Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
5
0

Year Published

2013
2013
2015
2015

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 5 publications
references
References 37 publications
1
5
0
Order By: Relevance
“…These simulation results with the help of ProSe [7] and TOSSIM [25] validate the analytical results.…”
Section: Contributions Of the Papersupporting
confidence: 83%
See 2 more Smart Citations
“…These simulation results with the help of ProSe [7] and TOSSIM [25] validate the analytical results.…”
Section: Contributions Of the Papersupporting
confidence: 83%
“…Since the programs in Sections 4.1, 4.2, and 4.3 utilize guarded commands, we use ProSe [7], which is a programming tool for sensor networks, to transform the programs to nesC/TinyOS platform [15]. Then, using TOSSIM [25], we simulate the generated programs and evaluate the effect of having slow actions in each program.…”
Section: Simulation Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…So, minimizing the memory space used by each node enable to minimize the amount of information that is exchanged between nodes. Indeed, protocols are typically written in the state model, where the state of each node is available for reading to every neighbor, and all existing stabilization-preserving compilers [25,8,3,26] expect this communication model. Second, minimizing memory space enables to significantly reduce the cost of redundancy when mixing self-stabilization and replication, in order to increase the probability of masking or containing transient faults [18,17,9].…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, these algorithms are designed for a communication model that is more powerful than the classical state model used in this paper. (The state model is the model used in most available compilers for actual networks [25,8,3,26]). More specifically, Mayer et al [24] use the message passing model, and Awerbuch and Ostrovsky [5] use the linkregister model, where communications between neighboring nodes are carried out through dedicated registers.…”
Section: Introductionmentioning
confidence: 99%