2016
DOI: 10.1109/twc.2015.2496596
|View full text |Cite
|
Sign up to set email alerts
|

Node Scheduling Control Inspired by Epidemic Theory for Data Dissemination in Wireless Sensor-Actuator Networks With Delay Constraints

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 36 publications
(10 citation statements)
references
References 37 publications
0
10
0
Order By: Relevance
“…Many variations have been proposed to minimize the redundancy of flooding, for example probabilistic, distance-based, and location-based algorithms. An adaptive bio-inspired epidemic dissemination protocol for wireless sensor-actuator networks was presented in [12]. An analytical model of message dissemination optimal control to minimize the accumulated network cost was provided in [13], with applications to mobile and social networks.…”
Section: Related Workmentioning
confidence: 99%
“…Many variations have been proposed to minimize the redundancy of flooding, for example probabilistic, distance-based, and location-based algorithms. An adaptive bio-inspired epidemic dissemination protocol for wireless sensor-actuator networks was presented in [12]. An analytical model of message dissemination optimal control to minimize the accumulated network cost was provided in [13], with applications to mobile and social networks.…”
Section: Related Workmentioning
confidence: 99%
“…is the set of devices under the operator O i ∈ O. O i is responsible to the devices in the set M O i , and M O i j ∈ M O i reports its status information to its own operator O i , and each M is connected to neighboring devices for multihop D2D communications. For the multiple access at every hop, we consider a OFDMA-based transmission, and communication capacity at each hop link is fixed [4,11,12]. e general infrastructure of operator-controlled D2D system is shown in Figure 1, and Table 1 lists the notations used in this paper.…”
Section: Operator-controlled D2d Communication Infrastructurementioning
confidence: 99%
“…In Mate [15] middleware, nodes actively infer the latest version of a code such that if a node obtains a newer version of a code, after a while, all nodes will obtain it. There are other protocols for the dissemination of codes in WSNs [16][17][18]. These protocols use a gossiping protocol to reliably disseminate the metadata of a new code to all the nodes and make them aware of the new code.…”
Section: Related Workmentioning
confidence: 99%