Proceedings of the 12th Annual International Conference on Mobile Computing and Networking 2006
DOI: 10.1145/1161089.1161104
|View full text |Cite
|
Sign up to set email alerts
|

Boundary recognition in sensor networks by topological methods

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
264
0

Year Published

2008
2008
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 294 publications
(265 citation statements)
references
References 16 publications
1
264
0
Order By: Relevance
“…Second, even if we assume that the initial sensor network is isotropic, unbalanced power consumption among nodes will easily create holes in the network. Recently, a distributed method [40] has been proposed to detect hole boundary by using only the connectivity information. Based on that work, REP [41] is proposed to deal with the "distance mismatch" problem in anisotropic networks.…”
Section: Hop Count Measurementsmentioning
confidence: 99%
“…Second, even if we assume that the initial sensor network is isotropic, unbalanced power consumption among nodes will easily create holes in the network. Recently, a distributed method [40] has been proposed to detect hole boundary by using only the connectivity information. Based on that work, REP [41] is proposed to deal with the "distance mismatch" problem in anisotropic networks.…”
Section: Hop Count Measurementsmentioning
confidence: 99%
“…One important application of network planarization is topology discovery [18] [8] [9]. In topology discovery, we use the large faces in a planarized network to find holes and the outer boundary of the sensor field.…”
Section: B Topology Discoverymentioning
confidence: 99%
“…Our results compare favorably with the known results on topology discovery. In [8], [9], [18], the authors presented very nice algorithms for detecting holes and outer boundaries. Their algorithms work for large holes (radius are 5 times the communication range of the sensors or more) or very dense networks (e.g., average degree larger than 15).…”
Section: B Topology Discoverymentioning
confidence: 99%
See 1 more Smart Citation
“…Examples are intrusion detection, data gathering [19], mundane services like efficient routing within the network [6,15], or event detection [5]. In many situations, holes can also be considered as indicators for insufficient coverage or connectivity.…”
Section: Introductionmentioning
confidence: 99%