2008 IEEE International Symposium on Parallel and Distributed Processing With Applications 2008
DOI: 10.1109/ispa.2008.43
|View full text |Cite
|
Sign up to set email alerts
|

Self-Stabilizing Construction of Bounded Size Clusters

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
17
0
12

Year Published

2009
2009
2020
2020

Publication Types

Select...
5
1
1

Relationship

4
3

Authors

Journals

citations
Cited by 17 publications
(29 citation statements)
references
References 15 publications
0
17
0
12
Order By: Relevance
“…We are placing in the context of clustering protocols where nodes proclaim themselves leaders like [1,2,6,11,15,17,19,20,23], and not in the context of protocols where leaders are nominated by other nodes like [5,9]. The general form of the original silent self-stabilizing weight-based 1-hop clustering protocol P is described in Protocol 1.…”
Section: The Original Protocol Pmentioning
confidence: 99%
See 3 more Smart Citations
“…We are placing in the context of clustering protocols where nodes proclaim themselves leaders like [1,2,6,11,15,17,19,20,23], and not in the context of protocols where leaders are nominated by other nodes like [5,9]. The general form of the original silent self-stabilizing weight-based 1-hop clustering protocol P is described in Protocol 1.…”
Section: The Original Protocol Pmentioning
confidence: 99%
“…The computations of original protocol are however modified to ensure the service guarantee to T P protocol despite HT D disruptions. Protocols GDMAC [1], building a kfold dominating set, and BSC [19] building a capacitated dominating set, are transformed respectively to R-GDMAC [20], and R-BSC [17] using our transformer. The status transition diagram of a node v is illustrated in Figure 1, where transitions are the rules executed by v (and defined in Protocol 3).…”
Section: Input Variablesmentioning
confidence: 99%
See 2 more Smart Citations
“…Many 1-hop clustering algorithms have been proposed in the literature. A large number of them are self-stabilizing [2], [7], [10], [6], [9], [15], [19]. There are also robust self-stabilizing clustering algorithms [16], [13], and selfstabilizing with safe convergence [18].…”
Section: Introductionmentioning
confidence: 99%