Homology based algorithm for disaster recovery in wireless networks

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Considering a damaged wireless network, presenting coverage holes or disconnected components, we propose a disaster recovery algorithm repairing the network. It provides the list of locations where to put new nodes to patch the coverage holes and mend the disconnected components. In order to do this we first consider the simplicial complex representation of the network, then the algorithm adds supplementary nodes in excessive number, and afterwards runs a reduction algorithm in order to reach a unimprovable result. One of the novelty of this work resides in the proposed method for the addition of nodes. We use a determinantal point process: the Ginibre point process which has inherent repulsion between vertices, which simulation is new in wireless networks application. We compare both the determinantal point process addition method with other vertices addition methods, and the whole disaster recovery algorithm to the greedy algorithm for the set cover problem.

Original languageEnglish
Title of host publication2014 12th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOpt 2014
PublisherIEEE Computer Society
Pages685-692
Number of pages8
ISBN (Print)9783901882630
DOIs
Publication statusPublished - 1 Jan 2014
Event2014 12th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOpt 2014 - Hammamet, Tunisia
Duration: 12 May 201416 May 2014

Publication series

Name2014 12th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOpt 2014

Conference

Conference2014 12th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOpt 2014
Country/TerritoryTunisia
CityHammamet
Period12/05/1416/05/14

Fingerprint

Dive into the research topics of 'Homology based algorithm for disaster recovery in wireless networks'. Together they form a unique fingerprint.

Cite this