2009
DOI: 10.1016/j.tcs.2008.10.009
|View full text |Cite
|
Sign up to set email alerts
|

Robust self-stabilizing weight-based clustering algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
25
0
12

Year Published

2009
2009
2020
2020

Publication Types

Select...
6
2

Relationship

2
6

Authors

Journals

citations
Cited by 44 publications
(37 citation statements)
references
References 6 publications
0
25
0
12
Order By: Relevance
“…Clustering is found very attractive in infrastructure-less networks, like ad-hoc networks, since it limits the responsibility of network management only to leaders, and it allows the use of hierarchical routing. This is why numerous self-stabilizing 1-hop clustering protocols were proposed in the literature [9,10,8,11,13,14,15,16,19,20].…”
Section: Introductionmentioning
confidence: 99%
“…Clustering is found very attractive in infrastructure-less networks, like ad-hoc networks, since it limits the responsibility of network management only to leaders, and it allows the use of hierarchical routing. This is why numerous self-stabilizing 1-hop clustering protocols were proposed in the literature [9,10,8,11,13,14,15,16,19,20].…”
Section: Introductionmentioning
confidence: 99%
“…Johnen and Nguyen present a self-stabilizing (1,1)-clustering algorithm that converges fast in [5]. Dolev and Tzachar tackle a lot of organizational problems in a self-stabilizing manner in [6].…”
Section: Introductionmentioning
confidence: 99%
“…To overcome these drawbacks, the paradigm selfstabilization with service guarantee has been recently introduced in [17,20,18]. A protocol P is self-stabilizing with service guarantee if: (1) P is self-stabilizing; (2) from an arbitrary configuration, P quickly reaches a safe configuration, where a safety property is satisfied, so a minimal service is provided; (3) the safety property (minimal service) holds during progress of P towards the optimum service (i.e., during stabilization despite actions of P) and, (4) the safety property (minimal service) is also maintained despite the occurrences of some specific external disruptions, called highly tolerated disruptions, denoted HT D.…”
Section: Introductionmentioning
confidence: 99%
“…Clustering is found very attractive in infrastructure-less networks, like ad-hoc networks, since it limits the responsibility of network management only to leaders, and it allows the use of hierarchical routing. This is why numerous clustering protocols were proposed in the literature [1,2,6,11,15,17,19,20,21,23].…”
Section: Introductionmentioning
confidence: 99%