Abstract
Consider a multihop wireless network in which all network nodes V lie in plane and have a unit communication radius. Its communication topology G is the unit disk graph (UDG) of V. Under the protocol interference model, every node has a communication radius normalized to one, and an interference radius ρ for some parameter ρ ≥ 1 (see Fig. 11.1). A node v can receive the message successfully from a transmitting node u if v is within the transmission range of u but is outside the interference range of any other node transmitting simultaneously.
The key is not to prioritize what’s
on your schedule, but to schedule your priorities.
Stephen R. Covey
Access provided by Autonomous University of Puebla. Download chapter PDF
Keywords
- Minimum Latency Aggregation
- Protocol Interference Model
- Unit Disk Graph (UDG)
- Multihop Wireless Networks
- Gathering Schedule
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
11.1 Motivation and Overview
Consider a multihop wireless network in which all network nodes V lie in plane and have a unit communication radius. Its communication topology G is the unit disk graph (UDG) of V. Under the protocol interference model, every node has a communication radius normalized to one, and an interference radius ρ for some parameter ρ ≥ 1 (see Fig. 11.1). A node v can receive the message successfully from a transmitting node u if v is within the transmission range of u but is outside the interference range of any other node transmitting simultaneously.
In this chapter, we study minimum-latency schedulings for the following four group communications in the multihop wireless network:
-
Broadcast. A distinguished source node sends a common packet to all other nodes.
-
Data Aggregation. A distinguished sink node collects the data aggregated from all the packets at the nodes other than the sink node. In other words, every intermediate node combines all received packet with its own packet into a single packet of fixed size according to some aggregation function such as logical and/or, maximum, or minimum.
-
Data Gathering. A distinguished sink node collects a packet from every other node.
-
Gossiping. Every node broadcasts a common packet to all other nodes.
Suppose that all communications proceed in synchronous time slots and a node can transmit at most one packet of a fixed size in each time slot. A communication schedule for each of these four communication tasks not only specifies a communication routing but also assigns a time slot to every communication link in the routing subject to two constraints:
-
1.
The link ordering given by the routing should be followed.
-
2.
All communication links assigned in each time slot are interference-free.
The latency of a communication schedule is the number of time slots during which at least one transmission occurs. The minimum-latency schedulings for the above four group communications are all NP-hard. In this chapter, we present constant-approximation algorithms for them.
The CDS plays a critical role in the design of scheduling algorithms [109, 110]. Indeed, all relaying nodes of a message must form a CDS of G. However, in order to achieve a short latency, the CDS has to be short and sparse instead of being just small. Specifically, consider a node s ∈ V and let R be the graph radius of G with respect to s. A CDS U of G with s ∈ U should be “short” in the sense that the graph radius of \(G\left[U\right]\) with respect to s is bounded by a constant factor of R and “sparse” in the sense that the maximum degree of \(G\left[U\right]\) is bounded by a small constant. In Sect. 11.3, we will present a construction of such short and sparse CDS.
The following terms and notations will be adopted throughout this chapter. Let \(n = \left\vert V \right\vert\). The connected domination number of G is denoted by γ c . The unit disk centered at a node v is denoted by \(D\left(v\right)\). The topological boundary of a planar set A is denoted by ∂A. The directed version of G, denoted by \(\overrightarrow{G}\), is the digraph obtained from G by replacing every edge e in G with two oppositely oriented links between the two endpoints of e. A subset U of nodes is said to be distance-d independent for some d > 0 if and only if their mutual Euclidean distances are greater than d. Equivalently, a set of nodes are distance-d independent if and only if they form an independent set of the d-disk graph on V. For any d > 0, a distance-d coloring of a subset U of nodes is an assignment of colors to the nodes in U such that any pair of nodes of distance at most d receives distinct colors. Let X and Y be two disjoint subsets of V. Y is a cover of X if each node in X is adjacent to some node in Y, and a minimal cover of X if Y is a cover of X but no proper subset of Y is a cover of X. Any ordering y 1, y 2, ⋯, y m of Y induces a minimal cover Z ⊆ Y of X by the following sequential pruning method: Initially, Z = Y. For each i = m down to 1, if \(Z \setminus \left\{{y}_{i}\right\}\) is a cover of X, remove y i from Z. Figure 11.2 is an illustration of such sequential pruning method. Suppose that Y is a cover of X. A node x ∈ X is called a private neighbor of a node y ∈ Y with respect to Y if y is the only node in Y which is adjacent to x. Clearly, if Y is a minimal cover of X, then each node in Y has at least one private neighbor with respect to Y.
Short and sparse CDS has important applications in the design of scheduling algorithms for group communications in wireless networks. In this chapter, we have constructed a short and sparse CDS and built a dominating tree on such CDS which is used as the routing for the group communications. By exploiting the rich structural properties of the dominating tree, we are able to design scheduling algorithms with constant approximation bounds for the group communications. Table 11.1 summarizes the approximation bounds of our scheduling algorithms described in this chapter for the four group communications.
11.2 Geometric Preliminaries
For any ρ > 1, let \({\alpha }_{\rho }\) denote the maximum number of points in a unit disk whose mutual distances are greater than ρ − 1. For any ρ ≥ 1, let \({\beta }_{\rho }\) denote the maximum number of points in a half disk of radius ρ + 1 whose mutual distances are greater than one. The upper bounds on \({\alpha }_{\rho }\) and \({\beta }_{\rho }\) can be derived by the following classic result on disk packing.
Theorem 11.2.1 (Zassebhaus-Groemer-Oler Inequality).
Suppose that S is a compact convex set and U is a set of points with mutual distances at least one. Then
where \(\mathrm{area}\left(S\right)\) and \(\mathrm{peri}\left(S\right)\) are the area and perimeter of S, respectively.
When the set S is a disk or a half disk, we have the following packing bound.
Corollary 11.2.2.
Suppose that S (respectively, S ′ ) is a disk (respectively, half disk) of radius r, and U is a set of points with mutual distances at least one. Then
By the above corollary,
and
Now, we introduce an interesting “equilateral triangle property,”which will be used in the proof of Lemma 11.2.4.
Lemma 11.2.3.
Consider two nodes u and v with \(1 \leq \left\Vert uv\right\Vert \leq 2\) . Let p and q be their two intersection points of \(\partial D\left(u\right)\) and \(\partial D\left(v\right)\) (see Fig. 11.3). Suppose that x and y are the two intersection points between \(\partial D\left(v\right)\) and the ray emanating from u which is apart from uv by 30 ∘ and is on the same side of uv as q, with x being between u and y. Then △pvx and △qvy are equilateral.
Proof.
Let z be the midpoint of xy. Then, vz is perpendicular to xy and
Hence,
Similarly, \(\widehat{yvz} =\widehat{ uvq}\) and hence
Thus, the lemma follows.
The next lemma presents two sufficient conditions for the intersection of two unit disks being covered by a third unit-disk.
Lemma 11.2.4.
Consider three nodes u,v, and w satisfying that \(1 < \left\Vert uv\right\Vert \leq 2\) and \(\left\Vert vw\right\Vert > 1\) . Then,
if one of the following two conditions holds
-
1.
\(\left\Vert uw\right\Vert \leq 1\) and \(\widehat{vuw} \leq \frac{\pi } {6}\).
-
2.
\(1 < \left\Vert uw\right\Vert \leq \left\Vert uv\right\Vert\) and \(\widehat{vuw} \leq 2\arcsin \frac{1} {4} \approx 28.95{5}^{\circ }\) (see Fig. 11.4).
Proof.
Let p be the intersection point of \(\partial D\left(u\right)\) and \(\partial D\left(v\right)\) which lies on the different side of uv from w, and q be the point on \(\partial D\left(v\right)\) satisfying that q is on the same side of uv, \(\widehat{quv} = \frac{\pi } {6}\) and \(\widehat{uqv} \geq \frac{\pi } {2}\) (see Fig. 11.4). By 11.2.3, \(\left\Vert pq\right\Vert = 1\). We will show that w lies in △ upq. This would imply that \(\left\Vert pw\right\Vert \leq 1\) and consequently
Under the first condition in the lemma, w lies in △ upq obviously. So we assume the second condition in the lemma holds. Let x and y be the intersection points of the ray uw and \(\partial D\left(v\right)\) with x being closer to u than y (see Fig. 11.4). We claim that \(\left\Vert uy\right\Vert \geq \left\Vert uv\right\Vert\). Note that
It is sufficient to show that \(\widehat{xvy} \geq \widehat{ xuv}\). For the simplicity of presentation, we denote \(\widehat{xuv}\) by θ. Let z be the midpoint of xy. Then, z is the perpendicular foot of v on uw, and
Hence,
Thus, our claim holds. So,
which means w is on the line segment uy. As \(w\notin D\left(v\right)\), w must be on the line segment ux. Consequently, w lies in △ upq as well.
11.3 Dominating Tree
In this section, we describe a rooted spanning tree T of G constructed from a connected dominating set (CDS). This tree will be used in the routings of all the four group communications. Depending on the type of the group communications, the root of T, denoted by s, is chosen as follows. For broadcast, s is the source of the broadcast; for aggregation or gathering, s is the sink node; for gossiping, s is a graph center of G. In either case, we use L to denote the graph radius of G with respect to s.
We begin with the construction of a small, short, and sparse CDS of G. We first select a maximal independent set (MIS) I of G in the first-fit manner in a breadth-first-search (BFS) ordering (with respect to s) of V. All nodes in I form a dominating set, and hence are referred to as dominators. Then, we select a set C of connectors to interconnect I as follows. Let G ′ be the graph on I in which there is edge between two dominators if and only if they have a common neighbor. The radius of G ′ with respect to s is denoted by L ′. Clearly, L ′ ≤ L − 1. For each 0 ≤ l ≤ L ′, let I l be the set of dominators of depth l in G ′. Then, \({I}_{0} = \left\{s\right\}\). For each 0 ≤ l < L ′, let P l be the set of nodes adjacent to at least one node in I l and at least one node in I l + 1, and compute a minimal cover C l ⊆ P l of I l + 1 (see an illustration in Fig. 11.5). Set \(C = {\bigcup \nolimits }_{l=0}^{{L}^{{\prime}}-1 }{C}_{l}\). Then, I ∪C is a CDS of G. We will prove the following lemma on the sparsity of I ∪C.
Lemma 11.3.1.
\(\left\vert {C}_{0}\right\vert \leq 12\) and each dominator in I l with 1 ≤ l ≤ L ′ − 1, is adjacent to at most 11 connectors in C l.
Proof.
We first prove that \(\left\vert {C}_{0}\right\vert \leq 12\). Assume to the contrary that \({C}_{0} = \left\{{w}_{1},{w}_{2},\ldots,{w}_{k}\right\}\) for some k ≥ 13. By the minimality of C 0, for each 1 ≤ j ≤ k, there is a node v j ∈ I 1 such that v j is adjacent to w j but not to any other node in C 0 (see Fig. 11.6). Among the k nodes v 1, …, v k , there exist two, say \({v}_{{j}^{{\prime}}}\) and v j ′′, satisfying that \(\angle {v}_{{j}^{{\prime}}}s{v}_{{j}^{{\prime\prime}}} \leq \frac{2\pi } {13}\). Assume by symmetry that \({v}_{{j}^{{\prime\prime}}}\) is closer to s than \({v}_{{j}^{{\prime}}}\). Since the distance between \({v}_{{j}^{{\prime}}}\) and \({v}_{{j}^{{\prime\prime}}}\) is greater than one, \(D\left(s\right) \cap D\left({v}_{{j}^{{\prime}}}\right) \subseteq D\left({v}_{{j}^{{\prime\prime}}}\right)\) by Lemma 11.2.4. Hence, \({w}_{{j}^{{\prime}}} \in D\left({v}_{{j}^{{\prime\prime}}}\right)\), which is a contradiction.
Next, we show that each dominator u in I l for some 1 ≤ l ≤ L ′ − 1 is adjacent to at most 11 connectors in C l . Suppose that w 1, w 2, …, w k are the connectors in C l which are adjacent to u. By the minimality of C l , for each 1 ≤ j ≤ k, there is a node v j ∈ I l + 1 such that v j is a private neighbor of w j with respect to C l (see Fig. 11.7). Let w 0 be a connector in C l − 1 which is adjacent to u, and v 0 be a dominator in I l − 1 which is adjacent to w 0. Then, for each 0 ≤ j ≤ k, w j is the only node in \(\left\{{w}_{0},{w}_{1},\ldots,{w}_{k}\right\}\) which is adjacent to v j . By the same argument above, we can show that k + 1 ≤ 12, which implies k ≤ 11.
Now, we construct T by specifying the parent of each node other than s. First, each dominator in I l with 1 ≤ l ≤ L ′ chooses the neighboring connector of the smallest ID in C l − 1 as its parent. Second, each connector in C l with 0 ≤ l ≤ L ′ − 1 chooses the neighboring dominator of the smallest ID in I l as its parent. Third, each other node, referred to as dominate, chooses the neighboring dominator of the smallest ID as its parent. Clearly, T is a spanning tree and is called a dominating tree. Figure 11.8 is an illustration of the construction of T. By the property of the CDS I ∪U, the maximum depth of T is at most \(2{L}^{{\prime}} + 1 \leq 2L - 1\), s has at most 12 connector children, and each other dominator has at most 11 connector children.
In the remaining of this section, we present a first-fit distance-\(\left(\rho + 1\right)\) coloring of an arbitrary subset U of dominators. In the lexicographic order of U, all nodes in U are sorted from the left to the right with ties broken by the ordering from the bottom to the top. Suppose that \(\left\langle {u}_{1},{u}_{2},\ldots,{u}_{k}\right\rangle\) is the lexicographic order of U. The first-fit coloring in this order uses colors represented by natural numbers and runs as follows: Assign the color 1 to u 1. For i = 2 up to k, assign to u i with the smallest color not used by any v j with j < i and \(\left\Vert {v}_{i}{v}_{j}\right\Vert \leq \left(\rho + 1\right)\). We claim that at most βρ colors are used by this coloring. Indeed, consider an arbitrary node u ∈ U. All other nodes in U which precede u and are apart from u by a distance at most ρ + 1 lie in the left half disk of radius ρ + 1 centered at u. The number of these dominators is at most βρ − 1, where the − 1 term is due to that u is also in this half disk. Hence, the color number received by u is at most \(\left({\beta }_{\rho } - 1\right) + 1 = {\beta }_{\rho }\). Thus, our claim holds.
11.4 Broadcast Scheduling
Let s be the source of the broadcast. We first construct the dominating tree T rooted at s as in Sect. 11.3. The routing of the broadcast is the spanning s-aborescence oriented from T. The broadcast schedule is then partitioned in 2L ′ + 1 rounds sequentially dedicated to the transmissions by
respectively. For each 1 ≤ l ≤ L ′, we compute a first-fit distance-\(\left(\rho + 1\right)\) coloring of I l in the lexicographic order. The individual rounds are then scheduled as follows:
-
In the round for I 0, only the source node s transmits, and hence this round has only one time slot.
-
In the round for C 0, all nodes in C 0 transmit one by one, and thus this round takes at most 12 time slots.
-
In the round for I l with 1 ≤ l ≤ L ′, a dominator of the ith color transmits in the ith time slot, and hence this round takes at most \({\beta }_{\rho }\) time slots.
-
In the round for C l with 1 ≤ l ≤ L ′ − 1, a connector with a child dominator of the ith color transmits in the ith time slot, and hence this round also takes at most βρ time-slots.
Thus, the latency of the entire broadcast schedule is at most
Since L is a trivial lower bound on the minimum broadcast latency, the above broadcast schedule is a \(2{\beta }_{\rho }\)-approximation of the optimum.
11.5 Aggregation Scheduling
Let s be the sink of the aggregation. Let Δ denote the maximum degree of G, and L be the graph radius of G with respect to s. For the trivial case that L = 1, we simply let all nodes other than s transmit one by one. Such trivial schedule has latency \(n - 1 = \Delta \). Subsequently, we assume that L > 1. We first construct the dominating tree T rooted as s as in Sect. 11.3. The routing of the aggregation schedule is the spanning inward s-aborescence oriented from T. Let W denote the set of dominates. The aggregation schedule is then partitioned in 2L ′ + 1 rounds sequentially dedicated to the transmissions by
respectively. We describe a procedure used by the scheduling in the round for W and the round for each C l with 1 ≤ l ≤ L ′ − 1.
Let B be a set of links whose receiving endpoints are all dominators. Suppose that ϕ is the maximum number of links with a common dominator endpoint. We first partition into at most ϕ subsets B j with 1 ≤ j ≤ ϕ such that each dominator is incident to at most one link in each B j . The schedule of B is then further partitioned into ϕ sub-rounds dedicated to B 1, B 2,, …, B ϕ, respectively. In the sub-round for B j , we compute a first-fit distance-\(\left(\rho + 1\right)\) coloring of the dominators incident to the links in B j , and then all links in B j whose dominator endpoints receive the ith color are scheduled in the ith time slot. Thus, each of the ϕ consists of at most \({\beta }_{\rho }\) time slots. Hence, the total number of slots is at most \(\phi {\beta }_{\rho }\).
Now, we are ready to describe the schedule in the individual rounds.
-
In the round for W, we adopt the above procedure to produce a schedule in this round. Since each dominator is adjacent to at least one dominate, the maximum number of nodes in W adjacent to a dominator is at most Δ − 1. Hence, this round takes at most \(\left(\Delta - 1\right){\beta }_{\rho }\) time slots.
-
In the round for C l with 1 ≤ l ≤ L ′ − 1, we also adopt the above procedure to produce a schedule in this round. Since each dominator in I l − 1 is adjacent to at most 11 connectors in C l , this round takes at most \(11{\beta }_{\rho }\) time slots.
-
In the round for C 0, all nodes in C 0 transmit one by one, and thus this round takes at most 12 time slots.
-
In the round for I l with 1 ≤ l ≤ L ′, we compute a first-fit distance-\(\left(\rho + 1\right)\) coloring of I l in the lexicographic order and let each dominator with the ith color transmit in the ith time slot. This round takes at most \({\beta }_{\rho }\) time slots.
Thus, the latency of the entire aggregation schedule is at most
Since the trivial case takes Δ time slots and \({\beta }_{\rho } > 1\), we have the following theorem.
Theorem 11.5.1.
The latency of the above aggregation schedule is at most \(\Delta {\beta }_{\rho } + 12{\beta }_{\rho }L - 12\left(2{\beta }_{\rho } - 1\right).\)
In the next, we present a lower bound on the minimum aggregation latency in terms of Δ.
Lemma 11.5.2.
For any ρ > 1, the minimum aggregation latency is at least Δ∕α ρ.
Proof.
Let u be a node with maximum degree in G, and S be the unit disk centered at u. Then, S contains Δ + 1 nodes. If s is not in S, then all these Δ + 1 nodes in S have to transmit; otherwise, exactly Δ nodes in S have to transmit. In either case, at least Δ nodes in S have to transmit. Since all nodes transmitting in the same time slot must be apart from each other by a distance greater than ρ − 1, at most \({\alpha }_{\rho }\) nodes in C can transmit in a time slot. Hence, the Δ transmissions by the nodes in S take at least Δ ∕ αρ time slots.
Since L is also a trivial lower bound on the minimum aggregation latency, the approximation bound of the aggregation schedule is at most
11.6 Gathering Scheduling
Let s be the sink of the gathering. If L = 1, then all other nodes transmit to s one by one, and this schedule is optimal. So, we assume subsequently that L > 1. We first construct the dominating tree of G rooted at s. The routing of the gathering schedule is the spanning inward s-aborescence oriented from T. Our gather schedule utilizes a labelling of the edges of T, which is described below.
Let \(\left\langle {v}_{1},{v}_{2},\ldots,{v}_{n-1}\right\rangle\) be an ordering of \(V \setminus \left\{s\right\}\) in the descending order of depth in T with ties broken arbitrarily. For 1 ≤ i ≤ n, we assign the jth edge in the tree path from s to v j with a label \(2\left(i - 1\right) + j\) (see an example in Fig. 11.9). Clearly, the number of labels received by an edge connecting v and its parent is equal to the number of descendents (including v itself) of v in T. If v is a connector (respectively, dominator), all labels received by the edge between v and its parent are odd (respectively, even). In addition, all edges across two consecutive layers of the dominating tree receive distinct labels. We further claim that the largest label is 2n − 3. Consider a node v i and let h be the length of the path from s to v i . The maximum label assigned to the edges in the path from s to v i is \(2\left(i - 1\right) + h\). It is sufficient to show that
Since none of v 1, v 2, …, v i − 1 belongs to the path from s to v i , we have
and hence i ≤ n − h. Therefore,
So, the claim holds.
For each 1 ≤ k ≤ 2n − 3, let E k denote the set of edges of T which has been assigned with a label k, and A k denote the links in the inward s-arborescence oriented from the edges in E k . Then, for odd (respectively, even) k, all the receiving (respectively, transmitting) endpoints of links in A k are dominators. In addition, for each 1 ≤ k ≤ 2n − 3, every dominator is incident to at most one link in A k .
Now, we are ready to describe the gathering schedule. The schedule is partitioned in 2n − 3 rounds sequentially dedicated to
respectively. For each 1 ≤ k ≤ 2n − 3, the round for A k is scheduled as follows. We first compute a first-fit distance-\(\left(\rho + 1\right)\) coloring of the dominator endpoints of the links A k . Then each link whose dominator endpoint receives the ith color is scheduled in the ith time slot of the kth round. Thus, each round takes at most \({\beta }_{\rho }\) time slots. Consequently, the latency of the gathering schedule is \({\beta }_{\rho }\left(2n - 3\right)\). So, we have the following theorem.
Theorem 11.6.1.
The latency of the above gathering schedule is at most β ρ 2n − 3.
Since n − 1 is a trivial lower bound on the minimum gathering latency, the approximation ratio of the gathering schedule presented in this section is at most 2βρ.
11.7 Gossiping Scheduling
Let s be the graph center of G. If L = 1, we adopt the following two-phased schedule. In the first phase, all nodes other than s transmit one by one. This phase takes n − 1 time slots. In the second phase, the source node transmit all the received packets and its own packet one by one. This phase takes n time slots. So, the total latency is 2n − 1. Clearly, n is a trivial lower bound on the minimum gossiping latency, as every node has to transmits at least once and receive at least n − 1 times. Thus, its approximation factor is at most 2.
From now on, we assume that L > 1. Our gossiping schedule consists of two phases. In the first phase s collects all the packets from all other nodes, and in the second phase s broadcasts all the n packets to all other nodes. We adopt the gathering schedule presented in the previous section for the first phase. In the sequel, the node s disseminates all received packets and its own packet to all other nodes. We present a schedule for the second phase in the next.
We first construct the dominating tree T of G rooted at s. The routing of the second phase is the spanning s-aborescence oriented from T. Then, we compute the first-fit coloring distance-\(\left(\rho + 1\right)\) coloring of dominators. Let k be the number of colors used by this coloring. Then, \(k \leq {\beta }_{\rho }\). By proper renumbering of the colors, we assume that s has the first color. We group the time slots into 2k-slot frames (see Fig. 11.10). In each frame, the first k slots form a dominator subframe, and the remaining k slots form a connector subframe. Only dominators (respectively, connectors) are allowed to transmit in the dominator (respectively, connector) subframe in each frame. Each dominator with color i is only allowed to transmit in the ith slot of a dominator (respectively, connector) subframe. Each connector is only allowed to transmit in the subsets of time slots corresponding to the colors of its child dominators. The source node s transmits one packet in each frame. Each connector receiving a packet in a dominator subframe transmits the received packet in all the time slots corresponding to the colors of its child dominators of the connector subframe of the same frame. Each dominator with color i receiving a packet in a connector subframe transmits the received packet in the ith time slot of the dominator subframe of the subsequent frame.
The correctness of the above schedule is obvious. Next, we bound the latency of the second phase. After n − 1 frames, s transmits the last packet. After another L ′ frames, the last packet reaches all nodes in \({I}_{{L}^{{\prime}}}\). Finally, after another half frame, the last packet reaches all nodes. So, the total number of time slots taken by the second phase is at most
By Theorem 11.6.1, the first phase takes at most \({\beta }_{\rho }\left(2n - 3\right)\) time slots. Hence, the total number of time slots taken by the two phases is at most
Therefore, we have the following theorem.
Theorem 11.7.1.
The latency of the two-phased gossiping schedule is at most \({\beta }_{\rho }\left(4n - 6 + 2L\right).\)
In the next, we present a lower bound on the minimum gossiping latency.
Lemma 11.7.2.
The minimum gossiping latency of G is at least \(n - 1 + L\).
Proof.
The broadcasting of each message requires at least L transmissions. So, the total number of transmissions in any gossiping schedule is at least nL. This implies that some node must take at least L transmissions. On the other hand, every node must take n − 1 receptions. Therefore, some node takes at least \(n - 1 + L\) transmissions and receptions. This implies that \(n - 1 + L\) is a lower bound on the minimum gossiping latency.
Since
Therefore, the approximation factor of our gossiping schedule is at most \(4{\beta }_{\rho }\).
References
Akyildiz, I.F., Pompili, D., Melodia, T.: Underwater acoustic sensor networks: research challenges. Ad Hoc Network 3(3), 257–279 (2005)
Ambühl, C., Erlebach, T., Mihalák, M., Nunkesser, M.: Constant-approximation for minimum-weight (connected) dominating sets in unit disk graphs. Proceedings of the 9th International Workshop on Approximation Algorithms for Combinatorial Optimization (APPROX 2006). Lecture Notes in Computer Science, vol. 4110 pp. 3–14. Springer, Berlin (2006)
Baker, B.S.: Approximation algorithms for NP-complete problems on planar graphs. J. ACM 41(1), 153–180 (1994)
Baudis, G., Gröpl, C., Hougardy, S., Nierhoff, T., Prömel, H.J.: Approximating minimum spanning sets in hypergraphs and polymatroids. Technical Report, Humboldt-Universitt zu Berlin (2000)
Benini, L., Castelli, G., Macii, A., Poncino, M., Scarsi, R.: A discrete-time battery model for high-level power estimation. Proceedings of DATE, pp. 35–39 (2000)
Berman, P., Calinescu, G., Shah, C., Zelikovsky, A.: Power efficient monitoring management in sensor networks. IEEE Wireless Communication and Networking Conference (WCNC’04), Atlanta, pp. 2329–2334 (2004)
Berman, P., Calinescu, G., Shah, C., Zelikovsky, A.: Efficient energy management in sensor networks. In: Xiao, Y., Pan, Y. (eds.) Ad Hoc and Sensor Networks, Wireless Networks and Mobile Computing, vol. 2. Nova Science Publishers, New York (2005)
Bharghavan, V., Das, B.: Routing in ad hoc networks using minimum connected dominating sets. International Conference on Communication, Montreal, Canada (1997)
Butenko, S., Kahruman-Anderoglu, S., Ursulenko, O.: On connected domination in unit ball graphs. Optim. Lett. 5(2), 195–205 (2011)
Byrka, J., Grandoni, F., Rothvoss, T., Sanita, L.: An improved LP-based approximation for Steiner tree. STOC’10, pp. 583–592 (2010)
Calinescu, G., Ellis, R.: On the lifetime of randomly deployed sensor networks. DialM-POMC the Fifth ACM SIGACTSIGOPS International Workshop on Foundation of Mobile Computing (2008)
Calinescu, G., Kapoor, S., Olshevsky, A., Zelikovsky, A.: Network lifetime and power assignment in ad-hoc wireless networks. Proceedings of European Symposium on Algorithms (ESA’03), Lecture Notes in Computer Science, vol. 2832, pp. 114–126 (2003)
Cardei, M., Du, D.-Z.: Improving wireless sensor network lifetime through power aware organization. ACM Wireless Network. 11(3), 333–340 (2005)
Cardei, M., Cheng, M.X., Cheng, X., Du, D.-Z.: Connected domination in ad hoc wireless networks. In: Proceedings the Sixth International Conference on Computer Science and Informatics (CS&I’2002) (2002)
Cardei, M., Thai, M., Li, Y., Wu, W.: Energy-efficient target coverage in wireless sensor networks. IEEE INFOCOM, pp. 1976–1984 (2005)
Cardei, M., MacCallum, D., Cheng, X., Min, M., Jia, X., Li, D., Du, D.-Z.: Wireless sensor networks with energy efficient organization. J. Interconnect. Networks 3(3–4), 213–229 (2002)
Chen, Y.P., Liestman, A.L.: Approximating minimum size weakly-connected dominating sets for clustering mobile ad hoc networks. In: Proceedings of the Third ACM International Symposium on Mobile ad hoc Networking and Computing, Lausanne, Switzerland (2002)
Cheng, M.X., Gong, X.: Maximum lifetime coverage preserving scheduling algorithms in sensor networks. J. Global Optim. 51(3), 447–462 (2011)
Cheng, M.X., Ruan, L., Wu, W.: Achieving minimum coverage breach under bandwidth constraints in wireless sensor networks. INFOCOM, pp. 2638–2645 (2005)
Cheng, M.X., Ruan, L., Wu, W.: Coverage breach problems in bandwidth-constrained sensor networks. TOSN 3(2), 12 (2007)
Cheng, X., Ding, M., Du, D.H., Jia, X.: Virtual backbone construction in multihop ad hoc wireless networks. Wireless Comm. Mobile Comput. 6, 183–190 (2006)
Cheng, X., Huang, X., Li, D., Wu, W., Du, D.-Z.: A polynomial-time approximation scheme for minimum connected dominating set in ad hoc wireless networks. Networks 42(2), 202–208 (2003)
Chvátal, V.: A greedy heuristic for the set-covering problem. Math. Oper. Res. 4(3), 233–235 (1979)
Clark, B.N., Colbourn, C.J., Johnson, D.S.: Unit disk graphs. Disc. Math. 86(1–3), 165–177 (1990)
Colbourn, C.J., Stewart, L.K.: Permutation graphs: connected domination and Steiner trees. Disc. Math. 86(1–3), 179–189 (1990)
Dai, F., Wu, J.: An extended localized algorithm for connected dominating set formation in ad hoc wireless networks. IEEE Trans. Parallel Distrib. Syst. 15(10), 908–920 (2004)
Dai, D., Yu, C.: A (5 + ε)-approximation algorithm for minimum weighted dominating set in unit disk graph. Theor. Comput. Sci. 410, 756–765 (2009)
Deering, S., Farinacci, D., Jacobson, V., Lui, C.-G., Wei, L.: An architecture for wide area multicast routing. In: Proceedings of ACM SIGCOMM 1994, pp. 126–135 (1994)
Ding, L., Wu, W., Willson, J.K., Du, H., Lee, W.: Construction of directional virtual backbones with minimum routing cost in wireless networks. In: 30th Annual Joint Conference of IEEE Communication and Computer Society (INFOCOM), pp. 1557–1565 (2011)
Ding, L., Wu, W., Willson, J.K., Du, H., Lee, W.: Efficient virtual backbone construction with routing cost constraint in wireless networks using directional antennas. IEEE Trans. Mobile Comput. 11(7), 1102–1112 (2012)
Ding, L., Gao, X., Wu, W., Lee, W., Zhu, X., Du, D.-Z.: An exact algorithm for minimum CDS with shortest path constraint in wireless networks. Optim. Lett. (2010) published online
Ding, L., Gao, X., Wu, W., Lee, W., Zhu, Xu, Du, D.-Z.: Distributed construction of connected dominating sets with minimum routing cost in wireless network. In: Proceedings of the 30th International Conference on Distributed Computing Systems (ICDCS), pp. 448–457 (2010)
Ding, L., Wu, W., Willson, J.K., Du, H., Lee, W., Du, D.-Z.: Efficient algorithms for topology control problem with routing cost constraints in wireless networks. IEEE. Trans. Parallel. Distr. Syst. 22(10), 1601–1609 (2011)
Ding, L., Wu, W., Willson, J.K., Wu, L., Lu, Z., Lee, W.: Constant-approximation for target coverage problem in wireless sensor networks. In: Proceedings of the 31st Annual Joint Conference of IEEE Communication and Computer Society (INFOCOM) (2012)
Douglas, R.J.: NP-completeness and degree restricted spanning trees. Disc. Math. 105(1–3), 41–47 (1992)
Du, D.-Z., Ko, K.-I., Hu, X.: Design and Analysis of Approximation Algorithms. Springer, Berlin (2011)
Du, H., Pardalos, P.M., Wu, W., Wu, L.: Maximum lifetime connected coverage with two active-phase sensors. J. Global Optim. (2012), on line
Du, D.-Z., Thai, M.Y., Li, Y., Liu, D., Zhu, S.: Strongly connected dominating sets in wireless sensor networks with unidirectional links. APWeb, pp. 13–24 (2006)
Du, H., Wu, W., Ye, Q., Li, D., Lee, W., Xu, X.: CDS-based virtual backbone construction with guaranteed routing cost in wireless sensor networks. IEEE Trans. Parallel Distr. Syst., to appear
Du, D.-Z., Graham, R.L., Pardalos, P.M., Wan, P.J., Wu, W., Zhao, W.: Analysis of greedy approximation with nonsubmodular potential functions. In: Proceedings of SODA (2008)
Du, H., Ye, Q., Zhong, J., Wang, A., Lee, W., Park, H.: PTAS for minimum connected dominating set with routing cost constraint in wireless sensor networks. In: 4th Annual International Conference on Combinatorial Optimization and Applications (COCOA) (2010)
Du, H., Wu, W., Lee, W., Liu, Q., Zhang, Z., Du, D.-Z.: On minumum submodular cover with submodular cost. J. Global Optim. 50(2), 229–234 (2011)
Du, H., Ye, Q., Wu, W., Lee, W., Li, D., Du, D.-Z., Howard, S.: Constant approximation for virtual backbone construction with guaranteed routing cost in wireless sensor networks. INFOCOM, pp. 1737–1744 (2011)
Duchet, P., Meyniel, H.: On Hadwiger’s number and stability numbers. Annal. Disc. Math. 13, 71–74 (1982)
Eriksson, H.: MBone: the multicast backbone. Commun. ACM (1994)
Erlebach, T., Mihalák, M.: A (4 + ε)-approximation for the minimum-weight dominating set problem in unit disk graphs. WAOA, pp. 135–146 (2009)
Feige, U.: A threshold of lnn for approximating set cover. J. ACM 45(4), 634–652 (1998)
Feige, U., Halldórsson, M.M., Kortsarz, G., Srinivasan, A.: Approximating the domatic number. SIAM J. Comput. 32(1), 172–195 (2002)
Fodor, F.: The densest packing of 13 congruent circles in a circle. Beitrage Algebra Geom. 44(2), 431–440 (2003)
Folkman, J.H., Graham, R.L.: A packing inequality for compact convex subsets of the plane. Canad. Math. Bull. 12, 745–752 (1969)
Funke, S., Kesselman, A., Meyer, U., Segal, M.: A simple improved distributed algorithm for minimum CDS in unit disk graphs. ACM Trans. Sensor Net. 2, 444–453 (2006)
Fujito, T.: Approximation algorithms for submodular set cover with application, IEICE Trans. Inf. Syst. E83-D(3), 480–487 (2000)
Gao, X., Huang, Y., Zhang, Z., Wu, W.: (6+epsilon)-approximation for minimum weight dominating set in unit disk graphs. COCOON, pp. 551–557 (2008)
Gao, X., Wang, Y., Li, X., Wu, W.: Analysis on theoretical bounds of approximating dominating set problems. Disc. Math. Algorithms Appl. 1(1), 71–84 (2009)
Garg, N., Könemann, J.: Faster and simpler algorithms for multicommodity flows and other fractional packing problems. In: Proceedings of 39th Annual Symposium on the Foundations of Computer Science (FOCS), pp. 300–309 (1998)
Garey, M.R., Johnson, D.S.: The rectilinear Steiner tree problem is NP-complete. SIAM J. Appl. Math. 32, 826–834 (1977)
Garey, M.R., Johnson, D.S.: Computers and Intractability: A Guide to the Theory of NP-Completeness. Freeman and Sons, San Francisco, CA (1979)
Gfeller, B., Vicari, E.: A faster distributed approximation scheme for the connected dominating set problem for growth-bounded graphs. In: Proceedings of the 6th Ad-Hoc, Mobile, and Wireless Networks International Conference (ADHOC-NOW 2007). Lecture Notes in Computer Science, vol. 4686, pp. 59–73. Springer, Berlin (2007)
Gibson, M., Pirwani, I.: Algorithms for dominating set in disk graphs: breaking the logn barrier. Algorithms–ESA, pp. 243–254 (2010)
Green, P.E.: Fiber-Optic Networks. Prentical-Hall, Cambrige, MA (1992)
Groemer, H.: Über die Einlagerung von Kreisen in einen konvexen Bereich. Math. Z. 73, 285–294 (1960)
Guha, S., Khuller, S.: Approximation algorithms for connected dominating sets. Algorithmica 20(4), 374–387 (1998)
Guha, S., Khuller, S.: Improved methods for approximating node weighted Steiner trees and connected dominating sets. Springer Lect. Notes Comput. Sci. 1530, 54–66 (1998)
Hahn, R., Reichl, H.: Batteries and power supplies for wearable and ubiquitous computing. In: Proceedings of the 3rd International Symposium on Wearable Computers (1999)
Hoppe, R.: Bemerkungen de redaktion. Grunert Arch. Math. Phys. 56, 307–312 (1874)
Huang, Y., Gao, X., Zhang, Z., Wu, W.: A better constant-factor approximation for weighted dominating set in unit disk graph. J. Combin. Optim. 18(2), 179–194 (2009)
Kim, D., Wu, Y., Li, Y., Zou, F., Du, D.-Z.: Constructing minimum connected dominating sets with bounded diameters in wireless networks. IEEE Trans. Parallel Distrib. Syst. 20(2), 147–157 (2009)
Kim, D., Zhang, Z., Li, X., Wang, W., Wu, W., Du, D.-Z.: A better approximation algorithm for computing connected dominating sets in unit ball graphs. IEEE Trans. Mobile Comput. 9(8), 1108–1118 (2010)
Klein, P.N., Ravi, R.: A nearly best-possible approximation for node-weighted Steiner trees. J. Algorithms 19, 104–115 (1995)
Kuhn, F., Zollinger, A.: Ad-hoc networks beyond unit disk graphs. In: Proceedings of the Joint Workshop of Foundation of Mobile Computing (DIALM-POMC) (2003)
Laskar, R., Pfaff, J.: Domination and irredundance in split graphs. Technical Report 430, Department of Mathematical Sciences, Clemson University (1983)
Li, M., Wan, P.J., Yao, F.F.: Tighter approximation bounds for minimum CDS in wireless ad hoc networks. ISAAC’2009. Lecture Notes in Computer Science, vol. 5878, pp. 699–709 (2009)
Li, D., Du, X., Hu, X., Jia, X.: Minimizing number of wavelengths in multicast routing trees in WDM networks. Networks 35(4), 260–265 (2000)
Li, Y., Thai, M.T., Wang, F., Du, D.-Z.: On the construction of a strongly connected broadcast arborescence with bounded transmission delay. IEEE Trans. Mobile Comput. 5(10), 1460–1470 (2006)
Li, Y., Thai, M.Y., Wang, F., Yi, C.-W., Wan, P.-J., Du, D.-Z.: On greedy construction of connected dominating sets in wireless networks. Wireless Commun. Mobile Comput. 5, 927–932 (2005)
Li, D., Du, H., Wan, P.-J., Gao, X., Zhang, Z., Wu, W.: Minimum power strongly connected dominating sets in wireless networks. In: Proceedings of the 2008 International Conference on Wireless Networks (ICWN’08) (2008)
Li, D., Du, H., Wan, P.-J., Gao, X., Zhang, Z., Wu, W.: Construction of strongly connected dominating sets in asymmetric multihop wireless networks. Theoret. Comput. Sci. 410(8–10), 661–669 (2009)
Liu, Q., Li, X., Wu, L., Du, H., Zhang, Z., Wu, W., Xu, Y.: A new proof for Zassenhaus–Groemer–Oler inequality. Disc. Math. Algorithms Appl. (2012), to appear
Min, M., Du, H., Jiao, X., Huang, X., Huang, S.C.-H., Wu, W.: Improving construction for connected dominating set with Steiner tree in wireless sensor networks. J. Global Optim. 35, 111–119 (2006)
Moscibroda, T., Wattenhofer, R.: Maximizing the lifetime of dominating sets. In: Proceedings of the 5th IEEE International Workshop on Algorithms for Wireless, Mobile, Ad hoc and Sensor Networks (2005)
Mukherjee, B.: WDM-based local lightwave networks Part I: single-hop system. IEEE Networks 3, 12–26 (1992)
Mukherjee, B.: WDM-based local lightwave networks Part II: multihop system. IEEE Networks 4, 22–32 (1992)
Mustafa, N., Ray, S.: Improved results on geometric hitting set problems. Disc. Comput. Geometry 44(4), 883–895 (2010)
Nemhauser, G.L., Wolsey, L.A.: Integer and Combinatorial Optimization. Wiley, New York (1999)
Oler, N.: An inequality in the geometry of numbers. Acta Math. 105, 19–48 (1961)
Pandit, S., Pemmaraju, S.V., Varadarajan, K.R.: Approximation algorithms for domatic partitions of unit disk graphs. In: Dinur, L. et al. (eds.) APPROX and RANDOM 2009. Lecture Notes in Computer Science, vol. 5687, pp. 312–325 (2009)
Ramamurthy, B., Iness, J., Mukherjee, B.: Minimizing the number of optical amplifiers needed to support a multi-wavelength optical LAN/MAN. In: Proceedings of IEEE INFOCOM’97, pp. 261–268 (1997)
Ramaswami, R., Sasaki, G.: Multiwavelength optical networks with limited wavelength conversion. IEEE/ACM Trans. Networking 6(6), 744–754 (1998)
Raz, R., Safra, S.: A sub-constant error-probability low-degree test, and a sub-constant error-probability PCP characterization of NP. In: Proceedings of 28th STOCS (1997)
Ruan, L., Du, D.-Z., Hu, X., Jia, X., Li, D.: Approximations for color-covering problems. In: Proceedings of 1st International Congress of Chinese Mathematicians, pp. 503–507. Beijing, China (1998)
Ruan, L., Du, D.-Z., Hu, X., Jia, X., Li, D., Sun, Z.: Converter placement supporting broadcast in WDM optical networks. IEEE Trans. Comput. 50(7), 750–758 (2001)
Ruan, L., Du, H., Jia, X., Wu, W., Li, Y., Ko, K.-I.: A greedy approximation for minimum connected dominating set. Algorithmca, 329(1–3), 325–330 (2004)
Salhieh, A., Weinmann, J., Kochha, M., Schwiebert, L.: Power efficient topologies for wireless sensor networks. ICPP’2001, pp. 156–163 (2001)
Sampathkumar, E., Walikar, H.B.: The connected domination number of a graph. J. Math. Phys. Sci. 13(6), 607–613 (1979)
Sivakumar, R., Das, B., Bharghavan, V.: An improved spine-based infrastructure for routing in ad hoc networks. In: IEEE Symposium on Computer and Communications, Athens, Greece (1998)
Slijepcevic, S., Potkonjak, M.: Power efficient organization of wireless sensor networks. IEEE International Conference on Communications, pp. 472–476 (2001)
Solis-Oba, R.: 2-approximation algorithm for finding a spanning tree with maximum number of leaves. In: Proceedings of 6th European Symposium on Algorithms (ESA’98). Lecture Notes in Computer Science, vol. 1461, pp. 441–452. Springer, Berlin (1998)
Srinivasan, A., Wu, J.: TRACK: A novel connected dominating set based sink mobility model for WSNs. ICCCN, pp. 664–671 (2008)
Stojmenovic, I., Seddigh, M., Zunic, J.: Dominating sets and neighbor elimination based broadcasting algorithms in wireless networks. In: Proceedings of IEEE Hawaii International Conference on System Sciences (2001)
Sum, J., Wu, J., Ho, K.: Analysis on a localized pruning method for connected dominating sets. J. Inf. Sci. Eng. 23(4), 1073–1086 (2007)
Thai, M.T., Du, D.-Z.: Connected dominating sets in disk graphs with bidirectional links. IEEE Commun. Lett. 10(3), 138–140 (2006)
Thai, M.Y., Wang, F., Liu, D., Zhu, S., Du, D.-Z.: Connected dominating sets in wireless networks with different communication ranges. IEEE Trans. Mobile Comput. 6(7), 721–730 (2007)
Vahdatpour, A., Dabiri, F., Moazeni, M., Sarrafzadeh, M.: Theoretical bound and practical analysis of connected dominating set in ad hoc and sensor networks. In: Proceedings of 22nd International Symposium on Distributed Computing (DISC), pp. 481–495 (2008)
Wan, P.J., Alzoubi, K.M., Frieder, O.: Distributed construction of connected dominating set in wireless ad hoc networks. ACM/Springer Mobile Network. Appl. 9(2), 141–149 (2004). A preliminary version of this paper appeared in IEEE INFOCOM (2002)
Wan, P.-J., Alzoubi, K.M., Frieder, O.: A simple heuristic for minimum connected dominating set in graphs. Int. J. Found. Comput. Sci. 14(2), 323–333 (2003)
Wan, P.J., Wang, L., Yao, F.F.: Two-phased approximation algorithms for minimum CDS in wireless ad hoc networks. IEEE ICDCS, pp. 337–344 (2008)
Wan, P.-J., Xu, X., Wang, Z.: Wireless coverage with disparate ranges. ACM Mobihoc (2011)
Wan, P.-J., Du, D.-Z., Pardalos, P.M., Wu, W.: Greedy approximations for minimum submodular cover with submodular cost. Comput. Optim. Appl. 45(2), 463–474 (2010)
Wan, P.J., Huang, S.C.-H., Wang, L., Wan, Z., Jia, X.: Minimum-latency aggregation scheduling in multihop wireless networks. ACM MOBIHOC (2009)
Wan, P.-J., Wang, Z., Wan, Z., Huang, S.C.-H., Liu, H.: Minimum-latency schedulings for group communications in multi-channel multihop wireless networks. WASA (2009)
Wang, F., Thai, M.T., Du, D.-Z.: On the construction of 2-connected virtual backbone in wireless networks. IEEE Trans. Wireless Commun. 8(3), 1230–1237 (2009)
Wang, L., Wan, P.-J., Yao, F.F.: Minimum CDS in multihop wireless networks with disparate communication ranges, WASA (2010)
White, K., Parber, M., Pulleyblank, W.: Steiner trees, connected domination and strongly chordal graphs. Networks 15(1), 109–124 (1985)
Willson, J.K., Ding, L., Wu, W., Wu, L., Lu, Z., Lee, W.: A better constant-approximation for coverage problem in wireless sensor networks, preprint.
Willson, J.K., Gao, X., Qu, Z., Zhu, Y., Li, Y., Wu, W.: Efficient distributed algorithms for topology control problem with shortest path constraints. Disc. Math. Algorithms Appl. 1, 437–461 (2009)
Wolsey, L.A.: An analysis of the greedy algorithm for submodular set covering problem. Combinatorica 2(4), 385–393 (1982)
Wu, J., Li, H.: On calculating connected dominating set for efficient routing in ad hoc wireless networks. In: Proceedings of the 3rd ACM International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications, pp. 7–14 (1999)
Wu, J., Dai, F.: Virtual backbone construction in MANETs using adjustable transmission ranges. IEEE Trans. Mob. Comput. 5(9), 1188–1200 (2006)
Wu, J., Gao, M., Stojmenovic, I.: On calculating power-aware connected dominating sets for efficient routing in ad hoc wireless networks. ICPP pp. 346–356 (2001)
Wu, J., Wu, B., Stojmenovic, I.: Power-aware broadcasting and activity scheduling in ad hoc wireless networks using connected dominating sets. Wireless Commun. Mobile Comput. 3(4), 425–438 (2003)
Wu, J., Dai, F., Yang, S.: Iterative local solutions for connected dominating set in ad hoc wireless networks, MASS (2005)
Wu, J., Lou, W., Dai, F.: Extended multipoint relays to determine connected dominating sets in MANETs. IEEE Trans. Comput. 55(3), 347–337 (2006)
Wu, W., Du, H., Jia, X., Li, Y., Huang, S.C.-H.: Minimum connected dominating sets and maximal independent sets in unit disk graphs, Theor. Comput. Sci. 352(1–3), 1–7 (2006)
Xing, K., Cheng, W., Park, E.K., Rotenstreich, S.: Distributed connected dominating set construction in geometric k-disk graphs. IEEE ICDCS, pp. 673–680 (2008)
Zassenhaus, H.: Modern development in the geometry of numbers. Bull. Amer. Math. Soc. 67, 427–439 (1961)
Zhang, Y., Li, W.: Modeling and energy consumption evaluation of a stochastic wireless sensor networks. preprint (2011)
Zhang, Z., Gao, X., Wu, W., Du, D.-Z.: A PTAS for minimum connected dominating set in 3-dimensional wireless sensor networks. J. Global Optim. 45(3), 451–458 (2009)
Zhang, N., Shin, I., Zou, F., Wu, W., Thai, M.T.: Trade-off scheme for fault tolerant connected dominating sets on size and diameter. FOWANC, pp. 1–8 (2008)
Zhao, Y., Wu, J., Li, F., Lu, S.: VBS: Maximum lifetime sleep scheduling for wireless sensor networks using virtual backbones, INFOCOM pp. 366–370 (2010)
Zhong, C.: Sphere Packing. Springer, Berlin (1999)
Zhong, X., Wang, J., Hu, N.: Connected dominating set in 3-dimensional space for ad hoc network. In: Proceedings of IEEE Wireless Communications and Networking Conference (WCNC’07) (2007)
Zou, F., Li, X., Kim, D., Wu, W.: Construction of minimum connected dominating set in 3-dimensional wireless networks. In: Proceedings of Third International Conference on Wireless Algorithms, Systems and Applications (WASA 08) (2008)
Zou, F., Li, X., Gao, S., Wu, W.: Node-weighted Steiner tree approximation in unit disk graphs. J. Combin. Optim. 18(4), 342–349 (2009)
Zou, F., Wang, Y., Xu, X., Du, H., Li, X., Wan, P., Wu, W.: New approximations for weighted dominating sets and connected dominating sets in unit disk graphs. Theoret. Comput. Sci. 412(3), 198–208 (2011)
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media New York
About this chapter
Cite this chapter
Du, DZ., Wan, PJ. (2013). Minimum-Latency Scheduling. In: Connected Dominating Set: Theory and Applications. Springer Optimization and Its Applications, vol 77. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-5242-3_11
Download citation
DOI: https://doi.org/10.1007/978-1-4614-5242-3_11
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-5241-6
Online ISBN: 978-1-4614-5242-3
eBook Packages: Mathematics and StatisticsMathematics and Statistics (R0)