Proceedings. International Symposium on Information Theory, 2005. ISIT 2005. 2005
DOI: 10.1109/isit.2005.1523331
|View full text |Cite
|
Sign up to set email alerts
|

Disjoint identifying-codes for arbitrary graphs

Abstract: Identifying codes have been used in a variety of applications, including sensor-based location detection in harsh environments. The sensors used in such applications are typically battery powered making energy conservation an important optimization criterion for lengthening network lifetime. In this work we propose and develop the concept of disjoint identifying codes with the motivation of providing energy load-balancing in such systems. We also provide information-theoretic upper and lower bounds on the numb… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
13
0

Year Published

2006
2006
2018
2018

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(13 citation statements)
references
References 10 publications
(9 reference statements)
0
13
0
Order By: Relevance
“…It was observed in [4,5] that an r-robust identifying code can be built in a localized manner, where each vertex only considers its two-hop neighborhood. This localization is possible when the identifying codes are required to produce only non-empty identifying sets 5 .…”
Section: Localized Robust Identifying Code and Its Approximationmentioning
confidence: 99%
See 1 more Smart Citation
“…It was observed in [4,5] that an r-robust identifying code can be built in a localized manner, where each vertex only considers its two-hop neighborhood. This localization is possible when the identifying codes are required to produce only non-empty identifying sets 5 .…”
Section: Localized Robust Identifying Code and Its Approximationmentioning
confidence: 99%
“…This localization is possible when the identifying codes are required to produce only non-empty identifying sets 5 . In this section and henceforth we introduce this requirement, and call the resulting codes -localized identifying codes.…”
Section: Localized Robust Identifying Code and Its Approximationmentioning
confidence: 99%
“…Identifying codes have since been extended and applied to location detection in hostile environments [6,7], to energy balancing of such systems [8], and to dynamic location detection agents [9]. In the first example, a coverage area is quantized into a finite number of clusters.…”
Section: ) Applicationsmentioning
confidence: 99%
“…It was observed in [7,8] that an r-robust identifying code can be built in a localized manner, where each vertex only considers its two-hop neighborhood. The resulting localized identifying codes are the subject of this section, and the approximation algorithm we derive is critical to the distributed algorithm of the next section.…”
Section: B Robust Identifying Code and Its Approximationmentioning
confidence: 99%
“…It was observed in [6,21] that an r-robust identifying code can be built in a localized manner, where …”
Section: Localized Robust Identifying Code and Its Approximationmentioning
confidence: 99%