Results 1  10
of
17
Broadcasting algorithms in radio networks with unknown topology
 In Proc. of FOCS
, 2003
"... In this paper we present new randomized and deterministic algorithms for the classical problem of broadcasting in radio networks with unknown topology. We consider directed nnode radio networks with specified eccentricity D (maximum distance from the source node to any other node). In a seminal wor ..."
Abstract

Cited by 122 (1 self)
 Add to MetaCart
In this paper we present new randomized and deterministic algorithms for the classical problem of broadcasting in radio networks with unknown topology. We consider directed nnode radio networks with specified eccentricity D (maximum distance from the source node to any other node). In a seminal work on randomized broadcasting, BarYehuda et al. presented an algorithm that for any nnode radio network with eccentricity D completes the broadcasting in O(D log n + log 2 n) time, with high probability. This result is almost optimal, since as it has been shown by Kushilevitz and Mansour and Alon et al., every randomized algorithm requires Ω(D log(n/D)+log 2 n) expected time to complete broadcasting. Our first main result closes the gap between the lower
Constructions of Generalized Superimposed Codes with Applications to Group Testing and Conflict Resolution in Multiple Access Channels.
 Theor. Comp. Sc.
, 2003
"... Abstract In this paper we introduce a parameterized generalization of the well known superimposed codes. We give algorithms for their construction and provide nonexistential results. We apply our new combinatorial structures to the e cient solution of new group testing problems and access coordina ..."
Abstract

Cited by 27 (1 self)
 Add to MetaCart
(Show Context)
Abstract In this paper we introduce a parameterized generalization of the well known superimposed codes. We give algorithms for their construction and provide nonexistential results. We apply our new combinatorial structures to the e cient solution of new group testing problems and access coordination issues in multiple access channels.
Opportunistic Information Dissemination in Mobile Adhoc Networks: The Profit of Global Synchrony
"... The topic of this paper is the study of Information Dissemination in Mobile Adhoc Networks by means of deterministic protocols. We characterize the connectivity resulting from the movement, from failures and from the fact that nodes may join the computation at different times with two values, α an ..."
Abstract

Cited by 4 (2 self)
 Add to MetaCart
(Show Context)
The topic of this paper is the study of Information Dissemination in Mobile Adhoc Networks by means of deterministic protocols. We characterize the connectivity resulting from the movement, from failures and from the fact that nodes may join the computation at different times with two values, α and β, so that, within α time slots, some node that has the information must be connected to some node without it for at least β time slots. The protocols studied are classified into three classes: oblivious (the transmission schedule of a node is only a function of its ID), quasioblivious (the transmission schedule may also depend on a global time), and adaptive. The main contribution of this work concerns negative results. Contrasting the lower and upper bounds derived, interesting complexity gaps among protocolclasses are observed. More precisely, in order to guarantee any progress towards solving the problem, it is shown that β must be at least n − 1 in general, but that β ∈ Ω(n 2 / log n) if an oblivious protocol is used. Since quasioblivious protocols can guarantee progress with β ∈ O(n), this represents a significant gap,
An earlystopping protocol for computing aggregate functions in sensor networks
 In Proc. of the IEEE 15th Pacific Rim International Symposium on Dependable Computing
"... Abstract In this paper, we study algebraic aggregate computations in Sensor Networks. The main contribution is the presentation of an earlystopping protocol that computes the average function under a harsh model of the conditions under which sensor nodes operate. This protocol is shown to be time ..."
Abstract

Cited by 3 (2 self)
 Add to MetaCart
Abstract In this paper, we study algebraic aggregate computations in Sensor Networks. The main contribution is the presentation of an earlystopping protocol that computes the average function under a harsh model of the conditions under which sensor nodes operate. This protocol is shown to be timeoptimal in presence of unfrequent failures. The approach followed saves time and energy by relying the computation on a small network of delegate nodes that can be rebuilt fast in case of node failures and communicate using a collisionfree schedule. Delegate nodes run simultaneously two protocols, namely, a collection/dissemination treebased algorithm, which is shown to be optimal, and a massdistribution algorithm. Both algorithms are analyzed under a model where the frequency of failures is a parameter. Other aggregate computation algorithms can be easily derived from this protocol. To the best of our knowledge, this is the first optimal earlystopping algorithm for aggregate computations in Sensor Networks.
Unbounded Contention Resolution in MultipleAccess Channels
, 2011
"... A frequent problem in settings where a unique resource must be shared among users is how to resolve the contention that arises when all of them must use it, but the resource allows only for one user each time. The application of efficient solutions for this problem spans a myriad of settings such a ..."
Abstract

Cited by 2 (0 self)
 Add to MetaCart
(Show Context)
A frequent problem in settings where a unique resource must be shared among users is how to resolve the contention that arises when all of them must use it, but the resource allows only for one user each time. The application of efficient solutions for this problem spans a myriad of settings such as radio communication networks or databases. For the case where the number of users is unknown, recent work has yielded fruitful results for local area networks and radio networks, although either a (possibly loose) upper bound on the number of users needs to be known [7], or the solution is suboptimal [2], or it is only implicit [11] or embedded [6] in other problems, with bounds proved only asymptotically. In this paper, under the assumption that collision detection or information on the number of contenders is not available, we present a novel protocol for contention resolution in radio networks, and we recreate a protocol previously used for other problems [6, 11], tailoring the constants for our needs. In contrast with previous work, both protocols are proved to be optimal up to a small constant factor and with high probability for big enough number of contenders. Additionally, the protocols are evaluated and contrasted with the previous work by extensive simulations. The evaluation shows that the complexity bounds obtained by the analysis are rather tight, and that both protocols proposed have small and predictable complexity for many system sizes (unlike previous proposals).
Contention Resolution in MultipleAccess Channels: kSelection in Radio Networks
"... In this paper, contention resolution among k contenders on a multipleaccess channel is explored. The problem studied has been modeled as a kSelection in Radio Networks, in which every contender has to have exclusive access at least once to a shared communication channel. The randomized adaptive p ..."
Abstract

Cited by 2 (0 self)
 Add to MetaCart
(Show Context)
In this paper, contention resolution among k contenders on a multipleaccess channel is explored. The problem studied has been modeled as a kSelection in Radio Networks, in which every contender has to have exclusive access at least once to a shared communication channel. The randomized adaptive protocol presented shows that, for a probability of error 2ε, all the contenders get access to the channel in time (e+1+ξ)k+ O(log 2 (1/ε)), where ε ≤ 1/(n + 1), ξ> 0 is any constant arbitrarily close to 0, and n is the total number of potential contenders. The above time complexity is asymptotically optimal for any significant ε. The protocol works even if the number of contenders k is unknown and collisions can not be detected.
Wave Leader Election Protocol For Wireless Sensor Networks
, 2002
"... this paper we present and analyze a wireless wave leader election protocol (WWLE) for wireless mobile ad hoc sensor networks. We present also a mathematical model for the energy consumption within a sensor node ..."
Abstract

Cited by 1 (0 self)
 Add to MetaCart
(Show Context)
this paper we present and analyze a wireless wave leader election protocol (WWLE) for wireless mobile ad hoc sensor networks. We present also a mathematical model for the energy consumption within a sensor node
Unbounded Contention Resolution: kSelection in Radio Networks
, 2009
"... Using kSelection in Radio Networks as an example of uniqueresource dispute among k unknown contenders, the conflictresolution protocol presented in this paper shows that, for any sensible probability of error ε, all of them get access to such resource in asymptotically optimal time (e + 1 + ξ)k + ..."
Abstract
 Add to MetaCart
Using kSelection in Radio Networks as an example of uniqueresource dispute among k unknown contenders, the conflictresolution protocol presented in this paper shows that, for any sensible probability of error ε, all of them get access to such resource in asymptotically optimal time (e + 1 + ξ)k + O(log 2 (1/ε)), where ξ> 0 is any constant arbitrarily close to 0. This protocol works under a model where not even an upper bound on k is known and conflicts can not be detected by all the contenders.