2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577) 2004
DOI: 10.1109/icc.2004.1313360
|View full text |Cite
|
Sign up to set email alerts
|

Heuristic search techniques for cell to switch assignment in location area planning for cellular networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2009
2009
2019
2019

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…The concept behind this algorithm is similar to our previous work [11]. It is based on a state space representation of the problem [16] (as exemplified in Fig.…”
Section: State Space Formulation and Optimal Heuristic Search Algomentioning
confidence: 99%
See 2 more Smart Citations
“…The concept behind this algorithm is similar to our previous work [11]. It is based on a state space representation of the problem [16] (as exemplified in Fig.…”
Section: State Space Formulation and Optimal Heuristic Search Algomentioning
confidence: 99%
“…It is obvious from the fonnulation that an exhaustive enumeration technique for assigning RNCs in dual homing problem requires checking (m+s)r combinations. So, when the problem size is large, heuristic techniques are suitable to solve such problems [11].…”
Section: " "mentioning
confidence: 99%
See 1 more Smart Citation
“…The author in [23] regards the TA planning problem as a graph optimisation problem. The authors in [24] use heuristic search for depth-first search to solve TA planning problems with specified execution time. The authors in [25] propose a delayed registration (DR) algorithm to reduce the signalling overhead in the network.…”
Section: Related Workmentioning
confidence: 99%
“…However, little work has been done with respect to mapping a particular network related problem, other than finding shortest routes, to a state-space problem and solving it. For instance, cell-to-switch assignment is developed using heuristic search for mobile calls in [17]. Heuristic search is further used in [18] to simulate possible attackers searching for attacks in modelled network for proactive and continuous identification of network attacks.…”
Section: Motivationmentioning
confidence: 99%