2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333)
DOI: 10.1109/icc.2002.997417
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive backbone-based multicast for ad hoc networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
50
0

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 46 publications
(50 citation statements)
references
References 10 publications
0
50
0
Order By: Relevance
“…The cluster-head election algorithm can be used from [12,27]. In this work, HEED protocol, which proposed by Younis et al [27], considers the residual energy and degree of a node to determine which node can be the cluster-head, so the cluster-head can stably operate.…”
Section: Basic Ideas and Challengesmentioning
confidence: 99%
“…The cluster-head election algorithm can be used from [12,27]. In this work, HEED protocol, which proposed by Younis et al [27], considers the residual energy and degree of a node to determine which node can be the cluster-head, so the cluster-head can stably operate.…”
Section: Basic Ideas and Challengesmentioning
confidence: 99%
“…The initial set can either be manually designated by the supervisor, or autonomously elected via the adaptive dynamic backbone (ADB) distributed clustering protocol [27], which adaptively groups nodes into clusters of various sizes depending on the mobility conditions of the nodes. Based on information gathered through management probes and the given policies provided by the supervisor node, the MM in each cluster generates a view of the current management architecture at time t as the initial time-varying utility function U i (t) and the prediction rate PR(t).…”
Section: Autonomous-adaptive Configuration Of Managersmentioning
confidence: 99%
“…Since clustering process has chain effect (local changes may trigger global structure updates), we do not elaborate it further. Jaikaeo and Shen proposed one of variants of such clustering based method to compute a dominating set [25]. Dominating nodes are selected based on their id.…”
Section: Clustering Based Broadcasting Protocolsmentioning
confidence: 99%