Topological holes in sensor networks usually indicate the region where nodes are depleted or not dense enough due to kinds of reasons. In this paper, we study the problem of detecting topological holes in wireless sen...
详细信息
ISBN:
(纸本)0863416446
Topological holes in sensor networks usually indicate the region where nodes are depleted or not dense enough due to kinds of reasons. In this paper, we study the problem of detecting topological holes in wireless sensor networks. Those sensor nodes have no geographic location information and have a limited communication range. We present a novel distributed topological holes detection algorithm which is based purely on the logical communication topology graph. By exchanging information with its 1-hop and 2-hop neighbors, each node can independently decide whether it is on the boundary of a hole. Those boundary sensor nodes together could describe the region of the topological hole. Experimental results show that our distributed algorithm is effective in exploiting those characteristics of those nodes on the boundaries of holes. And thus it could identify those holes in sensor networks of moderate node densities.
Self-stabilization is a novel method for achieving fault tolerance in distributed applications. A self-stabilizing algorithm will reach a legal set of states, regardless of the starting state or states adopted due to ...
详细信息
We propose a new duplication-based DAG scheduling algorithm for heterogeneous computing environments. Contrary to the traditional approaches, proposed algorithm traverses the DAG in a bottom-up fashion while taking ad...
详细信息
Ad hoc network is a collection of a large number of wireless devices capable to move in an unspecified geographical area. In this paper it is a question of the geocasting which is an alternative of the multicasting pr...
详细信息
Sensor nodes are unreliable small devices with limited energy supply, and sensors may run out of power or fail over time. A sensor network should have self-healing capability to handle coverage holes, routing voids an...
详细信息
The deployment and configuration of wireless access networks represents an increasing cost factor. This problem is addressed with the novel concept of a self-deploying network, which is able to autonomously identify t...
详细信息
This paper presents a new adaptive distributed algorithm which solves the problem of finding a maximum flow in the underlying asynchronous network. Sequential processes, executing the same code over local data, exchan...
详细信息
Smith normal form computation has many applications in group theory, module theory and number theory. As the entries of the matrix and of its corresponding transformation matrices can explode during the computation, i...
详细信息
In this work we describe two sequential algorithms and their parallel counterparts for solving nonlinear systems, when the Jacobian matrix is symmetric and positive definite. This case appears frequently in unconstrai...
详细信息
We consider the problem of maximizing the multicast lifetime in multihop wireless networks in which each node is static and has limited energy, bandwidth, memory, and computation capabilities. Unlike most multicast al...
详细信息
暂无评论