2007
DOI: 10.1109/tpds.2007.253285
|View full text |Cite
|
Sign up to set email alerts
|

On the Longest Edge of Gabriel Graphs in Wireless Ad Hoc Networks

Abstract: Abstract-In wireless ad hoc networks, without fixed infrastructures, virtual backbones are constructed and maintained to efficiently operate such networks. The Gabriel graph (GG) is one of widely used geometric structures for topology control in wireless ad hoc networks. If all nodes have the same maximal transmission radii, the length of the longest edge of the GG is the critical transmission radius such that the GG can be constructed by localized and distributed algorithms using only 1-hop neighbor informati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
32
0
1

Year Published

2008
2008
2015
2015

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 25 publications
(33 citation statements)
references
References 11 publications
0
32
0
1
Order By: Relevance
“…Most existing topology control schemes apply geometric proximity graphs (such as Relative Neighbor Graph (RNG) [1], Gabriel Graph (GG) [2], Delaunay triangulation graph [3], and Minimum Spanning Tree (MST) [4]) to build sparse, but connected links, such as [5][6][7][8][9][10][11][12][13][14].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Most existing topology control schemes apply geometric proximity graphs (such as Relative Neighbor Graph (RNG) [1], Gabriel Graph (GG) [2], Delaunay triangulation graph [3], and Minimum Spanning Tree (MST) [4]) to build sparse, but connected links, such as [5][6][7][8][9][10][11][12][13][14].…”
Section: Related Workmentioning
confidence: 99%
“…The area of energy-saving topology control [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16] has attracted a great deal of attention. Nodes in a wireless multi-hop network collaboratively determine their transmission power and define the network topology by forming the proper neighbor relation under the constraint of network connectivity and the criteria with respect to energy efficiency.…”
Section: Introductionmentioning
confidence: 99%
“…Two key techniques used in our remaining proof are the Palm theory for Poisson processes (see, e.g., Theorem 1.6 in [8]) and the Brun's sieve (see, e.g., Theorem 10 in [12]), which are stated below.…”
Section: Lemma 8: Pr [ ′′ > 0] = (1)mentioning
confidence: 99%
“…We will frequently change the integral variables using a technique introduced in [12]. Consider a tree topology on planar points 1 , 2 , ⋅ ⋅ ⋅ , , and assume without loss of generality that −1 is an edge in this tree.…”
Section: Proof For Lemmamentioning
confidence: 99%
“…The asymptotic distributions of λ(M ST (P n )) and λ(GG(P n )) were derived in [11] (based on an earlier result [2]) and in [16] respectfully. Specifically, for any constant c,…”
Section: Thus λ(M St (V )) ≤ λ(Rn G(v )) ≤ λ(Gg(v ))mentioning
confidence: 99%