Abstract
A classic type of resource management problem is as follows: Given a certain amount of resource and a set of users, find an assignment of resource to maximize the number of satisfied users. The maximum lifetime coverage is such a classic type of problem in wireless sensor networks.
The only difference between suicide and martyrdom is press coverage.
Chuck Palahniuk
Access provided by Autonomous University of Puebla. Download chapter PDF
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
6.1 Motivation and Overview
A classic type of resource management problem is as follows: Given a certain amount of resource and a set of users, find an assignment of resource to maximize the number of satisfied users. The maximum lifetime coverage is such a classic type of problem in wireless sensor networks.
When a very large number of sensors are randomly deployed into a certain region possibly by an aircraft to monitor a certain set of targets, usually, there are a lot of redundant sensors. A better usage of those redundant sensors is to schedule active/sleep time of sensors to increase the lifetime of the system.
A simple scheduling is to divide sensors into disjoint subsets, each of which fully covers all targets, called a sensor cover [18, 80].
Sensor-Cover-Partition: Given n targets r 1, …, r n and m sensors s 1, …, s m , each covering a subset of targets, find the maximum number of disjoint sensor covers.
This problem is NP-hard. Various heuristics and approximation algorithms have been given in [11, 13, 96]. In general, there is no polynomial-time ( − ε)lnn)-approximation for any ε > 0 unless NP ⊆ DTIME(n O(loglogn)) [48] and there exists polynomial-time O(logn)-approximation [6, 80]. But, there is an open problem in a special case.
Open Problem 6.1.1.
Suppose all sensors are uniform, that is, they have the same sensing radius. It is unknown whether a polynomial-time constant-approximation exists or not.
When the sensor set and the target set are identical, Sensor-Cover-Partition becomes the following domatic partition problem.
Max#DS: Given a graph G = (V, E), partition the vertex set V into maximum number of disjoint dominating sets.
In general graph, there is no polynomial-time (1 − ε)lnn-approximation unless NP ⊆ DTIME(n O(loglogn)) and there exists polynomial-time O(logn)-approximation for Max#DS [48]. However, for unit disk graphs, there is a polynomial-time constant-approximation [86].
For this type of scheduling, the sensor is activated only once, that is, once the sensor is activated, it keeps active until it dies.
Cardei et al. [15] found that it is possible to increase the lifetime if each sensor is allowed to alternate between active and sleeping states. An example can be found in Chap. 1. The model is also better supported by an interesting fact discovered in [64] that putting a sensor alternatively in active and sleeping states in a proper way may double its lifetime since the battery could be recovered in a certain level during sleeping. The formulation of this model is as follows.
Max-Lifetime Coverage: Given n targets t 1, …, t n and m sensors s 1, …, s m , each covering a subset of targets, find a family of sensor cover S 1, …, S p with time lengths t 1, …, t p in [0, 1], respectively, to maximize \({t}_{1} + \cdots + {t}_{p}\) subject to that the total active time of every sensor is at most 1.
This is still an NP-hard problem. Cardei [15] formulated it as a 0-1 integer programming and designed a heuristic without guaranteed theoretical bound. Berman et al. [6, 7] first designed an approximation algorithm for Max-Lifetime Coverage with theoretical bound. They showed that there exists a polynomial-time approximation for Max-Lifetime Coverage with performance ratio O(logn) where n is the number of sensors. By employing Garg–Könemann theorem [55], Berman et al. reduced Max-Lifetime Coverage to the following:
MinW-Sensor-Cover: Consider n targets t 1, …, t n and m sensors s 1, …, s m , each covering a subset of targets. Given a weight function on sensors c : { s 1, …, s m } → R + , find the minimum total weight sensor cover.
They showed that if MinW-Sensor-Cover has a polynomial-time ρ-approximation, then Max-Lifetime Coverage has a polynomial-time (1 + ε)ρ-approximation for any ε > 0. Note that MinW-Sensor-Cover is equivalent to MinW-Sensor-Cover. Therefore, it has a polynomial-time (1 + logn)-approximation. Hence, Max-Lifetime Sensor Cover has a polynomial-time O(logn)-approximation. Actually, the first one who found the application of Garg-Könemann theorem in study of lifetime maximization type of problems is Calnescu et al. [12].
Ding et al. [34] noted that all results in Chap. 5 about MinW-DS can be extended to MinW-Sensor-Cover in the case that all sensors and targets lie in the Euclidean plane and all sensors have the same covering radius. Therefore, they proved that in this case, Max-Lifetime Coverage has polynomial-time 3.63-approximation.
Du et al. [37] extended this approach to study the coverage problem with connectivity requirement. They constructed a polynomial-time constant-approximation in geometric case and O(logn)-approximation in general case. However, many maximum lifetime coverage with connectivity requirement are still open. The following is an example.
Open Problem 6.1.2.
Does Max#CDS have a polynomial-time constant- approximation in unit disk graphs?
6.2 Max-Lifetime Connected Coverage
As described in the previous section, the method of Garg and Könemann [55] plays an important role in design of constant-approximation for various problems on the maximum lifetime coverage. In this section, we introduce it through the work of Du et al. [37].
Du et al. [37] studied a quite general model of wireless sensor networks which was previously studied by Zhang and Li [126]. In this model, each sensor has two modes, active mode and sleep mode, and the active mode has two phases, the full-active phase and the semi-active phase. A full-active sensor can sense, transmit, receive, and relay the data packets. A semi-active sensor cannot sense data packets, but it can transmit, receive, and relay data packets. Usually, a sensor in the full-active phase consumes more energy than in the semi-active phase.
Sensors are often randomly deployed into hostile environment, such as battlefield and inaccessible area with chemical or nuclear pollution, so that recharging batteries of sensors is a mission impossible. Assume the battery of each sensor contains a certain amount of energy, say unit amount. Then the lifetime of each sensor depends on energy consumption.
Du et al. [37] studied the following problem:
Max-Lifetime Connected-Coverage with two active phases: Given a set of targets and a set of sensors with two active phases, find an active/sleeping schedule for sensors to maximize the system lifetime where the network system is said to be alive if the following conditions are satisfied:
- (A1)
Every target is monitored by a full-active sensor.
- (A2)
All (full-/semi-) active sensors induce a connected subgraph.
They studied this problem with the primal-dual method of Garg and Könemann [55].
Let S be the set of all sensors. Assume all sensors are uniform, that is, they have the same communication radius R c , the same sensing radius R s , the same full-active energy consumption u of unit time and the same semi-active energy consumption v of unit time. Also, assume u ≥ v. A pair p of sets is called an active sensor set pair if p = (p 1, p 2) where p 1 is a set of full-active sensors and p 2 is a set of semi-active sensors with p 1 ∩ p 2 = ∅. For any active sensor set pair p, define
Suppose \(\mathcal{C}\) is the collection of all active sensor set pairs satisfying conditions (A1) and (A2). Then Max-Lifetime Connected Coverage with two active phases can be formulated as the following linear programming:
Its dual is as follows.
Motivated from the work of Garg and Könemann [55], Du et al. [37] designed the following primal-dual algorithm.
6.2.1 Primal-Dual Algorithm DPWW
Initially, choose x p = 0 for all \(p \in \mathcal{C}\) and y s = δ for all s ∈ S where δ is a positive constant which will be determined later.
In each iteration, carry out the following steps until (y s , s ∈ S) becomes dual feasible, that is, all constrains in dual linear programming are satisfied:
- Step 1.:
-
Compute a ρ-approximation solution p ∗ for
MinW-CSC with two active phases:
$$\min\limits_{p\in \mathcal{C}}\sum\limits_{s\in S}{a}_{s,p}{y}_{s}.$$ - Step 2.:
-
Compute a solution s ∗ for
$$\max\limits_{s\in S}{a}_{s,{p}^{{_\ast}}}.$$ - Step 3.:
-
Update x p and y s as follows:
-
(B1)
x p does not change for p≠p ∗ , and
$${x}_{{p}^{{_\ast}}} \leftarrow {x}_{{p}^{{_\ast}}} + \frac{1} {{a}_{{s}^{{_\ast}},{p}^{{_\ast}}}}.$$ -
(B2)
y s does not change for s ∉ p 1 ∗ ∪p 2 ∗ , and
$${y}_{s} \leftarrow {y}_{s}\left (1 + \theta \frac{{a}_{s,{p}^{{_\ast}}}} {{a}_{{s}^{{_\ast}},{p}^{{_\ast}}}}\right )$$
for s ∈ p 1 ∗ ∪p 2 ∗ where θ is a constant chosen later.
The following lemmas give two important properties at the end of above algorithm.
Lemma 6.2.1.
At the end of Primal-Dual Algorithm DPWW, \(({x}_{p},p \in \mathcal{C})\) may not be a primal-feasible solution. However, \(({x}_{p}/\tau, p \in \mathcal{C})\) is a primal-feasible solution where \(\tau = \frac{(v/u)\ln \frac{1+\theta } {v\delta } } {\ln (1+\theta v/u)}\).
Proof.
Note that when y s gets updated, the following facts must hold:
-
(a)
(y s , s ∈ S) is not dual feasible.
-
(b)
s ∈ p 1 ∗ ∪p 2 ∗ .
It follows immediately from (a) that \(\sum\nolimits _{s\in S}{a}_{s,{p}^{{_\ast}}}{y}_{s} < 1\), which together with (b) yields that y s < 1 ∕ v before y s receives any value change. After y s is updated, we have
Therefore, at the end of Primal-Dual Algorithm DPWW, \({y}_{s} < (1 + \theta )/v\).
Now, consider a constraint in the primal linear programming,
which may not be satisfied after x p is updated. If updating x p increases the value of \(\sum\nolimits _{p\in \mathcal{C}}{a}_{s,p}{x}_{p}\) by adding \(\frac{{a}_{s,{p}^{{_\ast}}}} {{a}_{{s}^{{_\ast}},{p}^{{_\ast}}}}\), then the value of y s is increased by multiplying a factor \(1 + \theta \frac{{a}_{s,{p}^{{_\ast}}}} {{a}_{{s}^{{_\ast}},{p}^{{_\ast}}}}\). Note that the value of \(\frac{{a}_{s,{p}^{{_\ast}}}} {{a}_{{s}^{{_\ast}},{p}^{{_\ast}}}}\) has only two possibilities, v ∕ u and 1. Suppose \(\frac{{a}_{s,{p}^{{_\ast}}}} {{a}_{{s}^{{_\ast}},{p}^{{_\ast}}}}\) takes value v ∕ u for k times and 1 for ℓ times. Then the value of \(\sum\nolimits _{p\in \mathcal{C}}{a}_{s,p}{x}_{p}\) receives an increase in \(k(v/u) + \mathcal{l}\) and
since initially y s = δ. Moreover, initially, \(\sum\nolimits _{p\in \mathcal{C}}{a}_{s,p}{x}_{p} = 0\). Thus, at the end of Primal-Dual Algorithm DPWW, the value of \(\sum\nolimits _{p\in \mathcal{C}}{a}_{s,p}{x}_{p}\) is \(k(v/u) + \mathcal{l}\). The maximum value of \(k(v/u) + \mathcal{l}\) can be obtained from the following linear programming with respect to k and ℓ:
By theory of the linear programming, the maximum value of objective function can always be achieved by some extreme point. For above one, the feasible domain has three extreme points
Their objective function values are
respectively. Note that \(\frac{z} {\ln (1+\theta z)}\) is strictly monotone decreasing for z ≤ 1. Thus,
Hence, at the end of Primal-Dual Algorithm DPWW,
Therefore,
Lemma 6.2.2.
At the end of Primal-Dual Algorithm DPWW,
where optlcc is the objective function value of optimal solution for Max-Lifetime Connected Coverage with two active phases and \(\tau = {(v/u)\log }_{1+\theta v/u}\frac{1+\theta } {\delta v}\).
Proof.
Denote by x p (0) the initial value of x p and by y s (0) the initial value of y s . Denote by x p (i) and y s (i), respectively, the values of x p and y s after the ith iteration. Denote by s ∗ (i) and p ∗ (i), respectively, the values of s ∗ and p ∗ in the ith iteration. Furthermore, denote \(X(i) =\sum\nolimits _{p\in \mathcal{C}}{x}_{p}(i)\) and Y (i) = ∑ s ∈ S y s (i). Then, for i ≥ 1, one has
Thus,
By the duality theory of linear programming, optlcc is also the objective function value of optimal solution for the dual linear programming. Therefore,
where the minimization is subject to y s ≥ 0 for s ∈ S. Hence,
Therefore,
Define
and
It is easy to prove by induction on i that Y (i) ≤ w(i). Moreover,
Suppose Primal-Dual Algorithm DPWW stops at the mth iteration. Then Y (m) ≥ 1 ∕ v. Hence
Therefore,
Theorem 6.2.3 (Du et al. [37]).
If MinW-CSC with two active phases has a polynomial-time ρ-approximation, then Max-Lifetime Connected Coverage with two active phases has a polynomial-time ρ(1 + ε)-approximation for any ε > 0.
Proof.
Choose \(\delta = (1 + \theta ){((1 + \theta )\vert S\vert )}^{-\theta }/v\). Note that
and \({(1 + \theta v/u)}^{u/(v\theta )+1} > e\) implies \(\ln (1 + \theta v/u) > \frac{v\theta } {u+v\theta }\). Thus,
Choose θ such that
Then
To estimate the running time of Primal-Dual Algorithm DPWW, let p ∗ be a polynomial time ρ-approximation solution for MinW-CSC with Two Active Phases. Note that every iteration can be carried out in polynomial-time. Therefore, it suffices to estimate the number of iterations. Note that at each iteration, at least one of y s has its value increased. In the proof of Lemma 6.2.1, it is already proved that at the end of the algorithm, each y s has its value increased by multiplying at most \({\log }_{1+\theta v/u}\frac{1+\theta } {\delta v}\). Therefore, the number of iterations is at most
where \(\delta v = (1 + \theta ){((1 + \theta )\vert S\vert )}^{-\theta }\) and θ is fixed as ε is fixed.
In Chap. 5, it has been shown that there exists a polynomial-time 3.63-approximation for MinW-DS. This result can be extended to the following problem.
MinW-Sensor-Cover: Consider a set of targets and a set of sensors lying in the Euclidean plane. Suppose all sensors have the same sensing radius R s , but may have different weights. The problem is to find the minimum weight subset of sensors for covering all targets.
Therefore, the following holds.
Theorem 6.2.4 (Du et al. [37]).
Max-Lifetime Connected Coverage with Two Active Phases has polynomial-time (7.105 + ε)-approximations for any ε > 0 when all targets and all sensors lie in the Euclidean plane and all sensors are uniform with R c ≥ 2R s .
Proof.
Let OptCSC be the optimal solution for MinW-CSC with two active phases. Compute a polynomial-time 3. 63-approximation solution A for MinW-Sensor-Cover with weight y s u for each sensor s. Then
where optCSC is the objective function value of OptCSC. Since R c ≥ 2R s , every sensor in A is adjacent to some sensor in OptCSC. This means that OptCSC ∪A induces a connected subgraph and hence OptCSC contains the set of Steiner nodes in a feasible solution for Node-weighted Steiner Tree on the terminal set A. Now, find a polynomial-time 3. 475-approximation solution B for Node-Weighted Steiner Tree with weight y s v for each sensor s. Then
Therefore,
6.3 Domatic Partition
So far, the best known constant-approximation for Max#DS in unit disk graphs is designed also using grid partition, however with a new technique. Let us start to introduce a problem on sensor-cover-partition with a separating line.
Sensor-Cover-Partition with Separating Line: Let L be a horizontal line. Given a set T of targets above L and a set S of sensors with sensing radius one below L, assume that every target is covered by at least one sensor. The problem is to find the maximum number of disjoint sensor covers. (A sensor cover is a subset of sensors covering all targets.)
Let \(\delta (S,T) =\min\limits_{t\in T}\vert \{s \in S\mid t \in {\mathrm{disk}}_{1}(s)\}\vert \) where disk1(s) denotes the disk with radius one and the center s. Call as the skyline the part, above line L, of envelope of disks disk1(s) for all s ∈ S. Let S′ be the set of those sensors s such that circle1(s) has a piece appearing in the skyline where circle1(s) denotes the circle with radius one and the center s. By Lemma 5.7.1 S′ lines up from right to left by following their pieces on the skyline. For any t ∈ T, denote C S′ (t) = disk1(t) ∩ S′. The following properties are important.
Lemma 6.3.1.
Let s 1 ,s 2 ,s 3 be three sensors in S with s 1 .x ≤ s 2 .x ≤ s 3 .x where s i .x denotes the x-coordinate of point s i . Suppose there exists a target t such that t ∈disk1 (s 1 ) ∩disk1 (s 3 ) but t∉disk2 (s 2 ). Then \(\mathrm{up}(L) \cap {\mathrm{disk}}_{1}({s}_{2}) \subseteq \mathrm{up}(L) \cap ({\mathrm{disk}}_{1}({s}_{1}) \cup {\mathrm{disk}}_{1}({s}_{3}))\) where up (L) denotes the half plane above the horizontal line L and circle1 (s 2 ) cannot appear in the skyline.
Proof.
It is trivial in the case that s 1. x = s 2. x or s 2. x = s3. x. Thus, we next assume s 1. x < s 2. x < s 3. x. For contradiction, suppose there exists a point p ∈ up(L) ∩ disk1(s 2) but \(p\not\in \mathrm{up}(L) \cap ({\mathrm{disk}}_{1}({s}_{1}) \cup {\mathrm{disk}}_{1}({s}_{3})\). Note that t ∈ disk1(s 1) ∩ disk1(S 3) implies that for any point q ∈ up(L) with q. x = t. x and q. y ≤ t. y, q ∈ disk1(s 1) ∩ disk1(S 3). Moreover, t ∉ disk1(s 2) implies that for any q ∈ up(L) ∩ disk1(s 2) with q. x = t. x and q. y < t. y and hence q ∈ disk1(s 1) ∩ disk1(S 3). It follows that p. x≠t. x. Hence p. x < t. x or p. x > t. x. First, consider the case that p. x < t. x. In this case, two segments ps 2 and ts 1 must intersect at a point o. Note that | ps 2 | < | ps 1 | and | ts 2 | > | ts 1 | . Hence, \(\vert p{s}_{2}\vert + \vert t{s}_{1}\vert < \vert p{s}_{1}\vert + \vert t{s}_{2}\vert \). However, by the property of the triangle,
and
Therefore
a contradiction. Similarly, a contradiction can result from the case that p. x > t. x.
Note that circle1(s 2) ∩ up(L) cannot intersect \(\mathrm{up}(L) \cap ({\mathrm{circle}}_{1}({s}_{1}) \cup {\mathrm{circle}}_{1}({s}_{3}))\). In fact, if they have an intersection point p, then a contradiction can still result from the above argument by noting that the argument still works when | ps 2 | = | ps 1 | . So, up(L) ∩ disk1(s 2) is contained strictly inside of \(\mathrm{up}(L) \cap ({\mathrm{disk}}_{1}({s}_{1}) \cup {\mathrm{disk}}_{1}({s}_{3}))\). Hence, circle1(s 2) cannot appear in the skyline.
Lemma 6.3.2.
For any t ∈ T, C S′ (t) is a nonempty contiguous subset of the ordered set S′.
Proof.
Suppose s 1, s 2, s 3 ∈ S′ with s 1. x ≤ s 2. x ≤ s 3. x. If s 1, s 3 ∈ C S′ (t) and s 2. x ∉ C S′ (t), then by Lemma 6.3.1, s 2 ∉ S′, a contradiction.
Lemma 6.3.3.
Suppose T′ is a subset of targets, satisfying a property that for any two distinct targets t,t′∈ T′, C S (t)⊈C S (t′). Then for any two distinct t,t′∈ T′, C S′ (t) ∩ C S′ (t′)≠∅ implies that C S′ (t) contains an endpoint of C S′ (t′).
Proof.
The lemma holds trivially in the case that C S′ (t) is not contained in C S′ (t). So, we next assume C S′ (t) ⊆ C S′ (t). By the assumption on T′, there exists s ∈ C S (t) ∖ C S (t′). Let s r and s l be the right endpoint and the left endpoint of C S′ (t′). Let s′ ∈ C S′ (t) ∩ C S′ (t′). Next, consider two cases.
Case 1. s l . x ≤ s. x ≤ s r . x. Note that t′ is contained in disk1(s r ) and disk1(s l ) but not contained in disk1(s). By Lemma 6.3.1, \(t \in \mathrm{up}(L) \cap {\mathrm{disk}}_{s} \subseteq \mathrm{up}(L) \cap ({\mathrm{disk}}_{1}({s}_{l}) \cup {\mathrm{disk}}_{1}({s}_{r}))\). Therefore, s l ∈ C S′ (t) or s r ∈ C S′ (t).
Case 2. s 1. x > s. x or s r . x < s. x. Note that s l . x ≤ s′. x ≤ s r . x. For contradiction, suppose t is contained by neither disk1(s l ) nor disk1(s r ). In the case that s. x < s 1. x, t is contained by disk1(s) and disk1(s′), but not contained by disk1(s l ). By Lemma 6.3.1, s l ∉ S′, a contradiction. Similarly, a contradiction can result from the case that s r . x < s. x.
Now, it is ready to show the following.
Theorem 6.3.4.
There is a polynomial-time algorithm which can find at least δ(S,T)∕4 disjoint sensor covers.
Proof.
Consider the following algorithm.
The DomPart Algorithm.
input: a sensor set S and a target set T.
j ← 0;
E ← S;
while E is a set cover do begin
1. j ← j + 1;
2. T′ ← T;
while there exist t, t′ ∈ T′ such that C E (t) ⊆ C E (t′)
do T′ ← T′ ∖ { t′};
3. Let E′ ⊆ E contribute the skyline of disks at E;
4. Find a maximal subset T′ of T′ such that C E′ (t) for t ∈ T′ are disjoint;
5. \({A}_{j} =\{ \mbox{ two endpoints of}\ {C}_{E^{\prime}}(t)\mid t \in T^{\prime\prime}\}\);
6. E ← E ∖ A j ;
end-while
output: A 1, A 2, …, A j .
First, we show that each A i for i = 1, …, j is a sensor cover. In fact, for each t′ ∈ T′, A i contains two endpoints of C E′ (t′) and hence t′ is covered by A i . For t′ ∈ T′ ∖ T′, there exists t′ ∈ T′ such that C E′ (t′) ∩ C E′ (t′)≠∅. By Lemma 6.3.3, C E′ (t′) contains an endpoint of C E′ (t′) and hence t′ is covered by A i . For t ∈ T ∖ T′, there exists t′ ∈ T′ such that C E (t′) ⊆ C E (t). So, there exists t′ ∈ T′ such that C E (t) contains an endpoint of C E′ (t′) and hence t is covered by A i .
Next, we show that at the end of the jth iteration, | C E (t) | ≥ δ(S, T) − 4j for every t ∈ T. To do so, let E j denote the E at the end of the jth iteration. Suppose this inequality holds at the end of the (j − 1)th iteration, that is, \(\vert {C}_{{E}_{j-1}}(t)\vert \geq \delta (S,T) - 4(j - 1)\) for all t ∈ T. We show that \(\vert {C}_{{E}_{j}}(t)\vert \geq \delta (S,T) - 4j\) for all t ∈ T.
In the jth iteration, for t′ ∈ T′, two endpoints of C E′ (t′) are deleted from E j − 1 and hence
For t′ ∈ T′ ∖ T′, if C E′ (t′) contains an endpoint of C E′ (t′) for t′ ∈ T′, then by Lemma 6.3.3, C E′ (t′) must contain an endpoint of C E′ (t′). Thus, there are at most two such t′’s because all C E′ (t′) for t′ ∈ T′ are disjoint. This means that
For t ∈ T ∖ T′, there exists t′ ∈ T′ such that \({C}_{{E}_{j-1}}(t^{\prime}) \subseteq {C}_{{E}_{j-1}}(t)\). This relationship is preserved in the algorithm, that is, \({C}_{{E}_{j}}(t^{\prime}) \subseteq {C}_{{E}_{J}}(t)\). Therefore,
It follows immediately from this inequality that at the end of The DomPart Algorithm, j ≥ δ(S, T) ∕ 4.
With Theorem 6.3.4, Pandit et al. [86] constructed an algorithm for Max#DS in unit disk graphs as follows.
Put input unit disk graph G = (V, E) into a square and partition the square with a grid of cells with diameter one (or say, diagonal length one). A cell is called a heavy cell if it contains at least δ ∕ 14 nodes where δmin is the minimum node degree of G. A cell is light if it is not heavy. For each node v in a light cell, disk1(v) intersects at most 14 cells, at least one of which contains at least δmin ∕ 14 nodes adjacent to v. Choose such a heavy cell σ and put v to \({T}^{\sigma }\), say that v belongs to σ. Let \({S}^{\sigma } = \sigma \cap V\). Consider \({S}^{\sigma }\) as a sensor set and \({T}^{\sigma }\) as a target set. Then the following lemma gives an important fact.
Lemma 6.3.5.
If for every heavy cell σ, \({S}^{\sigma }\) can be partitioned into k sensor covers for \({T}^{\sigma }\), then G has k disjoint dominating sets.
Proof.
Choose a sensor cover \({A}^{\sigma }\) for each heavy cell σ. Let A be the union of \({A}^{\sigma }\) for σ over all heavy cells. Then A is a dominating set because each \({A}^{\sigma }\) dominates not only all nodes in \({T}^{\sigma }\), but also dominates all nodes in \({S}^{\sigma }\).
For each heavy cell σ, partition \({T}^{\sigma }\) into four parts \(({T}_{\mathrm{north}}^{\sigma },{T}_{\mathrm{south}}^{\sigma },{T}_{\mathrm{east}}^{\sigma },{T}_{\mathrm{west}}^{\sigma })\) where \({T}_{\mathrm{north}}^{\sigma }\) consists of nodes lying above the line through the upper bound of σ, \({T}_{\mathrm{south}}^{\sigma }\) consists of nodes lying below the line through the lower bound of σ, \({T}_{\mathrm{east}}^{\sigma }\) consists of nodes lying in the right of the line through the right bound of σ, and \({T}_{\mathrm{west}}^{\sigma }\) consists of nodes lying in the left of the line through the left bound of σ. When two parts are available for a node v in \({T}^{\sigma }\), v can arbitrarily choose one of them as its home. Corresponding these four parts, partition \({S}^{\sigma }\) also into four parts \(({S}_{\mathrm{north}}^{\sigma },{S}_{\mathrm{south}}^{\sigma },{S}_{\mathrm{east}}^{\sigma },{S}_{\mathrm{west}}^{\sigma })\) by independently and randomly distributing each node into these four parts.
Now, solve Sensor-Cover-Partition with separation line on four inputs \(({S}_{\mathrm{north}}^{\sigma },{T}_{\mathrm{north}}^{\sigma })\), \(({S}_{\mathrm{south}}^{\sigma },{T}_{\mathrm{south}}^{\sigma })\), \(({S}_{\mathrm{east}}^{\sigma },{T}_{\mathrm{east}}^{\sigma })\), and \(({S}_{\mathrm{west}}^{\sigma },{T}_{\mathrm{west}}^{\sigma })\). Combine those solutions into k disjoint dominating sets of G where
Next, we show that k ≥ δmin ∕ 112 with a quite high probability.
Note that for each \(t \in {T}^{\sigma }\), \(\vert \sigma \cap {\mathrm{disk}}_{1}(t)\vert \geq {\delta }^{\mathrm{min}}/14\) and the probability of at least one of two nodes in \(\sigma \cap {\mathrm{disk}}_{1}(t)\) distributed in the part containing t is 3 ∕ 4. By Chernoff bound, the probability of at least δmin ∕ 56 nodes in σ ∩ disk1(t) distributed in the part containing t is at least \(1 -{\mathrm{e}}^{-{\delta }^{\mathrm{min}}/112 }\).
Note that for each heavy cell σ, there are at most 20 cells within distance one to σ. So, there are at most 20 light cells which contain a node belonging to σ. Hence, \(\vert {T}^{\sigma }\vert \leq (20/14){\delta }^{\mathrm{min}}\). Thus, the probability of the following held is at least \(1 - (20/14){\delta }^{\mathrm{min}}{\mathrm{e}}^{-{\delta }^{\mathrm{min}}/112 }\):
Since the number of heavy cells cannot be bounded by O(δmin), it is hard to estimate the probability of k ≥ δmin ∕ 56. Thus, it requires more efforts on distribution of each element of S σ in order to establish a solution of the following problem.
Open Problem 6.3.6.
Is there a polynomial-time algorithm which produces \(\Omega ({\delta }^{\mathrm{min}})\) disjoint dominating sets for G with high probability?
6.4 Min-Weight Dominating Set
Pandit et al. [86] gave an interesting idea to construct approximation algorithms for MinW-DS using algorithm for Max#DS.
Consider the following LP-relaxation of MinW-DS.
Let (x i ∗ , i ∈ V ) be an optimal solution of this LP. Denote n = | V | . Let
Lemma 6.4.1.
The following holds:
-
(1)
For j ∈ V, \(\sum\nolimits _{i\in {\mathrm{disk}}_{1}(j)}\bar{{x}}_{i} \geq 1/2\).
-
(2)
\(\sum\nolimits _{i\in V }{c}_{i}\bar{{x}}_{i} \leq 2 \cdot {\mathrm{opt}}_{\mathrm{WDS}}\) where opt eds is the objective function value of an optimal solution for MinW-DS.
Proof.
Since | V ∩ disk(j) | ≤ n, there are at most nx i ∗ are rounded down to 0. Therefore,
This means that (1) holds. For (2), note that
Construct a set P by making \(2n \cdot \bar{ {x}}_{j}\) copies of node j for each j ∈ V. Suppose each copy of j has the same weight as that of j.
Lemma 6.4.2.
c(P) ≤ 4n ⋅optWDS.
Proof.
By Lemma 6.4.1, \(c(P) = 2n \cdot \sum\nolimits _{i\in V }{c}_{i} \cdot \bar{ {x}}_{i} \leq 4n{\mathrm{opt}}_{\mathrm{WDS}}\).
Lemma 6.4.3.
δ(P,V ) ≥ n.
Proof.
By Lemma 6.4.1, \(\sum\nolimits _{i\in {\mathrm{disk}}_{1}(j}\bar{{x}}_{i} \geq 1/2\). Thus, for each j ∈ V, \(\vert P \cap {\mathrm{disk}}_{1}(j)\vert = 2n\sum\nolimits _{i\in {\mathrm{disk}}_{1}(j)}\bar{{x}}_{i} \geq n\).
Suppose there is an algorithm which can produce at least δ(P, V ) ∕ C sensor cover packing A 1, …, A t (t ≥ n ∕ C) for sensor set P and target set V. Then there exists A i such that
This means that the following holds.
Theorem 6.4.4.
If there is a polynomial-time algorithm for Sensor-Cover-Partition which can produce δ(P,V )∕C sensor covers for sensor set P and target set V, then there is a polynomial-time 4C-approximation for MinW-DS.
References
Akyildiz, I.F., Pompili, D., Melodia, T.: Underwater acoustic sensor networks: research challenges. Ad Hoc Network 3(3), 257–279 (2005)
Ambühl, C., Erlebach, T., Mihalák, M., Nunkesser, M.: Constant-approximation for minimum-weight (connected) dominating sets in unit disk graphs. Proceedings of the 9th International Workshop on Approximation Algorithms for Combinatorial Optimization (APPROX 2006). Lecture Notes in Computer Science, vol. 4110 pp. 3–14. Springer, Berlin (2006)
Baker, B.S.: Approximation algorithms for NP-complete problems on planar graphs. J. ACM 41(1), 153–180 (1994)
Baudis, G., Gröpl, C., Hougardy, S., Nierhoff, T., Prömel, H.J.: Approximating minimum spanning sets in hypergraphs and polymatroids. Technical Report, Humboldt-Universitt zu Berlin (2000)
Benini, L., Castelli, G., Macii, A., Poncino, M., Scarsi, R.: A discrete-time battery model for high-level power estimation. Proceedings of DATE, pp. 35–39 (2000)
Berman, P., Calinescu, G., Shah, C., Zelikovsky, A.: Power efficient monitoring management in sensor networks. IEEE Wireless Communication and Networking Conference (WCNC’04), Atlanta, pp. 2329–2334 (2004)
Berman, P., Calinescu, G., Shah, C., Zelikovsky, A.: Efficient energy management in sensor networks. In: Xiao, Y., Pan, Y. (eds.) Ad Hoc and Sensor Networks, Wireless Networks and Mobile Computing, vol. 2. Nova Science Publishers, New York (2005)
Bharghavan, V., Das, B.: Routing in ad hoc networks using minimum connected dominating sets. International Conference on Communication, Montreal, Canada (1997)
Butenko, S., Kahruman-Anderoglu, S., Ursulenko, O.: On connected domination in unit ball graphs. Optim. Lett. 5(2), 195–205 (2011)
Byrka, J., Grandoni, F., Rothvoss, T., Sanita, L.: An improved LP-based approximation for Steiner tree. STOC’10, pp. 583–592 (2010)
Calinescu, G., Ellis, R.: On the lifetime of randomly deployed sensor networks. DialM-POMC the Fifth ACM SIGACTSIGOPS International Workshop on Foundation of Mobile Computing (2008)
Calinescu, G., Kapoor, S., Olshevsky, A., Zelikovsky, A.: Network lifetime and power assignment in ad-hoc wireless networks. Proceedings of European Symposium on Algorithms (ESA’03), Lecture Notes in Computer Science, vol. 2832, pp. 114–126 (2003)
Cardei, M., Du, D.-Z.: Improving wireless sensor network lifetime through power aware organization. ACM Wireless Network. 11(3), 333–340 (2005)
Cardei, M., Cheng, M.X., Cheng, X., Du, D.-Z.: Connected domination in ad hoc wireless networks. In: Proceedings the Sixth International Conference on Computer Science and Informatics (CS&I’2002) (2002)
Cardei, M., Thai, M., Li, Y., Wu, W.: Energy-efficient target coverage in wireless sensor networks. IEEE INFOCOM, pp. 1976–1984 (2005)
Cardei, M., MacCallum, D., Cheng, X., Min, M., Jia, X., Li, D., Du, D.-Z.: Wireless sensor networks with energy efficient organization. J. Interconnect. Networks 3(3–4), 213–229 (2002)
Chen, Y.P., Liestman, A.L.: Approximating minimum size weakly-connected dominating sets for clustering mobile ad hoc networks. In: Proceedings of the Third ACM International Symposium on Mobile ad hoc Networking and Computing, Lausanne, Switzerland (2002)
Cheng, M.X., Gong, X.: Maximum lifetime coverage preserving scheduling algorithms in sensor networks. J. Global Optim. 51(3), 447–462 (2011)
Cheng, M.X., Ruan, L., Wu, W.: Achieving minimum coverage breach under bandwidth constraints in wireless sensor networks. INFOCOM, pp. 2638–2645 (2005)
Cheng, M.X., Ruan, L., Wu, W.: Coverage breach problems in bandwidth-constrained sensor networks. TOSN 3(2), 12 (2007)
Cheng, X., Ding, M., Du, D.H., Jia, X.: Virtual backbone construction in multihop ad hoc wireless networks. Wireless Comm. Mobile Comput. 6, 183–190 (2006)
Cheng, X., Huang, X., Li, D., Wu, W., Du, D.-Z.: A polynomial-time approximation scheme for minimum connected dominating set in ad hoc wireless networks. Networks 42(2), 202–208 (2003)
Chvátal, V.: A greedy heuristic for the set-covering problem. Math. Oper. Res. 4(3), 233–235 (1979)
Clark, B.N., Colbourn, C.J., Johnson, D.S.: Unit disk graphs. Disc. Math. 86(1–3), 165–177 (1990)
Colbourn, C.J., Stewart, L.K.: Permutation graphs: connected domination and Steiner trees. Disc. Math. 86(1–3), 179–189 (1990)
Dai, F., Wu, J.: An extended localized algorithm for connected dominating set formation in ad hoc wireless networks. IEEE Trans. Parallel Distrib. Syst. 15(10), 908–920 (2004)
Dai, D., Yu, C.: A (5 + ε)-approximation algorithm for minimum weighted dominating set in unit disk graph. Theor. Comput. Sci. 410, 756–765 (2009)
Deering, S., Farinacci, D., Jacobson, V., Lui, C.-G., Wei, L.: An architecture for wide area multicast routing. In: Proceedings of ACM SIGCOMM 1994, pp. 126–135 (1994)
Ding, L., Wu, W., Willson, J.K., Du, H., Lee, W.: Construction of directional virtual backbones with minimum routing cost in wireless networks. In: 30th Annual Joint Conference of IEEE Communication and Computer Society (INFOCOM), pp. 1557–1565 (2011)
Ding, L., Wu, W., Willson, J.K., Du, H., Lee, W.: Efficient virtual backbone construction with routing cost constraint in wireless networks using directional antennas. IEEE Trans. Mobile Comput. 11(7), 1102–1112 (2012)
Ding, L., Gao, X., Wu, W., Lee, W., Zhu, X., Du, D.-Z.: An exact algorithm for minimum CDS with shortest path constraint in wireless networks. Optim. Lett. (2010) published online
Ding, L., Gao, X., Wu, W., Lee, W., Zhu, Xu, Du, D.-Z.: Distributed construction of connected dominating sets with minimum routing cost in wireless network. In: Proceedings of the 30th International Conference on Distributed Computing Systems (ICDCS), pp. 448–457 (2010)
Ding, L., Wu, W., Willson, J.K., Du, H., Lee, W., Du, D.-Z.: Efficient algorithms for topology control problem with routing cost constraints in wireless networks. IEEE. Trans. Parallel. Distr. Syst. 22(10), 1601–1609 (2011)
Ding, L., Wu, W., Willson, J.K., Wu, L., Lu, Z., Lee, W.: Constant-approximation for target coverage problem in wireless sensor networks. In: Proceedings of the 31st Annual Joint Conference of IEEE Communication and Computer Society (INFOCOM) (2012)
Douglas, R.J.: NP-completeness and degree restricted spanning trees. Disc. Math. 105(1–3), 41–47 (1992)
Du, D.-Z., Ko, K.-I., Hu, X.: Design and Analysis of Approximation Algorithms. Springer, Berlin (2011)
Du, H., Pardalos, P.M., Wu, W., Wu, L.: Maximum lifetime connected coverage with two active-phase sensors. J. Global Optim. (2012), on line
Du, D.-Z., Thai, M.Y., Li, Y., Liu, D., Zhu, S.: Strongly connected dominating sets in wireless sensor networks with unidirectional links. APWeb, pp. 13–24 (2006)
Du, H., Wu, W., Ye, Q., Li, D., Lee, W., Xu, X.: CDS-based virtual backbone construction with guaranteed routing cost in wireless sensor networks. IEEE Trans. Parallel Distr. Syst., to appear
Du, D.-Z., Graham, R.L., Pardalos, P.M., Wan, P.J., Wu, W., Zhao, W.: Analysis of greedy approximation with nonsubmodular potential functions. In: Proceedings of SODA (2008)
Du, H., Ye, Q., Zhong, J., Wang, A., Lee, W., Park, H.: PTAS for minimum connected dominating set with routing cost constraint in wireless sensor networks. In: 4th Annual International Conference on Combinatorial Optimization and Applications (COCOA) (2010)
Du, H., Wu, W., Lee, W., Liu, Q., Zhang, Z., Du, D.-Z.: On minumum submodular cover with submodular cost. J. Global Optim. 50(2), 229–234 (2011)
Du, H., Ye, Q., Wu, W., Lee, W., Li, D., Du, D.-Z., Howard, S.: Constant approximation for virtual backbone construction with guaranteed routing cost in wireless sensor networks. INFOCOM, pp. 1737–1744 (2011)
Duchet, P., Meyniel, H.: On Hadwiger’s number and stability numbers. Annal. Disc. Math. 13, 71–74 (1982)
Eriksson, H.: MBone: the multicast backbone. Commun. ACM (1994)
Erlebach, T., Mihalák, M.: A (4 + ε)-approximation for the minimum-weight dominating set problem in unit disk graphs. WAOA, pp. 135–146 (2009)
Feige, U.: A threshold of lnn for approximating set cover. J. ACM 45(4), 634–652 (1998)
Feige, U., Halldórsson, M.M., Kortsarz, G., Srinivasan, A.: Approximating the domatic number. SIAM J. Comput. 32(1), 172–195 (2002)
Fodor, F.: The densest packing of 13 congruent circles in a circle. Beitrage Algebra Geom. 44(2), 431–440 (2003)
Folkman, J.H., Graham, R.L.: A packing inequality for compact convex subsets of the plane. Canad. Math. Bull. 12, 745–752 (1969)
Funke, S., Kesselman, A., Meyer, U., Segal, M.: A simple improved distributed algorithm for minimum CDS in unit disk graphs. ACM Trans. Sensor Net. 2, 444–453 (2006)
Fujito, T.: Approximation algorithms for submodular set cover with application, IEICE Trans. Inf. Syst. E83-D(3), 480–487 (2000)
Gao, X., Huang, Y., Zhang, Z., Wu, W.: (6+epsilon)-approximation for minimum weight dominating set in unit disk graphs. COCOON, pp. 551–557 (2008)
Gao, X., Wang, Y., Li, X., Wu, W.: Analysis on theoretical bounds of approximating dominating set problems. Disc. Math. Algorithms Appl. 1(1), 71–84 (2009)
Garg, N., Könemann, J.: Faster and simpler algorithms for multicommodity flows and other fractional packing problems. In: Proceedings of 39th Annual Symposium on the Foundations of Computer Science (FOCS), pp. 300–309 (1998)
Garey, M.R., Johnson, D.S.: The rectilinear Steiner tree problem is NP-complete. SIAM J. Appl. Math. 32, 826–834 (1977)
Garey, M.R., Johnson, D.S.: Computers and Intractability: A Guide to the Theory of NP-Completeness. Freeman and Sons, San Francisco, CA (1979)
Gfeller, B., Vicari, E.: A faster distributed approximation scheme for the connected dominating set problem for growth-bounded graphs. In: Proceedings of the 6th Ad-Hoc, Mobile, and Wireless Networks International Conference (ADHOC-NOW 2007). Lecture Notes in Computer Science, vol. 4686, pp. 59–73. Springer, Berlin (2007)
Gibson, M., Pirwani, I.: Algorithms for dominating set in disk graphs: breaking the logn barrier. Algorithms–ESA, pp. 243–254 (2010)
Green, P.E.: Fiber-Optic Networks. Prentical-Hall, Cambrige, MA (1992)
Groemer, H.: Über die Einlagerung von Kreisen in einen konvexen Bereich. Math. Z. 73, 285–294 (1960)
Guha, S., Khuller, S.: Approximation algorithms for connected dominating sets. Algorithmica 20(4), 374–387 (1998)
Guha, S., Khuller, S.: Improved methods for approximating node weighted Steiner trees and connected dominating sets. Springer Lect. Notes Comput. Sci. 1530, 54–66 (1998)
Hahn, R., Reichl, H.: Batteries and power supplies for wearable and ubiquitous computing. In: Proceedings of the 3rd International Symposium on Wearable Computers (1999)
Hoppe, R.: Bemerkungen de redaktion. Grunert Arch. Math. Phys. 56, 307–312 (1874)
Huang, Y., Gao, X., Zhang, Z., Wu, W.: A better constant-factor approximation for weighted dominating set in unit disk graph. J. Combin. Optim. 18(2), 179–194 (2009)
Kim, D., Wu, Y., Li, Y., Zou, F., Du, D.-Z.: Constructing minimum connected dominating sets with bounded diameters in wireless networks. IEEE Trans. Parallel Distrib. Syst. 20(2), 147–157 (2009)
Kim, D., Zhang, Z., Li, X., Wang, W., Wu, W., Du, D.-Z.: A better approximation algorithm for computing connected dominating sets in unit ball graphs. IEEE Trans. Mobile Comput. 9(8), 1108–1118 (2010)
Klein, P.N., Ravi, R.: A nearly best-possible approximation for node-weighted Steiner trees. J. Algorithms 19, 104–115 (1995)
Kuhn, F., Zollinger, A.: Ad-hoc networks beyond unit disk graphs. In: Proceedings of the Joint Workshop of Foundation of Mobile Computing (DIALM-POMC) (2003)
Laskar, R., Pfaff, J.: Domination and irredundance in split graphs. Technical Report 430, Department of Mathematical Sciences, Clemson University (1983)
Li, M., Wan, P.J., Yao, F.F.: Tighter approximation bounds for minimum CDS in wireless ad hoc networks. ISAAC’2009. Lecture Notes in Computer Science, vol. 5878, pp. 699–709 (2009)
Li, D., Du, X., Hu, X., Jia, X.: Minimizing number of wavelengths in multicast routing trees in WDM networks. Networks 35(4), 260–265 (2000)
Li, Y., Thai, M.T., Wang, F., Du, D.-Z.: On the construction of a strongly connected broadcast arborescence with bounded transmission delay. IEEE Trans. Mobile Comput. 5(10), 1460–1470 (2006)
Li, Y., Thai, M.Y., Wang, F., Yi, C.-W., Wan, P.-J., Du, D.-Z.: On greedy construction of connected dominating sets in wireless networks. Wireless Commun. Mobile Comput. 5, 927–932 (2005)
Li, D., Du, H., Wan, P.-J., Gao, X., Zhang, Z., Wu, W.: Minimum power strongly connected dominating sets in wireless networks. In: Proceedings of the 2008 International Conference on Wireless Networks (ICWN’08) (2008)
Li, D., Du, H., Wan, P.-J., Gao, X., Zhang, Z., Wu, W.: Construction of strongly connected dominating sets in asymmetric multihop wireless networks. Theoret. Comput. Sci. 410(8–10), 661–669 (2009)
Liu, Q., Li, X., Wu, L., Du, H., Zhang, Z., Wu, W., Xu, Y.: A new proof for Zassenhaus–Groemer–Oler inequality. Disc. Math. Algorithms Appl. (2012), to appear
Min, M., Du, H., Jiao, X., Huang, X., Huang, S.C.-H., Wu, W.: Improving construction for connected dominating set with Steiner tree in wireless sensor networks. J. Global Optim. 35, 111–119 (2006)
Moscibroda, T., Wattenhofer, R.: Maximizing the lifetime of dominating sets. In: Proceedings of the 5th IEEE International Workshop on Algorithms for Wireless, Mobile, Ad hoc and Sensor Networks (2005)
Mukherjee, B.: WDM-based local lightwave networks Part I: single-hop system. IEEE Networks 3, 12–26 (1992)
Mukherjee, B.: WDM-based local lightwave networks Part II: multihop system. IEEE Networks 4, 22–32 (1992)
Mustafa, N., Ray, S.: Improved results on geometric hitting set problems. Disc. Comput. Geometry 44(4), 883–895 (2010)
Nemhauser, G.L., Wolsey, L.A.: Integer and Combinatorial Optimization. Wiley, New York (1999)
Oler, N.: An inequality in the geometry of numbers. Acta Math. 105, 19–48 (1961)
Pandit, S., Pemmaraju, S.V., Varadarajan, K.R.: Approximation algorithms for domatic partitions of unit disk graphs. In: Dinur, L. et al. (eds.) APPROX and RANDOM 2009. Lecture Notes in Computer Science, vol. 5687, pp. 312–325 (2009)
Ramamurthy, B., Iness, J., Mukherjee, B.: Minimizing the number of optical amplifiers needed to support a multi-wavelength optical LAN/MAN. In: Proceedings of IEEE INFOCOM’97, pp. 261–268 (1997)
Ramaswami, R., Sasaki, G.: Multiwavelength optical networks with limited wavelength conversion. IEEE/ACM Trans. Networking 6(6), 744–754 (1998)
Raz, R., Safra, S.: A sub-constant error-probability low-degree test, and a sub-constant error-probability PCP characterization of NP. In: Proceedings of 28th STOCS (1997)
Ruan, L., Du, D.-Z., Hu, X., Jia, X., Li, D.: Approximations for color-covering problems. In: Proceedings of 1st International Congress of Chinese Mathematicians, pp. 503–507. Beijing, China (1998)
Ruan, L., Du, D.-Z., Hu, X., Jia, X., Li, D., Sun, Z.: Converter placement supporting broadcast in WDM optical networks. IEEE Trans. Comput. 50(7), 750–758 (2001)
Ruan, L., Du, H., Jia, X., Wu, W., Li, Y., Ko, K.-I.: A greedy approximation for minimum connected dominating set. Algorithmca, 329(1–3), 325–330 (2004)
Salhieh, A., Weinmann, J., Kochha, M., Schwiebert, L.: Power efficient topologies for wireless sensor networks. ICPP’2001, pp. 156–163 (2001)
Sampathkumar, E., Walikar, H.B.: The connected domination number of a graph. J. Math. Phys. Sci. 13(6), 607–613 (1979)
Sivakumar, R., Das, B., Bharghavan, V.: An improved spine-based infrastructure for routing in ad hoc networks. In: IEEE Symposium on Computer and Communications, Athens, Greece (1998)
Slijepcevic, S., Potkonjak, M.: Power efficient organization of wireless sensor networks. IEEE International Conference on Communications, pp. 472–476 (2001)
Solis-Oba, R.: 2-approximation algorithm for finding a spanning tree with maximum number of leaves. In: Proceedings of 6th European Symposium on Algorithms (ESA’98). Lecture Notes in Computer Science, vol. 1461, pp. 441–452. Springer, Berlin (1998)
Srinivasan, A., Wu, J.: TRACK: A novel connected dominating set based sink mobility model for WSNs. ICCCN, pp. 664–671 (2008)
Stojmenovic, I., Seddigh, M., Zunic, J.: Dominating sets and neighbor elimination based broadcasting algorithms in wireless networks. In: Proceedings of IEEE Hawaii International Conference on System Sciences (2001)
Sum, J., Wu, J., Ho, K.: Analysis on a localized pruning method for connected dominating sets. J. Inf. Sci. Eng. 23(4), 1073–1086 (2007)
Thai, M.T., Du, D.-Z.: Connected dominating sets in disk graphs with bidirectional links. IEEE Commun. Lett. 10(3), 138–140 (2006)
Thai, M.Y., Wang, F., Liu, D., Zhu, S., Du, D.-Z.: Connected dominating sets in wireless networks with different communication ranges. IEEE Trans. Mobile Comput. 6(7), 721–730 (2007)
Vahdatpour, A., Dabiri, F., Moazeni, M., Sarrafzadeh, M.: Theoretical bound and practical analysis of connected dominating set in ad hoc and sensor networks. In: Proceedings of 22nd International Symposium on Distributed Computing (DISC), pp. 481–495 (2008)
Wan, P.J., Alzoubi, K.M., Frieder, O.: Distributed construction of connected dominating set in wireless ad hoc networks. ACM/Springer Mobile Network. Appl. 9(2), 141–149 (2004). A preliminary version of this paper appeared in IEEE INFOCOM (2002)
Wan, P.-J., Alzoubi, K.M., Frieder, O.: A simple heuristic for minimum connected dominating set in graphs. Int. J. Found. Comput. Sci. 14(2), 323–333 (2003)
Wan, P.J., Wang, L., Yao, F.F.: Two-phased approximation algorithms for minimum CDS in wireless ad hoc networks. IEEE ICDCS, pp. 337–344 (2008)
Wan, P.-J., Xu, X., Wang, Z.: Wireless coverage with disparate ranges. ACM Mobihoc (2011)
Wan, P.-J., Du, D.-Z., Pardalos, P.M., Wu, W.: Greedy approximations for minimum submodular cover with submodular cost. Comput. Optim. Appl. 45(2), 463–474 (2010)
Wan, P.J., Huang, S.C.-H., Wang, L., Wan, Z., Jia, X.: Minimum-latency aggregation scheduling in multihop wireless networks. ACM MOBIHOC (2009)
Wan, P.-J., Wang, Z., Wan, Z., Huang, S.C.-H., Liu, H.: Minimum-latency schedulings for group communications in multi-channel multihop wireless networks. WASA (2009)
Wang, F., Thai, M.T., Du, D.-Z.: On the construction of 2-connected virtual backbone in wireless networks. IEEE Trans. Wireless Commun. 8(3), 1230–1237 (2009)
Wang, L., Wan, P.-J., Yao, F.F.: Minimum CDS in multihop wireless networks with disparate communication ranges, WASA (2010)
White, K., Parber, M., Pulleyblank, W.: Steiner trees, connected domination and strongly chordal graphs. Networks 15(1), 109–124 (1985)
Willson, J.K., Ding, L., Wu, W., Wu, L., Lu, Z., Lee, W.: A better constant-approximation for coverage problem in wireless sensor networks, preprint.
Willson, J.K., Gao, X., Qu, Z., Zhu, Y., Li, Y., Wu, W.: Efficient distributed algorithms for topology control problem with shortest path constraints. Disc. Math. Algorithms Appl. 1, 437–461 (2009)
Wolsey, L.A.: An analysis of the greedy algorithm for submodular set covering problem. Combinatorica 2(4), 385–393 (1982)
Wu, J., Li, H.: On calculating connected dominating set for efficient routing in ad hoc wireless networks. In: Proceedings of the 3rd ACM International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications, pp. 7–14 (1999)
Wu, J., Dai, F.: Virtual backbone construction in MANETs using adjustable transmission ranges. IEEE Trans. Mob. Comput. 5(9), 1188–1200 (2006)
Wu, J., Gao, M., Stojmenovic, I.: On calculating power-aware connected dominating sets for efficient routing in ad hoc wireless networks. ICPP pp. 346–356 (2001)
Wu, J., Wu, B., Stojmenovic, I.: Power-aware broadcasting and activity scheduling in ad hoc wireless networks using connected dominating sets. Wireless Commun. Mobile Comput. 3(4), 425–438 (2003)
Wu, J., Dai, F., Yang, S.: Iterative local solutions for connected dominating set in ad hoc wireless networks, MASS (2005)
Wu, J., Lou, W., Dai, F.: Extended multipoint relays to determine connected dominating sets in MANETs. IEEE Trans. Comput. 55(3), 347–337 (2006)
Wu, W., Du, H., Jia, X., Li, Y., Huang, S.C.-H.: Minimum connected dominating sets and maximal independent sets in unit disk graphs, Theor. Comput. Sci. 352(1–3), 1–7 (2006)
Xing, K., Cheng, W., Park, E.K., Rotenstreich, S.: Distributed connected dominating set construction in geometric k-disk graphs. IEEE ICDCS, pp. 673–680 (2008)
Zassenhaus, H.: Modern development in the geometry of numbers. Bull. Amer. Math. Soc. 67, 427–439 (1961)
Zhang, Y., Li, W.: Modeling and energy consumption evaluation of a stochastic wireless sensor networks. preprint (2011)
Zhang, Z., Gao, X., Wu, W., Du, D.-Z.: A PTAS for minimum connected dominating set in 3-dimensional wireless sensor networks. J. Global Optim. 45(3), 451–458 (2009)
Zhang, N., Shin, I., Zou, F., Wu, W., Thai, M.T.: Trade-off scheme for fault tolerant connected dominating sets on size and diameter. FOWANC, pp. 1–8 (2008)
Zhao, Y., Wu, J., Li, F., Lu, S.: VBS: Maximum lifetime sleep scheduling for wireless sensor networks using virtual backbones, INFOCOM pp. 366–370 (2010)
Zhong, C.: Sphere Packing. Springer, Berlin (1999)
Zhong, X., Wang, J., Hu, N.: Connected dominating set in 3-dimensional space for ad hoc network. In: Proceedings of IEEE Wireless Communications and Networking Conference (WCNC’07) (2007)
Zou, F., Li, X., Kim, D., Wu, W.: Construction of minimum connected dominating set in 3-dimensional wireless networks. In: Proceedings of Third International Conference on Wireless Algorithms, Systems and Applications (WASA 08) (2008)
Zou, F., Li, X., Gao, S., Wu, W.: Node-weighted Steiner tree approximation in unit disk graphs. J. Combin. Optim. 18(4), 342–349 (2009)
Zou, F., Wang, Y., Xu, X., Du, H., Li, X., Wan, P., Wu, W.: New approximations for weighted dominating sets and connected dominating sets in unit disk graphs. Theoret. Comput. Sci. 412(3), 198–208 (2011)
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media New York
About this chapter
Cite this chapter
Du, DZ., Wan, PJ. (2013). Coverage. In: Connected Dominating Set: Theory and Applications. Springer Optimization and Its Applications, vol 77. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-5242-3_6
Download citation
DOI: https://doi.org/10.1007/978-1-4614-5242-3_6
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-5241-6
Online ISBN: 978-1-4614-5242-3
eBook Packages: Mathematics and StatisticsMathematics and Statistics (R0)