Self-protection experiment

Slides:



Advertisements
Similar presentations
Approximation Algorithms
Advertisements

Greedy Algorithms.
DIJKSTRA’s Algorithm. Definition fwd search Find the shortest paths from a given SOURCE node to ALL other nodes, by developing the paths in order of increasing.
1 Maximal Independent Set. 2 Independent Set (IS): In a graph G=(V,E), |V|=n, |E|=m, any set of nodes that are not adjacent.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Johannes Schneider –1 A Log-Star Distributed Maximal Independent Set Algorithm for Growth-Bounded Graphs Johannes Schneider Roger Wattenhofer TexPoint.
1 Maximal Independent Set. 2 Independent Set (IS): In a graph, any set of nodes that are not adjacent.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Deployment Strategies for Differentiated Detection in Wireless Sensor Network Jingbin Zhang, Ting Yan, and Sang H. Son University of Virginia From SECON.
Zoë Abrams, Ashish Goel, Serge Plotkin Stanford University Set K-Cover Algorithms for Energy Efficient Monitoring in Wireless Sensor Networks.
Networked Slepian–Wolf: Theory, Algorithms, and Scaling Laws R˘azvan Cristescu, Member, IEEE, Baltasar Beferull-Lozano, Member, IEEE, Martin Vetterli,
1 TTS: A Two-Tiered Scheduling Algorithm for Effective Energy Conservation in Wireless Sensor Networks Nurcan Tezcan & Wenye Wang Department of Electrical.
Energy efficient multicast routing in ad hoc wireless networks Summer.
1 On Multiple Point Coverage in Wireless Sensor Networks Shuhui Yangy, Fei Daiz, Mihaela Cardeiy, and Jie Wuy Department of Computer Science and Engineering.
CS401 presentation1 Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility Takahiro Hara Presented by Mingsheng Peng (Proc. IEEE.
1 Target-Oriented Scheduling in Directional Sensor Networks Yanli Cai, Wei Lou, Minglu Li,and Xiang-Yang Li* The Hong Kong Polytechnic University, Hong.
Fast Failover for Control Traffic in Software-defined Networks Globecom 2012 Neda B. & Ying Z. Presented by: Szu-Ping Wang.
Fast Spectrum Allocation in Coordinated Dynamic Spectrum Access Based Cellular Networks Anand Prabhu Subramanian*, Himanshu Gupta*,
Using Rotatable and Directional (R&D) Sensors to Achieve Temporal Coverage of Objects and Its Surveillance Application You-Chiun Wang, Yung-Fu Chen, and.
WMNL Sensors Deployment Enhancement by a Mobile Robot in Wireless Sensor Networks Ridha Soua, Leila Saidane, Pascale Minet 2010 IEEE Ninth International.
IEEE Globecom 2010 Tan Le Yong Liu Department of Electrical and Computer Engineering Polytechnic Institute of NYU Opportunistic Overlay Multicast in Wireless.
Maximum Network Lifetime in Wireless Sensor Networks with Adjustable Sensing Ranges Cardei, M.; Jie Wu; Mingming Lu; Pervaiz, M.O.; Wireless And Mobile.
1 Maximal Independent Set. 2 Independent Set (IS): In a graph G=(V,E), |V|=n, |E|=m, any set of nodes that are not adjacent.
Co-Grid: an Efficient Coverage Maintenance Protocol for Distributed Sensor Networks Guoliang Xing; Chenyang Lu; Robert Pless; Joseph A. O ’ Sullivan Department.
On Non-Disjoint Dominating Sets for the Lifetime of Wireless Sensor Networks Akshaye Dhawan.
Game Playing. Introduction One of the earliest areas in artificial intelligence is game playing. Two-person zero-sum game. Games for which the state space.
A Dead-End Free Topology Maintenance Protocol for Geographic Forwarding in Wireless Sensor Networks IEEE Transactions on Computers, vol. 60, no. 11, November.
On the Topology of Wireless Sensor Networks Sen Yang, Xinbing Wang, Luoyi Fu Department of Electronic Engineering, Shanghai Jiao Tong University, China.
1/24 Introduction to Graphs. 2/24 Graph Definition Graph : consists of vertices and edges. Each edge must start and end at a vertex. Graph G = (V, E)
The Dominating Set and its Parametric Dual  the Dominated Set  Lan Lin prepared for theory group meeting on June 11, 2003.
A LOCALIZED SELF-HEALING ALGORITHM FOR NETWORKS OF MOVEABLE SENSOR NODES Mohamed Younis, Sookyoung Lee, Sheetal Gupta and Kevin Fisher Department of Computer.
Efficient Computing k-Coverage Paths in Multihop Wireless Sensor Networks XuFei Mao, ShaoJie Tang, and Xiang-Yang Li Dept. of Computer Science, Illinois.
Circuit Partitioning Divides circuit into smaller partitions that can be efficiently handled Goal is generally to minimize communication between balanced.
Energy-aware Node Placement in Wireless Sensor Networks Global Telecommunications Conference 2004 (Globecom 2004) Peng Cheng, Chen-Nee Chuah Xin Liu UCDAVIS.
Two Connected Dominating Set Algorithms for Wireless Sensor Networks Overview Najla Al-Nabhan* ♦ Bowu Zhang** ♦ Mznah Al-Rodhaan* ♦ Abdullah Al-Dhelaan*
Po-Yu Chen, Zan-Feng Kao, Wen-Tsuen Chen, Chi-Han Lin Department of Computer Science National Tsing Hua University IEEE ICPP 2011 A Distributed Flow-Based.
Maximizing Angle Coverage in Visual Sensor Networks Kit-Yee Chow, King-Shan Lui and Edmund Y. Lam Department of Electrical and Electronic Engineering The.
Mobile-Assisted Localization by Stitching in Wireless Sensor Networks IEEE ICC 2011 Han Wang, Wangdong Qi, Kun Wang, Peng Liu, Li Wei and Yasong Zhu PLA.
Dynamic Node Collaboration for Mobile Target Tracking in Wireless Camera Sensor Networks Liang Liu†,‡, Xi Zhang†, and Huadong Ma‡ † Networking and Information.
Introduction to Graph Theory
Constructing K-Connected M-Dominating Sets in Wireless Sensor Networks Yiwei Wu, Feng Wang, My T. Thai and Yingshu Li Georgia State University Arizona.
Efficient Point Coverage in Wireless Sensor Networks Jie Wang and Ning Zhong Department of Computer Science University of Massachusetts Journal of Combinatorial.
Efficient Placement and Dispatch of Sensors in a Wireless Sensor Network You-Chiun Wang, Chun-Chi Hu, and Yu-Chee Tseng IEEE Transactions on Mobile Computing.
ENGM 631 Maximum Flow Solutions. Maximum Flow Models (Flow, Capacity) (0,3) (2,2) (5,7) (0,8) (3,6) (6,8) (3,3) (4,4) (4,10)
Angles Review. Right Angle Discuss with your neighbor the definition of a right angle. How would you solve the below missing measure? 42 
MathematicalMarketing Slide 3c.1 Mathematical Tools Chapter 3: Part c – Parameter Estimation We will be discussing  Nonlinear Parameter Estimation  Maximum.
IEEE COMMUNICATIONS LETTERS, VOL. 9, NO. 9, SEPTEMBER 2005 Zhen Guo,
Khaled M. Alzoubi, Peng-Jun Wan, Ophir Frieder
A Log-Star Distributed Maximal Independent Set Algorithm for Growth-Bounded Graphs Johannes Schneider Roger Wattenhofer TexPoint fonts used in EMF.
Proof Techniques and Chessboard Problems
Maximal Independent Set
Diwen Wu, Dongqing Xie, Lupeng Wang IEEE ICYCS 2008
Maximum Flow Solutions
Maximal Independent Set
Efficient Evaluation of k-NN Queries Using Spatial Mashups
Connected Dominating Sets
Coverage Approximation Algorithms
Effective Replica Allocation
Barrier Coverage with Optimized Quality for Wireless Sensor Networks
Minimizing the Aggregate Movements for Interval Coverage
Graph Coloring.
X y y = x2 - 3x Solutions of y = x2 - 3x y x –1 5 –2 –3 6 y = x2-3x.
Youngki Kim Mobile R&D Laboratory KT, Korea
at University of Texas at Dallas
A Better Approximation for Minimum Total Routing Path Clustering Problem in 2-D Underwater Sensor Networks Wei Wang, Donghyun Kim, and Weili Wu, A Better.
Distributed Minimum-Cost Clustering for Underwater Sensor Networks
Survey on Coverage Problems in Wireless Sensor Networks - 2
Survey on Coverage Problems in Wireless Sensor Networks
Constructing a m-connected k-Dominating Set in Unit Disc Graphs
at University of Texas at Dallas
Presentation transcript:

Self-protection experiment 沙舟

Brief Introduction to the paper Efficient Self Protection Algorithms for Static Wireless Sensor Networks [1] The problem: Minimum p-self-protection [1] Y. Wang, X.-Y. Li, and Q. Zhang, “Efficient Self Protection Algorithms for Static Wireless Sensor Networks,” Proc. 50th IEEE Global Telecomm. Conf. (Globecom), 2007.

Brief Introduction to the paper What is self protection? The nodes in the network is “protected” by the other nodes in the same network. (A is active) B A

Brief Introduction to the paper What is p-self-protection? For any wireless sensor, there are at least p active sensors can monitor it What is minimum p-self-protection? The number of active nodes is minimized

Brief Introduction to the paper & The problem 1 The solution: Find p MISs What is MIS? Two definition in the paper: Maximum independent set (MIS) : no other independent set has more vertices Maximal independent set (MIS) : is not a subset of any other independent set

The problem 1 Why MIS? Any MIS is a dominating set For 1-self-protection problem: find 1 MIS For p-self-protection problem: find p MISs Now we can see which MIS is the right one in this paper.

The problem 2 The algorithm of generating MIS in this paper: We only need to focus on the step 1 and step 3

The problem 2 We cannot get a MIS from step 3! The only explanation here is that the description of step 3 is not complete. Guess the step 3 should be: 1 : a node is selected to the MIS if it has the largest rank among all its neighboring nodes. 2: delete the node and all the nodes adjacent to it 3: Repeat 1 and 2 until no new node is selected to the MIS