Please use this identifier to cite or link to this item:
https://doi.org/10.1007/978-3-642-35476-2_13
DC Field | Value | |
---|---|---|
dc.title | Optimal broadcast in shared spectrum radio networks | |
dc.contributor.author | Ghaffari, M. | |
dc.contributor.author | Gilbert, S. | |
dc.contributor.author | Newport, C. | |
dc.contributor.author | Tan, H. | |
dc.date.accessioned | 2013-07-04T08:06:17Z | |
dc.date.available | 2013-07-04T08:06:17Z | |
dc.date.issued | 2012 | |
dc.identifier.citation | Ghaffari, M.,Gilbert, S.,Newport, C.,Tan, H. (2012). Optimal broadcast in shared spectrum radio networks. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 7702 LNCS : 181-195. ScholarBank@NUS Repository. <a href="https://doi.org/10.1007/978-3-642-35476-2_13" target="_blank">https://doi.org/10.1007/978-3-642-35476-2_13</a> | |
dc.identifier.isbn | 9783642354755 | |
dc.identifier.issn | 03029743 | |
dc.identifier.uri | http://scholarbank.nus.edu.sg/handle/10635/40523 | |
dc.description.abstract | This paper studies single hop broadcast in a single hop shared spectrum radio network. The problem requires a source to deliver a message to n receivers, where only a polynomial upper bound on n is known. The model assumes that in each round, each device can participate on 1 out of C ≥ available communication channels, up to t < C of which might be disrupted, preventing communication. This disruption captures the unpredictable message loss that plagues real shared spectrum networks. The best existing solution to the problem, which comes from the systems literature, requires O (Ct/C-t log n) rounds. Our algorithm, by contrast, solves the problem in O(C/C-t⌈t/ n⌉ log n) rounds, when C ≥ log n, and in O(C/C-t log n · log log n) rounds, when C is smaller. It accomplishes this improvement by deploying a self-regulating relay strategy in which receivers that already know useful information coordinate themselves to efficiently assist the source's broadcast. We conclude by proving these bounds tight for most cases. © 2012 Springer-Verlag. | |
dc.description.uri | http://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.1007/978-3-642-35476-2_13 | |
dc.source | Scopus | |
dc.type | Conference Paper | |
dc.contributor.department | COMPUTER SCIENCE | |
dc.description.doi | 10.1007/978-3-642-35476-2_13 | |
dc.description.sourcetitle | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | |
dc.description.volume | 7702 LNCS | |
dc.description.page | 181-195 | |
dc.identifier.isiut | NOT_IN_WOS | |
Appears in Collections: | Staff Publications |
Show simple item record
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.