidean MST to decide a meage replication, and to determine the bet next hop node for a given et of detination. Unle pecified, MST alway denote Euclidean MST. 4.1 Why MST-baed Backbone? When global information i available, finding the optimal multicat tree i poible, though, being an NPcomplete problem. Our goal i to define a localized heuritic to find a tree with a low cot. Quantifying low in term of a formal analyi i beyond our cope, but we will how empirically that the cot obtained thank to the decribed heuritic doe not ignificantly depart from an efficient centralized olution. The quality of an algorithm depend on two factor: The meage replication trategy, which hould aim at meage forwarding along a cot effective backbone. The next hop election, which hould aim at coteffective meage forwarding along thi backbone. Meage forwarding along an edge of the multicat backbone elect the bet neighbor with repect to the conidered metric (e.g., hop count, Euclidean ditance) and the detination reachable along thi backbone edge. Suppoe being the ource and T = {,...,t k } the detination. Let C(u, v) denote the weight of the hortet weighted path from u to v. Under the unicat MAC
4 t 4 t 4 (a) All detination in the ame et. (b) Two ubet {, } and {, t 4 }. Figure 2: The replication trategy ued by MSTEAM: (,,,,t 4 ) i ued to replicate the meage at node. aumption, a weighted Steiner tree Γ(,,...,t k ), uing C(u, v) a the cot function, define the cot optimal multicat backbone. We do not aume that a node i aware of all network node to compute uch a Steiner tree. Moreover, we do not aume that the cot function C(u,v) i even known to the node. Thu computing a Steiner tree a an optimal backbone i impoible in thi general etting. A an approximation we ue the concept of weighted MST, which may be computed even by contrained device. Since the energy model i unknown, we approximate the routing cot by the implified aumption that uv < uw implie C(u, v) < C(u, w). Then, the weighted MST i equivalent to the Euclidean MST. Under the multicat MAC aumption, energy aving are poible at node where the meage i replicated. At thi point, any et of next hop might produce the ame routing cot. In a mall cale multicat, it might thu be more efficient to perform a ingle direct large broadcat tranmiion intead of many mall tranmiion. In a large cale multicat, however, we expect that the cot aving which are poible at replication node will be outweighed by the cot required to route the meage between thoe replication point. Thu, we ue the ame MST approximation under the multicat MAC aumption. 4.2 Replication trategy Let be the current forwarding node and T i T the et of detination handled by. Node calculate the MST ({} T i ) over itelf and T i. Thi tree provide the backbone to ue to reach all detination in T i from. The meage thu ha to be routed along the edge of thi tree, and mut be replicated at node if multiple path tart at thi node. Actually, each of thee path i repreented by an edge originating at, and pan a ubet of detination. Thee are forming exactly a detination ubet to which ha to end an individual meage copy. Thi trategy i illutrated in Fig. 2, where handle the detination,, and t 4. In Fig. 2a, the MST (,,,,t 4 ) ha only one edge originated at node, o all detination are grouped together. In thi cae, the meage i not replicated and will be routed along (, ). In Fig. 2b, there are two edge originated at node : the firt one pan and, the econd one pan and t 4. The meage i thu replicated into two packet. The firt one i routed along (, ) toward {, }, the econd one i routed along (, ) toward {,t 4 }. 4.3 Energy-efficient metric Greedy routing i done with a generalization of the framework decribed in [6] for the multicat cae. In thi framework, two thing need to be etimated: the cot (in term of energy conumption) of chooing a given neighbor v a the next hop, and the progre toward the detination ubet T i provided by the replication trategy. The neighbor with the mallet cot over progre ratio i choen a the next hop for T i. Since the current forwarding node u conider the MST ({u} T i ) a the backbone to route the meage toward T, ({u} T i ) may be ued a a local etimation of the remaining ditance the meage ha to travel. Conidering a neighbor v, ({u} T i ) ({v} T i ) i an etimation of the progre provided by v toward T i. The greedy cheme aume that the current node u alway elect a candidate node v providing poitive progre. Sending a meage from a node u to it neighbor v require an amount of energy denoted f(u,v). Thu, the cot over progre ratio Q(u,v,T) at node u of a neighbor node v i: Q(u,v,T) = f(u, v) ({u} T) ({v} T). The expreion of Q(u,v,T) i a generalization of the unicat routing metric f(u,v)/( ut vt ) decribed in [6]. In thi connection, u i the current node, v the next hop candidate, and t the detination node. When T = {t}, the expreion Q(u,v,T) reduce to thi formula ince an MST over a pair of node i the traight line connecting them.
5 u 8 u 7 v u (,,, ) u 9 u 1 u2 F u 6 u3 u 4 u 5 (a) Node i concave with repect to {,, }. (b) Traveral of the face interected by the MST edge. Figure 3: Minimum panning tree baed face multicat routing i ued in order to recover from concave node. 4.4 Recovery trategy Suppoe that in Fig. 3a ha to end a meage toward {,, }. Detination are connected over (, ) of (,,, ). However, may not elect any of it neighbor u and v, ince they atify (u,,, ), (v,,, ) > (,,, ) : the meage i blocked. Thi happen whether any of thee detination are reachable from or not. We denote uch node a concave with repect to the detination ubet. Face i a unicat routing cheme that can be ued to handle greedy routing failure for each detination individually. We decribe for the firt time a multicat extenion of face that can handle all detination at once. Similar to unicat face routing, the multicat cheme require a topology control mechanim which tranform the underlying network into a planar graph. Here, we employ the Gabriel graph which require the network to comply to the UDG model. A depicted in Fig. 3b, a planar graph partition the plane into face that can be travered by employing the left/right hand rule; a node end the meage along the edge which i lying next in clockwie/counterclockwie direction of the edge it wa received from. For intance, when tarting at node in Fig. 3b, the face F will be travered along the path u 1 u 2...u 9 when uing the right hand rule. Unicat face recovery ha different variant; We employ the one that tranmit the meage along the equence of face that are interected by the line t connecting the ource to the detination t. When the meage arrive at a node cloer to t than, greedy routing i ued again. With a Gabriel graph, thi mechanim implifie to travering the firt face. The idea of multicat face i a follow. Suppoe that a node ha computed a detination ubet T i for which no better greedy neighbor exit. Let t be the edge connecting to ({} T i ). By uing any of the two rule right or left hand node tart traveral of the face interected by the outgoing MST edge t. Face traveral continue until the meage arrive at a node u atifying ({u} T i ) < ({} T i ). At thi node, the detination ubet T i i handled in greedy mode again. A pecial cae occur when no uch node u i found during face traveral. In thi cae, to avoid loop, the meage i dropped if it i about to be ent again over the firt face traveral edge in the ame direction. Referring to Fig. 3b, edge connect to (,,, ). Since i concave with repect to {,, }, it tart traveral of face F, i.e., the face interected by. Auming the right hand rule, face traveral viit node u 1, u 2, and u 3. Since u 3 i the firt one atifying (u 3,,, ) < (,,, ), it handle the detination ubet {,, } in greedy mode again. 5 The MSTEAM protocol 5.1 Decription Given the detination T = {,...,t k }, the ource firt decide whether a meage replication occur. It thu compute the MST ({} T), and group all detination panned by edge originated at (cf. Sec. 4.2). For each ubet T i T obtained, compute a ubet N i () N() containing all neighbor v N() uch that ({v} T i ) < ({} T i ) (neighbor providing poitive progre toward T i ). If N i (), compute the cot over progre ratio Q(,v,T i ) for each neighbor v N i () (refer to Sec. 4.3). The neighbor providing the bet ratio i the next hop toward T i. If N i () =, then the meage i blocked, and face recovery mut be ued. Node applie the trategy preented in Sec. 4.4 to elect the face node v a the router toward T i. The proce i repeated until all ubet T i have been conidered. In the unicat MAC cae, a packet i ent for each ubet T i, with the et of detination, the elected router and the mode (greedy or face). With face routing, the packet alo contain the firt edge travered by the packet in thi mode, and the weight of the MST at the tarting node ( ({} T i ) in thi example). If multicat MAC i conidered, thi information i aggregated into the ame packet. Thi mean that the latter will contain a lit of all next hop
6 t t t 7 t 9 t 5 t 6 t 7 t 9 t 5 t 6 t 8 t 4 (a) The MST ({} T). t 8 t 4 (b) The multicat tree produced by MSTEAM. Figure 4: A ample run of MSTEAM for a et T of 1 detination and a denity d = 35. and for each of them, the et of detination they erve, the mode to ue and the additional face information. In both cae, the packet i ent uing the minimum energy needed for ucceful tranmiion to the next hop(). When a node u receive a packet, it check whether it i a forwarder. If not, the packet i dropped. If o, it check the routing mode currently ued for the given et of detination T i T. In greedy mode, u repeat the proce followed by. In face mode, it check whether it i cloer to the detination (e.g., ({u} T i ) i le than the weight written in the packet). If o, it handle T i in greedy mode. If not, face recovery i applied once again (refer to Sec. 4.4). Of coure, if u i a detination, it remove itelf from T i. Fig. 4 how a ample run of MSTEAM over a random network. Figure 4a give the MST ({} T), while Fig. 4b provide the multicat tree produced by MSTEAM. The MST panning all detination wa ued at the ource. Since two edge originate at, the meage ha been replicated into two packet at. The firt one wa ent toward t and along (,t ), while the econd one wa ent toward the other node along (, ). Figure 4b how that MSTEAM wa able to follow thee edge in an effective way. One can alo oberve that the replication trategy correctly work by looking at the path followed to reach t 4 and t 9 from the node cloe to t 5. Intead of following (t 5,t 9 ), MSTEAM routed the meage along a common path among t 4 and t 9, and then replicated it at the end of thi path. Regarding the complexity of MSTEAM, a node in greedy mode compute an MST for the replication trategy, which ha a time complexity in O(k log k), k being the number of detination. In the wort cae, all detination are handled eparately. For each of them and for each neighbor, a new MST i computed. In thi cae, the complexity in time of MSTEAM i O(mk 2 log k) for the greedy mode, m being the number of neighbor. Thi complexity may be better etimated ince a MST ha a maximum degree of 6, regardle of k. Since face mode ha a complexity in O(k log k), the complexity of MSTEAM in the wort cae i O(mk log k), which i lower than the complexity of GM- REE (O(mk min(m,k) 3 ), till conidering the wort cae). 5.2 Correctne of MSTEAM We now prove that MSTEAM i loop-free and guarantee delivery. We aume the UDG model with radiu R, and the ue of Gabriel graph to contruct the planar graph ued during face recovery. The proof of the two lemma may be found in [3]. Lemma 1 Let be a node where face recovery for the detination {,...,t k } wa tarted, and t the edge connecting to (,,...,t k ). If can reach at leat one detination, then traveral of face F, interected by t, alway arrive at a node u atifying ({u,,...,t k }) < ({,,...,t k }). Lemma 2 A meage addreed to S = {,...,t k } will either be dropped, replicated, or delivered after a finite number of tep. Theorem 1 The decribed multicat routing cheme MSTEAM i loop-free and provide delivery guarantee. Proof 1 Let be the ource and T the et of detination. In MSTEAM, a meage i either kept or replicated in a forwarding tep, and two meage are never merged. Thu, for each poible ubet S T, at mot one intance of a meage addreing thi et may exit. It follow that the number of poible meage intance i finite. Finally, due to Lemma 2 each intance i handled a finite number of forwarding tep. It follow that the total number of forwarding tep i finite, i.e., no routing loop occur. Let t be an element of T. Suppoe there exit a path from to t, and that t i dropped during routing. A meage might only be dropped when it i handled in face mode. Let u be the node where face traveral wa tarted, and S the ubet of detination handled in face mode. Since the meage i dropped, all node v viited during face traveral atifie ({v} S) ({u} S). Since u wa reached by, and ince can reach t, u can reach at leat one node in S. By Lemma 1, it follow that face traveral will viit a node w atifying ({w} S) < ({u} S), a contradiction.
7 1 1 1 MSTEAM with unicat face recovery Full MSTEAM cheme MSTEAM with uniicat face recovery Full MSTEAM cheme 8 8 Total energy conumption Total energy conumption Average denity (a) Unicat MAC layer Average denity (b) Multicat MAC layer. Figure 5: Performance of the MST baed face recovery mechanim ued in MSTEAM (1 detination node). 6 Performance evaluation 6.1 Simulation etting We ued a home-made imulator with the UDG model. Node have a maximum range R = 25, and a number of them are randomly put on an area of ize to obtain a given denity. The 95% confidence interval i given on each figure. The energy conumption f(u,v) of a node u tranmitting a meage to a node v i: f(u,v) = uv α + c e, α being the path lo contant. We ued α = 4 and c e = 1 8, ued in [9]. We elected GMREE [9] a it i the only other geographic energy-efficient localized multicat cheme. GM- REE ue an underlying ubgraph, and author howed that the Local Shortet Path Tree (LSPT) [1] uing f(u, v) a the cot function i the mot efficient one. We thu retricted our imulation of GMREE to the LSPT. GMREE wa compared in [9] to ESP (Energy-Efficient Shortet Path), the centralized application of Dijktra hortet path tree, uing f(u,v) a the cot function. We found that ESP ha variable performance baed on the maximum communication range: thank to it centralized knowledge, ESP generate efficient route, where the length of each hop i cloe to the optimal, while replicating meage too often. When the communication range i too low, route are not enough efficient to counterbalance the wate coming from replication. We believe that thi problem ha been overlooked in [9]. We thu ued another centralized cheme, uing an approximated weighted Steiner tree [5] a the multicat tree. 6.2 Experimental reult Fig. 5 how the efficiency of the new MST-baed face recovery mechanim. Small denitie were ued, to maximize the number of void area. The new cheme i by far uperior to the baic one: conidering the denity d = 5, energy conumption i divided by approximately 27 in Fig. 5a and 16 in Fig. 5b. Even with d = 1, the ratio i till around 1 in both figure. A the denity increae, the number of void area decreae and face recovery i le ued, o the two cheme become equal. Even in the multicat MAC layer cae, where packet are aggregated before tranmiion, the baic cheme i inferior becaue each detination i handled eparately, o that the protocol quickly ue different path and lead to increaed energy conumption. Fig. 6 how reult at increaing denity. A aforementioned, ESP replicate the meage too early and i le efficient a the denity increae. The Steiner cheme ue a centralized backbone and ha very good reult for all denitie. A the denity increae, the Steiner tree become cloer to the optimal tree, and energy conumption decreae. MSTEAM i able to provide cloe reult: when d = 4, it conume only 6% more energy than the Steiner cheme in Fig. 6a and 8% more in Fig. 6b. MSTEAM i alway better than GMREE: ince face routing i not ued in uch denitie, the two reaon are the replication trategy and the MST-baed progre etimation, which i better than the one ued in GMREE. Thi i true even in Fig. 6b where the multicat wirele advantage i conidered. Overall, thi cae doe not change the relative poition of all cheme, and jut lead to lower energy conumption. We finally give reult at increaing number of detination in Fig. 7 (d = 35). A expected, the energy conumption of all cheme increae with the number of detination, ince more packet and more path are generated. The increae i not fully linear becaue of the common path ued among detination. However, Steiner cheme and MSTEAM are more calable than the other one ince their energy conumption increae more lowly. For intance, when changing the number of detination from 1 to 3, the conumption of MSTEAM in Fig. 7a i multiplied by 1.7 while the one of GMREE i multiplied by 1.9. Thi difference i obviouly viible in both unicat and multicat MAC layer, and i caued by a better path reue trategy.
8 Total energy conumption ESP GMREE on LSPT MSTEAM Steiner Total energy conumption ESP GMREE on LSPT MSTEAM Steiner Average denity (a) Unicat MAC layer Average denity (b) Multicat MAC layer. Figure 6: Performance of all elected cheme at increaing denity (1 detination node). Total energy conumption ESP GMREE on LSPT 3.5 MSTEAM Steiner Total energy conumption ESP GMREE on LSPT 3.5 MSTEAM Steiner Number of detination node (a) Unicat MAC layer Number of detination node (b) Multicat MAC layer. Figure 7: Performance of all elected cheme at increaing number of detination (d = 35). 7 Concluion and future work We have preented MSTEAM, a geographic localized multicat cheme, that ue an MST a an approximation of the optimal backbone. Beide guaranteeing delivery, our protocol i well-uited to ad hoc and enor network becaue it i localized and ha low time complexity. We experimentally demontrated that MSTEAM i very energyefficient, even compared to a centralized cheme, and outperform the bet exiting localized multicat protocol. We plan to improve MSTEAM uing a Steiner tree approximation. We focued on MST becaue it i a reaonable approximation of an optimal tree. Moreover, it computation ha a very low time complexity, while a Steiner tree introduce more complexity. However, under the exponential path lo model ued for our experiment, calculating a Steiner tree i poible and one can expect better energy aving. Of coure, a trade-off i then needed. Reference [1] P. Boe, P. Morin, I. Stojmenović, and J. Urrutia. Routing with guaranteed delivery in ad hoc wirele network. ACM Wirele Network, 7(6), Nov. 21. [2] K. Chen and K. Nahrtedt. Effective location-guided overlay multicat in mobile ad hoc network. International Journal of Wirele and Mobile Computing, 3, 25. Special iue on Group Communication in Ad Hoc Network. [3] H. Frey, F. Ingelret, and D. Simplot-Ryl. Localized minimum panning tree baed multicat routing with energy-efficient guaranteed delivery in ad hoc and enor network. Technical Report RT-337, INRIA, 27. [4] K. Gabriel and R. Sokal. A new tatitical approach to geographic variation analyi. Sytemic Zoology, 18(3), Sept [5] L. Kou, G. Markowky, and L. Berman. A fat algorithm for Steiner tree. Acta Informatica, 15(2), June [6] J. Kuruvila, A. Nayak, and I. Stojmenović. Progre baed localized power and cot aware routing algorithm for ad hoc and enor wirele network. International Journal of Ditributed Senor Network, 2(2), June 26. [7] M. Mauve, H. Füßler, J. Widmer, and T. Lang. Poition-baed multicat routing for mobile ad-hoc network. Technical Report TR-3-4, Department of Computer Science, Univerity of Mannheim, Germany, 23. [8] J. Sanchez, P. Ruiz, X. Liu, and I. Stojmenović. GMR: Geographic multicat routing for wirele enor network. In Proc. of the IEEE Communication Society Conference on Senor, Meh, and Ad Hoc Communication and Network (SECON), Sept. 26. [9] J. Sanchez, P. Ruiz, and I. Stojmenović. Energy efficient geographic multicat routing for enor and actuator network. Computer Communication, 3, 27. Special iue on Senor-Actuator Network. [1] S. Wang, D. Wei, and S. Kuo. SPT-baed topology algorithm for contructing power efficient wirele ad hoc network. In Proc. of the ACM Int. World Wide Web Conference, May 24. [11] J. Wieelthier, G. Nguyen, and A. Ephremide. Energy-efficient broadcat and multicat tree in wirele network. Mobile Network and Application, 7(6), Dec. 22.
Lecture 14: Minimum Spanning Tree I
COMPSCI 0: Deign and Analyi of Algorithm October 4, 07 Lecture 4: Minimum Spanning Tree I Lecturer: Rong Ge Scribe: Fred Zhang Overview Thi lecture we finih our dicuion of the hortet path problem and introduce
More informationRouting Definition 4.1
4 Routing So far, we have only looked at network without dealing with the iue of how to end information in them from one node to another The problem of ending information in a network i known a routing
More informationPerformance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks
Performance of a Robut Filter-baed Approach for Contour Detection in Wirele Senor Network Hadi Alati, William A. Armtrong, Jr., and Ai Naipuri Department of Electrical and Computer Engineering The Univerity
More informationManeuverable Relays to Improve Energy Efficiency in Sensor Networks
Maneuverable Relay to Improve Energy Efficiency in Senor Network Stephan Eidenbenz, Luka Kroc, Jame P. Smith CCS-5, MS M997; Lo Alamo National Laboratory; Lo Alamo, NM 87545. Email: {eidenben, kroc, jpmith}@lanl.gov
More informationMinimum Energy Reliable Paths Using Unreliable Wireless Links
Minimum Energy Reliable Path Uing Unreliable Wirele Link Qunfeng Dong Department of Computer Science Univerity of Wiconin-Madion Madion, Wiconin 53706 qunfeng@c.wic.edu Micah Adler Department of Computer
More informationShortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights
Shortet Path Problem CS 6, Lecture Jared Saia Univerity of New Mexico Another intereting problem for graph i that of finding hortet path Aume we are given a weighted directed graph G = (V, E) with two
More informationGeneric Traverse. CS 362, Lecture 19. DFS and BFS. Today s Outline
Generic Travere CS 62, Lecture 9 Jared Saia Univerity of New Mexico Travere(){ put (nil,) in bag; while (the bag i not empty){ take ome edge (p,v) from the bag if (v i unmarked) mark v; parent(v) = p;
More informationToday s Outline. CS 561, Lecture 23. Negative Weights. Shortest Paths Problem. The presence of a negative cycle might mean that there is
Today Outline CS 56, Lecture Jared Saia Univerity of New Mexico The path that can be trodden i not the enduring and unchanging Path. The name that can be named i not the enduring and unchanging Name. -
More informationUniversität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart.
Univerität Augburg à ÊÇÅÍÆ ËÀǼ Approximating Optimal Viual Senor Placement E. Hörter, R. Lienhart Report 2006-01 Januar 2006 Intitut für Informatik D-86135 Augburg Copyright c E. Hörter, R. Lienhart Intitut
More informationContents. shortest paths. Notation. Shortest path problem. Applications. Algorithms and Networks 2010/2011. In the entire course:
Content Shortet path Algorithm and Network 21/211 The hortet path problem: Statement Verion Application Algorithm (for ingle ource p problem) Reminder: relaxation, Dijktra, Variant of Dijktra, Bellman-Ford,
More informationMinimum congestion spanning trees in bipartite and random graphs
Minimum congetion panning tree in bipartite and random graph M.I. Otrovkii Department of Mathematic and Computer Science St. John Univerity 8000 Utopia Parkway Queen, NY 11439, USA e-mail: otrovm@tjohn.edu
More informationPower Aware Location Aided Routing in Mobile Ad-hoc Networks
International Journal of Scientific and Reearch Publication, Volume, Iue 1, December 01 1 Power Aware Location Aided Routing in Mobile Ad-hoc Network Anamika Computer Science, Inderprataha Engineering
More informationSECTOR BASED MULTICAST ROUTING ALGORITHM FOR MOBILE AD-HOC NETWORKS
SECTOR BASED MULTICAST ROUTING ALGORITHM OR MOBILE AD-HOC NETWORKS Murali Paramewaran 1 and Chittaranjan Hota 2 1 Department of Computer Science & Information Sytem, BITS-Pilani, Pilani, India 2 Department
More informationStochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang
Stochatic Search and Graph Technique for MCM Path Planning Chritine D. Piatko, Chritopher P. Diehl, Paul McNamee, Cheryl Rech and I-Jeng Wang The John Hopkin Univerity Applied Phyic Laboratory, Laurel,
More informationIncreasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment
Int. J. Communication, Network and Sytem Science, 0, 5, 90-97 http://dx.doi.org/0.436/ijcn.0.50 Publihed Online February 0 (http://www.scirp.org/journal/ijcn) Increaing Throughput and Reducing Delay in
More informationNearly Constant Approximation for Data Aggregation Scheduling in Wireless Sensor Networks
Nearly Contant Approximation for Data Aggregation Scheduling in Wirele Senor Network Scott C.-H. Huang, Peng-Jun Wan, Chinh T. Vu, Yinghu Li and France Yao Computer Science Department, City Univerity of
More informationShortest Path Routing in Arbitrary Networks
Journal of Algorithm, Vol 31(1), 1999 Shortet Path Routing in Arbitrary Network Friedhelm Meyer auf der Heide and Berthold Vöcking Department of Mathematic and Computer Science and Heinz Nixdorf Intitute,
More informationShortest Paths with Single-Point Visibility Constraint
Shortet Path with Single-Point Viibility Contraint Ramtin Khoravi Mohammad Ghodi Department of Computer Engineering Sharif Univerity of Technology Abtract Thi paper tudie the problem of finding a hortet
More informationHassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem,
COMPETITIVE PROBABIISTIC SEF-ORGANIZING MAPS FOR ROUTING PROBEMS Haan Ghaziri AUB, OSB Beirut, ebanon ghaziri@aub.edu.lb Abtract In thi paper, we have applied the concept of the elf-organizing map (SOM)
More information3D SMAP Algorithm. April 11, 2012
3D SMAP Algorithm April 11, 2012 Baed on the original SMAP paper [1]. Thi report extend the tructure of MSRF into 3D. The prior ditribution i modified to atify the MRF property. In addition, an iterative
More informationBrief Announcement: Distributed 3/2-Approximation of the Diameter
Brief Announcement: Ditributed /2-Approximation of the Diameter Preliminary verion of a brief announcement to appear at DISC 14 Stephan Holzer MIT holzer@mit.edu David Peleg Weizmann Intitute david.peleg@weizmann.ac.il
More informationDAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications
DAROS: Ditributed Uer-Server Aignment And Replication For Online Social Networking Application Thuan Duong-Ba School of EECS Oregon State Univerity Corvalli, OR 97330, USA Email: duongba@eec.oregontate.edu
More informationMulticast with Network Coding in Application-Layer Overlay Networks
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 22, NO. 1, JANUARY 2004 1 Multicat with Network Coding in Application-Layer Overlay Network Ying Zhu, Baochun Li, Member, IEEE, and Jiang Guo Abtract
More informationLandmark Selection and Greedy Landmark-Descent Routing for Sensor Networks
1 Landmark Selection and Greedy Landmark-Decent Routing for Senor Network An Nguyen Nikola Miloavljević Qing Fang Jie Gao Leonida J. Guiba Department of Computer Science, Stanford Univerity. {anguyen,nikolam,guiba}@c.tanford.edu
More informationDelaunay Triangulation: Incremental Construction
Chapter 6 Delaunay Triangulation: Incremental Contruction In the lat lecture, we have learned about the Lawon ip algorithm that compute a Delaunay triangulation of a given n-point et P R 2 with O(n 2 )
More informationCutting Stock by Iterated Matching. Andreas Fritsch, Oliver Vornberger. University of Osnabruck. D Osnabruck.
Cutting Stock by Iterated Matching Andrea Fritch, Oliver Vornberger Univerity of Onabruck Dept of Math/Computer Science D-4909 Onabruck andy@informatikuni-onabrueckde Abtract The combinatorial optimization
More informationxy-monotone path existence queries in a rectilinear environment
CCCG 2012, Charlottetown, P.E.I., Augut 8 10, 2012 xy-monotone path exitence querie in a rectilinear environment Gregory Bint Anil Mahehwari Michiel Smid Abtract Given a planar environment coniting of
More informationPlanning of scooping position and approach path for loading operation by wheel loader
22 nd International Sympoium on Automation and Robotic in Contruction ISARC 25 - September 11-14, 25, Ferrara (Italy) 1 Planning of cooping poition and approach path for loading operation by wheel loader
More informationKaren L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract
Mot Graph are Edge-Cordial Karen L. Collin Dept. of Mathematic Weleyan Univerity Middletown, CT 6457 and Mark Hovey Dept. of Mathematic MIT Cambridge, MA 239 Abtract We extend the definition of edge-cordial
More information1 The secretary problem
Thi i new material: if you ee error, pleae email jtyu at tanford dot edu 1 The ecretary problem We will tart by analyzing the expected runtime of an algorithm, a you will be expected to do on your homework.
More informationEmbedding Service Function Tree with Minimum Cost for NFV Enabled Multicast
1 Embedding Service Function Tree with Minimum ot for NFV Enabled Multicat angbang Ren, Student Member, IEEE, eke Guo, Senior Member, IEEE, Yulong Shen, Member, IEEE, Guoming Tang, Member, IEEE, Xu Lin,
More informationA note on degenerate and spectrally degenerate graphs
A note on degenerate and pectrally degenerate graph Noga Alon Abtract A graph G i called pectrally d-degenerate if the larget eigenvalue of each ubgraph of it with maximum degree D i at mot dd. We prove
More informationUninformed Search Complexity. Informed Search. Search Revisited. Day 2/3 of Search
Informed Search ay 2/3 of Search hap. 4, Ruel & Norvig FS IFS US PFS MEM FS IS Uninformed Search omplexity N = Total number of tate = verage number of ucceor (branching factor) L = Length for tart to goal
More informationResearch Article Longest Path Reroute to Optimize the Optical Multicast Routing in Sparse Splitting WDM Networks
International Optic Volume 0, Article ID 9, page http://dxdoiorg/0/0/9 Reearch Article Longet Path Reroute to Optimize the Optical Multicat Routing in Spare Splitting WDM Network Huanlin Liu, Hongyue Dai,
More informationA Practical Model for Minimizing Waiting Time in a Transit Network
A Practical Model for Minimizing Waiting Time in a Tranit Network Leila Dianat, MASc, Department of Civil Engineering, Sharif Univerity of Technology, Tehran, Iran Youef Shafahi, Ph.D. Aociate Profeor,
More informationPerformance Evaluation of an Advanced Local Search Evolutionary Algorithm
Anne Auger and Nikolau Hanen Performance Evaluation of an Advanced Local Search Evolutionary Algorithm Proceeding of the IEEE Congre on Evolutionary Computation, CEC 2005 c IEEE Performance Evaluation
More informationAn Intro to LP and the Simplex Algorithm. Primal Simplex
An Intro to LP and the Simplex Algorithm Primal Simplex Linear programming i contrained minimization of a linear objective over a olution pace defined by linear contraint: min cx Ax b l x u A i an m n
More informationChapter S:II (continued)
Chapter S:II (continued) II. Baic Search Algorithm Sytematic Search Graph Theory Baic State Space Search Depth-Firt Search Backtracking Breadth-Firt Search Uniform-Cot Search AND-OR Graph Baic Depth-Firt
More informationA Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds *
Advance in Linear Algebra & Matrix Theory, 2012, 2, 20-24 http://dx.doi.org/10.4236/alamt.2012.22003 Publihed Online June 2012 (http://www.scirp.org/journal/alamt) A Linear Interpolation-Baed Algorithm
More informationMAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc
MAT 155: Decribing, Exploring, and Comparing Data Page 1 of 8 001-oteCh-3.doc ote for Chapter Summarizing and Graphing Data Chapter 3 Decribing, Exploring, and Comparing Data Frequency Ditribution, Graphic
More informationCENTER-POINT MODEL OF DEFORMABLE SURFACE
CENTER-POINT MODEL OF DEFORMABLE SURFACE Piotr M. Szczypinki Iintitute of Electronic, Technical Univerity of Lodz, Poland Abtract: Key word: Center-point model of deformable urface for egmentation of 3D
More informationDistributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router
Ditributed Packet Proceing Architecture with Reconfigurable Hardware Accelerator for 100Gbp Forwarding Performance on Virtualized Edge Router Satohi Nihiyama, Hitohi Kaneko, and Ichiro Kudo Abtract To
More informationCERIAS Tech Report EFFICIENT PARALLEL ALGORITHMS FOR PLANAR st-graphs. by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daescu
CERIAS Tech Report 2003-15 EFFICIENT PARALLEL ALGORITHMS FOR PLANAR t-graphs by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daecu Center for Education and Reearch in Information Aurance and Security,
More informationDrawing Lines in 2 Dimensions
Drawing Line in 2 Dimenion Drawing a traight line (or an arc) between two end point when one i limited to dicrete pixel require a bit of thought. Conider the following line uperimpoed on a 2 dimenional
More informationComputer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder
Computer Arithmetic Homework 3 2016 2017 Solution 1 An adder for graphic In a normal ripple carry addition of two poitive number, the carry i the ignal for a reult exceeding the maximum. We ue thi ignal
More informationSLA Adaptation for Service Overlay Networks
SLA Adaptation for Service Overlay Network Con Tran 1, Zbigniew Dziong 1, and Michal Pióro 2 1 Department of Electrical Engineering, École de Technologie Supérieure, Univerity of Quebec, Montréal, Canada
More informationRepresentations and Transformations. Objectives
Repreentation and Tranformation Objective Derive homogeneou coordinate tranformation matrice Introduce tandard tranformation - Rotation - Tranlation - Scaling - Shear Scalar, Point, Vector Three baic element
More informationA Local Mobility Agent Selection Algorithm for Mobile Networks
A Local Mobility Agent Selection Algorithm for Mobile Network Yi Xu Henry C. J. Lee Vrizlynn L. L. Thing Intitute for Infocomm Reearch, 21 Heng Mui Keng Terrace, Singapore 119613 Email: {yxu, hlee, vriz}@i2r.a-tar.edu.g
More informationHow to Select Measurement Points in Access Point Localization
Proceeding of the International MultiConference of Engineer and Computer Scientit 205 Vol II, IMECS 205, March 8-20, 205, Hong Kong How to Select Meaurement Point in Acce Point Localization Xiaoling Yang,
More informationShortest-Path Routing in Arbitrary Networks
Ž. Journal of Algorithm 31, 105131 1999 Article ID jagm.1998.0980, available online at http:www.idealibrary.com on Shortet-Path Routing in Arbitrary Network Friedhelm Meyer auf der Heide and Berthold Vocking
More informationToday s Outline. CS 362, Lecture 19. DFS and BFS. Generic Traverse. BFS and DFS Wrapup Shortest Paths. Jared Saia University of New Mexico
Today Outline CS 362, Lecture 9 Jared Saia Univerity of New Mexico BFS and DFS Wrapup Shortet Path Generic Travere DFS and BFS Travere(){ put (nil,) in bag; while (the bag i not empty){ take ome edge (p,v)
More informationService and Network Management Interworking in Future Wireless Systems
Service and Network Management Interworking in Future Wirele Sytem V. Tountopoulo V. Stavroulaki P. Demeticha N. Mitrou and M. Theologou National Technical Univerity of Athen Department of Electrical Engineering
More informationRefining SIRAP with a Dedicated Resource Ceiling for Self-Blocking
Refining SIRAP with a Dedicated Reource Ceiling for Self-Blocking Mori Behnam, Thoma Nolte Mälardalen Real-Time Reearch Centre P.O. Box 883, SE-721 23 Väterå, Sweden {mori.behnam,thoma.nolte}@mdh.e ABSTRACT
More informationCSE 250B Assignment 4 Report
CSE 250B Aignment 4 Report March 24, 2012 Yuncong Chen yuncong@c.ucd.edu Pengfei Chen pec008@ucd.edu Yang Liu yal060@c.ucd.edu Abtract In thi project, we implemented the recurive autoencoder (RAE) a decribed
More informationEnergy-efficient beaconless geographic routing in energy harvested wireless sensor networks
CONCURRNCY AND COMPUTATION: PRACTIC AND XPRINC Concurrency Computat.: Pract. xper. (2012) Publihed online in Wiley Online Library (wileyonlinelibrary.com)..2838 SPCIAL ISSU PAPR nergy-efficient beaconle
More informationMarkov Random Fields in Image Segmentation
Preented at SSIP 2011, Szeged, Hungary Markov Random Field in Image Segmentation Zoltan Kato Image Proceing & Computer Graphic Dept. Univerity of Szeged Hungary Zoltan Kato: Markov Random Field in Image
More information/06/$ IEEE 364
006 IEEE International ympoium on ignal Proceing and Information Technology oie Variance Etimation In ignal Proceing David Makovoz IPAC, California Intitute of Technology, MC-0, Paadena, CA, 95 davidm@ipac.caltech.edu;
More informationChapter 7 Packet-Switching Networks. Chapter 7 Packet-Switching Networks. Packet Switching. Network Layer. Network Service
Chapter 7 Packet-Switching etwork etwork Operation & Topology Datagram and Virtual Circuit Structure of a Packet Switch Routing in Packet etwork Shortet Path Routing etwork Chapter 7 Packet-Switching etwork
More informationThe Association of System Performance Professionals
The Aociation of Sytem Performance Profeional The Computer Meaurement Group, commonly called CMG, i a not for profit, worldwide organization of data proceing profeional committed to the meaurement and
More informationOn successive packing approach to multidimensional (M-D) interleaving
On ucceive packing approach to multidimenional (M-D) interleaving Xi Min Zhang Yun Q. hi ankar Bau Abtract We propoe an interleaving cheme for multidimenional (M-D) interleaving. To achieved by uing a
More informationAlgorithmic Discrete Mathematics 4. Exercise Sheet
Algorithmic Dicrete Mathematic. Exercie Sheet Department of Mathematic SS 0 PD Dr. Ulf Lorenz 0. and. May 0 Dipl.-Math. David Meffert Verion of May, 0 Groupwork Exercie G (Shortet path I) (a) Calculate
More informationOptimal Peer-to-Peer Technique for Massive Content Distribution
1 Optimal Peer-to-Peer Technique for Maive Content Ditribution Xiaoying Zheng, Chunglae Cho and Ye Xia Computer and Information Science and Engineering Department Univerity of Florida Email: {xiazheng,
More informationISSN: (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 3, Iue 4, April 2015 International Journal Advance Reearch in Computer Science and Management Studie Reearch Article / Survey Paper / Cae Study Available online at: www.ijarcm.com
More informationGray-level histogram. Intensity (grey-level) transformation, or mapping. Use of intensity transformations:
Faculty of Informatic Eötvö Loránd Univerity Budapet, Hungary Lecture : Intenity Tranformation Image enhancement by point proceing Spatial domain and frequency domain method Baic Algorithm for Digital
More informationStream: Low Overhead Wireless Reprogramming for Sensor Networks
Thi full text paper wa peer reviewed at the direction of IEEE Communication Society ubject matter expert for publication in the IEEE INFOCOM 27 proceeding. : Low Overhead Wirele Reprogramming for Senor
More informationDiff-Max: Separation of Routing and Scheduling in Backpressure-Based Wireless Networks
Diff-Max: Separation of Routing and Scheduling in -Baed Wirele Network Hulya Seferoglu and Eytan Modiano Laboratory For Information and Deciion Sytem Maachuett Intitute of Technology {heferog, modiano}@mit.edu
More informationAUTOMATIC TEST CASE GENERATION USING UML MODELS
Volume-2, Iue-6, June-2014 AUTOMATIC TEST CASE GENERATION USING UML MODELS 1 SAGARKUMAR P. JAIN, 2 KHUSHBOO S. LALWANI, 3 NIKITA K. MAHAJAN, 4 BHAGYASHREE J. GADEKAR 1,2,3,4 Department of Computer Engineering,
More informationEdits in Xylia Validity Preserving Editing of XML Documents
dit in Xylia Validity Preerving diting of XML Document Pouria Shaker, Theodore S. Norvell, and Denni K. Peter Faculty of ngineering and Applied Science, Memorial Univerity of Newfoundland, St. John, NFLD,
More informationModeling and Analysis of Slow CW Decrease for IEEE WLAN
Modeling and Analyi of Slow CW Decreae for IEEE 82. WLAN Qiang Ni, Imad Aad 2, Chadi Barakat, and Thierry Turletti Planete Group 2 Planete Group INRIA Sophia Antipoli INRIA Rhône-Alpe Sophia Antipoli,
More informationA Unicast-based Approach for Streaming Multicast
A Unicat-baed Approach for Streaming Multicat Reuven Cohen and Gideon Kaempfer Department of Computer Science Technion, Haifa 32000, Irael Abtract Network layer multicat i know a the mot efficient way
More informationPart 1 Data Collection Planning
N N Overview of the Lecture Data collection planning - (N), PC-(N), and (N)) Part Data Collection Planning Data Collection Planning al Problem Part I Traveling Saleman Problem () Jan Faigl Generalized
More informationNew Structural Decomposition Techniques for Constraint Satisfaction Problems
New Structural Decompoition Technique for Contraint Satifaction Problem Yaling Zheng and Berthe Y. Choueiry Contraint Sytem Laboratory Univerity of Nebraka-Lincoln Email: yzheng choueiry@ce.unl.edu Abtract.
More informationDistributed Partial Information Management (DPIM) Schemes for Survivable Networks - Part II
IEEE INFOCO 2002 1 Ditributed Partial Information anagement (DPI) Scheme for Survivable Network - Part II Dahai Xu Chunming Qiao Department of Computer Science and Engineering State Univerity of New York
More informationAN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM
RAC Univerity Journal, Vol IV, No, 7, pp 87-9 AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROLEM Mozzem Hoain Department of Mathematic Ghior Govt
More informationmapping reult. Our experiment have revealed that for many popular tream application, uch a networking and multimedia application, the number of VC nee
Reolving Deadlock for Pipelined Stream Application on Network-on-Chip Xiaohang Wang 1,2, Peng Liu 1 1 Department of Information Science and Electronic Engineering, Zheiang Univerity Hangzhou, Zheiang,
More informationMulti-Target Tracking In Clutter
Multi-Target Tracking In Clutter John N. Sander-Reed, Mary Jo Duncan, W.B. Boucher, W. Michael Dimmler, Shawn O Keefe ABSTRACT A high frame rate (0 Hz), multi-target, video tracker ha been developed and
More informationarxiv: v1 [cs.ds] 27 Feb 2018
Incremental Strong Connectivity and 2-Connectivity in Directed Graph Louka Georgiadi 1, Giueppe F. Italiano 2, and Niko Parotidi 2 arxiv:1802.10189v1 [c.ds] 27 Feb 2018 1 Univerity of Ioannina, Greece.
More informationIMPLEMENTATION OF CHORD LENGTH SAMPLING FOR TRANSPORT THROUGH A BINARY STOCHASTIC MIXTURE
Nuclear Mathematical and Computational Science: A Century in Review, A Century Anew Gatlinburg, Tenneee, April 6-, 003, on CD-ROM, American Nuclear Society, LaGrange Park, IL (003) IMPLEMENTATION OF CHORD
More informationEfficient Data Forwarding in Mobile Social Networks with Diverse Connectivity Characteristics
Efficient Data Forwarding in Mobile Social Network with Divere Connectivity Characteritic Xiaomei Zhang and Guohong Cao Department of Computer Science and Engineering The Pennylvania State Univerity, Univerity
More informationNetwork Coding in Duty-Cycled Sensor Networks
1 Network Coding in Duty-Cycled Senor Network Roja Chandanala, Radu Stoleru, Member, IEEE Abtract Network coding and duty-cycling are two popular technique for aving energy in wirele adhoc and enor network.
More informationA Novel Feature Line Segment Approach for Pattern Classification
12th International Conference on Information Fuion Seattle, WA, USA, July 6-9, 2009 A Novel Feature Line Segment Approach for Pattern Claification Yi Yang Intitute of Integrated Automation Xi an Jiaotong
More informationIMPROVED JPEG DECOMPRESSION OF DOCUMENT IMAGES BASED ON IMAGE SEGMENTATION. Tak-Shing Wong, Charles A. Bouman, and Ilya Pollak
IMPROVED DECOMPRESSION OF DOCUMENT IMAGES BASED ON IMAGE SEGMENTATION Tak-Shing Wong, Charle A. Bouman, and Ilya Pollak School of Electrical and Computer Engineering Purdue Univerity ABSTRACT We propoe
More informationA Fast Association Rule Algorithm Based On Bitmap and Granular Computing
A Fat Aociation Rule Algorithm Baed On Bitmap and Granular Computing T.Y.Lin Xiaohua Hu Eric Louie Dept. of Computer Science College of Information Science IBM Almaden Reearch Center San Joe State Univerity
More informationA CLUSTERING-BASED HYBRID REPLICA CONTROL PROTOCOL FOR HIGH AVAILABILITY IN GRID ENVIRONMENT
Journal of Computer Science 10 (12): 2442-2449, 2014 ISSN: 1549-3636 2014 R. Latip et al., Thi open acce article i ditributed under a Creative Common Attribution (CC-BY) 3.0 licene doi:10.3844/jcp.2014.2442.2449
More informationPriority-Based Distribution Trees for Application-Level Multicast
Priority-Baed Ditribution Tree for Application-Level Multicat Jürgen Vogel, Jörg Widmer, Dirk Farin, Martin Mauve, Wolfgang Effelberg Praktiche Informatik IV, Univerity of Mannheim, Germany vogel, widmer,
More informationAn Algebraic Approach to Adaptive Scalable Overlay Network Monitoring
An Algebraic Approach to Adaptive Scalable Overlay Network Monitoring ABSTRACT Overlay network monitoring enable ditributed Internet application to detect and recover from path outage and period of degraded
More informationLaboratory Exercise 6
Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each type of circuit will be implemented in two
More informationUC Berkeley International Conference on GIScience Short Paper Proceedings
UC Berkeley International Conference on GIScience Short Paper Proceeding Title A novel method for probabilitic coverage etimation of enor network baed on 3D vector repreentation in complex urban environment
More informationThis article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and
Thi article appeared in a journal publihed by Elevier. The attached copy i furnihed to the author for internal non-commercial reearch and education ue, including for intruction at the author intitution
More informationSeparation of Routing and Scheduling in Backpressure- Based Wireless Networks
Separation of Routing and Scheduling in - Baed Wirele Network The MIT Faculty ha made thi article openly available. Pleae hare how thi acce benefit you. Your tory matter. Citation A Publihed Publiher Seferoglu,
More informationPerformance of Energy-Efficient TDMA Schemes in Data-Gathering Scenarios with Periodic Sources
Performance of Energy-Efficient TDMA Scheme in Data-Gathering Scenario with Periodic Source Chritian Renner, Volker Turau, and Chritoph Weyer Abtract Energy-efficient tranportation of periodical enor reading
More informationOperational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz
Operational emantic Page Operational emantic Cla note for a lecture given by Mooly agiv Tel Aviv Univerity 4/5/7 By Roy Ganor and Uri Juhaz Reference emantic with Application, H. Nielon and F. Nielon,
More informationModeling the Effect of Mobile Handoffs on TCP and TFRC Throughput
Modeling the Effect of Mobile Handoff on TCP and TFRC Throughput Antonio Argyriou and Vijay Madietti School of Electrical and Computer Engineering Georgia Intitute of Technology Atlanta, Georgia 3332 25,
More informationMirror shape recovery from image curves and intrinsic parameters: Rotationally symmetric and conic mirrors. Abstract. 2. Mirror shape recovery
Mirror hape recovery from image curve and intrinic parameter: Rotationally ymmetric and conic mirror Nuno Gonçalve and Helder Araújo Λ Intitute of Sytem and Robotic Univerity of Coimbra Pinhal de Marroco
More informationTopics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X
Lecture 37: Global Optimization [Adapted from note by R. Bodik and G. Necula] Topic Global optimization refer to program optimization that encompa multiple baic block in a function. (I have ued the term
More informationA New Approach to Pipeline FFT Processor
A ew Approach to Pipeline FFT Proceor Shouheng He and Mat Torkelon Department of Applied Electronic, Lund Univerity S- Lund, SWEDE email: he@tde.lth.e; torkel@tde.lth.e Abtract A new VLSI architecture
More informationVariable Resolution Discretization in the Joint Space
Variable Reolution Dicretization in the Joint Space Chritopher K. Monon, David Wingate, and Kevin D. Seppi {c,wingated,keppi}@c.byu.edu Computer Science, Brigham Young Univerity Todd S. Peteron peterto@uvc.edu
More informationJoint Congestion Control and Media Access Control Design for Ad Hoc Wireless Networks
Joint Congetion Control and Media Acce Control Deign for Ad Hoc Wirele Network Lijun Chen, Steven H. Low and John C. Doyle Engineering & Applied Science Diviion, California Intitute of Technology Paadena,
More informationCut Tree Construction from Massive Graphs
Cut Tree Contruction from Maive Graph Takuya Akiba Yoichi Iwata Youke Samehima # Naoto Mizuno Youke Yano # Preferred Network, Inc. National Intitute of Informatic # Recruit Holding Co., Ltd. The Univerity
More informationDiverse: Application-Layer Service Differentiation in Peer-to-Peer Communications
Divere: Application-Layer Service Differentiation in Peer-to-Peer Communication Chuan Wu, Student Member, IEEE, Baochun Li, Senior Member, IEEE Department of Electrical and Computer Engineering Univerity
More information